From a62ee174e8c9f8a618571062ca9b85abe8d55dcf Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 10 Mar 2025 23:03:48 +0000 Subject: [PATCH] Auto-Update: 2025-03-10T23:00:19.793525+00:00 --- CVE-2022/CVE-2022-495xx/CVE-2022-49527.json | 141 +++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49529.json | 69 ++++- CVE-2022/CVE-2022-495xx/CVE-2022-49530.json | 153 ++++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49532.json | 153 ++++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49534.json | 69 ++++- CVE-2022/CVE-2022-495xx/CVE-2022-49536.json | 93 ++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49538.json | 153 ++++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49541.json | 93 ++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49542.json | 93 ++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49544.json | 153 ++++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49546.json | 93 ++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49547.json | 77 +++++- CVE-2022/CVE-2022-495xx/CVE-2022-49548.json | 106 +++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49549.json | 106 +++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49550.json | 70 ++++- CVE-2022/CVE-2022-495xx/CVE-2022-49551.json | 94 ++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49560.json | 106 +++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49563.json | 81 +++++- CVE-2022/CVE-2022-495xx/CVE-2022-49564.json | 81 +++++- CVE-2022/CVE-2022-495xx/CVE-2022-49566.json | 82 +++++- CVE-2022/CVE-2022-495xx/CVE-2022-49567.json | 141 +++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49568.json | 110 +++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49569.json | 141 +++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49570.json | 117 +++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49571.json | 153 ++++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49572.json | 153 ++++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49573.json | 153 ++++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49574.json | 153 ++++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49575.json | 153 ++++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49576.json | 117 +++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49577.json | 141 +++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49578.json | 129 ++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49579.json | 117 +++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49580.json | 141 +++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49582.json | 105 +++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49583.json | 148 ++++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49585.json | 129 ++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49586.json | 153 ++++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49587.json | 177 ++++++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49588.json | 124 ++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49589.json | 159 ++++++++++- CVE-2022/CVE-2022-495xx/CVE-2022-49590.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49591.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49593.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49594.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49595.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49596.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49597.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49598.json | 2 +- CVE-2022/CVE-2022-495xx/CVE-2022-49599.json | 2 +- CVE-2023/CVE-2023-208xx/CVE-2023-20867.json | 6 +- CVE-2023/CVE-2023-252xx/CVE-2023-25280.json | 4 +- CVE-2023/CVE-2023-257xx/CVE-2023-25717.json | 4 +- CVE-2023/CVE-2023-279xx/CVE-2023-27997.json | 4 +- CVE-2023/CVE-2023-282xx/CVE-2023-28229.json | 6 +- CVE-2023/CVE-2023-282xx/CVE-2023-28252.json | 4 +- CVE-2023/CVE-2023-284xx/CVE-2023-28432.json | 4 +- CVE-2023/CVE-2023-284xx/CVE-2023-28434.json | 4 +- CVE-2023/CVE-2023-293xx/CVE-2023-29336.json | 4 +- CVE-2023/CVE-2023-293xx/CVE-2023-29357.json | 4 +- CVE-2023/CVE-2023-293xx/CVE-2023-29360.json | 4 +- CVE-2023/CVE-2023-294xx/CVE-2023-29492.json | 4 +- CVE-2023/CVE-2023-320xx/CVE-2023-32046.json | 4 +- CVE-2023/CVE-2023-320xx/CVE-2023-32049.json | 4 +- CVE-2023/CVE-2023-323xx/CVE-2023-32315.json | 4 +- CVE-2023/CVE-2023-33xx/CVE-2023-3357.json | 22 +- CVE-2023/CVE-2023-33xx/CVE-2023-3358.json | 22 +- CVE-2023/CVE-2023-34xx/CVE-2023-3439.json | 22 +- CVE-2023/CVE-2023-35xx/CVE-2023-3519.json | 4 +- CVE-2023/CVE-2023-368xx/CVE-2023-36845.json | 4 +- CVE-2023/CVE-2023-381xx/CVE-2023-38180.json | 4 +- CVE-2023/CVE-2023-400xx/CVE-2023-40044.json | 4 +- CVE-2023/CVE-2023-427xx/CVE-2023-42793.json | 10 +- CVE-2023/CVE-2023-42xx/CVE-2023-4211.json | 4 +- CVE-2023/CVE-2023-63xx/CVE-2023-6345.json | 4 +- CVE-2023/CVE-2023-70xx/CVE-2023-7024.json | 4 +- CVE-2023/CVE-2023-71xx/CVE-2023-7101.json | 4 +- CVE-2024/CVE-2024-123xx/CVE-2024-12356.json | 10 +- CVE-2024/CVE-2024-209xx/CVE-2024-20953.json | 9 +- CVE-2024/CVE-2024-214xx/CVE-2024-21413.json | 9 +- CVE-2024/CVE-2024-321xx/CVE-2024-32113.json | 4 +- CVE-2024/CVE-2024-352xx/CVE-2024-35250.json | 6 +- CVE-2024/CVE-2024-48xx/CVE-2024-4885.json | 4 +- CVE-2024/CVE-2024-503xx/CVE-2024-50302.json | 25 +- CVE-2024/CVE-2024-506xx/CVE-2024-50623.json | 4 +- CVE-2024/CVE-2024-561xx/CVE-2024-56191.json | 21 ++ CVE-2024/CVE-2024-561xx/CVE-2024-56192.json | 21 ++ CVE-2025/CVE-2025-06xx/CVE-2025-0660.json | 86 ++++++ CVE-2025/CVE-2025-19xx/CVE-2025-1920.json | 37 +++ CVE-2025/CVE-2025-21xx/CVE-2025-2135.json | 37 +++ CVE-2025/CVE-2025-21xx/CVE-2025-2136.json | 37 +++ CVE-2025/CVE-2025-21xx/CVE-2025-2137.json | 37 +++ CVE-2025/CVE-2025-259xx/CVE-2025-25907.json | 21 ++ CVE-2025/CVE-2025-259xx/CVE-2025-25908.json | 21 ++ CVE-2025/CVE-2025-279xx/CVE-2025-27910.json | 21 ++ CVE-2025/CVE-2025-279xx/CVE-2025-27913.json | 61 ++++- README.md | 95 +++---- _state.csv | 280 ++++++++++---------- 98 files changed, 5414 insertions(+), 602 deletions(-) create mode 100644 CVE-2024/CVE-2024-561xx/CVE-2024-56191.json create mode 100644 CVE-2024/CVE-2024-561xx/CVE-2024-56192.json create mode 100644 CVE-2025/CVE-2025-06xx/CVE-2025-0660.json create mode 100644 CVE-2025/CVE-2025-19xx/CVE-2025-1920.json create mode 100644 CVE-2025/CVE-2025-21xx/CVE-2025-2135.json create mode 100644 CVE-2025/CVE-2025-21xx/CVE-2025-2136.json create mode 100644 CVE-2025/CVE-2025-21xx/CVE-2025-2137.json create mode 100644 CVE-2025/CVE-2025-259xx/CVE-2025-25907.json create mode 100644 CVE-2025/CVE-2025-259xx/CVE-2025-25908.json create mode 100644 CVE-2025/CVE-2025-279xx/CVE-2025-27910.json diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49527.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49527.json index b23c72b2eba..8080d05da30 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49527.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49527.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49527", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:28.690", - "lastModified": "2025-02-26T07:01:28.690", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:16:33.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,158 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: venus: hfi: evitar la desreferencia nula en deinit Si venus_probe falla en pm_runtime_put_sync, la gesti\u00f3n de errores primero llama a hfi_destroy y luego a hfi_core_deinit. Como hfi_destroy establece core->ops en NULL, hfi_core_deinit ya no puede llamar a la funci\u00f3n core_deinit. Evite esta desreferencia de puntero nulo omitiendo la llamada cuando sea necesario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.14.283", + "matchCriteriaId": "42074657-A7B6-4740-88B7-67B440018C1C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.247", + "matchCriteriaId": "B8CFA0F4-2D75-41F4-9753-87944A08B53B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.198", + "matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.121", + "matchCriteriaId": "34ACD872-E5BC-401C-93D5-B357A62426E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.46", + "matchCriteriaId": "20D41697-0E8B-4B7D-8842-F17BF2AA21E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.14", + "matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.3", + "matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0ac84ab50712879eac3c1dd2598440652a85d3d0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0ed5a643b1a4a46b9b7bfba5d468c10cc30e1359", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2533acb652359c9e097dfa33587896af782e8a91", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/27ad46da44177a78a4a0cae6fe03906888c61aa1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/86594f6af867b5165d2ba7b5a71fae3a5961e56c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9c385b961d4c378228e80f6abea8509cb67feab6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a21d15dde21d7e8ae047eb8368677407db45d840", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b73ed0510bb8d9647cd8e8a4c4c8772bbe545c3a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49529.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49529.json index 379b5a3e491..202704a0578 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49529.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49529.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49529", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:28.873", - "lastModified": "2025-02-26T07:01:28.873", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:16:19.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,74 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu/pm: corrige el puntero nulo mientras smu est\u00e1 deshabilitado. Debe verificar si pp_funcs se inicializa mientras se libera el contexto; de lo contrario, activar\u00e1 el p\u00e1nico del puntero nulo mientras el software smu no est\u00e9 habilitado. [ 1109.404555] BUG: kernel NULL pointer dereference, address: 0000000000000078 [ 1109.404609] #PF: supervisor read access in kernel mode [ 1109.404638] #PF: error_code(0x0000) - not-present page [ 1109.404657] PGD 0 P4D 0 [ 1109.404672] Oops: 0000 [#1] PREEMPT SMP NOPTI [ 1109.404701] CPU: 7 PID: 9150 Comm: amdgpu_test Tainted: G OEL 5.16.0-custom #1 [ 1109.404732] Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006 [ 1109.404765] RIP: 0010:amdgpu_dpm_force_performance_level+0x1d/0x170 [amdgpu] [ 1109.405109] Code: 5d c3 44 8b a3 f0 80 00 00 eb e5 66 90 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 ec 08 4c 8b b7 f0 7d 00 00 <49> 83 7e 78 00 0f 84 f2 00 00 00 80 bf 87 80 00 00 00 48 89 fb 0f [ 1109.405176] RSP: 0018:ffffaf3083ad7c20 EFLAGS: 00010282 [ 1109.405203] RAX: 0000000000000000 RBX: ffff9796b1c14600 RCX: 0000000002862007 [ 1109.405229] RDX: ffff97968591c8c0 RSI: 0000000000000001 RDI: ffff9796a3700000 [ 1109.405260] RBP: ffffaf3083ad7c50 R08: ffffffff9897de00 R09: ffff979688d9db60 [ 1109.405286] R10: 0000000000000000 R11: ffff979688d9db90 R12: 0000000000000001 [ 1109.405316] R13: ffff9796a3700000 R14: 0000000000000000 R15: ffff9796a3708fc0 [ 1109.405345] FS: 00007ff055cff180(0000) GS:ffff9796bfdc0000(0000) knlGS:0000000000000000 [ 1109.405378] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1109.405400] CR2: 0000000000000078 CR3: 000000000a394000 CR4: 00000000000506e0 [ 1109.405434] Call Trace: [ 1109.405445] [ 1109.405456] ? delete_object_full+0x1d/0x20 [ 1109.405480] amdgpu_ctx_set_stable_pstate+0x7c/0xa0 [amdgpu] [ 1109.405698] amdgpu_ctx_fini.part.0+0xcb/0x100 [amdgpu] [ 1109.405911] amdgpu_ctx_do_release+0x71/0x80 [amdgpu] [ 1109.406121] amdgpu_ctx_ioctl+0x52d/0x550 [amdgpu] [ 1109.406327] ? _raw_spin_unlock+0x1a/0x30 [ 1109.406354] ? drm_gem_handle_delete+0x81/0xb0 [drm] [ 1109.406400] ? amdgpu_ctx_get_entity+0x2c0/0x2c0 [amdgpu] [ 1109.406609] drm_ioctl_kernel+0xb6/0x140 [drm] " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.18.3", + "matchCriteriaId": "3108C4DF-1578-4A9A-ADC7-1128DE921D69" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/49ec3441aa5e5940f3e82dd2f0205b9c856e399d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eea5c7b3390c6e006ba4cbd906447dd8cea8cfbf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49530.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49530.json index 0bc73325585..fe36c23abe5 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49530.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49530.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49530", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:28.967", - "lastModified": "2025-02-26T07:01:28.967", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:15:50.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,172 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/pm: se corrige la doble liberaci\u00f3n en si_parse_power_table() En la funci\u00f3n si_parse_power_table(), se asigna la matriz adev->pm.dpm.ps y su miembro. Si la asignaci\u00f3n de cada miembro falla, la matriz en s\u00ed se libera y se devuelve con un c\u00f3digo de error. Sin embargo, la matriz se libera m\u00e1s tarde nuevamente en la funci\u00f3n si_dpm_fini() que se llama cuando la funci\u00f3n devuelve un error. Esto conduce a una posible doble liberaci\u00f3n de la matriz adev->pm.dpm.ps, as\u00ed como a la fuga de sus miembros de matriz, ya que los miembros no se liberan en la funci\u00f3n de asignaci\u00f3n y la matriz no se anula cuando se libera. Adem\u00e1s, adev->pm.dpm.num_ps, que realiza un seguimiento del miembro de la matriz asignado, no se actualiza hasta que la asignaci\u00f3n del miembro finaliza correctamente, esto tambi\u00e9n podr\u00eda conducir al use-after-free o al acceso a variables no inicializadas en si_dpm_fini(). Solucione esto posponiendo la liberaci\u00f3n de la matriz hasta si_dpm_fini() e incremente adev->pm.dpm.num_ps cada vez que se asigne el miembro de la matriz." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.9.318", + "matchCriteriaId": "0D4D4067-974D-4560-8320-22FDA399E3F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.283", + "matchCriteriaId": "D6823775-2653-4644-A0D4-4E6E68F10C65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.247", + "matchCriteriaId": "B8CFA0F4-2D75-41F4-9753-87944A08B53B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.198", + "matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.121", + "matchCriteriaId": "34ACD872-E5BC-401C-93D5-B357A62426E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.46", + "matchCriteriaId": "20D41697-0E8B-4B7D-8842-F17BF2AA21E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.14", + "matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.3", + "matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2615464854505188f909d0c07c37a6623693b5c7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/43eb9b667b95f2a31c63e8949b0d2161b9be59c3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6c5bdaa1325be7f04b79ea992ab216739192d342", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a5ce7051db044290b1a95045ff03c249005a3aa4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af832028af6f44c6c45645757079c4ed6884ade5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c0e811c4ccf3b42705976285e3a94cc82dea7300", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ca1ce206894dd976275c78ee38dbc19873f22de9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f3fa2becf2fc25b6ac7cf8d8b1a2e4a86b3b72bd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fd2eff8b9dcbe469c3b7bbbc7083ab5ed94de07b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49532.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49532.json index f2fd6054d63..d7bc6d33ff8 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49532.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49532.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49532", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:29.170", - "lastModified": "2025-02-26T07:01:29.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:15:19.063", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,172 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/virtio: se corrige la desreferencia de puntero NULL en virtio_gpu_conn_get_modes. drm_cvt_mode puede devolver NULL y deber\u00edamos comprobarlo. Este error lo encontr\u00f3 syzkaller: FAULT_INJECTION stacktrace: [ 168.567394] FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 1 [ 168.567403] CPU: 1 PID: 6425 Comm: syz Kdump: loaded Not tainted 4.19.90-vhulk2201.1.0.h1035.kasan.eulerosv2r10.aarch64 #1 [ 168.567406] Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 [ 168.567408] Call trace: [ 168.567414] dump_backtrace+0x0/0x310 [ 168.567418] show_stack+0x28/0x38 [ 168.567423] dump_stack+0xec/0x15c [ 168.567427] should_fail+0x3ac/0x3d0 [ 168.567437] __should_failslab+0xb8/0x120 [ 168.567441] should_failslab+0x28/0xc0 [ 168.567445] kmem_cache_alloc_trace+0x50/0x640 [ 168.567454] drm_mode_create+0x40/0x90 [ 168.567458] drm_cvt_mode+0x48/0xc78 [ 168.567477] virtio_gpu_conn_get_modes+0xa8/0x140 [virtio_gpu] [ 168.567485] drm_helper_probe_single_connector_modes+0x3a4/0xd80 [ 168.567492] drm_mode_getconnector+0x2e0/0xa70 [ 168.567496] drm_ioctl_kernel+0x11c/0x1d8 [ 168.567514] drm_ioctl+0x558/0x6d0 [ 168.567522] do_vfs_ioctl+0x160/0xf30 [ 168.567525] ksys_ioctl+0x98/0xd8 [ 168.567530] __arm64_sys_ioctl+0x50/0xc8 [ 168.567536] el0_svc_common+0xc8/0x320 [ 168.567540] el0_svc_handler+0xf8/0x160 [ 168.567544] el0_svc+0x10/0x218 KASAN stacktrace: [ 168.567561] BUG: KASAN: null-ptr-deref in virtio_gpu_conn_get_modes+0xb4/0x140 [virtio_gpu] [ 168.567565] Read of size 4 at addr 0000000000000054 by task syz/6425 [ 168.567566] [ 168.567571] CPU: 1 PID: 6425 Comm: syz Kdump: loaded Not tainted 4.19.90-vhulk2201.1.0.h1035.kasan.eulerosv2r10.aarch64 #1 [ 168.567573] Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 [ 168.567575] Call trace: [ 168.567578] dump_backtrace+0x0/0x310 [ 168.567582] show_stack+0x28/0x38 [ 168.567586] dump_stack+0xec/0x15c [ 168.567591] kasan_report+0x244/0x2f0 [ 168.567594] __asan_load4+0x58/0xb0 [ 168.567607] virtio_gpu_conn_get_modes+0xb4/0x140 [virtio_gpu] [ 168.567612] drm_helper_probe_single_connector_modes+0x3a4/0xd80 [ 168.567617] drm_mode_getconnector+0x2e0/0xa70 [ 168.567621] drm_ioctl_kernel+0x11c/0x1d8 [ 168.567624] drm_ioctl+0x558/0x6d0 [ 168.567628] do_vfs_ioctl+0x160/0xf30 [ 168.567632] ksys_ioctl+0x98/0xd8 [ 168.567636] __arm64_sys_ioctl+0x50/0xc8 [ 168.567641] el0_svc_common+0xc8/0x320 [ 168.567645] el0_svc_handler+0xf8/0x160 [ 168.567649] el0_svc+0x10/0x218 " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.9.318", + "matchCriteriaId": "0D4D4067-974D-4560-8320-22FDA399E3F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.283", + "matchCriteriaId": "D6823775-2653-4644-A0D4-4E6E68F10C65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.247", + "matchCriteriaId": "B8CFA0F4-2D75-41F4-9753-87944A08B53B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.198", + "matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.121", + "matchCriteriaId": "34ACD872-E5BC-401C-93D5-B357A62426E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.46", + "matchCriteriaId": "20D41697-0E8B-4B7D-8842-F17BF2AA21E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.14", + "matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.3", + "matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0f8bc147a963686b7351aa35d1701124ffacac08", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/194d250cdc4a40ccbd179afd522a9e9846957402", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/32e10aabc287f09a148ff759bb9ce70b01b0012c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/848dd072744ea662ab3097e3c8282bee552df218", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c51d00472fa54b9b05c17789ed665c17adf3a25d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e0828456578cc8ba0a69147f7ae3428392eec287", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/edafcad84c4134ebec4bc24b29ca4497a1184eea", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f85cb059fad03a3b33a50023be91e944bb065ae8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fadc626cae99aaa1325094edc6a9e2b883f3e562", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49534.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49534.json index 8e0a953ee49..eed12d8a9e5 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49534.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49534.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49534", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:29.400", - "lastModified": "2025-02-26T07:01:29.400", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:30:31.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,74 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: lpfc: Fuga de memoria de protecci\u00f3n para puertos NPIV que env\u00edan PLOGI_RJT Hay una posible fuga de memoria en lpfc_ignore_els_cmpl() y lpfc_els_rsp_reject() que se asign\u00f3 desde NPIV PLOGI_RJT (login_mbox de lpfc_rcv_plogi()). Compruebe si cmdiocb->context_un.mbox se asign\u00f3 en lpfc_ignore_els_cmpl() y, a continuaci\u00f3n, lib\u00e9relo de nuevo en phba->mbox_mem_pool junto con mbox->ctx_buf para los par\u00e1metros de servicio. En caso de fallo de lpfc_els_rsp_reject(), libere tanto el ctx_buf para los par\u00e1metros de servicio como el login_mbox." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.18.3", + "matchCriteriaId": "3108C4DF-1578-4A9A-ADC7-1128DE921D69" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/672d1cb40551ea9c95efad43ab6d45e4ab4e015f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c00df0f34a6d5e14da379f96ea67e501ce67b002", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49536.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49536.json index d0a70df0976..74ceacae04d 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49536.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49536.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49536", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:29.580", - "lastModified": "2025-02-26T07:01:29.580", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:30:26.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,102 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: lpfc: Se corrige el bloqueo del controlador de finalizaci\u00f3n y cancelaci\u00f3n de E/S de SCSI. Durante las pruebas de E/S de estr\u00e9s con m\u00e1s de 500 puertos virtuales, se observan rastros de llamadas LOCKUP duras. CPU A: native_queued_spin_lock_slowpath+0x192 _raw_spin_lock_irqsave+0x32 lpfc_handle_fcp_err+0x4c6 lpfc_fcp_io_cmd_wqe_cmpl+0x964 lpfc_sli4_fp_handle_cqe+0x266 __lpfc_sli4_process_cq+0x105 __lpfc_sli4_hba_process_cq+0x3c lpfc_cq_poll_hdler+0x16 irq_poll_softirq+0x76 __softirqentry_text_start+0xe4 irq_exit+0xf7 do_IRQ+0x7f CPU B: native_queued_spin_lock_slowpath+0x5b _raw_spin_lock+0x1c lpfc_abort_handler+0x13e scmd_eh_abort_handler+0x85 process_one_work+0x1a7 worker_thread+0x30 kthread+0x112 ret_from_fork+0x1f Diagram of lockup: CPUA CPUB ---- ---- lpfc_cmd->buf_lock phba->hbalock lpfc_cmd->buf_lock phba->hbalock Fix by reordering the taking of the lpfc_cmd->buf_lock and phba->hbalock in lpfc_abort_handler routine so that it tries to take the lpfc_cmd->buf_lock first before phba->hbalock. " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.46", + "matchCriteriaId": "40E62665-0BA6-440F-83E8-6F8EC2D3C9DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.14", + "matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.3", + "matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/03cbbd7c2f5ee288f648f4aeedc765a181188553", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0c4eed901285b9cae36a622f32bea3e92490da6c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/21c0d469349957b5dc811c41200a2a998996ca8d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7625e81de2164a082810e1f27547d388406da610", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49538.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49538.json index 9615b50a7db..be935ce831a 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49538.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49538.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49538", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:29.760", - "lastModified": "2025-02-26T07:01:29.760", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:14:28.543", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,172 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: jack: acceso a input_dev bajo mutex Es posible que al usar ASoC, input_dev no se registre al llamar a snd_jack_report, lo que provoca la desreferencia del puntero NULL. Para evitar esto, se serializa el acceso a input_dev mediante un bloqueo mutex." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.9.318", + "matchCriteriaId": "0D4D4067-974D-4560-8320-22FDA399E3F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.283", + "matchCriteriaId": "D6823775-2653-4644-A0D4-4E6E68F10C65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.247", + "matchCriteriaId": "B8CFA0F4-2D75-41F4-9753-87944A08B53B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.198", + "matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.121", + "matchCriteriaId": "34ACD872-E5BC-401C-93D5-B357A62426E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.46", + "matchCriteriaId": "20D41697-0E8B-4B7D-8842-F17BF2AA21E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.14", + "matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.3", + "matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1b6a6fc5280e97559287b61eade2d4b363e836f2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/582aea6084cc59fec881204f026816d1219f2348", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5cc6f623f4818c7d7e9e966a45ebf324901ca9c5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/74bab3bcf422593c582e47130aa8eb41ebb2dc09", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8487a88136d54a1a4d3f26f1399685db648ab879", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9e6a73b0c0f2014eb89249fb1640c5a3d58221c4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c093b62c40027c21d649c5534ad7aa3605a99b00", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e2b8681769f6e205382f026b907d28aa5ec9d59a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f68bed124c7699e23ffb4ce4fcc84671e9193cde", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49541.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49541.json index 936c5167b51..586ad1aa228 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49541.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49541.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49541", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:30.043", - "lastModified": "2025-02-26T07:01:30.043", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:31:11.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,102 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: se corrige una posible doble liberaci\u00f3n durante un montaje fallido de RHBZ: https://bugzilla.redhat.com/show_bug.cgi?id=2088799" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.46", + "matchCriteriaId": "40E62665-0BA6-440F-83E8-6F8EC2D3C9DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.14", + "matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.3", + "matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/8378a51e3f8140f60901fb27208cc7a6e47047b5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9a167fc440e5693c1cdd7f07071e05658bd9d89d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ce0008a0e410cdd95f0d8cd81b2902ec10a660c4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ee71f8f1cd3c8c4a251fd3e8abc89215ae3457cb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49542.