Auto-Update: 2025-03-10T23:00:19.793525+00:00

This commit is contained in:
cad-safe-bot 2025-03-10 23:03:48 +00:00
parent cf757d9464
commit a62ee174e8
98 changed files with 5414 additions and 602 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49527",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:28.690",
"lastModified": "2025-02-26T07:01:28.690",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:16:33.907",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,158 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: venus: hfi: evitar la desreferencia nula en deinit Si venus_probe falla en pm_runtime_put_sync, la gesti\u00f3n de errores primero llama a hfi_destroy y luego a hfi_core_deinit. Como hfi_destroy establece core->ops en NULL, hfi_core_deinit ya no puede llamar a la funci\u00f3n core_deinit. Evite esta desreferencia de puntero nulo omitiendo la llamada cuando sea necesario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.14.283",
"matchCriteriaId": "42074657-A7B6-4740-88B7-67B440018C1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.247",
"matchCriteriaId": "B8CFA0F4-2D75-41F4-9753-87944A08B53B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.198",
"matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.121",
"matchCriteriaId": "34ACD872-E5BC-401C-93D5-B357A62426E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.46",
"matchCriteriaId": "20D41697-0E8B-4B7D-8842-F17BF2AA21E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.17.14",
"matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18",
"versionEndExcluding": "5.18.3",
"matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0ac84ab50712879eac3c1dd2598440652a85d3d0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0ed5a643b1a4a46b9b7bfba5d468c10cc30e1359",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2533acb652359c9e097dfa33587896af782e8a91",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/27ad46da44177a78a4a0cae6fe03906888c61aa1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/86594f6af867b5165d2ba7b5a71fae3a5961e56c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9c385b961d4c378228e80f6abea8509cb67feab6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a21d15dde21d7e8ae047eb8368677407db45d840",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b73ed0510bb8d9647cd8e8a4c4c8772bbe545c3a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49529",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:28.873",
"lastModified": "2025-02-26T07:01:28.873",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:16:19.747",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,74 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu/pm: corrige el puntero nulo mientras smu est\u00e1 deshabilitado. Debe verificar si pp_funcs se inicializa mientras se libera el contexto; de lo contrario, activar\u00e1 el p\u00e1nico del puntero nulo mientras el software smu no est\u00e9 habilitado. [ 1109.404555] BUG: kernel NULL pointer dereference, address: 0000000000000078 [ 1109.404609] #PF: supervisor read access in kernel mode [ 1109.404638] #PF: error_code(0x0000) - not-present page [ 1109.404657] PGD 0 P4D 0 [ 1109.404672] Oops: 0000 [#1] PREEMPT SMP NOPTI [ 1109.404701] CPU: 7 PID: 9150 Comm: amdgpu_test Tainted: G OEL 5.16.0-custom #1 [ 1109.404732] Hardware name: innotek GmbH VirtualBox/VirtualBox, BIOS VirtualBox 12/01/2006 [ 1109.404765] RIP: 0010:amdgpu_dpm_force_performance_level+0x1d/0x170 [amdgpu] [ 1109.405109] Code: 5d c3 44 8b a3 f0 80 00 00 eb e5 66 90 0f 1f 44 00 00 55 48 89 e5 41 57 41 56 41 55 41 54 53 48 83 ec 08 4c 8b b7 f0 7d 00 00 <49> 83 7e 78 00 0f 84 f2 00 00 00 80 bf 87 80 00 00 00 48 89 fb 0f [ 1109.405176] RSP: 0018:ffffaf3083ad7c20 EFLAGS: 00010282 [ 1109.405203] RAX: 0000000000000000 RBX: ffff9796b1c14600 RCX: 0000000002862007 [ 1109.405229] RDX: ffff97968591c8c0 RSI: 0000000000000001 RDI: ffff9796a3700000 [ 1109.405260] RBP: ffffaf3083ad7c50 R08: ffffffff9897de00 R09: ffff979688d9db60 [ 1109.405286] R10: 0000000000000000 R11: ffff979688d9db90 R12: 0000000000000001 [ 1109.405316] R13: ffff9796a3700000 R14: 0000000000000000 R15: ffff9796a3708fc0 [ 1109.405345] FS: 00007ff055cff180(0000) GS:ffff9796bfdc0000(0000) knlGS:0000000000000000 [ 1109.405378] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1109.405400] CR2: 0000000000000078 CR3: 000000000a394000 CR4: 00000000000506e0 [ 1109.405434] Call Trace: [ 1109.405445] [ 1109.405456] ? delete_object_full+0x1d/0x20 [ 1109.405480] amdgpu_ctx_set_stable_pstate+0x7c/0xa0 [amdgpu] [ 1109.405698] amdgpu_ctx_fini.part.0+0xcb/0x100 [amdgpu] [ 1109.405911] amdgpu_ctx_do_release+0x71/0x80 [amdgpu] [ 1109.406121] amdgpu_ctx_ioctl+0x52d/0x550 [amdgpu] [ 1109.406327] ? _raw_spin_unlock+0x1a/0x30 [ 1109.406354] ? drm_gem_handle_delete+0x81/0xb0 [drm] [ 1109.406400] ? amdgpu_ctx_get_entity+0x2c0/0x2c0 [amdgpu] [ 1109.406609] drm_ioctl_kernel+0xb6/0x140 [drm] "
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.18.3",
"matchCriteriaId": "3108C4DF-1578-4A9A-ADC7-1128DE921D69"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/49ec3441aa5e5940f3e82dd2f0205b9c856e399d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/eea5c7b3390c6e006ba4cbd906447dd8cea8cfbf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49530",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:28.967",
"lastModified": "2025-02-26T07:01:28.967",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:15:50.760",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,43 +15,172 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/pm: se corrige la doble liberaci\u00f3n en si_parse_power_table() En la funci\u00f3n si_parse_power_table(), se asigna la matriz adev->pm.dpm.ps y su miembro. Si la asignaci\u00f3n de cada miembro falla, la matriz en s\u00ed se libera y se devuelve con un c\u00f3digo de error. Sin embargo, la matriz se libera m\u00e1s tarde nuevamente en la funci\u00f3n si_dpm_fini() que se llama cuando la funci\u00f3n devuelve un error. Esto conduce a una posible doble liberaci\u00f3n de la matriz adev->pm.dpm.ps, as\u00ed como a la fuga de sus miembros de matriz, ya que los miembros no se liberan en la funci\u00f3n de asignaci\u00f3n y la matriz no se anula cuando se libera. Adem\u00e1s, adev->pm.dpm.num_ps, que realiza un seguimiento del miembro de la matriz asignado, no se actualiza hasta que la asignaci\u00f3n del miembro finaliza correctamente, esto tambi\u00e9n podr\u00eda conducir al use-after-free o al acceso a variables no inicializadas en si_dpm_fini(). Solucione esto posponiendo la liberaci\u00f3n de la matriz hasta si_dpm_fini() e incremente adev->pm.dpm.num_ps cada vez que se asigne el miembro de la matriz."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.9.318",
"matchCriteriaId": "0D4D4067-974D-4560-8320-22FDA399E3F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.283",
"matchCriteriaId": "D6823775-2653-4644-A0D4-4E6E68F10C65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.247",
"matchCriteriaId": "B8CFA0F4-2D75-41F4-9753-87944A08B53B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.198",
"matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.121",
"matchCriteriaId": "34ACD872-E5BC-401C-93D5-B357A62426E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.46",
"matchCriteriaId": "20D41697-0E8B-4B7D-8842-F17BF2AA21E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.17.14",
"matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18",
"versionEndExcluding": "5.18.3",
"matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2615464854505188f909d0c07c37a6623693b5c7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/43eb9b667b95f2a31c63e8949b0d2161b9be59c3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6c5bdaa1325be7f04b79ea992ab216739192d342",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a5ce7051db044290b1a95045ff03c249005a3aa4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/af832028af6f44c6c45645757079c4ed6884ade5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c0e811c4ccf3b42705976285e3a94cc82dea7300",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ca1ce206894dd976275c78ee38dbc19873f22de9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f3fa2becf2fc25b6ac7cf8d8b1a2e4a86b3b72bd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fd2eff8b9dcbe469c3b7bbbc7083ab5ed94de07b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49532",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:29.170",
"lastModified": "2025-02-26T07:01:29.170",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:15:19.063",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,43 +15,172 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/virtio: se corrige la desreferencia de puntero NULL en virtio_gpu_conn_get_modes. drm_cvt_mode puede devolver NULL y deber\u00edamos comprobarlo. Este error lo encontr\u00f3 syzkaller: FAULT_INJECTION stacktrace: [ 168.567394] FAULT_INJECTION: forcing a failure. name failslab, interval 1, probability 0, space 0, times 1 [ 168.567403] CPU: 1 PID: 6425 Comm: syz Kdump: loaded Not tainted 4.19.90-vhulk2201.1.0.h1035.kasan.eulerosv2r10.aarch64 #1 [ 168.567406] Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 [ 168.567408] Call trace: [ 168.567414] dump_backtrace+0x0/0x310 [ 168.567418] show_stack+0x28/0x38 [ 168.567423] dump_stack+0xec/0x15c [ 168.567427] should_fail+0x3ac/0x3d0 [ 168.567437] __should_failslab+0xb8/0x120 [ 168.567441] should_failslab+0x28/0xc0 [ 168.567445] kmem_cache_alloc_trace+0x50/0x640 [ 168.567454] drm_mode_create+0x40/0x90 [ 168.567458] drm_cvt_mode+0x48/0xc78 [ 168.567477] virtio_gpu_conn_get_modes+0xa8/0x140 [virtio_gpu] [ 168.567485] drm_helper_probe_single_connector_modes+0x3a4/0xd80 [ 168.567492] drm_mode_getconnector+0x2e0/0xa70 [ 168.567496] drm_ioctl_kernel+0x11c/0x1d8 [ 168.567514] drm_ioctl+0x558/0x6d0 [ 168.567522] do_vfs_ioctl+0x160/0xf30 [ 168.567525] ksys_ioctl+0x98/0xd8 [ 168.567530] __arm64_sys_ioctl+0x50/0xc8 [ 168.567536] el0_svc_common+0xc8/0x320 [ 168.567540] el0_svc_handler+0xf8/0x160 [ 168.567544] el0_svc+0x10/0x218 KASAN stacktrace: [ 168.567561] BUG: KASAN: null-ptr-deref in virtio_gpu_conn_get_modes+0xb4/0x140 [virtio_gpu] [ 168.567565] Read of size 4 at addr 0000000000000054 by task syz/6425 [ 168.567566] [ 168.567571] CPU: 1 PID: 6425 Comm: syz Kdump: loaded Not tainted 4.19.90-vhulk2201.1.0.h1035.kasan.eulerosv2r10.aarch64 #1 [ 168.567573] Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 [ 168.567575] Call trace: [ 168.567578] dump_backtrace+0x0/0x310 [ 168.567582] show_stack+0x28/0x38 [ 168.567586] dump_stack+0xec/0x15c [ 168.567591] kasan_report+0x244/0x2f0 [ 168.567594] __asan_load4+0x58/0xb0 [ 168.567607] virtio_gpu_conn_get_modes+0xb4/0x140 [virtio_gpu] [ 168.567612] drm_helper_probe_single_connector_modes+0x3a4/0xd80 [ 168.567617] drm_mode_getconnector+0x2e0/0xa70 [ 168.567621] drm_ioctl_kernel+0x11c/0x1d8 [ 168.567624] drm_ioctl+0x558/0x6d0 [ 168.567628] do_vfs_ioctl+0x160/0xf30 [ 168.567632] ksys_ioctl+0x98/0xd8 [ 168.567636] __arm64_sys_ioctl+0x50/0xc8 [ 168.567641] el0_svc_common+0xc8/0x320 [ 168.567645] el0_svc_handler+0xf8/0x160 [ 168.567649] el0_svc+0x10/0x218 "
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.9.318",
"matchCriteriaId": "0D4D4067-974D-4560-8320-22FDA399E3F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.283",
"matchCriteriaId": "D6823775-2653-4644-A0D4-4E6E68F10C65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.247",
"matchCriteriaId": "B8CFA0F4-2D75-41F4-9753-87944A08B53B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.198",
"matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.121",
"matchCriteriaId": "34ACD872-E5BC-401C-93D5-B357A62426E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.46",
"matchCriteriaId": "20D41697-0E8B-4B7D-8842-F17BF2AA21E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.17.14",
"matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18",
"versionEndExcluding": "5.18.3",
"matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0f8bc147a963686b7351aa35d1701124ffacac08",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/194d250cdc4a40ccbd179afd522a9e9846957402",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/32e10aabc287f09a148ff759bb9ce70b01b0012c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/848dd072744ea662ab3097e3c8282bee552df218",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c51d00472fa54b9b05c17789ed665c17adf3a25d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e0828456578cc8ba0a69147f7ae3428392eec287",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/edafcad84c4134ebec4bc24b29ca4497a1184eea",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f85cb059fad03a3b33a50023be91e944bb065ae8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fadc626cae99aaa1325094edc6a9e2b883f3e562",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49534",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:29.400",
"lastModified": "2025-02-26T07:01:29.400",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:30:31.113",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,74 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: lpfc: Fuga de memoria de protecci\u00f3n para puertos NPIV que env\u00edan PLOGI_RJT Hay una posible fuga de memoria en lpfc_ignore_els_cmpl() y lpfc_els_rsp_reject() que se asign\u00f3 desde NPIV PLOGI_RJT (login_mbox de lpfc_rcv_plogi()). Compruebe si cmdiocb->context_un.mbox se asign\u00f3 en lpfc_ignore_els_cmpl() y, a continuaci\u00f3n, lib\u00e9relo de nuevo en phba->mbox_mem_pool junto con mbox->ctx_buf para los par\u00e1metros de servicio. En caso de fallo de lpfc_els_rsp_reject(), libere tanto el ctx_buf para los par\u00e1metros de servicio como el login_mbox."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.18.3",
"matchCriteriaId": "3108C4DF-1578-4A9A-ADC7-1128DE921D69"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/672d1cb40551ea9c95efad43ab6d45e4ab4e015f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c00df0f34a6d5e14da379f96ea67e501ce67b002",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49536",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:29.580",
"lastModified": "2025-02-26T07:01:29.580",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:30:26.823",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,102 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: lpfc: Se corrige el bloqueo del controlador de finalizaci\u00f3n y cancelaci\u00f3n de E/S de SCSI. Durante las pruebas de E/S de estr\u00e9s con m\u00e1s de 500 puertos virtuales, se observan rastros de llamadas LOCKUP duras. CPU A: native_queued_spin_lock_slowpath+0x192 _raw_spin_lock_irqsave+0x32 lpfc_handle_fcp_err+0x4c6 lpfc_fcp_io_cmd_wqe_cmpl+0x964 lpfc_sli4_fp_handle_cqe+0x266 __lpfc_sli4_process_cq+0x105 __lpfc_sli4_hba_process_cq+0x3c lpfc_cq_poll_hdler+0x16 irq_poll_softirq+0x76 __softirqentry_text_start+0xe4 irq_exit+0xf7 do_IRQ+0x7f CPU B: native_queued_spin_lock_slowpath+0x5b _raw_spin_lock+0x1c lpfc_abort_handler+0x13e scmd_eh_abort_handler+0x85 process_one_work+0x1a7 worker_thread+0x30 kthread+0x112 ret_from_fork+0x1f Diagram of lockup: CPUA CPUB ---- ---- lpfc_cmd->buf_lock phba->hbalock lpfc_cmd->buf_lock phba->hbalock Fix by reordering the taking of the lpfc_cmd->buf_lock and phba->hbalock in lpfc_abort_handler routine so that it tries to take the lpfc_cmd->buf_lock first before phba->hbalock. "
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.46",
"matchCriteriaId": "40E62665-0BA6-440F-83E8-6F8EC2D3C9DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.17.14",
"matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18",
"versionEndExcluding": "5.18.3",
"matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/03cbbd7c2f5ee288f648f4aeedc765a181188553",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0c4eed901285b9cae36a622f32bea3e92490da6c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/21c0d469349957b5dc811c41200a2a998996ca8d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7625e81de2164a082810e1f27547d388406da610",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49538",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:29.760",
"lastModified": "2025-02-26T07:01:29.760",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:14:28.543",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,43 +15,172 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: jack: acceso a input_dev bajo mutex Es posible que al usar ASoC, input_dev no se registre al llamar a snd_jack_report, lo que provoca la desreferencia del puntero NULL. Para evitar esto, se serializa el acceso a input_dev mediante un bloqueo mutex."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.9.318",
"matchCriteriaId": "0D4D4067-974D-4560-8320-22FDA399E3F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.283",
