Auto-Update: 2025-01-08T23:00:19.694682+00:00

This commit is contained in:
cad-safe-bot 2025-01-08 23:03:43 +00:00
parent 224f13c561
commit 8c6dd14d0d
49 changed files with 2888 additions and 329 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48884",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T07:15:04.987",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-08T21:31:21.570",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,90 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net/mlx5: corrige el acceso a las estad\u00edsticas de los comandos despu\u00e9s de liberarlos. El comando puede fallar mientras se recarga el controlador y no puede aceptar comandos de firmware hasta que se reinicialice la interfaz de comandos. Dicho error de comando se registra en las estad\u00edsticas de comando. Esto da como resultado un acceso al puntero NULL a medida que la estructura de estad\u00edsticas de comando se libera y reasigna durante la recarga de mlx5 devlink (consulte el registro del kernel a continuaci\u00f3n). Solucionelo haciendo que las estad\u00edsticas de comando se asignen est\u00e1ticamente en la sonda del controlador. Registro del kernel: [2394.808802] ERROR: no se puede manejar la solicitud de paginaci\u00f3n del kernel en 000000000002a9c0 [2394.810610] PGD 0 P4D 0 [2394.811811] Vaya: 0002 [#1] SMP NOPTI... [2394.815482] RIP: 10:native_queued_spin_lock_slowpath+0x183/0x1d0 ... [2394.829505] Seguimiento de llamadas: [2394.830667] _raw_spin_lock_irq+0x23/0x26 [2394.831858] cmd_status_err+0x55/0x110 [mlx5_core] [2394.833020] mlx5_access_reg+0xe7/0x1 50 [mlx5_core] [2394.834175] mlx5_query_port_ptys+0x78/0xa0 [mlx5_core] [2394.835337] mlx5e_ethtool_get_link_ksettings+0x74/0x590 [mlx5_core] [2394.836454]? kmem_cache_alloc_trace+0x140/0x1c0 [ 2394.837562] __rh_call_get_link_ksettings+0x33/0x100 [ 2394.838663] ? __rtnl_unlock+0x25/0x50 [ 2394.839755] __ethtool_get_link_ksettings+0x72/0x150 [ 2394.840862] duplex_show+0x6e/0xc0 [ 2394.841963] dev_attr_show+0x1c/0x40 [ 2394.8 43048] sysfs_kf_seq_show+0x9b/0x100 [ 2394.844123] seq_read+0x153/0x410 [ 2394.845187] vfs_read+ 0x91/0x140 [ 2394.846226] ksys_read+0x4f/0xb0 [ 2394.847234] do_syscall_64+0x5b/0x1a0 [ 2394.848228] entrada_SYSCALL_64_after_hwframe+0x65/0xca"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/da2e552b469a0cd130ff70a88ccc4139da428a65",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/ddf458641a511e7dff19f3bf0cbbc5dd9fe08ce5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18",
"versionEndExcluding": "6.1.7",
"matchCriteriaId": "F6F221E4-8654-4B9E-9C45-9DA7AC16B016"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/da2e552b469a0cd130ff70a88ccc4139da428a65",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ddf458641a511e7dff19f3bf0cbbc5dd9fe08ce5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27640",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-01T21:15:09.313",
"lastModified": "2024-11-21T07:53:19.497",
"lastModified": "2025-01-08T21:15:07.413",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28176",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-06-02T17:15:12.297",
"lastModified": "2024-11-21T07:54:32.463",
"lastModified": "2025-01-08T21:15:07.713",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28177",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-06-02T17:15:12.347",
"lastModified": "2024-11-21T07:54:32.600",
"lastModified": "2025-01-08T21:15:07.957",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28469",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-02T12:15:09.320",
"lastModified": "2024-11-21T07:55:09.303",
"lastModified": "2025-01-08T21:15:08.143",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29551",
"sourceIdentifier": "security@mozilla.org",
"published": "2023-06-02T17:15:13.010",
"lastModified": "2024-11-21T07:57:16.907",
"lastModified": "2025-01-08T22:15:27.373",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29724",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-02T04:15:49.803",
"lastModified": "2024-11-21T07:57:25.343",
"lastModified": "2025-01-08T21:15:08.470",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29725",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-02T04:15:49.863",
"lastModified": "2024-11-21T07:57:25.487",
"lastModified": "2025-01-08T21:15:08.740",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33476",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-02T14:15:09.437",
"lastModified": "2024-11-21T08:05:36.737",
"lastModified": "2025-01-08T21:15:09.183",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33669",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-02T20:15:09.520",
"lastModified": "2024-11-21T08:05:51.333",
"lastModified": "2025-01-08T21:15:09.473",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33670",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-02T20:15:09.563",
"lastModified": "2024-11-21T08:05:51.487",
"lastModified": "2025-01-08T21:15:09.780",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33671",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-02T20:15:09.607",
"lastModified": "2024-11-21T08:05:51.647",
"lastModified": "2025-01-08T21:15:10.023",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33672",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-02T20:15:09.647",
"lastModified": "2024-11-21T08:05:51.797",
"lastModified": "2025-01-08T21:15:10.270",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33673",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-02T20:15:09.693",
"lastModified": "2024-11-21T08:05:51.947",
"lastModified": "2025-01-08T21:15:10.503",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33675",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-02T20:15:09.733",
"lastModified": "2024-11-21T08:05:52.093",
"lastModified": "2025-01-08T21:15:10.757",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-33717",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-02T12:15:09.367",
"lastModified": "2024-11-21T08:05:53.620",
"lastModified": "2025-01-08T21:15:11.000",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-401"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34258",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T20:15:10.903",
"lastModified": "2024-11-21T08:06:52.663",
"lastModified": "2025-01-08T22:15:28.060",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-12431",
"sourceIdentifier": "cve@gitlab.com",
"published": "2025-01-08T21:15:11.760",
"lastModified": "2025-01-08T21:15:11.760",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in GitLab CE/EE affecting all versions starting from 15.5 before 17.5.5, 17.6 before 17.6.3, and 17.7 before 17.7.1, in which unauthorized users could manipulate the status of issues in public projects."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@gitlab.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://about.gitlab.com/releases/2025/01/08/patch-release-gitlab-17-7-1-released/#unauthorized-user-can-manipulate-status-of-issues-in-public-projects",
"source": "cve@gitlab.com"
},
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/508742",
"source": "cve@gitlab.com"
},
{
"url": "https://hackerone.com/reports/2877710",
"source": "cve@gitlab.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13187",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-08T17:15:15.410",
"lastModified": "2025-01-08T17:15:15.410",
"vulnStatus": "Received",
"lastModified": "2025-01-08T21:15:11.973",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.468013",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/Rsec-1/wps",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-13189",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-08T20:15:27.353",
"lastModified": "2025-01-08T20:15:27.353",
"lastModified": "2025-01-08T21:15:12.157",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +140,14 @@
{
"url": "https://vuldb.com/?submit.469223",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/ZeroWdd/myblog/issues/1",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
},
{
"url": "https://github.com/ZeroWdd/myblog/issues/1#issue-2759828006",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-13190",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-08T21:15:12.303",
"lastModified": "2025-01-08T21:15:12.303",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in ZeroWdd myblog 1.0. This vulnerability affects unknown code of the file src/main/resources/mapper/BlogMapper.xml. The manipulation of the argument findBlogList/getTotalBlogs leads to xml injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-91"
}
]
}
],
"references": [
{
"url": "https://github.com/ZeroWdd/myblog/issues/2",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/ZeroWdd/myblog/issues/2#issue-2759833644",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.290782",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.290782",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.469226",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3500",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-02T17:15:26.100",
"lastModified": "2024-11-21T09:29:44.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-08T21:22:53.997",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,22 +39,64 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://account.wpmet.com/downloads/elementskit/?changelog=1",
"source": "security@wordfence.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8ae0a47-cba5-468e-8d25-7b7176373b9c?source=cve",
"source": "security@wordfence.com"
},
{
"url": "https://account.wpmet.com/downloads/elementskit/?changelog=1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8ae0a47-cba5-468e-8d25-7b7176373b9c?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpmet:elementskit:*:*:*:*:pro:wordpress:*:*",
"versionEndExcluding": "3.6.1",
"matchCriteriaId": "47CE311A-7EE4-405F-984B-AC3A71E177CA"
}
]
}
]
}
],
"references": [
{
"url": "https://account.wpmet.com/downloads/elementskit/?changelog=1",
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8ae0a47-cba5-468e-8d25-7b7176373b9c?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://account.wpmet.com/downloads/elementskit/?changelog=1",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8ae0a47-cba5-468e-8d25-7b7176373b9c?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3647",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-02T17:15:28.397",
"lastModified": "2024-11-21T09:30:04.623",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-08T21:10:47.357",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,22 +39,64 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3075668/premium-addons-for-elementor/trunk/widgets/premium-post-ticker.php",
"source": "security@wordfence.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/48fdece5-2996-426f-b77c-ae0b35bcd0ce?source=cve",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3075668/premium-addons-for-elementor/trunk/widgets/premium-post-ticker.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/48fdece5-2996-426f-b77c-ae0b35bcd0ce?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:leap13:premium_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.10.29",
"matchCriteriaId": "7EF8D77D-225B-451D-B581-DF0A01E4FD24"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3075668/premium-addons-for-elementor/trunk/widgets/premium-post-ticker.php",
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/48fdece5-2996-426f-b77c-ae0b35bcd0ce?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3075668/premium-addons-for-elementor/trunk/widgets/premium-post-ticker.php",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/48fdece5-2996-426f-b77c-ae0b35bcd0ce?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3675",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-02T17:15:29.320",
"lastModified": "2024-11-21T09:30:09.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-08T21:11:01.357",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,54 +39,120 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/flip-box/widgets/wpr-flip-box.php#L1903",
"source": "security@wordfence.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/flip-carousel/widgets/wpr-flip-carousel.php#L1191",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/grid/widgets/wpr-grid.php#L8567",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/taxonomy-list/widgets/wpr-taxonomy-list.php#L621",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3072880%40royal-elementor-addons&new=3072880%40royal-elementor-addons&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/337cbec1-c8a8-41b5-8c32-779be671120f?source=cve",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/flip-box/widgets/wpr-flip-box.php#L1903",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/flip-carousel/widgets/wpr-flip-carousel.php#L1191",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/grid/widgets/wpr-grid.php#L8567",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/taxonomy-list/widgets/wpr-taxonomy-list.php#L621",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3072880%40royal-elementor-addons&new=3072880%40royal-elementor-addons&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/337cbec1-c8a8-41b5-8c32-779be671120f?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.3.972",
"matchCriteriaId": "3924FF11-73F8-416F-971A-4C2F0161373D"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/flip-box/widgets/wpr-flip-box.php#L1903",
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/flip-carousel/widgets/wpr-flip-carousel.php#L1191",
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/grid/widgets/wpr-grid.php#L8567",
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/taxonomy-list/widgets/wpr-taxonomy-list.php#L621",
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3072880%40royal-elementor-addons&new=3072880%40royal-elementor-addons&sfp_email=&sfph_mail=",
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/337cbec1-c8a8-41b5-8c32-779be671120f?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/flip-box/widgets/wpr-flip-box.php#L1903",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/flip-carousel/widgets/wpr-flip-carousel.php#L1191",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/grid/widgets/wpr-grid.php#L8567",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/taxonomy-list/widgets/wpr-taxonomy-list.php#L621",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3072880%40royal-elementor-addons&new=3072880%40royal-elementor-addons&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/337cbec1-c8a8-41b5-8c32-779be671120f?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3728",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-02T17:15:30.560",
"lastModified": "2024-11-21T09:30:15.667",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-08T21:11:21.157",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,30 +39,78 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Elements/Filterable_Gallery.php",
"source": "security@wordfence.com"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Elements/Interactive_Circle.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/284ea577-ff67-4681-995b-f7bb5ef0ff3e?source=cve",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Elements/Filterable_Gallery.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Elements/Interactive_Circle.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/284ea577-ff67-4681-995b-f7bb5ef0ff3e?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpdeveloper:essential_addons_for_elementor:*:*:*:*:lite:wordpress:*:*",
"versionEndExcluding": "5.9.16",
"matchCriteriaId": "3456F1EB-AE86-4EAB-AC60-16F1EFAF69E6"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Elements/Filterable_Gallery.php",
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Elements/Interactive_Circle.php",
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/284ea577-ff67-4681-995b-f7bb5ef0ff3e?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Elements/Filterable_Gallery.php",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3075644/essential-addons-for-elementor-lite/tags/5.9.16/includes/Elements/Interactive_Circle.php",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/284ea577-ff67-4681-995b-f7bb5ef0ff3e?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38182",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-07-31T23:15:13.560",
"lastModified": "2024-08-13T23:15:19.657",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-08T21:35:17.920",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "secure@microsoft.com",
@ -43,6 +43,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -56,12 +76,42 @@
"value": "CWE-1390"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:dynamics_365:7.0:*:*:*:*:field_service:*:*",
"matchCriteriaId": "0FF8E5BB-E97C-452A-A78C-B714A67B7003"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38182",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42107",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-30T08:15:03.220",
"lastModified": "2024-11-21T09:33:36.967",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-08T21:32:03.527",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,123 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ice: no procesar extts si PTP est\u00e1 deshabilitado. La funci\u00f3n ice_ptp_extts_event() puede competir con ice_ptp_release() y provocar una desreferencia del puntero NULL que provoca un p\u00e1nico en el kernel. El p\u00e1nico ocurre porque la funci\u00f3n ice_ptp_extts_event() llama a ptp_clock_event() con un puntero NULL. El controlador de hielo ya ha liberado el reloj PTP cuando ocurre la interrupci\u00f3n para el siguiente evento de marca de tiempo externo. Para solucionar este problema, modifique la funci\u00f3n ice_ptp_extts_event() para verificar el estado de PTP y salir temprano si PTP no est\u00e1 listo."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/1c4e524811918600683b1ea87a5e0fc2db64fa9b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-367"
},
{
"url": "https://git.kernel.org/stable/c/996422e3230e41468f652d754fefd1bdbcd4604e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/1c4e524811918600683b1ea87a5e0fc2db64fa9b",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/996422e3230e41468f652d754fefd1bdbcd4604e",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.14",
"versionEndExcluding": "6.9.9",
"matchCriteriaId": "3CAC77E6-2424-4ED8-97EC-A0FC7881A134"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
"matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*",
"matchCriteriaId": "BD973AA4-A789-49BD-8D57-B2846935D3C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8F3E9E0C-AC3E-4967-AF80-6483E8AB0078"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1c4e524811918600683b1ea87a5e0fc2db64fa9b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/996422e3230e41468f652d754fefd1bdbcd4604e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1c4e524811918600683b1ea87a5e0fc2db64fa9b",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/996422e3230e41468f652d754fefd1bdbcd4604e",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46715",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-18T07:15:03.130",