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49542.json index 781ed0b9113..a903bc9aa13 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49542.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49542.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49542", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:30.133", - "lastModified": "2025-02-26T07:01:30.133", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:31:15.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,102 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: lpfc: Mover la comprobaci\u00f3n cfg_log_verbose antes de llamar a lpfc_dmp_dbg() En un intento de registrar el mensaje 0126 con LOG_TRACE_EVENT, el siguiente seguimiento de llamada de bloqueo duro cuelga el sistema. Seguimiento de llamadas: _raw_spin_lock_irqsave+0x32/0x40 lpfc_dmp_dbg.part.32+0x28/0x220 [lpfc] lpfc_cmpl_els_fdisc+0x145/0x460 [lpfc] lpfc_sli_cancel_jobs+0x92/0xd0 [lpfc] lpfc_els_flush_cmd+0x43c/0x670 [lpfc] lpfc_els_flush_all_cmd+0x37/0x60 [lpfc] lpfc_sli4_async_event_proc+0x956/0x1720 [lpfc] lpfc_do_work+0x1485/0x1d70 [lpfc] kthread+0x112/0x130 ret_from_fork+0x1f/0x40 Kernel panic - not syncing: Hard LOCKUP The same CPU tries to claim the phba->port_list_lock twice. Move the cfg_log_verbose checks as part of the lpfc_printf_vlog() and lpfc_printf_log() macros before calling lpfc_dmp_dbg(). There is no need to take the phba->port_list_lock within lpfc_dmp_dbg()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.46", + "matchCriteriaId": "40E62665-0BA6-440F-83E8-6F8EC2D3C9DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.14", + "matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.3", + "matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/09c772557a4fd9490fed1bfb133268313ea22213", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/271725e4028559ae7974d762a8467dc9de412f2e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cc6501afccec55b8b6c90584cbf71f1fefa77d1e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e294647b1aed4247fe52851f3a3b2b19ae906228", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49544.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49544.json index c39e34def8c..db44437dd0c 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49544.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49544.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49544", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:30.313", - "lastModified": "2025-02-26T07:01:30.313", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:14:07.310", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,172 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipw2x00: Se corrige la posible desreferenciaci\u00f3n NULL en libipw_xmit() crypt y crypt->ops podr\u00edan ser nulos, por lo que debemos verificar los valores nulos antes de la desreferenciaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.9.318", + "matchCriteriaId": "0D4D4067-974D-4560-8320-22FDA399E3F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.283", + "matchCriteriaId": "D6823775-2653-4644-A0D4-4E6E68F10C65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.247", + "matchCriteriaId": "B8CFA0F4-2D75-41F4-9753-87944A08B53B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.198", + "matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.121", + "matchCriteriaId": "34ACD872-E5BC-401C-93D5-B357A62426E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.46", + "matchCriteriaId": "20D41697-0E8B-4B7D-8842-F17BF2AA21E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.14", + "matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.3", + "matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/167affc11781d7d35c4c3a7630a549ac74dd0b21", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1ff6b0727c8988f25eeb670b6c038c1120bb58dd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/48d4a820fd33f012e5f63735a59d15b5a3882882", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/528d2023ccf4748fd542582955236c1634a7d293", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5f7ea274e88c0eeffe6bd6dbf6cf5c479d356af6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8fb1b9beb085bb767ae43e441db5ac6fcd66a04d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/98d1dc32f890642476dbb78ed3437a456bf421b0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b4628e0d3754ab2fc98ee6e3d21851ba45798077", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e8366bbabe1d207cf7c5b11ae50e223ae6fc278b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49546.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49546.json index 3b10cf05529..4ea2ab344d9 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49546.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49546.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49546", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:30.500", - "lastModified": "2025-02-26T07:01:30.500", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:13:19.010", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,102 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/kexec: se corrige la p\u00e9rdida de memoria del b\u00fafer de encabezado elf Esto lo informa el detector kmemleak: objeto sin referencia 0xffffc900002a9000 (size 4096): comm \"kexec\", pid 14950, jiffies 4295110793 (age 373.951s) hex dump (first 32 bytes): 7f 45 4c 46 02 01 01 00 00 00 00 00 00 00 00 00 .ELF............ 04 00 3e 00 01 00 00 00 00 00 00 00 00 00 00 00 ..>............. backtrace: [<0000000016a8ef9f>] __vmalloc_node_range+0x101/0x170 [<000000002b66b6c0>] __vmalloc_node+0xb4/0x160 [<00000000ad40107d>] crash_prepare_elf64_headers+0x8e/0xcd0 [<0000000019afff23>] crash_load_segments+0x260/0x470 [<0000000019ebe95c>] bzImage64_load+0x814/0xad0 [<0000000093e16b05>] arch_kexec_kernel_image_load+0x1be/0x2a0 [<000000009ef2fc88>] kimage_file_alloc_init+0x2ec/0x5a0 [<0000000038f5a97a>] __do_sys_kexec_file_load+0x28d/0x530 [<0000000087c19992>] do_syscall_64+0x3b/0x90 [<0000000066e063a4>] entry_SYSCALL_64_after_hwframe+0x44/0xae In crash_prepare_elf64_headers(), se asigna un b\u00fafer a trav\u00e9s de vmalloc() para almacenar encabezados elf. Sin embargo, no se libera correctamente al sistema cuando se vuelve a cargar o descargar el kernel kdump. Entonces se produce una p\u00e9rdida de memoria. Arr\u00e9glelo introduciendo la funci\u00f3n espec\u00edfica x86 arch_kimage_file_post_load_cleanup() y liberando el b\u00fafer all\u00ed. Y tambi\u00e9n elimine el c\u00f3digo incorrecto de liberaci\u00f3n del b\u00fafer del encabezado elf. Antes de llamar a la funci\u00f3n de carga kexec_file espec\u00edfica de arch, se ha inicializado la instancia de la imagen. Por lo tanto, 'image->elf_headers' debe ser NULL. No tiene sentido liberar el b\u00fafer del encabezado elf en ese lugar. Tres personas diferentes han informado tres errores sobre la p\u00e9rdida de memoria en x86_64 dentro de Redhat." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.46", + "matchCriteriaId": "40E62665-0BA6-440F-83E8-6F8EC2D3C9DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.14", + "matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.3", + "matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/115ee42a4c2f26ba2b4ace2668a3f004621f6833", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8765a423a87d74ef24ea02b43b2728fe4039f248", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b3e34a47f98974d0844444c5121aaff123004e57", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f675e3a9189d84a9324ab45b0cb19906c2bc8fcb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49547.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49547.json index 84c6430a80e..64466be29d3 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49547.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49547.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49547", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:30.590", - "lastModified": "2025-02-26T07:01:30.590", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:31:42.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,82 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: arregla el bloqueo entre escrituras dio concurrentes cuando hay poco espacio libre en los datos Al reservar espacio de datos para una escritura IO directa podemos acabar en un bloqueo si tenemos varias tareas intentando escribir en el mismo rango de archivos, hay varias extensiones cubiertas por ese rango de archivos, tenemos poco espacio disponible para los datos y las escrituras no expanden el i_size del inodo. El bloqueo puede ocurrir as\u00ed: 1) Tenemos un archivo con un i_size de 1M, en el desplazamiento 0 tiene una extensi\u00f3n con un tama\u00f1o de 128K y en el desplazamiento 128K tiene otra extensi\u00f3n tambi\u00e9n con un tama\u00f1o de 128K; 2) La tarea A realiza una escritura IO directa contra el rango de archivos [0, 256K), y debido a que la escritura est\u00e1 dentro del l\u00edmite i_size, toma el bloqueo del inodo (nivel VFS) en modo compartido; 3) La tarea A bloquea el rango de archivos [0, 256K) en btrfs_dio_iomap_begin() y luego obtiene el mapa de extensi\u00f3n para la extensi\u00f3n que cubre el rango [0, 128K). En btrfs_get_blocks_direct_write(), crea una extensi\u00f3n ordenada para ese rango de archivos ([0, 128K)); 4) Antes de regresar de btrfs_dio_iomap_begin(), desbloquea el rango de archivos [0, 256K); 5) La tarea A ejecuta btrfs_dio_iomap_begin() nuevamente, esta vez para el rango de archivos [128K, 256K), y bloquea el rango de archivos [128K, 256K); 6) La tarea B tambi\u00e9n inicia una escritura de E/S directa contra el rango de archivos [0, 256K). Tambi\u00e9n bloquea el inodo en modo compartido, ya que est\u00e1 dentro del l\u00edmite i_size, y luego intenta bloquear el rango de archivos [0, 256K). Puede bloquear el subrango [0, 128K) pero luego bloquea la espera del rango [128K, 256K), ya que est\u00e1 bloqueado actualmente por la tarea A; 7) La tarea A ingresa a btrfs_get_blocks_direct_write() e intenta reservar espacio de datos. Debido a que tenemos poco espacio libre disponible, activa la tarea de recuperaci\u00f3n de datos as\u00edncrona y espera a que reserve espacio de datos; 8) La tarea de recuperaci\u00f3n as\u00edncrona decide esperar a que se completen todas las extensiones ordenadas existentes (a trav\u00e9s de btrfs_wait_ordered_roots()). Encuentra la extensi\u00f3n ordenada creada previamente por la tarea A para el rango de archivos [0, 128K) y espera a que se complete; 9) La extensi\u00f3n ordenada para el rango de archivos [0, 128K) no se puede completar porque se bloquea en btrfs_finish_ordered_io() cuando intenta bloquear el rango de archivos [0, 128K). Esto da como resultado un punto muerto, porque: - la tarea B mantiene bloqueado el rango de archivos [0, 128K), esperando que la tarea A desbloquee el rango [128K, 256K); - la tarea A mantiene bloqueado el rango de archivos [128K, 256K) y est\u00e1 esperando que la tarea de recuperaci\u00f3n de datos as\u00edncrona satisfaga su solicitud de reserva de espacio; - la tarea de recuperaci\u00f3n de datos as\u00edncrona est\u00e1 esperando que se complete la extensi\u00f3n ordenada [0, 128K), pero la extensi\u00f3n ordenada no se puede completar porque el rango de archivos [0, 128K) est\u00e1 bloqueado actualmente por la tarea B, que est\u00e1 esperando que la tarea A desbloquee el rango de archivos [128K, 256K) y la tarea A est\u00e1 esperando la tarea de recuperaci\u00f3n de datos as\u00edncrona. Esto da como resultado un bloqueo entre 4 tareas: la tarea A, la tarea B, la tarea de recuperaci\u00f3n de datos asincr\u00f3nica y la tarea que realiza la finalizaci\u00f3n de la extensi\u00f3n ordenada (una tarea de cola de trabajo). Este tipo de bloqueo puede ser activado espor\u00e1dicamente por el caso de prueba generic/300 de fstests y da como resultado un seguimiento de pila como el siguiente: [12084.033689] INFO: la tarea kworker/u16:7:123749 se bloque\u00f3 durante m\u00e1s de 241 segundos. [12084.033689] INFO: task kworker/u16:7:123749 blocked for more than 241 seconds. [12084.034877] Not tainted 5.18.0-rc2-btrfs-next-115 #1 [12084.035562] \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message. [12084.036548] task:kworker/u16:7 state:D stack: 0 pid:123749 ppid: 2 flags:---truncated--- " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.27", + "versionEndExcluding": "5.16", + "matchCriteriaId": "682E95CF-F3D0-4417-B632-F8B6EE54D517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16.13", + "versionEndExcluding": "5.18.3", + "matchCriteriaId": "21CCFEA4-A572-4BBD-ACCC-76ADE4CDCBF9" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/cfae6f765b3c40882ee90dae8fbf9325c8de9c35", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f5585f4f0ef5b17026bbd60fbff6fcc91b99d5bf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49548.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49548.json index c169bc0f1b5..e2a8c52a513 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49548.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49548.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49548", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:30.683", - "lastModified": "2025-02-26T07:01:30.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:32:17.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: Se corrige un posible desbordamiento de matriz en bpf_trampoline_get_progs() El valor cnt en la comprobaci\u00f3n 'cnt >= BPF_MAX_TRAMP_PROGS' no incluye programas bpf BPF_TRAMP_MODIFY_RETURN, por lo que la cantidad de programas bpf BPF_TRAMP_MODIFY_RETURN adjuntos en un trampol\u00edn puede superar a BPF_MAX_TRAMP_PROGS. Cuando esto sucede, la asignaci\u00f3n '*progs++ = aux->prog' en bpf_trampoline_get_progs() provocar\u00e1 un desbordamiento de la matriz progs, ya que el campo progs en la estructura bpf_tramp_progs solo puede contener como m\u00e1ximo programas bpf BPF_MAX_TRAMP_PROGS." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.7", + "versionEndExcluding": "5.10.120", + "matchCriteriaId": "78702CD4-AEE5-45F6-90C7-1EB25AF09D08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.45", + "matchCriteriaId": "08D699AD-F4CE-4BDD-A97E-4997299C7712" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.13", + "matchCriteriaId": "192FC54B-5367-49D6-B410-0285F14665B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.2", + "matchCriteriaId": "9FF255A1-64F4-4E31-AF44-C92FB8773BA2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/32c4559c61652f24c9fdd5440342196fe37453bc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4f8897bcc20b9ae44758e0572538d741ab66f0dc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7f845de2863334bed4f362e95853f5e7bc323737", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a2aa95b71c9bbec793b5c5fa50f0a80d882b3e8d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e36452d5da6325df7c10cffc60a9e68d21e2606d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49549.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49549.json index 4dffbd270eb..0bfd4855ff3 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49549.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49549.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49549", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:30.773", - "lastModified": "2025-02-26T07:01:30.773", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:22:55.893", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/MCE/AMD: Se corrige la p\u00e9rdida de memoria cuando falla el umbral_create_bank() En mce_threshold_create_device(), si falla el umbral_create_bank(), la matriz de bancos de umbral previamente asignada @bp se filtrar\u00e1 porque la llamada a mce_threshold_remove_device() no la liberar\u00e1. Esto sucede porque mce_threshold_remove_device() obtiene el puntero a trav\u00e9s de la variable por CPU del umbral_banks, pero bp se escribe all\u00ed solo despu\u00e9s de que la creaci\u00f3n del banco sea exitosa, y no antes, cuando falla el umbral_create_bank(). Agregue un asistente que desenrolle todo el trabajo de creaci\u00f3n de bancos previamente realizado y le pase la matriz de bancos de umbral previamente asignada para liberar. [ bp: Masaje. ]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.8", + "versionEndExcluding": "5.10.121", + "matchCriteriaId": "6EB90EB1-2051-4828-B7F9-DDA87FD914C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.46", + "matchCriteriaId": "20D41697-0E8B-4B7D-8842-F17BF2AA21E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.14", + "matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.3", + "matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/396b8e7ab2a99ddac57d3522b3da5e58cb608d37", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9708f1956eeb70c86943e0bc62fa3b0101b59616", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b4acb8e7f1594607bc9017ef0aacb40b24a003d6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cc0dd4456f9573bf8af9b4d8754433918e809e1e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e5f28623ceb103e13fc3d7bd45edf9818b227fd0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49550.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49550.json index c162e897e64..30c913e07a8 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49550.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49550.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49550", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:30.863", - "lastModified": "2025-02-26T07:01:30.863", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:23:20.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fs/ntfs3: proporcionar block_invalidate_folio para reparar la p\u00e9rdida de memoria El sistema de archivos ntfs3 carece del m\u00e9todo 'invalidate_folio' y provoca una p\u00e9rdida de memoria. Si escribe en el sistema de archivos y luego lo desmonta, los datos escritos en cach\u00e9 no se liberan y se filtran de forma permanente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.3", + "matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0753245a72ec99824677586499ee2e0919164b3f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/724bbe49c5e427cb077357d72d240a649f2e4054", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49551.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49551.json index a3022f00b43..d6e81aab831 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49551.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49551.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49551", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:30.950", - "lastModified": "2025-02-26T07:01:30.950", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:27:26.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: isp1760: Fix out-of-bounds array access Running the driver through kasan gives an interesting splat: BUG: KASAN: global-out-of-bounds in isp1760_register+0x180/0x70c Read of size 20 at addr f1db2e64 by task swapper/0/1 (...) isp1760_register from isp1760_plat_probe+0x1d8/0x220 (...) This happens because the loop reading the regmap fields for the different ISP1760 variants look like this: for (i = 0; i < HC_FIELD_MAX; i++) { ... } Meaning it expects the arrays to be at least HC_FIELD_MAX - 1 long. However the arrays isp1760_hc_reg_fields[], isp1763_hc_reg_fields[], isp1763_hc_volatile_ranges[] and isp1763_dc_volatile_ranges[] se dimensionan din\u00e1micamente durante la compilaci\u00f3n. Solucione esto colocando una asignaci\u00f3n vac\u00eda al miembro de la matriz [HC_FIELD_MAX] y [DC_FIELD_MAX] al final de cada matriz. Esto har\u00e1 que la matriz tenga un miembro m\u00e1s de lo que necesita ser, pero evita el riesgo de sobrescribir lo que est\u00e9 dentro de [HC_FIELD_MAX - 1] y es simple e intuitivo de leer. Tambi\u00e9n agregue comentarios que expliquen lo que est\u00e1 sucediendo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.14", + "versionEndExcluding": "5.15.46", + "matchCriteriaId": "A27CF019-1F16-43FA-97F2-4D8F23EA7101" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.14", + "matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.3", + "matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/26ae2c942b5702f2e43d36b2a4389cfb7d616b6a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/463bddd3ff1acf4036ddb80c34a715eb99debf46", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/47d39cb57e8669e507d17d9e0d067d2b3e3a87ae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bf2558bbdce3ab1d6bcba09f354914e4515d0a2b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49560.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49560.json index 59b54dcb7d1..82593b7b8b0 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49560.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49560.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49560", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:31.780", - "lastModified": "2025-02-26T07:01:31.780", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:25:29.677", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: exfat: comprobar si el n\u00famero de cl\u00faster es v\u00e1lido Syzbot inform\u00f3 una lectura de slab fuera de los l\u00edmites en exfat_clear_bitmap. Esto fue provocado por el reproductor que llama a truncute con tama\u00f1o 0, lo que provoca el siguiente seguimiento: ERROR: KASAN: slab-out-of-bounds in exfat_clear_bitmap+0x147/0x490 fs/exfat/balloc.c:174 Read of size 8 at addr ffff888115aa9508 by task syz-executor251/365 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack_lvl+0x1e2/0x24b lib/dump_stack.c:118 print_address_description+0x81/0x3c0 mm/kasan/report.c:233 __kasan_report mm/kasan/report.c:419 [inline] kasan_report+0x1a4/0x1f0 mm/kasan/report.c:436 __asan_report_load8_noabort+0x14/0x20 mm/kasan/report_generic.c:309 exfat_clear_bitmap+0x147/0x490 fs/exfat/balloc.c:174 exfat_free_cluster+0x25a/0x4a0 fs/exfat/fatent.c:181 __exfat_truncate+0x99e/0xe00 fs/exfat/file.c:217 exfat_truncate+0x11b/0x4f0 fs/exfat/file.c:243 exfat_setattr+0xa03/0xd40 fs/exfat/file.c:339 notify_change+0xb76/0xe10 fs/attr.c:336 do_truncate+0x1ea/0x2d0 fs/open.c:65 Move the is_valid_cluster() helper from fatent.c to a common header to make it reusable in other *.c files. And add is_valid_cluster() to validate if cluster number is within valid range in exfat_clear_bitmap() and exfat_set_bitmap(). " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.7", + "versionEndExcluding": "5.10.120", + "matchCriteriaId": "78702CD4-AEE5-45F6-90C7-1EB25AF09D08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.45", + "matchCriteriaId": "08D699AD-F4CE-4BDD-A97E-4997299C7712" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.13", + "matchCriteriaId": "192FC54B-5367-49D6-B410-0285F14665B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.2", + "matchCriteriaId": "9FF255A1-64F4-4E31-AF44-C92FB8773BA2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2193286402df2d9c53294f7a858d5e6fd7346e08", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/64ba4b15e5c045f8b746c6da5fc9be9a6b00b61d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7c58b14b6f9cde9f69e7fa053ab73f6e013a7131", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/82f723b8a5adf497f9e34c702a30ca7298615654", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c504167adc3248095a905fa0700a9693897cb5ed", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49563.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49563.json index cf4b4cc24a1..fbb35aef9ed 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49563.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49563.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49563", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:32.060", - "lastModified": "2025-02-26T07:01:32.060", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:28:10.553", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,88 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: qat - a\u00f1adir comprobaci\u00f3n de par\u00e1metros para solicitudes de rechazo RSA con un b\u00fafer de origen que sea m\u00e1s grande que el tama\u00f1o de la clave. Esto es para evitar un posible desbordamiento de enteros que podr\u00eda ocurrir al copiar la lista de dispersi\u00f3n de origen en un b\u00fafer lineal." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "0DFC6E4B-8C85-4056-80F1-C9129E42FE45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4d6d2adce08788b7667a6e58002682ea1bbf6a79", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9714061423b8b24b8afb31b8eb4df977c63f19c4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f993321e50ba7a8ba4f5b19939e1772a921a1c42", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49564.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49564.json index 9a8db132f4d..a77206926d9 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49564.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49564.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49564", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:32.150", - "lastModified": "2025-02-26T07:01:32.150", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:19:21.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,88 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: qat - agregar comprobaci\u00f3n de par\u00e1metros para solicitudes de rechazo DH con un b\u00fafer de origen que sea m\u00e1s grande que el tama\u00f1o de la clave. Esto es para evitar un posible desbordamiento de enteros que podr\u00eda ocurrir al copiar la lista de dispersi\u00f3n de origen en un b\u00fafer lineal." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "0DFC6E4B-8C85-4056-80F1-C9129E42FE45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2acbb8771f6ac82422886e63832ee7a0f4b1635b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/76c9216833e7c20a67c987cf89719a3f01666aaa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e7f979ed51f96495328157df663c835b17db1e30", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49566.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49566.json index d2f07950426..b35b8449af7 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49566.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49566.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49566", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:32.333", - "lastModified": "2025-02-26T07:01:32.333", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:19:26.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: qat - reparar p\u00e9rdida de memoria en RSA Cuando se utiliza una clave RSA representada en formato 2 (como se define en PKCS #1 V2.1), algunos componentes de la clave privada persisten incluso despu\u00e9s de que se libere el TFM. Reemplace las llamadas expl\u00edcitas para liberar los b\u00faferes en qat_rsa_exit_tfm() con una llamada a qat_rsa_clear_ctx() que libera todos los b\u00faferes a los que se hace referencia en el contexto del TFM." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.8", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "AB678193-5BC5-499F-BD00-0B0AD62C511F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0f967fdc09955221a1951a279481b0bf4d359941", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/80a52e1ee7757b742f96bfb0d58f0c14eb6583d0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a843925e0287eebb4aa808666bf22c664dfe4c53", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49567.