"matchCriteriaId": "D6823775-2653-4644-A0D4-4E6E68F10C65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.247",
"matchCriteriaId": "B8CFA0F4-2D75-41F4-9753-87944A08B53B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.198",
"matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.121",
"matchCriteriaId": "34ACD872-E5BC-401C-93D5-B357A62426E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.46",
"matchCriteriaId": "20D41697-0E8B-4B7D-8842-F17BF2AA21E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.17.14",
"matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18",
"versionEndExcluding": "5.18.3",
"matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1b6a6fc5280e97559287b61eade2d4b363e836f2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/582aea6084cc59fec881204f026816d1219f2348",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5cc6f623f4818c7d7e9e966a45ebf324901ca9c5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/74bab3bcf422593c582e47130aa8eb41ebb2dc09",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8487a88136d54a1a4d3f26f1399685db648ab879",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9e6a73b0c0f2014eb89249fb1640c5a3d58221c4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c093b62c40027c21d649c5534ad7aa3605a99b00",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e2b8681769f6e205382f026b907d28aa5ec9d59a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f68bed124c7699e23ffb4ce4fcc84671e9193cde",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49541",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:30.043",
"lastModified": "2025-02-26T07:01:30.043",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:31:11.947",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,102 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: se corrige una posible doble liberaci\u00f3n durante un montaje fallido de RHBZ: https://bugzilla.redhat.com/show_bug.cgi?id=2088799"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.46",
"matchCriteriaId": "40E62665-0BA6-440F-83E8-6F8EC2D3C9DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.17.14",
"matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18",
"versionEndExcluding": "5.18.3",
"matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/8378a51e3f8140f60901fb27208cc7a6e47047b5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9a167fc440e5693c1cdd7f07071e05658bd9d89d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ce0008a0e410cdd95f0d8cd81b2902ec10a660c4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ee71f8f1cd3c8c4a251fd3e8abc89215ae3457cb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49542",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:30.133",
"lastModified": "2025-02-26T07:01:30.133",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:31:15.750",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,102 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: lpfc: Mover la comprobaci\u00f3n cfg_log_verbose antes de llamar a lpfc_dmp_dbg() En un intento de registrar el mensaje 0126 con LOG_TRACE_EVENT, el siguiente seguimiento de llamada de bloqueo duro cuelga el sistema. Seguimiento de llamadas: _raw_spin_lock_irqsave+0x32/0x40 lpfc_dmp_dbg.part.32+0x28/0x220 [lpfc] lpfc_cmpl_els_fdisc+0x145/0x460 [lpfc] lpfc_sli_cancel_jobs+0x92/0xd0 [lpfc] lpfc_els_flush_cmd+0x43c/0x670 [lpfc] lpfc_els_flush_all_cmd+0x37/0x60 [lpfc] lpfc_sli4_async_event_proc+0x956/0x1720 [lpfc] lpfc_do_work+0x1485/0x1d70 [lpfc] kthread+0x112/0x130 ret_from_fork+0x1f/0x40 Kernel panic - not syncing: Hard LOCKUP The same CPU tries to claim the phba->port_list_lock twice. Move the cfg_log_verbose checks as part of the lpfc_printf_vlog() and lpfc_printf_log() macros before calling lpfc_dmp_dbg(). There is no need to take the phba->port_list_lock within lpfc_dmp_dbg()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.46",
"matchCriteriaId": "40E62665-0BA6-440F-83E8-6F8EC2D3C9DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.17.14",
"matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18",
"versionEndExcluding": "5.18.3",
"matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/09c772557a4fd9490fed1bfb133268313ea22213",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/271725e4028559ae7974d762a8467dc9de412f2e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cc6501afccec55b8b6c90584cbf71f1fefa77d1e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e294647b1aed4247fe52851f3a3b2b19ae906228",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49544",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:30.313",
"lastModified": "2025-02-26T07:01:30.313",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:14:07.310",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,43 +15,172 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipw2x00: Se corrige la posible desreferenciaci\u00f3n NULL en libipw_xmit() crypt y crypt->ops podr\u00edan ser nulos, por lo que debemos verificar los valores nulos antes de la desreferenciaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.9.318",
"matchCriteriaId": "0D4D4067-974D-4560-8320-22FDA399E3F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.283",
"matchCriteriaId": "D6823775-2653-4644-A0D4-4E6E68F10C65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.247",
"matchCriteriaId": "B8CFA0F4-2D75-41F4-9753-87944A08B53B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.198",
"matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.121",
"matchCriteriaId": "34ACD872-E5BC-401C-93D5-B357A62426E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.46",
"matchCriteriaId": "20D41697-0E8B-4B7D-8842-F17BF2AA21E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.17.14",
"matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18",
"versionEndExcluding": "5.18.3",
"matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/167affc11781d7d35c4c3a7630a549ac74dd0b21",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1ff6b0727c8988f25eeb670b6c038c1120bb58dd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/48d4a820fd33f012e5f63735a59d15b5a3882882",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/528d2023ccf4748fd542582955236c1634a7d293",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5f7ea274e88c0eeffe6bd6dbf6cf5c479d356af6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8fb1b9beb085bb767ae43e441db5ac6fcd66a04d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/98d1dc32f890642476dbb78ed3437a456bf421b0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b4628e0d3754ab2fc98ee6e3d21851ba45798077",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e8366bbabe1d207cf7c5b11ae50e223ae6fc278b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49546",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:30.500",
"lastModified": "2025-02-26T07:01:30.500",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:13:19.010",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,102 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/kexec: se corrige la p\u00e9rdida de memoria del b\u00fafer de encabezado elf Esto lo informa el detector kmemleak: objeto sin referencia 0xffffc900002a9000 (size 4096): comm \"kexec\", pid 14950, jiffies 4295110793 (age 373.951s) hex dump (first 32 bytes): 7f 45 4c 46 02 01 01 00 00 00 00 00 00 00 00 00 .ELF............ 04 00 3e 00 01 00 00 00 00 00 00 00 00 00 00 00 ..>............. backtrace: [<0000000016a8ef9f>] __vmalloc_node_range+0x101/0x170 [<000000002b66b6c0>] __vmalloc_node+0xb4/0x160 [<00000000ad40107d>] crash_prepare_elf64_headers+0x8e/0xcd0 [<0000000019afff23>] crash_load_segments+0x260/0x470 [<0000000019ebe95c>] bzImage64_load+0x814/0xad0 [<0000000093e16b05>] arch_kexec_kernel_image_load+0x1be/0x2a0 [<000000009ef2fc88>] kimage_file_alloc_init+0x2ec/0x5a0 [<0000000038f5a97a>] __do_sys_kexec_file_load+0x28d/0x530 [<0000000087c19992>] do_syscall_64+0x3b/0x90 [<0000000066e063a4>] entry_SYSCALL_64_after_hwframe+0x44/0xae In crash_prepare_elf64_headers(), se asigna un b\u00fafer a trav\u00e9s de vmalloc() para almacenar encabezados elf. Sin embargo, no se libera correctamente al sistema cuando se vuelve a cargar o descargar el kernel kdump. Entonces se produce una p\u00e9rdida de memoria. Arr\u00e9glelo introduciendo la funci\u00f3n espec\u00edfica x86 arch_kimage_file_post_load_cleanup() y liberando el b\u00fafer all\u00ed. Y tambi\u00e9n elimine el c\u00f3digo incorrecto de liberaci\u00f3n del b\u00fafer del encabezado elf. Antes de llamar a la funci\u00f3n de carga kexec_file espec\u00edfica de arch, se ha inicializado la instancia de la imagen. Por lo tanto, 'image->elf_headers' debe ser NULL. No tiene sentido liberar el b\u00fafer del encabezado elf en ese lugar. Tres personas diferentes han informado tres errores sobre la p\u00e9rdida de memoria en x86_64 dentro de Redhat."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.46",
"matchCriteriaId": "40E62665-0BA6-440F-83E8-6F8EC2D3C9DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.17.14",
"matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18",
"versionEndExcluding": "5.18.3",
"matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/115ee42a4c2f26ba2b4ace2668a3f004621f6833",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8765a423a87d74ef24ea02b43b2728fe4039f248",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b3e34a47f98974d0844444c5121aaff123004e57",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f675e3a9189d84a9324ab45b0cb19906c2bc8fcb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49547",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:30.590",
"lastModified": "2025-02-26T07:01:30.590",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:31:42.100",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,82 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: arregla el bloqueo entre escrituras dio concurrentes cuando hay poco espacio libre en los datos Al reservar espacio de datos para una escritura IO directa podemos acabar en un bloqueo si tenemos varias tareas intentando escribir en el mismo rango de archivos, hay varias extensiones cubiertas por ese rango de archivos, tenemos poco espacio disponible para los datos y las escrituras no expanden el i_size del inodo. El bloqueo puede ocurrir as\u00ed: 1) Tenemos un archivo con un i_size de 1M, en el desplazamiento 0 tiene una extensi\u00f3n con un tama\u00f1o de 128K y en el desplazamiento 128K tiene otra extensi\u00f3n tambi\u00e9n con un tama\u00f1o de 128K; 2) La tarea A realiza una escritura IO directa contra el rango de archivos [0, 256K), y debido a que la escritura est\u00e1 dentro del l\u00edmite i_size, toma el bloqueo del inodo (nivel VFS) en modo compartido; 3) La tarea A bloquea el rango de archivos [0, 256K) en btrfs_dio_iomap_begin() y luego obtiene el mapa de extensi\u00f3n para la extensi\u00f3n que cubre el rango [0, 128K). En btrfs_get_blocks_direct_write(), crea una extensi\u00f3n ordenada para ese rango de archivos ([0, 128K)); 4) Antes de regresar de btrfs_dio_iomap_begin(), desbloquea el rango de archivos [0, 256K); 5) La tarea A ejecuta btrfs_dio_iomap_begin() nuevamente, esta vez para el rango de archivos [128K, 256K), y bloquea el rango de archivos [128K, 256K); 6) La tarea B tambi\u00e9n inicia una escritura de E/S directa contra el rango de archivos [0, 256K). Tambi\u00e9n bloquea el inodo en modo compartido, ya que est\u00e1 dentro del l\u00edmite i_size, y luego intenta bloquear el rango de archivos [0, 256K). Puede bloquear el subrango [0, 128K) pero luego bloquea la espera del rango [128K, 256K), ya que est\u00e1 bloqueado actualmente por la tarea A; 7) La tarea A ingresa a btrfs_get_blocks_direct_write() e intenta reservar espacio de datos. Debido a que tenemos poco espacio libre disponible, activa la tarea de recuperaci\u00f3n de datos as\u00edncrona y espera a que reserve espacio de datos; 8) La tarea de recuperaci\u00f3n as\u00edncrona decide esperar a que se completen todas las extensiones ordenadas existentes (a trav\u00e9s de btrfs_wait_ordered_roots()). Encuentra la extensi\u00f3n ordenada creada previamente por la tarea A para el rango de archivos [0, 128K) y espera a que se complete; 9) La extensi\u00f3n ordenada para el rango de archivos [0, 128K) no se puede completar porque se bloquea en btrfs_finish_ordered_io() cuando intenta bloquear el rango de archivos [0, 128K). Esto da como resultado un punto muerto, porque: - la tarea B mantiene bloqueado el rango de archivos [0, 128K), esperando que la tarea A desbloquee el rango [128K, 256K); - la tarea A mantiene bloqueado el rango de archivos [128K, 256K) y est\u00e1 esperando que la tarea de recuperaci\u00f3n de datos as\u00edncrona satisfaga su solicitud de reserva de espacio; - la tarea de recuperaci\u00f3n de datos as\u00edncrona est\u00e1 esperando que se complete la extensi\u00f3n ordenada [0, 128K), pero la extensi\u00f3n ordenada no se puede completar porque el rango de archivos [0, 128K) est\u00e1 bloqueado actualmente por la tarea B, que est\u00e1 esperando que la tarea A desbloquee el rango de archivos [128K, 256K) y la tarea A est\u00e1 esperando la tarea de recuperaci\u00f3n de datos as\u00edncrona. Esto da como resultado un bloqueo entre 4 tareas: la tarea A, la tarea B, la tarea de recuperaci\u00f3n de datos asincr\u00f3nica y la tarea que realiza la finalizaci\u00f3n de la extensi\u00f3n ordenada (una tarea de cola de trabajo). Este tipo de bloqueo puede ser activado espor\u00e1dicamente por el caso de prueba generic/300 de fstests y da como resultado un seguimiento de pila como el siguiente: [12084.033689] INFO: la tarea kworker/u16:7:123749 se bloque\u00f3 durante m\u00e1s de 241 segundos. [12084.033689] INFO: task kworker/u16:7:123749 blocked for more than 241 seconds. [12084.034877] Not tainted 5.18.0-rc2-btrfs-next-115 #1 [12084.035562] \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message. [12084.036548] task:kworker/u16:7 state:D stack: 0 pid:123749 ppid: 2 flags:---truncated--- "
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15.27",
"versionEndExcluding": "5.16",
"matchCriteriaId": "682E95CF-F3D0-4417-B632-F8B6EE54D517"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16.13",
"versionEndExcluding": "5.18.3",
"matchCriteriaId": "21CCFEA4-A572-4BBD-ACCC-76ADE4CDCBF9"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/cfae6f765b3c40882ee90dae8fbf9325c8de9c35",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f5585f4f0ef5b17026bbd60fbff6fcc91b99d5bf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49548",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:30.683",
"lastModified": "2025-02-26T07:01:30.683",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:32:17.530",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,117 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: Se corrige un posible desbordamiento de matriz en bpf_trampoline_get_progs() El valor cnt en la comprobaci\u00f3n 'cnt >= BPF_MAX_TRAMP_PROGS' no incluye programas bpf BPF_TRAMP_MODIFY_RETURN, por lo que la cantidad de programas bpf BPF_TRAMP_MODIFY_RETURN adjuntos en un trampol\u00edn puede superar a BPF_MAX_TRAMP_PROGS. Cuando esto sucede, la asignaci\u00f3n '*progs++ = aux->prog' en bpf_trampoline_get_progs() provocar\u00e1 un desbordamiento de la matriz progs, ya que el campo progs en la estructura bpf_tramp_progs solo puede contener como m\u00e1ximo programas bpf BPF_MAX_TRAMP_PROGS."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-129"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.7",
"versionEndExcluding": "5.10.120",
"matchCriteriaId": "78702CD4-AEE5-45F6-90C7-1EB25AF09D08"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.45",
"matchCriteriaId": "08D699AD-F4CE-4BDD-A97E-4997299C7712"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.17.13",
"matchCriteriaId": "192FC54B-5367-49D6-B410-0285F14665B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18",
"versionEndExcluding": "5.18.2",
"matchCriteriaId": "9FF255A1-64F4-4E31-AF44-C92FB8773BA2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/32c4559c61652f24c9fdd5440342196fe37453bc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4f8897bcc20b9ae44758e0572538d741ab66f0dc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7f845de2863334bed4f362e95853f5e7bc323737",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a2aa95b71c9bbec793b5c5fa50f0a80d882b3e8d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e36452d5da6325df7c10cffc60a9e68d21e2606d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49549",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:30.773",