"lastModified": "2024-09-20T12:30:51.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-08T21:30:44.227",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,102 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: driver: iio: agregar comprobaciones faltantes en el acceso a la devoluci\u00f3n de llamada de iio_info Se accede a algunas devoluciones de llamadas de la estructura iio_info sin ninguna comprobaci\u00f3n, por lo que si un controlador no las implementa, intentar acceder a las entradas sysfs correspondientes produce un error de kernel como: [ 2203.527791] No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 00000000 cuando se ejecuta [...] [ 2203.783416] Rastreo de llamadas: [ 2203.783429] iio_read_channel_info_avail de dev_attr_show+0x18/0x48 [ 2203.789807] dev_attr_show de sysfs_kf_seq_show+0x90/0x120 [ 2203.794181] sysfs_kf_seq_show de seq_read_iter+0xd0/0x4e4 [ 2203.798555] seq_read_iter de vfs_read+0x238/0x2a0 [ 2203.802236] vfs_read de ksys_read+0xa4/0xd4 [ 2203.805385] ksys_read de ret_fast_syscall+0x0/0x54 [ 2203.809135] Pila de excepciones (0xe0badfa8 a 0xe0badff0) [ 2203.812880] dfa0: 00000003 b6f10f80 00000003 b6eab000 00020000 00000000 [ 2203.819746] dfc0: 00000003 b6f10f80 7ff00000 00000003 00000003 00000000 00020000 00000000 [ 2203.826619] dfe0: b6e1bc88 bed80958 b6e1bc94 b6e1bcb0 [ 2203.830363] C\u00f3digo: valor de PC incorrecto [ 2203.832695] ---[ fin del seguimiento 000000000000000 ]---"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/0cc7e0ee31e5c44904e98e2229d591e093282a70",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/72f022ebb9deac28663fa4c04ba315ed5d6654d1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/c4ec8dedca961db056ec85cb7ca8c9f7e2e92252",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/dc537a72f64890d883d24ae4ac58733fc5bc523d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.109",
"matchCriteriaId": "EFD3BACD-EA1D-4437-A135-A3E7A761F54F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.50",
"matchCriteriaId": "A56A0460-B122-44D6-B0E6-26CE9C891536"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.9",
"matchCriteriaId": "F4469C96-A86B-4CC3-B2D5-C21B6B72641B"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0cc7e0ee31e5c44904e98e2229d591e093282a70",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/72f022ebb9deac28663fa4c04ba315ed5d6654d1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c4ec8dedca961db056ec85cb7ca8c9f7e2e92252",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dc537a72f64890d883d24ae4ac58733fc5bc523d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-52869",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-08T21:15:12.523",
"lastModified": "2025-01-08T21:15:12.523",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Certain Teradata account-handling code through 2024-11-04, used with SUSE Enterprise Linux Server, mismanages groups. Specifically, when there is an operating system move from SUSE Enterprise Linux Server (SLES) 12 Service Pack (SP) 2 or 3 to SLES 15 SP2 on Teradata Database systems, some service/system user accounts, and possibly systems administrator created user accounts, are incorrectly assigned to groups that allow higher system-level privileges than intended for those user accounts. Depending on the usage of these accounts, this may lead to full system compromise."
}
],
"metrics": {},
"references": [
{
"url": "https://chrismanson.com/CVE/cve-2024-52869.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.teradata.com/trust-security-center/data-security",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-53199",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-27T14:15:27.623",
"lastModified": "2024-12-27T14:15:27.623",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-08T21:29:46.280",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,89 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: imx-audmix: Agregar comprobaci\u00f3n NULL en imx_audmix_probe. devm_kasprintf() puede devolver un puntero NULL en caso de error, pero este valor devuelto en imx_audmix_probe() no se comprueba. Agregar comprobaci\u00f3n NULL en imx_audmix_probe() para controlar el error de desreferencia de puntero NULL del kernel."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/c040cbe2e13da6454ae4748e04e53d885e1c9603",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/dc5aa71f39b44d8117b2417dafd0e2884a75dd37",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/e038f43edaf0083f6aa7c9415d86cf28dfd152f9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.11",
"matchCriteriaId": "07BE5DA1-4C04-4052-9B58-6EDE15469D65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.12",
"versionEndExcluding": "6.12.2",
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/c040cbe2e13da6454ae4748e04e53d885e1c9603",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dc5aa71f39b44d8117b2417dafd0e2884a75dd37",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e038f43edaf0083f6aa7c9415d86cf28dfd152f9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-53200",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-27T14:15:27.733",
"lastModified": "2024-12-27T14:15:27.733",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-08T21:29:35.877",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,103 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Se corrige la comprobaci\u00f3n nula de pipe_ctx->plane_state en hwss_setup_dpp Esta confirmaci\u00f3n soluciona un problema de desreferencia de puntero nulo en hwss_setup_dpp(). El problema podr\u00eda ocurrir cuando pipe_ctx->plane_state es nulo. La correcci\u00f3n agrega una comprobaci\u00f3n para garantizar que `pipe_ctx->plane_state` no sea nulo antes de acceder. Esto evita una desreferencia de puntero nulo."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/020002c76147ecfdafe95c44abd3240e216b6316",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/0dd3d1de7a5957804ccd58c1b252f9e34710e3f6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/2bc96c95070571c6c824e0d4c7783bee25a37876",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/95792a18da0795300e15075ac05d1915e9066999",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.5",
"versionEndExcluding": "6.6.64",
"matchCriteriaId": "54B7846B-C7F0-4910-8749-C0C31DCDDFD7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.11.11",
"matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.12",
"versionEndExcluding": "6.12.2",
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/020002c76147ecfdafe95c44abd3240e216b6316",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0dd3d1de7a5957804ccd58c1b252f9e34710e3f6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2bc96c95070571c6c824e0d4c7783bee25a37876",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/95792a18da0795300e15075ac05d1915e9066999",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-53201",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-27T14:15:27.853",
"lastModified": "2024-12-27T14:15:27.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-08T21:26:58.670",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,96 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Fix null check for pipe_ctx->plane_state in dcn20_program_pipe Esta confirmaci\u00f3n soluciona un problema de desreferencia de puntero nulo en dcn20_program_pipe(). Anteriormente, el commit 8e4ed3cf1642 (\"drm/amd/display: Add null check for pipe_ctx->plane_state in dcn20_program_pipe\") solucion\u00f3 parcialmente el problema de desreferencia de puntero nulo. Sin embargo, en dcn20_update_dchubp_dpp(), se pasa la variable pipe_ctx y se accede nuevamente a plane_state a trav\u00e9s de pipe_ctx. Varias declaraciones if llaman directamente a los atributos de plane_state, lo que lleva a posibles problemas de desreferencia de puntero nulo. Este parche agrega las comprobaciones nulas necesarias para garantizar la estabilidad."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/3609259326171cd5b98462636580fb2ae5c87d40",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/6a057072ddd127255350357dd880903e8fa23f36",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/6b4ee2560d4d8de2688da68cd9581177035e0876",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6.64",
"versionEndExcluding": "6.7",
"matchCriteriaId": "95DA1B24-4D45-41EF-9380-1829D4B8B3E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11.3",
"versionEndExcluding": "6.11.11",
"matchCriteriaId": "C2F1D9BC-CB2F-488F-90F8-8456CD3C44CB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.12",
"versionEndExcluding": "6.12.2",
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/3609259326171cd5b98462636580fb2ae5c87d40",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6a057072ddd127255350357dd880903e8fa23f36",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6b4ee2560d4d8de2688da68cd9581177035e0876",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-53207",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-27T14:15:28.563",
"lastModified": "2024-12-27T14:15:28.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-08T21:26:42.470",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,117 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: MGMT: Corrige posibles bloqueos Esto corrige posibles bloqueos como el siguiente causado por hci_cmd_sync_dequeue, lo que hace que se ejecute la funci\u00f3n de destrucci\u00f3n: INFO: la tarea kworker/u19:0:143 se bloque\u00f3 durante m\u00e1s de 120 segundos. Tainted: GWO 6.8.0-2024-03-19-intel-next-iLS-24ww14 #1 \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" deshabilita este mensaje. tarea:kworker/u19:0 estado:D pila:0 pid:143 tgid:143 ppid:2 indicadores:0x00004000 Cola de trabajo: hci0 hci_cmd_sync_work [bluetooth] Rastreo de llamadas: __schedule+0x374/0xaf0 schedule+0x3c/0xf0 schedule_preempt_disabled+0x1c/0x30 __mutex_lock.constprop.0+0x3ef/0x7a0 __mutex_lock_slowpath+0x13/0x20 mutex_lock+0x3c/0x50 mgmt_set_connectable_complete+0xa4/0x150 [bluetooth] ? kfree+0x211/0x2a0 hci_cmd_sync_dequeue+0xae/0x130 [bluetooth] ? __pfx_cmd_complete_rsp+0x10/0x10 [bluetooth] cmd_complete_rsp+0x26/0x80 [bluetooth] mgmt_pending_foreach+0x4d/0x70 [bluetooth] __mgmt_power_off+0x8d/0x180 [bluetooth] ? __pfx_worker_thread+0x10/0x10 kthread+0x107/0x140 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x3d/0x60 ? __pfx_kthread+0x10/0x10 ret_de_fork_asm+0x1b/0x30 "
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/5703fb1d85f653e35b327b14de4db7da239e4fd9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/6a25ce9b4af6dc26ee2b9c32d6bd37620bf9739e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/a66dfaf18fd61bb75ef8cee83db46b2aadf153d0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/c3f594a3473d6429a0bcf2004cb2885368741b79",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cac34e44281f1f1bd842adbbcfe3ef9ff0905111",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6.55",
"versionEndExcluding": "6.6.64",
"matchCriteriaId": "C813C628-8D83-4585-9CCE-3DE13EBB4454"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.10.14",
"versionEndExcluding": "6.11",
"matchCriteriaId": "41AB04F0-1096-4B39-8148-796AB65AA193"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11.3",
"versionEndExcluding": "6.11.11",
"matchCriteriaId": "C2F1D9BC-CB2F-488F-90F8-8456CD3C44CB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.12",
"versionEndExcluding": "6.12.2",
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/5703fb1d85f653e35b327b14de4db7da239e4fd9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6a25ce9b4af6dc26ee2b9c32d6bd37620bf9739e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a66dfaf18fd61bb75ef8cee83db46b2aadf153d0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c3f594a3473d6429a0bcf2004cb2885368741b79",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cac34e44281f1f1bd842adbbcfe3ef9ff0905111",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-53222",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-27T14:15:30.327",
"lastModified": "2024-12-27T14:15:30.327",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-08T21:25:39.027",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,75 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: zram: arregla el puntero NULL en comp_algorithm_show() LTP inform\u00f3 una desreferencia de puntero NULL de la siguiente manera: CPU: 7 UID: 0 PID: 5995 Comm: cat Kdump: cargado No contaminado 6.12.0-rc6+ #3 Nombre del hardware: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 pstate: 40400005 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : __pi_strcmp+0x24/0x140 lr : zcomp_available_show+0x60/0x100 [zram] sp : ffff800088b93b90 x29: ffff800088b93b90 x28: 0000000000000001 x27: 0000000000400cc0 x26: 0000000000000ffe x25: ffff80007b3e2388 x24: 00000000000000000 x23: ffff80007b3e2390 x22: ffff0004041a9000 x21: ffff80007b3e2900 x20: 0000000000000000 x19: 00000000000000000 x18: 0000000000000000 x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000 x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000000000 x10: ffff80007b3e2900 x9: ffff80007b3cb280 x8: 0101010101010101 x7: 0000000000000000 x6: 0000000000000000 x5: 0000000000000040 x4 : 0000000000000000 x3 : 00656c722d6f7a6c x2 : 000000000000000 x1 : ffff80007b3e2900 x0 : 0000000000000000 Rastreo de llamadas: __pi_strcmp+0x24/0x140 comp_algorithm_show+0x40/0x70 [zram] dev_attr_show+0x28/0x80 sysfs_kf_seq_show+0x90/0x140 kernfs_seq_show+0x34/0x48 seq_read_iter+0x1d4/0x4e8 El zram->comp_algs[ZRAM_PRIMARY_COMP] puede ser NULL en zram_add() si No se ha llamado a comp_algorithm_set(). El usuario puede acceder al dispositivo zram mediante sysfs despu\u00e9s de device_add_disk(), por lo que hay una ventana de tiempo para activar la desreferencia del puntero NULL. Mu\u00e9valo hacia delante en device_add_disk() para asegurarse de que cuando el usuario pueda acceder al dispositivo zram, est\u00e9 listo. comp_algorithm_set() est\u00e1 protegido por zram->init_lock en otros lugares y no existe ese problema."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/843d366ff19708668d95cda16bb8aba109a93dba",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/f364cdeb38938f9d03061682b8ff3779dd1730e5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.12.2",
"matchCriteriaId": "F21702AB-90B0-49AB-83E6-29B799AF41C7"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/843d366ff19708668d95cda16bb8aba109a93dba",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f364cdeb38938f9d03061682b8ff3779dd1730e5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2024-53995",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-08T21:15:12.703",
"lastModified": "2025-01-08T21:15:12.703",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SickChill is an automatic video library manager for TV shows. A user-controlled `login` endpoint's `next_` parameter takes arbitrary content. Prior to commit c7128a8946c3701df95c285810eb75b2de18bf82, an authenticated attacker may use this to redirect the user to arbitrary destinations, leading to open redirect. Commit c7128a8946c3701df95c285810eb75b2de18bf82 changes the login page to redirect to `settings.DEFAULT_PAGE` instead of to the `next` parameter."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 1.9,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "LOW",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://github.com/SickChill/sickchill/blob/846adafdfab579281353ea08a27bbb813f9a9872/sickchill/views/authentication.py#L33",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/SickChill/sickchill/commit/c7128a8946c3701df95c285810eb75b2de18bf82",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/SickChill/sickchill/pull/8811",
"source": "security-advisories@github.com"
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2024-283_GHSL-2024-291_sickchill_sickchill/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-54010",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2025-01-08T21:15:12.900",
"lastModified": "2025-01-08T21:15:12.900",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the firewall component of HPE Aruba Networking CX 10000 Series Switches exists. It could allow an unauthenticated adjacent attacker to conduct a packet forwarding attack against the ICMP and UDP protocol. For this attack to be successful an attacker requires a switch configuration that allows packets routing (at layer 3). Configurations that do not allow network traffic routing are not impacted. Successful exploitation could allow an attacker to bypass security policies, potentially leading to unauthorized data exposure."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N",
"baseScore": 3.4,
"baseSeverity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04772.txt",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-56541",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-27T14:15:33.767",
"lastModified": "2024-12-27T14:15:33.767",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-08T21:25:24.730",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,89 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: ath12k: arreglo de use-after-free en ath12k_dp_cc_cleanup() Durante la eliminaci\u00f3n del m\u00f3dulo ath12k, en ath12k_core_deinit(), ath12k_mac_destroy() anula el registro de ah->hw de mac80211 y libera el ah->hw as\u00ed como todos los ar en \u00e9l. Despu\u00e9s de esto, ath12k_core_soc_destroy()-> ath12k_dp_free()-> ath12k_dp_cc_cleanup() intenta acceder a uno de los ar liberados del skb pendiente. Esto se debe a que durante la destrucci\u00f3n de mac, el controlador no pudo limpiar algunos paquetes de datos, a los que se accedi\u00f3 m\u00e1s tarde en ath12k_dp_cc_cleanup() y se liberaron, pero el uso de ar del paquete provoc\u00f3 este use-after-free. ERROR: KASAN: use-after-free en ath12k_dp_cc_cleanup.part.0+0x5e2/0xd40 [ath12k] Escritura de tama\u00f1o 4 en la direcci\u00f3n ffff888150bd3514 por la tarea modprobe/8926 CPU: 0 UID: 0 PID: 8926 Comm: modprobe No contaminado 6.11.0-rc2-wt-ath+ #1746 Nombre del hardware: Intel(R) Client Systems NUC8i7HVK/NUC8i7HVB, BIOS HNKBLi70.86A.0067.2021.0528.1339 28/05/2021 Seguimiento de llamadas: dump_stack_lvl+0x7d/0xe0 direcci\u00f3n_de_impresi\u00f3n_descripci\u00f3n.constprop.0+0x33/0x3a0 informe_de_impresi\u00f3n+0xb5/0x260 ? direcci\u00f3n_kasan_a_losa+0x24/0x80 informe_kasan+0xd8/0x110 ? ath12k_dp_cc_cleanup.part.0+0x5e2/0xd40 [ath12k] ? ath12k_dp_cc_cleanup.part.0+0x5e2/0xd40 [ath12k] rango de comprobaci\u00f3n de kasan+0xf3/0x1a0 __comprobaci\u00f3n de escritura de kasan+0x14/0x20 ath12k_dp_cc_cleanup.part.0+0x5e2/0xd40 [ath12k] dp_free+0x178/0x420 [ath12k] n\u00facleo_detenci\u00f3n+0x176/0x200 [ath12k] n\u00facleo_deinit+0x13f/0x210 [ath12k] eliminaci\u00f3n de pci+0xad/0x1c0 [ath12k] eliminaci\u00f3n de dispositivo pci+0x9b/0x1b0 dispositivo_eliminar+0xbf/0x150 dispositivo_liberaci\u00f3n_controlador_interno+0x3c3/0x580 ? __kasan_check_read+0x11/0x20 controlador_desconectar+0xc4/0x190 bus_eliminar_controlador+0x130/0x2a0 controlador_anular_registro+0x68/0x90 pci_anular_registro_controlador+0x24/0x240 ? buscar_m\u00f3dulo_todos+0x13e/0x1e0 ath12k_pci_exit+0x10/0x20 [ath12k] __do_sys_eliminar_m\u00f3dulo+0x32c/0x580 ? m\u00f3dulo_indicadores+0x2f0/0x2f0 ? kmem_cache_libre+0xf0/0x410 ? __fput+0x56f/0xab0 ? __fput+0x56f/0xab0 ? debug_smp_processor_id+0x17/0x20 __x64_sys_delete_module+0x4f/0x70 x64_sys_call+0x522/0x9f0 do_syscall_64+0x64/0x130 entry_SYSCALL_64_after_hwframe+0x4b/0x53 RIP: 0033:0x7f8182c6ac8b Commit 24de1b7b231c (\"wifi: ath12k: corregir falla de vaciado en escenarios de recuperaci\u00f3n\") agreg\u00f3 el cambio para disminuir el conteo de paquetes pendientes en caso de recuperaci\u00f3n, lo que tiene sentido ya que ah->hw y todos los ar en \u00e9l est\u00e1n intactos durante la recuperaci\u00f3n, pero durante la desincializaci\u00f3n del n\u00facleo no tiene sentido disminuir el conteo de paquetes o despertar el waitq vac\u00edo ya que el m\u00f3dulo tambi\u00e9n se eliminar\u00e1. Los paquetes de skb pendientes no se pueden usar y los paquetes deber\u00edan simplemente liberarse. Para solucionar esto, evite acceder a ar desde skb->cb cuando se est\u00e1 anulando el registro del controlador. Probado en: QCN9274 hw2.0 PCI WLAN.WBE.1.1.1-00214-QCAHKSWPL_SILICONZ-1 Probado en: WCN7850 hw2.0 PCI WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/35be5018a2a4d1b07bdfcf957c81121d22d16355",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/bdb281103373fd80eb5c91cede1e115ba270b4e9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/e5e15c8b42923bfb6c84d3d906a9965d9a0f111d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.10",
"versionEndExcluding": "6.11.11",
"matchCriteriaId": "158A6B22-9260-41D7-965A-A81798A5A969"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.12",
"versionEndExcluding": "6.12.2",
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/35be5018a2a4d1b07bdfcf957c81121d22d16355",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bdb281103373fd80eb5c91cede1e115ba270b4e9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e5e15c8b42923bfb6c84d3d906a9965d9a0f111d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-56588",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-27T15:15:18.040",