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49567.json index dbdaafc52e4..8a9124fafea 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49567.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49567.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49567", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:32.420", - "lastModified": "2025-02-26T07:01:32.420", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:20:08.247", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,158 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/mempolicy: fix uninit-value in mpol_rebind_policy() mpol_set_nodemask()(mm/mempolicy.c) does not set up nodemask when pol->mode is MPOL_LOCAL. Check pol->mode before access pol->w.cpuset_mems_allowed in mpol_rebind_policy()(mm/mempolicy.c). BUG: KMSAN: uninit-value in mpol_rebind_policy mm/mempolicy.c:352 [inline] BUG: KMSAN: uninit-value in mpol_rebind_task+0x2ac/0x2c0 mm/mempolicy.c:368 mpol_rebind_policy mm/mempolicy.c:352 [inline] mpol_rebind_task+0x2ac/0x2c0 mm/mempolicy.c:368 cpuset_change_task_nodemask kernel/cgroup/cpuset.c:1711 [inline] cpuset_attach+0x787/0x15e0 kernel/cgroup/cpuset.c:2278 cgroup_migrate_execute+0x1023/0x1d20 kernel/cgroup/cgroup.c:2515 cgroup_migrate kernel/cgroup/cgroup.c:2771 [inline] cgroup_attach_task+0x540/0x8b0 kernel/cgroup/cgroup.c:2804 __cgroup1_procs_write+0x5cc/0x7a0 kernel/cgroup/cgroup-v1.c:520 cgroup1_tasks_write+0x94/0xb0 kernel/cgroup/cgroup-v1.c:539 cgroup_file_write+0x4c2/0x9e0 kernel/cgroup/cgroup.c:3852 kernfs_fop_write_iter+0x66a/0x9f0 fs/kernfs/file.c:296 call_write_iter include/linux/fs.h:2162 [inline] new_sync_write fs/read_write.c:503 [inline] vfs_write+0x1318/0x2030 fs/read_write.c:590 ksys_write+0x28b/0x510 fs/read_write.c:643 __do_sys_write fs/read_write.c:655 [inline] __se_sys_write fs/read_write.c:652 [inline] __x64_sys_write+0xdb/0x120 fs/read_write.c:652 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82 entry_SYSCALL_64_after_hwframe+0x44/0xae Uninit was created at: slab_post_alloc_hook mm/slab.h:524 [inline] slab_alloc_node mm/slub.c:3251 [inline] slab_alloc mm/slub.c:3259 [inline] kmem_cache_alloc+0x902/0x11c0 mm/slub.c:3264 mpol_new mm/mempolicy.c:293 [inline] do_set_mempolicy+0x421/0xb70 mm/mempolicy.c:853 kernel_set_mempolicy mm/mempolicy.c:1504 [inline] __do_sys_set_mempolicy mm/mempolicy.c:1510 [inline] __se_sys_set_mempolicy+0x44c/0xb60 mm/mempolicy.c:1507 __x64_sys_set_mempolicy+0xd8/0x110 mm/mempolicy.c:1507 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82 entry_SYSCALL_64_after_hwframe+0x44/0xae KMSAN: uninit-value in mpol_rebind_task (2) https://syzkaller.appspot.com/bug?id=d6eb90f952c2a5de9ea718a1b873c55cb13b59dc This patch seems to fix below bug too. KMSAN: uninit-value in mpol_rebind_mm (2) https://syzkaller.appspot.com/bug?id=f2fecd0d7013f54ec4162f60743a2b28df40926b The uninit-value is pol->w.cpuset_mems_allowed in mpol_rebind_policy(). When syzkaller reproducer runs to the beginning of mpol_new(), mpol_new() mm/mempolicy.c do_mbind() mm/mempolicy.c kernel_mbind() mm/mempolicy.c `mode` is 1(MPOL_PREFERRED), nodes_empty(*nodes) is `true` and `flags` is 0. Then mode = MPOL_LOCAL; ... policy->mode = mode; policy->flags = flags; will be executed. So in mpol_set_nodemask(), mpol_set_nodemask() mm/mempolicy.c do_mbind() kernel_mbind() pol->mode is 4 (MPOL_LOCAL), that `nodemask` in `pol` is not initialized, which will be accessed in mpol_rebind_policy(). " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.9.325", + "matchCriteriaId": "6FD0FC1F-AC56-4EF7-8913-24FBB31FDFA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.290", + "matchCriteriaId": "1F023E37-5DAE-491D-9971-00FC089E8C7E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.254", + "matchCriteriaId": "56D38C39-4EB7-48A7-85D3-D4854AC7B3E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.208", + "matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/018160ad314d75b1409129b2247b614a9f35894c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/13d51565cec1aa432a6ab363edc2bbc53c6f49cb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5735845906fb1d90fe597f8b503fc0a857d475e3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/777e563f10e91e91130fe06bee85220d508e7b9b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8c5429a04ccd8dbcc3c753dab2f4126774ec28d4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a1f8765f68bc9bf5744b365bb9f5e0b6db93edfe", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aaa1c5d635a6fca2043513ffb5be169f9cd17d9e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ddb3f0b68863bd1c5f43177eea476bce316d4993", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49568.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49568.json index 10837f071f1..a0736f6dc32 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49568.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49568.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49568", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:32.517", - "lastModified": "2025-02-26T07:01:32.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:11:32.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,121 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: No desreferenciar ops->destroy Una depuraci\u00f3n de dispositivo KVM ocurre en cualquiera de dos devoluciones de llamada: 1) destroy() que se llama cuando se est\u00e1 destruyendo la VM; 2) release() que se llama cuando se cierra un fd de dispositivo. La mayor\u00eda de los dispositivos KVM usan 1) pero los dispositivos KVM del controlador de interrupciones de Book3s (XICS, XIVE, XIVE-native) usan 2) ya que necesitan cerrarse y volver a abrir durante la ejecuci\u00f3n de la m\u00e1quina. La gesti\u00f3n de errores en kvm_ioctl_create_device() asume que destroy() siempre est\u00e1 definido, lo que lleva a una desreferencia NULL como lo descubri\u00f3 Syzkaller. Esto agrega verificaciones para destroy!=NULL y agrega un release() faltante. Esto no est\u00e1 cambiando kvm_destroy_devices() ya que los dispositivos con release() definido deber\u00edan haber sido eliminados de la lista de dispositivos KVM para entonces." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.4.210", + "matchCriteriaId": "769A1563-4E73-4FA2-BDEB-9DBD40989582" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/170465715a60cbb7876e6b961b21bd3225469da8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3616776bc51cd3262bb1be60cc01c72e0a1959cf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d4a5a79b780891c5cbdfdc6124d46fdf8d13dba1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e8bc2427018826e02add7b0ed0fc625a60390ae5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e91665fbbf3ccb268b268a7d71a6513538d813ac", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49569.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49569.json index f093e182341..e8225cfa624 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49569.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49569.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49569", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:32.607", - "lastModified": "2025-02-26T07:01:32.607", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:11:35.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,152 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spi: bcm2835: bcm2835_spi_handle_err(): corrige la desreferencia del puntero NULL para transferencias que no sean DMA En caso de que se agote el tiempo de espera de una transferencia basada en IRQ, se llama a la funci\u00f3n bcm2835_spi_handle_err(). Desde el commit 1513ceee70f2 (\"spi: bcm2835: Drop dma_pending flag\") las transferencias DMA TX y RX se cancelan incondicionalmente, lo que lleva a desreferencias del puntero NULL si no se configuran ctlr->dma_tx o ctlr->dma_rx. Corrija la desreferencia del puntero NULL comprobando que ctlr->dma_tx y ctlr->dma_rx sean punteros v\u00e1lidos antes de acceder a ellos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4", + "versionEndExcluding": "5.4.208", + "matchCriteriaId": "7E96E649-47EC-458E-8AC7-5A642A2EF7A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/49ffa473218012e765682343de2052eb4c1f06a7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4ceaa684459d414992acbefb4e4c31f2dfc50641", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/58466e05390043d2805685c70f55f3f59711bdf2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/684896e675edd8b669fd3e9f547c5038222d85bc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/76668d2a2f367d25ff448e6d7087406af7d7bb2b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49570.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49570.json index a73fe2bb1db..cdc0976a859 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49570.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49570.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49570", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:32.693", - "lastModified": "2025-02-26T07:01:32.693", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:19:40.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,124 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gpio: gpio-xilinx: Se corrige el desbordamiento de enteros. La implementaci\u00f3n actual no puede configurar m\u00e1s de 32 pines debido a un tipo de datos incorrecto. Por lo tanto, se realiza una conversi\u00f3n de tipos con unsigned long para evitarlo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.14", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "DF6D28E5-50E7-41DF-8C6B-9A607F116EC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/32c094a09d5829ad9b02cdf667569aefa8de0ea6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6f16a5390640807dde420ee5ccbc4c95577aea6a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e129e5486b981d324057e6986059f852658b0d00", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49571.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49571.json index 3354d282b7e..701c5b01c03 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49571.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49571.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49571", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:32.780", - "lastModified": "2025-02-26T07:01:32.780", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:04:22.707", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,166 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se han corregido las ejecuciones de datos en torno a sysctl_tcp_max_reordering. Al leer sysctl_tcp_max_reordering, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.19", + "versionEndExcluding": "4.19.254", + "matchCriteriaId": "F45605C5-6E4D-416B-B48F-C6E46604E62A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.208", + "matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/064852663308c801861bd54789d81421fa4c2928", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/46deb91ac8a790286ad6d24cf92e7ab0ab2582bb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/50a1d3d097503a90cf84ebe120afcde37e9c33b3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5e38cee24f19d19280c68f1ac8bf6790d607f60a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a11e5b3e7a59fde1a90b0eaeaa82320495cf8cae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ce3731c61589ed73364a5b55ce34131762ef9b60", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49572.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49572.json index 6cd0e1313d5..8321d28f952 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49572.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49572.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49572", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:32.877", - "lastModified": "2025-02-26T07:01:32.877", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:06:02.287", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,166 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se corrigen las ejecuciones de datos en torno a sysctl_tcp_slow_start_after_idle. Al leer sysctl_tcp_slow_start_after_idle, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.18", + "versionEndExcluding": "4.19.254", + "matchCriteriaId": "FE70029C-E83E-4325-87B3-7B64A7790B31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.208", + "matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0e3f82a03ec8c3808e87283e12946227415706c9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/369d99c2b89f54473adcf9acdf40ea562b5a6e0e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3b26e11b07a09b31247688bec61e2925d4a571b6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/41aeba4506f6b70ec7500c6fe202731a4ba29fe5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4845b5713ab18a1bb6e31d1fbb4d600240b8b691", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/68b6f9506747d507c7bfa374d178929b4157e8c6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49573.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49573.json index 465e30f8811..8cb07dabba2 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49573.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49573.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49573", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:32.970", - "lastModified": "2025-02-26T07:01:32.970", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:06:23.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,166 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se ha corregido una ejecuci\u00f3n de datos en torno a sysctl_tcp_early_retrans. Al leer sysctl_tcp_early_retrans, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a su lector." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.5", + "versionEndExcluding": "4.19.254", + "matchCriteriaId": "FEA6FB77-04CE-4B7D-9EDA-A15604B8CDA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.208", + "matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/11e8b013d16e5db63f8f76acceb5b86964098aaa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/488d3ad98ef7cddce7054193dbae6b4349c6807d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5037ca9e4b169cc9aed0174d658c3d81fdaf8ea5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/52e65865deb6a36718a463030500f16530eaab74", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/83767fe800a311370330d4ec83aa76093b744a80", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d5975f6376ce90c2c483ae36bf88c9cface4c13b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49574.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49574.json index 5f18248f0a1..fcf273f8d01 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49574.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49574.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49574", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:33.063", - "lastModified": "2025-02-26T07:01:33.063", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:09:22.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,166 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se han corregido las ejecuciones de datos en torno a sysctl_tcp_recovery. Al leer sysctl_tcp_recovery, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.4", + "versionEndExcluding": "4.19.254", + "matchCriteriaId": "06315BCE-8FDE-447B-9A7F-D2B70F13AA4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.208", + "matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/52ee7f5c4811ce6be1becd14d38ba1f8a8a0df81", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/92c35113c63306091df9211375eebd0abd8c2160", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a31e2d0cb5cfa2aae3144cac04f25031d5d20fb4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c7a492db1f7c37c758a66915908677bd8bc5d368", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d8781f7cd04091744f474a2bada74772084b9dc9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e7d2ef837e14a971a05f60ea08c47f3fed1a36e4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49575.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49575.json index 43342be320f..aef6550aff5 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49575.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49575.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49575", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:33.157", - "lastModified": "2025-02-26T07:01:33.157", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:09:15.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,166 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se ha corregido una ejecuci\u00f3n de datos en torno a sysctl_tcp_thin_linear_timeouts. Al leer sysctl_tcp_thin_linear_timeouts, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a su lector." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.34", + "versionEndExcluding": "4.19.254", + "matchCriteriaId": "C6C7F5D5-5446-4DCA-9E0F-87A4F4E57BDE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.208", + "matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/404c53ccdebd11f96954f4070cffac8e0b4d5cb6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/492f3713b282c0e67e951cd804edd22eccc25412", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7c6f2a86ca590d5187a073d987e9599985fb1c7c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a0f96c4f179cb3560078cefccef105e8f1701210", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cc133e4f4bc225079198192623945bb872c08143", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f4b0295be9a3c4260de4585fac4062e602a88ac7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49576.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49576.json index fa0e7270664..9948e3315a4 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49576.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49576.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49576", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:33.243", - "lastModified": "2025-02-26T07:01:33.243", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:09:11.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,124 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv4: Se han corregido las ejecuciones de datos en torno a sysctl_fib_multipath_hash_fields. Al leer sysctl_fib_multipath_hash_fields, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.14", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "DF6D28E5-50E7-41DF-8C6B-9A607F116EC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/36f5b86f309b3b11295d087cd7433f1c897caf94", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/548d6678c4a3d43667e59686665f8674b82440a3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8895a9c2ac76fb9d3922fed4fe092c8ec5e5cccc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49577.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49577.json index 0da83d45154..44999c49c54 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49577.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49577.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49577", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:33.333", - "lastModified": "2025-02-26T07:01:33.333", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:09:07.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,152 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: udp: Se ha corregido una ejecuci\u00f3n de datos en torno a sysctl_udp_l3mdev_accept. Al leer sysctl_udp_l3mdev_accept, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a su lector." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.11", + "versionEndExcluding": "5.4.208", + "matchCriteriaId": "ED1B4EB9-4060-42EF-A5C3-559416B24A87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3d72bb4188c708bb16758c60822fc4dda7a95174", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3f2ac2d6511bb0652abf4d7388d65bb9ff1c641c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cb0d28934ca10f99c47e2c6f451405d6c954fe48", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f39b03bd727a8fea62e82f10fe2e0d753b9930ff", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fcaef69c79ec222e55643e666b80b221e70fa6a8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49578.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49578.json index c2238585d94..e3141fa5ce1 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49578.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49578.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49578", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:33.433", - "lastModified": "2025-02-26T07:01:33.433", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:20:41.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,138 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ip: Se han solucionado las ejecuciones de datos en torno a sysctl_ip_prot_sock. Se accede a sysctl_ip_prot_sock simult\u00e1neamente y siempre existe la posibilidad de una ejecuci\u00f3n de datos. Por lo tanto, todos los lectores y escritores necesitan una protecci\u00f3n b\u00e1sica para evitar la rotura de datos en la carga y el almacenamiento." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.11", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "71D7FCD0-3DCF-4145-9258-A2987C1B29FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/95724fe897a4ecf2be51452ef96e818568071664", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9add240f76af6d141d2eebd3a1558a0e503a993d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9b55c20f83369dd54541d9ddbe3a018a8377f451", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ef699813d99cc29e6e25c9f6da7766526cc8bd6e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49579.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49579.json index d9e38f9eb21..8fc36583670 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49579.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49579.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49579", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:33.520", - "lastModified": "2025-02-26T07:01:33.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:09:03.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,124 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv4: Se han corregido las ejecuciones de datos en torno a sysctl_fib_multipath_hash_policy. Al leer sysctl_fib_multipath_hash_policy, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.12", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "AD9715C9-CE55-44EB-A22D-F7D2795B2137" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/21fb844bc1dc1461f5038d655aa1a14f39e13049", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7998c12a08c97cc26660532c9f90a34bd7d8da5a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/918ee6592ab9a2ff5316d06cfd4aaef60ccabec6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49580.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49580.json index 103341a8725..ba5aefb37e8 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49580.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49580.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49580", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:33.610", - "lastModified": "2025-02-26T07:01:33.610", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:08:59.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,152 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv4: Se ha corregido una ejecuci\u00f3n de datos en torno a sysctl_fib_multipath_use_neigh. Al leer sysctl_fib_multipath_use_neigh, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a su lector." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.7", + "versionEndExcluding": "5.4.208", + "matchCriteriaId": "13BD9D6D-9015-4576-8691-F6EF142F0FCD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/14e996577ed2799a1ed6ffeb71c76d63acb28444", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6727f39e99e0f545d815edebb6c94228485427ec", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/87507bcb4f5de16bb419e9509d874f4db6c0ad0f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b8d345db03b4deffb4f04219a51d3b1e94171b76", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e045d672ba06e1d35bacb56374d350de0ac99066", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49582.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49582.json index ca42fb3f5d7..41b6b546d25 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49582.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49582.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49582", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:33.807", - "lastModified": "2025-02-26T07:01:33.807", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:11:23.753", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,110 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dsa: fix NULL pointer dereference in dsa_port_reset_vlan_filtering La variable de iterador \"ds\" utilizada en dsa_port_reset_vlan_filtering() -> dsa_switch_for_each_port() sobrescribe el \"dp\" recibido como argumento, que luego se utiliza para llamar a dsa_port_vlan_filtering() correctamente. Como resultado, los conmutadores que ingresan a esa ruta de c\u00f3digo (los que tienen vlan_filtering_is_global=true) desreferenciar\u00e1n un dp no v\u00e1lido en dsa_port_reset_vlan_filtering() despu\u00e9s de abandonar un puente con reconocimiento de VLAN. Utilice una variable de iterador \"other_dp\" dedicada para evitar que esto suceda." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1699b4d502eda3c7ea4070debad3ee570b5091b1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3240e12fe203a3a79b9814e83327106b770ed7b0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49583.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49583.json index 8e5258681e0..894ad1cf11f 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49583.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49583.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49583", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:33.897", - "lastModified": "2025-02-26T07:01:33.897", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:21:21.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,159 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iavf: Se corrige la gesti\u00f3n de descriptores de recepci\u00f3n ficticios Se corrige la p\u00e9rdida de memoria causada por no manejar correctamente los descriptores de recepci\u00f3n ficticios. iavf_get_rx_buffer ahora establece el valor de retorno de rx_buffer para los descriptores de recepci\u00f3n ficticios. Sin este parche, cuando el hardware escribe un descriptor ficticio, iavf no liberar\u00eda la p\u00e1gina asignada para el b\u00fafer de recepci\u00f3n anterior. Este es un evento poco probable, pero a\u00fan puede suceder. [Jesse: mensaje de confirmaci\u00f3n modificado]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1.20", + "versionEndExcluding": "5.2", + "matchCriteriaId": "EC3742A3-C6ED-4C21-A58F-884ACEC9E36C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.2.3", + "versionEndExcluding": "5.4.208", + "matchCriteriaId": "4FD250FE-03DB-40C8-AE19-554AA79A120A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2918419c06088f6709ceb543feb01752779ade4c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6edb818732fc05fda495f5b3a749bd1cee01398b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a9f49e0060301a9bfebeca76739158d0cf91cdf6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c6af94324911ef0846af1a5ce5e049ca736db34b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d88d59faf4e6f9cc4767664206afdb999b10ec77", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49585.