"lastModified": "2025-02-26T07:01:30.773",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:22:55.893",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,117 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/MCE/AMD: Se corrige la p\u00e9rdida de memoria cuando falla el umbral_create_bank() En mce_threshold_create_device(), si falla el umbral_create_bank(), la matriz de bancos de umbral previamente asignada @bp se filtrar\u00e1 porque la llamada a mce_threshold_remove_device() no la liberar\u00e1. Esto sucede porque mce_threshold_remove_device() obtiene el puntero a trav\u00e9s de la variable por CPU del umbral_banks, pero bp se escribe all\u00ed solo despu\u00e9s de que la creaci\u00f3n del banco sea exitosa, y no antes, cuando falla el umbral_create_bank(). Agregue un asistente que desenrolle todo el trabajo de creaci\u00f3n de bancos previamente realizado y le pase la matriz de bancos de umbral previamente asignada para liberar. [ bp: Masaje. ]"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.8",
"versionEndExcluding": "5.10.121",
"matchCriteriaId": "6EB90EB1-2051-4828-B7F9-DDA87FD914C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.46",
"matchCriteriaId": "20D41697-0E8B-4B7D-8842-F17BF2AA21E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.17.14",
"matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18",
"versionEndExcluding": "5.18.3",
"matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/396b8e7ab2a99ddac57d3522b3da5e58cb608d37",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9708f1956eeb70c86943e0bc62fa3b0101b59616",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b4acb8e7f1594607bc9017ef0aacb40b24a003d6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cc0dd4456f9573bf8af9b4d8754433918e809e1e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e5f28623ceb103e13fc3d7bd45edf9818b227fd0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49550",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:30.863",
"lastModified": "2025-02-26T07:01:30.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:23:20.777",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,75 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fs/ntfs3: proporcionar block_invalidate_folio para reparar la p\u00e9rdida de memoria El sistema de archivos ntfs3 carece del m\u00e9todo 'invalidate_folio' y provoca una p\u00e9rdida de memoria. Si escribe en el sistema de archivos y luego lo desmonta, los datos escritos en cach\u00e9 no se liberan y se filtran de forma permanente."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18",
"versionEndExcluding": "5.18.3",
"matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0753245a72ec99824677586499ee2e0919164b3f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/724bbe49c5e427cb077357d72d240a649f2e4054",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49551",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:30.950",
"lastModified": "2025-02-26T07:01:30.950",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:27:26.720",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,103 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: isp1760: Fix out-of-bounds array access Running the driver through kasan gives an interesting splat: BUG: KASAN: global-out-of-bounds in isp1760_register+0x180/0x70c Read of size 20 at addr f1db2e64 by task swapper/0/1 (...) isp1760_register from isp1760_plat_probe+0x1d8/0x220 (...) This happens because the loop reading the regmap fields for the different ISP1760 variants look like this: for (i = 0; i < HC_FIELD_MAX; i++) { ... } Meaning it expects the arrays to be at least HC_FIELD_MAX - 1 long. However the arrays isp1760_hc_reg_fields[], isp1763_hc_reg_fields[], isp1763_hc_volatile_ranges[] and isp1763_dc_volatile_ranges[] se dimensionan din\u00e1micamente durante la compilaci\u00f3n. Solucione esto colocando una asignaci\u00f3n vac\u00eda al miembro de la matriz [HC_FIELD_MAX] y [DC_FIELD_MAX] al final de cada matriz. Esto har\u00e1 que la matriz tenga un miembro m\u00e1s de lo que necesita ser, pero evita el riesgo de sobrescribir lo que est\u00e9 dentro de [HC_FIELD_MAX - 1] y es simple e intuitivo de leer. Tambi\u00e9n agregue comentarios que expliquen lo que est\u00e1 sucediendo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.14",
"versionEndExcluding": "5.15.46",
"matchCriteriaId": "A27CF019-1F16-43FA-97F2-4D8F23EA7101"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.17.14",
"matchCriteriaId": "15E2DD33-2255-4B76-9C15-04FF8CBAB252"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18",
"versionEndExcluding": "5.18.3",
"matchCriteriaId": "8E122216-2E9E-4B3E-B7B8-D575A45BA3C2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/26ae2c942b5702f2e43d36b2a4389cfb7d616b6a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/463bddd3ff1acf4036ddb80c34a715eb99debf46",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/47d39cb57e8669e507d17d9e0d067d2b3e3a87ae",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bf2558bbdce3ab1d6bcba09f354914e4515d0a2b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49560",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:31.780",
"lastModified": "2025-02-26T07:01:31.780",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:25:29.677",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,117 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: exfat: comprobar si el n\u00famero de cl\u00faster es v\u00e1lido Syzbot inform\u00f3 una lectura de slab fuera de los l\u00edmites en exfat_clear_bitmap. Esto fue provocado por el reproductor que llama a truncute con tama\u00f1o 0, lo que provoca el siguiente seguimiento: ERROR: KASAN: slab-out-of-bounds in exfat_clear_bitmap+0x147/0x490 fs/exfat/balloc.c:174 Read of size 8 at addr ffff888115aa9508 by task syz-executor251/365 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack_lvl+0x1e2/0x24b lib/dump_stack.c:118 print_address_description+0x81/0x3c0 mm/kasan/report.c:233 __kasan_report mm/kasan/report.c:419 [inline] kasan_report+0x1a4/0x1f0 mm/kasan/report.c:436 __asan_report_load8_noabort+0x14/0x20 mm/kasan/report_generic.c:309 exfat_clear_bitmap+0x147/0x490 fs/exfat/balloc.c:174 exfat_free_cluster+0x25a/0x4a0 fs/exfat/fatent.c:181 __exfat_truncate+0x99e/0xe00 fs/exfat/file.c:217 exfat_truncate+0x11b/0x4f0 fs/exfat/file.c:243 exfat_setattr+0xa03/0xd40 fs/exfat/file.c:339 notify_change+0xb76/0xe10 fs/attr.c:336 do_truncate+0x1ea/0x2d0 fs/open.c:65 Move the is_valid_cluster() helper from fatent.c to a common header to make it reusable in other *.c files. And add is_valid_cluster() to validate if cluster number is within valid range in exfat_clear_bitmap() and exfat_set_bitmap(). "
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.7",
"versionEndExcluding": "5.10.120",
"matchCriteriaId": "78702CD4-AEE5-45F6-90C7-1EB25AF09D08"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.45",
"matchCriteriaId": "08D699AD-F4CE-4BDD-A97E-4997299C7712"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.17.13",
"matchCriteriaId": "192FC54B-5367-49D6-B410-0285F14665B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.18",
"versionEndExcluding": "5.18.2",
"matchCriteriaId": "9FF255A1-64F4-4E31-AF44-C92FB8773BA2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2193286402df2d9c53294f7a858d5e6fd7346e08",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/64ba4b15e5c045f8b746c6da5fc9be9a6b00b61d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7c58b14b6f9cde9f69e7fa053ab73f6e013a7131",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/82f723b8a5adf497f9e34c702a30ca7298615654",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c504167adc3248095a905fa0700a9693897cb5ed",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49563",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:32.060",
"lastModified": "2025-02-26T07:01:32.060",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:28:10.553",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,88 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: qat - a\u00f1adir comprobaci\u00f3n de par\u00e1metros para solicitudes de rechazo RSA con un b\u00fafer de origen que sea m\u00e1s grande que el tama\u00f1o de la clave. Esto es para evitar un posible desbordamiento de enteros que podr\u00eda ocurrir al copiar la lista de dispersi\u00f3n de origen en un b\u00fafer lineal."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-191"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "0DFC6E4B-8C85-4056-80F1-C9129E42FE45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/4d6d2adce08788b7667a6e58002682ea1bbf6a79",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9714061423b8b24b8afb31b8eb4df977c63f19c4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f993321e50ba7a8ba4f5b19939e1772a921a1c42",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49564",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:32.150",
"lastModified": "2025-02-26T07:01:32.150",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:19:21.127",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,88 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: qat - agregar comprobaci\u00f3n de par\u00e1metros para solicitudes de rechazo DH con un b\u00fafer de origen que sea m\u00e1s grande que el tama\u00f1o de la clave. Esto es para evitar un posible desbordamiento de enteros que podr\u00eda ocurrir al copiar la lista de dispersi\u00f3n de origen en un b\u00fafer lineal."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-191"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "0DFC6E4B-8C85-4056-80F1-C9129E42FE45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2acbb8771f6ac82422886e63832ee7a0f4b1635b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/76c9216833e7c20a67c987cf89719a3f01666aaa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e7f979ed51f96495328157df663c835b17db1e30",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49566",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:32.333",
"lastModified": "2025-02-26T07:01:32.333",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:19:26.347",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,89 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: crypto: qat - reparar p\u00e9rdida de memoria en RSA Cuando se utiliza una clave RSA representada en formato 2 (como se define en PKCS #1 V2.1), algunos componentes de la clave privada persisten incluso despu\u00e9s de que se libere el TFM. Reemplace las llamadas expl\u00edcitas para liberar los b\u00faferes en qat_rsa_exit_tfm() con una llamada a qat_rsa_clear_ctx() que libera todos los b\u00faferes a los que se hace referencia en el contexto del TFM."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.8",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "AB678193-5BC5-499F-BD00-0B0AD62C511F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0f967fdc09955221a1951a279481b0bf4d359941",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/80a52e1ee7757b742f96bfb0d58f0c14eb6583d0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a843925e0287eebb4aa808666bf22c664dfe4c53",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49567",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:32.420",
"lastModified": "2025-02-26T07:01:32.420",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:20:08.247",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,158 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/mempolicy: fix uninit-value in mpol_rebind_policy() mpol_set_nodemask()(mm/mempolicy.c) does not set up nodemask when pol->mode is MPOL_LOCAL. Check pol->mode before access pol->w.cpuset_mems_allowed in mpol_rebind_policy()(mm/mempolicy.c). BUG: KMSAN: uninit-value in mpol_rebind_policy mm/mempolicy.c:352 [inline] BUG: KMSAN: uninit-value in mpol_rebind_task+0x2ac/0x2c0 mm/mempolicy.c:368 mpol_rebind_policy mm/mempolicy.c:352 [inline] mpol_rebind_task+0x2ac/0x2c0 mm/mempolicy.c:368 cpuset_change_task_nodemask kernel/cgroup/cpuset.c:1711 [inline] cpuset_attach+0x787/0x15e0 kernel/cgroup/cpuset.c:2278 cgroup_migrate_execute+0x1023/0x1d20 kernel/cgroup/cgroup.c:2515 cgroup_migrate kernel/cgroup/cgroup.c:2771 [inline] cgroup_attach_task+0x540/0x8b0 kernel/cgroup/cgroup.c:2804 __cgroup1_procs_write+0x5cc/0x7a0 kernel/cgroup/cgroup-v1.c:520 cgroup1_tasks_write+0x94/0xb0 kernel/cgroup/cgroup-v1.c:539 cgroup_file_write+0x4c2/0x9e0 kernel/cgroup/cgroup.c:3852 kernfs_fop_write_iter+0x66a/0x9f0 fs/kernfs/file.c:296 call_write_iter include/linux/fs.h:2162 [inline] new_sync_write fs/read_write.c:503 [inline] vfs_write+0x1318/0x2030 fs/read_write.c:590 ksys_write+0x28b/0x510 fs/read_write.c:643 __do_sys_write fs/read_write.c:655 [inline] __se_sys_write fs/read_write.c:652 [inline] __x64_sys_write+0xdb/0x120 fs/read_write.c:652 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82 entry_SYSCALL_64_after_hwframe+0x44/0xae Uninit was created at: slab_post_alloc_hook mm/slab.h:524 [inline] slab_alloc_node mm/slub.c:3251 [inline] slab_alloc mm/slub.c:3259 [inline] kmem_cache_alloc+0x902/0x11c0 mm/slub.c:3264 mpol_new mm/mempolicy.c:293 [inline] do_set_mempolicy+0x421/0xb70 mm/mempolicy.c:853 kernel_set_mempolicy mm/mempolicy.c:1504 [inline] __do_sys_set_mempolicy mm/mempolicy.c:1510 [inline] __se_sys_set_mempolicy+0x44c/0xb60 mm/mempolicy.c:1507 __x64_sys_set_mempolicy+0xd8/0x110 mm/mempolicy.c:1507 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x54/0xd0 arch/x86/entry/common.c:82 entry_SYSCALL_64_after_hwframe+0x44/0xae KMSAN: uninit-value in mpol_rebind_task (2) https://syzkaller.appspot.com/bug?id=d6eb90f952c2a5de9ea718a1b873c55cb13b59dc This patch seems to fix below bug too. KMSAN: uninit-value in mpol_rebind_mm (2) https://syzkaller.appspot.com/bug?id=f2fecd0d7013f54ec4162f60743a2b28df40926b The uninit-value is pol->w.cpuset_mems_allowed in mpol_rebind_policy(). When syzkaller reproducer runs to the beginning of mpol_new(), mpol_new() mm/mempolicy.c do_mbind() mm/mempolicy.c kernel_mbind() mm/mempolicy.c `mode` is 1(MPOL_PREFERRED), nodes_empty(*nodes) is `true` and `flags` is 0. Then mode = MPOL_LOCAL; ... policy->mode = mode; policy->flags = flags; will be executed. So in mpol_set_nodemask(), mpol_set_nodemask() mm/mempolicy.c do_mbind() kernel_mbind() pol->mode is 4 (MPOL_LOCAL), that `nodemask` in `pol` is not initialized, which will be accessed in mpol_rebind_policy(). "
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.9.325",
"matchCriteriaId": "6FD0FC1F-AC56-4EF7-8913-24FBB31FDFA6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.290",
"matchCriteriaId": "1F023E37-5DAE-491D-9971-00FC089E8C7E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.254",
"matchCriteriaId": "56D38C39-4EB7-48A7-85D3-D4854AC7B3E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.208",
"matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.134",
"matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/018160ad314d75b1409129b2247b614a9f35894c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/13d51565cec1aa432a6ab363edc2bbc53c6f49cb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5735845906fb1d90fe597f8b503fc0a857d475e3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/777e563f10e91e91130fe06bee85220d508e7b9b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8c5429a04ccd8dbcc3c753dab2f4126774ec28d4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a1f8765f68bc9bf5744b365bb9f5e0b6db93edfe",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/aaa1c5d635a6fca2043513ffb5be169f9cd17d9e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ddb3f0b68863bd1c5f43177eea476bce316d4993",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49568",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:32.517",
"lastModified": "2025-02-26T07:01:32.517",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:11:32.760",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,121 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: No desreferenciar ops->destroy Una depuraci\u00f3n de dispositivo KVM ocurre en cualquiera de dos devoluciones de llamada: 1) destroy() que se llama cuando se est\u00e1 destruyendo la VM; 2) release() que se llama cuando se cierra un fd de dispositivo. La mayor\u00eda de los dispositivos KVM usan 1) pero los dispositivos KVM del controlador de interrupciones de Book3s (XICS, XIVE, XIVE-native) usan 2) ya que necesitan cerrarse y volver a abrir durante la ejecuci\u00f3n de la m\u00e1quina. La gesti\u00f3n de errores en kvm_ioctl_create_device() asume que destroy() siempre est\u00e1 definido, lo que lleva a una desreferencia NULL como lo descubri\u00f3 Syzkaller. Esto agrega verificaciones para destroy!=NULL y agrega un release() faltante. Esto no est\u00e1 cambiando kvm_destroy_devices() ya que los dispositivos con release() definido deber\u00edan haber sido eliminados de la lista de dispositivos KVM para entonces."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.210",
"matchCriteriaId": "769A1563-4E73-4FA2-BDEB-9DBD40989582"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.134",
"matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/170465715a60cbb7876e6b961b21bd3225469da8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3616776bc51cd3262bb1be60cc01c72e0a1959cf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d4a5a79b780891c5cbdfdc6124d46fdf8d13dba1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e8bc2427018826e02add7b0ed0fc625a60390ae5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e91665fbbf3ccb268b268a7d71a6513538d813ac",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49569",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:32.607",
"lastModified": "2025-02-26T07:01:32.607",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:11:35.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,152 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spi: bcm2835: bcm2835_spi_handle_err(): corrige la desreferencia del puntero NULL para transferencias que no sean DMA En caso de que se agote el tiempo de espera de una transferencia basada en IRQ, se llama a la funci\u00f3n bcm2835_spi_handle_err(). Desde el commit 1513ceee70f2 (\"spi: bcm2835: Drop dma_pending flag\") las transferencias DMA TX y RX se cancelan incondicionalmente, lo que lleva a desreferencias del puntero NULL si no se configuran ctlr->dma_tx o ctlr->dma_rx. Corrija la desreferencia del puntero NULL comprobando que ctlr->dma_tx y ctlr->dma_rx sean punteros v\u00e1lidos antes de acceder a ellos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4",
"versionEndExcluding": "5.4.208",
"matchCriteriaId": "7E96E649-47EC-458E-8AC7-5A642A2EF7A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.134",
"matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/49ffa473218012e765682343de2052eb4c1f06a7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4ceaa684459d414992acbefb4e4c31f2dfc50641",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/58466e05390043d2805685c70f55f3f59711bdf2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/684896e675edd8b669fd3e9f547c5038222d85bc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/76668d2a2f367d25ff448e6d7087406af7d7bb2b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49570",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:32.693",
"lastModified": "2025-02-26T07:01:32.693",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:19:40.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,124 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gpio: gpio-xilinx: Se corrige el desbordamiento de enteros. La implementaci\u00f3n actual no puede configurar m\u00e1s de 32 pines debido a un tipo de datos incorrecto. Por lo tanto, se realiza una conversi\u00f3n de tipos con unsigned long para evitarlo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.14",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "DF6D28E5-50E7-41DF-8C6B-9A607F116EC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/32c094a09d5829ad9b02cdf667569aefa8de0ea6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6f16a5390640807dde420ee5ccbc4c95577aea6a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e129e5486b981d324057e6986059f852658b0d00",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49571",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:32.780",
"lastModified": "2025-02-26T07:01:32.780",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:04:22.707",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,166 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se han corregido las ejecuciones de datos en torno a sysctl_tcp_max_reordering. Al leer sysctl_tcp_max_reordering, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.19",
"versionEndExcluding": "4.19.254",
"matchCriteriaId": "F45605C5-6E4D-416B-B48F-C6E46604E62A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.208",
"matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.134",
"matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/064852663308c801861bd54789d81421fa4c2928",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/46deb91ac8a790286ad6d24cf92e7ab0ab2582bb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/50a1d3d097503a90cf84ebe120afcde37e9c33b3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5e38cee24f19d19280c68f1ac8bf6790d607f60a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a11e5b3e7a59fde1a90b0eaeaa82320495cf8cae",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ce3731c61589ed73364a5b55ce34131762ef9b60",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49572",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:32.877",
"lastModified": "2025-02-26T07:01:32.877",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:06:02.287",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,166 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se corrigen las ejecuciones de datos en torno a sysctl_tcp_slow_start_after_idle. Al leer sysctl_tcp_slow_start_after_idle, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.6.18",
"versionEndExcluding": "4.19.254",
"matchCriteriaId": "FE70029C-E83E-4325-87B3-7B64A7790B31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.208",
"matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.134",
"matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0e3f82a03ec8c3808e87283e12946227415706c9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/369d99c2b89f54473adcf9acdf40ea562b5a6e0e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3b26e11b07a09b31247688bec61e2925d4a571b6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/41aeba4506f6b70ec7500c6fe202731a4ba29fe5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4845b5713ab18a1bb6e31d1fbb4d600240b8b691",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/68b6f9506747d507c7bfa374d178929b4157e8c6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49573",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:32.970",
"lastModified": "2025-02-26T07:01:32.970",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:06:23.280",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,166 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se ha corregido una ejecuci\u00f3n de datos en torno a sysctl_tcp_early_retrans. Al leer sysctl_tcp_early_retrans, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a su lector."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.5",
"versionEndExcluding": "4.19.254",
"matchCriteriaId": "FEA6FB77-04CE-4B7D-9EDA-A15604B8CDA6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.208",
"matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.134",
"matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/11e8b013d16e5db63f8f76acceb5b86964098aaa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/488d3ad98ef7cddce7054193dbae6b4349c6807d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5037ca9e4b169cc9aed0174d658c3d81fdaf8ea5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/52e65865deb6a36718a463030500f16530eaab74",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/83767fe800a311370330d4ec83aa76093b744a80",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d5975f6376ce90c2c483ae36bf88c9cface4c13b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49574",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:33.063",
"lastModified": "2025-02-26T07:01:33.063",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:09:22.477",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,166 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se han corregido las ejecuciones de datos en torno a sysctl_tcp_recovery. Al leer sysctl_tcp_recovery, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4",
"versionEndExcluding": "4.19.254",
"matchCriteriaId": "06315BCE-8FDE-447B-9A7F-D2B70F13AA4D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.208",
"matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.134",
"matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/52ee7f5c4811ce6be1becd14d38ba1f8a8a0df81",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/92c35113c63306091df9211375eebd0abd8c2160",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a31e2d0cb5cfa2aae3144cac04f25031d5d20fb4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c7a492db1f7c37c758a66915908677bd8bc5d368",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d8781f7cd04091744f474a2bada74772084b9dc9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e7d2ef837e14a971a05f60ea08c47f3fed1a36e4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49575",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:33.157",
"lastModified": "2025-02-26T07:01:33.157",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:09:15.843",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,166 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se ha corregido una ejecuci\u00f3n de datos en torno a sysctl_tcp_thin_linear_timeouts. Al leer sysctl_tcp_thin_linear_timeouts, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a su lector."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.6.34",
"versionEndExcluding": "4.19.254",
"matchCriteriaId": "C6C7F5D5-5446-4DCA-9E0F-87A4F4E57BDE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.208",
"matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.134",
"matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/404c53ccdebd11f96954f4070cffac8e0b4d5cb6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/492f3713b282c0e67e951cd804edd22eccc25412",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7c6f2a86ca590d5187a073d987e9599985fb1c7c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a0f96c4f179cb3560078cefccef105e8f1701210",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cc133e4f4bc225079198192623945bb872c08143",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f4b0295be9a3c4260de4585fac4062e602a88ac7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49576",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:33.243",
"lastModified": "2025-02-26T07:01:33.243",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:09:11.687",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,124 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv4: Se han corregido las ejecuciones de datos en torno a sysctl_fib_multipath_hash_fields. Al leer sysctl_fib_multipath_hash_fields, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.14",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "DF6D28E5-50E7-41DF-8C6B-9A607F116EC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/36f5b86f309b3b11295d087cd7433f1c897caf94",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/548d6678c4a3d43667e59686665f8674b82440a3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8895a9c2ac76fb9d3922fed4fe092c8ec5e5cccc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49577",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:33.333",
"lastModified": "2025-02-26T07:01:33.333",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:09:07.350",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,152 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: udp: Se ha corregido una ejecuci\u00f3n de datos en torno a sysctl_udp_l3mdev_accept. Al leer sysctl_udp_l3mdev_accept, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a su lector."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.11",
"versionEndExcluding": "5.4.208",
"matchCriteriaId": "ED1B4EB9-4060-42EF-A5C3-559416B24A87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.134",
"matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/3d72bb4188c708bb16758c60822fc4dda7a95174",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3f2ac2d6511bb0652abf4d7388d65bb9ff1c641c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cb0d28934ca10f99c47e2c6f451405d6c954fe48",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f39b03bd727a8fea62e82f10fe2e0d753b9930ff",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fcaef69c79ec222e55643e666b80b221e70fa6a8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49578",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:33.433",
"lastModified": "2025-02-26T07:01:33.433",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:20:41.973",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,138 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ip: Se han solucionado las ejecuciones de datos en torno a sysctl_ip_prot_sock. Se accede a sysctl_ip_prot_sock simult\u00e1neamente y siempre existe la posibilidad de una ejecuci\u00f3n de datos. Por lo tanto, todos los lectores y escritores necesitan una protecci\u00f3n b\u00e1sica para evitar la rotura de datos en la carga y el almacenamiento."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.11",
"versionEndExcluding": "5.10.134",
"matchCriteriaId": "71D7FCD0-3DCF-4145-9258-A2987C1B29FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/95724fe897a4ecf2be51452ef96e818568071664",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9add240f76af6d141d2eebd3a1558a0e503a993d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9b55c20f83369dd54541d9ddbe3a018a8377f451",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ef699813d99cc29e6e25c9f6da7766526cc8bd6e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49579",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:33.520",
"lastModified": "2025-02-26T07:01:33.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:09:03.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,124 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv4: Se han corregido las ejecuciones de datos en torno a sysctl_fib_multipath_hash_policy. Al leer sysctl_fib_multipath_hash_policy, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.12",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "AD9715C9-CE55-44EB-A22D-F7D2795B2137"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/21fb844bc1dc1461f5038d655aa1a14f39e13049",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7998c12a08c97cc26660532c9f90a34bd7d8da5a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/918ee6592ab9a2ff5316d06cfd4aaef60ccabec6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49580",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:33.610",
"lastModified": "2025-02-26T07:01:33.610",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:08:59.397",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,152 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv4: Se ha corregido una ejecuci\u00f3n de datos en torno a sysctl_fib_multipath_use_neigh. Al leer sysctl_fib_multipath_use_neigh, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a su lector."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.7",
"versionEndExcluding": "5.4.208",
"matchCriteriaId": "13BD9D6D-9015-4576-8691-F6EF142F0FCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.134",
"matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/14e996577ed2799a1ed6ffeb71c76d63acb28444",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6727f39e99e0f545d815edebb6c94228485427ec",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/87507bcb4f5de16bb419e9509d874f4db6c0ad0f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b8d345db03b4deffb4f04219a51d3b1e94171b76",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e045d672ba06e1d35bacb56374d350de0ac99066",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49582",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:33.807",
"lastModified": "2025-02-26T07:01:33.807",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:11:23.753",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,110 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dsa: fix NULL pointer dereference in dsa_port_reset_vlan_filtering La variable de iterador \"ds\" utilizada en dsa_port_reset_vlan_filtering() -> dsa_switch_for_each_port() sobrescribe el \"dp\" recibido como argumento, que luego se utiliza para llamar a dsa_port_vlan_filtering() correctamente. Como resultado, los conmutadores que ingresan a esa ruta de c\u00f3digo (los que tienen vlan_filtering_is_global=true) desreferenciar\u00e1n un dp no v\u00e1lido en dsa_port_reset_vlan_filtering() despu\u00e9s de abandonar un puente con reconocimiento de VLAN. Utilice una variable de iterador \"other_dp\" dedicada para evitar que esto suceda."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1699b4d502eda3c7ea4070debad3ee570b5091b1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3240e12fe203a3a79b9814e83327106b770ed7b0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49583",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:33.897",