"lastModified": "2024-12-27T15:15:18.040",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-08T21:48:24.173",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,74 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: hisi_sas: Crear todos los archivos de volcado durante la inicializaci\u00f3n de debugfs Para el debugfs actual de hisi_sas, despu\u00e9s de que el usuario active el volcado, el controlador asigna espacio de memoria para guardar la informaci\u00f3n de registro y crear archivos de debugfs para mostrar la informaci\u00f3n guardada. En este proceso, los archivos de debugfs creados despu\u00e9s de cada volcado. Por lo tanto, cuando se activa el volcado mientras el controlador est\u00e1 desvinculado, se produce el siguiente bloqueo: [67840.853907] No se puede gestionar la desreferencia del puntero NULL del n\u00facleo en la direcci\u00f3n virtual 00000000000000a0 [67840.862947] Informaci\u00f3n de interrupci\u00f3n de memoria: [67840.865855] ESR = 0x0000000096000004 [67840.869713] EC = 0x25: DABT (EL actual), IL = 32 bits [67840.875125] SET = 0, FnV = 0 [67840.878291] EA = 0, S1PTW = 0 [67840.881545] FSC = 0x04: error de traducci\u00f3n de nivel 0 [67840.886528] Informaci\u00f3n de cancelaci\u00f3n de datos: [67840.889524] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 [67840.895117] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [67840.900284] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [67840.905709] pgtable de usuario: p\u00e1ginas de 4k, VA de 48 bits, pgdp=0000002803a1f000 [67840.912263] [00000000000000a0] pgd=0000000000000000, p4d=0000000000000000 [67840.919177] Error interno: Oops: 0000000096000004 [#1] PREEMPT SMP [67840.996435] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [67841.003628] pc : down_write+0x30/0x98 [67841.007546] lr : start_creating.part.0+0x60/0x198 [67841.012495] sp : ffff8000b979ba20 [67841.016046] x29: ffff8000b979ba20 x28: 0000000000000010 x27: 0000000000024b40 [67841.023412] x26: 0000000000000012 x25: ffff20202b355ae8 x24: ffff20202b35a8c8 [67841.030779] x23: ffffa36877928208 x22: ffffa368b4972240 x21: ffff8000b979bb18 [67841.038147] x20: ffff00281dc1e3c0 x19: ffffffffffffffffe x18: 0000000000000020 [67841.045515] x17: 00000000000000000 x16: ffffa368b128a530 x15: ffffffffffffffff [67841.052888] x14: ffff8000b979bc18 x13: ffffffffffffffff x12: ffff8000b979bb18 [67841.060263] x11: 000000000000000 x10: 0000000000000000 x9: ffffa368b1289b18 [67841.067640] x8 : 0000000000000012 x7 : 0000000000000000 x6 : 00000000000003a9 [67841.075014] x5 : 0000000000000000 x4 : ffff002818c5cb00 x3 : 0000000000000001 [67841.082388] x2 : 000000000000000 x1 : ffff002818c5cb00 x0 : 00000000000000a0 [67841.089759] Seguimiento de llamadas: [67841.092456] escritura_inactiva+0x30/0x98 [67841.096017] creaci\u00f3n_iniciativa.parte.0+0x60/0x198 [67841.100613] creaci\u00f3n_directorio_debugfs+0x48/0x1f8 [67841.104950] creaci\u00f3n_archivos_debugfs_v3_hw+0x88/0x348 [hisi_sas_v3_hw] [67841.111447] registros_instant\u00e1neos_debugfs_v3_hw+0x708/0x798 [hisi_sas_v3_hw] [67841.118111] escritura_activadora_debugfs_v3_hw+0x9c/0x120 [hisi_sas_v3_hw] [67841.125115] escritura de proxy completo+0x68/0xc8 [67841.129175] escritura de vfs+0xd8/0x3f0 [67841.132708] escritura de ksys+0x70/0x108 [67841.136317] escritura de __arm64_sys+0x24/0x38 [67841.140440] llamada al sistema invocada+0x50/0x128 [67841.144385] el0_svc_common.constprop.0+0xc8/0xf0 [67841.149273] do_el0_svc+0x24/0x38 [67841.152773] el0_svc+0x38/0xd8 [67841.156009] el0t_64_sync_handler+0xc0/0xc8 [67841.160361] el0t_64_sync+0x1a4/0x1a8 [67841.164189] C\u00f3digo: b9000882 d2800002 d2800023 f9800011 (c85ffc05) [67841.170443] ---[ fin del seguimiento 000000000000000 ]--- Para solucionar este problema, cree todos los directorios y archivos durante la inicializaci\u00f3n de debugfs. De esta manera, el controlador solo necesita asignar espacio de memoria para guardar la informaci\u00f3n cada vez que el usuario activa el volcado."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/6c55f99123075e5429850b41b06f7dfffcb708eb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/9f564f15f88490b484e02442dc4c4b11640ea172",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.5",
"matchCriteriaId": "75E05E0A-C898-433A-8E50-6D9EC8646A64"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/6c55f99123075e5429850b41b06f7dfffcb708eb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9f564f15f88490b484e02442dc4c4b11640ea172",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-56599",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-27T15:15:19.307",
"lastModified": "2024-12-27T15:15:19.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-08T21:48:04.090",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,74 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: ath10k: evitar error de puntero NULL durante la eliminaci\u00f3n de sdio Al ejecutar 'rmmod ath10k', ath10k_sdio_remove() liberar\u00e1 la cola de trabajo de sdio mediante destroy_workqueue(). Pero si CONFIG_INIT_ON_FREE_DEFAULT_ON est\u00e1 configurado en s\u00ed, se producir\u00e1 un p\u00e1nico del kernel: Rastreo de llamada: destroy_workqueue+0x1c/0x258 ath10k_sdio_remove+0x84/0x94 sdio_bus_remove+0x50/0x16c device_release_driver_internal+0x188/0x25c device_driver_detach+0x20/0x2c Esto se debe a que durante 'rmmod ath10k', ath10k_sdio_remove() llamar\u00e1 a ath10k_core_destroy() antes de destroy_workqueue(). wiphy_dev_release() finalmente se llamar\u00e1 en ath10k_core_destroy(). Esta funci\u00f3n liberar\u00e1 la estructura cfg80211_registered_device *rdev y todos sus miembros, incluidos wiphy, dev y el puntero de sdio workqueue. Luego, el puntero de sdio workqueue se establecer\u00e1 en NULL debido a CONFIG_INIT_ON_FREE_DEFAULT_ON. Despu\u00e9s de liberar el dispositivo, destroy_workqueue() usar\u00e1 el puntero NULL y luego se producir\u00e1 el p\u00e1nico del kernel. Rastreo de llamadas: ath10k_sdio_remove ->ath10k_core_unregister \u2026\u2026 ->ath10k_core_stop ->ath10k_hif_stop ->ath10k_sdio_irq_disable ->ath10k_hif_power_down ->del_timer_sync(&ar_sdio->sleep_timer) ->ath10k_core_destroy ->ath10k_mac_destroy ->ieee80211_free_hw ->wiphy_free \u2026\u2026 ->wiphy_dev_release ->destroy_workqueue Es necesario llamar a destroy_workqueue() antes de ath10k_core_destroy(), primero liberar el b\u00fafer de la cola de trabajo y luego liberar el puntero de la cola de trabajo mediante ath10k_core_destroy(). Este orden coincide con el orden de la ruta de error en ath10k_sdio_probe(). No se pondr\u00e1 en cola ning\u00fan trabajo en la cola de trabajo de sdio entre su destrucci\u00f3n y la llamada a ath10k_core_destroy(). Seg\u00fan la pila de llamadas anterior, el motivo es el siguiente: solo ath10k_sdio_sleep_timer_handler(), ath10k_sdio_hif_tx_sg() y ath10k_sdio_irq_disable() pondr\u00e1n en cola el trabajo en la cola de trabajo de sdio. El temporizador de suspensi\u00f3n se eliminar\u00e1 antes de ath10k_core_destroy() en ath10k_hif_power_down(). ath10k_sdio_irq_disable() solo se llamar\u00e1 en ath10k_hif_stop(). ath10k_core_unregister() llamar\u00e1 a ath10k_hif_power_down() para detener el bus hif, por lo que ya no se llamar\u00e1 ath10k_sdio_hif_tx_sg(). Probado en: QCA6174 hw3.2 SDIO WLAN.RMH.4.4.1-00189"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/543c0924d446b21f35701ca084d7feca09511220",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/95c38953cb1ecf40399a676a1f85dfe2b5780a9a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.12.5",
"matchCriteriaId": "75E05E0A-C898-433A-8E50-6D9EC8646A64"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/543c0924d446b21f35701ca084d7feca09511220",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/95c38953cb1ecf40399a676a1f85dfe2b5780a9a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-56606",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-27T15:15:20.087",
"lastModified": "2024-12-27T15:15:20.087",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-08T21:46:59.767",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,144 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: af_packet: evitar errores despu\u00e9s de sock_init_data() en packet_create() Despu\u00e9s de sock_init_data(), el objeto sk asignado se adjunta al objeto sock proporcionado. En caso de error, packet_create() libera el objeto sk dejando el puntero colgando en el objeto sock al regresar. Es posible que alg\u00fan otro c\u00f3digo intente usar este puntero y provoque un error de use-after-free."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/132e615bb1d7cdec2d3cfbdec2efa630e923fd21",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/157f08db94123e2ba56877dd0ac88908b13a5dd0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/1dc1e1db927056cb323296e2294a855cd003dfe7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/46f2a11cb82b657fd15bab1c47821b635e03838b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/71b22837a5e55ac27d6a14b9cdf2326587405c4f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a6cf750b737374454a4e03a5ed449a3eb0c96414",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fd09880b16d33aa5a7420578e01cd79148fa9829",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.287",
"matchCriteriaId": "DC7D5C80-B677-4131-A399-3366D7F3961C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.231",
"matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.174",
"matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.120",
"matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.66",
"matchCriteriaId": "29A976AD-B9AB-4A95-9F08-7669F8847EB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.5",
"matchCriteriaId": "9501D045-7A94-42CA-8B03-821BE94A65B7"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/132e615bb1d7cdec2d3cfbdec2efa630e923fd21",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/157f08db94123e2ba56877dd0ac88908b13a5dd0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1dc1e1db927056cb323296e2294a855cd003dfe7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/46f2a11cb82b657fd15bab1c47821b635e03838b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/71b22837a5e55ac27d6a14b9cdf2326587405c4f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a6cf750b737374454a4e03a5ed449a3eb0c96414",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fd09880b16d33aa5a7420578e01cd79148fa9829",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-56623",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-27T15:15:21.823",
"lastModified": "2024-12-27T15:15:21.823",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-08T21:41:01.397",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,135 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: qla2xxx: Se corrige el use-after-free en la descarga Se observa un fallo del sistema con una advertencia de seguimiento de la pila de use-after-free. Hay 2 se\u00f1ales para indicar a dpc_thread que finalice (indicador UNLOADING y kthread_stop). Al establecer el indicador UNLOADING cuando dpc_thread se est\u00e1 ejecutando en ese momento y ve el indicador, esto hace que dpc_thread salga y se limpie a s\u00ed mismo. Cuando se llama a kthread_stop para la desinfecci\u00f3n final, esto provoca el use-after-free. Eliminar la se\u00f1al UNLOADING para finalizar dpc_thread. Usar kthread_stop como la se\u00f1al principal para salir de dpc_thread. [596663.812935] \u00a1ERROR del kernel en mm/slub.c:294! [596663.812950] C\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] SMP PTI [596663.812957] CPU: 13 PID: 1475935 Comm: rmmod Kdump: cargado Contaminado: G IOE --------- - - 4.18.0-240.el8.x86_64 #1 [596663.812960] Nombre del hardware: HP ProLiant DL380p Gen8, BIOS P70 20/08/2012 [596663.812974] RIP: 0010:__slab_free+0x17d/0x360 ... [596663.813008] Seguimiento de llamadas: [596663.813022] ? esperar_a_finalizaci\u00f3n+0x35/0x190 [596663.813048] ? intentar_activar+0x63/0x540 [596663.813055] tarea_libre+0x5a/0x60 [596663.813061] kthread_stop+0xf3/0x100 [596663.813103] qla2x00_eliminar_uno+0x284/0x440 [qla2xxx]"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/07c903db0a2ff84b68efa1a74a4de353ea591eb0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/12f04fc8580eafb0510f805749553eb6213f323e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/15369e774f27ec790f207de87c0b541e3f90b22d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/6abf16d3c915b2feb68c1c8b25fcb71b13f98478",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b3e6f25176f248762a24d25ab8cf8c5e90874f80",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ca36d9d53745d5ec8946ef85006d4da605ea7c54",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.10.231",
"matchCriteriaId": "2334FDBC-71D6-4D4A-AD2C-CF092C82C68A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.174",
"matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.120",
"matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.66",
"matchCriteriaId": "29A976AD-B9AB-4A95-9F08-7669F8847EB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.5",
"matchCriteriaId": "9501D045-7A94-42CA-8B03-821BE94A65B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/07c903db0a2ff84b68efa1a74a4de353ea591eb0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/12f04fc8580eafb0510f805749553eb6213f323e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/15369e774f27ec790f207de87c0b541e3f90b22d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6abf16d3c915b2feb68c1c8b25fcb71b13f98478",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b3e6f25176f248762a24d25ab8cf8c5e90874f80",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ca36d9d53745d5ec8946ef85006d4da605ea7c54",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-56631",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-27T15:15:22.690",
"lastModified": "2024-12-27T15:15:22.690",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-08T21:37:59.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,94 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvme-tcp: corrige la fuga de memoria cuando falla la creaci\u00f3n de un nuevo control Ahora, aunque falla la creaci\u00f3n de un nuevo control, no hemos liberado el conjunto de etiquetas ocupado por admin_q, aqu\u00ed intentamos solucionarlo."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/1f5e2f1ca5875728fcf62bc1a054707444ab4960",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/59b30afa578637169e2819536bb66459fdddc39d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/f10593ad9bc36921f623361c9e3dd96bd52d85ee",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.16.85",
"versionEndExcluding": "6.6.66",
"matchCriteriaId": "01F1098C-DC37-41C5-B4D0-1D3B0B04ED49"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.5",
"matchCriteriaId": "9501D045-7A94-42CA-8B03-821BE94A65B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1f5e2f1ca5875728fcf62bc1a054707444ab4960",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/59b30afa578637169e2819536bb66459fdddc39d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f10593ad9bc36921f623361c9e3dd96bd52d85ee",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-56642",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-27T15:15:23.930",
"lastModified": "2024-12-27T15:15:23.930",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-08T21:37:23.950",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,150 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tipc: Se corrige el use-after-free del socket del kernel en cleanup_bearer(). syzkaller inform\u00f3 un use-after-free del socket del kernel UDP en cleanup_bearer() sin reproducci\u00f3n. [0][1] Cuando bearer_disable() llama a tipc_udp_disable(), la desinfecci\u00f3n del socket del kernel UDP se pospone mediante el trabajo que llama a cleanup_bearer(). tipc_net_stop() espera a que finalicen dichos trabajos comprobando tipc_net(net)->wq_count. Sin embargo, el trabajo disminuye el recuento demasiado pronto antes de liberar el socket del kernel, desbloqueando cleanup_net() y dando como resultado un use-after-free. Muevamos la disminuci\u00f3n despu\u00e9s de liberar el socket en cleanup_bearer(). [0]: ref_tracker: net notrefcnt@000000009b3d1faf tiene 1/1 usuarios en sk_alloc+0x438/0x608 inet_create+0x4c8/0xcb0 __sock_create+0x350/0x6b8 sock_create_kern+0x58/0x78 udp_sock_create4+0x68/0x398 udp_sock_create+0x88/0xc8 tipc_udp_enable+0x5e8/0x848 __tipc_nl_bearer_enable+0x84c/0xed8 tipc_nl_bearer_enable+0x38/0x60 genl_family_rcv_msg_doit+0x170/0x248 genl_rcv_msg+0x400/0x5b0 netlink_rcv_skb+0x1dc/0x398 genl_rcv+0x44/0x68 netlink_unicast+0x678/0x8b0 netlink_sendmsg+0x5e4/0x898 ____sys_sendmsg+0x500/0x830 [1]: ERROR: KMSAN: use-after-free en udp_hashslot include/net/udp.h:85 [en l\u00ednea] ERROR: KMSAN: use-after-free en udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979 udp_hashslot include/net/udp.h:85 [en l\u00ednea] udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979 sk_common_release+0xaf/0x3f0 net/core/sock.c:3820 inet_release+0x1e0/0x260 net/ipv4/af_inet.c:437 inet6_release+0x6f/0xd0 net/ipv6/af_inet6.c:489 __sock_release net/socket.c:658 [en l\u00ednea] sock_release+0xa0/0x210 net/socket.c:686 cleanup_bearer+0x42d/0x4c0 net/tipc/udp_media.c:819 proceso_one_work kernel/workqueue.c:3229 [en l\u00ednea] proceso_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310 worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391 kthread+0x531/0x6b0 kernel/kthread.c:389 ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244 Uninit se cre\u00f3 en: slab_free_hook mm/slub.c:2269 [en l\u00ednea] slab_free mm/slub.c:4580 [en l\u00ednea] kmem_cache_free+0x207/0xc40 mm/slub.c:4682 net_free net/core/net_namespace.c:454 [en l\u00ednea] cleanup_net+0x16f2/0x19d0 net/core/net_namespace.c:647 process_one_work kernel/workqueue.c:3229 [en l\u00ednea] process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310 worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391 kthread+0x531/0x6b0 kernel/kthread.c:389 ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244 CPU: 0 UID: 0 PID: 54 Comm: kworker/0:2 No contaminado 6.12.0-rc1-00131-gf66ebf37d69c #7 91723d6f74857f70725e1583cba3cf4adc716cfa Nombre del hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 01/04/2014 Cola de trabajo: eventos cleanup_bearer"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/4e69457f9dfae67435f3ccf29008768eae860415",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/650ee9a22d7a2de8999fac2d45983597a0c22359",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/6a2fa13312e51a621f652d522d7e2df7066330b6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/d00d4470bf8c4282617a3a10e76b20a9c7e4cffa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d2a4894f238551eae178904e7f45af87577074fd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d62d5180c036eeac09f80660edc7a602b369125f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e48b211c4c59062cb6dd6c2c37c51a7cc235a464",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2",
"versionEndExcluding": "5.4.287",
"matchCriteriaId": "7446589C-7AB5-4517-9C06-B453135BFA99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.231",
"matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.174",
"matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.120",
"matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.66",
"matchCriteriaId": "29A976AD-B9AB-4A95-9F08-7669F8847EB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.5",
"matchCriteriaId": "9501D045-7A94-42CA-8B03-821BE94A65B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/4e69457f9dfae67435f3ccf29008768eae860415",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/650ee9a22d7a2de8999fac2d45983597a0c22359",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6a2fa13312e51a621f652d522d7e2df7066330b6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d00d4470bf8c4282617a3a10e76b20a9c7e4cffa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d2a4894f238551eae178904e7f45af87577074fd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d62d5180c036eeac09f80660edc7a602b369125f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e48b211c4c59062cb6dd6c2c37c51a7cc235a464",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5828",