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49585.json index c3f8686b09a..69b9abc11d1 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49585.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49585.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49585", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.080", - "lastModified": "2025-02-26T07:01:34.080", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:08:55.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,138 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se han corregido las ejecuciones de datos en torno a sysctl_tcp_fastopen_blackhole_timeout. Al leer sysctl_tcp_fastopen_blackhole_timeout, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.12", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "AD1C7832-881B-46D0-B04F-DEEDC40B1AF1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/021266ec640c7a4527e6cd4b7349a512b351de1d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0dc2f19d8c2636cebda7976b5ea40c6d69f0d891", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8afa5604e295046c02b79ccf9e2bbbf8d969d60e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a77a75a0e7f397550ab039f96115103e78dd5c69", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49586.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49586.json index 4b021d1c8db..fb6446e8da0 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49586.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49586.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49586", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.167", - "lastModified": "2025-02-26T07:01:34.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:08:51.117", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,166 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se han corregido las ejecuciones de datos en torno a sysctl_tcp_fastopen. Al leer sysctl_tcp_fastopen, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.6", + "versionEndExcluding": "4.19.254", + "matchCriteriaId": "4FD943C4-AACA-4BF5-A8B7-8B2475F6C652" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.208", + "matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/03da610696a32578fc4f986479341ce9d430df08", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/22938534c611136f35e2ca545bb668073ca5ef49", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/25d53d858a6c0b89a6e69e376c2a57c4f4c2c8cc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/448ab998947996a0a451f8229f19087964cf2670", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/539d9ab79eba3974b479cad61a8688c41fe62e12", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5a54213318c43f4009ae158347aa6016e3b9b55a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49587.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49587.json index cddb36902cc..580f3ebacad 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49587.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49587.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49587", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.260", - "lastModified": "2025-02-26T07:01:34.260", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:08:46.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,194 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se ha corregido una ejecuci\u00f3n de datos en torno a sysctl_tcp_notsent_lowat. Al leer sysctl_tcp_notsent_lowat, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a su lector." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.12", + "versionEndExcluding": "4.9.325", + "matchCriteriaId": "A3A70DD6-D2E6-4C07-87BE-FCC338F5BC3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.290", + "matchCriteriaId": "1F023E37-5DAE-491D-9971-00FC089E8C7E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.254", + "matchCriteriaId": "56D38C39-4EB7-48A7-85D3-D4854AC7B3E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.208", + "matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0f75343584ee474303e17efe0610bdd170af1d13", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/55be873695ed8912eb77ff46d1d1cadf028bd0f3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/62e56cfeb2ae4b53ae9ca24c80f54093250ce64a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/80d4d0c461674eea87f0977e12a2ecd334b9b79c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/91e21df688f8a75255ca9c459da39ac96300113a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c1b85c5a34294f7444c13bf828e0e84b0a0eed85", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e9362a993886613ef0284c2a4911c6017c97d803", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fd6f1284e380c377932186042ff0b5c987fb2b92", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49588.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49588.json index 15e797fd815..b73431e1a08 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49588.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49588.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49588", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.367", - "lastModified": "2025-02-26T07:01:34.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T21:08:40.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,131 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se han corregido las ejecuciones de datos en torno a sysctl_tcp_migrate_req. Al leer sysctl_tcp_migrate_req, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.188", + "versionEndExcluding": "5.11", + "matchCriteriaId": "6D42E8C7-CD33-432A-AC09-DC524C88ECE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.14", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "DF6D28E5-50E7-41DF-8C6B-9A607F116EC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4177f545895b1da08447a80692f30617154efa6e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6e569a11eea20a1ccebc3c4e6366bf0574a449e1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fcf6c6d8aeffebca66f37b17ef1b57112e5e09c1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49589.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49589.json index 250ff72078e..b907cde3a5c 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49589.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49589.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49589", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.470", - "lastModified": "2025-02-26T07:01:34.470", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-10T20:47:27.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,172 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: igmp: Se corrigen las ejecuciones de datos en torno a sysctl_igmp_qrv. Al leer sysctl_igmp_qrv, se puede cambiar simult\u00e1neamente. Por lo tanto, necesitamos agregar READ_ONCE() a sus lectores. Esta prueba se puede empaquetar en un asistente, por lo que dichos cambios estar\u00e1n en la serie de seguimiento despu\u00e9s de que net se fusione con net-next. qrv ?: READ_ONCE(net->ipv4.sysctl_igmp_qrv);" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.18", + "versionEndExcluding": "4.19.255", + "matchCriteriaId": "A617EFB6-24F0-4201-BE74-5365BC7894AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.209", + "matchCriteriaId": "8A22815E-5E13-479C-8A92-BACF21F911EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.135", + "matchCriteriaId": "BB550DF5-C3A3-4009-A61F-C7293D5A081D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.59", + "matchCriteriaId": "79909FF8-3A4D-4569-8AB9-60BACD5CCD5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*", + "matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*", + "matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*", + "matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*", + "matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*", + "matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*", + "matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/8ebcc62c738f68688ee7c6fec2efe5bc6d3d7e60", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9eeb3a7702998bdccbfcc37997b5dd9215b9a7f7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b399ffafffba39f47b731b26a5da1dc0ffc4b3ad", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c2954671010cd1127d1ffa328c6e6f8e99930982", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c721324afc589f8ea54bae04756b150aeaae5fa4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e20dd1b0e0ea15bee1e528536a0840dba972ca0e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Mailing List", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49590.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49590.json index 8517e5330e6..5d2bcead75d 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49590.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49590.json @@ -2,7 +2,7 @@ "id": "CVE-2022-49590", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.573", - "lastModified": "2025-03-10T20:23:01.223", + "lastModified": "2025-03-10T20:49:24.353", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49591.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49591.json index 7d4cf2d566c..a2d10f53e4d 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49591.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49591.json @@ -2,7 +2,7 @@ "id": "CVE-2022-49591", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.667", - "lastModified": "2025-03-10T20:23:01.223", + "lastModified": "2025-03-10T20:50:02.120", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49593.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49593.json index a3a0bc6449a..b75f4dcb2c4 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49593.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49593.json @@ -2,7 +2,7 @@ "id": "CVE-2022-49593", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.853", - "lastModified": "2025-03-10T20:23:01.223", + "lastModified": "2025-03-10T20:51:03.090", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49594.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49594.json index 315fdc6bb33..3c214f4eb2b 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49594.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49594.json @@ -2,7 +2,7 @@ "id": "CVE-2022-49594", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:34.947", - "lastModified": "2025-03-10T20:23:01.223", + "lastModified": "2025-03-10T20:51:45.677", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49595.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49595.json index 84cb2e51d56..5373e4bb4f6 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49595.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49595.json @@ -2,7 +2,7 @@ "id": "CVE-2022-49595", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:35.040", - "lastModified": "2025-03-10T20:23:01.223", + "lastModified": "2025-03-10T20:52:18.940", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49596.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49596.json index 63aede77ab4..15bac137e5f 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49596.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49596.json @@ -2,7 +2,7 @@ "id": "CVE-2022-49596", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:35.133", - "lastModified": "2025-03-10T20:23:01.223", + "lastModified": "2025-03-10T20:52:57.903", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49597.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49597.json index 3e6fb3d305c..b6fb304e637 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49597.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49597.json @@ -2,7 +2,7 @@ "id": "CVE-2022-49597", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:35.220", - "lastModified": "2025-03-10T20:23:01.223", + "lastModified": "2025-03-10T20:54:24.560", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49598.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49598.json index 8cae144ad21..bb91999a05d 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49598.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49598.json @@ -2,7 +2,7 @@ "id": "CVE-2022-49598", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:35.310", - "lastModified": "2025-03-10T20:23:01.223", + "lastModified": "2025-03-10T20:53:46.410", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ diff --git a/CVE-2022/CVE-2022-495xx/CVE-2022-49599.json b/CVE-2022/CVE-2022-495xx/CVE-2022-49599.json index 64a556da653..f0768bf096e 100644 --- a/CVE-2022/CVE-2022-495xx/CVE-2022-49599.json +++ b/CVE-2022/CVE-2022-495xx/CVE-2022-49599.json @@ -2,7 +2,7 @@ "id": "CVE-2022-49599", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:35.403", - "lastModified": "2025-03-10T20:23:01.223", + "lastModified": "2025-03-10T20:54:57.747", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20867.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20867.json index 9008393271e..a8d672e6e74 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20867.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20867.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20867", "sourceIdentifier": "security@vmware.com", "published": "2023-06-13T17:15:14.070", - "lastModified": "2024-11-21T07:41:43.433", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:43:28.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,7 +80,7 @@ "description": [ { "lang": "en", - "value": "CWE-287" + "value": "NVD-CWE-noinfo" } ] } diff --git a/CVE-2023/CVE-2023-252xx/CVE-2023-25280.json b/CVE-2023/CVE-2023-252xx/CVE-2023-25280.json index b9874a8244a..cb6e6008f92 100644 --- a/CVE-2023/CVE-2023-252xx/CVE-2023-25280.json +++ b/CVE-2023/CVE-2023-252xx/CVE-2023-25280.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25280", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-16T01:15:46.780", - "lastModified": "2024-11-21T07:49:22.837", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:49:10.030", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25717.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25717.json index 67d606e0213..58171373165 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25717.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25717.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25717", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-13T20:15:10.973", - "lastModified": "2025-01-29T16:15:39.253", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:48:20.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27997.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27997.json index 121fde009e1..f99b1e4b90c 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27997.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27997.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27997", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-06-13T09:15:16.613", - "lastModified": "2024-11-21T07:53:53.957", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:40:57.323", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28229.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28229.json index 18af692f2f4..aee90168276 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28229.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28229.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28229", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-11T21:15:23.387", - "lastModified": "2024-11-21T07:54:39.223", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:50:17.200", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -56,7 +56,7 @@ "description": [ { "lang": "en", - "value": "CWE-662" + "value": "NVD-CWE-Other" } ] } diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28252.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28252.json index 2ed429ee68c..c14861cf4b4 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28252.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28252.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28252", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-11T21:15:25.137", - "lastModified": "2025-01-01T02:15:24.757", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:50:39.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28432.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28432.json index 2be41a9c183..89dc2f478e4 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28432.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28432.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28432", "sourceIdentifier": "security-advisories@github.com", "published": "2023-03-22T21:15:18.257", - "lastModified": "2024-11-21T07:55:03.283", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:49:25.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28434.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28434.json index 58849c57b55..2df5eb4fa1f 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28434.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28434.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28434", "sourceIdentifier": "security-advisories@github.com", "published": "2023-03-22T21:15:18.427", - "lastModified": "2024-11-21T07:55:03.533", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:49:43.140", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29336.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29336.json index c458d1fee47..ee3c8980128 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29336.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29336.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29336", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:13.840", - "lastModified": "2024-11-21T07:56:53.257", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:36:29.143", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29357.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29357.json index e5625e47e6f..c32eb91f2ec 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29357.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29357.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29357", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:09.903", - "lastModified": "2024-11-21T07:56:55.393", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:44:31.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29360.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29360.json index 1d2dec00e7e..9fbda13868c 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29360.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29360.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29360", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:10.067", - "lastModified": "2024-11-21T07:56:55.787", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:45:37.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29492.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29492.json index b402f4d5b7e..668dbfa2c2e 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29492.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29492.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29492", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-11T05:15:07.393", - "lastModified": "2024-11-21T07:57:10.087", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:49:57.083", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32046.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32046.json index a3a8f58ce93..3d31cc92482 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32046.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32046.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32046", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-11T18:15:13.313", - "lastModified": "2025-01-01T02:15:42.747", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:45:52.913", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32049.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32049.json index 5d0b7be9a3c..23ba9ddf02b 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32049.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32049.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32049", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-11T18:15:13.430", - "lastModified": "2024-11-21T08:02:36.543", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:46:21.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32315.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32315.json index a70718793d0..3b284177733 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32315.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32315.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32315", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-26T23:15:16.643", - "lastModified": "2024-11-21T08:03:05.767", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:36:57.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3357.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3357.json index 9d8760e399a..064c1d122ed 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3357.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3357.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3357", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-28T22:15:09.587", - "lastModified": "2024-11-21T08:17:05.570", + "lastModified": "2025-03-10T21:15:38.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3358.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3358.json index 32ca7ab2fc6..8ff91d387de 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3358.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3358.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3358", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-28T22:15:09.647", - "lastModified": "2024-11-21T08:17:05.693", + "lastModified": "2025-03-10T21:15:39.320", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3439.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3439.json index 124d0e7f389..ff8ff9f4c05 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3439.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3439.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3439", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2023-06-28T21:15:10.517", - "lastModified": "2024-11-21T08:17:16.167", + "lastModified": "2025-03-10T21:15:39.513", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3519.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3519.json index a17f6606642..28a8fdf379d 100644 --- a/CVE-2023/CVE-2023-35xx/CVE-2023-3519.json +++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3519.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3519", "sourceIdentifier": "secure@citrix.com", "published": "2023-07-19T18:15:11.513", - "lastModified": "2025-02-13T17:16:57.200", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:46:43.453", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36845.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36845.json index d396db3fff6..d026adac2ad 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36845.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36845.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36845", "sourceIdentifier": "sirt@juniper.net", "published": "2023-08-17T20:15:10.360", - "lastModified": "2025-02-13T17:16:43.583", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:31:09.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38180.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38180.json index b9caffd7fa6..4224c86cff0 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38180.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38180.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38180", "sourceIdentifier": "secure@microsoft.com", "published": "2023-08-08T19:15:10.367", - "lastModified": "2025-02-26T17:15:21.023", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:30:38.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40044.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40044.json index b75f5374300..413dd795f46 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40044.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40044.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40044", "sourceIdentifier": "security@progress.com", "published": "2023-09-27T15:18:57.307", - "lastModified": "2025-02-13T17:17:00.470", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:32:25.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-427xx/CVE-2023-42793.json b/CVE-2023/CVE-2023-427xx/CVE-2023-42793.json index aa9460e9b00..8e98ba5176b 100644 --- a/CVE-2023/CVE-2023-427xx/CVE-2023-42793.json +++ b/CVE-2023/CVE-2023-427xx/CVE-2023-42793.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42793", "sourceIdentifier": "cve@jetbrains.com", "published": "2023-09-19T17:15:08.330", - "lastModified": "2024-12-16T12:15:04.797", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:32:11.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -150,7 +150,11 @@ }, { "url": "https://www.sonarsource.com/blog/teamcity-vulnerability/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "http://packetstormsecurity.com/files/174860/JetBrains-TeamCity-Unauthenticated-Remote-Code-Execution.html", diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4211.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4211.json index c21f83ce97f..4134221ebf0 100644 --- a/CVE-2023/CVE-2023-42xx/CVE-2023-4211.json +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4211.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4211", "sourceIdentifier": "arm-security@arm.com", "published": "2023-10-01T18:15:09.927", - "lastModified": "2025-02-04T15:15:17.480", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:32:41.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6345.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6345.json index cf85b28b415..7e9c28fbb2f 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6345.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6345.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6345", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-11-29T12:15:07.077", - "lastModified": "2025-02-03T14:15:37.710", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:33:27.970", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7024.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7024.json index 6c51113a064..c9af8122dff 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7024.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7024.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7024", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-12-21T23:15:11.213", - "lastModified": "2025-02-03T14:15:37.920", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:33:38.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7101.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7101.json index 1d5ea819c0a..012e8e059df 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7101.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7101.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7101", "sourceIdentifier": "mandiant-cve@google.com", "published": "2023-12-24T22:15:07.983", - "lastModified": "2025-02-13T18:16:12.690", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:23:08.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12356.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12356.json index 57f0f18f5c2..b1a665096db 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12356.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12356.