"lastModified": "2025-02-26T07:01:33.897",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:21:21.147",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,159 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iavf: Se corrige la gesti\u00f3n de descriptores de recepci\u00f3n ficticios Se corrige la p\u00e9rdida de memoria causada por no manejar correctamente los descriptores de recepci\u00f3n ficticios. iavf_get_rx_buffer ahora establece el valor de retorno de rx_buffer para los descriptores de recepci\u00f3n ficticios. Sin este parche, cuando el hardware escribe un descriptor ficticio, iavf no liberar\u00eda la p\u00e1gina asignada para el b\u00fafer de recepci\u00f3n anterior. Este es un evento poco probable, pero a\u00fan puede suceder. [Jesse: mensaje de confirmaci\u00f3n modificado]"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.1.20",
"versionEndExcluding": "5.2",
"matchCriteriaId": "EC3742A3-C6ED-4C21-A58F-884ACEC9E36C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.2.3",
"versionEndExcluding": "5.4.208",
"matchCriteriaId": "4FD250FE-03DB-40C8-AE19-554AA79A120A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.134",
"matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2918419c06088f6709ceb543feb01752779ade4c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6edb818732fc05fda495f5b3a749bd1cee01398b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a9f49e0060301a9bfebeca76739158d0cf91cdf6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c6af94324911ef0846af1a5ce5e049ca736db34b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d88d59faf4e6f9cc4767664206afdb999b10ec77",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49585",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:34.080",
"lastModified": "2025-02-26T07:01:34.080",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:08:55.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,138 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se han corregido las ejecuciones de datos en torno a sysctl_tcp_fastopen_blackhole_timeout. Al leer sysctl_tcp_fastopen_blackhole_timeout, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.12",
"versionEndExcluding": "5.10.134",
"matchCriteriaId": "AD1C7832-881B-46D0-B04F-DEEDC40B1AF1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/021266ec640c7a4527e6cd4b7349a512b351de1d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0dc2f19d8c2636cebda7976b5ea40c6d69f0d891",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8afa5604e295046c02b79ccf9e2bbbf8d969d60e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a77a75a0e7f397550ab039f96115103e78dd5c69",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49586",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:34.167",
"lastModified": "2025-02-26T07:01:34.167",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:08:51.117",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,166 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se han corregido las ejecuciones de datos en torno a sysctl_tcp_fastopen. Al leer sysctl_tcp_fastopen, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.6",
"versionEndExcluding": "4.19.254",
"matchCriteriaId": "4FD943C4-AACA-4BF5-A8B7-8B2475F6C652"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.208",
"matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.134",
"matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/03da610696a32578fc4f986479341ce9d430df08",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/22938534c611136f35e2ca545bb668073ca5ef49",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/25d53d858a6c0b89a6e69e376c2a57c4f4c2c8cc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/448ab998947996a0a451f8229f19087964cf2670",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/539d9ab79eba3974b479cad61a8688c41fe62e12",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5a54213318c43f4009ae158347aa6016e3b9b55a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49587",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:34.260",
"lastModified": "2025-02-26T07:01:34.260",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:08:46.400",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,194 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se ha corregido una ejecuci\u00f3n de datos en torno a sysctl_tcp_notsent_lowat. Al leer sysctl_tcp_notsent_lowat, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a su lector."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.12",
"versionEndExcluding": "4.9.325",
"matchCriteriaId": "A3A70DD6-D2E6-4C07-87BE-FCC338F5BC3F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.10",
"versionEndExcluding": "4.14.290",
"matchCriteriaId": "1F023E37-5DAE-491D-9971-00FC089E8C7E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.254",
"matchCriteriaId": "56D38C39-4EB7-48A7-85D3-D4854AC7B3E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.208",
"matchCriteriaId": "58A5EC97-5FF0-4B0A-8074-2A5A57644D59"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.134",
"matchCriteriaId": "4B697B47-6B36-47E0-95DC-054EC4633DEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "13CF20C8-4DA9-4A21-AD13-7A5C22E5FB05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0f75343584ee474303e17efe0610bdd170af1d13",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/55be873695ed8912eb77ff46d1d1cadf028bd0f3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/62e56cfeb2ae4b53ae9ca24c80f54093250ce64a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/80d4d0c461674eea87f0977e12a2ecd334b9b79c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/91e21df688f8a75255ca9c459da39ac96300113a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c1b85c5a34294f7444c13bf828e0e84b0a0eed85",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e9362a993886613ef0284c2a4911c6017c97d803",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fd6f1284e380c377932186042ff0b5c987fb2b92",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49588",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:34.367",
"lastModified": "2025-02-26T07:01:34.367",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T21:08:40.567",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,131 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tcp: Se han corregido las ejecuciones de datos en torno a sysctl_tcp_migrate_req. Al leer sysctl_tcp_migrate_req, se puede modificar simult\u00e1neamente. Por lo tanto, debemos agregar READ_ONCE() a sus lectores."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10.188",
"versionEndExcluding": "5.11",
"matchCriteriaId": "6D42E8C7-CD33-432A-AC09-DC524C88ECE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.14",
"versionEndExcluding": "5.15.58",
"matchCriteriaId": "DF6D28E5-50E7-41DF-8C6B-9A607F116EC2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/4177f545895b1da08447a80692f30617154efa6e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6e569a11eea20a1ccebc3c4e6366bf0574a449e1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fcf6c6d8aeffebca66f37b17ef1b57112e5e09c1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49589",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:34.470",
"lastModified": "2025-02-26T07:01:34.470",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-10T20:47:27.720",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,172 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: igmp: Se corrigen las ejecuciones de datos en torno a sysctl_igmp_qrv. Al leer sysctl_igmp_qrv, se puede cambiar simult\u00e1neamente. Por lo tanto, necesitamos agregar READ_ONCE() a sus lectores. Esta prueba se puede empaquetar en un asistente, por lo que dichos cambios estar\u00e1n en la serie de seguimiento despu\u00e9s de que net se fusione con net-next. qrv ?: READ_ONCE(net->ipv4.sysctl_igmp_qrv);"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.18",
"versionEndExcluding": "4.19.255",
"matchCriteriaId": "A617EFB6-24F0-4201-BE74-5365BC7894AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.209",
"matchCriteriaId": "8A22815E-5E13-479C-8A92-BACF21F911EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.135",
"matchCriteriaId": "BB550DF5-C3A3-4009-A61F-C7293D5A081D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.59",
"matchCriteriaId": "79909FF8-3A4D-4569-8AB9-60BACD5CCD5C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.18.15",
"matchCriteriaId": "EAD6B571-194C-43A2-A4AB-F68F869D13BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A8C30C2D-F82D-4D37-AB48-D76ABFBD5377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "BF8547FC-C849-4F1B-804B-A93AE2F04A92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F3068028-F453-4A1C-B80F-3F5609ACEF60"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "2E9C0DB0-D349-489F-A3D6-B77214E93A8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc5:*:*:*:*:*:*",
"matchCriteriaId": "1A0DE3B7-0FFB-45AA-9BD6-19870CA7C6FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc6:*:*:*:*:*:*",
"matchCriteriaId": "00AE778B-BAEE-49EB-9F84-003B73D7862A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.19:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C178431E-AD82-4B3D-B70F-A273A02ABD5D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/8ebcc62c738f68688ee7c6fec2efe5bc6d3d7e60",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9eeb3a7702998bdccbfcc37997b5dd9215b9a7f7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b399ffafffba39f47b731b26a5da1dc0ffc4b3ad",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c2954671010cd1127d1ffa328c6e6f8e99930982",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c721324afc589f8ea54bae04756b150aeaae5fa4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e20dd1b0e0ea15bee1e528536a0840dba972ca0e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Mailing List",
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-49590",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:34.573",
"lastModified": "2025-03-10T20:23:01.223",
"lastModified": "2025-03-10T20:49:24.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-49591",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:34.667",
"lastModified": "2025-03-10T20:23:01.223",
"lastModified": "2025-03-10T20:50:02.120",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-49593",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:34.853",
"lastModified": "2025-03-10T20:23:01.223",
"lastModified": "2025-03-10T20:51:03.090",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-49594",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:34.947",
"lastModified": "2025-03-10T20:23:01.223",
"lastModified": "2025-03-10T20:51:45.677",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-49595",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:35.040",
"lastModified": "2025-03-10T20:23:01.223",
"lastModified": "2025-03-10T20:52:18.940",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-49596",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:35.133",
"lastModified": "2025-03-10T20:23:01.223",
"lastModified": "2025-03-10T20:52:57.903",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-49597",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:35.220",
"lastModified": "2025-03-10T20:23:01.223",
"lastModified": "2025-03-10T20:54:24.560",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-49598",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:35.310",
"lastModified": "2025-03-10T20:23:01.223",
"lastModified": "2025-03-10T20:53:46.410",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-49599",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:35.403",
"lastModified": "2025-03-10T20:23:01.223",
"lastModified": "2025-03-10T20:54:57.747",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20867",
"sourceIdentifier": "security@vmware.com",
"published": "2023-06-13T17:15:14.070",
"lastModified": "2024-11-21T07:41:43.433",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:43:28.317",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,7 +80,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25280",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-16T01:15:46.780",
"lastModified": "2024-11-21T07:49:22.837",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:49:10.030",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25717",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-13T20:15:10.973",
"lastModified": "2025-01-29T16:15:39.253",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:48:20.863",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27997",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-06-13T09:15:16.613",
"lastModified": "2024-11-21T07:53:53.957",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:40:57.323",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28229",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-04-11T21:15:23.387",
"lastModified": "2024-11-21T07:54:39.223",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:50:17.200",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -56,7 +56,7 @@
"description": [
{
"lang": "en",
"value": "CWE-662"
"value": "NVD-CWE-Other"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28252",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-04-11T21:15:25.137",
"lastModified": "2025-01-01T02:15:24.757",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:50:39.513",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28432",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-03-22T21:15:18.257",
"lastModified": "2024-11-21T07:55:03.283",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:49:25.103",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28434",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-03-22T21:15:18.427",
"lastModified": "2024-11-21T07:55:03.533",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:49:43.140",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29336",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:13.840",
"lastModified": "2024-11-21T07:56:53.257",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:36:29.143",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29357",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-06-14T00:15:09.903",
"lastModified": "2024-11-21T07:56:55.393",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:44:31.630",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29360",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-06-14T00:15:10.067",
"lastModified": "2024-11-21T07:56:55.787",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:45:37.843",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29492",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-11T05:15:07.393",
"lastModified": "2024-11-21T07:57:10.087",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:49:57.083",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32046",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-07-11T18:15:13.313",
"lastModified": "2025-01-01T02:15:42.747",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:45:52.913",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32049",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-07-11T18:15:13.430",
"lastModified": "2024-11-21T08:02:36.543",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:46:21.273",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32315",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-26T23:15:16.643",
"lastModified": "2024-11-21T08:03:05.767",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:36:57.097",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3357",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-28T22:15:09.587",
"lastModified": "2024-11-21T08:17:05.570",
"lastModified": "2025-03-10T21:15:38.650",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3358",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-28T22:15:09.647",
"lastModified": "2024-11-21T08:17:05.693",
"lastModified": "2025-03-10T21:15:39.320",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3439",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2023-06-28T21:15:10.517",
"lastModified": "2024-11-21T08:17:16.167",
"lastModified": "2025-03-10T21:15:39.513",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3519",
"sourceIdentifier": "secure@citrix.com",
"published": "2023-07-19T18:15:11.513",
"lastModified": "2025-02-13T17:16:57.200",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:46:43.453",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36845",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-08-17T20:15:10.360",
"lastModified": "2025-02-13T17:16:43.583",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:31:09.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38180",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T19:15:10.367",
"lastModified": "2025-02-26T17:15:21.023",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:30:38.527",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40044",
"sourceIdentifier": "security@progress.com",
"published": "2023-09-27T15:18:57.307",
"lastModified": "2025-02-13T17:17:00.470",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:32:25.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42793",