"sourceIdentifier": "hirt@hitachi.co.jp",
"published": "2024-08-06T03:15:30.103",
"lastModified": "2024-08-06T16:30:24.547",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-08T21:25:28.967",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,12 +69,65 @@
"value": "CWE-917"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-917"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachi:tuning_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "8.8.7-00",
"matchCriteriaId": "2DA2B94C-AA9C-4915-AA8D-689178EF1723"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91F372EA-3A78-4703-A457-751B2C98D796"
}
]
}
]
}
],
"references": [
{
"url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-140/index.html",
"source": "hirt@hitachi.co.jp"
"source": "hirt@hitachi.co.jp",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6824",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-08-08T06:15:41.067",
"lastModified": "2024-08-08T13:04:18.753",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-08T21:19:51.450",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,24 +49,64 @@
"value": "CWE-862"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:leap13:premium_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.10.39",
"matchCriteriaId": "F23D4A06-F1CA-428D-A1F1-8CB176220120"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/premium-addons-for-elementor/trunk/includes/addons-integration.php#L159",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/premium-addons-for-elementor/trunk/includes/addons-integration.php#L184",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3131564/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b2840b9e-1baf-460c-ba11-43e4279ece27?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7548",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-08-08T06:15:42.170",
"lastModified": "2024-08-08T13:04:18.753",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-08T21:07:57.303",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,32 +69,78 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.2.6.9.4",
"matchCriteriaId": "664705A5-B30F-4087-914F-244A8DAA51B7"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.svn.wordpress.org/learnpress/tags/4.2.6.9.3/inc/curds/class-lp-course-curd.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/learnpress/trunk/inc/curds/class-lp-course-curd.php#L828",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3132002/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3132019/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://wordpress.org/plugins/learnpress/#developers",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/702715a9-b180-4d31-a1df-37b732ae8226?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-22145",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-08T21:15:13.480",
"lastModified": "2025-01-08T21:15:13.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Carbon is an international PHP extension for DateTime. Application passing unsanitized user input to Carbon::setLocale are at risk of arbitrary file include, if the application allows users to upload files with .php extension in an folder that allows include or require to read it, then they are at risk of arbitrary code ran on their servers. This vulnerability is fixed in 3.8.4 and 2.72.6."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-98"
}
]
}
],
"references": [
{
"url": "https://github.com/CarbonPHP/carbon/security/advisories/GHSA-j3f9-p6hm-5w6q",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/briannesbitt/Carbon/commit/129700ed449b1f02d70272d2ac802357c8c30c58",
"source": "security-advisories@github.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-08T21:00:19.924394+00:00
2025-01-08T23:00:19.694682+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-08T20:58:28.473000+00:00
2025-01-08T22:15:28.060000+00:00
```
### Last Data Feed Release
@ -33,58 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
276333
276339
```
### CVEs added in the last Commit
Recently added CVEs: `14`
Recently added CVEs: `6`
- [CVE-2024-13188](CVE-2024/CVE-2024-131xx/CVE-2024-13188.json) (`2025-01-08T19:15:30.840`)
- [CVE-2024-13189](CVE-2024/CVE-2024-131xx/CVE-2024-13189.json) (`2025-01-08T20:15:27.353`)
- [CVE-2024-45342](CVE-2024/CVE-2024-453xx/CVE-2024-45342.json) (`2025-01-08T20:15:27.583`)
- [CVE-2024-45343](CVE-2024/CVE-2024-453xx/CVE-2024-45343.json) (`2025-01-08T20:15:27.690`)
- [CVE-2024-45344](CVE-2024/CVE-2024-453xx/CVE-2024-45344.json) (`2025-01-08T20:15:27.753`)
- [CVE-2024-45345](CVE-2024/CVE-2024-453xx/CVE-2024-45345.json) (`2025-01-08T20:15:27.843`)
- [CVE-2024-53526](CVE-2024/CVE-2024-535xx/CVE-2024-53526.json) (`2025-01-08T19:15:37.753`)
- [CVE-2024-54818](CVE-2024/CVE-2024-548xx/CVE-2024-54818.json) (`2025-01-08T19:15:38.290`)
- [CVE-2025-0194](CVE-2025/CVE-2025-01xx/CVE-2025-0194.json) (`2025-01-08T20:15:29.193`)
- [CVE-2025-0291](CVE-2025/CVE-2025-02xx/CVE-2025-0291.json) (`2025-01-08T19:15:38.420`)
- [CVE-2025-22139](CVE-2025/CVE-2025-221xx/CVE-2025-22139.json) (`2025-01-08T19:15:38.717`)
- [CVE-2025-22140](CVE-2025/CVE-2025-221xx/CVE-2025-22140.json) (`2025-01-08T19:15:38.863`)
- [CVE-2025-22141](CVE-2025/CVE-2025-221xx/CVE-2025-22141.json) (`2025-01-08T19:15:39.017`)
- [CVE-2025-22143](CVE-2025/CVE-2025-221xx/CVE-2025-22143.json) (`2025-01-08T20:15:30.003`)
- [CVE-2024-12431](CVE-2024/CVE-2024-124xx/CVE-2024-12431.json) (`2025-01-08T21:15:11.760`)
- [CVE-2024-13190](CVE-2024/CVE-2024-131xx/CVE-2024-13190.json) (`2025-01-08T21:15:12.303`)
- [CVE-2024-52869](CVE-2024/CVE-2024-528xx/CVE-2024-52869.json) (`2025-01-08T21:15:12.523`)
- [CVE-2024-53995](CVE-2024/CVE-2024-539xx/CVE-2024-53995.json) (`2025-01-08T21:15:12.703`)
- [CVE-2024-54010](CVE-2024/CVE-2024-540xx/CVE-2024-54010.json) (`2025-01-08T21:15:12.900`)
- [CVE-2025-22145](CVE-2025/CVE-2025-221xx/CVE-2025-22145.json) (`2025-01-08T21:15:13.480`)
### CVEs modified in the last Commit
Recently modified CVEs: `54`
Recently modified CVEs: `41`
- [CVE-2024-30056](CVE-2024/CVE-2024-300xx/CVE-2024-30056.json) (`2025-01-08T20:20:05.590`)
- [CVE-2024-3018](CVE-2024/CVE-2024-30xx/CVE-2024-3018.json) (`2025-01-08T19:35:58.073`)
- [CVE-2024-31894](CVE-2024/CVE-2024-318xx/CVE-2024-31894.json) (`2025-01-08T19:58:17.603`)
- [CVE-2024-31895](CVE-2024/CVE-2024-318xx/CVE-2024-31895.json) (`2025-01-08T20:03:38.133`)
- [CVE-2024-3333](CVE-2024/CVE-2024-33xx/CVE-2024-3333.json) (`2025-01-08T19:43:24.987`)
- [CVE-2024-38163](CVE-2024/CVE-2024-381xx/CVE-2024-38163.json) (`2025-01-08T20:50:00.877`)
- [CVE-2024-38218](CVE-2024/CVE-2024-382xx/CVE-2024-38218.json) (`2025-01-08T20:58:28.473`)
- [CVE-2024-40427](CVE-2024/CVE-2024-404xx/CVE-2024-40427.json) (`2025-01-08T19:15:31.043`)
- [CVE-2024-41713](CVE-2024/CVE-2024-417xx/CVE-2024-41713.json) (`2025-01-08T20:31:25.237`)
- [CVE-2024-42426](CVE-2024/CVE-2024-424xx/CVE-2024-42426.json) (`2025-01-08T20:06:04.867`)
- [CVE-2024-4378](CVE-2024/CVE-2024-43xx/CVE-2024-4378.json) (`2025-01-08T20:07:57.800`)
- [CVE-2024-4563](CVE-2024/CVE-2024-45xx/CVE-2024-4563.json) (`2025-01-08T19:51:35.093`)
- [CVE-2024-46601](CVE-2024/CVE-2024-466xx/CVE-2024-46601.json) (`2025-01-08T20:15:27.920`)
- [CVE-2024-4971](CVE-2024/CVE-2024-49xx/CVE-2024-4971.json) (`2025-01-08T19:28:26.847`)
- [CVE-2024-51442](CVE-2024/CVE-2024-514xx/CVE-2024-51442.json) (`2025-01-08T20:15:28.137`)
- [CVE-2024-53564](CVE-2024/CVE-2024-535xx/CVE-2024-53564.json) (`2025-01-08T19:15:38.050`)
- [CVE-2024-55008](CVE-2024/CVE-2024-550xx/CVE-2024-55008.json) (`2025-01-08T20:15:28.467`)
- [CVE-2024-55411](CVE-2024/CVE-2024-554xx/CVE-2024-55411.json) (`2025-01-08T20:15:28.640`)
- [CVE-2024-55517](CVE-2024/CVE-2024-555xx/CVE-2024-55517.json) (`2025-01-08T20:15:28.810`)
- [CVE-2024-55550](CVE-2024/CVE-2024-555xx/CVE-2024-55550.json) (`2025-01-08T20:46:01.203`)
- [CVE-2024-55556](CVE-2024/CVE-2024-555xx/CVE-2024-55556.json) (`2025-01-08T20:15:28.987`)
- [CVE-2024-7063](CVE-2024/CVE-2024-70xx/CVE-2024-7063.json) (`2025-01-08T20:33:37.817`)
- [CVE-2024-7064](CVE-2024/CVE-2024-70xx/CVE-2024-7064.json) (`2025-01-08T20:30:58.207`)
- [CVE-2024-7092](CVE-2024/CVE-2024-70xx/CVE-2024-7092.json) (`2025-01-08T20:53:45.230`)
- [CVE-2025-20126](CVE-2025/CVE-2025-201xx/CVE-2025-20126.json) (`2025-01-08T19:15:38.553`)
- [CVE-2023-34258](CVE-2023/CVE-2023-342xx/CVE-2023-34258.json) (`2025-01-08T22:15:28.060`)
- [CVE-2024-13187](CVE-2024/CVE-2024-131xx/CVE-2024-13187.json) (`2025-01-08T21:15:11.973`)
- [CVE-2024-13189](CVE-2024/CVE-2024-131xx/CVE-2024-13189.json) (`2025-01-08T21:15:12.157`)
- [CVE-2024-3500](CVE-2024/CVE-2024-35xx/CVE-2024-3500.json) (`2025-01-08T21:22:53.997`)
- [CVE-2024-3647](CVE-2024/CVE-2024-36xx/CVE-2024-3647.json) (`2025-01-08T21:10:47.357`)
- [CVE-2024-3675](CVE-2024/CVE-2024-36xx/CVE-2024-3675.json) (`2025-01-08T21:11:01.357`)
- [CVE-2024-3728](CVE-2024/CVE-2024-37xx/CVE-2024-3728.json) (`2025-01-08T21:11:21.157`)
- [CVE-2024-38182](CVE-2024/CVE-2024-381xx/CVE-2024-38182.json) (`2025-01-08T21:35:17.920`)
- [CVE-2024-42107](CVE-2024/CVE-2024-421xx/CVE-2024-42107.json) (`2025-01-08T21:32:03.527`)
- [CVE-2024-46715](CVE-2024/CVE-2024-467xx/CVE-2024-46715.json) (`2025-01-08T21:30:44.227`)
- [CVE-2024-53199](CVE-2024/CVE-2024-531xx/CVE-2024-53199.json) (`2025-01-08T21:29:46.280`)
- [CVE-2024-53200](CVE-2024/CVE-2024-532xx/CVE-2024-53200.json) (`2025-01-08T21:29:35.877`)
- [CVE-2024-53201](CVE-2024/CVE-2024-532xx/CVE-2024-53201.json) (`2025-01-08T21:26:58.670`)
- [CVE-2024-53207](CVE-2024/CVE-2024-532xx/CVE-2024-53207.json) (`2025-01-08T21:26:42.470`)
- [CVE-2024-53222](CVE-2024/CVE-2024-532xx/CVE-2024-53222.json) (`2025-01-08T21:25:39.027`)
- [CVE-2024-56541](CVE-2024/CVE-2024-565xx/CVE-2024-56541.json) (`2025-01-08T21:25:24.730`)
- [CVE-2024-56588](CVE-2024/CVE-2024-565xx/CVE-2024-56588.json) (`2025-01-08T21:48:24.173`)
- [CVE-2024-56599](CVE-2024/CVE-2024-565xx/CVE-2024-56599.json) (`2025-01-08T21:48:04.090`)
- [CVE-2024-56606](CVE-2024/CVE-2024-566xx/CVE-2024-56606.json) (`2025-01-08T21:46:59.767`)
- [CVE-2024-56623](CVE-2024/CVE-2024-566xx/CVE-2024-56623.json) (`2025-01-08T21:41:01.397`)
- [CVE-2024-56631](CVE-2024/CVE-2024-566xx/CVE-2024-56631.json) (`2025-01-08T21:37:59.833`)
- [CVE-2024-56642](CVE-2024/CVE-2024-566xx/CVE-2024-56642.json) (`2025-01-08T21:37:23.950`)
- [CVE-2024-5828](CVE-2024/CVE-2024-58xx/CVE-2024-5828.json) (`2025-01-08T21:25:28.967`)
- [CVE-2024-6824](CVE-2024/CVE-2024-68xx/CVE-2024-6824.json) (`2025-01-08T21:19:51.450`)
- [CVE-2024-7548](CVE-2024/CVE-2024-75xx/CVE-2024-7548.json) (`2025-01-08T21:07:57.303`)
## Download and Usage

View File

@ -152302,7 +152302,7 @@ CVE-2020-19005,0,0,ab897d7bae864ef6f93bc39fbd569a81f3650a4fb53896debfa1acd48d348
CVE-2020-19007,0,0,73c70e4fa5aa84add79bda9f8fd3e38f1444b0421a2d4d2a517a6fb327e33836,2024-11-21T05:08:54.960000
CVE-2020-1901,0,0,e06c9f11493b95621cd15930103d8e83cd066c4f05215b62ee532e25f0cb1c5d,2024-11-21T05:11:34.657000
CVE-2020-1902,0,0,7c311a5c7fe365faf83e939f334f13f2b95322f85a499bcb9fa6e4733bd54120,2024-11-21T05:11:34.770000
CVE-2020-19028,0,1,b68fb95ee99f80bf5d31aab3ef0be833e0974202cc0d507656518c984b78829a,2025-01-08T20:15:23.773000
CVE-2020-19028,0,0,b68fb95ee99f80bf5d31aab3ef0be833e0974202cc0d507656518c984b78829a,2025-01-08T20:15:23.773000
CVE-2020-1903,0,0,c42d640c3f11acc24bdcbe58642d888ec3cb76349f7ba0288dd86c4f3c82bf38,2024-11-21T05:11:34.883000
CVE-2020-19037,0,0,9918c618cf7d872b1eca89f4955ebfb139dfa333cc68f26536dd2a074a25c637,2024-11-21T05:08:55.237000
CVE-2020-19038,0,0,4422b6fc956d725b535653951fb526eb5a39ebd0d7dc779d42bb5afbd24263b0,2024-11-21T05:08:55.377000
@ -212874,7 +212874,7 @@ CVE-2022-48880,0,0,535014dc78a0cf3939da51e6f231a7ecade974f110d4883d643255c8fd017
CVE-2022-48881,0,0,2645da7071fdb14e6913f56300863e68eef81fb1507e67b634c5f31083ac9e96,2024-08-29T02:39:19.137000
CVE-2022-48882,0,0,1c742069183e85b6b210f0b65540103f483c42f44a324d5c2bbdae26d5c22494,2024-08-29T02:36:29.837000
CVE-2022-48883,0,0,393ba512ffb574163a9f61b49138c9f5fd99ee611a3c62b415a0eaf8e576afe0,2024-08-21T12:30:33.697000
CVE-2022-48884,0,0,442f30c7bc460d0b750d0d62192aad9e98cf9980141831c7f81e4f22265a3feb,2024-08-21T12:30:33.697000
CVE-2022-48884,0,1,2747b4a935f17932d0849706158ea692225fdab7f007c66500b40f96230ee3fc,2025-01-08T21:31:21.570000
CVE-2022-48885,0,0,b284058346751b2d4ecb15aa499f99630bc2f3d2cd27241c29ff74c88fadba87,2024-09-06T14:46:30.067000
CVE-2022-48886,0,0,49d446060ccd62b8f9e1b32ac19359b9b5c01c0a51fda0b24e979df2bde795c2,2024-09-06T14:48:20.907000
CVE-2022-48887,0,0,0ebc52eb04e26fa1d67583c38ab688f40c02a8e8357b4265385eb0186cf96da0,2024-09-06T14:55:46.460000
@ -221358,7 +221358,7 @@ CVE-2023-27637,0,0,e336980e21c9f457fefe8b00c6dda3939956833d62bee8b874a32a0474274
CVE-2023-27638,0,0,f9b8c74c29ed470086db04fe0ea2dc288af15cae523377e09d3050be9363d63c,2024-11-21T07:53:19.187000
CVE-2023-27639,0,0,b9b7fbcf72b1364d7c314c995a4deac6aab0189112e61f86cad57476b0718b9f,2024-11-21T07:53:19.347000
CVE-2023-2764,0,0,b60275bd60dae63771cfc63f6038367441d1d2a394ae81d73e693a63f3a17bc0,2024-11-21T07:59:14.770000
CVE-2023-27640,0,0,502266dfa0839523fda8e3eb0d2ea4d1ea5c27d600e299a5e2b5f123ad16da62,2024-11-21T07:53:19.497000
CVE-2023-27640,0,1,942d90eefd00ea0707349532a745b9ab0786557b6735d3ecc97aba150d6ceb39,2025-01-08T21:15:07.413000
CVE-2023-27641,0,0,5df162186f1274a845e27d66cd560b269e038240b9ef162aab5bf59d5bce9e40,2024-11-21T07:53:19.640000
CVE-2023-27643,0,0,58c01c0b7d14a29d67f4be239a74aca8ba60b7220eaa8e733dcec8e8179e6136,2024-11-21T07:53:19.793000
CVE-2023-27645,0,0,5b93f3d4aaabe38d4ec4eed48e7fd65f8548a8d48c1794c83f9c87c33ac9698a,2024-11-21T07:53:19.947000
@ -221804,8 +221804,8 @@ CVE-2023-28172,0,0,c971a8ffe820c495e5a005caaab04191ab2777add820e67940f9775e21eba
CVE-2023-28173,0,0,68af7f906f41eb034da2d8723326e071179b29f81e4962576aee3639787e04e8,2024-11-21T07:54:32.010000
CVE-2023-28174,0,0,0395f476edf5e053e887a9f7995d741a62bb05f347b95557bd275ffdeacef88f,2024-11-21T07:54:32.137000
CVE-2023-28175,0,0,5522213ae06f55fcc5fb60c67fd4792ba0f4a7a1d16d7415fe6640350e531681,2024-11-21T07:54:32.270000
CVE-2023-28176,0,0,64aa2f78c2b021e48b0729a70932536afb67c7a5b590937c7bc2e491af2c742a,2024-11-21T07:54:32.463000
CVE-2023-28177,0,0,9eb43263c394b13747a003475f6d282a664de82a606e534bf935ab9c4aca3786,2024-11-21T07:54:32.600000
CVE-2023-28176,0,1,62a0a9c58e2435a209c4f3085fefb1280d27fb30a4a014e46c3d70a90f340edb,2025-01-08T21:15:07.713000
CVE-2023-28177,0,1,65a46b6aac6840bf6058fecd18ecc397b5c70e9cb15c480d5f5265c0a0e11af7,2025-01-08T21:15:07.957000
CVE-2023-28178,0,0,bea5f49c485e4cbec3e11cd8d816ba700342509178a6f14df66ec06a05ec4418,2024-12-12T14:26:18.893000
CVE-2023-28179,0,0,870008b95a647a1114870423bafa8a6a05fdcb978c8b81dd449c39ea8b394b6f,2024-11-21T07:54:32.867000
CVE-2023-2818,0,0,735a9c6bb7b4e983aea153a48d7553aa85a0db10d10608cbd385e641830a2924,2024-11-21T07:59:20.993000
@ -222094,7 +222094,7 @@ CVE-2023-28465,0,0,f2b530e3ae30a0bb6b76ed5bd7417a86aef68184d54e0a70da965a05dae4d
CVE-2023-28466,0,0,a0d431d4a76aa54689e1dd1a48468708196338801f99241ccd92ad446584b06b,2024-11-21T07:55:08.660000
CVE-2023-28467,0,0,00f2e50435ec08a76fcdfe79697aea51cf3a5fa0a62e71b20272c0e161290ea2,2024-11-21T07:55:08.857000
CVE-2023-28468,0,0,96975a0a127d2e1308e38dfacce8610caf2fe1c7c28a726f1dd9bf495a52d4be,2024-11-21T07:55:09.023000
CVE-2023-28469,0,0,89f0ccc5ca95c5b9d4f3cdd327b44147873a5a865de22a4164e45e73e6605c19,2024-11-21T07:55:09.303000
CVE-2023-28469,0,1,0e8e15eaaeef38b9abb6c4c854adc4acb06a0654baf76b4a675b00f934b24a21,2025-01-08T21:15:08.143000
CVE-2023-2847,0,0,171c10115b3eac66e6e79455e19407d7bfce7799ec4038965923726ba3c8a70f,2024-11-21T07:59:24.787000
CVE-2023-28470,0,0,9d567ab6721f57a3406c965afb5401ac3dae98fb4a09fb7b4db2db7aad561d2f,2024-11-21T07:55:09.477000
CVE-2023-28471,0,0,8daaeda9496d256b8e2255ec3ed761d131af853b2f18ae972ed7dfd52b12aae3,2024-11-21T07:55:09.727000
@ -223099,7 +223099,7 @@ CVE-2023-29548,0,0,00e902680bbcecab5106b6846ed6e510d2721dffb60f34398345ef8db9326
CVE-2023-29549,0,0,4e4192b4015dfe410378a0838eaec5c6eacfc95fba4abbebc809259190d6e4a5,2024-11-21T07:57:16.700000
CVE-2023-2955,0,0,9c0e18923443b98b3624f6a20eb4112985b6c80a66e21eac353915004989baf6,2024-11-21T07:59:38.587000
CVE-2023-29550,0,0,e4f3c9ebf56266ae93a8b7654d890809fa02038cee320637c5e05da2e3b4034c,2024-11-21T07:57:16.793000
CVE-2023-29551,0,0,228f453bf40162e0ca56f9725a8243132d56c710990db765203fc98361e41d2b,2024-11-21T07:57:16.907000
CVE-2023-29551,0,1,6f6042428f056388ae982f18e077673b6cf18c3fd9c579fabcd2adb1f3fc34b2,2025-01-08T22:15:27.373000
CVE-2023-29552,0,0,581b98f26884acaa09a2e45c7906b5ad297c852b04af26ae94e2904276792077,2024-11-21T07:57:17.017000
CVE-2023-29562,0,0,1ce691e8d9f6f5deb206e8ff10b9ec0045c33f0503241d0cacef281445620ccd,2025-01-03T21:15:12.693000
CVE-2023-29566,0,0,72613a9047e5b74b43c598afd3a5332b14dad8bfb67cbbb4132d5bdb7fd4eb17,2024-11-21T07:57:17.310000
@ -223171,8 +223171,8 @@ CVE-2023-29720,0,0,1f61853af6e31b6d17a1f07774bef430ef61e62aac6cb8edc9d923d77020b
CVE-2023-29721,0,0,16bc6df95e94fb6a5ef25e342a42709e7a4b72452d3121be94f25487bab35666,2024-11-21T07:57:24.930000
CVE-2023-29722,0,0,2303a4a35c865e2854536c12e174491e5ff732a5659c8412d42d68b1b5eff76f,2024-11-21T07:57:25.073000
CVE-2023-29723,0,0,8cf5c95d58605565e8f6ab042e6525cd3ae54d69fe2f07d70439054bb34d5d4e,2024-11-21T07:57:25.203000
CVE-2023-29724,0,0,97e60e7529553e8f0870846b133d4baa122821fc0e0e8b5914dc3209e420fb6c,2024-11-21T07:57:25.343000
CVE-2023-29725,0,0,dc1b67db6e3bbdb4f6ed5bb60cf54499c1bb2ac87a38bccabddfe64825e2434c,2024-11-21T07:57:25.487000
CVE-2023-29724,0,1,b957a3fcc2f908978b34709bccb4beaef482657df33bc886f526eec59e4351ea,2025-01-08T21:15:08.470000
CVE-2023-29725,0,1,ab64230b18916f62d493ac57f81dd5cd07baf6987ff2e6626d94f28801370f14,2025-01-08T21:15:08.740000
CVE-2023-29726,0,0,5edc83c46b4a4e4c7f7af4e90e64c34e867ab2e973eaa6365edabd0821085e67,2024-11-21T07:57:25.623000
CVE-2023-29727,0,0,d2262bf85751efd28d11dd718d78ab0e700216d17b8927e794dc9f06802ec2ca,2024-11-21T07:57:25.770000
CVE-2023-29728,0,0,043926f080c8d3e9064c12911e23091eaaad5413dd2bc1fed2dd3453938e1577,2024-11-21T07:57:25.900000
@ -226023,17 +226023,17 @@ CVE-2023-33379,0,0,56071ddc70006503d0579ef54330f122abc6926fb2e2d89ab0a3c9f899e63
CVE-2023-3338,0,0,3cda8649f934c581b6b533eca6ada7ce37372aa07e0c5aa58ca682eba2e45d52,2024-11-21T08:17:02.917000
CVE-2023-33381,0,0,466cba4d3e8f58ae391c8fcef96048eb9c7b73f81ad45fe6362cef219973ba1c,2025-01-08T16:15:29.360000
CVE-2023-33383,0,0,a28a7167b95315782f605325b16be32691bcd42b3f8b778f9c9163d5147b8288,2024-11-21T08:05:31.480000
CVE-2023-33386,0,1,35cdcf2891b479b9a9502f0198064f6fa096a2cfc529fd18fe8d468b4e8943d4,2025-01-08T20:15:24.450000
CVE-2023-33386,0,0,35cdcf2891b479b9a9502f0198064f6fa096a2cfc529fd18fe8d468b4e8943d4,2025-01-08T20:15:24.450000
CVE-2023-33387,0,0,3e3361f6605be6009330b3068fed6534dc9ea26a4bdf2b70a6ee9bb32c805270,2024-11-21T08:05:31.887000
CVE-2023-3339,0,0,1eb850a0ee33f4a634ae5ab5a33d04ae4e964149464e4343eb2740f3d794b7db,2024-11-21T08:17:03.083000
CVE-2023-33394,0,0,b713b917f586a66ecba283fd72b5406fba7f1de8c464d1ce0b45cda0b89db7c3,2024-11-21T08:05:32.060000
CVE-2023-3340,0,0,886acf1ac581bf96ef0b8a2140f4f4fa6948f6c59a9fe8f93226b73530b4b900,2024-11-21T08:17:03.230000
CVE-2023-33404,0,0,2326dc4f79af9853ced62a740677d8f7c16fcd50e611de93c34ee10d4f26ac67,2024-11-21T08:05:32.223000
CVE-2023-33405,0,0,4ffc9ed6899a82157392aaa5892cf9cb52b24d07dacf07cc60fb49ff4b70c63c,2024-12-06T18:15:21.373000
CVE-2023-33408,0,1,c3e6766bcdc10f7bab205a2d05d3bfb1fd7cba0edd9585c13c58aa41064f9703,2025-01-08T20:15:24.640000
CVE-2023-33409,0,1,2a9fbfca60ea1a2804bf5e9dbd5acc09b7d308f5060145bcbeb6dfe10eec3637,2025-01-08T19:15:29.267000
CVE-2023-33408,0,0,c3e6766bcdc10f7bab205a2d05d3bfb1fd7cba0edd9585c13c58aa41064f9703,2025-01-08T20:15:24.640000
CVE-2023-33409,0,0,2a9fbfca60ea1a2804bf5e9dbd5acc09b7d308f5060145bcbeb6dfe10eec3637,2025-01-08T19:15:29.267000
CVE-2023-3341,0,0,b10e5e5975d4496eb9200a8f9befa833303018140e30a7f5eee3be3a9cfa8f2e,2024-11-21T08:17:03.370000
CVE-2023-33410,0,1,9e30bfd3ca59fea2ee165c36e86d5d0e682cbecfbed507fbf59076c4a44f862e,2025-01-08T19:15:29.670000