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12356", "sourceIdentifier": "13061848-ea10-403d-bd75-c83a022c2891", "published": "2024-12-17T05:15:06.413", - "lastModified": "2025-02-17T21:15:10.327", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:27:00.663", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -135,7 +135,11 @@ }, { "url": "https://attackerkb.com/topics/G5s8ZWAbYH/cve-2024-12356/rapid7-analysis", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-209xx/CVE-2024-20953.json b/CVE-2024/CVE-2024-209xx/CVE-2024-20953.json index c2a1194a8aa..7ac7ccd2f33 100644 --- a/CVE-2024/CVE-2024-209xx/CVE-2024-20953.json +++ b/CVE-2024/CVE-2024-209xx/CVE-2024-20953.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20953", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-02-17T02:15:49.520", - "lastModified": "2025-02-25T02:00:02.097", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:23:29.163", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -99,7 +99,10 @@ }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-096/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21413.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21413.json index 1047b66c671..6ea63d6588c 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21413.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21413.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21413", "sourceIdentifier": "secure@microsoft.com", "published": "2024-02-13T18:16:00.137", - "lastModified": "2025-02-07T02:00:02.403", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:23:20.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -116,7 +116,10 @@ }, { "url": "https://research.checkpoint.com/2024/the-risks-of-the-monikerlink-bug-in-microsoft-outlook-and-the-big-picture/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Technical Description" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32113.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32113.json index fbf72a092d4..965973af684 100644 --- a/CVE-2024/CVE-2024-321xx/CVE-2024-32113.json +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32113.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32113", "sourceIdentifier": "security@apache.org", "published": "2024-05-08T15:15:10.227", - "lastModified": "2025-02-13T18:18:02.173", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:23:37.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35250.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35250.json index b5ac34c948d..52283f63a0a 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35250.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35250.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35250", "sourceIdentifier": "secure@microsoft.com", "published": "2024-06-11T17:16:02.650", - "lastModified": "2024-12-17T02:00:02.077", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:23:53.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -60,7 +60,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "NVD-CWE-Other" } ] } diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4885.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4885.json index d526a966873..df7971a1ca3 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4885.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4885.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4885", "sourceIdentifier": "security@progress.com", "published": "2024-06-25T20:15:12.970", - "lastModified": "2025-03-04T02:00:01.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:24:16.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50302.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50302.json index e34341259b7..f63b5e84413 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50302.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50302.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50302", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-19T02:16:32.320", - "lastModified": "2025-03-05T02:00:02.390", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:26:51.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -22,7 +22,7 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "baseScore": 5.5, "baseSeverity": "MEDIUM", "attackVector": "LOCAL", @@ -30,9 +30,9 @@ "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", + "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "HIGH" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -86,6 +86,21 @@ } ], "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + }, { "nodes": [ { diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50623.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50623.json index 53772753701..1dbbc3289b8 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50623.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50623.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50623", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T00:15:03.657", - "lastModified": "2024-12-23T06:15:06.357", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-10T20:25:14.940", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56191.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56191.json new file mode 100644 index 00000000000..f7e18521f9c --- /dev/null +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56191.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-56191", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2025-03-10T21:15:39.880", + "lastModified": "2025-03-10T21:15:39.880", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In dhd_process_full_gscan_result of dhd_pno.c, there is a possible EoP due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/docs/security/bulletin/pixel-watch/2025/2025-03-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56192.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56192.json new file mode 100644 index 00000000000..b30cc5ec29c --- /dev/null +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56192.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-56192", + "sourceIdentifier": "dsap-vuln-management@google.com", + "published": "2025-03-10T21:15:40.007", + "lastModified": "2025-03-10T21:15:40.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In wl_notify_gscan_event of wl_cfgscan.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/docs/security/bulletin/pixel-watch/2025/2025-03-01", + "source": "dsap-vuln-management@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0660.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0660.json new file mode 100644 index 00000000000..d5ad20f7216 --- /dev/null +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0660.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-0660", + "sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "published": "2025-03-10T21:15:40.110", + "lastModified": "2025-03-10T21:15:40.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Concrete CMS versions 9.0.0 through 9.3.9 are affected by a stored XSS in Folder Function.The \"Add Folder\" functionality lacks input sanitization, allowing a rogue admin to inject XSS payloads as folder names.\u00a0\u00a0The Concrete CMS security team gave this vulnerability a CVSS 4.0 Score of 4.8 with vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N. Versions below 9 are not affected. Thanks, Alfin Joseph\u00a0for reporting." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/940-release-notes", + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + }, + { + "url": "https://github.com/concretecms/bedrock/pull/370", + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + }, + { + "url": "https://github.com/concretecms/concretecms/pull/12454", + "source": "ff5b8ace-8b95-4078-9743-eac1ca5451de" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1920.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1920.json new file mode 100644 index 00000000000..d3edd594cd8 --- /dev/null +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1920.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-1920", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2025-03-10T21:15:40.280", + "lastModified": "2025-03-10T21:15:40.280", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Type Confusion in V8 in Google Chrome prior to 134.0.6998.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "chrome-cve-admin@google.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "references": [ + { + "url": "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_10.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/398065918", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2135.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2135.json new file mode 100644 index 00000000000..9d166aeef0a --- /dev/null +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2135.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-2135", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2025-03-10T21:15:40.613", + "lastModified": "2025-03-10T21:15:40.613", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Type Confusion in V8 in Google Chrome prior to 134.0.6998.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "chrome-cve-admin@google.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "references": [ + { + "url": "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_10.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/400052777", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2136.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2136.json new file mode 100644 index 00000000000..1f9c666d19b --- /dev/null +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2136.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-2136", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2025-03-10T21:15:40.730", + "lastModified": "2025-03-10T21:15:40.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Inspector in Google Chrome prior to 134.0.6998.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "chrome-cve-admin@google.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_10.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/395032416", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2137.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2137.json new file mode 100644 index 00000000000..f2a20ae2474 --- /dev/null +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2137.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2025-2137", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2025-03-10T21:15:40.857", + "lastModified": "2025-03-10T21:15:40.857", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Out of bounds read in V8 in Google Chrome prior to 134.0.6998.88 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "chrome-cve-admin@google.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_10.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/398999390", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25907.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25907.json new file mode 100644 index 00000000000..eb6f5753ad4 --- /dev/null +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25907.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25907", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-10T22:15:26.533", + "lastModified": "2025-03-10T22:15:26.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "tianti v2.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /user/ajax/save. This vulnerability allows attackers to execute arbitrary operations via a crafted GET or POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/xujeff/tianti/issues/39", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25908.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25908.json new file mode 100644 index 00000000000..4f608ea898d --- /dev/null +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25908.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25908", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-10T22:15:27.150", + "lastModified": "2025-03-10T22:15:27.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A stored cross-site scripting (XSS) vulnerability in tianti v2.3 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the coverImageURL parameter at /article/ajax/save." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/xujeff/tianti/issues/40", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-279xx/CVE-2025-27910.json b/CVE-2025/CVE-2025-279xx/CVE-2025-27910.json new file mode 100644 index 00000000000..608a9f2db88 --- /dev/null +++ b/CVE-2025/CVE-2025-279xx/CVE-2025-27910.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-27910", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-10T22:15:27.287", + "lastModified": "2025-03-10T22:15:27.287", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "tianti v2.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /user/ajax/upd/status. This vulnerability allows attackers to execute arbitrary operations via a crafted GET or POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/xujeff/tianti/issues/39", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-279xx/CVE-2025-27913.json b/CVE-2025/CVE-2025-279xx/CVE-2025-27913.json index 99b714334f9..4bbda35bc56 100644 --- a/CVE-2025/CVE-2025-279xx/CVE-2025-27913.json +++ b/CVE-2025/CVE-2025-279xx/CVE-2025-27913.json @@ -2,7 +2,7 @@ "id": "CVE-2025-27913", "sourceIdentifier": "cve@mitre.org", "published": "2025-03-10T20:15:14.500", - "lastModified": "2025-03-10T20:15:14.500", + "lastModified": "2025-03-10T21:15:40.430", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,64 @@ "value": "Passbolt API before 5, if the server is misconfigured (with an incorrect installation process and disregarding of Health Check results), can send email messages with a domain name taken from an attacker-controlled HTTP Host header." } ], - "metrics": {}, + "metrics": { + "cvssMetricV40": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-348" + } + ] + } + ], "references": [ { "url": "https://www.passbolt.com/incidents/host-header-injection", diff --git a/README.md b/README.md index 6e3c829542e..04a7bd80989 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-10T21:00:20.174126+00:00 +2025-03-10T23:00:19.793525+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-10T20:23:01.223000+00:00 +2025-03-10T22:15:27.287000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -284652 +284662 ``` ### CVEs added in the last Commit -Recently added CVEs: `25` +Recently added CVEs: `10` -- [CVE-2022-43454](CVE-2022/CVE-2022-434xx/CVE-2022-43454.json) (`2025-03-10T20:15:13.593`) -- [CVE-2022-48610](CVE-2022/CVE-2022-486xx/CVE-2022-48610.json) (`2025-03-10T20:15:13.713`) -- [CVE-2024-44179](CVE-2024/CVE-2024-441xx/CVE-2024-44179.json) (`2025-03-10T19:15:37.960`) -- [CVE-2024-44192](CVE-2024/CVE-2024-441xx/CVE-2024-44192.json) (`2025-03-10T19:15:38.080`) -- [CVE-2024-44227](CVE-2024/CVE-2024-442xx/CVE-2024-44227.json) (`2025-03-10T19:15:38.187`) -- [CVE-2024-54463](CVE-2024/CVE-2024-544xx/CVE-2024-54463.json) (`2025-03-10T19:15:38.290`) -- [CVE-2024-54467](CVE-2024/CVE-2024-544xx/CVE-2024-54467.json) (`2025-03-10T19:15:38.387`) -- [CVE-2024-54469](CVE-2024/CVE-2024-544xx/CVE-2024-54469.json) (`2025-03-10T19:15:38.493`) -- [CVE-2024-54473](CVE-2024/CVE-2024-544xx/CVE-2024-54473.json) (`2025-03-10T19:15:38.600`) -- [CVE-2024-54546](CVE-2024/CVE-2024-545xx/CVE-2024-54546.json) (`2025-03-10T19:15:38.697`) -- [CVE-2024-54558](CVE-2024/CVE-2024-545xx/CVE-2024-54558.json) (`2025-03-10T19:15:38.790`) -- [CVE-2024-54560](CVE-2024/CVE-2024-545xx/CVE-2024-54560.json) (`2025-03-10T19:15:38.883`) -- [CVE-2024-56184](CVE-2024/CVE-2024-561xx/CVE-2024-56184.json) (`2025-03-10T19:15:38.983`) -- [CVE-2024-56185](CVE-2024/CVE-2024-561xx/CVE-2024-56185.json) (`2025-03-10T19:15:39.097`) -- [CVE-2024-56186](CVE-2024/CVE-2024-561xx/CVE-2024-56186.json) (`2025-03-10T19:15:39.193`) -- [CVE-2024-56187](CVE-2024/CVE-2024-561xx/CVE-2024-56187.json) (`2025-03-10T19:15:39.293`) -- [CVE-2024-56188](CVE-2024/CVE-2024-561xx/CVE-2024-56188.json) (`2025-03-10T19:15:39.393`) -- [CVE-2025-22603](CVE-2025/CVE-2025-226xx/CVE-2025-22603.json) (`2025-03-10T19:15:39.970`) -- [CVE-2025-25306](CVE-2025/CVE-2025-253xx/CVE-2025-25306.json) (`2025-03-10T19:15:40.230`) -- [CVE-2025-26695](CVE-2025/CVE-2025-266xx/CVE-2025-26695.json) (`2025-03-10T19:15:40.567`) -- [CVE-2025-26696](CVE-2025/CVE-2025-266xx/CVE-2025-26696.json) (`2025-03-10T19:15:40.670`) -- [CVE-2025-27136](CVE-2025/CVE-2025-271xx/CVE-2025-27136.json) (`2025-03-10T19:15:40.770`) -- [CVE-2025-27615](CVE-2025/CVE-2025-276xx/CVE-2025-27615.json) (`2025-03-10T19:15:40.917`) -- [CVE-2025-27616](CVE-2025/CVE-2025-276xx/CVE-2025-27616.json) (`2025-03-10T19:15:41.080`) -- [CVE-2025-27913](CVE-2025/CVE-2025-279xx/CVE-2025-27913.json) (`2025-03-10T20:15:14.500`) +- [CVE-2024-56191](CVE-2024/CVE-2024-561xx/CVE-2024-56191.json) (`2025-03-10T21:15:39.880`) +- [CVE-2024-56192](CVE-2024/CVE-2024-561xx/CVE-2024-56192.json) (`2025-03-10T21:15:40.007`) +- [CVE-2025-0660](CVE-2025/CVE-2025-06xx/CVE-2025-0660.json) (`2025-03-10T21:15:40.110`) +- [CVE-2025-1920](CVE-2025/CVE-2025-19xx/CVE-2025-1920.json) (`2025-03-10T21:15:40.280`) +- [CVE-2025-2135](CVE-2025/CVE-2025-21xx/CVE-2025-2135.json) (`2025-03-10T21:15:40.613`) +- [CVE-2025-2136](CVE-2025/CVE-2025-21xx/CVE-2025-2136.json) (`2025-03-10T21:15:40.730`) +- [CVE-2025-2137](CVE-2025/CVE-2025-21xx/CVE-2025-2137.json) (`2025-03-10T21:15:40.857`) +- [CVE-2025-25907](CVE-2025/CVE-2025-259xx/CVE-2025-25907.json) (`2025-03-10T22:15:26.533`) +- [CVE-2025-25908](CVE-2025/CVE-2025-259xx/CVE-2025-25908.json) (`2025-03-10T22:15:27.150`) +- [CVE-2025-27910](CVE-2025/CVE-2025-279xx/CVE-2025-27910.json) (`2025-03-10T22:15:27.287`) ### CVEs modified in the last Commit -Recently modified CVEs: `34` +Recently modified CVEs: `86` -- [CVE-2022-49596](CVE-2022/CVE-2022-495xx/CVE-2022-49596.json) (`2025-03-10T20:23:01.223`) -- [CVE-2022-49597](CVE-2022/CVE-2022-495xx/CVE-2022-49597.json) (`2025-03-10T20:23:01.223`) -- [CVE-2022-49598](CVE-2022/CVE-2022-495xx/CVE-2022-49598.json) (`2025-03-10T20:23:01.223`) -- [CVE-2022-49599](CVE-2022/CVE-2022-495xx/CVE-2022-49599.json) (`2025-03-10T20:23:01.223`) -- [CVE-2023-0043](CVE-2023/CVE-2023-00xx/CVE-2023-0043.json) (`2025-03-10T19:15:36.813`) -- [CVE-2023-0278](CVE-2023/CVE-2023-02xx/CVE-2023-0278.json) (`2025-03-10T19:15:36.980`) -- [CVE-2023-0279](CVE-2023/CVE-2023-02xx/CVE-2023-0279.json) (`2025-03-10T19:15:37.140`) -- [CVE-2023-0331](CVE-2023/CVE-2023-03xx/CVE-2023-0331.json) (`2025-03-10T19:15:37.300`) -- [CVE-2023-0535](CVE-2023/CVE-2023-05xx/CVE-2023-0535.json) (`2025-03-10T19:15:37.457`) -- [CVE-2023-24045](CVE-2023/CVE-2023-240xx/CVE-2023-24045.json) (`2025-03-10T19:15:37.617`) -- [CVE-2024-27768](CVE-2024/CVE-2024-277xx/CVE-2024-27768.json) (`2025-03-10T18:34:58.663`) -- [CVE-2024-27769](CVE-2024/CVE-2024-277xx/CVE-2024-27769.json) (`2025-03-10T18:34:58.663`) -- [CVE-2024-27770](CVE-2024/CVE-2024-277xx/CVE-2024-27770.json) (`2025-03-10T18:34:58.663`) -- [CVE-2024-27771](CVE-2024/CVE-2024-277xx/CVE-2024-27771.json) (`2025-03-10T18:34:58.663`) -- [CVE-2024-27772](CVE-2024/CVE-2024-277xx/CVE-2024-27772.json) (`2025-03-10T18:34:58.663`) -- [CVE-2024-27773](CVE-2024/CVE-2024-277xx/CVE-2024-27773.json) (`2025-03-10T18:34:58.663`) -- [CVE-2024-27774](CVE-2024/CVE-2024-277xx/CVE-2024-27774.json) (`2025-03-10T18:34:58.663`) -- [CVE-2024-55581](CVE-2024/CVE-2024-555xx/CVE-2024-55581.json) (`2025-03-10T20:15:13.987`) -- [CVE-2025-0604](CVE-2025/CVE-2025-06xx/CVE-2025-0604.json) (`2025-03-10T19:15:39.487`) -- [CVE-2025-1015](CVE-2025/CVE-2025-10xx/CVE-2025-1015.json) (`2025-03-10T19:15:39.590`) -- [CVE-2025-1391](CVE-2025/CVE-2025-13xx/CVE-2025-1391.json) (`2025-03-10T19:15:39.860`) -- [CVE-2025-24813](CVE-2025/CVE-2025-248xx/CVE-2025-24813.json) (`2025-03-10T19:15:40.123`) -- [CVE-2025-25614](CVE-2025/CVE-2025-256xx/CVE-2025-25614.json) (`2025-03-10T20:15:14.280`) -- [CVE-2025-25620](CVE-2025/CVE-2025-256xx/CVE-2025-25620.json) (`2025-03-10T19:15:40.393`) -- [CVE-2025-27636](CVE-2025/CVE-2025-276xx/CVE-2025-27636.json) (`2025-03-10T19:15:41.240`) +- [CVE-2023-29492](CVE-2023/CVE-2023-294xx/CVE-2023-29492.json) (`2025-03-10T20:49:57.083`) +- [CVE-2023-32046](CVE-2023/CVE-2023-320xx/CVE-2023-32046.json) (`2025-03-10T20:45:52.913`) +- [CVE-2023-32049](CVE-2023/CVE-2023-320xx/CVE-2023-32049.json) (`2025-03-10T20:46:21.273`) +- [CVE-2023-32315](CVE-2023/CVE-2023-323xx/CVE-2023-32315.json) (`2025-03-10T20:36:57.097`) +- [CVE-2023-3357](CVE-2023/CVE-2023-33xx/CVE-2023-3357.json) (`2025-03-10T21:15:38.650`) +- [CVE-2023-3358](CVE-2023/CVE-2023-33xx/CVE-2023-3358.json) (`2025-03-10T21:15:39.320`) +- [CVE-2023-3439](CVE-2023/CVE-2023-34xx/CVE-2023-3439.json) (`2025-03-10T21:15:39.513`) +- [CVE-2023-3519](CVE-2023/CVE-2023-35xx/CVE-2023-3519.json) (`2025-03-10T20:46:43.453`) +- [CVE-2023-36845](CVE-2023/CVE-2023-368xx/CVE-2023-36845.json) (`2025-03-10T20:31:09.807`) +- [CVE-2023-38180](CVE-2023/CVE-2023-381xx/CVE-2023-38180.json) (`2025-03-10T20:30:38.527`) +- [CVE-2023-40044](CVE-2023/CVE-2023-400xx/CVE-2023-40044.json) (`2025-03-10T20:32:25.380`) +- [CVE-2023-4211](CVE-2023/CVE-2023-42xx/CVE-2023-4211.json) (`2025-03-10T20:32:41.700`) +- [CVE-2023-42793](CVE-2023/CVE-2023-427xx/CVE-2023-42793.json) (`2025-03-10T20:32:11.460`) +- [CVE-2023-6345](CVE-2023/CVE-2023-63xx/CVE-2023-6345.json) (`2025-03-10T20:33:27.970`) +- [CVE-2023-7024](CVE-2023/CVE-2023-70xx/CVE-2023-7024.json) (`2025-03-10T20:33:38.570`) +- [CVE-2023-7101](CVE-2023/CVE-2023-71xx/CVE-2023-7101.json) (`2025-03-10T20:23:08.703`) +- [CVE-2024-12356](CVE-2024/CVE-2024-123xx/CVE-2024-12356.json) (`2025-03-10T20:27:00.663`) +- [CVE-2024-20953](CVE-2024/CVE-2024-209xx/CVE-2024-20953.json) (`2025-03-10T20:23:29.163`) +- [CVE-2024-21413](CVE-2024/CVE-2024-214xx/CVE-2024-21413.json) (`2025-03-10T20:23:20.430`) +- [CVE-2024-32113](CVE-2024/CVE-2024-321xx/CVE-2024-32113.json) (`2025-03-10T20:23:37.390`) +- [CVE-2024-35250](CVE-2024/CVE-2024-352xx/CVE-2024-35250.json) (`2025-03-10T20:23:53.597`) +- [CVE-2024-4885](CVE-2024/CVE-2024-48xx/CVE-2024-4885.json) (`2025-03-10T20:24:16.363`) +- [CVE-2024-50302](CVE-2024/CVE-2024-503xx/CVE-2024-50302.json) (`2025-03-10T20:26:51.137`) +- [CVE-2024-50623](CVE-2024/CVE-2024-506xx/CVE-2024-50623.json) (`2025-03-10T20:25:14.940`) +- [CVE-2025-27913](CVE-2025/CVE-2025-279xx/CVE-2025-27913.json) (`2025-03-10T21:15:40.430`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 98c485902ad..64985404423 100644 --- a/_state.csv +++ b/_state.csv @@ -202490,8 +202490,8 @@ CVE-2022-34902,0,0,3bca642036a7f5fbef7abb4384927b60af66690baf9b9711fd545cc79d136 CVE-2022-34903,0,0,a6056b96bd3a0cfd0bd50472138c4b711587fbfdb78b1d8479eb2f1688841410,2024-11-21T07:10:24.240000 CVE-2022-34906,0,0,e6188b730417ea61c7bb7ebf52009083f4a7cb4dbce27bcd12f7111ffbae3126,2024-11-21T07:10:24.403000 CVE-2022-34907,0,0,ceabaecfcd29722392613503a6dc95f58160d8752bb3f51814dd29617e749a7f,2024-11-21T07:10:24.560000 -CVE-2022-34908,0,1,5e12ce36c963472956dbda6f8a97613083077e8cd92d84246e075c0932a14f9b,2025-03-10T20:15:12.223000 -CVE-2022-34909,0,1,5232a9c4826d42237b51a14d96442e54646e1c70d8c71434dfea40ea5952167c,2025-03-10T20:15:13.420000 +CVE-2022-34908,0,0,5e12ce36c963472956dbda6f8a97613083077e8cd92d84246e075c0932a14f9b,2025-03-10T20:15:12.223000 +CVE-2022-34909,0,0,5232a9c4826d42237b51a14d96442e54646e1c70d8c71434dfea40ea5952167c,2025-03-10T20:15:13.420000 CVE-2022-3491,0,0,94e4facd715fec8aed12661acb3c825fedb5971a07254be24c86884a36fcdb15,2024-11-21T07:19:38.590000 CVE-2022-34910,0,0,1717433a6fc9c9dbd5bb60b9aa780e013e52d2b13d36b4620a29b71e8ebf2385,2024-11-21T07:10:25.027000 CVE-2022-34911,0,0,2b8f360beec1e9ed0dc65bc72a6c470ab3baf20792ea009e579c965e20637f41,2024-11-21T07:10:25.193000 @@ -209145,7 +209145,7 @@ CVE-2022-43450,0,0,ff11065ab1878411c86e121c204774be230efb1199a088374b23eb411b4ff CVE-2022-43451,0,0,55c3f35c43cae6bb1ee37ca66ffdbe18c8660044f95b78328f16c704dbc3f474,2024-11-21T07:26:30.713000 CVE-2022-43452,0,0,c78276254f5f2218b7c77331235d9e2be37d8823bb5fc2252dcd20f8a5f4e515,2024-11-21T07:26:30.860000 CVE-2022-43453,0,0,4f8c5d12a19e347f8b683823fe4c9b502d990c3ba9469f4d44b1e31891759592,2024-11-21T07:26:30.987000 -CVE-2022-43454,1,1,9fb2c37d468f43b1acd00beaca3f52f38b69e8944d324dd585b3b1b45d8d69c0,2025-03-10T20:15:13.593000 +CVE-2022-43454,0,0,9fb2c37d468f43b1acd00beaca3f52f38b69e8944d324dd585b3b1b45d8d69c0,2025-03-10T20:15:13.593000 CVE-2022-43455,0,0,aaccf1a4be0effdcaae7be22449e0e567213a4864803d6bbd5e5433738917292,2024-11-21T07:26:31.147000 CVE-2022-43456,0,0,fbf810802e6cc72a9300d2ad1e1d21e5a78d5e972cf037e0fa480b8014daaec2,2024-11-21T07:26:31.287000 CVE-2022-43457,0,0,b586d9b5fcc21f59bbb92dab9cd16bed2028800e4d392addb7775ca1d72d60f3,2024-11-21T07:26:31.470000 @@ -212064,7 +212064,7 @@ CVE-2022-4756,0,0,9e970853f5aac5d7f6051f102cceedd8f99418abe211ab6b4e2528e717d24f CVE-2022-47560,0,0,5616db9aa528c40205c29824050b905c2e88ea51b1e926c93bed02b5e4ec18c6,2024-11-21T07:32:11.777000 CVE-2022-47561,0,0,454b37f7fd9c11c3656067782562c54987945e78afe479ca0f20e9d7f49ec371,2024-11-21T07:32:11.913000 CVE-2022-47562,0,0,64dac3d60c8b8f4b61b8e11f0539d75ff755f60ed046d7be0cc3bfc35090556c,2024-11-21T07:32:12.047000 -CVE-2022-4757,0,1,330572b2a7a9b16380e3b74ff77c810eb772321907280c2d376b71a676376ea7,2025-03-10T19:15:35.827000 +CVE-2022-4757,0,0,330572b2a7a9b16380e3b74ff77c810eb772321907280c2d376b71a676376ea7,2025-03-10T19:15:35.827000 CVE-2022-47577,0,0,9550a922f1829c9398ee175ef3ac239bec1ad3c7148c35d57f01a11d7f1789f1,2024-11-21T07:32:12.187000 CVE-2022-47578,0,0,37fbfce9feaf52d993443117ac1a6355cd7a044484cc92ee5e869312941de9d0,2024-11-21T07:32:12.360000 CVE-2022-4758,0,0,46b648ad13c452add0819ad569687b406e8aabbc253f4a165ea41d12a6100cca,2024-11-21T07:35:53.073000 @@ -212428,7 +212428,7 @@ CVE-2022-48286,0,0,77447f216a75ff09875f502d3b5b8f406aecac089ebe16a6b1b5f93ee2e96 CVE-2022-48287,0,0,ffb9477554bfe338b59efc3476dab3f4d74daacb476ffb0f751ed5564e9297b5,2024-11-21T07:33:05.610000 CVE-2022-48288,0,0,53624dc7dedd158cf2e34bcf6d37d3940a853ce7cfc5079c02d9b9beb2969500,2024-11-21T07:33:05.757000 CVE-2022-48289,0,0,b5b366f7e746d95cd74726054f258dc90ba5d828687acb098d0143f33c425f64,2024-11-21T07:33:05.897000 -CVE-2022-4829,0,1,e5f3aa7a40b91297255520e914921393171a19d737b7a0a40f3947128bdd2489,2025-03-10T19:15:36.653000 +CVE-2022-4829,0,0,e5f3aa7a40b91297255520e914921393171a19d737b7a0a40f3947128bdd2489,2025-03-10T19:15:36.653000 CVE-2022-48290,0,0,a18a7f7669377ff6d4a7ef738b38d89f2aa8b56899df8cbcaaa74e53e24c5978,2024-11-21T07:33:06.020000 CVE-2022-48291,0,0,8898f1361b36f884e0d5e61d1f210ce1c6d76bbf224f42fe249a9b0dd9df6ef5,2024-11-21T07:33:06.130000 CVE-2022-48292,0,0,4580e619ac80f5659a384b768187cc9d60d1eda7933d4c8a5ea11acef9450061,2024-11-21T07:33:06.260000 @@ -212696,7 +212696,7 @@ CVE-2022-48604,0,0,b7085c3e4c6adaacb59f90e568dbbe0fd9c06f7150463b110ec956aae9dc3 CVE-2022-48605,0,0,62f58b311b31fd8465a30a0bc5b8c82e376d99607d50375aa101cb7b2383ea3c,2024-11-21T07:33:35.530000 CVE-2022-48606,0,0,406e74247ad44cf112fb89f83e3e3f708a37c22bdaa01292c5e45f29abdc351c,2024-11-21T07:33:35.700000 CVE-2022-4861,0,0,a170409b4bf98e036db6bbfc40d9107c61b3e888b36d479ce20ddb5f42750f64,2024-11-21T07:36:05.410000 -CVE-2022-48610,1,1,064a0e19b62835266df3de1774515e037a71602b0c20d923ead2e0367f793b76,2025-03-10T20:15:13.713000 +CVE-2022-48610,0,0,064a0e19b62835266df3de1774515e037a71602b0c20d923ead2e0367f793b76,2025-03-10T20:15:13.713000 CVE-2022-48611,0,0,edb96bcc230613f04296301d36f37901e8c9cc7fc1a031d550e89cb344ecc1ff,2024-12-10T17:47:45.803000 CVE-2022-48612,0,0,802646f609529dc06dd420914440c6667cb9853a2db61b3df6c56ea4499d0364,2024-11-21T07:33:36.023000 CVE-2022-48613,0,0,f19248d408abb6a259b3538f5dd278f855308ef500cbd68b02542fb29cae9932,2024-11-21T07:33:36.170000 @@ -213693,34 +213693,34 @@ CVE-2022-49523,0,0,b94acdf4ed6bf2aef378931d2ef10961bc46d104c08632b6ffb955e53601d CVE-2022-49524,0,0,0bfed2867487ff92cc56ed47659d7818f127e879b6f8c23632dce55f96f2b788,2025-02-27T19:15:45.433000 CVE-2022-49525,0,0,981facbe77820bc63be37056597f6bd0c13283c2aefe388263621a35ac5e726c,2025-02-26T07:01:28.500000 CVE-2022-49526,0,0,5339b66753ad80fb9a756eb170f85cfe6377c30292ade6b3738883eee6d81737,2025-02-26T07:01:28.593000 -CVE-2022-49527,0,0,31456b1b10252a571a0f7523a4fb3b47b0ce368ba049afb0ae01afc209008b1d,2025-02-26T07:01:28.690000 +CVE-2022-49527,0,1,8960d347d57916d69084b31394fa7ed486a2d4f2b204cbb50324b6ae797bfbcd,2025-03-10T21:16:33.907000 CVE-2022-49528,0,0,67606282969aaa2b31505ca97d9477cc42eb7b22bad60f6f77b8d75889efc840,2025-02-26T07:01:28.780000 -CVE-2022-49529,0,0,8689026a1d77025340bdb3f3c57743e734124523e8df8834bc5da9018038fe54,2025-02-26T07:01:28.873000 +CVE-2022-49529,0,1,110bb85d799d2ce406406d16d1b63206a0f1424fc60756da765a63ddb0e52700,2025-03-10T21:16:19.747000 CVE-2022-4953,0,0,e04a15b779bfbe898a916a95d05683f7f5f4c144cc0c5cedf2ea84fbc775f5f1,2024-11-21T07:36:19.067000 -CVE-2022-49530,0,0,47a397e0c01d1145c9e68c4e5fb8ad3d6cf93316839bd849d0afa9de77c4514f,2025-02-26T07:01:28.967000 +CVE-2022-49530,0,1,a40567a04bf85f44ab3b7c7262af6e8a31a626ef3978bc57d72c75d9cbe858d5,2025-03-10T21:15:50.760000 CVE-2022-49531,0,0,6f7df9b8ade4346efdbb7009fb0918c28cc6d52db9e2b58402a4cbb94ad977b7,2025-02-26T07:01:29.067000 -CVE-2022-49532,0,0,94d5ff4fc61833102a7b8fbc940fee18275fc1e57c304383247500e2c0ecef4f,2025-02-26T07:01:29.170000 +CVE-2022-49532,0,1,916409139d811d7fdf32675effef257c21e90c8395ed7322ebb87668e1c875a1,2025-03-10T21:15:19.063000 CVE-2022-49533,0,0,e80337bcb9c0881aa9f0a3bd03f41eefd6c9615b38b434713fc87e091747fa6f,2025-02-26T07:01:29.293000 -CVE-2022-49534,0,0,721ea208289ef1668f018b3eb2dde36e42f39a1e7637063c7f28d8226981c151,2025-02-26T07:01:29.400000 +CVE-2022-49534,0,1,7fcf4ab521a1d7a958aa1cac28f74c90ccff0609507fcd5ccb14a9c117498513,2025-03-10T21:30:31.113000 CVE-2022-49535,0,0,92cab0cd39cfef2a55835e1ebf7d99723233351d9e8f9dc3382724c7f95e01f1,2025-02-27T19:15:45.573000 -CVE-2022-49536,0,0,e12ce931c66209fc9bc3949c5b3b79e06b4dd90c26290f7645b68c0e2f3c102f,2025-02-26T07:01:29.580000 +CVE-2022-49536,0,1,c077c8937d70ffab2a1f8104c61f7d258ea872dd1e2f7d23e6c4802453c10d3a,2025-03-10T21:30:26.823000 CVE-2022-49537,0,0,89955c5c15297ddc3d4a900be6d2d64c3ca5d393c27e7504de7e55af92e676ab,2025-02-26T07:01:29.667000 -CVE-2022-49538,0,0,9cdab7811c29220ab0b728a88ab160b531922e6764dfb80eac562ee4f6e72d55,2025-02-26T07:01:29.760000 +CVE-2022-49538,0,1,909c1f4ad3e7b56fc8d60cce4a04cddefb2f1de62518aee0266db3d112687d89,2025-03-10T21:14:28.543000 CVE-2022-49539,0,0,9abf8fdb7a0343623ef24e9040650b02834e07ba8ddb3e6cf863ee05e9cdaa66,2025-02-26T07:01:29.857000 CVE-2022-4954,0,0,3d35faeb50ff70fc83ed96ba4420fbc0348e83af9bccccd35fe117bc65a97504,2024-11-21T07:36:19.187000 CVE-2022-49540,0,0,f5f5eb0e41a09add2ea5b919e3860861f03bbedd77dcfde124c746425104115e,2025-02-26T07:01:29.947000 -CVE-2022-49541,0,0,b2296039e33b99211613e46b9d0d4233c537e0817cdfceabe669e4a4f0762186,2025-02-26T07:01:30.043000 -CVE-2022-49542,0,0,b6f252d76346d9e307100d26351ee554c9faeec47be2a3bb27e66036ba29674f,2025-02-26T07:01:30.133000 +CVE-2022-49541,0,1,54f8258b1d65f2766935e7ef7c07a0048e708945c51514c7e7a39f12a7cc933b,2025-03-10T21:31:11.947000 +CVE-2022-49542,0,1,863a703007a9c0e9dbcb00e8e45a44701779a89376fd639be008eff59f4041d9,2025-03-10T21:31:15.750000 CVE-2022-49543,0,0,a2ff81fe4ecfd6d2c99f742689972c0459a5cc013925198ed509c20be2719fe3,2025-02-26T07:01:30.220000 -CVE-2022-49544,0,0,b269162714fad49db756668cd97f37b5f4d33aaa6828e7bff75ead6a2acbe2e1,2025-02-26T07:01:30.313000 +CVE-2022-49544,0,1,5988bb26e2e446b290393c3cc9bf778787200e992f2f045eed77ba96a746c13b,2025-03-10T21:14:07.310000 CVE-2022-49545,0,0,b15dc44bc69453ab505d9e12bbaa1084c25940152f37f845605fc32cd0bb5d2b,2025-02-26T07:01:30.410000 -CVE-2022-49546,0,0,7f8684c96998813c09b86e51eeae83cef4f6b68e267a0e325652ed2fc6c8a5d0,2025-02-26T07:01:30.500000 -CVE-2022-49547,0,0,d4defc86e2363ca8afdc4ac90a9c1d499adc5683239ec0f2e6c7948d17c28de5,2025-02-26T07:01:30.590000 -CVE-2022-49548,0,0,c95d42cb79c7d629faff5b699dea854e50455ebf18ac4b59cd2b80402f865ce8,2025-02-26T07:01:30.683000 -CVE-2022-49549,0,0,4459fa625d2f61d7a968ab894fd182917fa820e9a1dc35014b7d0594f7e7c073,2025-02-26T07:01:30.773000 +CVE-2022-49546,0,1,9db288b75a4bc37eda3f91457915a5f2cb19437085834c7170e6eb68d5a4aba6,2025-03-10T21:13:19.010000 +CVE-2022-49547,0,1,bf91592a6ea9d3297ec475e4b4e1884ec82cd0f6e9372bcf754c0fc99e0b8008,2025-03-10T21:31:42.100000 +CVE-2022-49548,0,1,538a83d5bcbbf07561692d7896fba478b67ca68a4698427f780db7881bcef0ce,2025-03-10T21:32:17.530000 +CVE-2022-49549,0,1,074710b7b679b559935feb1d1793c1c13989b69406fd0db1afcbdf3fe4448af3,2025-03-10T21:22:55.893000 CVE-2022-4955,0,0,94df8e1948dbb5187c1ece47af6795f51d100c945ff4ef8af1e29d9575313920,2024-11-21T07:36:19.300000 -CVE-2022-49550,0,0,2ab6c336eb52122ef28518e947bc4fbc556b44350cc2c27c1cabde267946af59,2025-02-26T07:01:30.863000 -CVE-2022-49551,0,0,6eea955fbadf8fff97eaa1e6a1b2c03b9ba652d30748e9fb256aff58e7798c47,2025-02-26T07:01:30.950000 +CVE-2022-49550,0,1,f2b2ab2e297da461d6a289de06eb12f25fa62cdc522180ec0f0700049e82f62d,2025-03-10T21:23:20.777000 +CVE-2022-49551,0,1,caf376439ee4e4715ac4e27517c7d88ca53c5a28a41e2239731629ba06afa17a,2025-03-10T21:27:26.720000 CVE-2022-49552,0,0,f11c27e4e83d55bc6a4b43d73b66fccce60f2ae33db072582aed8afda75d2ace,2025-02-26T07:01:31.040000 CVE-2022-49553,0,0,772e59df9eafc84178e8fbd577b3acce3311378fd173eb34867b0a6e996987fb,2025-02-26T07:01:31.133000 CVE-2022-49554,0,0,0a34a3ac650254cb3dbd54b8422b1c5adcae22b4c4383ae36cc0c388c2f4ca81,2025-02-26T07:01:31.223000 @@ -213730,49 +213730,49 @@ CVE-2022-49557,0,0,38a9ef5191d44200c06c66c46ec6d0c2e3a8bb943adbda5a5d7d1696f2d7f CVE-2022-49558,0,0,daac90093d49c8372e444573abe119e8081a887b8d43470c5dabb6cb87a504ff,2025-02-26T07:01:31.597000 CVE-2022-49559,0,0,2d14c0fbbdaee85fbd444788c794ab884da113af56925a6fd30e8cd880f6bc1d,2025-02-26T07:01:31.687000 CVE-2022-4956,0,0,43d14a14df320488a03d84b995042cdf95aa3fb7ff65406b2df0e2b91a52a9a3,2024-11-21T07:36:19.420000 -CVE-2022-49560,0,0,98a4136fcca252e1e2ff1b3931e39fe0b0949fc125619390e8528773f197ec99,2025-02-26T07:01:31.780000 +CVE-2022-49560,0,1,f7c3028aafa421076b95e5c2bf3d153f3809af6aad83d1d0d1d9464b491c9c33,2025-03-10T21:25:29.677000 CVE-2022-49561,0,0,25ad39aa076e1bcf300a6537a852372a47057435c10de10a39571490ebbe9d4c,2025-02-26T07:01:31.877000 CVE-2022-49562,0,0,6314c278dd709f1ad88da8450e2c6c09af54c9ff27b760022aca36a1e76506c8,2025-02-26T07:01:31.970000 -CVE-2022-49563,0,0,e647577800ffa6400a4a18beab7e745c11eb9ff79b9e1bd15ff0f624b986165f,2025-02-26T07:01:32.060000 -CVE-2022-49564,0,0,9ec57663c1c43db786d5a0afa63b5c45413561c04b3a89667c3889a76fdec882,2025-02-26T07:01:32.150000 +CVE-2022-49563,0,1,5b242cef609c94955b72010364a2f3f14d624a149536c64c0b40d5de22303ed0,2025-03-10T21:28:10.553000 +CVE-2022-49564,0,1,ade076d839342ca50a601039dc343913f5f5aab7210063262bbf15e20cb7ddb4,2025-03-10T21:19:21.127000 CVE-2022-49565,0,0,ac3e04ce7d0c052b88c34a7c1e5024db2ecfab84cc13c36cccc937b804a38d1e,2025-02-26T07:01:32.240000 -CVE-2022-49566,0,0,56971a0cad10b2c863953d7443e239ff63448842ac987801abc68e033424fa30,2025-02-26T07:01:32.333000 -CVE-2022-49567,0,0,3b415a91e3a66e6da3781ebed9395e49cb7324876262910d16ad2aee0db78542,2025-02-26T07:01:32.420000 -CVE-2022-49568,0,0,17e91ce62cf7c0fa7ac56ed868128a18075397026ab2a0b672826c29b2b07010,2025-02-26T07:01:32.517000 -CVE-2022-49569,0,0,3d20598e3f82f9fdbe3204b04a2a4a47cef8c987ddd895061b1764fb4d2e752f,2025-02-26T07:01:32.607000 +CVE-2022-49566,0,1,ec7fb64c8efc0d3a235416c56df114e5466fb1f2263a493ca2ba8f9bb87c265d,2025-03-10T21:19:26.347000 +CVE-2022-49567,0,1,2c66b66a70200686b5026635503f9f6325a3babbf8a1a81a9e32d39b987110d4,2025-03-10T21:20:08.247000 +CVE-2022-49568,0,1,d10c86a486359c5683f666456f3262dde9060be318967cdcfe20537ebd3015ec,2025-03-10T21:11:32.760000 +CVE-2022-49569,0,1,f97533e65810728c0fad64add198da2de29113239ad89c320b444063eb5ad70a,2025-03-10T21:11:35.827000 CVE-2022-4957,0,0,0f59f801825d8335616db50df55384f4a214170b9e1eeee6c3796753d9651f88,2024-11-21T07:36:19.570000 -CVE-2022-49570,0,0,124325303d535b4cd557c3ed0809fe196742dba47308c8abafab92a80da3d75d,2025-02-26T07:01:32.693000 -CVE-2022-49571,0,0,27ed5c1736d8e496c0a6a348b2f3ad7ac65cd7fb7286b0025d11e9ecfa6561a0,2025-02-26T07:01:32.780000 -CVE-2022-49572,0,0,ce49775144acc984a35c21f66344062872b2b2c2d39be92a51e08ef7e81f01bd,2025-02-26T07:01:32.877000 -CVE-2022-49573,0,0,92514bc902c4efe9275eb63df558068e687344c06a60a6a28c7e4e003f81b3b6,2025-02-26T07:01:32.970000 -CVE-2022-49574,0,0,29aea0bffd6b00ffecf952e7ce7e8aec6be016b76cfcc92a2fa7ea5f3cb0c79e,2025-02-26T07:01:33.063000 -CVE-2022-49575,0,0,efaa16654f62adf14ac318eef98b56de039770a39835cec9c58119e5d48a3c55,2025-02-26T07:01:33.157000 -CVE-2022-49576,0,0,f6ceb6c6347da5dcc1ca492ffeb7cff7e0cae7eb35e5276ab11ae3116f542b9f,2025-02-26T07:01:33.243000 -CVE-2022-49577,0,0,4c198f80ccd4569a69d80b95cadec02fd7a8d05c9d20ee2b489898b1de59a8c8,2025-02-26T07:01:33.333000 -CVE-2022-49578,0,0,a82d9d7480f07cf31e84728cf168241903c9064ff176db50638788f17d0ab085,2025-02-26T07:01:33.433000 -CVE-2022-49579,0,0,4128bc7bd3cc55d6d2c8ed4a1cb3f28af01f5655dd7b93c8a800e5e7ffa4268f,2025-02-26T07:01:33.520000 +CVE-2022-49570,0,1,f669ab3d7c430538fd14102b384fbd8b66cb84b923c8e41ba4d1e4080e05a330,2025-03-10T21:19:40.783000 +CVE-2022-49571,0,1,313fb14bde6c75b9217dcb773f2cd43f742a3887170ad01bb313b434620524b3,2025-03-10T21:04:22.707000 +CVE-2022-49572,0,1,0f1dbb16b35adfad04bbe5de84a7cdf4d843df742cf393d2aac992ea1365c5bb,2025-03-10T21:06:02.287000 +CVE-2022-49573,0,1,570b0cd3d384d17339ed30c05ba08899a6a784cec5ff67319bc01f3fbf651a59,2025-03-10T21:06:23.280000 +CVE-2022-49574,0,1,6ac29866c87d232f76a483d871bf38a2c2533369d094a41b9651a1d20d4841ed,2025-03-10T21:09:22.477000 +CVE-2022-49575,0,1,0b307d001bebc97dd4a39d9c151d322ef96c68c97402bc2c41541d7da33bc6bc,2025-03-10T21:09:15.843000 +CVE-2022-49576,0,1,7dd1ed64542c7e0ede5d83fcf3b5d364777ba8744d00c79428761e38c2f16797,2025-03-10T21:09:11.687000 +CVE-2022-49577,0,1,5d9865701046cb9b934a2d9bd28ec7fc894abb80a2019bd41adab6cbbb263d7c,2025-03-10T21:09:07.350000 +CVE-2022-49578,0,1,763ae2cd0f72340ceeba02bfd50eb20a5616a793a6ab0328d9623efbb89beea3,2025-03-10T21:20:41.973000 +CVE-2022-49579,0,1,6cf81e930cb31b1451e1f75bf320b45a39af72ed49667a121a2484f7c13374b6,2025-03-10T21:09:03.167000 CVE-2022-4958,0,0,d6d6128b8fdd4a8fe744760bd37908b3ed213bef3370b8b8a46a12919160ac31,2024-11-21T07:36:19.707000 -CVE-2022-49580,0,0,2df7db078932c74a6d69e2c6989d7f07119185065bf6230a55de7638c0476bc5,2025-02-26T07:01:33.610000 +CVE-2022-49580,0,1,b267e5f1ff0aa435dfc45837955937396659c6b26dc2307a910b6c8652b1af6f,2025-03-10T21:08:59.397000 CVE-2022-49581,0,0,05efcc8772be9c6510c4c0ac471c31fc2b234f12de9236a552a715e84676dcaf,2025-02-26T07:01:33.703000 -CVE-2022-49582,0,0,9cbe7774c9a3f50fa82b9373e99341c46c27a4eb110f7a516698754ae566c6df,2025-02-26T07:01:33.807000 -CVE-2022-49583,0,0,4847dbb47b6a9a1afaea40e33a1c079840e770cafc21edf5f4a1249d9cbb92ca,2025-02-26T07:01:33.897000 +CVE-2022-49582,0,1,ba38fb5e59db668fbd10c69508ad964e5080a2be7acbf6e54656ce702fda1a07,2025-03-10T21:11:23.753000 +CVE-2022-49583,0,1,724367fbbd395308913f6db15fa515f8bfe03d02524be1f7bf6152d1d91a321c,2025-03-10T21:21:21.147000 CVE-2022-49584,0,0,c230661b2449e440c4ee0158ce975d92b2e0a1edb3638ddb3b5109cdecb54b9e,2025-02-26T07:01:33.987000 -CVE-2022-49585,0,0,f259a45d52396142a327a607aaffb3c3f5f7b08593130f68a1ab70b7ab8c5cde,2025-02-26T07:01:34.080000 -CVE-2022-49586,0,0,018cdb67992614e3b8aaef86f63708e76709361132b17cad1f7019f3eb32a41c,2025-02-26T07:01:34.167000 -CVE-2022-49587,0,0,045dfa49579766af5db3b307fa6fccc91442356d8f98685bbe7c4c2e730f75b2,2025-02-26T07:01:34.260000 -CVE-2022-49588,0,0,61d955ab8edf8015c7901b53731f628af50ead0b2b76583321c7b0f958fb72e4,2025-02-26T07:01:34.367000 -CVE-2022-49589,0,0,900e3190f8a3d5f8bc6be01817c676f63f99de109c6e984e75613d4201a664b2,2025-02-26T07:01:34.470000 +CVE-2022-49585,0,1,c3f38f23836ab6d0023363fe86d1c6127f076a629d1e13aba95bf5ac53a75fbf,2025-03-10T21:08:55.510000 +CVE-2022-49586,0,1,f3bf3a18a939061cd935a25abe10ece330b72b97f441b4316cb7bb9580728e7e,2025-03-10T21:08:51.117000 +CVE-2022-49587,0,1,8d776328159eba1869dd9e4e638b07bb337e4d441fb92ce92a91e94cacca47f3,2025-03-10T21:08:46.400000 +CVE-2022-49588,0,1,c37d93005610b093186b015af5ff7b07fb8744fcb85331a37f159fe2f88890b3,2025-03-10T21:08:40.567000 +CVE-2022-49589,0,1,d6a99dff68a85a22786e6ab14c25a79f61acc982c6b147e1bf0c4fe5df90b2fd,2025-03-10T20:47:27.720000 CVE-2022-4959,0,0,e1112e964cfdf0ebbfe3fa4005ae2e8c4f9c407689379dbe03328e96b22503f5,2024-11-21T07:36:19.850000 -CVE-2022-49590,0,1,20cd3c2daa264623e56a323e402735c867806a89472d26c1ed45d8d3ae8e100c,2025-03-10T20:23:01.223000 -CVE-2022-49591,0,1,0cc8543ea627147ea0bf828758a275a1f14ea9d390d5ffa1e7b74f404a8593b8,2025-03-10T20:23:01.223000 +CVE-2022-49590,0,1,60e7e6f244fc68903dd4388c8bafc0c1c9e46d6ad90639e1899ce0995a9c4d9f,2025-03-10T20:49:24.353000 +CVE-2022-49591,0,1,10b0547e467a05414098048c97aa4fda46c2188c9a08d9f153d6c61ef87e547e,2025-03-10T20:50:02.120000 CVE-2022-49592,0,0,82cbcad0c742056132cc73616877773fbc05caff75355128651869e0512e1e9b,2025-02-26T07:01:34.760000 -CVE-2022-49593,0,1,a490d84d1db8d08c1bd74f1bbffbd14e057da73f802032361a953fc57bba4b2a,2025-03-10T20:23:01.223000 -CVE-2022-49594,0,1,68c11eaa5cee315d2058915886cf4743aec7164a60d951e32eded865eae0e0a5,2025-03-10T20:23:01.223000 -CVE-2022-49595,0,1,cb3cc118f10224c75b44427115256c50de660f489bf615954bd09294bb83f634,2025-03-10T20:23:01.223000 -CVE-2022-49596,0,1,337ae6121adf3254b498227e6016c5ad49661dd3458af5805aaecedbb5c23a5e,2025-03-10T20:23:01.223000 -CVE-2022-49597,0,1,087db79fce42e862ebc19f60a0cd8a4d276064edbfecda432de024386a2abe2b,2025-03-10T20:23:01.223000 -CVE-2022-49598,0,1,4513ae3cbce03da98d4d53eb6584e35a52b0ecf09877c7c7fcd58e1e04f9ada3,2025-03-10T20:23:01.223000 -CVE-2022-49599,0,1,dea4f25c68b18e3924ae0cebca86bba06c445790ab725462667c62f83f5b5d96,2025-03-10T20:23:01.223000 +CVE-2022-49593,0,1,0bf16df4e5fa7c510269c25326fe752294298f8c0e4b60c1de49c68cbdd10e19,2025-03-10T20:51:03.090000 +CVE-2022-49594,0,1,e390164d65dfea143aae054e5979a4042e104e0f4d938ce67fd6e01201abb99b,2025-03-10T20:51:45.677000 +CVE-2022-49595,0,1,911558bcbe277a381125ed6bf9539c2a7829734652f34f805dc374e0dc6d117b,2025-03-10T20:52:18.940000 +CVE-2022-49596,0,1,750c74e63db7dfe832e0afb46524886218abfd9d2f11d5a4fd2c5542ee6a6940,2025-03-10T20:52:57.903000 +CVE-2022-49597,0,1,d3f2ecf8868faa06c21d62e0eeaf716550e9744346ec965d2cfe24b72f73b3b7,2025-03-10T20:54:24.560000 +CVE-2022-49598,0,1,0c5d6ee9bcd37d136c5d104aaef1aeca929a53254984c1fc496cce5e79ba2ed7,2025-03-10T20:53:46.410000 +CVE-2022-49599,0,1,c377488db28f4f0cfded79918129b539b71715ca2a4fd67cccd68abfec41a225,2025-03-10T20:54:57.747000 CVE-2022-4960,0,0,b445d73955b3452a42faaf28d577ad453defce902d7d2b7869afb976b59de9a5,2024-11-21T07:36:19.990000 CVE-2022-49600,0,0,647466d22b891d627008f8c35082b78b57ca04645a9e05693e095b90d2283105,2025-02-26T07:01:35.497000 CVE-2022-49601,0,0,82f26928b9b858df32635906b08bc3d0e34c32e5f4d185edb7cadc51b744f016,2025-02-26T07:01:35.603000 @@ -213962,7 +213962,7 @@ CVE-2023-0039,0,0,d8fc5a260515ca8bf2d6438e2d24484997e6b69319da7eb48b0fdfda987637 CVE-2023-0040,0,0,1c92c868dbbb373cc9e61bd563e0122ca4213b995b7eceebca4ef72e2b010054,2024-11-21T07:36:26.600000 CVE-2023-0041,0,0,d5260d420f1cd6c78adae2a5f84b81d66b97bb4962628ebb0c02b41c604a1529,2024-11-21T07:36:26.710000 CVE-2023-0042,0,0,9b1a6decc351f08b4eff07cee0d8cf1c5c59713d547ae72a1b1cdb4625fb24f2,2024-11-21T07:36:26.833000 -CVE-2023-0043,0,1,031c84811692a82611008aac09f88dda83efce96895b6668da129b218ebcdc29,2025-03-10T19:15:36.813000 +CVE-2023-0043,0,0,031c84811692a82611008aac09f88dda83efce96895b6668da129b218ebcdc29,2025-03-10T19:15:36.813000 CVE-2023-0044,0,0,5e0b3bc76f4e520dfb3a7d3f8757c01f27c22cbe64833773e8a4716039c15539,2024-11-21T07:36:27.050000 CVE-2023-0045,0,0,0b3fb0f7f170c454540ecd2b56095b147720cad9a83cc54301e4003eb4127273,2025-02-13T17:15:52.813000 CVE-2023-0046,0,0,995378f3517e0fe9dc2a92e59c5d98c60ae6bf06c6bef581c852efaeae77bfee,2024-11-21T07:36:27.290000 @@ -214192,8 +214192,8 @@ CVE-2023-0274,0,0,d60ba37cae3df4ead875e1bd4881c3c3e5cab916bb42514b120c67c76ba923 CVE-2023-0275,0,0,26528228f0128eb8424180f73455bee0ef2b1d74dc8f6cc9e2ae6480e47d86ee,2024-11-21T07:36:52.650000 CVE-2023-0276,0,0,c7487a428bcb8bea2b1c668b589a64212adff21c21ab0a4c676cd54cc33a9831,2025-02-04T19:15:26.810000 CVE-2023-0277,0,0,335310adc962a79f1b2c125aa5618dd097c178e21940b816151475451aa2db5a,2025-02-06T16:15:32.083000 -CVE-2023-0278,0,1,c555eb49c5676bfc381ca3e12fd4f0c39327a3475f98576227c38717ad8564bf,2025-03-10T19:15:36.980000 -CVE-2023-0279,0,1,07878339ce2c8cee0312df189d6a4014fdc30c693326a20296b9b6e697818c01,2025-03-10T19:15:37.140000 +CVE-2023-0278,0,0,c555eb49c5676bfc381ca3e12fd4f0c39327a3475f98576227c38717ad8564bf,2025-03-10T19:15:36.980000 +CVE-2023-0279,0,0,07878339ce2c8cee0312df189d6a4014fdc30c693326a20296b9b6e697818c01,2025-03-10T19:15:37.140000 CVE-2023-0280,0,0,692d930de0e5724c61f1163dd938405f66a86900dcfdf0110c3ccf4a10473b8e,2025-02-04T21:15:22.160000 CVE-2023-0281,0,0,8e30a1a5618f0b8fdeb50c2463b4f333a99800a52583fcaae701b5fe34e5aba8,2024-11-21T07:36:53.270000 CVE-2023-0282,0,0,79e3b3ee2574d36ad793a4966e13699bfd1b0009f4ae35ce6961b5a3208d93fe,2024-11-21T07:36:53.393000 @@ -214244,7 +214244,7 @@ CVE-2023-0327,0,0,6167212aceb2c31f3e634ebdc5e2fe015ef028aba2344b99409195bff6437f CVE-2023-0328,0,0,60a5e418def05aeec452bb62d499808225e4c06d3b621376c68675e29c3adf28,2025-03-06T16:15:39.403000 CVE-2023-0329,0,0,af8a57f60cebf22d5e961642189108c9b03a601bdcdaac0ddd34e75b44e97c27,2024-11-21T07:36:58.970000 CVE-2023-0330,0,0,0597b42289577da5a8502854ac2fe29c28b08c8707968cf90382e1363234f929,2024-11-21T07:36:59.077000 -CVE-2023-0331,0,1,274bc1369cae7fe09b0ee22ff916b8e440be2bc931740cb608cdf750fdecd31d,2025-03-10T19:15:37.300000 +CVE-2023-0331,0,0,274bc1369cae7fe09b0ee22ff916b8e440be2bc931740cb608cdf750fdecd31d,2025-03-10T19:15:37.300000 CVE-2023-0332,0,0,64542e438bcf827f156cc70cf5d07c1026d6770324516bf2f45d1e6076758c95,2024-11-21T07:36:59.323000 CVE-2023-0333,0,0,d93bc6bc1e86c850a7ca00b9aa76a2e4c088cb012f60fc9847e05a56a68ded9d,2024-11-21T07:36:59.453000 CVE-2023-0334,0,0,175a7982408f35d772ed00c5568ef62db28b9c60519c9ae85f03fb928679ffdc,2025-03-10T18:15:25.830000 @@ -214437,7 +214437,7 @@ CVE-2023-0531,0,0,a2b5fd3930f524cb401e124ec5786010c9cad4c621114fd4abdc2acf74f299 CVE-2023-0532,0,0,72ca8898990fb8610307e6516d129fcf16189811012a79289b01f939cac9bf59,2024-11-21T07:37:21.400000 CVE-2023-0533,0,0,c178517ebefc16ee41a2f59036c34ccd760249657d48f36ef9ada635b640a8f4,2024-11-21T07:37:21.523000 CVE-2023-0534,0,0,ade7ab28da0420cc365f47dad870343cdd8da608da1a7ddf62838dae0c66a25d,2024-11-21T07:37:21.653000 -CVE-2023-0535,0,1,3b217b841d5fdae261b9bfef38db6cfc982634658ef94aea978d026a27fc8091,2025-03-10T19:15:37.457000 +CVE-2023-0535,0,0,3b217b841d5fdae261b9bfef38db6cfc982634658ef94aea978d026a27fc8091,2025-03-10T19:15:37.457000 CVE-2023-0536,0,0,e637cc93da899c75d4344be893bd279d9c6249fc897c970ef96c3a2f5590177a,2024-11-21T07:37:21.880000 CVE-2023-0537,0,0,2b43fa3c7d6c09be7b74ae22f3c06f76acd623b7b0c21dc267ababb5984feaec,2025-01-29T15:15:11.527000 CVE-2023-0538,0,0,93bd0a7452675c80af54b0b64fee7d659b3b74c3f15a2d1e9d62100379c03b54,2025-02-27T16:15:35.693000 @@ -216483,7 +216483,7 @@ CVE-2023-20863,0,0,9c58029defd2bb7cfd8b85b564c8dcc0f14c0b32e9f43140e2d7eff8dfde2 CVE-2023-20864,0,0,411ea13ebcced10931dae6ddf97a7384674dee08f3f2ba606d4ad810c1cd32de,2025-02-05T16:15:34.130000 CVE-2023-20865,0,0,947c566c7db3a2fd6de48d53c8d520f7e7e462a2b3cf38df93d2db53519f7ba9,2025-02-05T16:15:34.283000 CVE-2023-20866,0,0,9d3728277f1e85787af7c460776537a88b531fbb1b2faf8c96deaea2f25974e6,2025-02-07T17:15:24.140000 -CVE-2023-20867,0,0,c72444159cd2ecdd3b4e0fc07c90738643e059c4564cbb7cb8c67850d9291d4a,2024-11-21T07:41:43.433000 +CVE-2023-20867,0,1,b5cc445d80eccf11fbe16691215d10028d4cc7dbdae5f95dea6fd24962756425,2025-03-10T20:43:28.317000 CVE-2023-20868,0,0,4ef12985aa287dd53088fc35032c16f405f309fb0d5f2c97fb98ad8b43ae1d82,2025-01-16T15:15:09.580000 CVE-2023-20869,0,0,ea8be30561e426be0e640f21dbd3ee3ff8eb731694616e2c1a34eb40afd074e6,2025-02-04T18:15:32.880000 CVE-2023-2087,0,0,c34021487f5653a2ed0c7e62647e4439a96d631ee537366495c67a27dd4f70bb,2024-11-21T07:57:54.647000 @@ -219319,7 +219319,7 @@ CVE-2023-2404,0,0,e871d45a60e6005e1c4d45eb75a9edfef9fb129d460ff44788c0692638e391 CVE-2023-24040,0,0,002ab84f91c2eae9544026e8fa8d4517b3f52600ca19d17e1f95ceb1f9a2e8c9,2024-11-21T07:47:18.467000 CVE-2023-24042,0,0,d6d3ecc0a691c83cc86f03b6376ddddf48103b3dd6e853b135a9635e4d2c7d94,2024-11-21T07:47:18.610000 CVE-2023-24044,0,0,16a8553bd0666dab543a312b7317e79c35107a001bc50445b44596eef0ef3155,2024-11-21T07:47:18.750000 -CVE-2023-24045,0,1,901b665cb2123c392752262b84c2e0694a98683ff59753e393bfb75068bd048c,2025-03-10T19:15:37.617000 +CVE-2023-24045,0,0,901b665cb2123c392752262b84c2e0694a98683ff59753e393bfb75068bd048c,2025-03-10T19:15:37.617000 CVE-2023-24046,0,0,56466e1ad08e92cf55b8d9678d21b3ed2227b04fa61598011e5b2d90bd51ec2b,2024-11-21T07:47:19.037000 CVE-2023-24047,0,0,a6b3942ab48c4dff8c51b327a9cd882f419b051667e55c995e894045226d3b1c,2024-11-21T07:47:19.280000 CVE-2023-24048,0,0,1daabdf121529baf332053607b6904a5f303bef930f5ace2d43503e61c89a753,2024-11-21T07:47:19.503000 @@ -220308,7 +220308,7 @@ CVE-2023-25267,0,0,4259de3326950cd8e26ada70276d9aaf3cf4cb092f4dc89828c70d495046b CVE-2023-2527,0,0,b628c7086a29a9183da8f9f64491e1f494424d1684e0e71a944098c3e46be700,2024-12-12T01:20:30.213000 CVE-2023-25279,0,0,b1a7056aac972e2cef544266b63734e9282f2de2380e110d864a5fbe3b37fb78,2025-03-03T20:15:38.600000 CVE-2023-2528,0,0,7354ad96239bf796c6cbd6ba58728972cb6fb7255bae028f505e752f2e6ec6aa,2024-11-21T07:58:46.940000 -CVE-2023-25280,0,0,420720f7b19bd32b6fc1bbd4aa7919fb187b5c67dd551259fd62cd8da22709a4,2024-11-21T07:49:22.837000 +CVE-2023-25280,0,1,cb78e1d80923ce0ae34a069cb9dee85e6214b84b8cdda5c42ac3328116ea1172,2025-03-10T20:49:10.030000 CVE-2023-25281,0,0,08a99eed9edd45cf107fcd3f103157d21f276d9348825d0b3afd565c9dcd6a89,2024-11-21T07:49:23.057000 CVE-2023-25282,0,0,f816cb37e750e78c1fe070772f27931ee830b2aa8129db9fffc29b2562f70ec6,2024-11-21T07:49:23.203000 CVE-2023-25283,0,0,5f356e0d9f59faa52b6e5bf0560e1bd2b7ce0198ae0f76caceeb35ca6da8acf0,2025-02-27T20:15:36.397000 @@ -220646,7 +220646,7 @@ CVE-2023-25713,0,0,dd0d0c101d1005a4dfb41b844ef773d03acdf6055413f757c97bed9c9e64d CVE-2023-25714,0,0,30d1b3b8c2658a5d809246d435c81ddf2f9287a1f5b188d50271eb4a0e4334f7,2024-12-09T13:15:23.967000 CVE-2023-25715,0,0,6d88ef667b64c52873b9245db5fa7fe78e16f2c79bc517d1f15a2686934c9956,2024-11-21T07:49:59.500000 CVE-2023-25716,0,0,6a68a371fb70c98c3f42445bc57863f0a9fc317dbcca5e2cf2d7a9605735c149,2024-11-21T07:49:59.620000 -CVE-2023-25717,0,0,530b1e06023752d31beca2384ec8cc297d9cab5a2bd76e45e84ab265507c5cc4,2025-01-29T16:15:39.253000 +CVE-2023-25717,0,1,7ab45047ae291b9110620bf824e69b193b7f478cc5e4114d5ea36a12a4b0fe42,2025-03-10T20:48:20.863000 CVE-2023-25718,0,0,f5451b83d0d2d17afcf3aeff2ebb8c713d359ad1eb925213a0b2737a383e0c42,2024-11-21T07:49:59.913000 CVE-2023-25719,0,0,af067eb4bbeaa87ff5bd0003d5bd5bc28035789641dd59be0ad1c17fd3a0687e,2024-11-21T07:50:00.107000 CVE-2023-2572,0,0,ed886a16c7f1007ac7399c56e87342873576f715bc1e7094b3db9028c0821f2a,2025-01-08T17:15:11.603000 @@ -222457,7 +222457,7 @@ CVE-2023-27991,0,0,ae386e414790310904cad57a7ab0c86d2add8d2b23d2c0bd83f8bf4459ec2 CVE-2023-27992,0,0,213d58191fae45bcbb179a17eadc0fbe8b56d34f8d22b93738da4ede3b539687,2024-11-21T07:53:53.520000 CVE-2023-27993,0,0,381be364cc9d6288e0e5d24511b17ccfced7f5158dc4972632c50512547df5b9,2024-11-21T07:53:53.663000 CVE-2023-27995,0,0,2666db313c0f904b4b586e8ac04fda948323b8acfa168c1039de8f38c2d2d291,2024-11-21T07:53:53.820000 -CVE-2023-27997,0,0,cd67745245deb3a7e542e3f0cef8075a50e69d124b382a910f3ffcabaa903225,2024-11-21T07:53:53.957000 +CVE-2023-27997,0,1,6e73e7b7396dbf7d8b71882f537c09113597151460fc53330f31005e4e675b18,2025-03-10T20:40:57.323000 CVE-2023-27998,0,0,5530ce6aa4ce82a34c215333dfa42a5062d6dd02fc4e6b35e0b47a3b818708d6,2024-11-21T07:53:54.130000 CVE-2023-27999,0,0,ef4f57271150b134b35dda15cb9d8d1b9717628740f90750c136426925429ec3,2024-11-21T07:53:54.277000 CVE-2023-2800,0,0,1a1897017d69ffe17b6872a5314a0b66f45e220cf394696972c6073b867e375c,2024-11-21T07:59:18.923000 @@ -222684,7 +222684,7 @@ CVE-2023-28225,0,0,fc0f4d6e8ae131282489535b1b0e71e5974e3970022cb4f491663ce13b3c1 CVE-2023-28226,0,0,24f45c15d2d3818df6081da3bf69e7dd3a6e9438ec2e61e1dd753367e5306ca1,2024-11-21T07:54:38.770000 CVE-2023-28227,0,0,997952f80c93c3916ae15ac044654bce3d12ad2f35f530fe3e57a269d438a5d6,2024-11-21T07:54:38.907000 CVE-2023-28228,0,0,43b61bd7ab6bdc54ed70e306d69d183962360c96eba0e69f0625381076e2782c,2024-11-21T07:54:39.060000 -CVE-2023-28229,0,0,ba618f4eaa9d4f034242f7ccd2db1034e2ea34af4f407004d64700270da1a848,2024-11-21T07:54:39.223000 +CVE-2023-28229,0,1,00e6ccce53350c74c86e9beb09a7cf2f2aaa0f2cc5910eb3388973006a8f942f,2025-03-10T20:50:17.200000 CVE-2023-2823,0,0,c4291e667ee5a8c549c4231fd575b61295c8d918a1dc21385a6bf1de476e1bda,2024-11-21T07:59:21.500000 CVE-2023-28231,0,0,d1441ac9eee9d2a0a909837303d7b2e20b10c81a8f5f3b443a337fe046a65124,2024-11-21T07:54:39.390000 CVE-2023-28232,0,0,5a0aa6410ef140509028f5378d02b0b12717f8753bdbb347007832f67ced9b55,2024-11-21T07:54:39.587000 @@ -222706,7 +222706,7 @@ CVE-2023-28249,0,0,326a9c4e15a4a0a950f59607f9ab58eb7dac24f96e18a7109a34c1e0432ba CVE-2023-2825,0,0,44fa6db78f17ea5622a829ad4c7dccf7ad5683ffd1ac5be9d99a88a313a7a28a,2025-01-15T16:15:26.870000 CVE-2023-28250,0,0,09cf1043327f069d5f578b3511ea352a939a2176bb05976386d7e313aca118aa,2024-11-21T07:54:41.770000 CVE-2023-28251,0,0,fd62b263e9cfbde4eaa981b7f26d19e6afb86c9aa3c08f1b5e124a57ccf3c145,2024-11-21T07:54:41.943000 -CVE-2023-28252,0,0,a723b3e4340c26533fe3fb35fad1654d8b59c6f3d1bc805e54f6a0dd1fdc7764,2025-01-01T02:15:24.757000 +CVE-2023-28252,0,1,4fee14da79cffe04560163d795e23396e8ff6ada066718af49cba8e1b7b5371e,2025-03-10T20:50:39.513000 CVE-2023-28253,0,0,da7e3df64664cb20ec2e3fc06d7be22698fbd7e6b6a9abc7dfdbb84df83f20b4,2024-11-21T07:54:42.277000 CVE-2023-28254,0,0,8b55c3baab01e9a81aa806c3b78547158c80aacf8d4e0fed1a2dde2d27a33aab,2024-11-21T07:54:42.433000 CVE-2023-28255,0,0,6282d05de0f55c623ef60cff2392c95be1270053be6c69e955f1bd171f1790d6,2024-11-21T07:54:42.577000 @@ -222889,9 +222889,9 @@ CVE-2023-28429,0,0,e5d170510bc58034262f73af023181fafc468fb08856332461d435c553f0e CVE-2023-2843,0,0,4094cbfecf5cdb5b7ea91ed380eb102447bf1bb532a3b6a2bfd7713011f010c8,2024-11-21T07:59:24.017000 CVE-2023-28430,0,0,f20e831c6b995367dc268b2d75435cff0e463d4ab3dfce940e3888c446d490b3,2024-11-21T07:55:03.027000 CVE-2023-28431,0,0,bdced18d12d173f4097de33e1789ec8f8178d1b926c872d9eeac91722bab6d45,2024-11-21T07:55:03.163000 -CVE-2023-28432,0,0,9a4fd03c56987630755177000c3bf4a1f5d4fa4e5df8d66fb1229f480422ba97,2024-11-21T07:55:03.283000 +CVE-2023-28432,0,1,d221f8ee6677756648f6dbc13491e92b81cce3532c60a827c0a0fa386768de02,2025-03-10T20:49:25.103000 CVE-2023-28433,0,0,f77ff5da7e82bdb3ca8d20a9063f2f1cb1e2547fab79328e85145775f7fffc27,2024-11-21T07:55:03.410000 -CVE-2023-28434,0,0,eaf0ddc55ed36f060b80eaf6566c9a7e9d9f3c309db2e6af5d6337e2662708bd,2024-11-21T07:55:03.533000 +CVE-2023-28434,0,1,a21ff0c97610ef5ce135d43084bd078b8a2caafdbd894e4ac92239f04965896c,2025-03-10T20:49:43.140000 CVE-2023-28435,0,0,bd9b8e5bb1c97cf9a9845fba35b9297f5173af9b1ec5507d4d0736d64ba79318,2024-11-21T07:55:03.660000 CVE-2023-28436,0,0,c2940754c37ba68a4ac8fe953ce53bf69b3505546621f3c3dcee05b58b036777,2024-11-21T07:55:03.773000 CVE-2023-28437,0,0,9cb1fc60750ce64f67b875fd52232ec14e83e11eb9369beb25393894847604db,2024-11-21T07:55:03.900000 @@ -223722,7 +223722,7 @@ CVE-2023-29332,0,0,426a3f2d7c6e1861c2689b1ef1d51fd2ed2c65028037d9c2f1e87622c3393 CVE-2023-29333,0,0,e39ee9256d6cb6e4bbcf62435e196e69d1632189657e25959c48ed30d2e578fe,2025-02-28T20:15:42.797000 CVE-2023-29334,0,0,40a694796c3dfad5000acd1277181ac7ebaccbe7833e8fb5fefb1007db0b3ca0,2025-02-28T20:15:42.943000 CVE-2023-29335,0,0,61181b1a8a11a5838648b960745a60fbd0089db6dfa8e380519644f6fe0f4ebe,2024-11-21T07:56:53.140000 -CVE-2023-29336,0,0,4eff31337ef98c9ff29bfcb52467fa2757a57db48d118523b36b87bf90993948,2024-11-21T07:56:53.257000 +CVE-2023-29336,0,1,2c67c8801bba907ab027e7224aca30cb2aa812928ff1b9c3d4cb043d96e23183,2025-03-10T20:36:29.143000 CVE-2023-29337,0,0,56f7ebb5d77e680d8eedc44e0115faf21d19e36d9a2d179e33c83a37194e5627,2024-11-21T07:56:53.383000 CVE-2023-29338,0,0,0a206c80a6cbabe76544bbefcbabd7c4cd4e002b38f989e3be76bf80ce800e41,2024-11-21T07:56:53.497000 CVE-2023-2934,0,0,778832cd1bc7f448d8f80d3d8991e2c0037e5e70b5060dfce6fadeb9ab5bcc90,2024-11-21T07:59:35.917000 @@ -223743,11 +223743,11 @@ CVE-2023-29353,0,0,e45da25f220130fb5cb22b2ad186a54f698750c2df7dce2298e1cb7352ee3 CVE-2023-29354,0,0,6e6e6f6e09c384de89c89ff717c6b28e221fec8335db9a1d673dc1093d4c046a,2025-02-28T20:15:43.080000 CVE-2023-29355,0,0,37a7c5aee10b1e24a3440064cdb291401fd0f225379840c469ffc476bc6e1e48,2024-11-21T07:56:55.157000 CVE-2023-29356,0,0,60935bcd3b095359e91882913cbcf4abe11e68728d0771cac0006d94e9e34dd9,2024-11-21T07:56:55.277000 -CVE-2023-29357,0,0,1d53854bfebe463c63afc97a38a0162781953a5d7535dd4324423be8080bf5be,2024-11-21T07:56:55.393000 +CVE-2023-29357,0,1,2c1fa6c58bc572203ae6535480a4b7f815939c544a1d5e39f99a5a2706c59038,2025-03-10T20:44:31.630000 CVE-2023-29358,0,0,7ccae9f82193ec7bc0c32c5adb10e39049b93d1ae77a4746241d0a8ac0d92eca,2024-11-21T07:56:55.520000 CVE-2023-29359,0,0,51914d31d344268e10e3fa53982ed350af46f96e5d10efe6d4cadfbd88d6d4d0,2024-11-21T07:56:55.653000 CVE-2023-2936,0,0,35f1cc12fb7af17c48afd6aa8328fec33f868fc27aead065fec431992c565531,2024-11-21T07:59:36.180000 -CVE-2023-29360,0,0,50649ef8203ba94439450a7ed18921a0970cac2b6dd4bfeed4351b345ee583a2,2024-11-21T07:56:55.787000 +CVE-2023-29360,0,1,7dda314c37d413a4e0c11f57585df00e028c2ceb7e1fe8d64dba24e3c35c9c4d,2025-03-10T20:45:37.843000 CVE-2023-29361,0,0,d0050d38806dd20e0260e844860d6cf031fbbd3abe4d0c166344fd1826afec3c,2024-11-21T07:56:55.913000 CVE-2023-29362,0,0,794effcc8a78fd69dcca30e59df44544c99f1ac12347f460d805fe0a92bbf06f,2024-11-21T07:56:56.020000 CVE-2023-29363,0,0,0b84a5ccc103207dee77fb5e109928817515938cbc02f20456004850b7c6e677,2024-11-21T07:56:56.143000 @@ -223869,7 +223869,7 @@ CVE-2023-29487,0,0,3d13910652c9ceb1782af2c61c24f634eafb36868d369f7b919d47049bc35 CVE-2023-29489,0,0,df6c5af5ac2e3229b6ed02d2d2ee1f81ebf76beb1923252f8aab1d0dd5131466,2024-11-21T07:57:09.780000 CVE-2023-2949,0,0,e8a354e546e4b107ec601ec03b74e830838f361fd676790e29e647a00c7e0f22,2024-11-21T07:59:37.783000 CVE-2023-29491,0,0,18214f055738f9c70b8ea08170c16516e75285c8db1071653aefd6687e9b2983,2024-11-21T07:57:09.933000 -CVE-2023-29492,0,0,4f4685c55f6bbe7d9cfbf5960e8880e59ffa020d3df174295de098520679790d,2024-11-21T07:57:10.087000 +CVE-2023-29492,0,1,dd1b2bf731e8ee922a4908dea3e81260da3fed69a330327f8909e0d6d7ca0550,2025-03-10T20:49:57.083000 CVE-2023-29494,0,0,b90d8ceeaef9906bc47b80cee9467055cedc2b0aec3c6d26d3bf34d2bba0b1cf,2024-11-21T07:57:10.290000 CVE-2023-29495,0,0,7dad3d0d134689f5f27d6c90d7fbacbcb08c849eae64453f5313d9b46f471707,2024-11-21T07:57:10.430000 CVE-2023-29497,0,0,275bcab71fa31aec3c61d00134fc188f3391177ede5a5f6c28eeb79ddddcfae6,2024-11-21T07:57:10.543000 @@ -225587,9 +225587,9 @@ CVE-2023-32042,0,0,5f290f5f1c8d614a89d78dbcfa49809fab027812e6c001b9b3300ec09234c CVE-2023-32043,0,0,2a7d05fd3f7a70a3d987b95171cfde579b93431ce2de1c4026749db9445afffe,2024-11-21T08:02:35.820000 CVE-2023-32044,0,0,435d711813854754470f6f0cb64b7782fd7dfb824d093076488d02706951d057,2025-01-01T02:15:42.417000 CVE-2023-32045,0,0,6806b381fb83d1d65b0304d5f2c111fb9450cb947867afbbdef666424f8c5da4,2025-01-01T02:15:42.597000 -CVE-2023-32046,0,0,b40b9497a6133d2318215c0e2b3db7bc5026ceaeecd36e7beadcd55ab36e521b,2025-01-01T02:15:42.747000 +CVE-2023-32046,0,1,ad9c814cd77fb40a827998342e25977be47e487b98c7ca5bc0bf7c87b36aa482,2025-03-10T20:45:52.913000 CVE-2023-32047,0,0,dd872c626a54ae37928bc11d8a2d53e4e59d57c0e0636c20d31bdc391f716f53,2024-11-21T08:02:36.427000 -CVE-2023-32049,0,0,8429d1fe4ce20942f535dcb2ce8c09a0b6e6326d445e7bdc51f9b94fa6ecdb63,2024-11-21T08:02:36.543000 +CVE-2023-32049,0,1,c0b222c9974b6e1b631fa8a835aea0bd3842558529de4974dbd89c9a75ef3673,2025-03-10T20:46:21.273000 CVE-2023-3205,0,0,f50a33d8c9cf94803a8f87e9e3439b490e3fb5def430be3c992f06dbc5b7bcef,2024-11-21T08:16:41.637000 CVE-2023-32050,0,0,6e6eab390f48e9a9854dfb0c7f4d8bd90f21437b5a0cf5482c1b3d94019e4630,2024-11-21T08:02:36.673000 CVE-2023-32051,0,0,e28d488bef227a840144c7d3649e0e8b2a0cb4501b7002045c5ae6fe6cddd6e9,2024-11-21T08:02:36.810000 @@ -225864,7 +225864,7 @@ CVE-2023-32311,0,0,8dd08593fc6ebd80db8873727204100b8929e354f2617334ffb187aea38b0 CVE-2023-32312,0,0,92586a0fe6dbd059e800e2a1b1040848c50cd74c365c0f0c9b0d813114c27816,2024-11-21T08:03:05.380000 CVE-2023-32313,0,0,64947d18d47453fd1f483352582ce21475fdada012efebcb972616f76ae4633e,2024-11-21T08:03:05.510000 CVE-2023-32314,0,0,4f42f2c41a0d9e5e56b6efeaafab9cbae9db2aa5c3a6098596022815ce1097cb,2024-11-21T08:03:05.643000 -CVE-2023-32315,0,0,80448fa5e58c75cfdd3920035729e48891874691bf7ae2fda092976b060fe4b3,2024-11-21T08:03:05.767000 +CVE-2023-32315,0,1,65cbb904e0805f05aeb038299873b08cbf5286040e9f0fb23691164d8197ca77,2025-03-10T20:36:57.097000 CVE-2023-32316,0,0,b68618955850c159deec6bf37c9b14d85bcb41ed847bb06df9272a53cbddcc2b,2025-01-14T20:15:27.070000 CVE-2023-32317,0,0,42729ba8aff71043c2ebbb52acd4606bdca9561dc5a9be8503917f8360d25570,2024-11-21T08:03:06.027000 CVE-2023-32318,0,0,6fbd6f2a8c5cfa7a14bfc7aa127bc8a45688e4a15812697e46c2b394a952f5db,2024-11-21T08:03:06.160000 @@ -226958,9 +226958,9 @@ CVE-2023-33566,0,0,474244334223314bafbbb34726873b97a4d786f3c255b5b6db4b37691b287 CVE-2023-33567,0,0,6f8070242f0b52f35467ff6fa5967af9712ffd9e8a51a555b37438dd5b9a24f4,2024-05-27T01:15:13.333000 CVE-2023-33568,0,0,c53755badbd50b80ab85c5708c7b94cbacfbb7f9effcaa8b7be6b9fcf1735b67,2024-11-21T08:05:44.090000 CVE-2023-33569,0,0,73aa9218e9b0ea1c29e740fd31b11bf9a7f06d0020284b0f722e6f62c477c9fd,2025-01-08T17:15:12.283000 -CVE-2023-3357,0,0,893d04151b56454ecb74aded74cd09cfafc0605f54872ce5dedb520ddc580244,2024-11-21T08:17:05.570000 +CVE-2023-3357,0,1,731ddb62de37847f438e72d994c24a3ffb7f7050ba81b5f11c4229d2184dae54,2025-03-10T21:15:38.650000 CVE-2023-33570,0,0,85cf59e7d43d3b836fbc8ade873b57bf05e4ee43d634b3bb632c5499b8726f78,2024-11-27T17:15:06.687000 -CVE-2023-3358,0,0,cbb2ff79b282d095762345ca7bf4fb67fe17cf253ee5cba9d1d8313d2b406f40,2024-11-21T08:17:05.693000 +CVE-2023-3358,0,1,fe43f9f3341e75bd6b606633c54a083d5f45bcac94fdaed1e70676b674ad4b5b,2025-03-10T21:15:39.320000 CVE-2023-33580,0,0,1dca35c14ceebd8b2ac2749f958edc5f886e53698ca054ed32052d4e15b7ccab,2024-11-21T08:05:44.550000 CVE-2023-33584,0,0,2845a42f3ce418d0634a650c3ed2178cf03cdca0f27a845f3eeab11506d04457,2024-11-21T08:05:44.707000 CVE-2023-3359,0,0,1c8c0aa4c661e26bbd01074bc5f71d699cd0da432f86560f88fb710ebd41dd26,2025-03-07T16:15:37.470000 @@ -227669,7 +227669,7 @@ CVE-2023-34386,0,0,3e21beb4557c98228f588552bee4c4f19f8ee6009689f9ba7ed52ba68790c CVE-2023-34387,0,0,7031254c429505ad21579b50a14e61d5326f65b6fb9b28c20ecc7368d099b30a,2024-12-13T15:15:15.423000 CVE-2023-34388,0,0,8ada4f02e28c933aad8accb1fa844ba15f4b96b844ed5f7db6f2f7659791f3dd,2024-11-21T08:07:09.263000 CVE-2023-34389,0,0,0053e07969cb197ef103d72413e3df09b0fe796c054d2558b1a87a0e6b018276,2024-11-21T08:07:09.403000 -CVE-2023-3439,0,0,3e388d4801902db0764a3c9fb86827d01711c419759d0f3094a18d3ea23d504d,2024-11-21T08:17:16.167000 +CVE-2023-3439,0,1,e7de50740aba4bbce687ff49f1b8138892c9e716c53e98a23d0eb64136b0f7a8,2025-03-10T21:15:39.513000 CVE-2023-34390,0,0,bf385404d07f10cd7cb4bebaa52fc316d9dc4147eedd32f71885db8b53be2e41,2024-11-21T08:07:09.550000 CVE-2023-34391,0,0,2850ce35c525b5e171b8e8917e07263b599ec5a37f54cff304be7640551f4ea5,2024-11-21T08:07:09.713000 CVE-2023-34392,0,0,d8289ef9b8ee4c730669c475b92ed9638b79be5cddb18576855295bf53608bd1,2024-11-21T08:07:09.853000 @@ -228160,7 +228160,7 @@ CVE-2023-35186,0,0,2330c3077b83f9f6fae9e0eda93500aac3bc9bbd15b777050c1b9b248cf93 CVE-2023-35187,0,0,d435c3fc1573652bac9b174ccf4e3f4282700228ab093cbb54d11cb6634e9fde,2024-11-21T08:08:07.393000 CVE-2023-35188,0,0,20dcd968f47df33dc9f031cc661f6699d605a5c83a53fc048d8db516b33d965c,2024-11-21T08:08:07.530000 CVE-2023-35189,0,0,0c013e229c8b320febe8b95a5660110014abdf3b654e065846aefefa2b1eaf76,2024-11-21T08:08:07.667000 -CVE-2023-3519,0,0,d756e30fcc740f09ff56300b626fd88408e5fc2fa13f11a1c6caf045f1e4e15a,2025-02-13T17:16:57.200000 +CVE-2023-3519,0,1,d1535571094f1399ff68a09fa774b0dcb6cdbd4a8bcf7a2dc77e64d06e338506,2025-03-10T20:46:43.453000 CVE-2023-35191,0,0,57e2cd323ea5812b05a092bdd798fc25e60bb2f356c1b70cf60026944fad7439,2024-11-21T08:08:07.793000 CVE-2023-35192,0,0,20b85c2be1afce08117fbec37ea7ba8ad0c365657a4a1990271826475914f270,2025-01-23T18:32:53.320000 CVE-2023-35193,0,0,e9a6b5ccac2268d637286d7a1bdb9433afc1109bf4ebb9b8f76e19c20e797054,2024-11-21T08:08:08.043000 @@ -229329,7 +229329,7 @@ CVE-2023-36841,0,0,a1fc0a0b13e0ee3d0d61001b90eb0427c7439bb806be4ff039b3472f43d41 CVE-2023-36842,0,0,88bf7bb1a6302a96544abfeea0f3510e84b6ac4a28e7e918042ef4d92b938df9,2024-11-21T08:10:43.597000 CVE-2023-36843,0,0,cbbdfea83c6a7fd5ed1cdf52988f66762e4a2b24f0260a680b1fa2a1f4950fa6,2024-11-21T08:10:43.800000 CVE-2023-36844,0,0,bc6d41b439b8f4d601bb9c02d7b26d2be534ed2ee7be257d11b2e8bfddf0fccf,2025-02-24T14:59:31.717000 -CVE-2023-36845,0,0,a2b585a9340e155b8437a91bc7dd8379ff2930d860a6449aea969a0c621f237e,2025-02-13T17:16:43.583000 +CVE-2023-36845,0,1,db2436a680cb678fc43dd815b46cd68680d85dfcfab366bbf622d94093d01387,2025-03-10T20:31:09.807000 CVE-2023-36846,0,0,31e0f5cfc64218783c631dcb6ea01294e0b629b622e66caa6ecd46f40b776415,2025-01-27T21:39:36.497000 CVE-2023-36847,0,0,abf946e66b75d4fe6a8324763c422edcfca5bfa6d043c289b569ca20068fadc7,2025-01-27T21:40:15.840000 CVE-2023-36848,0,0,a2151c8586ba65daa2e8cb4be03b6c633a7c5c083fda49d9a275029509f8e399,2024-11-21T08:10:46.410000 @@ -230412,7 +230412,7 @@ CVE-2023-38175,0,0,ef1c8529b3657e2f66fcf0c37f671b4b6edc91494a166816094eac680db4d CVE-2023-38176,0,0,3fdc33ad178160a5c99abc1a3ac59e3e73fc42e8ab098f2163e13646e62e3b2c,2024-11-21T08:13:01.133000 CVE-2023-38177,0,0,730bcd01c82a54192a212d95053de3fec2969268787436a461567cb09272c10c,2024-11-21T08:13:01.270000 CVE-2023-38178,0,0,7c75f8662268ca89daf277bec3375208706881a79c0c88533a7f4fd2922ae19d,2024-11-21T08:13:01.407000 -CVE-2023-38180,0,0,ec7ac4671a4a8dfc6569e323af84768a45d38819b4d08cd6ab81a3a8ecb63bda,2025-02-26T17:15:21.023000 +CVE-2023-38180,0,1,d0b4cb4f8c5e52ebfd2d3f2ff6c1f4464c074e36e41ce5baa9281678f3bd538f,2025-03-10T20:30:38.527000 CVE-2023-38181,0,0,5a8b679495a586462dbde9c3056012cf04f2dc6c5625ddc2c0a5b368831d71af,2024-11-21T08:13:01.720000 CVE-2023-38182,0,0,4d4a59af220c252b63fea8ea60f7e53085011cf3820ea3ee0c3d6c02139ee575,2024-11-21T08:13:01.853000 CVE-2023-38184,0,0,8041243a4a2b4032f9464c8d84f0fc87c8a2d1f56ecf4620773160e63efc0f4a,2024-11-21T08:13:01.980000 @@ -231925,7 +231925,7 @@ CVE-2023-40040,0,0,3f0f5b5a49b077592c19d66c28b8663ac6b131e5e630485bb5cc47d1f9472 CVE-2023-40041,0,0,0f11e9858a34d472a1c0a2761368dcab1b86c026e37567cc77e2eef57d8136b3,2024-11-21T08:18:34.917000 CVE-2023-40042,0,0,02cc6b6d7f0f8d99b35b97fc4aaa74da4d879c8ea2d2a813def81e280356d977,2024-11-21T08:18:35.063000 CVE-2023-40043,0,0,e6e3b1652d04e45dd01a00b692714fc2d7fc4320e17fc563f04510f03243ddd0,2024-11-21T08:18:35.230000 -CVE-2023-40044,0,0,9d663ae3fd4d75c75bf60c6f336631e3906a4c3f7f632632135d8ec89f654915,2025-02-13T17:17:00.470000 +CVE-2023-40044,0,1,1f3c9e288a2c8e299eb10f21cc5f9bebba0d2fa8a10e95038a35e7c0d9172645,2025-03-10T20:32:25.380000 CVE-2023-40045,0,0,43781d4d06011b7cb9a008f4a0a4b20ebfbf9da03c65a9c98cfad9979bfbd212,2024-11-21T08:18:35.550000 CVE-2023-40046,0,0,9dca0c7c22c2cba01540a6032b47009c83c32bed6d9548f249a8c2fb7b691bbb,2024-11-21T08:18:35.697000 CVE-2023-40047,0,0,163df9c00ca68663e2cc908fd250aa16e79170a6ad54237c242891bee26589e1,2024-11-21T08:18:35.837000 @@ -233647,7 +233647,7 @@ CVE-2023-42106,0,0,447b9ae9affd3d0c9de283ba5b34b328b5720b3ab58d3f53e9737107e014d CVE-2023-42107,0,0,4c6b9e07bb342649063cc5347eca19bb657c8c9fd1d77cb5e4432722215e6dd7,2024-11-21T08:22:17.340000 CVE-2023-42108,0,0,27fddc624a1c5c9018d3d720e5576e631e6a6a8278b5615ec396b1c70bc9e8b9,2024-11-21T08:22:17.460000 CVE-2023-42109,0,0,0ca557e538c7c48ab18ac8bf8c46c110b9da67b5fbbbb7b22c216feaa0e6ddab,2024-11-21T08:22:17.597000 -CVE-2023-4211,0,0,b57baa61295b60c90672581b281f09215d0f0771570e0c01435e49359758b1bb,2025-02-04T15:15:17.480000 +CVE-2023-4211,0,1,cb5c91527ee40f43d48fa5706a01f8e02d9dcc34686e3ad9022234cd3301736e,2025-03-10T20:32:41.700000 CVE-2023-42110,0,0,28576136c00cb00997c7a4562e8bc812f565322c6205ab39454fc89564f27098,2024-11-21T08:22:17.723000 CVE-2023-42111,0,0,411e4403445247c72b5192b2c32e45d4c38257ebe22f73e5a39910fa8feadc3d,2024-11-21T08:22:17.847000 CVE-2023-42112,0,0,4c5f6ea3f5a116489efba7e1d9025c3ea82db9123ac6e4046e9eeb7dd1a74684,2024-11-21T08:22:17.967000 @@ -234114,7 +234114,7 @@ CVE-2023-4279,0,0,1caed5149541c10d4336248a1287cbb2fb27f3524c93ad81d6b75ca3202c17 CVE-2023-42790,0,0,d4a58d7345844e2500d9a95d1338ce209447c20c8a9a245fefec6b908b6fd44c,2024-11-21T08:23:09.530000 CVE-2023-42791,0,0,9a469e96ceb7289a27f57bada36599a8e7eea3d372acceee964980bff57f3d16,2024-12-16T22:23:14.027000 CVE-2023-42792,0,0,e239ae3986112ad5db11a336cdab21693a34b66ff9212f4cdcebe6d244ac46c9,2025-02-13T17:17:09.380000 -CVE-2023-42793,0,0,01a39d3b50c63aef8c1ebe74e63060a424cf6737602773d6c762fbe4a5b5928d,2024-12-16T12:15:04.797000 +CVE-2023-42793,0,1,684c2ea437407ce0b0ba50a3b46013b3cd756276275c608703d67a015e17803d,2025-03-10T20:32:11.460000 CVE-2023-42794,0,0,7dc2cfa2877a24ce9ea733c3ef97e22877a47d2eb04c810f3f2306cfedfa262d,2025-02-13T17:17:09.493000 CVE-2023-42795,0,0,2e523bdf521e70992855283f3fa08b34386b8c675ff60321c62eefc1703cc5bd,2025-02-13T17:17:09.610000 CVE-2023-42796,0,0,4e3c42f1018ec4a81d9ac20e8d31eda02f7ba00133483b55be83b5c6fac92755,2024-11-21T08:23:10.387000 @@ -242494,7 +242494,7 @@ CVE-2023-6341,0,0,8ecd43f865afd7caa5344b8fe17a3ea7a3522641beb80a8a947afe15992d37 CVE-2023-6342,0,0,2b3c455968258ed34c39ebb191327647c90e3e84685f08ccc9f067b0934df2c8,2024-11-21T08:43:39.507000 CVE-2023-6343,0,0,ed6f2c610ee4698d428e1242bb3c9253625355d55d76cd1ea75478ff32cde2fe,2024-11-21T08:43:39.670000 CVE-2023-6344,0,0,b19585bc4f92d839c4c31e3142088ddaef3492c596de4a6ec59addd057cb77ed,2024-11-21T08:43:39.823000 -CVE-2023-6345,0,0,19086f0fb3afb61aa4695d13885be9ee216abace4a98ffb69bfbdbc7ce12d013,2025-02-03T14:15:37.710000 +CVE-2023-6345,0,1,b51470da0aa1ff270173db85f07f06ee82bd7755ec27916c55ba017a123e5d4e,2025-03-10T20:33:27.970000 CVE-2023-6346,0,0,69b9fa64118162df8c1ca3fabc04a7b924c72ea3fba2eb0b4d4a970f8597bdb2,2024-11-21T08:43:40.143000 CVE-2023-6347,0,0,b705c1c6a4a54e8880ddce8ea8d2a41c6f19a7013e8b35f73dde8f1f7fd7e6d5,2024-11-21T08:43:40.283000 CVE-2023-6348,0,0,0f7379de56995dc0b0c187185cf9e3fc0fabaf4d795f78271a10ca073a7614ff,2024-11-21T08:43:40.500000 @@ -243095,7 +243095,7 @@ CVE-2023-7020,0,0,197fd2fa8d1d4a18a6a4294ec49a94d748ef7ab3b8641e1f8788b50c52350f CVE-2023-7021,0,0,c90f0d59c2315eb60681259fead187f0526d5fbf18a87677fa680c04abf0c8f3,2024-11-21T08:45:03.430000 CVE-2023-7022,0,0,856fd34983e00eb10af7bbfa2b247782306c3cd9e203e98bbb5f4bce3117af9c,2024-11-21T08:45:03.637000 CVE-2023-7023,0,0,4e802c403a190e5bf3fbdeb4ce4568b9f0ede0742b2ccbd390feda6a6eb357cf,2024-11-21T08:45:03.803000 -CVE-2023-7024,0,0,efcf5c42823cc7fa3a82e0c71c9d5f8cea75ae94169a093f7a8797406932fa24,2025-02-03T14:15:37.920000 +CVE-2023-7024,0,1,2e15e4cb50cf877257b30786df79ea07d2ac16f011ec0a885bd7a571fd351cc5,2025-03-10T20:33:38.570000 CVE-2023-7025,0,0,145c0a7dc7eb75d64af8eb05c1d2d3dac33609c0032da4138aea95c3c490716a,2024-11-21T08:45:04.097000 CVE-2023-7026,0,0,98716ce8e87964958034bedfc875bd5c13b34d49f4803350e191e9f77d9640fe,2024-11-21T08:45:04.243000 CVE-2023-7027,0,0,1831de41a592a60eace373737109c08997b01ea4f32d34c6623fc7de027bd240,2024-11-21T08:45:04.383000 @@ -243168,7 +243168,7 @@ CVE-2023-7097,0,0,bab463a157a0ec4c86b8d05086d020c8321cb0e2ddfa748238550f6301bba5 CVE-2023-7098,0,0,fb45e550044e716b2cd60264b1407659634acf1d3e7cc58f963426aa4635aad8,2024-11-21T08:45:15.690000 CVE-2023-7099,0,0,e5a2b72389968a01cc4f6096c3e1ce4ac890861a6e3386a7275b06db2e27cf70,2024-11-21T08:45:16.090000 CVE-2023-7100,0,0,d677b41de093998f0edb23384ca32d3a17e346e2181a72ddd7db4fe96959d1aa,2025-03-04T17:15:11.650000 -CVE-2023-7101,0,0,78a85b1311a31dfa9c8b894c9505c43b5a39d6d339543bcf68dc72fc2d6db90f,2025-02-13T18:16:12.690000 +CVE-2023-7101,0,1,d683f053928fc3e4bd18278d2b2b8d9f8cb0c7a0708f1d0bb28e3dd55c1dc483,2025-03-10T20:23:08.703000 CVE-2023-7102,0,0,eda46931e4d5cc965a4562425a4a4a96d50c0b667307576457f7ed3697edc4a3,2024-11-21T08:45:16.750000 CVE-2023-7103,0,0,504008c363eeef54a14a16075674b14134fa024a6160feecad6805fec06dbee4,2025-03-04T12:25:10.853000 CVE-2023-7104,0,0,685626b29f6edd04d4660abe291361929ccac331b20f76b48a7d8dd8219b4857,2024-11-21T08:45:17.067000 @@ -246454,7 +246454,7 @@ CVE-2024-12352,0,0,e1ddca6bc02f4291161f9cb613598bb977ed9ee17cca4c5e2325f18c79ad7 CVE-2024-12353,0,0,8e902bdcf1e536e440d27493a45e9676aaf57d7dea9726287e7cfbcce82025ec,2024-12-10T23:37:06.613000 CVE-2024-12354,0,0,10704cc62607ce8f0afc2f3e27b63de336c361854c1ec7cc69d3eb63fb180593,2024-12-10T23:36:25.740000 CVE-2024-12355,0,0,706e4a4ebf8085b58d4c74c52fe82e7439a814fed3c0fd9f69db058153d00a7d,2024-12-10T23:36:03.883000 -CVE-2024-12356,0,0,c1d5f9ca3b1db608934567f6ec2906e3a5ff623eb5cc1845b11e1acaaac787fa,2025-02-17T21:15:10.327000 +CVE-2024-12356,0,1,4b3deef35ed0ff0efbcd0e1cd934c502b31c09d7ffc78ec57350c7eac8215b2e,2025-03-10T20:27:00.663000 CVE-2024-12357,0,0,8fdce3211cb73cdbfc67b5113b116414bce41bec8c2ccd58fc82212b4bef4cdb,2024-12-10T23:35:15.660000 CVE-2024-12358,0,0,0d0452ecf02cdd382e015110aba817e69e5ce28b817ee4bc639441231292eec1,2024-12-10T23:34:20.467000 CVE-2024-12359,0,0,e103589c18d9a5be84b55f651b08b2895fc765dd7e9223355e8a5f1256c3f028,2024-12-10T23:34:02.110000 @@ -249216,7 +249216,7 @@ CVE-2024-20949,0,0,8447586b572938721504c1687180a68e63afc2fdacf6da4b480edb44c75dd CVE-2024-20950,0,0,f5c99eea8d10c44cb6306cc5eef489fdee68a2f90bacd64ab99a343812559bae,2024-11-21T08:53:29.690000 CVE-2024-20951,0,0,a912377cd9c5e3f36b663316c781a26423eb926f1a59dc0a2f3408b7c7125bd6,2024-11-29T14:07:57.480000 CVE-2024-20952,0,0,974bc5f3b18c2e594a4d1c4bd936f6f9b31dc1a29fe2f12bc3faf51bb8eac324,2024-11-21T08:53:29.903000 -CVE-2024-20953,0,0,82765a20964a4a5bab701090b57b1fe4355731cd663540cb37d4d7f85d050f51,2025-02-25T02:00:02.097000 +CVE-2024-20953,0,1,b4a3842d63eda45fd21efffeeef1cf36983cfc95e2e0ca5800a1d3edba0c6841,2025-03-10T20:23:29.163000 CVE-2024-20954,0,0,9afc2253774090ba4eb185e93f29f04799d88be99ccffcb7987fb70e621bc5d1,2024-12-06T19:38:00.843000 CVE-2024-20955,0,0,888e1b88ad65bdcadee36bf516889d82a35fb4b5c74e00f287b421d64597a1fe,2024-11-21T08:53:30.257000 CVE-2024-20956,0,0,9661739112364392106915eba09ba3edb13da21796d158c1a55722d67e3804e6,2024-11-27T16:37:04.993000 @@ -249684,7 +249684,7 @@ CVE-2024-2141,0,0,9e81dc4008e280636b3df3b06832bc47e054ab7f464649607ad8242783bd7c CVE-2024-21410,0,0,95d0b95a5f0063806998bacddd7789744542e29655fa4a9d4c4406647d1610d4,2024-11-29T15:28:11.497000 CVE-2024-21411,0,0,014096b872a3129a023c532a8b0c270957fa0df4578b38d594339a889b601731,2024-12-27T17:07:01.770000 CVE-2024-21412,0,0,fe6d0090a3119f8d25267196b6a07a7c56807e1de815457f2dcf42a8c64f6c87,2024-11-29T15:25:25.097000 -CVE-2024-21413,0,0,ac761900901205b2941dd65a03a86c00c20357181c39faedef6b68c31b20b93a,2025-02-07T02:00:02.403000 +CVE-2024-21413,0,1,88e8b79d8db6a6de7296c263ae3e0ba7e4c2e8544427d9e6ae52e7a1b28cc9ec,2025-03-10T20:23:20.430000 CVE-2024-21414,0,0,c113e0d598bfc7d7070ceff6ac06c1e6a9560a372c30e2934a8ef9d69a624fa1,2025-01-15T22:36:14.993000 CVE-2024-21415,0,0,4b4ee2b6726cf8db1568b3b1590286550c2df48a3dd8b42fa0c2382f5eb16957,2025-01-15T22:34:43.580000 CVE-2024-21416,0,0,93f002464d825de469964fa8d43a5472864f4628746c95028532cc0c5cfb11df,2024-09-20T18:55:14.573000 @@ -254558,14 +254558,14 @@ CVE-2024-27764,0,0,0de26073946e11961ce062555628b344b9ee32e76db8ae9da9255839134e2 CVE-2024-27765,0,0,04aaaded443f604ce4ee49a08aa743343ef15860fdace32095dfbefb0b186792,2025-01-21T16:52:29.603000 CVE-2024-27766,0,0,4d93d17ae285c958f465adc24a7cf5f24274982fb56935552c3f47d118ead87c,2024-10-21T00:15:12.173000 CVE-2024-27767,0,0,c9ce621c5d6b3464c79bf26ea66f180f15c4c8565ef1098a7e1611746ab9ff91,2025-03-10T18:34:58.663000 -CVE-2024-27768,0,1,e1977f6a4ad56310446084f1814fd60386c4e9679c9b981d2a5e7c9a8b926ef2,2025-03-10T18:34:58.663000 -CVE-2024-27769,0,1,48741438427ed642b89ac067ebc08c7061ad6f8c65ca09283fdc6a60453ead7c,2025-03-10T18:34:58.663000 +CVE-2024-27768,0,0,e1977f6a4ad56310446084f1814fd60386c4e9679c9b981d2a5e7c9a8b926ef2,2025-03-10T18:34:58.663000 +CVE-2024-27769,0,0,48741438427ed642b89ac067ebc08c7061ad6f8c65ca09283fdc6a60453ead7c,2025-03-10T18:34:58.663000 CVE-2024-2777,0,0,3d14d6a0d116f1e241e3815d376a67043eb26436ab43f59a526d7cb4efc6dc9b,2025-02-21T18:33:30.590000 -CVE-2024-27770,0,1,10bf53dc7a921586f939bccdc57e108f94008b59fce8dfa0e40a6011ad513ac7,2025-03-10T18:34:58.663000 -CVE-2024-27771,0,1,d18829a32784e436a98040c1faec2d2d1bc5dd2f9a5216f0f86f1ac290fd10b2,2025-03-10T18:34:58.663000 -CVE-2024-27772,0,1,19f4d760b7860238fac5c2e229cf87fc9e09f7d9c2bafdf960728be9ba2517a9,2025-03-10T18:34:58.663000 -CVE-2024-27773,0,1,e32c8485db7ae96f311eafb5317d8c247dafc0778b717136a8d0af8eba4c4997,2025-03-10T18:34:58.663000 -CVE-2024-27774,0,1,9dd970a6d5dba156468a350b26f104eee81e895b1755debe465c756ed5ae8e19,2025-03-10T18:34:58.663000 +CVE-2024-27770,0,0,10bf53dc7a921586f939bccdc57e108f94008b59fce8dfa0e40a6011ad513ac7,2025-03-10T18:34:58.663000 +CVE-2024-27771,0,0,d18829a32784e436a98040c1faec2d2d1bc5dd2f9a5216f0f86f1ac290fd10b2,2025-03-10T18:34:58.663000 +CVE-2024-27772,0,0,19f4d760b7860238fac5c2e229cf87fc9e09f7d9c2bafdf960728be9ba2517a9,2025-03-10T18:34:58.663000 +CVE-2024-27773,0,0,e32c8485db7ae96f311eafb5317d8c247dafc0778b717136a8d0af8eba4c4997,2025-03-10T18:34:58.663000 +CVE-2024-27774,0,0,9dd970a6d5dba156468a350b26f104eee81e895b1755debe465c756ed5ae8e19,2025-03-10T18:34:58.663000 CVE-2024-27775,0,0,468f4bdeb691bac934a90af6b47335beff0a01310cc0f12046ca31ea2abc0fb4,2024-11-21T09:05:02.297000 CVE-2024-27776,0,0,73ca15de9b07b4bb856e35745c43f9cd0ea727710915e8a42d139dd029652387,2024-11-21T09:05:02.433000 CVE-2024-27778,0,0,3b61d8453c3de288977eb08a96cca8e26535b9043516770daafb9936f17dae62,2025-01-31T17:35:05.800000 @@ -257821,7 +257821,7 @@ CVE-2024-32109,0,0,c9a7cac737476956b9fbf72c1e5d6a8a50bb5a1742710bddb0f71999ccd9d CVE-2024-3211,0,0,98aac495f2a7a17ab7cb4a24950a45aa52e6a13f3e3a0c46ae3956f9c49aadf2,2024-11-21T09:29:09.530000 CVE-2024-32111,0,0,121bcf9e03eb2023e507e49bca0f378abedab19bac9b9cac33fc8d7c3f599a80,2024-11-21T09:14:29.573000 CVE-2024-32112,0,0,3cc0cdd2e390858089e1a98f8ecf0a04851da7cfb00b76da57093ec0ffbb5739,2024-11-21T09:14:29.720000 -CVE-2024-32113,0,0,1ff9a10ff2bbfaa858146d22068a002c7eb5eb7315815d75bc89f4484c2c5787,2025-02-13T18:18:02.173000 +CVE-2024-32113,0,1,9aa52de9436e1bb3af8a10658199c74d90b83ec64d6f4907ba38c9763dd74ceb,2025-03-10T20:23:37.390000 CVE-2024-32114,0,0,fa0ace32e8331607700a098defe4a63c95a20c05c2f93247ddd5b9a066e0c181,2025-02-11T16:31:00.073000 CVE-2024-32115,0,0,c848180be95bbc961b1fa26b25498cb9780e7ec1c116797482a6eccbb7c27b46,2025-02-18T22:15:10.747000 CVE-2024-32116,0,0,140b66d8b58d23b0fe567501dcd986adbe9732a7da9e43b727de51e69eac6a7d,2025-01-21T22:19:07.690000 @@ -260196,7 +260196,7 @@ CVE-2024-35247,0,0,9fca1cb4035269cd7b45b306e847aee6461e786d5db963e21ee5dcd933452 CVE-2024-35248,0,0,7c3ed5cb016eeae24ebeb7d52be404adf38788725c5e83b5d27391e0dc1d9bf7,2024-11-21T09:20:00.980000 CVE-2024-35249,0,0,302b7c8906e51cdc971703773787e3153a88d65789ad0641a56c6ae0bd42570d,2024-11-21T09:20:01.130000 CVE-2024-3525,0,0,09687499a1e95f8a70d1c5d0062a29c1bb9be88ef5c3b756ad1d4eec0731fddf,2025-02-27T14:54:18.293000 -CVE-2024-35250,0,0,5bde149611ef48bb4ae7d3251e5a00ab3ffd8d805b0bd2f0f81388b6ccbf83af,2024-12-17T02:00:02.077000 +CVE-2024-35250,0,1,c7a30c5a25a7ca258a48bacf1fbd0698c70444a54d40b03d14ecf4fc74ddde8c,2025-03-10T20:23:53.597000 CVE-2024-35252,0,0,0f8cf4ca91d191378f3442941d01f34b6bf05c200f0024f0bb3474e02f2e50d7,2024-11-21T09:20:01.453000 CVE-2024-35253,0,0,bee685c773d8375872a8fd41de235ce0377b714b15d51115236139dd0a8b700c,2024-11-21T09:20:01.607000 CVE-2024-35254,0,0,0973352a78955e1008d161d71b8515ce181d81658087521aabcddd672b8cbfcc,2024-11-21T09:20:01.750000 @@ -267281,7 +267281,7 @@ CVE-2024-44175,0,0,21fd54203e8a328aa6ddadf60d944e0a0983b6a3a07be2abcb838cb48b12d CVE-2024-44176,0,0,02c607cc196a1e33eb632f0de9814806e6dc69c4ca8e95ed9cdb360698290492,2024-09-25T13:27:13.333000 CVE-2024-44177,0,0,0086874e5f4389e06928db6b81db20629e71c2b6609f712738d0b53b5de5c4fc,2024-09-24T16:28:09.853000 CVE-2024-44178,0,0,3836de3bb945a8f85bde59cc1b4f59deb044b827183198668dedf9e02270b6a7,2024-09-24T16:28:40.960000 -CVE-2024-44179,1,1,46c758ad62e26c7275d8e543b6e697adb3aa6c5ab6e016de6f6ac4d3f0e9487f,2025-03-10T19:15:37.960000 +CVE-2024-44179,0,0,46c758ad62e26c7275d8e543b6e697adb3aa6c5ab6e016de6f6ac4d3f0e9487f,2025-03-10T19:15:37.960000 CVE-2024-4418,0,0,3c06db20d6f1d09e33f3b0bdaf6cae857194aef327226f05897e6eec0e0197ea,2024-11-21T09:42:47.483000 CVE-2024-44180,0,0,a2247dacac4bd0388809af309fed3d0b9db77eee1ff7dcb46382a6a016edec7a,2024-09-24T19:04:17.890000 CVE-2024-44181,0,0,6d28050393eadf03569f8e946e89b01b126b14e424563728581983befe65d626,2024-09-24T18:39:12.733000 @@ -267296,7 +267296,7 @@ CVE-2024-44189,0,0,74bae7e0ea0e127ff0dd8bcfea5ffa0e13e07892dd1a7bf2df17de4205cd8 CVE-2024-4419,0,0,ba2477d3286ec6ab4ab62bfd9b86b02d79b23b6497b6c9703950ad337d472a29,2024-11-21T09:42:47.617000 CVE-2024-44190,0,0,ec036b1f60dea569eef287561200a33a41aeefcf64eef3b61618ae6ebfbc5800,2024-09-24T18:02:25.313000 CVE-2024-44191,0,0,d240f1b8433a5ce6dbe87e65698049b28e8c35859d01c776684fda07dd899ed0,2024-12-02T15:00:03.333000 -CVE-2024-44192,1,1,a65508e33916ca678af577c7aa7ef55b7cc3c8e543f48c093bc860c047a01f5c,2025-03-10T19:15:38.080000 +CVE-2024-44192,0,0,a65508e33916ca678af577c7aa7ef55b7cc3c8e543f48c093bc860c047a01f5c,2025-03-10T19:15:38.080000 CVE-2024-44193,0,0,e8cd317fa1c1f489397fd49c4be8f85204f966e9fa00998149de32c25c4e3ea8,2024-12-11T02:53:58.413000 CVE-2024-44194,0,0,789113f0658a6ddde1f6417d93be90ede379c24f3199a65cf3b83f7069f1c9c3,2024-12-06T15:15:08.690000 CVE-2024-44195,0,0,793ae5f7226dd15cb3926acd88ee4934145dd1a5d78b00b744cd556289693063,2025-01-23T20:38:14.517000 @@ -267326,7 +267326,7 @@ CVE-2024-44222,0,0,73a3c689e7090451963deac3a94c7bd82e8f2ad14cb50c55b40009dcf9370 CVE-2024-44223,0,0,e7c24ca22da306873e19ce1beaefb0f8a859aa352b193df7d6f03bb6b9e568ac,2025-01-06T13:38:02.493000 CVE-2024-44224,0,0,d84e8efd72c988effe9ed335d10230fb30a5bb6791d136b0cee7bff3626fafa4,2024-12-20T19:15:06.757000 CVE-2024-44225,0,0,bebf76d665c6ac22f676be1b98259b9a9d870957d2984f48dd9ae887f391c1cd,2024-12-20T19:15:06.937000 -CVE-2024-44227,1,1,688a6229a0be6b2464ec446851c59936134831e22a32b96c1917aa3177fa53c4,2025-03-10T19:15:38.187000 +CVE-2024-44227,0,0,688a6229a0be6b2464ec446851c59936134831e22a32b96c1917aa3177fa53c4,2025-03-10T19:15:38.187000 CVE-2024-44228,0,0,233a9fa817aba532dc55e3bf55f1e7e1e04a30b62b44a655772ef05440625188,2024-10-30T20:35:27.570000 CVE-2024-44229,0,0,79811515ccef73d41159136745a09e4e9b2ae027bbfa748a8533cf5125c53ff1,2024-10-29T23:15:03.437000 CVE-2024-4423,0,0,904bfc58b1909282d82661cafb70a1a74dc795b741ee1a78c704e0498aedee0e,2024-11-21T09:42:47.973000 @@ -270332,7 +270332,7 @@ CVE-2024-48845,0,0,857f78a832caa017ef878dfef403b14f26fbf7efc5e1c67ee960aa7d3092b