"sourceIdentifier": "cve@jetbrains.com",
"published": "2023-09-19T17:15:08.330",
"lastModified": "2024-12-16T12:15:04.797",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:32:11.460",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -150,7 +150,11 @@
},
{
"url": "https://www.sonarsource.com/blog/teamcity-vulnerability/",
"source": "cve@jetbrains.com"
"source": "cve@jetbrains.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "http://packetstormsecurity.com/files/174860/JetBrains-TeamCity-Unauthenticated-Remote-Code-Execution.html",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4211",
"sourceIdentifier": "arm-security@arm.com",
"published": "2023-10-01T18:15:09.927",
"lastModified": "2025-02-04T15:15:17.480",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:32:41.700",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6345",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-29T12:15:07.077",
"lastModified": "2025-02-03T14:15:37.710",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:33:27.970",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7024",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-12-21T23:15:11.213",
"lastModified": "2025-02-03T14:15:37.920",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:33:38.570",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7101",
"sourceIdentifier": "mandiant-cve@google.com",
"published": "2023-12-24T22:15:07.983",
"lastModified": "2025-02-13T18:16:12.690",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:23:08.703",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12356",
"sourceIdentifier": "13061848-ea10-403d-bd75-c83a022c2891",
"published": "2024-12-17T05:15:06.413",
"lastModified": "2025-02-17T21:15:10.327",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:27:00.663",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -135,7 +135,11 @@
},
{
"url": "https://attackerkb.com/topics/G5s8ZWAbYH/cve-2024-12356/rapid7-analysis",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20953",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-02-17T02:15:49.520",
"lastModified": "2025-02-25T02:00:02.097",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:23:29.163",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -99,7 +99,10 @@
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-096/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21413",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-02-13T18:16:00.137",
"lastModified": "2025-02-07T02:00:02.403",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:23:20.430",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -116,7 +116,10 @@
},
{
"url": "https://research.checkpoint.com/2024/the-risks-of-the-monikerlink-bug-in-microsoft-outlook-and-the-big-picture/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-32113",
"sourceIdentifier": "security@apache.org",
"published": "2024-05-08T15:15:10.227",
"lastModified": "2025-02-13T18:18:02.173",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:23:37.390",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-35250",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-06-11T17:16:02.650",
"lastModified": "2024-12-17T02:00:02.077",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:23:53.597",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -60,7 +60,7 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "NVD-CWE-Other"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4885",
"sourceIdentifier": "security@progress.com",
"published": "2024-06-25T20:15:12.970",
"lastModified": "2025-03-04T02:00:01.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:24:16.363",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50302",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-11-19T02:16:32.320",
"lastModified": "2025-03-05T02:00:02.390",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:26:51.137",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -22,7 +22,7 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
@ -30,9 +30,9 @@
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -86,6 +86,21 @@
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
},
{
"nodes": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50623",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-28T00:15:03.657",
"lastModified": "2024-12-23T06:15:06.357",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-10T20:25:14.940",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-56191",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2025-03-10T21:15:39.880",
"lastModified": "2025-03-10T21:15:39.880",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In dhd_process_full_gscan_result of dhd_pno.c, there is a possible EoP due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/docs/security/bulletin/pixel-watch/2025/2025-03-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-56192",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2025-03-10T21:15:40.007",
"lastModified": "2025-03-10T21:15:40.007",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In wl_notify_gscan_event of wl_cfgscan.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/docs/security/bulletin/pixel-watch/2025/2025-03-01",
"source": "dsap-vuln-management@google.com"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-0660",
"sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
"published": "2025-03-10T21:15:40.110",
"lastModified": "2025-03-10T21:15:40.110",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Concrete CMS versions 9.0.0 through 9.3.9 are affected by a stored XSS in Folder Function.The \"Add Folder\" functionality lacks input sanitization, allowing a rogue admin to inject XSS payloads as folder names.\u00a0\u00a0The Concrete CMS security team gave this vulnerability a CVSS 4.0 Score of 4.8 with vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N. Versions below 9 are not affected. Thanks, Alfin Joseph\u00a0for reporting."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://documentation.concretecms.org/9-x/developers/introduction/version-history/940-release-notes",
"source": "ff5b8ace-8b95-4078-9743-eac1ca5451de"
},
{
"url": "https://github.com/concretecms/bedrock/pull/370",
"source": "ff5b8ace-8b95-4078-9743-eac1ca5451de"
},
{
"url": "https://github.com/concretecms/concretecms/pull/12454",
"source": "ff5b8ace-8b95-4078-9743-eac1ca5451de"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-1920",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-03-10T21:15:40.280",
"lastModified": "2025-03-10T21:15:40.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Type Confusion in V8 in Google Chrome prior to 134.0.6998.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
}
],
"metrics": {},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_10.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/398065918",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-2135",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-03-10T21:15:40.613",
"lastModified": "2025-03-10T21:15:40.613",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Type Confusion in V8 in Google Chrome prior to 134.0.6998.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
}
],
"metrics": {},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_10.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/400052777",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-2136",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-03-10T21:15:40.730",
"lastModified": "2025-03-10T21:15:40.730",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Inspector in Google Chrome prior to 134.0.6998.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)"
}
],
"metrics": {},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_10.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/395032416",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2025-2137",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-03-10T21:15:40.857",
"lastModified": "2025-03-10T21:15:40.857",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Out of bounds read in V8 in Google Chrome prior to 134.0.6998.88 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)"
}
],
"metrics": {},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_10.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/398999390",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-25907",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-10T22:15:26.533",
"lastModified": "2025-03-10T22:15:26.533",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "tianti v2.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /user/ajax/save. This vulnerability allows attackers to execute arbitrary operations via a crafted GET or POST request."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/xujeff/tianti/issues/39",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-25908",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-10T22:15:27.150",
"lastModified": "2025-03-10T22:15:27.150",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A stored cross-site scripting (XSS) vulnerability in tianti v2.3 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the coverImageURL parameter at /article/ajax/save."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/xujeff/tianti/issues/40",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-27910",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-10T22:15:27.287",
"lastModified": "2025-03-10T22:15:27.287",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "tianti v2.3 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component /user/ajax/upd/status. This vulnerability allows attackers to execute arbitrary operations via a crafted GET or POST request."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/xujeff/tianti/issues/39",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-27913",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-10T20:15:14.500",
"lastModified": "2025-03-10T20:15:14.500",
"lastModified": "2025-03-10T21:15:40.430",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,64 @@
"value": "Passbolt API before 5, if the server is misconfigured (with an incorrect installation process and disregarding of Health Check results), can send email messages with a domain name taken from an attacker-controlled HTTP Host header."
}
],
"metrics": {},
"metrics": {
"cvssMetricV40": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 2.1,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "LOW",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-348"
}
]
}
],
"references": [
{
"url": "https://www.passbolt.com/incidents/host-header-injection",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-10T21:00:20.174126+00:00
2025-03-10T23:00:19.793525+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-10T20:23:01.223000+00:00
2025-03-10T22:15:27.287000+00:00
```
### Last Data Feed Release
@ -33,69 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
284652
284662
```
### CVEs added in the last Commit
Recently added CVEs: `25`
Recently added CVEs: `10`
- [CVE-2022-43454](CVE-2022/CVE-2022-434xx/CVE-2022-43454.json) (`2025-03-10T20:15:13.593`)
- [CVE-2022-48610](CVE-2022/CVE-2022-486xx/CVE-2022-48610.json) (`2025-03-10T20:15:13.713`)
- [CVE-2024-44179](CVE-2024/CVE-2024-441xx/CVE-2024-44179.json) (`2025-03-10T19:15:37.960`)
- [CVE-2024-44192](CVE-2024/CVE-2024-441xx/CVE-2024-44192.json) (`2025-03-10T19:15:38.080`)
- [CVE-2024-44227](CVE-2024/CVE-2024-442xx/CVE-2024-44227.json) (`2025-03-10T19:15:38.187`)
- [CVE-2024-54463](CVE-2024/CVE-2024-544xx/CVE-2024-54463.json) (`2025-03-10T19:15:38.290`)
- [CVE-2024-54467](CVE-2024/CVE-2024-544xx/CVE-2024-54467.json) (`2025-03-10T19:15:38.387`)
- [CVE-2024-54469](CVE-2024/CVE-2024-544xx/CVE-2024-54469.json) (`2025-03-10T19:15:38.493`)
- [CVE-2024-54473](CVE-2024/CVE-2024-544xx/CVE-2024-54473.json) (`2025-03-10T19:15:38.600`)
- [CVE-2024-54546](CVE-2024/CVE-2024-545xx/CVE-2024-54546.json) (`2025-03-10T19:15:38.697`)
- [CVE-2024-54558](CVE-2024/CVE-2024-545xx/CVE-2024-54558.json) (`2025-03-10T19:15:38.790`)
- [CVE-2024-54560](CVE-2024/CVE-2024-545xx/CVE-2024-54560.json) (`2025-03-10T19:15:38.883`)
- [CVE-2024-56184](CVE-2024/CVE-2024-561xx/CVE-2024-56184.json) (`2025-03-10T19:15:38.983`)
- [CVE-2024-56185](CVE-2024/CVE-2024-561xx/CVE-2024-56185.json) (`2025-03-10T19:15:39.097`)
- [CVE-2024-56186](CVE-2024/CVE-2024-561xx/CVE-2024-56186.json) (`2025-03-10T19:15:39.193`)
- [CVE-2024-56187](CVE-2024/CVE-2024-561xx/CVE-2024-56187.json) (`2025-03-10T19:15:39.293`)
- [CVE-2024-56188](CVE-2024/CVE-2024-561xx/CVE-2024-56188.json) (`2025-03-10T19:15:39.393`)
- [CVE-2025-22603](CVE-2025/CVE-2025-226xx/CVE-2025-22603.json) (`2025-03-10T19:15:39.970`)
- [CVE-2025-25306](CVE-2025/CVE-2025-253xx/CVE-2025-25306.json) (`2025-03-10T19:15:40.230`)
- [CVE-2025-26695](CVE-2025/CVE-2025-266xx/CVE-2025-26695.json) (`2025-03-10T19:15:40.567`)
- [CVE-2025-26696](CVE-2025/CVE-2025-266xx/CVE-2025-26696.json) (`2025-03-10T19:15:40.670`)
- [CVE-2025-27136](CVE-2025/CVE-2025-271xx/CVE-2025-27136.json) (`2025-03-10T19:15:40.770`)
- [CVE-2025-27615](CVE-2025/CVE-2025-276xx/CVE-2025-27615.json) (`2025-03-10T19:15:40.917`)
- [CVE-2025-27616](CVE-2025/CVE-2025-276xx/CVE-2025-27616.json) (`2025-03-10T19:15:41.080`)
- [CVE-2025-27913](CVE-2025/CVE-2025-279xx/CVE-2025-27913.json) (`2025-03-10T20:15:14.500`)
- [CVE-2024-56191](CVE-2024/CVE-2024-561xx/CVE-2024-56191.json) (`2025-03-10T21:15:39.880`)
- [CVE-2024-56192](CVE-2024/CVE-2024-561xx/CVE-2024-56192.json) (`2025-03-10T21:15:40.007`)
- [CVE-2025-0660](CVE-2025/CVE-2025-06xx/CVE-2025-0660.json) (`2025-03-10T21:15:40.110`)
- [CVE-2025-1920](CVE-2025/CVE-2025-19xx/CVE-2025-1920.json) (`2025-03-10T21:15:40.280`)
- [CVE-2025-2135](CVE-2025/CVE-2025-21xx/CVE-2025-2135.json) (`2025-03-10T21:15:40.613`)
- [CVE-2025-2136](CVE-2025/CVE-2025-21xx/CVE-2025-2136.json) (`2025-03-10T21:15:40.730`)
- [CVE-2025-2137](CVE-2025/CVE-2025-21xx/CVE-2025-2137.json) (`2025-03-10T21:15:40.857`)
- [CVE-2025-25907](CVE-2025/CVE-2025-259xx/CVE-2025-25907.json) (`2025-03-10T22:15:26.533`)
- [CVE-2025-25908](CVE-2025/CVE-2025-259xx/CVE-2025-25908.json) (`2025-03-10T22:15:27.150`)
- [CVE-2025-27910](CVE-2025/CVE-2025-279xx/CVE-2025-27910.json) (`2025-03-10T22:15:27.287`)
### CVEs modified in the last Commit
Recently modified CVEs: `34`
Recently modified CVEs: `86`
- [CVE-2022-49596](CVE-2022/CVE-2022-495xx/CVE-2022-49596.json) (`2025-03-10T20:23:01.223`)
- [CVE-2022-49597](CVE-2022/CVE-2022-495xx/CVE-2022-49597.json) (`2025-03-10T20:23:01.223`)
- [CVE-2022-49598](CVE-2022/CVE-2022-495xx/CVE-2022-49598.json) (`2025-03-10T20:23:01.223`)
- [CVE-2022-49599](CVE-2022/CVE-2022-495xx/CVE-2022-49599.json) (`2025-03-10T20:23:01.223`)
- [CVE-2023-0043](CVE-2023/CVE-2023-00xx/CVE-2023-0043.json) (`2025-03-10T19:15:36.813`)
- [CVE-2023-0278](CVE-2023/CVE-2023-02xx/CVE-2023-0278.json) (`2025-03-10T19:15:36.980`)
- [CVE-2023-0279](CVE-2023/CVE-2023-02xx/CVE-2023-0279.json) (`2025-03-10T19:15:37.140`)
- [CVE-2023-0331](CVE-2023/CVE-2023-03xx/CVE-2023-0331.json) (`2025-03-10T19:15:37.300`)
- [CVE-2023-0535](CVE-2023/CVE-2023-05xx/CVE-2023-0535.json) (`2025-03-10T19:15:37.457`)
- [CVE-2023-24045](CVE-2023/CVE-2023-240xx/CVE-2023-24045.json) (`2025-03-10T19:15:37.617`)
- [CVE-2024-27768](CVE-2024/CVE-2024-277xx/CVE-2024-27768.json) (`2025-03-10T18:34:58.663`)
- [CVE-2024-27769](CVE-2024/CVE-2024-277xx/CVE-2024-27769.json) (`2025-03-10T18:34:58.663`)
- [CVE-2024-27770](CVE-2024/CVE-2024-277xx/CVE-2024-27770.json) (`2025-03-10T18:34:58.663`)
- [CVE-2024-27771](CVE-2024/CVE-2024-277xx/CVE-2024-27771.json) (`2025-03-10T18:34:58.663`)
- [CVE-2024-27772](CVE-2024/CVE-2024-277xx/CVE-2024-27772.json) (`2025-03-10T18:34:58.663`)
- [CVE-2024-27773](CVE-2024/CVE-2024-277xx/CVE-2024-27773.json) (`2025-03-10T18:34:58.663`)
- [CVE-2024-27774](CVE-2024/CVE-2024-277xx/CVE-2024-27774.json) (`2025-03-10T18:34:58.663`)
- [CVE-2024-55581](CVE-2024/CVE-2024-555xx/CVE-2024-55581.json) (`2025-03-10T20:15:13.987`)
- [CVE-2025-0604](CVE-2025/CVE-2025-06xx/CVE-2025-0604.json) (`2025-03-10T19:15:39.487`)
- [CVE-2025-1015](CVE-2025/CVE-2025-10xx/CVE-2025-1015.json) (`2025-03-10T19:15:39.590`)
- [CVE-2025-1391](CVE-2025/CVE-2025-13xx/CVE-2025-1391.json) (`2025-03-10T19:15:39.860`)
- [CVE-2025-24813](CVE-2025/CVE-2025-248xx/CVE-2025-24813.json) (`2025-03-10T19:15:40.123`)
- [CVE-2025-25614](CVE-2025/CVE-2025-256xx/CVE-2025-25614.json) (`2025-03-10T20:15:14.280`)
- [CVE-2025-25620](CVE-2025/CVE-2025-256xx/CVE-2025-25620.json) (`2025-03-10T19:15:40.393`)
- [CVE-2025-27636](CVE-2025/CVE-2025-276xx/CVE-2025-27636.json) (`2025-03-10T19:15:41.240`)
- [CVE-2023-29492](CVE-2023/CVE-2023-294xx/CVE-2023-29492.json) (`2025-03-10T20:49:57.083`)
- [CVE-2023-32046](CVE-2023/CVE-2023-320xx/CVE-2023-32046.json) (`2025-03-10T20:45:52.913`)