CVE-2023-33410,0,0,9e30bfd3ca59fea2ee165c36e86d5d0e682cbecfbed507fbf59076c4a44f862e,2025-01-08T19:15:29.670000
CVE-2023-33411,0,0,1ce3f8db7d511d3e00848adb33493dd9b9e83d47bfa9a3e631b62f5d8357da37,2024-11-21T08:05:33.043000
CVE-2023-33412,0,0,8b474498e767f3dc34547ed6d20c6f4ef43c7a500656830918be7ed3520600cd,2024-11-21T08:05:33.670000
CVE-2023-33413,0,0,c3f547ef4aaaa1e268d6521c8025eb40d9b80f464e0894e1800298234e581040,2024-11-21T08:05:34.253000
@ -226054,7 +226054,7 @@ CVE-2023-33468,0,0,4e03c49a7594212a8b1ff77b489a307327dcf22bee135bc562fbafc7e3974
CVE-2023-33469,0,0,994bea01d55c6edda4d230c6ca8daa28df27e07f5b1b8935938681fe0f2d3bb6,2024-11-21T08:05:36.320000
CVE-2023-3347,0,0,4851dcfdfcc397578885c52101d604631a3c7d600a20780072cf1fe3629398cb,2024-12-06T11:15:06.970000
CVE-2023-33472,0,0,86b002e3a1ad3c07a43bbffb1f1d26c5daf73932568b8e94bc896b5fc2582380,2024-11-21T08:05:36.497000
CVE-2023-33476,0,0,b01404e0c9b18ec021a76533d274ba57d8981979a0f7356291f98b64eaa96653,2024-11-21T08:05:36.737000
CVE-2023-33476,0,1,28fbc4dbb52897d04779d556826727d3e95dd94c0a13e7e58a7bd4ab1fe072b9,2025-01-08T21:15:09.183000
CVE-2023-33477,0,0,1612e0afbfac570e43393c9b7851644fd754df80a225b4b762d07212e5494daf,2025-01-08T16:15:29.793000
CVE-2023-33478,0,0,00709454bd5c65a9487b456e1a8dc2d5e98b9d40e004c2b519b99603c16b1715,2024-11-21T08:05:37.057000
CVE-2023-33479,0,0,ad2508dd8f6e278966b720b990c6f15325e8a2cbe4fe4e3f3725a8373469f527,2024-11-21T08:05:37.297000
@ -226078,9 +226078,9 @@ CVE-2023-3351,0,0,f64258e34e1f6e2c3debe6ab542c8550e84fbbc69c1d8f132c263991d8bde0
CVE-2023-33510,0,0,2fdbca3ef3ec1beb92f8e78ca0e200b48de108215e8c467acd4f2362be303f38,2025-01-07T16:15:30.803000
CVE-2023-33515,0,0,365a9a5f6a7f4c9eca56bb36b50c44f896d0d4286fd9bf91ea545127cf4cb344,2025-01-06T18:15:14.737000
CVE-2023-33517,0,0,b525e4f20df193bb6cbce03994f81acd991418a35811daa2f53394dfc22d6d82,2024-11-21T08:05:39.983000
CVE-2023-33518,0,1,288f98e80c2ce2d2b6ef03190cd0b75d8f426b4c6332c76faf7054e7d4c8708c,2025-01-08T19:15:29.863000
CVE-2023-33518,0,0,288f98e80c2ce2d2b6ef03190cd0b75d8f426b4c6332c76faf7054e7d4c8708c,2025-01-08T19:15:29.863000
CVE-2023-3352,0,0,ca8ce10d91c2afb8d2b579cfae6df369db0748f6d1892a3e858fbf033cc8e8c8,2024-11-21T08:17:04.957000
CVE-2023-33524,0,1,00e39ca7564820f7b55be181ca61600cd202d85de1a33f9718e465ff48d596ca,2025-01-08T19:15:30.063000
CVE-2023-33524,0,0,00e39ca7564820f7b55be181ca61600cd202d85de1a33f9718e465ff48d596ca,2025-01-08T19:15:30.063000
CVE-2023-33528,0,0,f9fa69afd45a1f617c3d1403ded5098c81af0e479a18344ed6622bd5b87b3971,2024-11-21T08:05:40.480000
CVE-2023-3353,0,0,73f13e6c85e8b6a63fa0551d3ac8601dd5e6abaf30561f39657303dcaa775484,2024-06-20T14:15:10.650000
CVE-2023-33530,0,0,3f5259f03c4db54a4fbff9537ee74602648d0c16efb6528bb870ef05b10af68d,2025-01-08T16:15:30.037000
@ -226171,26 +226171,26 @@ CVE-2023-33664,0,0,5b7c5457bd01e6ce6a95a841eefdb5dbedfe475424974250034aba4be1bba
CVE-2023-33665,0,0,a41268bb45a1086a0a687ddd7d32e9d4dd5551e67621c80cfea12c4100e16eb7,2024-11-21T08:05:50.863000
CVE-2023-33666,0,0,68a2f2a077e7fc60053dc9b6213773b27f6cebb56b6b3e3832c1d701bea79450,2024-11-21T08:05:51.010000
CVE-2023-33668,0,0,e84de9f5a23d7e91098f0794afb9473673da99f16d53563bd9b0d1213b7efd22,2024-11-21T08:05:51.173000
CVE-2023-33669,0,0,56443f08577e2a7cc3d85d5d08d6ec255c5885a5e14de5af1ae372d6dfd9e440,2024-11-21T08:05:51.333000
CVE-2023-33670,0,0,5f8253a8470a8bb3e9c21852d25b7e4cc630a383f597564abfa6eeef6d5b6788,2024-11-21T08:05:51.487000
CVE-2023-33671,0,0,9fccf9f47985de6e781ed27aee76f40d08159f987e4274513e53c18719941b1b,2024-11-21T08:05:51.647000
CVE-2023-33672,0,0,a9e0f85fed1e19aececc9be079089396b94f3527cca1ba12051ce52e610ed2b3,2024-11-21T08:05:51.797000
CVE-2023-33673,0,0,236d2f94379f9748c31add40d4b155825a2b4f4f7af775cc92591aa9783dc89c,2024-11-21T08:05:51.947000
CVE-2023-33675,0,0,af57d13cbf78e20633b47bb3b59bf43ecfcb595f132aac045ebc2ff971224e4f,2024-11-21T08:05:52.093000
CVE-2023-33669,0,1,1e27b7bf6ef2e90c56bd6c7886baca57063c6244933fba02d2b7d6d8c5379e1f,2025-01-08T21:15:09.473000
CVE-2023-33670,0,1,7e6415317756d5333d2f924807f995f43df30c704a0595729a8310880a5e04ea,2025-01-08T21:15:09.780000
CVE-2023-33671,0,1,b05a3d76739f166917f30510df521b93e6c4122979f4e8abc04fd7819ea33994,2025-01-08T21:15:10.023000
CVE-2023-33672,0,1,49dd67174f95f150dd27e73c75127089ed97853d98400feb768913913c8e3850,2025-01-08T21:15:10.270000
CVE-2023-33673,0,1,21d48a68d1711244285d56ec6d443590902dc2bf172a11c8d502e597fabfb4f2,2025-01-08T21:15:10.503000
CVE-2023-33675,0,1,a4545da2436a30181189346f391668da9917aee48160976e4e190c2fc519a754,2025-01-08T21:15:10.757000
CVE-2023-33676,0,0,ffade39e283499614eb58de15783b0f308082bfa14f8012efc8f40af1b0e2cc3,2024-11-21T08:05:52.237000
CVE-2023-33677,0,0,b4321357d01d562e0e98a9289bcc617262a1b839fd05ec4915e3954d9bfb9630,2024-11-21T08:05:52.460000
CVE-2023-3368,0,0,a576f7da936cc2b8b472e450d586ad2850d395b190e021c8b6a0511d6ac82cf8,2024-11-21T08:17:07.007000
CVE-2023-33684,0,0,6769107473566e0006445bbd8f63cd7291322fe530c7a747fdc8a8b33691d161,2024-11-21T08:05:52.680000
CVE-2023-3369,0,0,0d25e3f23c285bc1228ef6bb953e795d7bcdba21bf14e72d441ce32e37e36897,2024-11-21T08:17:07.173000
CVE-2023-33690,0,0,6085482f7fd60000036c557423a089989e501b7aa233e312f85663311e476e04,2024-11-21T08:05:52.830000
CVE-2023-33693,0,1,3e8148212d4f546416a3c31b6ac046ee727065c009da48e3e800eccc535c4222,2025-01-08T19:15:30.350000
CVE-2023-33693,0,0,3e8148212d4f546416a3c31b6ac046ee727065c009da48e3e800eccc535c4222,2025-01-08T19:15:30.350000
CVE-2023-33695,0,0,1a512ec31a4e1ce8ed225c4780bbb5b76a9937d071e90d5afb6806d8f8d38d06,2024-11-21T08:05:53.147000
CVE-2023-3370,0,0,9dddf58da1ae42a7566c0b92e84336c0d08e63f3c33e8ad56b0a0ee4f51516b5,2023-11-07T04:18:36.820000
CVE-2023-33706,0,0,fad1968fea65403211fd2c9385b3602092ccc20b01e9d150d57322ea4fc84c68,2024-11-21T08:05:53.283000
CVE-2023-3371,0,0,df34f309dbb56ab4c9e10189049735675c625cabb2e1178e461a2d83b4b45473,2024-11-21T08:17:07.337000
CVE-2023-33715,0,0,70f8ea39909ccc7d7fedfea0a5651610ab41bdd10d186bbb572c059a14a3b869,2023-11-07T04:15:24.220000
CVE-2023-33716,0,0,7b7604c19d61f731509886830b48df38fb105a9ff3e0c4a119ce7f619853d73e,2024-11-21T08:05:53.460000
CVE-2023-33717,0,0,1309386fa32bdf9e26a6a8a1af47bd9cbc5c2920a80d84a9cfd9e6955927c5b7,2024-11-21T08:05:53.620000
CVE-2023-33717,0,1,0cc9e8551affca6d31d9fa047b600ffdb3ddc33ab5b125ddf432d7a93b0fcd71,2025-01-08T21:15:11
CVE-2023-33718,0,0,1586778d15355ffee6648b131924ae371a3d2019604b5073fe93a8180e3a40a7,2024-11-21T08:05:53.770000
CVE-2023-33719,0,0,e8d9af2859dd56526dff03f2841c96e8870510e475c2a98cbdaa79fea915b66f,2024-11-21T08:05:53.927000
CVE-2023-3372,0,0,84f21b60d2b56cb6d011b3c76313017d3ef2b1ee20e683414c273e919f5c98c6,2024-11-21T08:17:07.493000
@ -226199,9 +226199,9 @@ CVE-2023-33722,0,0,577f04a66dba80af8edcb620e449171536c8a33547fdb2eb1e16f5993cabc
CVE-2023-33725,0,0,501441fd8c0850dda7db2b5cbc4c50d99063609270f88ed8b5e1f563ad958019,2024-12-06T18:15:21.850000
CVE-2023-3373,0,0,712fcfc5ec5d5a5858a7c6e82af9f759f31c8a9579462cec2a389020ad3d6bec,2024-11-21T08:17:07.620000
CVE-2023-33730,0,0,6310f4453161d8845f3526a345e65c3e7de103266213728ef16d591864176147,2024-11-21T08:05:54.510000
CVE-2023-33731,0,1,4e0716e51d797332a35d8cf3e5a52df1f04a68160a9692c084acf7ca25247b33,2025-01-08T20:15:24.840000
CVE-2023-33731,0,0,4e0716e51d797332a35d8cf3e5a52df1f04a68160a9692c084acf7ca25247b33,2025-01-08T20:15:24.840000
CVE-2023-33732,0,0,73e7254c99574e9b7803aa6d2e5a20146b7a53e5b864dd18f03405306d64d8a1,2024-11-21T08:05:54.810000
CVE-2023-33733,0,1,67d14424780e2b2a99fc85cd6e4fd6c08e79d171c16dc23f4a6280281fd3af90,2025-01-08T19:15:30.560000
CVE-2023-33733,0,0,67d14424780e2b2a99fc85cd6e4fd6c08e79d171c16dc23f4a6280281fd3af90,2025-01-08T19:15:30.560000
CVE-2023-33734,0,0,ce9b6222e7c051206355de817b0fb42912304fcb66294482b08488625c37fe80,2024-11-21T08:05:55.107000
CVE-2023-33735,0,0,342b6457f0ac3ac330051be3ab4ddae4481c406cc9b4868529f56e89a4ea2f7b,2024-11-21T08:05:55.260000
CVE-2023-33736,0,0,b465ae61bb3875ca7c41d8d8e67e22e0b88bcb8c1b5473a310e3d9926c5d0a80,2024-11-21T08:05:55.420000
@ -226223,9 +226223,9 @@ CVE-2023-33758,0,0,6eb30d4e57047cf78716b1a561c980b2c569f119a705cede04e789e29e71f
CVE-2023-33759,0,0,63e74f8e659cf75d247f5ab0b4df2952cf4cff539392ea2281ed9021b4389119,2024-11-21T08:05:57.570000
CVE-2023-3376,0,0,a0b735a4f3d815668e4f878bc8d21d4d7f0baaf4e560f4b47089ab3f13de3880,2024-11-21T08:17:08.053000
CVE-2023-33760,0,0,66395363814916b245c0a8e20054660baa6a6c6428560780ce09fd6c751d57c3,2024-11-21T08:05:57.723000
CVE-2023-33761,0,1,57a93ac893ae35326e39c092126e5e13d5e331d3b8372e3a303e80db32ec6902,2025-01-08T20:15:25.050000
CVE-2023-33762,0,1,38f5fcfaba70048850b3e019780dd18dda0074fae37a3f2fe1c49610ea38ff47,2025-01-08T20:15:25.250000
CVE-2023-33763,0,1,4b714c19fd58c23cabcc96b7c2627201896bc29e6a1b69cfe75a61bb1cfa788e,2025-01-08T20:15:26.130000
CVE-2023-33761,0,0,57a93ac893ae35326e39c092126e5e13d5e331d3b8372e3a303e80db32ec6902,2025-01-08T20:15:25.050000
CVE-2023-33762,0,0,38f5fcfaba70048850b3e019780dd18dda0074fae37a3f2fe1c49610ea38ff47,2025-01-08T20:15:25.250000
CVE-2023-33763,0,0,4b714c19fd58c23cabcc96b7c2627201896bc29e6a1b69cfe75a61bb1cfa788e,2025-01-08T20:15:26.130000
CVE-2023-33764,0,0,25064556854711887dc1bb6f6f1cf49e5299f880c7c82df8184b1321f68c6f8d,2024-11-21T08:05:58.363000
CVE-2023-33768,0,0,06ef0c0decf4640dfb51ab40e4d57977e0315f708c6bde014cfbf4d1da8e9b5e,2024-11-21T08:05:58.517000
CVE-2023-3377,0,0,bfef5eba24979a4babeeac5a2ac2afab2bc4aa25a44e9271085be4c4d2c0fcdc,2024-11-21T08:17:08.190000
@ -226682,7 +226682,7 @@ CVE-2023-34254,0,0,28bc1c030aea3f52ac42aea5cabfb0b2c4b8caf27bbf30b675459c6d8263c
CVE-2023-34255,0,0,80be5f9e6f93d1dff56157d1720c5c0d5b302e9fcf81ddd8a1748a4ec5b2a6f7,2023-11-07T04:15:33.133000
CVE-2023-34256,0,0,691415f2f013332d745607532da3b4ac21fbf0bcec117633be38405c94853d0c,2024-11-21T08:06:52.333000
CVE-2023-34257,0,0,d15b21c49281aac125543c6218a20e8e3fee27b0d9235eb7e685e0ccee8cd0cc,2024-11-21T08:06:52.500000
CVE-2023-34258,0,0,0d46730d0368bc72178f84e29cab4ca72a408e0728c03217aa52391343d7a1fe,2024-11-21T08:06:52.663000
CVE-2023-34258,0,1,fcdb643155db51246493eace9830d7f00f9ad9f8e9c26b5f3acf2452f9cf252a,2025-01-08T22:15:28.060000
CVE-2023-34259,0,0,a17ffd4a41a9842f96ee8008d3ec22fa6d3e74baa3727d6c80193a1cef77d2d8,2024-11-21T08:06:52.813000
CVE-2023-3426,0,0,ae2c21d78db765200c0b63c28eb0fffcbdbf50884f08013f5098219b8325bff9,2024-11-21T08:17:14.497000
CVE-2023-34260,0,0,751c260fda5d42cd77fe0506bf52feb362109f06c26f040bf0c29f40353daeb6,2024-11-21T08:06:53.043000
@ -226830,7 +226830,7 @@ CVE-2023-34395,0,0,6b27da8fd46729cf8e00b5b710b84600fc46a48029d9eace73be2c1175bdd
CVE-2023-34396,0,0,a88caeed8ca60b7e2de946c97e864c28b26bd11abb406d0a5a7eed0460d71bfa,2024-11-21T08:07:10.320000
CVE-2023-3440,0,0,c3a148f8bda83f5626794fbc68f98a1dc6c64d7bea5c4682462694a567b20fe9,2024-11-21T08:17:16.337000
CVE-2023-34407,0,0,feb0cd99a613c0605481c85d03f4038aed84545414c9a8173ba7dd7d0782d2cd,2025-01-08T17:15:13.003000
CVE-2023-34408,0,1,03b9bef6d87ce45b6ba8997f0b9758107c5f0a4c0c52b45bc5822b37a8cffdfe,2025-01-08T20:15:26.503000
CVE-2023-34408,0,0,03b9bef6d87ce45b6ba8997f0b9758107c5f0a4c0c52b45bc5822b37a8cffdfe,2025-01-08T20:15:26.503000
CVE-2023-34409,0,0,51b8f8415923aa1a2d243bed75d521d233228a55cbd4b9792f4bc8dabc1d5016,2025-01-08T16:15:31.940000
CVE-2023-3441,0,0,96b660e59290fe52a56318b9a285eab78ceae8ef9c8a005c225e8ea7c212c771,2024-12-12T20:00:32.067000
CVE-2023-34410,0,0,1d7d5688d71675c11284e2a1b91e0cd8515bec350db0e80fc1004491d1abeaf8,2025-01-08T17:15:13.230000
@ -236585,7 +236585,7 @@ CVE-2023-47706,0,0,bbb32054d32ce2e0d3f68c842f3cdfa72be0ab10444f45a7954eb172de017
CVE-2023-47707,0,0,c7b659cfa473bc10030ffc6b6ad313fb86dbaafbac13d5fd0040fb820891bbbf,2024-11-21T08:30:42.917000
CVE-2023-47709,0,0,65ff53d8144fb462a84c16a837c569e68857f1c391294ca6a1d40092224f395b,2024-11-21T08:30:43.043000
CVE-2023-4771,0,0,1012847fc256ae9ff3628aa2a1fb6186f4f8c6f51233026703d280e3101d9a14,2024-11-21T08:35:56.950000
CVE-2023-47710,0,1,55d2267d368a638b154b4cbdb2e4829df517af8708523830856cddb5920594cf,2025-01-08T20:17:26.143000
CVE-2023-47710,0,0,55d2267d368a638b154b4cbdb2e4829df517af8708523830856cddb5920594cf,2025-01-08T20:17:26.143000
CVE-2023-47711,0,0,193c709b60d934908f9a5562e5007b0d54510a30e62d836ebcad6ad17ca6256f,2024-11-21T08:30:43.290000
CVE-2023-47712,0,0,af7f68c5353560e036f5f2959c8b8d9c1784fe11f5ecf3513314e7be363e6fe4,2024-11-21T08:30:43.420000
CVE-2023-47714,0,0,b87409e17435eabdd7f9b77efbff39fad7055f3f9770a66daeb88291622bf67f,2024-11-21T08:30:43.540000
@ -242733,8 +242733,8 @@ CVE-2024-0511,0,0,5b5729b5b63c315b290874c9574a0771ecfd42be446e93c43c1ab37bbb9a83
CVE-2024-0512,0,0,ac85c2e98bdc908cf84739ba96d567a0d7e4a29e55962c1611e976e274b149cd,2025-01-08T18:52:15.113000
CVE-2024-0513,0,0,d636b0c15a0e47b002a67420bcc626b28b4566542f5eabacdfa68e40eeb591e1,2025-01-08T18:58:49.240000
CVE-2024-0514,0,0,200af424e2494b9ef1cde83af9e0336be68ac0b95160b10bc25f104a49aff710,2025-01-08T18:59:31.757000
CVE-2024-0515,0,1,7e4bf56d9bee19ba35451051d5188af092963d7f855a56da4ac6517f6316a66d,2025-01-08T19:02:52.477000
CVE-2024-0516,0,1,a1c45ca10fd29ff130b69b86b74fad5f71b7de220cd93d419d06ba5747df79a7,2025-01-08T19:06:41.057000
CVE-2024-0515,0,0,7e4bf56d9bee19ba35451051d5188af092963d7f855a56da4ac6517f6316a66d,2025-01-08T19:02:52.477000
CVE-2024-0516,0,0,a1c45ca10fd29ff130b69b86b74fad5f71b7de220cd93d419d06ba5747df79a7,2025-01-08T19:06:41.057000
CVE-2024-0517,0,0,c1d84921536d4f403fc308e0f21ef3e39772e61110c1ffc32ce08f0c2aac5138,2024-11-21T08:46:46.377000
CVE-2024-0518,0,0,978d463e9f50d6258d652fd532f338a779dabff722688c763fb03b911a937830,2024-11-21T08:46:46.510000
CVE-2024-0519,0,0,a6f73d962989f91484a755efd5ea0cc921464529c4019e1d89ca623170d61071,2024-12-20T19:01:11
@ -244634,7 +244634,7 @@ CVE-2024-11706,0,0,d7aa48664fd3a99ff8ecdb1c5e606d3e6a16c2b68f26185023438aa20fdce
CVE-2024-11707,0,0,c14d0723c12588788ccbd8bb2e9951ac0d18f4bf2138ffa0507ec2dce1fcd9c9,2024-12-03T08:15:06.223000
CVE-2024-11708,0,0,46bf8dcd9e0a994fe6b91558c4bac72ea601d2749b0be7bd469a9ad7ee077e45,2024-11-27T15:15:24.747000
CVE-2024-11709,0,0,c7d4cd410df5a04f3cf8d9ea3dda9b5544a86774d871c2cb08cc1e1a83cccda9,2024-12-12T05:15:08.900000
CVE-2024-1171,0,1,ecbdcf43f5b983dd6d5e3901a4f79f545f1f5986a89a0bc7c9ca53a4bbe921fc,2025-01-08T19:07:55.783000
CVE-2024-1171,0,0,ecbdcf43f5b983dd6d5e3901a4f79f545f1f5986a89a0bc7c9ca53a4bbe921fc,2025-01-08T19:07:55.783000
CVE-2024-11710,0,0,76a5dd52f32d87e7772a2980c1d585729682665eba7003c9e06e0195686f14ed,2024-12-14T07:15:04.560000
CVE-2024-11711,0,0,643f90abba573916fb9581285187fdc714fe533d8e03bdf0e8722c8c292f8e86,2024-12-14T07:15:06.187000
CVE-2024-11712,0,0,d8eeffb57a7e2592152256c9eb6f1edc824d73d2b40e013aeae3b4e7ae12823b,2024-12-14T07:15:06.360000
@ -244643,7 +244643,7 @@ CVE-2024-11714,0,0,c6471527e19f0ca60843e70cf630e8e5f2ae6981854a480677e1b01b2ada8
CVE-2024-11715,0,0,0815aaace33685f035482241a4ccb0b0e0d773cd3b4b8723c5ec1e7d7b552602,2024-12-14T07:15:06.880000
CVE-2024-11716,0,0,522e4ed8199ad8f3f63cbe6d21a80da8ac391d52575f83334b9f923b884fcb00,2025-01-02T18:15:15.367000
CVE-2024-11717,0,0,68750f09c3123f04bf7a5bd697483739e358151e1b46d1fb4198fc9ac2d13fce,2025-01-02T18:15:15.740000
CVE-2024-1172,0,1,1bc2ee9b555d1b5ce6888d4346af93aa633bcdcf2636d0f9ad6817045e164057,2025-01-08T19:08:16.787000
CVE-2024-1172,0,0,1bc2ee9b555d1b5ce6888d4346af93aa633bcdcf2636d0f9ad6817045e164057,2025-01-08T19:08:16.787000
CVE-2024-11720,0,0,29bcdc9d8ea7c52b0cf061a79d913eb830f398d7558309b58df85618930b04a5,2024-12-14T09:15:05.083000
CVE-2024-11721,0,0,476bad2ae1181a71ee1e909e9b2944d8737010e4d5a814100bd6b1844c536af1,2024-12-14T09:15:06.383000
CVE-2024-11722,0,0,40864411129bd70df76bf7827eb0e751b5dd144fb3c982ea787e070835d4fa8e,2024-12-21T10:15:07.367000
@ -245130,7 +245130,7 @@ CVE-2024-12356,0,0,105dac76f068e0a7df26029c27e4dd4c6eb4193ba09a6f3d1c3ed5326b9fe
CVE-2024-12357,0,0,48fcc186a0b90c08dc56b15842484729758da0392dc94d034d9fe9fdfb82ecb1,2024-12-10T23:35:15.660000
CVE-2024-12358,0,0,c693e0849f917c8e8b82ecbabaa009531cb87832861cfd247370c207501db351,2024-12-10T23:34:20.467000
CVE-2024-12359,0,0,c89d1a1aa75e792ebb41728457dc48f1f26a200ebabc2671ae04aee3d706d446,2024-12-10T23:34:02.110000
CVE-2024-1236,0,1,42d257f977d290f4d0aa2f8d4699f4951f80f18e17ed46b119e80f5ed73ef1db,2025-01-08T19:08:56.023000
CVE-2024-1236,0,0,42d257f977d290f4d0aa2f8d4699f4951f80f18e17ed46b119e80f5ed73ef1db,2025-01-08T19:08:56.023000
CVE-2024-12360,0,0,9c92ce0fa75af6038fb90116f61bca41613e1dcad55daccb6d63b1c2c6eac745,2024-12-10T23:33:47.773000
CVE-2024-12362,0,0,3d126c7d5b2c7c892f0afca83b7e5d0a3fdd9f8568569cdb62c20aebeb726e71,2024-12-16T10:15:05.097000
CVE-2024-12363,0,0,8bf95d170f6881f24ef42d227f38a0cf0a0a8682e2906a9aa2aaa1e3f316a356,2024-12-11T10:15:07.260000
@ -245170,6 +245170,7 @@ CVE-2024-12426,0,0,b1768326240a0dd8a6e52437c59b87b6647b9ea2add19ab16c01c997897bb
CVE-2024-12428,0,0,0dc42c82097510dcd67ba200f4a63250bd059d1ff61bcff7d39f7b5f34a5af10,2024-12-25T05:15:06.920000
CVE-2024-12429,0,0,99de63e9af0ae88e6e217f344e187dc7b14d0fe0ccd82d65454e97b04105efab,2025-01-07T17:15:20.527000
CVE-2024-12430,0,0,d4276ccf8ce8cf1fc6449eee29ff956f270f606dae1ca6365bb2571c495303e4,2025-01-07T17:15:20.703000
CVE-2024-12431,1,1,da304ead6ced274b9ff4f680c28a5ec526c901ffbf7544fee95d4ff47213effc,2025-01-08T21:15:11.760000
CVE-2024-12432,0,0,3d67b932349f6253a91fa970f1501aba586896a462aba17731bbe90a2499433d,2024-12-18T04:15:07.947000
CVE-2024-12435,0,0,0b924907debc21d874056d540a36b4cd28d4a499f8792c113a5d9122f40bd903,2025-01-07T05:15:18.887000
CVE-2024-12437,0,0,6e24f2f4b2ec72fb52a0e054617c7907aded8c9b581797c18ca0d91453127b86,2025-01-07T07:15:27.127000
@ -245634,10 +245635,11 @@ CVE-2024-13173,0,0,f1a33d2e3c9b2cf91c9a53b07743d77111624711ca1e4fa83f21d1b344cad
CVE-2024-1318,0,0,875ffbabaf295988fe72077a5574dbe20799a2a8618e7dc53ba31731145c671a,2024-12-31T16:56:50.763000
CVE-2024-13185,0,0,309623867cf2a365ccf0f9b8bad47d56d8813a4020c9e23dc24fdd83b6361ef7,2025-01-08T15:15:17.163000
CVE-2024-13186,0,0,ab68464e9eb8c64ef77f66273b4531bf06ac11994ab182c60b128be5d808b9b1,2025-01-08T14:15:26.227000
CVE-2024-13187,0,0,6b3f36a2340a79cb00f03c53cc5eedc706fbcd37e9329336b3a6eedb97ff1e2f,2025-01-08T17:15:15.410000
CVE-2024-13188,1,1,cc95bf1d824c3b6096fc692ac535848a10cbc0f564544683f2277bd18e0fae2c,2025-01-08T19:15:30.840000
CVE-2024-13189,1,1,9e7af9f6942308b7ca9c8e12a57b42ed561370b7ba877e9a778a7a36e87c0943,2025-01-08T20:15:27.353000
CVE-2024-13187,0,1,22a296a0fc204e7fb6d468d261ef96cb75ee85392fddddbfd453c9e83d5a5443,2025-01-08T21:15:11.973000
CVE-2024-13188,0,0,cc95bf1d824c3b6096fc692ac535848a10cbc0f564544683f2277bd18e0fae2c,2025-01-08T19:15:30.840000
CVE-2024-13189,0,1,03a8ad20b4285eaac39004c7eb28ba111ec68af46d0e0b846ef6e6119fec9713,2025-01-08T21:15:12.157000
CVE-2024-1319,0,0,e6fca38f8817c3f0a93cd5d73a5a9417a178ac65495356d684dc26f204fa5765,2024-11-21T08:50:19.530000
CVE-2024-13190,1,1,b6c3d265062c184bd417077d9b801b1b02f71d26f94736dd2a2e2e78d84e35b3,2025-01-08T21:15:12.303000
CVE-2024-1320,0,0,80370b3cf95d31a327dfcead0766151687bef5425baa11f9a4606b327981e1e5,2024-11-21T08:50:19.647000
CVE-2024-1321,0,0,64c53fddfcf700442bf3bc09eea0aa8fb2f1c68b08bca44e74ca22c8291fb906,2024-11-21T08:50:19.770000
CVE-2024-1322,0,0,a87df03aa9d8a817a942ae8ebad8afc3111ac175155d7ee73a384181ec986bff,2024-11-21T08:50:19.883000
@ -245846,7 +245848,7 @@ CVE-2024-1533,0,0,672ff40ebd2d9061fbc3bbc9de7d5e8e4d35c5769bab92790afed3ed40e3dc
CVE-2024-1534,0,0,2e9320299e2180ef1d7e929914dab933cb3e85ea5d4a83efd84ab898f262cf69,2024-11-21T08:50:46.520000
CVE-2024-1535,0,0,927dc46177fcf2f0646a5365a296286366125eb861cfedb1145399176e63f500,2024-11-21T08:50:46.647000
CVE-2024-1536,0,0,c46b5077118b6287104aa95a7ed0934321fcad65589140f40d58f23e342e618e,2025-01-08T18:32:08.960000
CVE-2024-1537,0,1,56c08bfb4e8376533125db95254233cfd12a8a9f9def20e37b56b1cc354ee636,2025-01-08T19:09:15.633000
CVE-2024-1537,0,0,56c08bfb4e8376533125db95254233cfd12a8a9f9def20e37b56b1cc354ee636,2025-01-08T19:09:15.633000
CVE-2024-1538,0,0,f692a13d2117fab62bd43f3c930015d27dcdfedb4ea2c6fbf2a4f89e666d71a5,2024-11-21T08:50:47.027000
CVE-2024-1540,0,0,dcc5f7f06abf726edf9706049e280bf2503f16b7be61b8dfaef13d5b5b992664,2024-11-21T08:50:47.170000
CVE-2024-1541,0,0,4b2d5b7e49160c1a07da99bfb618ab29a30c8b85927a1cc1ce15d0c4b17a57ce,2024-12-12T17:51:27.017000
@ -245874,7 +245876,7 @@ CVE-2024-1563,0,0,7d0bf239d127ed2704e916b4bb8cfd434f8136623a3e40c8f2ec9ef9bcf8d0