CVE-2024-48846,0,0,51afde21886e5f56a9a3629698778341606628c345447801ea3ddeaf37e91512,2025-02-27T15:45:57.977000 CVE-2024-48847,0,0,a822b137fef1fff60ee1d27dd2eb6fdc75846a7dc5d0d2021e0e3c401ab49e18,2025-02-27T15:45:57.977000 CVE-2024-48849,0,0,fd3e8ed6978571ad86ae5ba997c11a31bbd23eae3890b14e5c287c90b96b0482,2025-01-29T19:15:18.547000 -CVE-2024-4885,0,0,21797cc64aedc93b02b5b229eaf54af1f7c9fa1facc1df7e5a032ec2a77520b9,2025-03-04T02:00:01.987000 +CVE-2024-4885,0,1,617d9649467aef323c74e37ff2643e1496c65f66e83bb5d23af661c7302f090c,2025-03-10T20:24:16.363000 CVE-2024-48852,0,0,30427ab7c643976d46e60ad759beb23222df1040ecb326b48277a708fdeb234f,2025-01-29T19:15:18.720000 CVE-2024-48854,0,0,84036c75cd3838b5b292f21cf5425d491da03d6238f78579c542dad27dcd7589,2025-01-21T18:07:08.960000 CVE-2024-48855,0,0,5bf8afe0e102f23f010396835dba19dff569ccf97c0fb49542dce44c445f45ae,2025-01-21T18:07:12.777000 @@ -271597,7 +271597,7 @@ CVE-2024-50299,0,0,0c281bf670f28202ecab6b493ed49cc5ea5a6c8ca6e18d28c043e1650410b CVE-2024-5030,0,0,d7a01f140218cc5d3b4d9bb19a90752f3ec5a691714edb3528e20e3690587947,2024-11-18T17:11:17.393000 CVE-2024-50300,0,0,7e61bc5452e3c6bf0816fa7f8abf13f64ca5a49dc8874af50150a20d37ed3a6f,2024-11-21T21:11:32.137000 CVE-2024-50301,0,0,7bf644bb8af063938e3e18dc42072a8ce6618f64a2658105524913b296306adf,2024-11-21T20:53:03.823000 -CVE-2024-50302,0,0,6a030282f4d61849e6392e1644f5568b4bdfbd5968406e9369851a6137e58404,2025-03-05T02:00:02.390000 +CVE-2024-50302,0,1,218f5451e25951a81c398705cbe3fcf7040b512b5c00b4346e3d846acafad777,2025-03-10T20:26:51.137000 CVE-2024-50303,0,0,bc6cc55b32c0f00ab508749d7c62fbc3dbe6ae3c9749209c3284b75426b67658,2024-11-27T21:29:30.267000 CVE-2024-50304,0,0,eeeaee5732dfb12e1aae063256882bc4dd20d6bc10a6f629b1d14550d165b8e7,2025-02-02T11:15:11.207000 CVE-2024-50305,0,0,50fd3aee61add01e589f37a9c6d29b7fd91b0375b90c41822a3e9396b3202d7a,2024-11-15T13:58:08.913000 @@ -271911,7 +271911,7 @@ CVE-2024-50614,0,0,29f22ac93163ff1303a42a1fec38fde0552d285d63129bbab00c726fede4a CVE-2024-50615,0,0,4d2a2e353be570a02fcdfff0b42fb37b106e2c1e8ab4e77f1c580e4daa183aa0,2024-10-30T20:35:37.310000 CVE-2024-50616,0,0,f16f40ce12577bc20e6d17ff8fa15bd5a1f69a543581dc34546ce7e8ac77217c,2024-10-30T20:35:38.380000 CVE-2024-5062,0,0,cdc86dcd84c87200c0328afbc0b136b026f9aaa280f8620d87cfe6bc9e21b227,2024-11-21T09:46:53.077000 -CVE-2024-50623,0,0,27494f1797b7bdeb5bac1184b037f385fc45a092b1f9da578da83ae1c13ad739,2024-12-23T06:15:06.357000 +CVE-2024-50623,0,1,689897be2bf1eff885c220c68e780397d6277f6ae7515a9445eacbcffea8a3fc,2025-03-10T20:25:14.940000 CVE-2024-50624,0,0,425b4912ca74d0f19519cece63451f565c900b6a769644536a74ca4edcfab020,2024-10-30T21:35:12.223000 CVE-2024-50625,0,0,600a63b94c23d23207c426e1e43b071296b787357ca99d17c5661761f04e2a95,2024-12-12T02:06:32.647000 CVE-2024-50626,0,0,ee346cb1a02e9d6ceaf318c396c6bbfc04e63993edcd6528fb39c33b5fb34c43,2024-12-12T02:06:32.817000 @@ -274596,16 +274596,16 @@ CVE-2024-54458,0,0,8fc0df2345a7e6034fc72b73cdebe291a1dfcd54de4856cdb09ddc6c6a5be CVE-2024-54460,0,0,46a2824e2a284b445162d596321895979fee49d319c455c9a3391c11ac25744d,2025-01-16T15:15:42.083000 CVE-2024-54461,0,0,72c05671de4a0e136e4c9486cbf32b3b7e34b7b81340b6a0dce106246fe274d9,2025-01-29T12:15:28.437000 CVE-2024-54462,0,0,e1698ea74ad0ed475034f1d0c870c2ebf625a89380bf2b138238c5653992a491,2025-01-29T12:15:28.627000 -CVE-2024-54463,1,1,69fcf312fe9be708ced913a93142d2cf2ec0a4c529e733d74949a23e79beb19a,2025-03-10T19:15:38.290000 +CVE-2024-54463,0,0,69fcf312fe9be708ced913a93142d2cf2ec0a4c529e733d74949a23e79beb19a,2025-03-10T19:15:38.290000 CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61a99,2024-12-16T18:15:11.023000 CVE-2024-54466,0,0,cde2c633b064403c3330cf4e329fab2afdda24c70189b50f9e401743db80aa51,2024-12-18T17:59:28.667000 -CVE-2024-54467,1,1,82eca1b40ada26106cfa7e59bfa978740bb5f55bb34ff59e5c1afc674af11938,2025-03-10T19:15:38.387000 +CVE-2024-54467,0,0,82eca1b40ada26106cfa7e59bfa978740bb5f55bb34ff59e5c1afc674af11938,2025-03-10T19:15:38.387000 CVE-2024-54468,0,0,a830975289ea24b4b020a52bcfcc38a9f682d3ea938ccb481221a83a22c3f0ba,2025-03-03T22:45:38.540000 -CVE-2024-54469,1,1,4e760dca4376bf64d9f2986d2f1ef7bec295203a0efd3d37b57656a39bcbfbff,2025-03-10T19:15:38.493000 +CVE-2024-54469,0,0,4e760dca4376bf64d9f2986d2f1ef7bec295203a0efd3d37b57656a39bcbfbff,2025-03-10T19:15:38.493000 CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000 CVE-2024-54470,0,0,fe219ee429ae9d3c4f4ad02abbcafd7f018f3e8df8603d9d5274597d26ba2e87,2025-01-16T17:15:12.433000 CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000 -CVE-2024-54473,1,1,304e836f8d4cc8cc4b6bf28c90e798400bbdf32f3b68fe0da887f4773dd8fb17,2025-03-10T19:15:38.600000 +CVE-2024-54473,0,0,304e836f8d4cc8cc4b6bf28c90e798400bbdf32f3b68fe0da887f4773dd8fb17,2025-03-10T19:15:38.600000 CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000 CVE-2024-54475,0,0,a64bd081c6112afb87121e755186f1170b928c354a4f743bbaba93305cdbdc46,2025-03-03T22:45:38.540000 CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000 @@ -274671,15 +274671,15 @@ CVE-2024-54540,0,0,393848985c31197409a0b6a6ff13f35ecf9e93fddbbd73bfb784c7f01cc31 CVE-2024-54541,0,0,9eb31cc1d58cfd2315f407b93bc0d1327da0fa870162c87480c553f25ee2693e,2025-01-30T17:31:31.880000 CVE-2024-54542,0,0,af0e4b80c4d917d18f55501de0ce4e65090062287609088843853591c52fc5e2,2025-02-18T20:15:22.007000 CVE-2024-54543,0,0,603876c5dd2c62a2a366bc570ded9afb84d36803ecff2c07cec2b1684773ae76,2025-02-05T16:15:41.137000 -CVE-2024-54546,1,1,9bb3efd3c7bc71d609945fcd78a9fe90ae03f8c5572866842e9f52d00f7720e5,2025-03-10T19:15:38.697000 +CVE-2024-54546,0,0,9bb3efd3c7bc71d609945fcd78a9fe90ae03f8c5572866842e9f52d00f7720e5,2025-03-10T19:15:38.697000 CVE-2024-54547,0,0,a618dc80c063ba06842a7d3f6b960a332bab473379d1eeed9cc28ea9a9897404,2025-02-18T20:15:22.093000 CVE-2024-54549,0,0,17fa8e8a740280ca6b3bfe83e25cd01c11c70fd2adb30c1c3ea7762350a07beb,2025-02-04T22:15:41.357000 CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000 CVE-2024-54550,0,0,37e7e19b86f585f36721504b7c8a72258806c5ed7bd0186e279c332d1969c1cc,2025-02-18T20:15:22.183000 CVE-2024-54557,0,0,3d0baeae19a93d052c3842b20411bb1817950b16584194ccb52fef0fc3d214c6,2025-01-31T22:15:10.300000 -CVE-2024-54558,1,1,e3c5d62d7e275cf6a62c99c82c97807831a71ee650a5a0aefd97f6ce300bb30e,2025-03-10T19:15:38.790000 +CVE-2024-54558,0,0,e3c5d62d7e275cf6a62c99c82c97807831a71ee650a5a0aefd97f6ce300bb30e,2025-03-10T19:15:38.790000 CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000 -CVE-2024-54560,1,1,37d4be383b235d8334353bd9ec26340c9800fe3298056531158b97c0a724ed99,2025-03-10T19:15:38.883000 +CVE-2024-54560,0,0,37d4be383b235d8334353bd9ec26340c9800fe3298056531158b97c0a724ed99,2025-03-10T19:15:38.883000 CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000 CVE-2024-5458,0,0,8dbafb99fb85c57a2766bb8c0351967563ad88f8cfa7b660abd7c7ec5db25669,2024-11-21T09:47:43.413000 CVE-2024-5459,0,0,b7a22fae8a0174b7cca0e1147f2ed714677dfde4089a65746f06fba0f29d7308,2024-11-21T09:47:43.570000 @@ -274990,7 +274990,7 @@ CVE-2024-55578,0,0,5c3fcc77d09324042ddbdfd728ad5e7386e7d5896fd6497db19ee19fc8c81 CVE-2024-55579,0,0,eb7b97c3360bce570eb740843f88f428eb8ed07ac934bdc24aaa75a35aac660f,2024-12-10T15:15:08.163000 CVE-2024-5558,0,0,27c470fd7893b831fc84cdde276205428cb613b4f465921ca99eb64316442434,2024-11-21T09:47:55.700000 CVE-2024-55580,0,0,d0db8db8caa9064b5ccfd1ebfcb70a56a05a77720b165abb2a708efdd1b5b12c,2024-12-10T15:15:08.300000 -CVE-2024-55581,0,1,f83eba0d1d57dfb0b5f6cd13deb2e137852fa318e3bfeae6027001cd985f5d58,2025-03-10T20:15:13.987000 +CVE-2024-55581,0,0,f83eba0d1d57dfb0b5f6cd13deb2e137852fa318e3bfeae6027001cd985f5d58,2025-03-10T20:15:13.987000 CVE-2024-55582,0,0,8c7e64bb3acec7a473c6e65040db0fdec814405cb32a2dc0c98b336fe36f3523,2024-12-11T17:15:21.103000 CVE-2024-55586,0,0,925f554fe1c6418481a3cd536be7ee8d09491d59c7f2a3844aeb8009a61c81a3,2024-12-12T02:08:22.247000 CVE-2024-55587,0,0,043360c021c66dd2c5a5e7aa976c02dd7134a3fcd9d370dcc05a2b2b78d778ba,2024-12-12T17:15:11.197000 @@ -275273,12 +275273,14 @@ CVE-2024-56175,0,0,22a48fcf93fd39d784b2031be3d0660428d6c59d54d025f00f9098a9f5f61 CVE-2024-56178,0,0,9564968521bb8f5c11b766d9cc78936576e1fac39bcc14d058711ca02bbf4325,2025-01-28T20:15:51.173000 CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000 CVE-2024-56180,0,0,9a461075be1a2eaf70b03c0f7152f850619b8e5d7322fa7b2ca03c910642bb05,2025-02-18T15:15:16.500000 -CVE-2024-56184,1,1,8f6f696205dd460cbdcf502fb64e8d4befa7f056f75ba122cd18b0c1c4f5e809,2025-03-10T19:15:38.983000 -CVE-2024-56185,1,1,c37fdf659e7c39460f1175db12112f73d7afc802c2a6cae80fe038b7827dd84a,2025-03-10T19:15:39.097000 -CVE-2024-56186,1,1,11acf8f0bb70b3cccc707a3cc5eb1a912874cf4eafd524c30fe5c9098b6f8e82,2025-03-10T19:15:39.193000 -CVE-2024-56187,1,1,3639156078a5c2d713cc91bc8115385316c6106e48fedf60d31f8c65ed6c2f1b,2025-03-10T19:15:39.293000 -CVE-2024-56188,1,1,754dcb051afab226439b896bcaffa6c79155d464519b66818e7a589f41414022,2025-03-10T19:15:39.393000 +CVE-2024-56184,0,0,8f6f696205dd460cbdcf502fb64e8d4befa7f056f75ba122cd18b0c1c4f5e809,2025-03-10T19:15:38.983000 +CVE-2024-56185,0,0,c37fdf659e7c39460f1175db12112f73d7afc802c2a6cae80fe038b7827dd84a,2025-03-10T19:15:39.097000 +CVE-2024-56186,0,0,11acf8f0bb70b3cccc707a3cc5eb1a912874cf4eafd524c30fe5c9098b6f8e82,2025-03-10T19:15:39.193000 +CVE-2024-56187,0,0,3639156078a5c2d713cc91bc8115385316c6106e48fedf60d31f8c65ed6c2f1b,2025-03-10T19:15:39.293000 +CVE-2024-56188,0,0,754dcb051afab226439b896bcaffa6c79155d464519b66818e7a589f41414022,2025-03-10T19:15:39.393000 CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000 +CVE-2024-56191,1,1,6d6e439309f911cd89fe05c483aed2c6456da3b34def44a970c450b01f649a66,2025-03-10T21:15:39.880000 +CVE-2024-56192,1,1,c70740ec10129faece240e224a1d2efd21b1913c8abf85f982388ad67961b19e,2025-03-10T21:15:40.007000 CVE-2024-56195,0,0,17e80087440c26a48bf26150f466408464e462d5b44a69d93d4cf901c8b8922b,2025-03-06T16:15:49.230000 CVE-2024-56196,0,0,12fd90de17993bd12dfedd30b7f3bb5633be1f20034d52a88794197505bacdce,2025-03-06T16:15:49.637000 CVE-2024-56197,0,0,e9afd498035eec9eafab8200bca26d2809dec4007383a3f79e63ae62a3cb2cb9,2025-02-04T21:15:27.260000 @@ -280538,7 +280540,7 @@ CVE-2025-0590,0,0,d81cd8b36faa71d41ba820106853d8f1ea4eee3f00df9dab8137d82c49b237 CVE-2025-0591,0,0,31743e528b9642b20d256fb46c14cc7ce872bd582fcdb63a43f5e161426dc8af,2025-02-17T00:15:08.987000 CVE-2025-0592,0,0,92924626baecbab996d0e97311af8c1852928a73cb5e120c4713cb77cb4e663d,2025-02-14T21:15:16.543000 CVE-2025-0593,0,0,f384bb5183fd52ec3bc21aa2809ce1a4d509fdefca6b18add8a3ba9e9b530a58,2025-02-14T21:15:16.680000 -CVE-2025-0604,0,1,11b5fa64e0c44fc853249fe566d1ae9520d7be28da05402f93563e9d23c37605,2025-03-10T19:15:39.487000 +CVE-2025-0604,0,0,11b5fa64e0c44fc853249fe566d1ae9520d7be28da05402f93563e9d23c37605,2025-03-10T19:15:39.487000 CVE-2025-0611,0,0,d5c9360fc3080a3bf40a56d9e6161f43213715b53cd2c1f914a2626e9581bcd4,2025-02-06T22:15:40.053000 CVE-2025-0612,0,0,7ea4d4aa25f622741c89c8921e9bef8da99d00f4284523c951843203c8182c72,2025-02-04T19:15:32.720000 CVE-2025-0614,0,0,35aebd2508e8a73e5890659bb27b5833c263157a992866f88cfa4a06211488f5,2025-01-21T12:15:27.580000 @@ -280560,6 +280562,7 @@ CVE-2025-0648,0,0,14768df502506893e04a871405a68a3a94ff0c449b83e66c30586b78c50c67 CVE-2025-0650,0,0,a9fc324c64dd82aee521d1bffa9b7782cf03bd2f6e410628d7018de6f1170f96,2025-02-06T09:15:11.697000 CVE-2025-0651,0,0,b1abaff9b79f4b2065b368c16dba6244d38fea5352b0c15967b39f4433b66d5f,2025-01-22T18:15:20.363000 CVE-2025-0659,0,0,4fe159addabb5574c2c2f98c745f6aab39810c9877de9d524c91d168b8982ca8,2025-01-28T16:15:40.360000 +CVE-2025-0660,1,1,3a4d6510135489f4adf6e8747676d8ea99f497e471f9b966380a3cb7ef6f73d2,2025-03-10T21:15:40.110000 CVE-2025-0661,0,0,b1e3b3e01aec6a0429d6cfbed29279169cf9ca980f886cdc2d225d4899ed12e8,2025-02-24T17:10:16.007000 CVE-2025-0662,0,0,33daf52cdf419d482596718a6ca1d8792f8f25da15f58b8337c49907fcbd7414,2025-02-07T17:15:31.157000 CVE-2025-0665,0,0,8a61fbb47215c485ccfd4b2365ef7f5f454b101245ea0ea879ec01e25fde9fc3,2025-03-07T01:15:12.293000 @@ -280784,7 +280787,7 @@ CVE-2025-1011,0,0,c7aab2f6a9c0415627154b90d3f96ebb209e4ddce064fa55ea39e2629e66c9 CVE-2025-1012,0,0,7b0c4ab0855cffefa552cdbb9537cf53fcf1593bbc730581babeb8c5fa1ab156,2025-02-06T19:33:46.407000 CVE-2025-1013,0,0,651300f5a902e2a90163edfab2155a83dd0507c6882d48dd9ffa23457be2f8b0,2025-02-04T22:15:41.743000 CVE-2025-1014,0,0,c6156421e09c044512d56480035ada4fc6ec0f71d0de078370b84abda2b3d73f,2025-02-06T21:15:22.397000 -CVE-2025-1015,0,1,c0fb0efc7bcd0a499f759d56d25d3e4c19351e1b390774630a281c721e58035d,2025-03-10T19:15:39.590000 +CVE-2025-1015,0,0,c0fb0efc7bcd0a499f759d56d25d3e4c19351e1b390774630a281c721e58035d,2025-03-10T19:15:39.590000 CVE-2025-1016,0,0,2e0db284a246d9cb5702937ac7dbd1f00f468e9b4a4a58c00bbc39db26d0ee7b,2025-02-06T21:15:22.560000 CVE-2025-1017,0,0,bd3fa4a4136a68bd2fd99ce26d51913b65870c34b7ef3850591eced198182568,2025-02-06T21:15:22.760000 CVE-2025-1018,0,0,2c63b770ee1eb8404a9ddd357bafe82e637b324657da1135e622c93e59b669ec,2025-02-06T19:40:01.263000 @@ -281016,7 +281019,7 @@ CVE-2025-1387,0,0,b80cfff8816a5a4c7344419c24985cf6849d91e56da599c269854d931b9368 CVE-2025-1388,0,0,8e601c55f63d7c4a99175dca26ea6e765f5666baba3a63fcb66bd4e1e37a8c84,2025-02-17T04:15:08.960000 CVE-2025-1389,0,0,795a35efe21e6a34ebaee5d031621504f5de1cd150eb87bc8f92558df8e46474,2025-02-17T05:15:10.317000 CVE-2025-1390,0,0,4fc86a10da8dd3f0a18ea2e30ae82e3cb10771daa7275bed87235a02cfa82a05,2025-02-18T03:15:10.447000 -CVE-2025-1391,0,1,92923563d5f6ebe7489c1cf297a79c50e1a9d080a96d841d79358c408c639ed2,2025-03-10T19:15:39.860000 +CVE-2025-1391,0,0,92923563d5f6ebe7489c1cf297a79c50e1a9d080a96d841d79358c408c639ed2,2025-03-10T19:15:39.860000 CVE-2025-1392,0,0,f08bbb9b69f485fd54fc78272460b890a55805f93dc93ed202a1f5ce9ea26d62,2025-02-17T16:15:16.120000 CVE-2025-1393,0,0,3159a68724e79b452459f4be37f745c49bffd3a249ca4341751e3e0030245eee,2025-03-05T08:15:35.107000 CVE-2025-1402,0,0,c23c451cfa1d570fb16b3d38ae224aa085b42cdb084d4b1dbd67b0732fd42aba,2025-02-25T04:04:59.860000 @@ -281278,6 +281281,7 @@ CVE-2025-1916,0,0,62cbf7d0baf3b65340e1dd71d636637dffa9fe88a30cf5f1b31df7c201565e CVE-2025-1917,0,0,a45aaaab45a99ee616555c7303ae35fa5deaa8caf5cbc67c816a0b6730fb0cec,2025-03-05T15:15:16.067000 CVE-2025-1918,0,0,0b969e174274812299d3170aab0162f6660668a900b37b5060bb255adfce2bba,2025-03-05T15:15:16.223000 CVE-2025-1919,0,0,fdbf01b21cd0a0a7341c004e74c5a0f8896d5fa9b9090a1373c391c776ac0904,2025-03-05T15:15:16.383000 +CVE-2025-1920,1,1,a0d0c9fb951cf98495373119c44fed133186b818c653aa305539ce35dd9f9779,2025-03-10T21:15:40.280000 CVE-2025-1921,0,0,52bb07cc9f6cf05de10de265c3df2b2725a17528bd0219c2e259fa5ff16cca5e,2025-03-05T15:15:16.537000 CVE-2025-1922,0,0,de1e1ca67fdc901d18061c6676a386188acf9c3e5652956afbc8bfc4df588be3,2025-03-05T15:15:16.700000 CVE-2025-1923,0,0,fb6bb796e915c4eb19c73c083cba3d2b11c3c2b6d1b2cce8fa809b77f776c071,2025-03-05T15:15:16.857000 @@ -281743,6 +281747,7 @@ CVE-2025-21346,0,0,6da1a91fd51d1c7f9efc77c3676ffc0110c4bfd2b3a26770e9ad9795c951b CVE-2025-21347,0,0,8cfce27db856ce3eff69887f010f026ad9562bd729925a63d44c80288ecaad45,2025-02-28T16:02:50.353000 CVE-2025-21348,0,0,36348027e40942c567c69f35820a402c8269c98d7a09f418c29d2484864f7193,2025-01-21T19:30:06.410000 CVE-2025-21349,0,0,db46bd1602eca8cc8efcbc08138ac4fee6a0023cf9b4457ce7e79e213146e7e0,2025-02-28T16:02:50.353000 +CVE-2025-2135,1,1,058838e592421d8b6728ed0a278da453199aa29ff40fb15b025017a98dc3d7f3,2025-03-10T21:15:40.613000 CVE-2025-21350,0,0,946270e0dd658c25e6baa6b79bc8dec8ca08afc3ec5969e08e7326bdd4ced332,2025-02-28T16:02:50.353000 CVE-2025-21351,0,0,a8cc52c1540160220e99bf210dd11c147b7b880231f4989a6829acfc1674ce66,2025-02-14T22:58:21.470000 CVE-2025-21352,0,0,0ba629188bae210f91f5419cfa07cb82a22f183de23a9ab56a9d3d4e6fb7c03d,2025-02-14T22:55:17.187000 @@ -281752,6 +281757,7 @@ CVE-2025-21356,0,0,f7ea5cba60a230879dca18c3ee9d0c02c15b08e12f56fbab6a571232794a0 CVE-2025-21357,0,0,f113e4301bd00fab146fb1b2c2663099f0920807897ab88a84dd70d6d7ccbaa8,2025-01-21T19:40:05.823000 CVE-2025-21358,0,0,dab5145a40f866bd6dc784e58f5b52a4233c1ecc2ba83c4c10bd60eb1e0cf109,2025-02-14T22:53:11.470000 CVE-2025-21359,0,0,b08a0e3b95bd80411438de60c10b9f10ab424a6c433a2a5fc5fbadceddca0f2d,2025-02-14T22:50:04.610000 +CVE-2025-2136,1,1,6f7b0d27733ecd5995b75026a215f5a404b68c1ef1ebb012b469dc667f933f0e,2025-03-10T21:15:40.730000 CVE-2025-21360,0,0,1b890933152e0ad6c56f74976ff5f8eaba0ff19a3ed4db064fae08186acb8dc8,2025-01-17T20:40:22.527000 CVE-2025-21361,0,0,15333b9f9e4e095e5eb0227b45a3d79a56875bc396c0df556b7a044756c81d2f,2025-01-17T20:39:49.017000 CVE-2025-21362,0,0,2902d63a2e75a1ecbc123770588d73eec93458274a31a234a8cbf1bc4f8d0b31,2025-01-17T20:38:30.560000 @@ -281762,6 +281768,7 @@ CVE-2025-21366,0,0,a59588c0dfff3655b9552370538e4464b57213529c36230194728bdd056ea CVE-2025-21367,0,0,ee574f31e150644922f442d6f99c433b14b4fc5cc545ddcec754dd048735da70,2025-02-14T22:46:58.147000 CVE-2025-21368,0,0,6c0f601be861c16b3bf5acbace3cefe9363096c39f16a1f2cff45abb52cfb9f0,2025-02-26T15:23:31.897000 CVE-2025-21369,0,0,d0f7f9a542e9386cee8bc2fe054aad034a1d34994bfe93b9978ffac49c3bff63,2025-02-26T15:23:31.897000 +CVE-2025-2137,1,1,574f8116782e68fbf81613d426d526d5951a69f54af0f3511fb6eb1e9bdb0a9c,2025-03-10T21:15:40.857000 CVE-2025-21370,0,0,4f2d9ad677d80f1448cc8df24916a78dc10d6e491dbdc144c8692d9ee5b64fb9,2025-01-17T15:33:41.967000 CVE-2025-21371,0,0,f41819969d65dc6998fb17f05a6a2ed4a10ad2f05a6bab1e2a1104b97d6ce0fd,2025-03-03T22:15:37.820000 CVE-2025-21372,0,0,3a043b222986f0210a248c5eb2603857944565822a2729da3fb2f989508cf536,2025-01-17T15:36:24.423000 @@ -282398,7 +282405,7 @@ CVE-2025-22599,0,0,1679c6ac5484b7793289eabf6194cbd25427299caec44c6a27aa8b57d1a02 CVE-2025-22600,0,0,f110ec74413c49b371a01e714512d4c9c7c3871d9aa7d096e2f2f2161dd61f8a,2025-01-10T16:15:30.940000 CVE-2025-22601,0,0,e5a036684b4e6e1204af1b20135d30f3904e4c5af4a80eedecb01794128ea749,2025-02-04T21:15:27.800000 CVE-2025-22602,0,0,c8f7aea9374385130d2049dfea6e2ee228c262f087909008185d3a99dec96d21,2025-02-04T21:15:27.950000 -CVE-2025-22603,1,1,e02b821a7b43af142b67dcb984d912792b271a05001313a5778b74f75a874a9d,2025-03-10T19:15:39.970000 +CVE-2025-22603,0,0,e02b821a7b43af142b67dcb984d912792b271a05001313a5778b74f75a874a9d,2025-03-10T19:15:39.970000 CVE-2025-22604,0,0,e77b02e1f62ca8c90b9aef1da0c6c55d8a3e02e8a7f5ed82d610d0ba53646361,2025-03-04T14:45:17.807000 CVE-2025-22605,0,0,e020c4b8ee74d3a7b5ae92905dc162b067bc2ecec9d0c7b4511ad2cc05d6d46e,2025-01-24T15:15:12.330000 CVE-2025-22606,0,0,6897f6b106e13df92057dcf3df4b4ec47dbbfa122118bcfc3d42e2e512504801,2025-01-24T16:15:38.307000 @@ -283711,7 +283718,7 @@ CVE-2025-24807,0,0,a9342833f23aca9efb5658eaedc615b0791a1b8d97d1be177e79dcc0108d2 CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867e23,2025-01-28T05:15:11.413000 CVE-2025-24811,0,0,2da7e99907675b0c3b84fff601eb43c4c4c27c662d95c7205901bce5bb8705d8,2025-02-11T11:15:16.907000 CVE-2025-24812,0,0,3542fd62679fcd1754aabe0f38d924c5bd34578dfc13aa46aeaa150dd810a16a,2025-02-11T11:15:17.080000 -CVE-2025-24813,0,1,72aeb96a70e6c87f11d8b70df499c8832a593f0da0714e2708f36c7bd578eb58,2025-03-10T19:15:40.123000 +CVE-2025-24813,0,0,72aeb96a70e6c87f11d8b70df499c8832a593f0da0714e2708f36c7bd578eb58,2025-03-10T19:15:40.123000 CVE-2025-24814,0,0,778c51f4f444afc315901ebeb1d1515ad066d9ae9182f0d62b926c00ff924803,2025-02-15T01:15:11.157000 CVE-2025-24826,0,0,afc4a3c6aa0e8288830e8c91cc81c25b8636a1b49a80120ea49c59c3d903f3ac,2025-01-28T21:15:18.817000 CVE-2025-24827,0,0,9def413bdd8ee8b51fbd9a0d5033d038fbca6373f01b1c0b3f27d7c9c702b649,2025-02-18T19:15:27.587000 @@ -283952,7 +283959,7 @@ CVE-2025-25302,0,0,c00a60e460c085bc6071f27703e95f8cb2f218886d77664be4a3a5d8bb045 CVE-2025-25303,0,0,8087be36edeb3ab573dca03ab7057565aee5eccfb2b150643eefa5418be83c63,2025-03-03T17:15:15.073000 CVE-2025-25304,0,0,7deb89a558ae2974a24d9b6d35c21d12df30c14623e00d1a3e10b48167354c5e,2025-02-14T20:15:36.903000 CVE-2025-25305,0,0,f9de35ea3a1d1f816c6badb532d5c4e886ee750e6a306cd0122b4c0858013f3f,2025-02-18T19:15:29.083000 -CVE-2025-25306,1,1,266c3bc8e39aca90616fb10b87b722dbc75ab7ee9af63d373d4c2b5479d4e2d6,2025-03-10T19:15:40.230000 +CVE-2025-25306,0,0,266c3bc8e39aca90616fb10b87b722dbc75ab7ee9af63d373d4c2b5479d4e2d6,2025-03-10T19:15:40.230000 CVE-2025-25323,0,0,5f6bd7010a898a73be4f0d89a8bf4eb9d634056c62096bd3ccd537e03cf653ed,2025-02-28T16:15:38.153000 CVE-2025-25324,0,0,10b5e56d5c4fef0fd94ff417565d1842ebba06a2cb1e43a67f1d659dbc38824a,2025-02-28T16:15:38.307000 CVE-2025-25325,0,0,199803a0e51b1376c31d6c016e0d2871bebff8e1307a37a1fcc1d818a404f722,2025-02-28T16:15:38.457000 @@ -284026,11 +284033,11 @@ CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d30 CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000 CVE-2025-25609,0,0,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000 CVE-2025-25610,0,0,fe8057df3f08f41d60fe1ebc6a06e1b6051f3d9bb1f1a3b3ed10e5a9eef74dbc,2025-03-05T16:15:39.623000 -CVE-2025-25614,0,1,03a1628a93d71e2397dcb6c3721d2be49a1a0063c0ed362c346e24f4ddaaf8b7,2025-03-10T20:15:14.280000 +CVE-2025-25614,0,0,03a1628a93d71e2397dcb6c3721d2be49a1a0063c0ed362c346e24f4ddaaf8b7,2025-03-10T20:15:14.280000 CVE-2025-25615,0,0,986bdae7b0adb7aed092d2b5d085e2ba1027ce1007b67de14c453c095ac6733a,2025-03-10T14:15:24.960000 CVE-2025-25616,0,0,ea666550f20d27aba2fe037670d1f7afca9196f806e53b0b714782b8fa677d6a,2025-03-10T14:15:25.097000 CVE-2025-25617,0,0,aadd1592880ad6d511d461bb2e93fc58cd011b7a0023bcbd3ae23df0a4c6c5a8,2025-03-07T18:15:47.840000 -CVE-2025-25620,0,1,1205eefd0528c936e3ebbd6ac29c3db7bb0c99b1253ae44cf7a8d8848b7b0308,2025-03-10T19:15:40.393000 +CVE-2025-25620,0,0,1205eefd0528c936e3ebbd6ac29c3db7bb0c99b1253ae44cf7a8d8848b7b0308,2025-03-10T19:15:40.393000 CVE-2025-25632,0,0,fc07c1c8054a4d9104d3986b5c4aae35472ab79903ea3550918ece4e63e78a9f,2025-03-06T15:15:17.770000 CVE-2025-25634,0,0,c65724cf9c9f8a6f5918311d4cf2659bb1ddbd0a8ea6bef01873f68d34182505,2025-03-06T22:15:35.290000 CVE-2025-25635,0,0,0db247b70226e51b14344c6fcb3514df042659a07d0da107baaaba8517f711fd,2025-03-05T16:15:39.793000 @@ -284104,6 +284111,8 @@ CVE-2025-25898,0,0,04c24c833076238e0492d1c61fe2318923b61fe34c2d487dd0ee957f99c08 CVE-2025-25899,0,0,0a94e1ac94f2348ced8620095f1a1cdbc8d00da1d929db972e382fd33828a613,2025-02-13T20:15:49.913000 CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03dec,2025-02-13T16:16:50.037000 CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000 +CVE-2025-25907,1,1,e5237174c73183bb9c4faed1ab9448b1c1549126d28490fd2a4de3eda386c7ec,2025-03-10T22:15:26.533000 +CVE-2025-25908,1,1,27b564080d99cedf990d09d8e4212c143da715fb09167f046532fc22ff354cc0,2025-03-10T22:15:27.150000 CVE-2025-25916,0,0,91ba974117f22dab8d3678a8beecd3ea90efc52e588600708e1af441e5e35add,2025-02-28T16:15:39.867000 CVE-2025-25939,0,0,7dbd849d533c834d2205e6078f0487c45587eccd9cff67e78aa1acfe6cb8ca0d,2025-03-06T12:21:35.360000 CVE-2025-25940,0,0,f334f2d66750e54c404e803d4cea64ae4d9a0e34417258e5cbd6420f47db59a8,2025-03-10T16:15:13.520000 @@ -284299,8 +284308,8 @@ CVE-2025-26622,0,0,c1b7d21410dfbb6fcbf2a06b2b329547947b3063e917e17430eb0992177b0 CVE-2025-26623,0,0,d192a090780b2dcdc669e9e692f962aa45c7b001bdc2d92981daf17d836bb16f,2025-02-18T20:15:33.153000 CVE-2025-26624,0,0,933774cf8883da910c74db2937793adaa8c4da49496d875f26d7c862a7576875,2025-02-18T23:15:10.810000 CVE-2025-26643,0,0,2fdd3ead42b670e7e33c7c2f3b0e92746e3358911492be2252e618821cbc493a,2025-03-07T19:15:37.180000 -CVE-2025-26695,1,1,c6eed7f6dcf8d74bcbdaf5148c2f95c49bfc0eb871e72168d5fa03bd63ce6032,2025-03-10T19:15:40.567000 -CVE-2025-26696,1,1,ed34c27a9a2c2a385def969c8e6d8d8bba973273db11fc413b8c9eeee171cc25,2025-03-10T19:15:40.670000 +CVE-2025-26695,0,0,c6eed7f6dcf8d74bcbdaf5148c2f95c49bfc0eb871e72168d5fa03bd63ce6032,2025-03-10T19:15:40.567000 +CVE-2025-26696,0,0,ed34c27a9a2c2a385def969c8e6d8d8bba973273db11fc413b8c9eeee171cc25,2025-03-10T19:15:40.670000 CVE-2025-26698,0,0,02e1c85350f9590f950db8be3fe5f72c9485333903c0f224a4be86e1fd66bec5,2025-02-26T13:15:41.983000 CVE-2025-26699,0,0,87cf95ca9a4284692cb3c070ce904e940ed4f976fad521177b72ff58a22d0261,2025-03-06T19:15:27.683000 CVE-2025-26700,0,0,6e3b394d53337ab4fe903b88ec563a5f9fa1519ac62684b203abb3bd4f953337,2025-02-17T03:15:09.750000 @@ -284444,7 +284453,7 @@ CVE-2025-27112,0,0,ad3bd22bf68a43e9ef7354153af5bf27543e71ad253b691f1b313d10f7020 CVE-2025-27113,0,0,0c2510791ac2acff399d905c10fa8f507294f3cb49dcdb258cd51fa637009d3b,2025-03-07T01:15:12.823000 CVE-2025-27133,0,0,bfde01faa06d9963c59eea543f4fa6168a24602a8639d07c356f8930ec6d4154,2025-02-28T16:07:41.847000 CVE-2025-27135,0,0,c70a322e27444296c26cd6106b31fd9aba6c1cddbfdd6c3a2a1f8979a39b788d,2025-02-25T19:15:15.677000 -CVE-2025-27136,1,1,b6c8eabc30ae3af9599a6fc890ae8d613bd7771786a491986d7f20a0a4503844,2025-03-10T19:15:40.770000 +CVE-2025-27136,0,0,b6c8eabc30ae3af9599a6fc890ae8d613bd7771786a491986d7f20a0a4503844,2025-03-10T19:15:40.770000 CVE-2025-27137,0,0,5824d60f023fc733adf708b73443cf5ddf0a1c321fa7b10d5058188a954ef313,2025-02-24T21:15:11.213000 CVE-2025-27139,0,0,2cb35550ba4d0a90ab72e4571ad148f33e854944ca8f8e710e17710ac500936e,2025-02-28T13:35:22.340000 CVE-2025-27140,0,0,d3c1009e4516057e75528f0ea0c1750c681f482aac5f8e727817e26f4972cc64,2025-02-28T16:07:41.847000 @@ -284584,13 +284593,13 @@ CVE-2025-27600,0,0,8b710cbe29c4262a75baeb6eae5e68d150a67d7271571cd258a60494511c3 CVE-2025-27603,0,0,f9c7ddeb8ce74cd54f0397839af1f26d47d617c308be8dcd0c12cfaac63eb48c,2025-03-07T18:15:48.293000 CVE-2025-27604,0,0,52aff360271261f8fa4246ad7435647d74e939ffea0a51055b3b8569444bea06,2025-03-07T17:15:22.290000 CVE-2025-27607,0,0,2a3ab37b8dc052c83770a9345ff1d91d3383eb713728d7b951bbcbdb63a1534a,2025-03-07T18:15:48.483000 -CVE-2025-27615,1,1,1d9b17fd6d1efa58df936827bdc2b29656e574c998ae5df70178cd728c98c177,2025-03-10T19:15:40.917000 -CVE-2025-27616,1,1,124b4c8a641b46285e5ff925029836649f77d1ae4fc7a43a77192949c8ad959b,2025-03-10T19:15:41.080000 +CVE-2025-27615,0,0,1d9b17fd6d1efa58df936827bdc2b29656e574c998ae5df70178cd728c98c177,2025-03-10T19:15:40.917000 +CVE-2025-27616,0,0,124b4c8a641b46285e5ff925029836649f77d1ae4fc7a43a77192949c8ad959b,2025-03-10T19:15:41.080000 CVE-2025-27622,0,0,aab424c81f70efb6c2294313600d100f64e720f683885d3b6918b7e0d0c95ce5,2025-03-06T17:15:23.497000 CVE-2025-27623,0,0,a7729605ea601dac947d3c9e9dda3f4cf0fc759f67e3d847999a08d4d426400f,2025-03-06T17:15:23.647000 CVE-2025-27624,0,0,386e769fd54c9c9e387001be90fa20a8140740d08fb61eb8c2dc8cbb750364f8,2025-03-06T17:15:23.797000 CVE-2025-27625,0,0,85889be78be476b146c5fda687cdd2b7a01a613eea674a60ada7a9651223e2d5,2025-03-06T17:15:23.960000 -CVE-2025-27636,0,1,6f0982eaa03c91e53a5974672e67fb384f05769dea0cfea98163b0cc00a8d575,2025-03-10T19:15:41.240000 +CVE-2025-27636,0,0,6f0982eaa03c91e53a5974672e67fb384f05769dea0cfea98163b0cc00a8d575,2025-03-10T19:15:41.240000 CVE-2025-27637,0,0,9c062615c8ec6a3ced4ee678ddb923b6d263f273f4e63f5f7bf9a46985accf21,2025-03-05T16:15:40.713000 CVE-2025-27638,0,0,799c839b25e9819e4ec80c30ab7682e659f557f1c902bc7211099cb508098b42,2025-03-05T17:15:16.853000 CVE-2025-27639,0,0,a0477d98f560583497b6432bc3e9038f2aa7b8df2110514ba2e616c075cb3f66,2025-03-05T17:15:17.027000 @@ -284650,4 +284659,5 @@ CVE-2025-27825,0,0,99e9b9d3befd54cbb55880416607fbc7e5d90c9fee9cdc2881cb2480979fe CVE-2025-27826,0,0,83fe28f5c1c38336a328c924367a016f575cf3bedee9c6070949943b515ded3d,2025-03-07T22:15:38.527000 CVE-2025-27839,0,0,212b3d30d2c1f53f372c7e143c6e03922deeb9da14f018db14d5749815db8000,2025-03-08T00:15:38.340000 CVE-2025-27840,0,0,31b43659fdf50a1c837def79b3ff8549c2485895c251972e0cf021cb5a031b4d,2025-03-10T14:15:25.943000 -CVE-2025-27913,1,1,6f0bd3601f96716de702de6a067ea8085488a5f63b84b8fb03e2b0e08a5595da,2025-03-10T20:15:14.500000 +CVE-2025-27910,1,1,563dfaf4a98237987ed986f935d53295ee6e1d7704cf33b760a3d1b009fcbb36,2025-03-10T22:15:27.287000 +CVE-2025-27913,0,1,e681422c2870f7557e227a904142f507f947df7c17e14a658700958ba9e15e29,2025-03-10T21:15:40.430000