- [CVE-2023-32049](CVE-2023/CVE-2023-320xx/CVE-2023-32049.json) (`2025-03-10T20:46:21.273`)
- [CVE-2023-32315](CVE-2023/CVE-2023-323xx/CVE-2023-32315.json) (`2025-03-10T20:36:57.097`)
- [CVE-2023-3357](CVE-2023/CVE-2023-33xx/CVE-2023-3357.json) (`2025-03-10T21:15:38.650`)
- [CVE-2023-3358](CVE-2023/CVE-2023-33xx/CVE-2023-3358.json) (`2025-03-10T21:15:39.320`)
- [CVE-2023-3439](CVE-2023/CVE-2023-34xx/CVE-2023-3439.json) (`2025-03-10T21:15:39.513`)
- [CVE-2023-3519](CVE-2023/CVE-2023-35xx/CVE-2023-3519.json) (`2025-03-10T20:46:43.453`)
- [CVE-2023-36845](CVE-2023/CVE-2023-368xx/CVE-2023-36845.json) (`2025-03-10T20:31:09.807`)
- [CVE-2023-38180](CVE-2023/CVE-2023-381xx/CVE-2023-38180.json) (`2025-03-10T20:30:38.527`)
- [CVE-2023-40044](CVE-2023/CVE-2023-400xx/CVE-2023-40044.json) (`2025-03-10T20:32:25.380`)
- [CVE-2023-4211](CVE-2023/CVE-2023-42xx/CVE-2023-4211.json) (`2025-03-10T20:32:41.700`)
- [CVE-2023-42793](CVE-2023/CVE-2023-427xx/CVE-2023-42793.json) (`2025-03-10T20:32:11.460`)
- [CVE-2023-6345](CVE-2023/CVE-2023-63xx/CVE-2023-6345.json) (`2025-03-10T20:33:27.970`)
- [CVE-2023-7024](CVE-2023/CVE-2023-70xx/CVE-2023-7024.json) (`2025-03-10T20:33:38.570`)
- [CVE-2023-7101](CVE-2023/CVE-2023-71xx/CVE-2023-7101.json) (`2025-03-10T20:23:08.703`)
- [CVE-2024-12356](CVE-2024/CVE-2024-123xx/CVE-2024-12356.json) (`2025-03-10T20:27:00.663`)
- [CVE-2024-20953](CVE-2024/CVE-2024-209xx/CVE-2024-20953.json) (`2025-03-10T20:23:29.163`)
- [CVE-2024-21413](CVE-2024/CVE-2024-214xx/CVE-2024-21413.json) (`2025-03-10T20:23:20.430`)
- [CVE-2024-32113](CVE-2024/CVE-2024-321xx/CVE-2024-32113.json) (`2025-03-10T20:23:37.390`)
- [CVE-2024-35250](CVE-2024/CVE-2024-352xx/CVE-2024-35250.json) (`2025-03-10T20:23:53.597`)
- [CVE-2024-4885](CVE-2024/CVE-2024-48xx/CVE-2024-4885.json) (`2025-03-10T20:24:16.363`)
- [CVE-2024-50302](CVE-2024/CVE-2024-503xx/CVE-2024-50302.json) (`2025-03-10T20:26:51.137`)
- [CVE-2024-50623](CVE-2024/CVE-2024-506xx/CVE-2024-50623.json) (`2025-03-10T20:25:14.940`)
- [CVE-2025-27913](CVE-2025/CVE-2025-279xx/CVE-2025-27913.json) (`2025-03-10T21:15:40.430`)
## Download and Usage

View File

@ -202490,8 +202490,8 @@ CVE-2022-34902,0,0,3bca642036a7f5fbef7abb4384927b60af66690baf9b9711fd545cc79d136
CVE-2022-34903,0,0,a6056b96bd3a0cfd0bd50472138c4b711587fbfdb78b1d8479eb2f1688841410,2024-11-21T07:10:24.240000
CVE-2022-34906,0,0,e6188b730417ea61c7bb7ebf52009083f4a7cb4dbce27bcd12f7111ffbae3126,2024-11-21T07:10:24.403000
CVE-2022-34907,0,0,ceabaecfcd29722392613503a6dc95f58160d8752bb3f51814dd29617e749a7f,2024-11-21T07:10:24.560000
CVE-2022-34908,0,1,5e12ce36c963472956dbda6f8a97613083077e8cd92d84246e075c0932a14f9b,2025-03-10T20:15:12.223000
CVE-2022-34909,0,1,5232a9c4826d42237b51a14d96442e54646e1c70d8c71434dfea40ea5952167c,2025-03-10T20:15:13.420000
CVE-2022-34908,0,0,5e12ce36c963472956dbda6f8a97613083077e8cd92d84246e075c0932a14f9b,2025-03-10T20:15:12.223000
CVE-2022-34909,0,0,5232a9c4826d42237b51a14d96442e54646e1c70d8c71434dfea40ea5952167c,2025-03-10T20:15:13.420000
CVE-2022-3491,0,0,94e4facd715fec8aed12661acb3c825fedb5971a07254be24c86884a36fcdb15,2024-11-21T07:19:38.590000
CVE-2022-34910,0,0,1717433a6fc9c9dbd5bb60b9aa780e013e52d2b13d36b4620a29b71e8ebf2385,2024-11-21T07:10:25.027000
CVE-2022-34911,0,0,2b8f360beec1e9ed0dc65bc72a6c470ab3baf20792ea009e579c965e20637f41,2024-11-21T07:10:25.193000
@ -209145,7 +209145,7 @@ CVE-2022-43450,0,0,ff11065ab1878411c86e121c204774be230efb1199a088374b23eb411b4ff
CVE-2022-43451,0,0,55c3f35c43cae6bb1ee37ca66ffdbe18c8660044f95b78328f16c704dbc3f474,2024-11-21T07:26:30.713000
CVE-2022-43452,0,0,c78276254f5f2218b7c77331235d9e2be37d8823bb5fc2252dcd20f8a5f4e515,2024-11-21T07:26:30.860000
CVE-2022-43453,0,0,4f8c5d12a19e347f8b683823fe4c9b502d990c3ba9469f4d44b1e31891759592,2024-11-21T07:26:30.987000
CVE-2022-43454,1,1,9fb2c37d468f43b1acd00beaca3f52f38b69e8944d324dd585b3b1b45d8d69c0,2025-03-10T20:15:13.593000
CVE-2022-43454,0,0,9fb2c37d468f43b1acd00beaca3f52f38b69e8944d324dd585b3b1b45d8d69c0,2025-03-10T20:15:13.593000
CVE-2022-43455,0,0,aaccf1a4be0effdcaae7be22449e0e567213a4864803d6bbd5e5433738917292,2024-11-21T07:26:31.147000
CVE-2022-43456,0,0,fbf810802e6cc72a9300d2ad1e1d21e5a78d5e972cf037e0fa480b8014daaec2,2024-11-21T07:26:31.287000
CVE-2022-43457,0,0,b586d9b5fcc21f59bbb92dab9cd16bed2028800e4d392addb7775ca1d72d60f3,2024-11-21T07:26:31.470000
@ -212064,7 +212064,7 @@ CVE-2022-4756,0,0,9e970853f5aac5d7f6051f102cceedd8f99418abe211ab6b4e2528e717d24f
CVE-2022-47560,0,0,5616db9aa528c40205c29824050b905c2e88ea51b1e926c93bed02b5e4ec18c6,2024-11-21T07:32:11.777000
CVE-2022-47561,0,0,454b37f7fd9c11c3656067782562c54987945e78afe479ca0f20e9d7f49ec371,2024-11-21T07:32:11.913000
CVE-2022-47562,0,0,64dac3d60c8b8f4b61b8e11f0539d75ff755f60ed046d7be0cc3bfc35090556c,2024-11-21T07:32:12.047000
CVE-2022-4757,0,1,330572b2a7a9b16380e3b74ff77c810eb772321907280c2d376b71a676376ea7,2025-03-10T19:15:35.827000
CVE-2022-4757,0,0,330572b2a7a9b16380e3b74ff77c810eb772321907280c2d376b71a676376ea7,2025-03-10T19:15:35.827000
CVE-2022-47577,0,0,9550a922f1829c9398ee175ef3ac239bec1ad3c7148c35d57f01a11d7f1789f1,2024-11-21T07:32:12.187000
CVE-2022-47578,0,0,37fbfce9feaf52d993443117ac1a6355cd7a044484cc92ee5e869312941de9d0,2024-11-21T07:32:12.360000
CVE-2022-4758,0,0,46b648ad13c452add0819ad569687b406e8aabbc253f4a165ea41d12a6100cca,2024-11-21T07:35:53.073000
@ -212428,7 +212428,7 @@ CVE-2022-48286,0,0,77447f216a75ff09875f502d3b5b8f406aecac089ebe16a6b1b5f93ee2e96
CVE-2022-48287,0,0,ffb9477554bfe338b59efc3476dab3f4d74daacb476ffb0f751ed5564e9297b5,2024-11-21T07:33:05.610000
CVE-2022-48288,0,0,53624dc7dedd158cf2e34bcf6d37d3940a853ce7cfc5079c02d9b9beb2969500,2024-11-21T07:33:05.757000
CVE-2022-48289,0,0,b5b366f7e746d95cd74726054f258dc90ba5d828687acb098d0143f33c425f64,2024-11-21T07:33:05.897000
CVE-2022-4829,0,1,e5f3aa7a40b91297255520e914921393171a19d737b7a0a40f3947128bdd2489,2025-03-10T19:15:36.653000
CVE-2022-4829,0,0,e5f3aa7a40b91297255520e914921393171a19d737b7a0a40f3947128bdd2489,2025-03-10T19:15:36.653000
CVE-2022-48290,0,0,a18a7f7669377ff6d4a7ef738b38d89f2aa8b56899df8cbcaaa74e53e24c5978,2024-11-21T07:33:06.020000
CVE-2022-48291,0,0,8898f1361b36f884e0d5e61d1f210ce1c6d76bbf224f42fe249a9b0dd9df6ef5,2024-11-21T07:33:06.130000
CVE-2022-48292,0,0,4580e619ac80f5659a384b768187cc9d60d1eda7933d4c8a5ea11acef9450061,2024-11-21T07:33:06.260000
@ -212696,7 +212696,7 @@ CVE-2022-48604,0,0,b7085c3e4c6adaacb59f90e568dbbe0fd9c06f7150463b110ec956aae9dc3
CVE-2022-48605,0,0,62f58b311b31fd8465a30a0bc5b8c82e376d99607d50375aa101cb7b2383ea3c,2024-11-21T07:33:35.530000
CVE-2022-48606,0,0,406e74247ad44cf112fb89f83e3e3f708a37c22bdaa01292c5e45f29abdc351c,2024-11-21T07:33:35.700000
CVE-2022-4861,0,0,a170409b4bf98e036db6bbfc40d9107c61b3e888b36d479ce20ddb5f42750f64,2024-11-21T07:36:05.410000
CVE-2022-48610,1,1,064a0e19b62835266df3de1774515e037a71602b0c20d923ead2e0367f793b76,2025-03-10T20:15:13.713000
CVE-2022-48610,0,0,064a0e19b62835266df3de1774515e037a71602b0c20d923ead2e0367f793b76,2025-03-10T20:15:13.713000
CVE-2022-48611,0,0,edb96bcc230613f04296301d36f37901e8c9cc7fc1a031d550e89cb344ecc1ff,2024-12-10T17:47:45.803000
CVE-2022-48612,0,0,802646f609529dc06dd420914440c6667cb9853a2db61b3df6c56ea4499d0364,2024-11-21T07:33:36.023000
CVE-2022-48613,0,0,f19248d408abb6a259b3538f5dd278f855308ef500cbd68b02542fb29cae9932,2024-11-21T07:33:36.170000
@ -213693,34 +213693,34 @@ CVE-2022-49523,0,0,b94acdf4ed6bf2aef378931d2ef10961bc46d104c08632b6ffb955e53601d
CVE-2022-49524,0,0,0bfed2867487ff92cc56ed47659d7818f127e879b6f8c23632dce55f96f2b788,2025-02-27T19:15:45.433000
CVE-2022-49525,0,0,981facbe77820bc63be37056597f6bd0c13283c2aefe388263621a35ac5e726c,2025-02-26T07:01:28.500000
CVE-2022-49526,0,0,5339b66753ad80fb9a756eb170f85cfe6377c30292ade6b3738883eee6d81737,2025-02-26T07:01:28.593000
CVE-2022-49527,0,0,31456b1b10252a571a0f7523a4fb3b47b0ce368ba049afb0ae01afc209008b1d,2025-02-26T07:01:28.690000
CVE-2022-49527,0,1,8960d347d57916d69084b31394fa7ed486a2d4f2b204cbb50324b6ae797bfbcd,2025-03-10T21:16:33.907000
CVE-2022-49528,0,0,67606282969aaa2b31505ca97d9477cc42eb7b22bad60f6f77b8d75889efc840,2025-02-26T07:01:28.780000
CVE-2022-49529,0,0,8689026a1d77025340bdb3f3c57743e734124523e8df8834bc5da9018038fe54,2025-02-26T07:01:28.873000
CVE-2022-49529,0,1,110bb85d799d2ce406406d16d1b63206a0f1424fc60756da765a63ddb0e52700,2025-03-10T21:16:19.747000
CVE-2022-4953,0,0,e04a15b779bfbe898a916a95d05683f7f5f4c144cc0c5cedf2ea84fbc775f5f1,2024-11-21T07:36:19.067000
CVE-2022-49530,0,0,47a397e0c01d1145c9e68c4e5fb8ad3d6cf93316839bd849d0afa9de77c4514f,2025-02-26T07:01:28.967000
CVE-2022-49530,0,1,a40567a04bf85f44ab3b7c7262af6e8a31a626ef3978bc57d72c75d9cbe858d5,2025-03-10T21:15:50.760000
CVE-2022-49531,0,0,6f7df9b8ade4346efdbb7009fb0918c28cc6d52db9e2b58402a4cbb94ad977b7,2025-02-26T07:01:29.067000
CVE-2022-49532,0,0,94d5ff4fc61833102a7b8fbc940fee18275fc1e57c304383247500e2c0ecef4f,2025-02-26T07:01:29.170000
CVE-2022-49532,0,1,916409139d811d7fdf32675effef257c21e90c8395ed7322ebb87668e1c875a1,2025-03-10T21:15:19.063000
CVE-2022-49533,0,0,e80337bcb9c0881aa9f0a3bd03f41eefd6c9615b38b434713fc87e091747fa6f,2025-02-26T07:01:29.293000
CVE-2022-49534,0,0,721ea208289ef1668f018b3eb2dde36e42f39a1e7637063c7f28d8226981c151,2025-02-26T07:01:29.400000
CVE-2022-49534,0,1,7fcf4ab521a1d7a958aa1cac28f74c90ccff0609507fcd5ccb14a9c117498513,2025-03-10T21:30:31.113000
CVE-2022-49535,0,0,92cab0cd39cfef2a55835e1ebf7d99723233351d9e8f9dc3382724c7f95e01f1,2025-02-27T19:15:45.573000
CVE-2022-49536,0,0,e12ce931c66209fc9bc3949c5b3b79e06b4dd90c26290f7645b68c0e2f3c102f,2025-02-26T07:01:29.580000
CVE-2022-49536,0,1,c077c8937d70ffab2a1f8104c61f7d258ea872dd1e2f7d23e6c4802453c10d3a,2025-03-10T21:30:26.823000
CVE-2022-49537,0,0,89955c5c15297ddc3d4a900be6d2d64c3ca5d393c27e7504de7e55af92e676ab,2025-02-26T07:01:29.667000
CVE-2022-49538,0,0,9cdab7811c29220ab0b728a88ab160b531922e6764dfb80eac562ee4f6e72d55,2025-02-26T07:01:29.760000
CVE-2022-49538,0,1,909c1f4ad3e7b56fc8d60cce4a04cddefb2f1de62518aee0266db3d112687d89,2025-03-10T21:14:28.543000
CVE-2022-49539,0,0,9abf8fdb7a0343623ef24e9040650b02834e07ba8ddb3e6cf863ee05e9cdaa66,2025-02-26T07:01:29.857000
CVE-2022-4954,0,0,3d35faeb50ff70fc83ed96ba4420fbc0348e83af9bccccd35fe117bc65a97504,2024-11-21T07:36:19.187000
CVE-2022-49540,0,0,f5f5eb0e41a09add2ea5b919e3860861f03bbedd77dcfde124c746425104115e,2025-02-26T07:01:29.947000
CVE-2022-49541,0,0,b2296039e33b99211613e46b9d0d4233c537e0817cdfceabe669e4a4f0762186,2025-02-26T07:01:30.043000
CVE-2022-49542,0,0,b6f252d76346d9e307100d26351ee554c9faeec47be2a3bb27e66036ba29674f,2025-02-26T07:01:30.133000
CVE-2022-49541,0,1,54f8258b1d65f2766935e7ef7c07a0048e708945c51514c7e7a39f12a7cc933b,2025-03-10T21:31:11.947000
CVE-2022-49542,0,1,863a703007a9c0e9dbcb00e8e45a44701779a89376fd639be008eff59f4041d9,2025-03-10T21:31:15.750000
CVE-2022-49543,0,0,a2ff81fe4ecfd6d2c99f742689972c0459a5cc013925198ed509c20be2719fe3,2025-02-26T07:01:30.220000
CVE-2022-49544,0,0,b269162714fad49db756668cd97f37b5f4d33aaa6828e7bff75ead6a2acbe2e1,2025-02-26T07:01:30.313000
CVE-2022-49544,0,1,5988bb26e2e446b290393c3cc9bf778787200e992f2f045eed77ba96a746c13b,2025-03-10T21:14:07.310000
CVE-2022-49545,0,0,b15dc44bc69453ab505d9e12bbaa1084c25940152f37f845605fc32cd0bb5d2b,2025-02-26T07:01:30.410000
CVE-2022-49546,0,0,7f8684c96998813c09b86e51eeae83cef4f6b68e267a0e325652ed2fc6c8a5d0,2025-02-26T07:01:30.500000
CVE-2022-49547,0,0,d4defc86e2363ca8afdc4ac90a9c1d499adc5683239ec0f2e6c7948d17c28de5,2025-02-26T07:01:30.590000
CVE-2022-49548,0,0,c95d42cb79c7d629faff5b699dea854e50455ebf18ac4b59cd2b80402f865ce8,2025-02-26T07:01:30.683000
CVE-2022-49549,0,0,4459fa625d2f61d7a968ab894fd182917fa820e9a1dc35014b7d0594f7e7c073,2025-02-26T07:01:30.773000
CVE-2022-49546,0,1,9db288b75a4bc37eda3f91457915a5f2cb19437085834c7170e6eb68d5a4aba6,2025-03-10T21:13:19.010000
CVE-2022-49547,0,1,bf91592a6ea9d3297ec475e4b4e1884ec82cd0f6e9372bcf754c0fc99e0b8008,2025-03-10T21:31:42.100000
CVE-2022-49548,0,1,538a83d5bcbbf07561692d7896fba478b67ca68a4698427f780db7881bcef0ce,2025-03-10T21:32:17.530000
CVE-2022-49549,0,1,074710b7b679b559935feb1d1793c1c13989b69406fd0db1afcbdf3fe4448af3,2025-03-10T21:22:55.893000
CVE-2022-4955,0,0,94df8e1948dbb5187c1ece47af6795f51d100c945ff4ef8af1e29d9575313920,2024-11-21T07:36:19.300000
CVE-2022-49550,0,0,2ab6c336eb52122ef28518e947bc4fbc556b44350cc2c27c1cabde267946af59,2025-02-26T07:01:30.863000
CVE-2022-49551,0,0,6eea955fbadf8fff97eaa1e6a1b2c03b9ba652d30748e9fb256aff58e7798c47,2025-02-26T07:01:30.950000
CVE-2022-49550,0,1,f2b2ab2e297da461d6a289de06eb12f25fa62cdc522180ec0f0700049e82f62d,2025-03-10T21:23:20.777000
CVE-2022-49551,0,1,caf376439ee4e4715ac4e27517c7d88ca53c5a28a41e2239731629ba06afa17a,2025-03-10T21:27:26.720000
CVE-2022-49552,0,0,f11c27e4e83d55bc6a4b43d73b66fccce60f2ae33db072582aed8afda75d2ace,2025-02-26T07:01:31.040000
CVE-2022-49553,0,0,772e59df9eafc84178e8fbd577b3acce3311378fd173eb34867b0a6e996987fb,2025-02-26T07:01:31.133000
CVE-2022-49554,0,0,0a34a3ac650254cb3dbd54b8422b1c5adcae22b4c4383ae36cc0c388c2f4ca81,2025-02-26T07:01:31.223000
@ -213730,49 +213730,49 @@ CVE-2022-49557,0,0,38a9ef5191d44200c06c66c46ec6d0c2e3a8bb943adbda5a5d7d1696f2d7f
CVE-2022-49558,0,0,daac90093d49c8372e444573abe119e8081a887b8d43470c5dabb6cb87a504ff,2025-02-26T07:01:31.597000
CVE-2022-49559,0,0,2d14c0fbbdaee85fbd444788c794ab884da113af56925a6fd30e8cd880f6bc1d,2025-02-26T07:01:31.687000
CVE-2022-4956,0,0,43d14a14df320488a03d84b995042cdf95aa3fb7ff65406b2df0e2b91a52a9a3,2024-11-21T07:36:19.420000
CVE-2022-49560,0,0,98a4136fcca252e1e2ff1b3931e39fe0b0949fc125619390e8528773f197ec99,2025-02-26T07:01:31.780000
CVE-2022-49560,0,1,f7c3028aafa421076b95e5c2bf3d153f3809af6aad83d1d0d1d9464b491c9c33,2025-03-10T21:25:29.677000
CVE-2022-49561,0,0,25ad39aa076e1bcf300a6537a852372a47057435c10de10a39571490ebbe9d4c,2025-02-26T07:01:31.877000
CVE-2022-49562,0,0,6314c278dd709f1ad88da8450e2c6c09af54c9ff27b760022aca36a1e76506c8,2025-02-26T07:01:31.970000
CVE-2022-49563,0,0,e647577800ffa6400a4a18beab7e745c11eb9ff79b9e1bd15ff0f624b986165f,2025-02-26T07:01:32.060000
CVE-2022-49564,0,0,9ec57663c1c43db786d5a0afa63b5c45413561c04b3a89667c3889a76fdec882,2025-02-26T07:01:32.150000
CVE-2022-49563,0,1,5b242cef609c94955b72010364a2f3f14d624a149536c64c0b40d5de22303ed0,2025-03-10T21:28:10.553000
CVE-2022-49564,0,1,ade076d839342ca50a601039dc343913f5f5aab7210063262bbf15e20cb7ddb4,2025-03-10T21:19:21.127000
CVE-2022-49565,0,0,ac3e04ce7d0c052b88c34a7c1e5024db2ecfab84cc13c36cccc937b804a38d1e,2025-02-26T07:01:32.240000
CVE-2022-49566,0,0,56971a0cad10b2c863953d7443e239ff63448842ac987801abc68e033424fa30,2025-02-26T07:01:32.333000
CVE-2022-49567,0,0,3b415a91e3a66e6da3781ebed9395e49cb7324876262910d16ad2aee0db78542,2025-02-26T07:01:32.420000
CVE-2022-49568,0,0,17e91ce62cf7c0fa7ac56ed868128a18075397026ab2a0b672826c29b2b07010,2025-02-26T07:01:32.517000
CVE-2022-49569,0,0,3d20598e3f82f9fdbe3204b04a2a4a47cef8c987ddd895061b1764fb4d2e752f,2025-02-26T07:01:32.607000
CVE-2022-49566,0,1,ec7fb64c8efc0d3a235416c56df114e5466fb1f2263a493ca2ba8f9bb87c265d,2025-03-10T21:19:26.347000
CVE-2022-49567,0,1,2c66b66a70200686b5026635503f9f6325a3babbf8a1a81a9e32d39b987110d4,2025-03-10T21:20:08.247000
CVE-2022-49568,0,1,d10c86a486359c5683f666456f3262dde9060be318967cdcfe20537ebd3015ec,2025-03-10T21:11:32.760000
CVE-2022-49569,0,1,f97533e65810728c0fad64add198da2de29113239ad89c320b444063eb5ad70a,2025-03-10T21:11:35.827000
CVE-2022-4957,0,0,0f59f801825d8335616db50df55384f4a214170b9e1eeee6c3796753d9651f88,2024-11-21T07:36:19.570000
CVE-2022-49570,0,0,124325303d535b4cd557c3ed0809fe196742dba47308c8abafab92a80da3d75d,2025-02-26T07:01:32.693000
CVE-2022-49571,0,0,27ed5c1736d8e496c0a6a348b2f3ad7ac65cd7fb7286b0025d11e9ecfa6561a0,2025-02-26T07:01:32.780000
CVE-2022-49572,0,0,ce49775144acc984a35c21f66344062872b2b2c2d39be92a51e08ef7e81f01bd,2025-02-26T07:01:32.877000
CVE-2022-49573,0,0,92514bc902c4efe9275eb63df558068e687344c06a60a6a28c7e4e003f81b3b6,2025-02-26T07:01:32.970000
CVE-2022-49574,0,0,29aea0bffd6b00ffecf952e7ce7e8aec6be016b76cfcc92a2fa7ea5f3cb0c79e,2025-02-26T07:01:33.063000
CVE-2022-49575,0,0,efaa16654f62adf14ac318eef98b56de039770a39835cec9c58119e5d48a3c55,2025-02-26T07:01:33.157000
CVE-2022-49576,0,0,f6ceb6c6347da5dcc1ca492ffeb7cff7e0cae7eb35e5276ab11ae3116f542b9f,2025-02-26T07:01:33.243000
CVE-2022-49577,0,0,4c198f80ccd4569a69d80b95cadec02fd7a8d05c9d20ee2b489898b1de59a8c8,2025-02-26T07:01:33.333000
CVE-2022-49578,0,0,a82d9d7480f07cf31e84728cf168241903c9064ff176db50638788f17d0ab085,2025-02-26T07:01:33.433000
CVE-2022-49579,0,0,4128bc7bd3cc55d6d2c8ed4a1cb3f28af01f5655dd7b93c8a800e5e7ffa4268f,2025-02-26T07:01:33.520000
CVE-2022-49570,0,1,f669ab3d7c430538fd14102b384fbd8b66cb84b923c8e41ba4d1e4080e05a330,2025-03-10T21:19:40.783000
CVE-2022-49571,0,1,313fb14bde6c75b9217dcb773f2cd43f742a3887170ad01bb313b434620524b3,2025-03-10T21:04:22.707000
CVE-2022-49572,0,1,0f1dbb16b35adfad04bbe5de84a7cdf4d843df742cf393d2aac992ea1365c5bb,2025-03-10T21:06:02.287000