CVE-2024-1564,0,0,84ceb93463fa25d921ef01feb499d06d312a061c27da82d4c95abef3e4e86329,2024-11-21T08:50:50.673000
CVE-2024-1565,0,0,00fc6a5125264a59a67555b8c8202352f41a7d44a1f5f9ff79d0346bf16d4f67,2024-11-21T08:50:50.860000
CVE-2024-1566,0,0,4ac720135761f12018d810740b03599e211c6d2088b3ec7481b0c1665640c9db,2024-11-21T08:50:51.007000
CVE-2024-1567,0,1,6cdbaee71c1770d77caf03403af77d158a420504c05e33f36e632e6fe2f3ce20,2025-01-08T20:47:46.820000
CVE-2024-1567,0,0,6cdbaee71c1770d77caf03403af77d158a420504c05e33f36e632e6fe2f3ce20,2025-01-08T20:47:46.820000
CVE-2024-1568,0,0,7c747a42c43889299b85ee2d411912cccb4847e43395740d8e6d9bd8cca3c1b4,2024-11-21T08:50:51.240000
CVE-2024-1569,0,0,cc3fd6764ddebd625443ddcd2f6dd2aba14c01115654ddd2b36f709166cad3a4,2024-11-21T08:50:51.360000
CVE-2024-1570,0,0,c77fb8a1605b8ff029c140717833d66157c8c7aa9377bb5398abaa6409f8c2d4,2024-11-21T08:50:51.480000
@ -251093,7 +251095,7 @@ CVE-2024-26226,0,0,f53978cfbf6d99fdbc30bc25db1632168b5ccc1c3dec083c913a87ec62927
CVE-2024-26227,0,0,5c2fc4b90f1b4bbec7fdc7c88fc60c47c166e99b440dc547f2214ea4f38b0b17,2025-01-08T16:28:31.610000
CVE-2024-26228,0,0,fbbae24dbfd1a6f2bfc2cd895125564469a7a613f2eed01bc0d7f5fccfb5a109,2025-01-08T16:31:38.633000
CVE-2024-26229,0,0,553aad4240827e067db49fe129df0c528dd2b5cb7c8699a5a51f37123c98796e,2025-01-08T16:31:52.880000
CVE-2024-2623,0,1,ad6ff4830c0fded63885ae0db2a00cbeed8247716bba8c3596a4bb3cdabc545f,2025-01-08T20:15:47.823000
CVE-2024-2623,0,0,ad6ff4830c0fded63885ae0db2a00cbeed8247716bba8c3596a4bb3cdabc545f,2025-01-08T20:15:47.823000
CVE-2024-26230,0,0,69377b64970d710af9e251debe1b54da41351ea80d23b5be64d65d9ef5099bf1,2025-01-08T16:32:41.670000
CVE-2024-26231,0,0,b932e0c89a81d839ec530889e3bba74a55df396ef61aac39c031a3add1c31c60,2025-01-08T16:33:08.860000
CVE-2024-26232,0,0,3b717e9ae005d4734140ff5837bde84cda000758a327ccc4b5664a77a5b55004,2024-12-06T14:39:54.630000
@ -251241,7 +251243,7 @@ CVE-2024-26490,0,0,5d881f1c01fce0a8d045898f401c1fdce23d0fcbcfe7be54413530239baae
CVE-2024-26491,0,0,c21263bce7ab5e4914f382cea90ce616eec96f5c4ee3ce13ab73daf3ca946d29,2024-11-21T09:02:30.480000
CVE-2024-26492,0,0,9627b0f85e6c71953ddc8ad575684843b848841f59336ebddbc7ed81a95e3765,2024-11-21T09:02:30.693000
CVE-2024-26495,0,0,1a3ef9413c39fd044d2faf5b27b039172ef94e2dc35c0a91bd7bc5a02c4f00e8,2024-11-21T09:02:30.907000
CVE-2024-2650,0,1,608806f7ed4f4fceda8bfc65d112443c2ad90c7524d22b9fb97e555c3fb3dd04,2025-01-08T20:06:29.560000
CVE-2024-2650,0,0,608806f7ed4f4fceda8bfc65d112443c2ad90c7524d22b9fb97e555c3fb3dd04,2025-01-08T20:06:29.560000
CVE-2024-26503,0,0,df7d61dcb7128154350761a771150cb0494b47d4aafbfd7f2024eef22b0ed39b,2024-11-21T09:02:31.040000
CVE-2024-26504,0,0,04368ca408cf828c52c9d21e0e159c77cba39aeb7ead3b77c45c5792276ceb5f,2024-11-21T09:02:31.240000
CVE-2024-26507,0,0,6739efe9e31958f6327926c478411ff4c4c7914d75460fb344892d5adbfedceb,2024-11-21T09:02:31.463000
@ -251331,7 +251333,7 @@ CVE-2024-26636,0,0,e040392dbf5dece5991bbd5b4813e4acf74491af81b2691222339ae1b7720
CVE-2024-26637,0,0,33676b92619865021f629b461c2549985de282ac3ac30f360d4728cbdc20aa03,2024-11-21T09:02:44.403000
CVE-2024-26638,0,0,6c83dc25b3412a9ff69e4abbfad53bbaa0a8b4f7b0192f35032c6bb4f6d464e3,2024-11-21T09:02:44.520000
CVE-2024-26639,0,0,77fa0c405097892d132b380250ada6d19d3c676da4410ce6e163a929de368582,2024-06-20T09:15:11.183000
CVE-2024-2664,0,1,d65d75a89592ce5f962a430dc227e13a6ba291c072ed415025f4dde2ffe9f647,2025-01-08T20:05:38.290000
CVE-2024-2664,0,0,d65d75a89592ce5f962a430dc227e13a6ba291c072ed415025f4dde2ffe9f647,2025-01-08T20:05:38.290000
CVE-2024-26640,0,0,54c5da3b229a93028da04fd82c4249df09909d6ac16876a131e19755de0888f3,2024-11-21T09:02:44.737000
CVE-2024-26641,0,0,5f47a642bf5ae3dc0f36324b4a1b8f7c8a7ca05295b1963f0b237d32cbae450a,2024-11-21T09:02:44.853000
CVE-2024-26642,0,0,8cb6e40acb222e213a9c1b8fa4426c911d8cd03fc8028b52eacb65429f170b4d,2024-11-21T09:02:44.980000
@ -251342,7 +251344,7 @@ CVE-2024-26646,0,0,5c3b675eed417f04e79fbe9a962446c0936c3d49eec6b3e012c1e53cad995
CVE-2024-26647,0,0,0087defa8b2daf5e29c0c380220574740551b7537aefbd17ea5876ff9a0ca272,2025-01-07T20:15:48.587000
CVE-2024-26648,0,0,57660c3f5372b373298dbe0cd29fd4332764e7181a5b50e285b698a5ae516b44,2024-11-21T09:02:45.723000
CVE-2024-26649,0,0,e755538fa424fa67581263d7164952806f11ff46847ca4f67e57e88a22ecb657,2024-11-21T09:02:45.903000
CVE-2024-2665,0,1,7d353e3768885e4e4ccec25142dfea412a0d57b9ef35aaee4fe4d95b6836feb0,2025-01-08T20:05:50.257000
CVE-2024-2665,0,0,7d353e3768885e4e4ccec25142dfea412a0d57b9ef35aaee4fe4d95b6836feb0,2025-01-08T20:05:50.257000
CVE-2024-26650,0,0,c37b82afef74cba8f0a1b3081e8c53c80ac8f73689ed9f1c045183b9566d980d,2024-05-23T14:15:09.293000
CVE-2024-26651,0,0,898711d0c00a026cf190f460e3b24d2751f2699fd4b1b6a25eb50a9711c0c7b9,2024-11-21T09:02:46.027000
CVE-2024-26652,0,0,105744a3326cfd97769655231f5141eceba4e2c7ae5c2e6279ca9167a71c0f9b,2024-11-21T09:02:46.153000
@ -251353,7 +251355,7 @@ CVE-2024-26656,0,0,87294d191c345c70a4c471a87fe66eabdaba9c1d9c21608ca348166e40c96
CVE-2024-26657,0,0,5b20f2d67a13488a4561cdf1804b4d16bd412c492c2f8931f4259c8fdab78f08,2025-01-07T17:20:00.840000
CVE-2024-26658,0,0,d8d3bbfb4b8888f4ac28f0fa2f85d0ddd9b9cef8032b00d528a731dbc6177ca2,2024-11-21T09:02:46.957000
CVE-2024-26659,0,0,d1c064e96da1d530f31cb13996b98b6c11a5365d98cf8e2364eb0850bbe23f59,2024-11-21T09:02:47.073000
CVE-2024-2666,0,1,f1b6b3235b2b495b42e297549bf95b2a093d5e348ec41b756e906ebd66544df0,2025-01-08T19:47:15.707000
CVE-2024-2666,0,0,f1b6b3235b2b495b42e297549bf95b2a093d5e348ec41b756e906ebd66544df0,2025-01-08T19:47:15.707000
CVE-2024-26660,0,0,a422396ff04da2dd1fc0fcd251abf1c784b2a21a790731caa445e598fd0e0efd,2024-11-21T09:02:47.193000
CVE-2024-26661,0,0,d45863d2e30232e358edb0d1a1e889067585e710a0e2ee684c544bcee0a67515,2024-11-21T09:02:47.317000
CVE-2024-26662,0,0,a88f4521b9b995afb0e21d9f507fb182180356687597cd7121dd3a6b42115b74,2024-11-21T09:02:47.500000
@ -253631,7 +253633,7 @@ CVE-2024-29736,0,0,b61855bfadb15159a83451588b028249b7cffc739fe63ce533b91dd6bcf21
CVE-2024-29737,0,0,2db4529f83196388cf55c7cfdbe908562eb738112835d568cd39a13d7a201ede,2024-11-21T09:08:12.270000
CVE-2024-29738,0,0,8c7de6e64ca0b6d6c89dca0223ef5aad2d4ced944458e86ab12ff44f8d6da996,2024-11-21T09:08:12.490000
CVE-2024-29739,0,0,df0346e10103b861fc131db19f20059c902c4eff1f464dc3f0be8070a3263292,2024-11-21T09:08:12.613000
CVE-2024-2974,0,1,056c4d14612d3f51428fe0d21e7c5c73661985bea0ebb92c5f6fa0bb74b4757c,2025-01-08T20:06:14.587000
CVE-2024-2974,0,0,056c4d14612d3f51428fe0d21e7c5c73661985bea0ebb92c5f6fa0bb74b4757c,2025-01-08T20:06:14.587000
CVE-2024-29740,0,0,b4700812d574daa120bc21f820d9a1090255a14abc9e9b57649051371f118f81,2024-11-21T09:08:12.813000
CVE-2024-29741,0,0,ad0166c0b9bdadba5399ed38f67d68bf92a9cd9d4585450d760bc972f88174e7,2024-11-21T09:08:13
CVE-2024-29742,0,0,b9df7a6c13e81176309d5385a85ce7e04b5046d77b80b3b29ab68f5cb7b31339,2024-11-21T09:08:13.120000
@ -253944,7 +253946,7 @@ CVE-2024-30038,0,0,a110458651a9eccf20a20127267985311cd4020527c39bb7fe92fbd8245e1
CVE-2024-30039,0,0,6d4c2a358502acece6d39ccda69e9264f55f52a713bb5953f79ee8082ca9b1ab,2024-11-21T09:11:07.213000
CVE-2024-3004,0,0,090e547619a006fd8749e79d0e05f6b17fb4b3abcde3d586f7d775d03c5b12a4,2024-11-21T09:28:39.437000
CVE-2024-30040,0,0,53137381cad4836b484aca2921dfa740d0639018920e030d4cd815e000aa758f,2024-11-29T15:41:55.210000
CVE-2024-30041,0,1,f6cb8df06dbdd5b3577bae4b6d27fc00b9774de77840fba8ad7bf05a429e4a96,2025-01-08T19:13:10.127000
CVE-2024-30041,0,0,f6cb8df06dbdd5b3577bae4b6d27fc00b9774de77840fba8ad7bf05a429e4a96,2025-01-08T19:13:10.127000
CVE-2024-30042,0,0,2ddeae73b8180fcd7b495ee7af2110afd4caf7ffe153ba2c55cd9ba91b6ad034,2025-01-08T18:59:45.373000
CVE-2024-30043,0,0,4238deb754843aa8d72d31430a10f30c6667ebbbec7c44850b6d8f05dd2eceee,2025-01-08T18:56:55.587000
CVE-2024-30044,0,0,c23984af5436e2f8cdb7981e48d399d742c3a14edea38f21dc44bdf3d8badb4d,2025-01-08T18:50:31.400000
@ -253960,7 +253962,7 @@ CVE-2024-30052,0,0,feb05ec8d13faa8a370fe0b1fe28c0e714784156b747323ede30cca425a95
CVE-2024-30053,0,0,65fd346c7990f2cdd0711ae82d91c16e78b5a16baa5880e2cffcb953ec779622,2025-01-08T18:09:06.970000
CVE-2024-30054,0,0,208fd51c6e44baf0d897570f55f50e9e26e7f0682cb01924b044db6a064f4934,2025-01-08T17:57:54.547000
CVE-2024-30055,0,0,d40900a82e156b5f78aede24cf5411e3dbd4c61b795d8cc3395f093438a333c8,2024-11-21T09:11:09.297000
CVE-2024-30056,0,1,347fe50793d58ce0b74c4538ee1704257557dffe94bc7f90d6a7514a4e57a2be,2025-01-08T20:20:05.590000
CVE-2024-30056,0,0,347fe50793d58ce0b74c4538ee1704257557dffe94bc7f90d6a7514a4e57a2be,2025-01-08T20:20:05.590000
CVE-2024-30057,0,0,b9793e2532dfdaebb4194bb6e92ee863caeee414e13d6455dbf08c10146ae17d,2024-11-21T09:11:09.533000
CVE-2024-30058,0,0,20262ca43dabc2c08aa015c0c48b80c60a8e2b5adb6e58d04501640e7acc003a,2024-11-21T09:11:09.667000
CVE-2024-30059,0,0,3163a987284d43fc0ffca06b376cb917d6abd4a21ba6d05abf0a3e3c9f35694b,2025-01-08T17:33:36.930000
@ -254065,7 +254067,7 @@ CVE-2024-30176,0,0,aa066c55eeeca0fd6bb4beb9ec423ba6486b66e97848e6e3c1974ce998315
CVE-2024-30177,0,0,44c797d5a3808fe7f3d09ed56fa89cae0d3f4a517c94d374e7585b27408ea653,2024-11-21T09:11:22.287000
CVE-2024-30178,0,0,a5c303cfe3274dddc07583df103192092e5bee518dfa7fb8388fe33b5060991d,2024-11-21T09:11:22.410000
CVE-2024-30179,0,0,f8038176185d07e7f724f868e44725dee5d89f9e567d5a1272779cd6cb9c487e,2025-01-08T16:30:39.030000
CVE-2024-3018,0,1,f65a264962ae2b96d7ccf9718d594d89d33b43e0d817bc446c0cdf042d66d063,2025-01-08T19:35:58.073000
CVE-2024-3018,0,0,f65a264962ae2b96d7ccf9718d594d89d33b43e0d817bc446c0cdf042d66d063,2025-01-08T19:35:58.073000
CVE-2024-30180,0,0,9ad3efa7e683e4471ea88f07410b3c0c613e57d65ed8126b5bf9db13a8b4971b,2024-11-21T09:11:22.647000
CVE-2024-30181,0,0,4b63a15f923a825c1f6a8173bcb6b942101ded5f17f3fc266f511573c31cc6ed,2024-11-21T09:11:22.757000
CVE-2024-30182,0,0,0f6979edc5340254c61dbc0cbd7d4390e6b740ecdf6e9fd97a9d73ad11716bc6,2024-11-21T09:11:22.890000
@ -255356,8 +255358,8 @@ CVE-2024-31890,0,0,651fa0b1e1cfc65d537ba9b852527cb69af9fe2a04587dff5261b83358203
CVE-2024-31891,0,0,01ff6a81cab4a69609149b5caef3f483d0f0e227ded20c94a2b847f21423d70d,2024-12-14T13:15:17.630000
CVE-2024-31892,0,0,135dcdbc319a0ed23513a221119da13b2a8156f6458cff759f3b3e22d1b3e094,2024-12-14T13:15:18.877000
CVE-2024-31893,0,0,f9f7cc52ac70574dbdc37ee8d3b0b8ab46f5010ec8db22134e66e018bc4778d8,2025-01-07T21:03:12.027000
CVE-2024-31894,0,1,f0d62a7b5dc38de5d26022fd04cc616cb9f12689e57a87cc7f4e9928b0c8ebba,2025-01-08T19:58:17.603000
CVE-2024-31895,0,1,f50d5f04db53f9d81b5d66d792a53670922d68d4ae5fd0896a38dc1ac638ebb6,2025-01-08T20:03:38.133000
CVE-2024-31894,0,0,f0d62a7b5dc38de5d26022fd04cc616cb9f12689e57a87cc7f4e9928b0c8ebba,2025-01-08T19:58:17.603000
CVE-2024-31895,0,0,f50d5f04db53f9d81b5d66d792a53670922d68d4ae5fd0896a38dc1ac638ebb6,2025-01-08T20:03:38.133000
CVE-2024-31897,0,0,482d60ce194a404c922472f634fe27b65cdb7d56b2dfc2459272befae42533ec,2024-11-21T09:14:06.077000
CVE-2024-31898,0,0,2bdf434c4d06bca201e71e4a7c99060368586d3dea800b988968adc32062eddf,2024-11-21T09:14:06.253000
CVE-2024-31899,0,0,e3477cb6ba6850b36435640b21267340780a9020b61b2670506bdd2d9d1ba253,2025-01-07T20:02:40.877000
@ -256461,7 +256463,7 @@ CVE-2024-33326,0,0,21aa8e01fa03dd6d6983c046a97e309b8f5e7887cedc440d4110e4bf14321
CVE-2024-33327,0,0,39c302e73fc82a3f848eab9abfc551c2864d13ad719d483853a59c8a0053cf0f,2024-11-21T09:16:48.063000
CVE-2024-33328,0,0,33679c434ab91b1217203cab95e138c33f1c7ce1a4cb3bcfdfcb0621dc39cfc0,2024-11-21T09:16:48.327000
CVE-2024-33329,0,0,7067f41343ccda5aeabe46c2ce7e61ba4aab1aa536000e2f1a46e93ac72f75a2,2024-11-21T09:16:48.477000
CVE-2024-3333,0,1,328f7d544ff2f6b320e467b4f7d33f183d77029256027ebbd56ef5dbf319ceab,2025-01-08T19:43:24.987000
CVE-2024-3333,0,0,328f7d544ff2f6b320e467b4f7d33f183d77029256027ebbd56ef5dbf319ceab,2025-01-08T19:43:24.987000
CVE-2024-33331,0,0,9615eb671a81caf99447cfe3f11a47c5fdeef0f060420da831650ede0c65f0d0,2024-04-28T23:15:07.120000
CVE-2024-33332,0,0,e7e9aaf8deef139160b00409125515d32fa34515c193d220df574550f84c4ce1,2024-11-21T09:16:48.643000
CVE-2024-33335,0,0,611d5c247a5ed8c68e8c37144affed7213a93ec1992045174cf05e693148d5b1,2024-11-21T09:16:48.797000
@ -257732,7 +257734,7 @@ CVE-2024-34993,0,0,3429d7cf9bdcd8eab245a5626633f165ad9973223ed9ada1ce5ac78dbc5cf
CVE-2024-34994,0,0,37148eb30e1eae5ae546d9cfe367eceae1af9949507076df10b37b8a6f5888e3,2024-11-21T09:19:40.910000
CVE-2024-34995,0,0,abdbc2aef2da3b42556f78c65bc0781f5009a8f6a0313dafe6f17b909e933281,2024-11-21T09:19:41.123000
CVE-2024-34997,0,0,13f21ea417fd3af13763e4f3faf7aae4d611bc2d0b48b03ccb7937233e7fb8db,2024-11-21T09:19:41.353000
CVE-2024-3500,0,0,46f8e513d40461d38f694b77fb01ff81193905e93f0a98a738965ce837caec5a,2024-11-21T09:29:44.307000
CVE-2024-3500,0,1,3c8bc608b6ad5e8f952884ade0c885304cb5cb379f598ad860c126e127175de1,2025-01-08T21:22:53.997000
CVE-2024-35009,0,0,2e273427408b1e1fff4030ac74819540f868ad5b2d28acdf5d8d3e4f221aab8e,2024-11-21T09:19:41.613000
CVE-2024-3501,0,0,464f9599017e33b9cc1a4bcf26d473c5180d646688d6886bce3e5bd5ecc52e6b,2024-11-18T21:38:33.963000
CVE-2024-35010,0,0,a6fc656a98892420eeec5799d99fa4ae7352dad5dd7951f64589362d56d6fd9a,2024-11-21T09:19:41.840000
@ -258878,7 +258880,7 @@ CVE-2024-36464,0,0,24cacab9f7d27b304eb6f6bdbe25e10a247232e8a99785c34e9f4b22e14f1
CVE-2024-36466,0,0,ac5c096e99aeeb0fa27711ca22d2ffac4f2b2cd27652a43880a2ca285ef1be53,2024-11-28T08:15:05.290000
CVE-2024-36467,0,0,5e7c9feb825942e85216b48a8df1264717bc1143e08c34071fc19ccd9af44e8b,2024-11-27T07:15:09.080000
CVE-2024-36468,0,0,4d07a97e6229fa96a5beaca4686979827dcdfad71ecdb8cbc5dbb5d925944b83,2024-11-27T12:15:20.383000
CVE-2024-3647,0,0,c4f22548ab3ec06e65b06868835f3b288746c169c8dbe48ff7249f6929f90981,2024-11-21T09:30:04.623000
CVE-2024-3647,0,1,b8f0180f9ce86851720e736cd3cb7a8ab080972affce96fec42ec379c26f47f4,2025-01-08T21:10:47.357000
CVE-2024-36470,0,0,f497d2b42b52913e47101575d034bd9952ffeaf7f900eba3287e2da0f4794583,2024-11-21T09:22:14.430000
CVE-2024-36471,0,0,45b1b5747853880277d53a2288bb933531dafe70fc1359863c97a067db1b86ec,2024-11-21T09:22:14.553000
CVE-2024-36472,0,0,2141a82cf2963fc87ad353f49c6d6e9a36ee98eea852abcc6337f04d66077509,2024-11-21T09:22:14.733000
@ -259039,7 +259041,7 @@ CVE-2024-36740,0,0,26bb12c2c0bac7d2c18f8b182eb360b69df3faa918b57f2b0769297cadda4
CVE-2024-36742,0,0,3a8ac06d2b7460d92170f393580d757a9169bcf0cb47f2df5b6b9175dc24eef2,2024-11-21T09:22:35.287000
CVE-2024-36743,0,0,997f7cc47dfdd9276a067f7a34f5b7be0237277a0a3157d65da6a25a7753b82b,2024-11-21T09:22:35.510000
CVE-2024-36745,0,0,7dbdb6b068ebfce6206826a7b3683b8e3075311b55f148598b550b2d1cdd84ea,2024-11-21T09:22:35.730000
CVE-2024-3675,0,0,fb1951f8b1e662422afd95d095a7d04da868263ed5cd871d264d4f1d62b39e7d,2024-11-21T09:30:09.453000
CVE-2024-3675,0,1,320c0c6a821e66128af3b5683a2218c46856ee00dab3b257adbda9526c52d243,2025-01-08T21:11:01.357000
CVE-2024-36755,0,0,959c7e1c5392de2c0c9f9c3a5e5235cba19560b12ef4e2310e57761b2d2324b3,2024-11-21T09:22:35.883000
CVE-2024-3676,0,0,c25c73186d2926601a4bf9263de9e5912c4170cf55771346041257a143aab173,2024-11-21T09:30:09.570000
CVE-2024-36760,0,0,2eed0d1b029328b3aaf61411ac108b885b75813a77deb3defd7d8df3d154ccef,2024-11-21T09:22:36.097000
@ -259484,7 +259486,7 @@ CVE-2024-37276,0,0,8fa601787078a7d94291da07862d06b98f1c8d76701e8d01e1801face58b7
CVE-2024-37277,0,0,6bef2521d0e634706c130550687638a5e0ab6b669a9a86df1df6f2836a4f4834,2024-11-01T20:24:53.730000
CVE-2024-37278,0,0,1436c2c246d028569aadd71e09653ad12932a70965aba38322d19c40d94fb1ce,2024-11-21T09:23:31.583000
CVE-2024-37279,0,0,abea7d170e037ff0e94eacd5a1d2641ca163a9b9cff50d73ada60b93d302eb74,2024-11-21T09:23:31.710000
CVE-2024-3728,0,0,3a0b09299b721cb58c11a4a482c1d5aa0cb0ded740e62b28202762b1eef8a6b7,2024-11-21T09:30:15.667000
CVE-2024-3728,0,1,2f47ba3b88b08d1c7f062871db579ad3a810495a3df2f8082be944b99e745aa1,2025-01-08T21:11:21.157000
CVE-2024-37280,0,0,82506e10255538602ec664d5ef7d85f7e7cc96b02dfe2ddcef5bb9ae709eaf34,2024-11-21T09:23:31.860000
CVE-2024-37281,0,0,4249eefcbdc986d2244e44eaab8c4ce3c8b7e04bc410d0b79fef20d4a2687dce,2024-11-21T09:23:32.010000
CVE-2024-37282,0,0,b5291a34bd6835cc4058846acc023216aad27c69e44906c812e14449c733e7c8,2024-11-21T09:23:32.153000
@ -260196,7 +260198,7 @@ CVE-2024-3816,0,0,f305e4acc2cd1025a1370918c442df78de339ee2ce9d1a87478975ea74b49b
CVE-2024-38160,0,0,8df8b30ae0ff6dd707e13b8e5bb4d0b988ec335d0e3195b45ecbbdd83fb5912a,2024-08-16T20:55:17.013000
CVE-2024-38161,0,0,f142ae930f9c00d0046ea169748f3f89f8afc86cf3c0487dbd6a3bc3847d99c9,2024-08-16T20:55:20.973000
CVE-2024-38162,0,0,51dd4436aeac7c5a6d44bc9fd4f765bf31f337219fe537874e32898d21453037,2024-08-16T20:41:43.583000
CVE-2024-38163,0,1,6ef6bba2339797ed2f361dec8fdb3656af6316aedb2e92a430f2179d6e8a96ca,2025-01-08T20:50:00.877000
CVE-2024-38163,0,0,6ef6bba2339797ed2f361dec8fdb3656af6316aedb2e92a430f2179d6e8a96ca,2025-01-08T20:50:00.877000
CVE-2024-38164,0,0,0c0328b154209eee72c4c2b996e8e36b27e10dbabae46f853abf885606be6822,2024-11-21T09:25:00.093000
CVE-2024-38165,0,0,fbb7382711fe4184f926dbc31fc126a2e43b1a1048a8e4bfd1ea151c19eb0685,2024-08-16T19:06:22.740000
CVE-2024-38166,0,0,04cf30e3b63f293d3ec73e3105d8307baa08a61c7284be360a050ad5d3052ec0,2024-08-14T00:15:07.687000
@ -260215,7 +260217,7 @@ CVE-2024-38178,0,0,829695ca2f5f6f945a6d3078569a39880265f8104e95e17c838e3f5f685ef
CVE-2024-38179,0,0,2c5a894d01e51edb16258b3bed8449de0a4d319183d8d4f8067eaf441dbf7fea,2024-10-22T12:54:12.633000
CVE-2024-3818,0,0,7d1d39e82ad91d5622119f4ea866721b9898edf8d4385d793aef1e9795c74157,2024-11-21T09:30:27.840000
CVE-2024-38180,0,0,a6dec64e6de789e9b800b1526ade8a1dcd069f78672229cca40f4e8c4b02cf1e,2024-08-16T19:20:22.853000
CVE-2024-38182,0,0,63c4376a4109b242c6dd9e322aed342594af0df2094c12cf7ce68947c8a5f7cb,2024-08-13T23:15:19.657000
CVE-2024-38182,0,1,f0d85f191f16f62f849a41585c38c60c8eb5e729222a055e8f875398240fa5bd,2025-01-08T21:35:17.920000
CVE-2024-38183,0,0,4fc4c4d894ca7a1786bcb11ba2aa9fdf5a300bd2ad84fc8d48e71857af9b39cf,2024-12-31T23:15:20.933000
CVE-2024-38184,0,0,f3790a5c112e1dddd845eb925e9feb113ac28f72ae551cab2576dae91ee03932,2024-11-21T09:25:01.623000
CVE-2024-38185,0,0,68c185b6e79f5dc2fc3a388ef6a6d9c7412b6d63a7b5f660cddf1001bee86662,2024-11-21T09:25:01.777000
@ -260252,7 +260254,7 @@ CVE-2024-38214,0,0,c8a3fe534ac4e0e8bf788c36dd43983cd31bd5060c2468d1512da5b36d8c4
CVE-2024-38215,0,0,deb3c401dbb28a6d926f7ff657cf8d9f46c26096bbd4eabc027320dedbde5503,2024-08-16T19:02:41.517000
CVE-2024-38216,0,0,9b093a106d5fd0d02a2e9c94614cfe22ee0f0cfb522c3c7774659c5e003c6b62,2024-09-17T17:00:29.123000
CVE-2024-38217,0,0,8d8f866ba3fe87021a870e6ab87dc022261c6d1d86fa7560c508caa11a925a58,2024-11-21T09:25:04.820000
CVE-2024-38218,0,1,913e19eccc221b6d62bd3f004d9a23c4ecced5bf0793254c82e2e55052cab84b,2025-01-08T20:58:28.473000
CVE-2024-38218,0,0,913e19eccc221b6d62bd3f004d9a23c4ecced5bf0793254c82e2e55052cab84b,2025-01-08T20:58:28.473000
CVE-2024-38219,0,0,1cb1c7d90c1b0adb344a54b96084a8d918de46bca695ac4e743598772e7ef545,2024-08-29T14:45:17.383000
CVE-2024-3822,0,0,779d52ad248a43b7f0b2350ab4f001c9b17cb4419f53eebc20cfa50e7d11cad4,2024-11-21T09:30:28.323000
CVE-2024-38220,0,0,7a37fb6e0e0ac028694f1ea6a6ba861e1c9f6f01c7fcf480de64a061c04df8ad,2024-09-17T16:59:37.167000
@ -261732,7 +261734,7 @@ CVE-2024-4042,0,0,cecab8b1687d6be49a591036e1f884eeaaaac74f662dec1e0d521caf21f5dd
CVE-2024-40420,0,0,2cc64060c56a9cd8ae43221cc949a39e78df1f9a724e5e5fe2d1f288499041f6,2024-12-18T20:15:22.773000
CVE-2024-40422,0,0,66694de383944722e2f25fc6c01858a58042d8c38d3705e14f9fc82648bd4ecd,2024-11-21T09:31:04.907000
CVE-2024-40425,0,0,57fa5f5d788296fbd065197156216c884c87febf9dc0d47016294cebb94993ba,2024-11-21T09:31:05.133000
CVE-2024-40427,0,1,f6ae4b9565a1b165aec968eca0f69b1a73db818924dd66dd558467a4c9023363,2025-01-08T19:15:31.043000
CVE-2024-40427,0,0,f6ae4b9565a1b165aec968eca0f69b1a73db818924dd66dd558467a4c9023363,2025-01-08T19:15:31.043000
CVE-2024-4043,0,0,d4b5f95f306543d879cec12e990f7b6a12bdbc75a98caec12c24a6e719c63084,2024-11-21T09:42:05.460000
CVE-2024-40430,0,0,546dc110e07f45ee3ffd84e8af87c8ef8c5f6d93dcd27e587cb3a3c5233f7799,2024-09-13T21:15:10.357000
CVE-2024-40431,0,0,e23592fbcb9fa660acf205a0231389b077a5c59972c85ee664d839efe06b83e4,2024-10-25T12:56:07.750000
@ -262625,7 +262627,7 @@ CVE-2024-4171,0,0,1f56b05b395cd02714b648c07b8a801ca2a6b7d7ba94332e3b402d08208eaf
CVE-2024-41710,0,0,837dd028ed039442f3fba358e71963b23cd81e157e2fc72a4188e4393c3eab4e,2024-08-14T18:35:06.257000
CVE-2024-41711,0,0,68dd962f9a2631075d76b0f5dc2808ef613409420c9c9f99aeacaa5e6120b709,2024-08-14T16:35:15.033000
CVE-2024-41712,0,0,2f73817818761739ebd31e3092aab4346b1ccc796b65799081ae94b063a67a15,2024-10-23T21:35:05.607000
CVE-2024-41713,0,1,3487c8ff851c3a481ae23b368979a3242ff57f7c48f30db291ef2ed6aefdd218,2025-01-08T20:31:25.237000
CVE-2024-41713,0,0,3487c8ff851c3a481ae23b368979a3242ff57f7c48f30db291ef2ed6aefdd218,2025-01-08T20:31:25.237000
CVE-2024-41714,0,0,194b12585502057ff43eb474c8822c4bfff8557ec724eea446f51fa6890f4643,2024-10-23T15:12:34.673000
CVE-2024-41715,0,0,2b361ed47bf6f81c6f17e8f44a6337c83a629e946281f8818c6e5fb6899097f4,2024-10-17T17:15:11.530000
CVE-2024-41716,0,0,ab9b276c3da529c12bb40ef0d240bdb9954f1f4c86c22f5ce809e71a30285125,2024-09-13T19:53:47.723000
@ -262961,7 +262963,7 @@ CVE-2024-42103,0,0,e9d1505615759d84b473a923219bea4c374e074e16b9df0ad5a10e4744ccf
CVE-2024-42104,0,0,37643f8ca9c0f5ea248c66fc49683931b4d627367cd8eddcfc0ca016c3bf1fa1,2024-11-21T09:33:36.543000
CVE-2024-42105,0,0,03e955b522490db0edaa227d4d15e3601e0044286b6517c93bbbdcc4c8e9fb6b,2024-11-21T09:33:36.693000
CVE-2024-42106,0,0,3bfd515eee852b0f11ba9fb55133cd8305e17e0fbed4a149536610f3ac78c9c6,2024-11-21T09:33:36.830000
CVE-2024-42107,0,0,f70e81876b6809847de88b301b26601763686f95ee363215a5d108be46731816,2024-11-21T09:33:36.967000
CVE-2024-42107,0,1,7dfe60daa7c3bd6e1edb30da6d94fb531f783127afbef2ae222dadb30efd2cf7,2025-01-08T21:32:03.527000
CVE-2024-42108,0,0,d5a469d5957316edbae938180a1d5e1c7bf006df0a49a7319d022d93a92d5108,2024-12-19T19:15:07.023000
CVE-2024-42109,0,0,b37ad7c335453468153db5a09c0eff792186c290c2f1d13a1164b459f17bf15c,2024-11-21T09:33:37.223000
CVE-2024-4211,0,0,3f4d9c089b9fcbdc49f631c3140d7bb6d7f76e9aa4ec903c896a2b0845e1a5d2,2024-10-21T16:15:09.963000
@ -263249,7 +263251,7 @@ CVE-2024-42422,0,0,f64eacceb341ef4b768f40ee59a3acc8f645f72652a962c616340fa5fb7a9
CVE-2024-42423,0,0,8264e3551cb249dc1d0a50016c0beecba4be32a4ea61b5936f8d0d7397afda33,2024-09-20T19:42:20.417000
CVE-2024-42424,0,0,cdd20f106ec5d8232f1cf93d7c25f7e27225ced2de6387354bfbd69f26558307,2024-12-20T14:41:45.593000
CVE-2024-42425,0,0,4b136399741737f30b4c8074218caee04298fffe4ffb70bb1828268e47340c65,2024-09-16T15:46:03.110000
CVE-2024-42426,0,1,542eed5457725706713e83197f6e7952048061b311624c0a21287ef612b42519,2025-01-08T20:06:04.867000
CVE-2024-42426,0,0,542eed5457725706713e83197f6e7952048061b311624c0a21287ef612b42519,2025-01-08T20:06:04.867000
CVE-2024-42427,0,0,e27087303ea5100deec42ac0b4f9f58e1be3170e3db42adb071e149bc5ec50df,2024-12-20T14:43:52.363000
CVE-2024-4243,0,0,fca6a85a4835b49fddf5d0335fd4a7549a8fc3f34d76f463d721c47ebcb74e87,2024-11-21T09:42:27.497000
CVE-2024-42434,0,0,9351c3a6511f8bd4654b992e3a2dc28615806892c5ceb04ccff2f3cbfaf8ce4b,2024-09-04T21:35:50.963000
@ -264261,7 +264263,7 @@ CVE-2024-43774,0,0,267603d5dcdafd9bbb030b267307fb5b633f3e8c3df39d738d42af146bd76
CVE-2024-43775,0,0,895151aa205f09b9fadb348edccc220463b0287de3568477154d6fffb476bf97,2024-09-04T12:27:22.670000
CVE-2024-43776,0,0,0e7377c058f9e86c53a9fbcebac62784c97230bd50dee78fb2efa5dfee29a277,2024-09-04T12:27:40.113000
CVE-2024-43778,0,0,93d68d17e0a2e000a95bbf7644af02e0b191bd578d600aa43c2fc854145868d0,2024-09-20T12:30:51.220000
CVE-2024-4378,0,1,d4319ee5339d2a9817c61070bfcf510c89afd3406f28aa380fe0de9169b486dc,2025-01-08T20:07:57.800000
CVE-2024-4378,0,0,d4319ee5339d2a9817c61070bfcf510c89afd3406f28aa380fe0de9169b486dc,2025-01-08T20:07:57.800000
CVE-2024-43780,0,0,46050aabd5861673e59431ba81794de47ac0366f2a10d4dfb8ab15f44f094284,2024-10-16T20:07:50.637000
CVE-2024-43781,0,0,169ded40ca31dbd1f0dfd97b5659e936ba8664c1c6e73ed600899e39b741292b,2024-09-10T12:09:50.377000
CVE-2024-43782,0,0,80ce351b892b39ea82a01db8909423e89d3634e1531e17d24b79841d353bdee4,2024-09-12T18:29:50.943000
@ -265361,10 +265363,10 @@ CVE-2024-45335,0,0,df1b52d83b5212b89c08532eb4b3f1fce61dd8609884645d9cc9fbfcae221
CVE-2024-45337,0,0,0204a585b71dc2eafeae0a7aa43ff297085c36ff7e1720071b48d72e387539af,2024-12-12T21:15:08.500000
CVE-2024-45338,0,0,4b2d696f8670e697ae1161a5584acef0120067536ac2182d79f6e6c35006631f,2024-12-31T20:16:06.603000
CVE-2024-4534,0,0,05ec1ad9bbf04373d4c888e50c4da6ee25a8849a5c55f74fc5c0d8923189992d,2024-11-21T09:43:03.287000
CVE-2024-45342,1,1,a4a31e9769756ae24649b74b18bd2d95ae5ebb0482440ad62570ce13c5ec4304,2025-01-08T20:15:27.583000
CVE-2024-45343,1,1,318ff9ada4e764bd6c635c00720e7b9030062bb890baf82a7e3f16a4a83b72fb,2025-01-08T20:15:27.690000
CVE-2024-45344,1,1,af604bd20c17ff15fecd0779ea006a02560ba533390f654e0b99f1b752eeb5b0,2025-01-08T20:15:27.753000
CVE-2024-45345,1,1,4e5002e5dc81035c1af4e238f5f319df35e1e7454ff3bb9f51dea50624303a65,2025-01-08T20:15:27.843000
CVE-2024-45342,0,0,a4a31e9769756ae24649b74b18bd2d95ae5ebb0482440ad62570ce13c5ec4304,2025-01-08T20:15:27.583000
CVE-2024-45343,0,0,318ff9ada4e764bd6c635c00720e7b9030062bb890baf82a7e3f16a4a83b72fb,2025-01-08T20:15:27.690000
CVE-2024-45344,0,0,af604bd20c17ff15fecd0779ea006a02560ba533390f654e0b99f1b752eeb5b0,2025-01-08T20:15:27.753000
CVE-2024-45345,0,0,4e5002e5dc81035c1af4e238f5f319df35e1e7454ff3bb9f51dea50624303a65,2025-01-08T20:15:27.843000
CVE-2024-45346,0,0,42bcf491a94494c9433ce7696078ac7ab2eca46d8c28dcac4158f4b2b20fa4a5,2024-08-29T03:15:05.247000
CVE-2024-45348,0,0,1e1db77a5a16312aa537fb47b5ac485ad4a9ec1edf7b08e9d1addf2cc98471e9,2024-11-25T17:14:11.713000
CVE-2024-4535,0,0,09bcb906ab5065886bd16710eccdce15006e447ef07dbc5cac7e797ac8618de8,2024-11-21T09:43:03.457000
@ -265558,7 +265560,7 @@ CVE-2024-45622,0,0,b710e3973bc54105a6c52433711f835588415a56a038ced9ed7020c8b95ca
CVE-2024-45623,0,0,5c441374691aca3d3dc1871007085f3589123ddb707473a40f59605250fae5e7,2024-09-03T15:35:15.360000
CVE-2024-45624,0,0,b55674d4570db6379ffcfb68d511bfd6e80435e71433865e310cb34f4d504a6c,2024-09-12T15:35:48.600000
CVE-2024-45625,0,0,d20161a4995ace7748c12e338379fbc120e9cd3065297a8eb4465406af4a3f9e,2024-09-10T11:19:40.113000
CVE-2024-4563,0,1,b89c6e32d64d62a8b24c69598703856273065e960659587d8cad79f58476b289,2025-01-08T19:51:35.093000
CVE-2024-4563,0,0,b89c6e32d64d62a8b24c69598703856273065e960659587d8cad79f58476b289,2025-01-08T19:51:35.093000
CVE-2024-4564,0,0,ee8f47044242c05a630f54d8d399a7051500b8cbd4c8fa39ec50216846d2f2cf,2024-11-21T09:43:07.050000
CVE-2024-45640,0,0,4f7258d4a10770dd15c770b196db9f2c63abfae563acccd54bf2aa4b6de18d73,2025-01-07T13:15:07.690000
CVE-2024-45642,0,0,cfb188922d2de3d0a2e624109932e190c43782f5c9c1e7fb30a5b975a8a432ea,2024-11-16T00:13:06.017000
@ -265988,7 +265990,7 @@ CVE-2024-46597,0,0,c52dc232c382bb8b06d8853357df9fa3c69df01498ea057ff4e6221b106d8
CVE-2024-46598,0,0,cc14f076324de01fb0aedc665220d3a3ce311adfb4ca6be3700a7951d6f4c5a6,2024-09-24T16:37:39.833000
CVE-2024-4660,0,0,61cefac851d738e6211130f613c3c24b72cb5a59425ed2099eb13a6958c5f9b7,2024-11-21T09:43:19.410000
CVE-2024-46600,0,0,a2edf2944e549d9be47dd52eb91fd1fdfd1682be8e1c383075c7935775b4a0c4,2024-09-26T13:32:02.803000
CVE-2024-46601,0,1,a16e25e4092f7703bd60435f36d4f4383300a868d570208b6df199e7fbcdbc35,2025-01-08T20:15:27.920000
CVE-2024-46601,0,0,a16e25e4092f7703bd60435f36d4f4383300a868d570208b6df199e7fbcdbc35,2025-01-08T20:15:27.920000
CVE-2024-46602,0,0,9bf065832521a48ba06a7d71177908b2b7ce3608232449bb38e1d8f5f48286b3,2025-01-07T19:15:32.597000
CVE-2024-46603,0,0,c30a25f7b88dcc01303c233fbff3cb3e51c22a29f42bd3bc5cdd7863e4696348,2025-01-07T21:15:11.983000
CVE-2024-46605,0,0,1055d0ef26a73f5e645f2fdb8709387122d75ec2801b9b56966b3a9b26aba333,2024-10-18T12:53:04.627000
@ -266072,7 +266074,7 @@ CVE-2024-46711,0,0,1222b9c2b9d6ec4a363865be966308156a25e93fd22779e56d5e1515f08ee
CVE-2024-46712,0,0,0fdcee671c653661bb3df2e51c82e4650050d2f6ee04a8ebc9f4162b97c4c552,2024-09-19T13:09:22.957000
CVE-2024-46713,0,0,a6f4ee9871c0b122806551f92aee6c4bb9f19a62163eec4e9b4f68119693903f,2024-09-13T16:37:22.997000
CVE-2024-46714,0,0,85945af8eaa7caa4292985820578b6de456405cc547cc7a2cbc8d6549e9b6e00,2024-09-30T12:50:27.723000
CVE-2024-46715,0,0,f6acc12b1eecea12bf9d6f195b39a00b75ddb201277b4ad1fc8ac95e25d25405,2024-09-20T12:30:51.220000
CVE-2024-46715,0,1,3b67fd96df7c47a51127ebed9497a1cdeb29999b280773af49c38e601a9726a4,2025-01-08T21:30:44.227000
CVE-2024-46716,0,0,285e828ee8aa50fa4c3aa4bd8a3abe4a01c20af8ed00007aa5c1fe4778857afd,2024-09-20T12:30:51.220000
CVE-2024-46717,0,0,cd61e7eb874e3f98372d85a33e9e40d7e36ee1787456cd2287e7b17844f088a5,2024-09-20T12:30:51.220000
CVE-2024-46718,0,0,900cf0c6c1a69e700d46f12e93b7fb3c7ac208373a9c299b455c66344a9143ca,2024-09-20T12:30:51.220000
@ -268174,7 +268176,7 @@ CVE-2024-49701,0,0,faa8cd67d7f87e8b700116e3ea01c26a0bace35a674e83df64e802c479757
CVE-2024-49702,0,0,95504b65313eac7b0c032b66b56870b8b510aa5556c8e61dadfd6a9c41944713,2024-11-08T14:32:56.010000
CVE-2024-49703,0,0,773f468dd20b89d6b077ffb05058547737a4c510a41e2a52930200811683b9b8,2024-10-25T12:56:07.750000
CVE-2024-49704,0,0,011946741b0918ef57c6cb1900342b7378aadc477a57c2845fd73363988334a5,2024-12-10T14:30:44.573000
CVE-2024-4971,0,1,17f65e33f654be41e85b2c190603b91b92e7c1a1f8fa7f8e99556cdd76507595,2025-01-08T19:28:26.847000
CVE-2024-4971,0,0,17f65e33f654be41e85b2c190603b91b92e7c1a1f8fa7f8e99556cdd76507595,2025-01-08T19:28:26.847000
CVE-2024-4972,0,0,6d57573ddd08bf2299e1f6597809329f00babdc0f3ad1d5869880ad1a42cee17,2024-11-21T09:43:58.863000
CVE-2024-4973,0,0,19ccbb7e67bd4c75d6b883a0abe41227afb09f5e151258438b28388488924a3a,2024-11-21T09:43:59.010000
CVE-2024-4974,0,0,d16672721f53b136de1b80de87435b925886996f97e506cdb2d6dc9e6ef8a3f1,2024-11-21T09:43:59.157000
@ -269335,7 +269337,7 @@ CVE-2024-51431,0,0,828fd39fe0bf7bfec25d83e9c0a08cb7b9c4b5cc6704676ba7781e14660e7
CVE-2024-51432,0,0,90d6088b4b691a13d46bf67decae9a8dc78d3184ac661e87666bdc2bf7a4111b,2024-11-04T22:35:10.037000
CVE-2024-51434,0,0,fd0f2e493c6557b3a7b75698795afa3b125b8838b7989d6283ab0195617010c3,2024-11-08T19:01:03.880000
CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000
CVE-2024-51442,0,1,35e63d5f1781e450c7e8c0c28531cca65bad128d0eee09f5a8d21bd8b9f8ce4c,2025-01-08T20:15:28.137000
CVE-2024-51442,0,0,35e63d5f1781e450c7e8c0c28531cca65bad128d0eee09f5a8d21bd8b9f8ce4c,2025-01-08T20:15:28.137000
CVE-2024-5145,0,0,1ce6a725d120216d833ed23f25099d9f4810ecb9d4c63ffcf11012cbf68534d1,2024-11-21T09:47:03.920000
CVE-2024-51460,0,0,0d1d0884deead80ce10e102d7fe3745fd378c1bb1816cc36f4177c2f9263fd37,2024-12-11T13:15:06.510000
CVE-2024-51463,0,0,c0364c05afe1e0b2d0890e7f96c1b512b7afe4d3c2862d4a930e0585099ce1e6,2024-12-21T14:15:21.453000
@ -270352,6 +270354,7 @@ CVE-2024-52862,0,0,38d6d5355e836074358c16f05c0d64f338c50e9ed2c4ba8e1c39a7c2a8895
CVE-2024-52864,0,0,5aed2598110b254c3d64ec7569ade01fe6bf6ea08bd9b96449615a122a0e7958,2024-12-13T17:37:46.930000
CVE-2024-52865,0,0,d77c984fda3ac5b6322fda83849195e30728a895341439024cb7eb650daf701d,2025-01-07T18:15:19.667000
CVE-2024-52867,0,0,b14a9f7c8b0d212f056e38d3758777be722d9d6a10918da14d6ef6ffa3fcbd7e,2024-11-21T09:46:35.283000
CVE-2024-52869,1,1,0e1bcc211838c1a54b69a90e7890a77934c3c88694b0d9758ed37975ae5d553d,2025-01-08T21:15:12.523000
CVE-2024-5287,0,0,ede9629ba14e7833d0e00ab367a4e2205145f22a5dce3f4d9b720c5001bdf2cc,2024-11-21T09:47:21.753000
CVE-2024-52871,0,0,bc912334ad7760e2905477f1da15c92d58ec818da9de2502b7206c7a0336bc4d,2024-11-18T18:35:09.027000
CVE-2024-52872,0,0,d5c137691ac8affde2eb9f0d98f11a2242b42b7ed558ce4003950a43927045f3,2024-11-18T18:35:09.270000
@ -270599,15 +270602,15 @@ CVE-2024-53195,0,0,40822fada027fbaf05987cc9ce8f2e124b2f2431fd5b4c0d0b70ffbb4d2da
CVE-2024-53196,0,0,669eac4dafb6edf221cee20cd1683d2b1f89e85f60c1d2407e34dd687651f534,2024-12-27T14:15:27.267000
CVE-2024-53197,0,0,2a02fe43ca0d2ec1b7735c0353b4e4bd40b3a62fa3d7d938d0e84d17e1a7da5e,2024-12-27T14:15:27.383000
CVE-2024-53198,0,0,f76e0b82729683820652f1234ba21a690c649007ef042099a42d2c297481fc8c,2024-12-27T14:15:27.497000
CVE-2024-53199,0,0,340a0d542c843405ff1093a5716faafd3c6aa3928e65460fd3f70bfeb9fc29ac,2024-12-27T14:15:27.623000
CVE-2024-53200,0,0,eb517e426a859155b82def8ac15cf8fdd157a56ab9cb8cc70d8605f3f24d1258,2024-12-27T14:15:27.733000
CVE-2024-53201,0,0,91d8b11d9db782848c273e96387188cdd4ce8d721088db1edd76f1846d079e2c,2024-12-27T14:15:27.853000
CVE-2024-53199,0,1,b7d164e48aa05e3c01fb8207aa331e220207154288cf87cf44ac3ccbb8685b3a,2025-01-08T21:29:46.280000
CVE-2024-53200,0,1,382e2ed7c91ff816c9972e95788547d617ab94e25d45361504cd38a28e7c4e1f,2025-01-08T21:29:35.877000
CVE-2024-53201,0,1,c711eb722b8f180d53de7616fe5e83ef81c9c735e27696929f70cbb31bb1797d,2025-01-08T21:26:58.670000
CVE-2024-53202,0,0,7d23e49d3acff80a64d7280021d5b5a203b4ae3822284474ef22a299df0b3198,2024-12-27T14:15:27.970000
CVE-2024-53203,0,0,5b84b307ac617b2733d67355e11a8602cacf08603e863af6ef90308e193fa443,2024-12-27T14:15:28.083000
CVE-2024-53204,0,0,a67dade237e65bb4a6674739087981fbee3f96204ef4395e1de0111b2e3875f1,2024-12-27T14:15:28.207000
CVE-2024-53205,0,0,310e80c96eec5b9caeb40d4ac42b3fdd15b85eabb0a1c3c5481d29db45eb8c48,2024-12-27T14:15:28.340000
CVE-2024-53206,0,0,268ffd34c64b364fd0d3805c6b95329cc878e29dffd09db69b06c8766424586d,2024-12-27T14:15:28.453000
CVE-2024-53207,0,0,b666c494ce96c52e32b1ea784a2f41ec1f2899053a397e9626ef6224079275b3,2024-12-27T14:15:28.563000
CVE-2024-53207,0,1,eb965d61db6125837dce0de6ef3af14c44ea9331488a35d8508a0d1b2053b009,2025-01-08T21:26:42.470000
CVE-2024-53208,0,0,63742018889492dd1dd5b9e0af113e5a83b85a62bad173e2517dd29f6597d6c4,2024-12-27T14:15:28.677000
CVE-2024-53209,0,0,250dcad80d4d09ca7de716f0788117fc7d9f3ac4ecadd8b7cf17ab3f32be6e8c,2024-12-27T14:15:28.793000
CVE-2024-5321,0,0,0f218b8b6fcc3fc0b4ccef7040ede5ee801dc8e00258e6450bd3f123b6e73ca4,2024-11-21T09:47:25.283000
@ -270624,7 +270627,7 @@ CVE-2024-53219,0,0,1b00affd94d61b5de19fb81e8faa16b477bbd2cfbef7cdbfc96c17cbff884
CVE-2024-5322,0,0,6e9032fa3deabc9be71dae1989b7f0a781e1608a9b8c8f048902e90e4caef6d4,2024-11-21T09:47:25.413000
CVE-2024-53220,0,0,f26063a76be1c0bb3c1467e74b1938b9624affbdebeb012a0b5099418d517cde,2024-12-27T14:15:30.077000
CVE-2024-53221,0,0,c8102bf3e45423d3a5b6f80cdd7023cf3a790a173fe11da52f6b9a7e049785dd,2025-01-06T17:18:20.647000
CVE-2024-53222,0,0,f47a5510f6b23d61cde71f55aaf5c70eb4fbab132cd4c256d01cfe97bfe4ae80,2024-12-27T14:15:30.327000
CVE-2024-53222,0,1,f2c4441be714582636df5f4fbfdb327d4a44fc5f203c669f2bde6089ed7ac932,2025-01-08T21:25:39.027000
CVE-2024-53223,0,0,1fb9775898b8edbe24341acf3f71ecbe157ce3c086c57964866b83250fee9b02,2024-12-27T14:15:30.453000
CVE-2024-53224,0,0,336b7f256f93ca4c42653234db59c438e5694f32d74f85e7f140e28d6a850d12,2024-12-27T14:15:30.583000
CVE-2024-53225,0,0,54a582b699de817df243bd1fa3b72bd7fcc44132f78acb35cb6f8a61ed85e2ca,2024-12-27T14:15:30.687000
@ -270747,7 +270750,7 @@ CVE-2024-5351,0,0,a2df3cc9be27d64a2cd3dc5a2f1d5f6a44f6e98794670e6c0c19928c9af58e
CVE-2024-5352,0,0,afede3a744404a4b63e0d831a5ec0e86e744b459100c94c26c1030a6d60025a6,2024-11-21T09:47:28.743000
CVE-2024-53522,0,0,7466344c37c80a75f9949c9a474636edf28718607b90a0d9bf7bdac59eda3ec3,2025-01-08T16:15:35.343000
CVE-2024-53523,0,0,62264463ec7bd597c8cd954da8d0baf08b58aa4c7ac24397d44469055812e6bd,2024-12-11T17:15:20.073000
CVE-2024-53526,1,1,ede57fae3431829224893dc09bc40f4c776204f72e0aae08407837c7556dcee5,2025-01-08T19:15:37.753000
CVE-2024-53526,0,0,ede57fae3431829224893dc09bc40f4c776204f72e0aae08407837c7556dcee5,2025-01-08T19:15:37.753000
CVE-2024-5353,0,0,797e03a5615e2bede928ac816012d8783c471de5bd74a0480881887afd7a657a,2024-11-21T09:47:28.863000
CVE-2024-5354,0,0,e179ff0fdd33289a32ca4c68c73a51c0aa8ddee9c94944cd1d4fd7185f36a76c,2024-11-21T09:47:28.997000
CVE-2024-5355,0,0,5ae56d862872a5268a44df2d0e26a54aa307acbf5ff2835727472c989e377b6d,2024-11-21T09:47:29.130000
@ -270756,7 +270759,7 @@ CVE-2024-53554,0,0,21a54d7bc341c058102c672add5c6a39faba0998e6b5d3050bab27868ab59
CVE-2024-53555,0,0,98c9cd71300d5c5a0ee8cfe56c2efb641372e5ee4508b44193ca67680ed7c7bd,2024-11-26T21:15:08.560000
CVE-2024-53556,0,0,197a1e9e5d0cdfa43597989d9978403511315370ea045225b596c7a587a5fd41,2024-11-27T17:15:14.917000
CVE-2024-5356,0,0,8f1946b6e2ffce8dd75d8f13404335223fd7f289a256fdd41018e919f0c821b6,2024-11-21T09:47:29.267000
CVE-2024-53564,0,1,7ea83dd4228ad9fe306e60deab2e4027cefc6d3838f1d5c87cada287f927dfcc,2025-01-08T19:15:38.050000
CVE-2024-53564,0,0,7ea83dd4228ad9fe306e60deab2e4027cefc6d3838f1d5c87cada287f927dfcc,2025-01-08T19:15:38.050000
CVE-2024-53566,0,0,fc369a1b56664965996271c6928e1c8e2a064ca2d4eb527d8b2effd8b48ca032,2024-12-02T18:15:11.500000
CVE-2024-5357,0,0,9057606a4938c9bbcd6685626eec47e410331b31cc1665fb8c9e75b9a990e3a5,2024-11-21T09:47:29.400000
CVE-2024-5358,0,0,ba9d3d6f584bd09e4f2a4dbb07d0235a0771fbffd077ecd2b7b801a3c6466c2b,2024-11-21T09:47:29.543000
@ -271034,6 +271037,7 @@ CVE-2024-5399,0,0,288e52e14a6c0d307abe51f4547e4c97fb8609187689201d5c80525711bdfe
CVE-2024-53990,0,0,c12d8d6491761b84e3c9cbf6d8d0ec68eb0e2a55a4d29316acb646b0bf606b88,2024-12-02T18:15:11.753000
CVE-2024-53991,0,0,1aa3d39cfb5149ae5d3c6a1fbecf948ce6ac704feca22e25e4683b08ebe298d4,2024-12-19T20:15:07.670000
CVE-2024-53992,0,0,0b3a35495bb74067a0d76912041d2b5ea6535fc009d5110d24df3f489d2b8ff8,2024-12-02T17:15:14.113000
CVE-2024-53995,1,1,fd999c775946ba421ca996b1d1eac859e635f45fd6d33cfb33931dad116fe251,2025-01-08T21:15:12.703000
CVE-2024-53999,0,0,9f5b40515f60aea6e9321651c1e98cb4d03b442ece2375483b9e36332d7840ba,2024-12-03T16:15:24.250000
CVE-2024-5400,0,0,fa1089745765c8c92c3b698eeb8bc3e2fdf4bae4a68ce66e55e2111c1b051015,2024-11-21T09:47:34.830000
CVE-2024-54000,0,0,52062f56a88a90280cce905a1f064658e0e87c6309ff02349950b495d69ff132,2024-12-03T16:15:24.380000
@ -271046,6 +271050,7 @@ CVE-2024-54006,0,0,6bd5efcea443530b6f536e39e0d35c4df9fc909f18659576dbacb0ce5ccde
CVE-2024-54007,0,0,796fbe1a2dec13fc9ac82cc0124bd0d476bde5dd7ac7433c3ded9782c4bc47c9,2025-01-07T19:15:32.927000
CVE-2024-54008,0,0,eea0fea8f522a304d841eaa6b0b75d4fade41407f80f4626ca71a3072a5c233d,2024-12-11T14:15:19.713000
CVE-2024-54009,0,0,57a4bb8c66b26b4000e58cbef542e2f0e67be86fc478ee09e8a3296c8cd7f828,2024-12-19T23:15:06.887000
CVE-2024-54010,1,1,b04b4830cc7fb027e8ccc476bc48098c8473d37fe42c62b91bf9299fec2ea80f,2025-01-08T21:15:12.900000
CVE-2024-54014,0,0,fef0a2723f6d0eb99b08285b0e1281168729dd64327291d1bbdb15f503c04c5e,2024-12-05T03:15:14.530000
CVE-2024-5402,0,0,369141076231aa822f3b7e1a9c4a08753a10cb13fa106f65751574195737991f,2024-11-21T09:47:34.947000
CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000
@ -271508,7 +271513,7 @@ CVE-2024-5480,0,0,dcddee05a122e48deec7dd054d03a98cfc3767234733af70ab63ade3136481
CVE-2024-5481,0,0,6aaa03c1e132f74e5c4e90ead29bd24eb7065ad2c73e1f2805fbc82099451674,2024-11-21T09:47:45.877000
CVE-2024-54810,0,0,98b1b32485df996df7d9929d6a4a4f3f6576d87de7e3a8405b0f88648f287e10,2024-12-13T18:15:21.707000
CVE-2024-54811,0,0,c518d2be0055f2f694c9ca48885a5257eabcc0287b36c8555688778fe5e578d7,2024-12-13T18:15:21.940000
CVE-2024-54818,1,1,107ce36bb49927696cb73b8a0138886f2981d404615a80bdf8340dd3abd3f997,2025-01-08T20:15:28.303000
CVE-2024-54818,0,0,107ce36bb49927696cb73b8a0138886f2981d404615a80bdf8340dd3abd3f997,2025-01-08T20:15:28.303000
CVE-2024-54819,0,0,5c1961a544502914eb3b6471593c9f93ff2e75de98f3ccb61d07b0e0c14fa158,2025-01-08T15:15:19.317000
CVE-2024-5482,0,0,201df0de22cd2de6baef389275fa06366007791ec5f711f789012d102cd7d319,2024-11-21T09:47:46.010000
CVE-2024-5483,0,0,079d428e5ef1f2457bdcfb946982be872b42b40e94b6bfbc28ab3fe49f413326,2024-11-21T09:47:46.130000
@ -271557,7 +271562,7 @@ CVE-2024-54983,0,0,149f3772b456c1ff99a44fd44b0ae178f010b2926690711624e998da7ad36
CVE-2024-54984,0,0,3c6b13090909d3934507dc7f38f4e66c664045495e844f3883a0db8064e98820,2025-01-07T15:15:10.720000
CVE-2024-5499,0,0,bbe4dd69894f0f98fba609f59dfd6e7af7f9cec1f980c4939ff30b774a53a4b5,2024-12-26T16:07:06.693000
CVE-2024-5500,0,0,280f34db2c8783872a68d6daa217e3e1e4614074bb8e8b0a741315b28d98613a,2024-11-21T09:47:49.373000
CVE-2024-55008,0,1,46155f9f511c9f5f76f29eb42e0ab350c4f420855b69bdcc893ca8113faf6544,2025-01-08T20:15:28.467000
CVE-2024-55008,0,0,46155f9f511c9f5f76f29eb42e0ab350c4f420855b69bdcc893ca8113faf6544,2025-01-08T20:15:28.467000
CVE-2024-5501,0,0,c16d3f86bb6f5e02795073b49cb84dc8c7e7a5718a6fed025ea914c4721b4cad,2024-11-21T09:47:49.573000
CVE-2024-5502,0,0,5a18d45bd85121e2ecc06d05133613fd7aff163eb02902343f6ea41930ef607b,2024-09-12T21:05:37.880000
CVE-2024-5503,0,0,9845e42fb1624974feec370d0d7a831f8d27d3205ac47bd2622c9c03ded76cc7,2024-11-21T09:47:49.763000
@ -271627,7 +271632,7 @@ CVE-2024-55407,0,0,556b85e1087b7070a9c561b1629c1e863de59c432206201377d38b83402ac
CVE-2024-55408,0,0,f29d22484915f373690eb82371db4cff76b365f8201325c0d76b3e731d67ff58,2025-01-07T22:15:31.260000
CVE-2024-5541,0,0,f9b4d455e6b62fc87b5177b190c5e5d55cffd60f56e01c7f957c7d36f3e08c46,2024-11-21T09:47:53.453000
CVE-2024-55410,0,0,a341b2a61f8dc44291b67917ab046b0ca56af6f84ecbeba25576f5a2ddd34b5b,2025-01-07T22:15:31.423000
CVE-2024-55411,0,1,e79315ed14538192b3442e269ae3df7163b086fe6589e73b0be27cd11820e5cb,2025-01-08T20:15:28.640000
CVE-2024-55411,0,0,e79315ed14538192b3442e269ae3df7163b086fe6589e73b0be27cd11820e5cb,2025-01-08T20:15:28.640000
CVE-2024-55412,0,0,492ff029e687dc426b43e155e183e30d83635b8bd9198a179052d60e8971056e,2025-01-08T16:15:35.527000
CVE-2024-55413,0,0,e71132936dff763cacd1e3af9fafa9260fb08cafb24be1848dd04f5f45cfd409,2025-01-08T16:15:35.717000
CVE-2024-55414,0,0,9fbe004e5b78117f4dbe49f0ac8bd9b93d7d50832df3cfac0515d848006dd754,2025-01-08T16:15:35.883000
@ -271658,7 +271663,7 @@ CVE-2024-55513,0,0,fedcaafc6e85e6bd74dcc7a40ecdf11b2568dda1579c04082d671c5acf74e
CVE-2024-55514,0,0,1ab6d03dbd59f8b12772670ec93c7ec4ae46219483a32dbdb16b58811fc912d3,2024-12-18T16:15:14.900000
CVE-2024-55515,0,0,aa63dd224a4ced8fb9deb1eadd4b58815859b25e0d9ddafab8ac8045b9bd13ff,2024-12-18T16:15:15.090000
CVE-2024-55516,0,0,4229f59dc90fe9b1d907ed2bb61094e572306fdea72c70c9a7f771b2d9b1733b,2024-12-18T16:15:15.263000
CVE-2024-55517,0,1,75c5a4d411c549a5d957f7b0fe65313c325e61ab29b98b405b291e2c36c5f6f9,2025-01-08T20:15:28.810000
CVE-2024-55517,0,0,75c5a4d411c549a5d957f7b0fe65313c325e61ab29b98b405b291e2c36c5f6f9,2025-01-08T20:15:28.810000
CVE-2024-5552,0,0,779c8b119b5a7bc042c6e25c9be4959c8015ea49092434c017d15512182ef4be,2024-11-21T09:47:54.927000
CVE-2024-55529,0,0,59094f574a1ef2f6096a3e5fba1fa56f532a786844da89e23934c518ec5e2e07,2025-01-06T20:15:39.163000
CVE-2024-5553,0,0,c6aeec952a2778be27c1792a1d1c97b8ff8c01ca6ed08226c6b506a6f771b767,2024-11-21T09:47:55.040000
@ -271675,11 +271680,11 @@ CVE-2024-55546,0,0,942b232afb25307bd1bbb9171d407a64efb6124e7535155a6616308769a30
CVE-2024-55547,0,0,9d23528e3e5c1a7b1f76563e1d474f90d9913c0e87c6f8fd8a14829ed85aff3d,2024-12-10T20:15:21.527000
CVE-2024-55548,0,0,b89e0a622aeff00dfd6cdc1dc1884c1956fa3e7da287ae36b11ba4d60647d05d,2024-12-10T20:15:21.643000
CVE-2024-5555,0,0,742073dac4de00aad4cb6df58c8d366b01298901468c1f8f2b3d987b01395142,2024-11-21T09:47:55.300000
CVE-2024-55550,0,1,9c9a30509bff8c2bca43bc78e6a45113dde5cc452b32a2969aee61b5f7aef23c,2025-01-08T20:46:01.203000
CVE-2024-55550,0,0,9c9a30509bff8c2bca43bc78e6a45113dde5cc452b32a2969aee61b5f7aef23c,2025-01-08T20:46:01.203000
CVE-2024-55553,0,0,3bc316f0af4b80bc58ae910e6172da9ff5010fe0b778c5270df43d1041706470,2025-01-07T16:15:36.840000
CVE-2024-55554,0,0,09e3cdaa4a820daeb6598bb5a8faaf533e66285f3e6a4797b593c193d2a0933a,2024-12-17T17:15:09.843000
CVE-2024-55555,0,0,0fff864cbeb4400bcfcde3625f1f4cf98f881f2b9aba59b727db3372655bde9e,2025-01-07T20:15:30.430000
CVE-2024-55556,0,1,36ef2f008ce211b77e0b5750d7d4b803fcde3fc58fe847ba118d22617dc7c08a,2025-01-08T20:15:28.987000
CVE-2024-55556,0,0,36ef2f008ce211b77e0b5750d7d4b803fcde3fc58fe847ba118d22617dc7c08a,2025-01-08T20:15:28.987000
CVE-2024-55557,0,0,1c44f970be9c9162e2fd5fa3f9e1778bc69c31c3d5707dcbd0caa2e430754ba4,2024-12-17T16:15:25.900000
CVE-2024-5556,0,0,f573f07f74091c9ef49ab63e55c790d8f661c071a22a95c82ecfdf6c6886287c,2024-08-27T14:36:53.273000
CVE-2024-55560,0,0,34631484c4ac18e7385d5b08b3c8f4829d4f28112bef5e467e27e8892a961b13,2024-12-09T16:15:22.750000
@ -272153,7 +272158,7 @@ CVE-2024-56538,0,0,05e6f243370f67e67c96f68f4c76b456d8b1f3b18efe17183f721393738aa
CVE-2024-56539,0,0,73e3ac9371c38a01feaab685bc0b80785d1a14a9bbe3f9b6fa012305e81e56ab,2024-12-27T14:15:33.530000
CVE-2024-5654,0,0,a36981ce1f77c761dfb14f4c731f47a8dfd22625db842c571518ed3950c72b86,2024-11-21T09:48:06.020000
CVE-2024-56540,0,0,9bbe384790c8ce018fa6158c6c9afcb91eb4326c45847ca16b5953600db92de4,2024-12-27T14:15:33.670000
CVE-2024-56541,0,0,590bcb1c700644aac7917f53bd9554353986a95487999aae34234cfedd914c00,2024-12-27T14:15:33.767000
CVE-2024-56541,0,1,7084d91d256abff37c844e77e9a31d66fb1fe62676a1f93e5ccf37f018f7029a,2025-01-08T21:25:24.730000
CVE-2024-56542,0,0,c22e6fa7d390e1afe8450440b362944db792ada801349ef3ed8bf0ee8bc16cf2,2024-12-27T14:15:33.880000
CVE-2024-56543,0,0,887b5ebd3ba4f56e328fba92d390fd7953aa496872172482c2f78d83ece5941e,2024-12-27T14:15:34.020000
CVE-2024-56544,0,0,ca1ec292015337081523043b4894d3fec345403de30dc92ff85e02c808d37447,2024-12-27T14:15:34.153000
@ -272204,7 +272209,7 @@ CVE-2024-56584,0,0,eeb9dd397f2cf5bbbf04d47a1922c0a5bd55db3b2dd6af42d89d243ed3a0f
CVE-2024-56585,0,0,877963cf60c4d690af9050e33b1bb1c26f5b0063aaeb8dcda5d72cde5d043865,2024-12-27T15:15:17.677000
CVE-2024-56586,0,0,b0c3a1afa1e35fa2222a1770b2af5fd447e0839a2d0703f1d4ca2d9ff4979c31,2024-12-27T15:15:17.800000
CVE-2024-56587,0,0,597ff3809927035a763007dd1ab65f05cbacc61e0ba8d04e0bc053074806191e,2024-12-27T15:15:17.917000
CVE-2024-56588,0,0,d197662ec2cab9b52e7bc5ff12668b3172f242de7db49daffb85839a94cc3cc2,2024-12-27T15:15:18.040000
CVE-2024-56588,0,1,aa89cf28160110554d9db50f9b3a3953651e6232debd2709afbefffb36888635,2025-01-08T21:48:24.173000
CVE-2024-56589,0,0,e669c8f2a28110966f3559dfa46339a87026e650a8eac6b0a3c626f7087ebd28,2024-12-27T15:15:18.150000
CVE-2024-5659,0,0,83e7687f93b86419198f1683634dd14733df87a0c466715b2e7e79370f69ac01,2024-11-21T09:48:06.543000
CVE-2024-56590,0,0,ce1170c24714fa2e0e447addbede8cbfc003003487543f7771793bf3ebdaca04,2024-12-27T15:15:18.263000
@ -272216,7 +272221,7 @@ CVE-2024-56595,0,0,5c739d39a04368864cbc388d8808a97d325a73a29c39f4cccb5f255c6ed55
CVE-2024-56596,0,0,f9a03aa1aa88f972ffe6a55ad6e165129f456075471da9dcb4076a6e6b502209,2024-12-27T15:15:18.963000
CVE-2024-56597,0,0,347c4891ee178d2857b2a9b9b3a59e9ef73cd9d9644a163cb89f5004d70ba847,2024-12-27T15:15:19.080000
CVE-2024-56598,0,0,a2176885d0091e4f0f4ccf382f6f43c67f59acd5431ed7d070c60a0e375825cf,2024-12-27T15:15:19.200000
CVE-2024-56599,0,0,2ccff4d7801b1259137e35edc39a719c848a3545739828c316f1b9d2f1c9c2d5,2024-12-27T15:15:19.307000
CVE-2024-56599,0,1,04b9a5f3e69d9f54c42ecd83b1035f3ab23b521ab753e6e5aa5cefa0f19133d6,2025-01-08T21:48:04.090000
CVE-2024-5660,0,0,185ada92ecf12140397c738113ef0443174eeeea8f301748716001f7b999562c,2024-12-16T14:15:05.123000
CVE-2024-56600,0,0,52d580d322cdc56209d742bf1001e48cf3d43006079a875fc418ff12bed23270,2024-12-27T15:15:19.410000
CVE-2024-56601,0,0,637410ffb911b579d9118778643db5f364036159a7ab02ab9694514f07f24700,2024-12-27T15:15:19.527000
@ -272224,7 +272229,7 @@ CVE-2024-56602,0,0,ff463b8e2551ec1bfa6dc83aad02b0f0a834fbe19202bbf88d2a3ced34b92
CVE-2024-56603,0,0,44c1fc20c2507a1b0892802648f891a340c404613043cf4a963b0efbbafa06ad,2024-12-27T15:15:19.770000
CVE-2024-56604,0,0,565ab9d0b315999a07c7d4356116cd8598a6b3b07028c5fa8b14764daf5f90b9,2024-12-27T15:15:19.887000
CVE-2024-56605,0,0,b64b4a627bbf95f44fe3405d04872bb763af58a6067e54da35f3e7f7c0ee5116,2024-12-27T15:15:19.980000
CVE-2024-56606,0,0,a71e7dd711eb0364b89172b0c372f28265292eee0cf911f2b3aeffd343a59e7c,2024-12-27T15:15:20.087000
CVE-2024-56606,0,1,ac0f83cc7a214072e6406d51e213fc315d5a502091a812f3bcbef5315f50bb3e,2025-01-08T21:46:59.767000
CVE-2024-56607,0,0,ee73eedd6bd0ee7c97d323bfb736f17af98e701dbbb2223cb0dfb05c4d0e1892,2024-12-27T15:15:20.180000
CVE-2024-56608,0,0,0d4d7a76c820d078ab63176c92aa3cecb2c95ef837fece154b0757799d40a37f,2025-01-08T17:10:01.233000
CVE-2024-56609,0,0,cebfeb02fea20d2e5ec9b6db1e720f3f3e0983a6f297439668797a7ca6772c63,2024-12-27T15:15:20.387000
@ -272243,7 +272248,7 @@ CVE-2024-5662,0,0,a32230f368c985ce000177685318420ae12365dafb7b142a133da07f0e3fd9
CVE-2024-56620,0,0,62b2b96faf1f60cd015b681859229c54b1fe9ce3304d6f6d4b7456590dbf38dd,2025-01-08T16:09:56.403000
CVE-2024-56621,0,0,becec3cb921696ec1e8d223c5c672e8625b14e057d03ddbb4a1c14a40fb95387,2025-01-08T16:44:53.720000
CVE-2024-56622,0,0,57f9032cf59eb1768889e07334129fae85d94e8871f8d41026f335ec621b8f94,2024-12-27T15:15:21.730000
CVE-2024-56623,0,0,84061956886d3000a76b0070d5a577cf5fb7fb2729269449f1a67fa7e5d9b903,2024-12-27T15:15:21.823000
CVE-2024-56623,0,1,0e93d745489795428a20c54b35ad52e910e61dcb2158be56884d826399a6b1a3,2025-01-08T21:41:01.397000
CVE-2024-56624,0,0,88799a063f0b005c3843d9067ee2b8e4d19fb1fd500724d525e887a886596206,2024-12-27T15:15:21.933000
CVE-2024-56625,0,0,01037372e944818596a9b7f73f6b5c3b9ecad55d8f3378e4d833626252bed489,2024-12-27T15:15:22.033000
CVE-2024-56626,0,0,9507827bbb175e001b11f84b3956f3317e09ce9b8f7e72675d76a6d737068242,2024-12-27T15:15:22.140000
@ -272252,7 +272257,7 @@ CVE-2024-56628,0,0,d4522d2b8c88fd491d5e221aac0e8a6cb75c6500e0513d30049fbc40976e5
CVE-2024-56629,0,0,c3ac49cfdd551a12a574df602f16819cd69e62bdcda6ce31db194f87ddd1b77f,2024-12-27T15:15:22.463000
CVE-2024-5663,0,0,3d93cfa6260123c05a0fe5dd837778ab353045f85b9b96941dd647b061b7390d,2024-11-21T09:48:06.970000
CVE-2024-56630,0,0,d6d5216a0f142ba6bcf7c47d2e00c742ad87f849638306ffcd1bf65dea9d39eb,2024-12-27T15:15:22.577000
CVE-2024-56631,0,0,29d4144c015cfc42f072d5a6177bf3298ac1895ae6616941381c6f653c33dbf5,2024-12-27T15:15:22.690000
CVE-2024-56631,0,1,617ad72d6cc164c6ec5e0872be5940aa2d750c02202d5d1494e4695f407911a5,2025-01-08T21:37:59.833000
CVE-2024-56632,0,0,87f002e611c90fbf889f9615cfc01c68922e19cca4853fe3161af73b8e3806db,2024-12-27T15:15:22.803000
CVE-2024-56633,0,0,8f14e1f5dec3f29ec32002015820b7dc04ee262ce167624069ed4db31922fa34,2024-12-27T15:15:22.933000
CVE-2024-56634,0,0,d0f7bf396b8d8ec8091b0dd6b12e9ac6a4e3bc63a9f97a38d388da788cc29e3e,2025-01-08T16:45:10.040000
@ -272264,7 +272269,7 @@ CVE-2024-56639,0,0,4e03b9a4b0fe8d6bd8f9fd82003b020dc8d8aef46c04d71ba745b13665fcf
CVE-2024-5664,0,0,b6962e20742af8ea90e612bbc7ac8c73d6aa535f0e49e5cabd0c7dd59647632b,2024-11-21T09:48:07.107000
CVE-2024-56640,0,0,cbe6c220e8c4e31481a770ac78aa1bd8cb1e00e3ee77b141b0919dfbc57b06eb,2024-12-27T15:15:23.730000
CVE-2024-56641,0,0,7bd87e333960b236379a7ab6f66f186a39f9577a76aff23809b25204a27a92db,2024-12-27T15:15:23.830000
CVE-2024-56642,0,0,ac80bdf712e9ba3e3a878808dc60334423b1c25edaffbe7c53a8b32cec5c80d1,2024-12-27T15:15:23.930000
CVE-2024-56642,0,1,f811146448c39a9a6cc4c1f585da7148d95f1ad3c40ca22e2cf625a123ebe4d6,2025-01-08T21:37:23.950000
CVE-2024-56643,0,0,7b5f1a4805f035363d7a8272badd51b331d739badf6cbf1475c665112dd3ac85,2025-01-06T17:14:41.813000
CVE-2024-56644,0,0,8a46d5b530bbcb9e52d9ab6abd7dba97d34ca0f87bf22a510768ea3f07eda72d,2024-12-27T15:15:24.163000
CVE-2024-56645,0,0,216619e3bf854381932f49b2368332f2fb98fc73e7d8eac5a9707768667df0ab,2024-12-27T15:15:24.260000
@ -272565,7 +272570,7 @@ CVE-2024-5824,0,0,e1bcdf6d43e3da8ae6ba6ab7de5f8d3f3eaee723b9a1ed9af8e8dbb46b2110
CVE-2024-5825,0,0,682d9c8db78e32760516d35e8d80736a485272125d13ba44bf7f0b379940e54f,2024-06-11T10:15:13.960000
CVE-2024-5826,0,0,676ce5cec2202232492aeb7a31cb471cd0485dd44f0bad4d2271201c9d98c0de,2024-11-21T09:48:24.490000
CVE-2024-5827,0,0,12cdd01c3634b5f2da13128a187bc2d1c8d9fa87429a9aed8ec50812f82df183,2024-11-21T09:48:24.607000
CVE-2024-5828,0,0,42fc2d6e281fad378be60bd4a9a60618064b7bba92372dfb3e5207a2a6904aee,2024-08-06T16:30:24.547000
CVE-2024-5828,0,1,73069a2f9dbd005f637a8c432d288f4c861c4d147da919c5c71f3de2432e48cd,2025-01-08T21:25:28.967000
CVE-2024-5829,0,0,559dcf2146927d836020801e4f427537de3688dc2c4d2e0258f7b3fd7df26af1,2024-11-21T09:48:24.870000
CVE-2024-5830,0,0,58fa656705847e8888d4baa011f2237c51ab84c7204f0c65ec2147b17109a82d,2024-11-21T09:48:25.010000
CVE-2024-5831,0,0,9e502a518e4b6405afff92abaf73ea2137e504904b3519e7b72d524d071fb179,2024-11-21T09:48:25.233000
@ -273461,7 +273466,7 @@ CVE-2024-6820,0,0,d49345aa069d354d1c6e40ded1ad61f62a354359a5ce0728beadc1fcf2503b
CVE-2024-6821,0,0,d9533168d7235e28df27c61e6f5f17f9ab7fdd5177768258a9eb801a7c053fc6,2024-11-29T18:26:30.487000
CVE-2024-6822,0,0,d07de9efa27babd066138fbe688e614f83b8a08f0a4be3e53ee99f76a8051349,2024-11-29T18:26:48.817000
CVE-2024-6823,0,0,507bf1755068154356fbc9b75a57f8b2dc1da0c80bd55fde708f372104df4297,2024-08-13T12:58:25.437000
CVE-2024-6824,0,0,4156dbfb03132f59c5018ebfea8a63c679b35a6d0828bc89913859548f86f9fe,2024-08-08T13:04:18.753000
CVE-2024-6824,0,1,aa23fd5579cfdc3f2c0e9f65e67bb12c513928f2173d0f46d80385a5b5f5d2cc,2025-01-08T21:19:51.450000
CVE-2024-6826,0,0,6dc3ddf1692843a912faeec64198f3b4a4c6df842fd14ed632d889092f2dda4c,2024-12-13T15:29:32.850000
CVE-2024-6828,0,0,982edf1ce9d659dfbd11370bdbf0f7daf4367ded5d8dbae90ae3fb05b545d32c,2024-11-21T09:50:22.943000
CVE-2024-6830,0,0,b701dfb8329b51f5f1611713acab0fd035410cab601e1a2c121bd125b4608ab0,2024-11-21T09:50:23.070000
@ -273656,8 +273661,8 @@ CVE-2024-7059,0,0,ce56df412767385b9cb61e4c8e1bf31372cfb963ffc3e23cc9674911b48dd5
CVE-2024-7060,0,0,c0598e11620cb7c2d88064c17a434f301a6660aeeb00b2cac5526c91c534e6e7,2024-11-21T09:50:48.840000
CVE-2024-7061,0,0,8526b9d19b3673c6e22c5c23db6ddcae8c5c6af148f708c06649a9c2b60e9bab,2024-08-28T18:25:38.217000
CVE-2024-7062,0,0,168c4dad1590faa0fdf3e59812aa97ca21a605e41058ac70de28efc89704dd43,2024-11-21T09:50:49.053000
CVE-2024-7063,0,1,e1a01ce9e0f71f3fed01593db24bc162a5cb8de2b68ce1edeacf04020cf8a70a,2025-01-08T20:33:37.817000
CVE-2024-7064,0,1,155d5aa6e595ad27c7f9e03fb9a0274799f8be3280607ace805d705d065fa3cd,2025-01-08T20:30:58.207000
CVE-2024-7063,0,0,e1a01ce9e0f71f3fed01593db24bc162a5cb8de2b68ce1edeacf04020cf8a70a,2025-01-08T20:33:37.817000
CVE-2024-7064,0,0,155d5aa6e595ad27c7f9e03fb9a0274799f8be3280607ace805d705d065fa3cd,2025-01-08T20:30:58.207000
CVE-2024-7065,0,0,9cc5257737f910d18b17f64e26dc0483f0055fa09dfb364a84340730664e7257,2024-11-21T09:50:49.327000
CVE-2024-7066,0,0,6580bfda2716215fe470c479f49ce1b0113bcee7ab3fc4732a647ffe8c996e6d,2024-11-21T09:50:49.487000
CVE-2024-7067,0,0,8eefdb1cfc4aaca14cb79985e5b7554edcc0d8362356b5c1a06a07af816e4cf6,2024-11-21T09:50:49.650000
@ -273674,7 +273679,7 @@ CVE-2024-7082,0,0,2b028759baa437363b0cc7ad3dd78bb2bf3d1d6bef8b78e020b72446eb5c0e
CVE-2024-7084,0,0,defb1354da8d1678d2485f21ed63c9a7f4e3a919dea9273a0ffa046a33d17e24,2024-11-01T21:35:06.680000
CVE-2024-7090,0,0,7679e01617b8bc0fdb646a3483b9433c1190d790bc24dfbfcf4e67bf7ce57e8c,2024-08-21T12:30:33.697000
CVE-2024-7091,0,0,2e97b518273552a04ba73841a769980ec5b660c5e31e35e2adff15b2a3f71791,2024-11-21T09:50:52.033000
CVE-2024-7092,0,1,422abf4bd36177ce9961c0f919edf6c6f74cba62c54abe4f5e6a3dbdcfa5204a,2025-01-08T20:53:45.230000
CVE-2024-7092,0,0,422abf4bd36177ce9961c0f919edf6c6f74cba62c54abe4f5e6a3dbdcfa5204a,2025-01-08T20:53:45.230000
CVE-2024-7093,0,0,290b2b9585ccf417103151a24d8f190abbc7679ec51d5537d6ffb9bc07efb94a,2024-08-02T12:59:43.990000
CVE-2024-7094,0,0,b22ce77ffacf979339f568296208b1cc49b896d3f1ddb1fcde0ad4f63f12731e,2024-08-13T12:58:25.437000
CVE-2024-7098,0,0,6d3f84e80cfe29d233429433ab17908fcb372f3ed014d96486b0feeee4cd8197,2024-09-20T17:14:53.063000
@ -274090,7 +274095,7 @@ CVE-2024-7544,0,0,f5bacc57de438a3891f625e9194bf22f3b74627e035164b84489b5c4d26bbd
CVE-2024-7545,0,0,8216c555bf8242b290975f0b41b7e17046d0894f946fd673ad40f4ba36c98f60,2024-08-19T20:00:57.433000
CVE-2024-7546,0,0,2bf5b9e1095969e3dbd5485145b386409016c6afdb554169ba425e835d0ec384,2024-08-29T17:55:47.547000
CVE-2024-7547,0,0,7822254abb08f507b73da0f63c3de0001ec37a15858c40e5f1efb89542c0142d,2024-08-19T20:03:12.377000
CVE-2024-7548,0,0,a346e5635bfb6b792f5bbb8d03f497c82dd124dc5f596547d47c36523808aa41,2024-08-08T13:04:18.753000
CVE-2024-7548,0,1,2af7beb0d4b8ceae7c4412eb435338c9d0389032417869486f388c5176513b65,2025-01-08T21:07:57.303000
CVE-2024-7550,0,0,4203e18b9ad5e215a9b97e11487a0d42441334eaacdb7528676d4d5fbbf460bf,2024-08-12T18:32:08.900000
CVE-2024-7551,0,0,44a9791906a617486b3ce4483ac9164f6da1c1e3323013bb47db16e9778eb950,2024-08-12T16:12:12.377000
CVE-2024-7552,0,0,855cafe3f5a68512701a1f911776a165d3aa54b356bbb484abc0d9e617bcd5fa,2024-08-07T21:29:57.417000
@ -276116,7 +276121,7 @@ CVE-2025-0173,0,0,c1f252ca4cbbf65084a89ab024bca7f0b17a90985239dec13e360a268ca336
CVE-2025-0174,0,0,a58f6ba631c2a0feb58527b8303d7d4a31c3e3872c8ddd8918aacd475478a78f,2025-01-03T02:15:07.480000
CVE-2025-0175,0,0,d9a687479ae4dd84b5b46d302a16ec57021ad84e1ebe3621ace137eeaefcef9b,2025-01-03T02:15:07.680000
CVE-2025-0176,0,0,25b97cf7942e2d65b84cd3d69b2f6ce4b0c39c12b63a98b8f04cd8b606eafaef,2025-01-03T15:15:11.360000
CVE-2025-0194,1,1,c06709847d23622e73b5bb90181a6ba8237930ba386bc53927e88b89c13cc831,2025-01-08T20:15:29.193000
CVE-2025-0194,0,0,c06709847d23622e73b5bb90181a6ba8237930ba386bc53927e88b89c13cc831,2025-01-08T20:15:29.193000
CVE-2025-0195,0,0,3a317c51726170702316fa33d45de8f3fef3184ae45ef5e02dd449cbd27af8d0,2025-01-03T18:15:17.317000
CVE-2025-0196,0,0,fb71521e255dd853610214509345a55ba2b3e12d37e32c94fc1c20cb4b643ab6,2025-01-03T19:15:12.793000
CVE-2025-0197,0,0,8050294c8ecdc49228ce7833915570638c5758146d0bd01628204a571b88b989,2025-01-03T20:15:28.873000
@ -276163,7 +276168,7 @@ CVE-2025-0244,0,0,4dc39d4eb7e9626e46633620b63b126f4ca8c432d219058ffa0df86e8e17d0
CVE-2025-0245,0,0,17124b2bb78bf9f026108e77a44161cf6b567d6714acd6476cda81e3148b7689,2025-01-08T16:15:37.693000
CVE-2025-0246,0,0,f212da1e386aff9790e671db2401da03b9d2ebbeea4ee1b40e830ef0d58e3da6,2025-01-08T16:15:37.880000
CVE-2025-0247,0,0,19788955cc9b607e55d300602d56942e119086cfe1c51c09f21df249cc649c46,2025-01-08T15:15:21.033000
CVE-2025-0291,1,1,e64e166dc7ec231b6921ab6e7b688950a3c44d4ac259882cc427bcb73fed1fd1,2025-01-08T20:15:29.353000
CVE-2025-0291,0,0,e64e166dc7ec231b6921ab6e7b688950a3c44d4ac259882cc427bcb73fed1fd1,2025-01-08T20:15:29.353000
CVE-2025-0294,0,0,e5d86f9b17bdfc744e2441f17af376b91232f83a0091836e1403d549321b0bdf,2025-01-07T15:15:12.113000
CVE-2025-0295,0,0,52a16028421d06d344a294c38baeb65e7eade91eddca5850ff08cb460a814ef0,2025-01-07T16:15:39.460000
CVE-2025-0296,0,0,ef99994aa0e927283601f299ff2a2a7b6828140dc06395bd45961df4e93495db,2025-01-07T16:15:39.673000
@ -276173,7 +276178,7 @@ CVE-2025-0299,0,0,46c993a70c9dd5843cd4dc3486123b8f79f076cb607c745df442454088b3fb
CVE-2025-0300,0,0,6462b093b202cdda5c643638789beb08104cb14d8ff95eb1f2f740fecb0f8630,2025-01-07T17:15:32.090000
CVE-2025-0301,0,0,db7e09db06a3c89075ef99c6e0773ce8d9b6391802870d788b13b4dc1d994dbc,2025-01-07T18:15:21.460000
CVE-2025-20123,0,0,7f3b728d3f9cbfa875df0a45e50a08c953f805f15b1141475f4e31dfbed0e1d1,2025-01-08T16:15:38.150000
CVE-2025-20126,0,1,1585188395ef0aa5a894bbea6d526bdf238d58865dbcb187ac89434fb8c590b9,2025-01-08T19:15:38.553000
CVE-2025-20126,0,0,1585188395ef0aa5a894bbea6d526bdf238d58865dbcb187ac89434fb8c590b9,2025-01-08T19:15:38.553000
CVE-2025-20166,0,0,b11a57811b63f7d2208067ccc65af65bb9e1761d9a36811f745adce498b4e21f,2025-01-08T17:15:16.990000
CVE-2025-20167,0,0,e3874d78f816684b3ad3095069171d70c3e3e27074d9afdb1ef0c3389781207f,2025-01-08T17:15:17.163000
CVE-2025-20168,0,0,1b582f0e103ddf474141bdcff2b1873e77789f263e13a1a2b55771b742e937b2,2025-01-08T17:15:17.323000
@ -276200,10 +276205,11 @@ CVE-2025-22132,0,0,68d348d844ec3947f7795605dbc0f9b5ea1e9ec0bb464d07ae2fd1571ba27
CVE-2025-22133,0,0,fbcb8ce624ceed57d4b59a3f2fe5dc11cb74a45b756ff7cc7f2369bba16ab526,2025-01-08T15:15:21.727000
CVE-2025-22136,0,0,123a9917fd0885e775ecfe67805e47c52e223b69c26b7474799ef308240a577d,2025-01-08T16:15:38.770000
CVE-2025-22137,0,0,b7624e8939f9495a9a9ad1232e6a1d9ca96cc90779cda5c7141fa5d1adf92295,2025-01-08T16:15:38.920000
CVE-2025-22139,1,1,be959e3195c9ea3b69331abcd52f163ffe573225c18b8ab22128a548f8371fe1,2025-01-08T20:15:29.693000
CVE-2025-22140,1,1,270f2879e8de65b243beb9d7f4b67eed45df0b791563d9a26d7b732c538b2740,2025-01-08T20:15:29.800000
CVE-2025-22141,1,1,2044a7b2e6c78c72031cb6881e193da3e0a629d8a5ed02e93c39455436172a69,2025-01-08T20:15:29.897000
CVE-2025-22143,1,1,379ec5cc1d9ddc4be571cdbe4ab10dde3e7605621fcd6681c8378b70a5e0e0ce,2025-01-08T20:15:30.003000
CVE-2025-22139,0,0,be959e3195c9ea3b69331abcd52f163ffe573225c18b8ab22128a548f8371fe1,2025-01-08T20:15:29.693000
CVE-2025-22140,0,0,270f2879e8de65b243beb9d7f4b67eed45df0b791563d9a26d7b732c538b2740,2025-01-08T20:15:29.800000
CVE-2025-22141,0,0,2044a7b2e6c78c72031cb6881e193da3e0a629d8a5ed02e93c39455436172a69,2025-01-08T20:15:29.897000
CVE-2025-22143,0,0,379ec5cc1d9ddc4be571cdbe4ab10dde3e7605621fcd6681c8378b70a5e0e0ce,2025-01-08T20:15:30.003000
CVE-2025-22145,1,1,a3e7e33eb43759950c0b6a9c304c03ed60cf76009fe03502e9b6e5d41248cec1,2025-01-08T21:15:13.480000
CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000
CVE-2025-22215,0,0,67b181a6458a232e8ac5c80f2cba09df8333cbef01abc4197cfb8a002eebc845,2025-01-08T15:15:21.927000
CVE-2025-22261,0,0,b64f32ab7c14edb8b70371073baa276f94f41977fffad6128d5b8c7f32ae4fb7,2025-01-07T11:15:13.290000

Can't render this file because it is too large.