CVE-2022-49573,0,1,570b0cd3d384d17339ed30c05ba08899a6a784cec5ff67319bc01f3fbf651a59,2025-03-10T21:06:23.280000
CVE-2022-49574,0,1,6ac29866c87d232f76a483d871bf38a2c2533369d094a41b9651a1d20d4841ed,2025-03-10T21:09:22.477000
CVE-2022-49575,0,1,0b307d001bebc97dd4a39d9c151d322ef96c68c97402bc2c41541d7da33bc6bc,2025-03-10T21:09:15.843000
CVE-2022-49576,0,1,7dd1ed64542c7e0ede5d83fcf3b5d364777ba8744d00c79428761e38c2f16797,2025-03-10T21:09:11.687000
CVE-2022-49577,0,1,5d9865701046cb9b934a2d9bd28ec7fc894abb80a2019bd41adab6cbbb263d7c,2025-03-10T21:09:07.350000
CVE-2022-49578,0,1,763ae2cd0f72340ceeba02bfd50eb20a5616a793a6ab0328d9623efbb89beea3,2025-03-10T21:20:41.973000
CVE-2022-49579,0,1,6cf81e930cb31b1451e1f75bf320b45a39af72ed49667a121a2484f7c13374b6,2025-03-10T21:09:03.167000
CVE-2022-4958,0,0,d6d6128b8fdd4a8fe744760bd37908b3ed213bef3370b8b8a46a12919160ac31,2024-11-21T07:36:19.707000
CVE-2022-49580,0,0,2df7db078932c74a6d69e2c6989d7f07119185065bf6230a55de7638c0476bc5,2025-02-26T07:01:33.610000
CVE-2022-49580,0,1,b267e5f1ff0aa435dfc45837955937396659c6b26dc2307a910b6c8652b1af6f,2025-03-10T21:08:59.397000
CVE-2022-49581,0,0,05efcc8772be9c6510c4c0ac471c31fc2b234f12de9236a552a715e84676dcaf,2025-02-26T07:01:33.703000
CVE-2022-49582,0,0,9cbe7774c9a3f50fa82b9373e99341c46c27a4eb110f7a516698754ae566c6df,2025-02-26T07:01:33.807000
CVE-2022-49583,0,0,4847dbb47b6a9a1afaea40e33a1c079840e770cafc21edf5f4a1249d9cbb92ca,2025-02-26T07:01:33.897000
CVE-2022-49582,0,1,ba38fb5e59db668fbd10c69508ad964e5080a2be7acbf6e54656ce702fda1a07,2025-03-10T21:11:23.753000
CVE-2022-49583,0,1,724367fbbd395308913f6db15fa515f8bfe03d02524be1f7bf6152d1d91a321c,2025-03-10T21:21:21.147000
CVE-2022-49584,0,0,c230661b2449e440c4ee0158ce975d92b2e0a1edb3638ddb3b5109cdecb54b9e,2025-02-26T07:01:33.987000
CVE-2022-49585,0,0,f259a45d52396142a327a607aaffb3c3f5f7b08593130f68a1ab70b7ab8c5cde,2025-02-26T07:01:34.080000
CVE-2022-49586,0,0,018cdb67992614e3b8aaef86f63708e76709361132b17cad1f7019f3eb32a41c,2025-02-26T07:01:34.167000
CVE-2022-49587,0,0,045dfa49579766af5db3b307fa6fccc91442356d8f98685bbe7c4c2e730f75b2,2025-02-26T07:01:34.260000
CVE-2022-49588,0,0,61d955ab8edf8015c7901b53731f628af50ead0b2b76583321c7b0f958fb72e4,2025-02-26T07:01:34.367000
CVE-2022-49589,0,0,900e3190f8a3d5f8bc6be01817c676f63f99de109c6e984e75613d4201a664b2,2025-02-26T07:01:34.470000
CVE-2022-49585,0,1,c3f38f23836ab6d0023363fe86d1c6127f076a629d1e13aba95bf5ac53a75fbf,2025-03-10T21:08:55.510000
CVE-2022-49586,0,1,f3bf3a18a939061cd935a25abe10ece330b72b97f441b4316cb7bb9580728e7e,2025-03-10T21:08:51.117000
CVE-2022-49587,0,1,8d776328159eba1869dd9e4e638b07bb337e4d441fb92ce92a91e94cacca47f3,2025-03-10T21:08:46.400000
CVE-2022-49588,0,1,c37d93005610b093186b015af5ff7b07fb8744fcb85331a37f159fe2f88890b3,2025-03-10T21:08:40.567000
CVE-2022-49589,0,1,d6a99dff68a85a22786e6ab14c25a79f61acc982c6b147e1bf0c4fe5df90b2fd,2025-03-10T20:47:27.720000
CVE-2022-4959,0,0,e1112e964cfdf0ebbfe3fa4005ae2e8c4f9c407689379dbe03328e96b22503f5,2024-11-21T07:36:19.850000
CVE-2022-49590,0,1,20cd3c2daa264623e56a323e402735c867806a89472d26c1ed45d8d3ae8e100c,2025-03-10T20:23:01.223000
CVE-2022-49591,0,1,0cc8543ea627147ea0bf828758a275a1f14ea9d390d5ffa1e7b74f404a8593b8,2025-03-10T20:23:01.223000
CVE-2022-49590,0,1,60e7e6f244fc68903dd4388c8bafc0c1c9e46d6ad90639e1899ce0995a9c4d9f,2025-03-10T20:49:24.353000
CVE-2022-49591,0,1,10b0547e467a05414098048c97aa4fda46c2188c9a08d9f153d6c61ef87e547e,2025-03-10T20:50:02.120000
CVE-2022-49592,0,0,82cbcad0c742056132cc73616877773fbc05caff75355128651869e0512e1e9b,2025-02-26T07:01:34.760000
CVE-2022-49593,0,1,a490d84d1db8d08c1bd74f1bbffbd14e057da73f802032361a953fc57bba4b2a,2025-03-10T20:23:01.223000
CVE-2022-49594,0,1,68c11eaa5cee315d2058915886cf4743aec7164a60d951e32eded865eae0e0a5,2025-03-10T20:23:01.223000
CVE-2022-49595,0,1,cb3cc118f10224c75b44427115256c50de660f489bf615954bd09294bb83f634,2025-03-10T20:23:01.223000
CVE-2022-49596,0,1,337ae6121adf3254b498227e6016c5ad49661dd3458af5805aaecedbb5c23a5e,2025-03-10T20:23:01.223000
CVE-2022-49597,0,1,087db79fce42e862ebc19f60a0cd8a4d276064edbfecda432de024386a2abe2b,2025-03-10T20:23:01.223000
CVE-2022-49598,0,1,4513ae3cbce03da98d4d53eb6584e35a52b0ecf09877c7c7fcd58e1e04f9ada3,2025-03-10T20:23:01.223000
CVE-2022-49599,0,1,dea4f25c68b18e3924ae0cebca86bba06c445790ab725462667c62f83f5b5d96,2025-03-10T20:23:01.223000
CVE-2022-49593,0,1,0bf16df4e5fa7c510269c25326fe752294298f8c0e4b60c1de49c68cbdd10e19,2025-03-10T20:51:03.090000
CVE-2022-49594,0,1,e390164d65dfea143aae054e5979a4042e104e0f4d938ce67fd6e01201abb99b,2025-03-10T20:51:45.677000
CVE-2022-49595,0,1,911558bcbe277a381125ed6bf9539c2a7829734652f34f805dc374e0dc6d117b,2025-03-10T20:52:18.940000
CVE-2022-49596,0,1,750c74e63db7dfe832e0afb46524886218abfd9d2f11d5a4fd2c5542ee6a6940,2025-03-10T20:52:57.903000
CVE-2022-49597,0,1,d3f2ecf8868faa06c21d62e0eeaf716550e9744346ec965d2cfe24b72f73b3b7,2025-03-10T20:54:24.560000
CVE-2022-49598,0,1,0c5d6ee9bcd37d136c5d104aaef1aeca929a53254984c1fc496cce5e79ba2ed7,2025-03-10T20:53:46.410000
CVE-2022-49599,0,1,c377488db28f4f0cfded79918129b539b71715ca2a4fd67cccd68abfec41a225,2025-03-10T20:54:57.747000
CVE-2022-4960,0,0,b445d73955b3452a42faaf28d577ad453defce902d7d2b7869afb976b59de9a5,2024-11-21T07:36:19.990000
CVE-2022-49600,0,0,647466d22b891d627008f8c35082b78b57ca04645a9e05693e095b90d2283105,2025-02-26T07:01:35.497000
CVE-2022-49601,0,0,82f26928b9b858df32635906b08bc3d0e34c32e5f4d185edb7cadc51b744f016,2025-02-26T07:01:35.603000
@ -213962,7 +213962,7 @@ CVE-2023-0039,0,0,d8fc5a260515ca8bf2d6438e2d24484997e6b69319da7eb48b0fdfda987637
CVE-2023-0040,0,0,1c92c868dbbb373cc9e61bd563e0122ca4213b995b7eceebca4ef72e2b010054,2024-11-21T07:36:26.600000
CVE-2023-0041,0,0,d5260d420f1cd6c78adae2a5f84b81d66b97bb4962628ebb0c02b41c604a1529,2024-11-21T07:36:26.710000
CVE-2023-0042,0,0,9b1a6decc351f08b4eff07cee0d8cf1c5c59713d547ae72a1b1cdb4625fb24f2,2024-11-21T07:36:26.833000
CVE-2023-0043,0,1,031c84811692a82611008aac09f88dda83efce96895b6668da129b218ebcdc29,2025-03-10T19:15:36.813000
CVE-2023-0043,0,0,031c84811692a82611008aac09f88dda83efce96895b6668da129b218ebcdc29,2025-03-10T19:15:36.813000
CVE-2023-0044,0,0,5e0b3bc76f4e520dfb3a7d3f8757c01f27c22cbe64833773e8a4716039c15539,2024-11-21T07:36:27.050000
CVE-2023-0045,0,0,0b3fb0f7f170c454540ecd2b56095b147720cad9a83cc54301e4003eb4127273,2025-02-13T17:15:52.813000
CVE-2023-0046,0,0,995378f3517e0fe9dc2a92e59c5d98c60ae6bf06c6bef581c852efaeae77bfee,2024-11-21T07:36:27.290000
@ -214192,8 +214192,8 @@ CVE-2023-0274,0,0,d60ba37cae3df4ead875e1bd4881c3c3e5cab916bb42514b120c67c76ba923
CVE-2023-0275,0,0,26528228f0128eb8424180f73455bee0ef2b1d74dc8f6cc9e2ae6480e47d86ee,2024-11-21T07:36:52.650000
CVE-2023-0276,0,0,c7487a428bcb8bea2b1c668b589a64212adff21c21ab0a4c676cd54cc33a9831,2025-02-04T19:15:26.810000
CVE-2023-0277,0,0,335310adc962a79f1b2c125aa5618dd097c178e21940b816151475451aa2db5a,2025-02-06T16:15:32.083000
CVE-2023-0278,0,1,c555eb49c5676bfc381ca3e12fd4f0c39327a3475f98576227c38717ad8564bf,2025-03-10T19:15:36.980000
CVE-2023-0279,0,1,07878339ce2c8cee0312df189d6a4014fdc30c693326a20296b9b6e697818c01,2025-03-10T19:15:37.140000
CVE-2023-0278,0,0,c555eb49c5676bfc381ca3e12fd4f0c39327a3475f98576227c38717ad8564bf,2025-03-10T19:15:36.980000
CVE-2023-0279,0,0,07878339ce2c8cee0312df189d6a4014fdc30c693326a20296b9b6e697818c01,2025-03-10T19:15:37.140000
CVE-2023-0280,0,0,692d930de0e5724c61f1163dd938405f66a86900dcfdf0110c3ccf4a10473b8e,2025-02-04T21:15:22.160000
CVE-2023-0281,0,0,8e30a1a5618f0b8fdeb50c2463b4f333a99800a52583fcaae701b5fe34e5aba8,2024-11-21T07:36:53.270000
CVE-2023-0282,0,0,79e3b3ee2574d36ad793a4966e13699bfd1b0009f4ae35ce6961b5a3208d93fe,2024-11-21T07:36:53.393000
@ -214244,7 +214244,7 @@ CVE-2023-0327,0,0,6167212aceb2c31f3e634ebdc5e2fe015ef028aba2344b99409195bff6437f
CVE-2023-0328,0,0,60a5e418def05aeec452bb62d499808225e4c06d3b621376c68675e29c3adf28,2025-03-06T16:15:39.403000
CVE-2023-0329,0,0,af8a57f60cebf22d5e961642189108c9b03a601bdcdaac0ddd34e75b44e97c27,2024-11-21T07:36:58.970000
CVE-2023-0330,0,0,0597b42289577da5a8502854ac2fe29c28b08c8707968cf90382e1363234f929,2024-11-21T07:36:59.077000
CVE-2023-0331,0,1,274bc1369cae7fe09b0ee22ff916b8e440be2bc931740cb608cdf750fdecd31d,2025-03-10T19:15:37.300000
CVE-2023-0331,0,0,274bc1369cae7fe09b0ee22ff916b8e440be2bc931740cb608cdf750fdecd31d,2025-03-10T19:15:37.300000
CVE-2023-0332,0,0,64542e438bcf827f156cc70cf5d07c1026d6770324516bf2f45d1e6076758c95,2024-11-21T07:36:59.323000
CVE-2023-0333,0,0,d93bc6bc1e86c850a7ca00b9aa76a2e4c088cb012f60fc9847e05a56a68ded9d,2024-11-21T07:36:59.453000
CVE-2023-0334,0,0,175a7982408f35d772ed00c5568ef62db28b9c60519c9ae85f03fb928679ffdc,2025-03-10T18:15:25.830000
@ -214437,7 +214437,7 @@ CVE-2023-0531,0,0,a2b5fd3930f524cb401e124ec5786010c9cad4c621114fd4abdc2acf74f299
CVE-2023-0532,0,0,72ca8898990fb8610307e6516d129fcf16189811012a79289b01f939cac9bf59,2024-11-21T07:37:21.400000
CVE-2023-0533,0,0,c178517ebefc16ee41a2f59036c34ccd760249657d48f36ef9ada635b640a8f4,2024-11-21T07:37:21.523000
CVE-2023-0534,0,0,ade7ab28da0420cc365f47dad870343cdd8da608da1a7ddf62838dae0c66a25d,2024-11-21T07:37:21.653000
CVE-2023-0535,0,1,3b217b841d5fdae261b9bfef38db6cfc982634658ef94aea978d026a27fc8091,2025-03-10T19:15:37.457000
CVE-2023-0535,0,0,3b217b841d5fdae261b9bfef38db6cfc982634658ef94aea978d026a27fc8091,2025-03-10T19:15:37.457000
CVE-2023-0536,0,0,e637cc93da899c75d4344be893bd279d9c6249fc897c970ef96c3a2f5590177a,2024-11-21T07:37:21.880000
CVE-2023-0537,0,0,2b43fa3c7d6c09be7b74ae22f3c06f76acd623b7b0c21dc267ababb5984feaec,2025-01-29T15:15:11.527000
CVE-2023-0538,0,0,93bd0a7452675c80af54b0b64fee7d659b3b74c3f15a2d1e9d62100379c03b54,2025-02-27T16:15:35.693000
@ -216483,7 +216483,7 @@ CVE-2023-20863,0,0,9c58029defd2bb7cfd8b85b564c8dcc0f14c0b32e9f43140e2d7eff8dfde2
CVE-2023-20864,0,0,411ea13ebcced10931dae6ddf97a7384674dee08f3f2ba606d4ad810c1cd32de,2025-02-05T16:15:34.130000
CVE-2023-20865,0,0,947c566c7db3a2fd6de48d53c8d520f7e7e462a2b3cf38df93d2db53519f7ba9,2025-02-05T16:15:34.283000
CVE-2023-20866,0,0,9d3728277f1e85787af7c460776537a88b531fbb1b2faf8c96deaea2f25974e6,2025-02-07T17:15:24.140000
CVE-2023-20867,0,0,c72444159cd2ecdd3b4e0fc07c90738643e059c4564cbb7cb8c67850d9291d4a,2024-11-21T07:41:43.433000
CVE-2023-20867,0,1,b5cc445d80eccf11fbe16691215d10028d4cc7dbdae5f95dea6fd24962756425,2025-03-10T20:43:28.317000
CVE-2023-20868,0,0,4ef12985aa287dd53088fc35032c16f405f309fb0d5f2c97fb98ad8b43ae1d82,2025-01-16T15:15:09.580000
CVE-2023-20869,0,0,ea8be30561e426be0e640f21dbd3ee3ff8eb731694616e2c1a34eb40afd074e6,2025-02-04T18:15:32.880000
CVE-2023-2087,0,0,c34021487f5653a2ed0c7e62647e4439a96d631ee537366495c67a27dd4f70bb,2024-11-21T07:57:54.647000
@ -219319,7 +219319,7 @@ CVE-2023-2404,0,0,e871d45a60e6005e1c4d45eb75a9edfef9fb129d460ff44788c0692638e391
CVE-2023-24040,0,0,002ab84f91c2eae9544026e8fa8d4517b3f52600ca19d17e1f95ceb1f9a2e8c9,2024-11-21T07:47:18.467000
CVE-2023-24042,0,0,d6d3ecc0a691c83cc86f03b6376ddddf48103b3dd6e853b135a9635e4d2c7d94,2024-11-21T07:47:18.610000
CVE-2023-24044,0,0,16a8553bd0666dab543a312b7317e79c35107a001bc50445b44596eef0ef3155,2024-11-21T07:47:18.750000
CVE-2023-24045,0,1,901b665cb2123c392752262b84c2e0694a98683ff59753e393bfb75068bd048c,2025-03-10T19:15:37.617000
CVE-2023-24045,0,0,901b665cb2123c392752262b84c2e0694a98683ff59753e393bfb75068bd048c,2025-03-10T19:15:37.617000
CVE-2023-24046,0,0,56466e1ad08e92cf55b8d9678d21b3ed2227b04fa61598011e5b2d90bd51ec2b,2024-11-21T07:47:19.037000
CVE-2023-24047,0,0,a6b3942ab48c4dff8c51b327a9cd882f419b051667e55c995e894045226d3b1c,2024-11-21T07:47:19.280000
CVE-2023-24048,0,0,1daabdf121529baf332053607b6904a5f303bef930f5ace2d43503e61c89a753,2024-11-21T07:47:19.503000
@ -220308,7 +220308,7 @@ CVE-2023-25267,0,0,4259de3326950cd8e26ada70276d9aaf3cf4cb092f4dc89828c70d495046b
CVE-2023-2527,0,0,b628c7086a29a9183da8f9f64491e1f494424d1684e0e71a944098c3e46be700,2024-12-12T01:20:30.213000
CVE-2023-25279,0,0,b1a7056aac972e2cef544266b63734e9282f2de2380e110d864a5fbe3b37fb78,2025-03-03T20:15:38.600000
CVE-2023-2528,0,0,7354ad96239bf796c6cbd6ba58728972cb6fb7255bae028f505e752f2e6ec6aa,2024-11-21T07:58:46.940000
CVE-2023-25280,0,0,420720f7b19bd32b6fc1bbd4aa7919fb187b5c67dd551259fd62cd8da22709a4,2024-11-21T07:49:22.837000
CVE-2023-25280,0,1,cb78e1d80923ce0ae34a069cb9dee85e6214b84b8cdda5c42ac3328116ea1172,2025-03-10T20:49:10.030000
CVE-2023-25281,0,0,08a99eed9edd45cf107fcd3f103157d21f276d9348825d0b3afd565c9dcd6a89,2024-11-21T07:49:23.057000
CVE-2023-25282,0,0,f816cb37e750e78c1fe070772f27931ee830b2aa8129db9fffc29b2562f70ec6,2024-11-21T07:49:23.203000
CVE-2023-25283,0,0,5f356e0d9f59faa52b6e5bf0560e1bd2b7ce0198ae0f76caceeb35ca6da8acf0,2025-02-27T20:15:36.397000
@ -220646,7 +220646,7 @@ CVE-2023-25713,0,0,dd0d0c101d1005a4dfb41b844ef773d03acdf6055413f757c97bed9c9e64d
CVE-2023-25714,0,0,30d1b3b8c2658a5d809246d435c81ddf2f9287a1f5b188d50271eb4a0e4334f7,2024-12-09T13:15:23.967000
CVE-2023-25715,0,0,6d88ef667b64c52873b9245db5fa7fe78e16f2c79bc517d1f15a2686934c9956,2024-11-21T07:49:59.500000
CVE-2023-25716,0,0,6a68a371fb70c98c3f42445bc57863f0a9fc317dbcca5e2cf2d7a9605735c149,2024-11-21T07:49:59.620000
CVE-2023-25717,0,0,530b1e06023752d31beca2384ec8cc297d9cab5a2bd76e45e84ab265507c5cc4,2025-01-29T16:15:39.253000
CVE-2023-25717,0,1,7ab45047ae291b9110620bf824e69b193b7f478cc5e4114d5ea36a12a4b0fe42,2025-03-10T20:48:20.863000
CVE-2023-25718,0,0,f5451b83d0d2d17afcf3aeff2ebb8c713d359ad1eb925213a0b2737a383e0c42,2024-11-21T07:49:59.913000
CVE-2023-25719,0,0,af067eb4bbeaa87ff5bd0003d5bd5bc28035789641dd59be0ad1c17fd3a0687e,2024-11-21T07:50:00.107000
CVE-2023-2572,0,0,ed886a16c7f1007ac7399c56e87342873576f715bc1e7094b3db9028c0821f2a,2025-01-08T17:15:11.603000
@ -222457,7 +222457,7 @@ CVE-2023-27991,0,0,ae386e414790310904cad57a7ab0c86d2add8d2b23d2c0bd83f8bf4459ec2
CVE-2023-27992,0,0,213d58191fae45bcbb179a17eadc0fbe8b56d34f8d22b93738da4ede3b539687,2024-11-21T07:53:53.520000
CVE-2023-27993,0,0,381be364cc9d6288e0e5d24511b17ccfced7f5158dc4972632c50512547df5b9,2024-11-21T07:53:53.663000
CVE-2023-27995,0,0,2666db313c0f904b4b586e8ac04fda948323b8acfa168c1039de8f38c2d2d291,2024-11-21T07:53:53.820000
CVE-2023-27997,0,0,cd67745245deb3a7e542e3f0cef8075a50e69d124b382a910f3ffcabaa903225,2024-11-21T07:53:53.957000
CVE-2023-27997,0,1,6e73e7b7396dbf7d8b71882f537c09113597151460fc53330f31005e4e675b18,2025-03-10T20:40:57.323000
CVE-2023-27998,0,0,5530ce6aa4ce82a34c215333dfa42a5062d6dd02fc4e6b35e0b47a3b818708d6,2024-11-21T07:53:54.130000
CVE-2023-27999,0,0,ef4f57271150b134b35dda15cb9d8d1b9717628740f90750c136426925429ec3,2024-11-21T07:53:54.277000
CVE-2023-2800,0,0,1a1897017d69ffe17b6872a5314a0b66f45e220cf394696972c6073b867e375c,2024-11-21T07:59:18.923000
@ -222684,7 +222684,7 @@ CVE-2023-28225,0,0,fc0f4d6e8ae131282489535b1b0e71e5974e3970022cb4f491663ce13b3c1
CVE-2023-28226,0,0,24f45c15d2d3818df6081da3bf69e7dd3a6e9438ec2e61e1dd753367e5306ca1,2024-11-21T07:54:38.770000
CVE-2023-28227,0,0,997952f80c93c3916ae15ac044654bce3d12ad2f35f530fe3e57a269d438a5d6,2024-11-21T07:54:38.907000
CVE-2023-28228,0,0,43b61bd7ab6bdc54ed70e306d69d183962360c96eba0e69f0625381076e2782c,2024-11-21T07:54:39.060000
CVE-2023-28229,0,0,ba618f4eaa9d4f034242f7ccd2db1034e2ea34af4f407004d64700270da1a848,2024-11-21T07:54:39.223000
CVE-2023-28229,0,1,00e6ccce53350c74c86e9beb09a7cf2f2aaa0f2cc5910eb3388973006a8f942f,2025-03-10T20:50:17.200000
CVE-2023-2823,0,0,c4291e667ee5a8c549c4231fd575b61295c8d918a1dc21385a6bf1de476e1bda,2024-11-21T07:59:21.500000
CVE-2023-28231,0,0,d1441ac9eee9d2a0a909837303d7b2e20b10c81a8f5f3b443a337fe046a65124,2024-11-21T07:54:39.390000
CVE-2023-28232,0,0,5a0aa6410ef140509028f5378d02b0b12717f8753bdbb347007832f67ced9b55,2024-11-21T07:54:39.587000
@ -222706,7 +222706,7 @@ CVE-2023-28249,0,0,326a9c4e15a4a0a950f59607f9ab58eb7dac24f96e18a7109a34c1e0432ba
CVE-2023-2825,0,0,44fa6db78f17ea5622a829ad4c7dccf7ad5683ffd1ac5be9d99a88a313a7a28a,2025-01-15T16:15:26.870000
CVE-2023-28250,0,0,09cf1043327f069d5f578b3511ea352a939a2176bb05976386d7e313aca118aa,2024-11-21T07:54:41.770000
CVE-2023-28251,0,0,fd62b263e9cfbde4eaa981b7f26d19e6afb86c9aa3c08f1b5e124a57ccf3c145,2024-11-21T07:54:41.943000
CVE-2023-28252,0,0,a723b3e4340c26533fe3fb35fad1654d8b59c6f3d1bc805e54f6a0dd1fdc7764,2025-01-01T02:15:24.757000
CVE-2023-28252,0,1,4fee14da79cffe04560163d795e23396e8ff6ada066718af49cba8e1b7b5371e,2025-03-10T20:50:39.513000
CVE-2023-28253,0,0,da7e3df64664cb20ec2e3fc06d7be22698fbd7e6b6a9abc7dfdbb84df83f20b4,2024-11-21T07:54:42.277000
CVE-2023-28254,0,0,8b55c3baab01e9a81aa806c3b78547158c80aacf8d4e0fed1a2dde2d27a33aab,2024-11-21T07:54:42.433000
CVE-2023-28255,0,0,6282d05de0f55c623ef60cff2392c95be1270053be6c69e955f1bd171f1790d6,2024-11-21T07:54:42.577000
@ -222889,9 +222889,9 @@ CVE-2023-28429,0,0,e5d170510bc58034262f73af023181fafc468fb08856332461d435c553f0e
CVE-2023-2843,0,0,4094cbfecf5cdb5b7ea91ed380eb102447bf1bb532a3b6a2bfd7713011f010c8,2024-11-21T07:59:24.017000
CVE-2023-28430,0,0,f20e831c6b995367dc268b2d75435cff0e463d4ab3dfce940e3888c446d490b3,2024-11-21T07:55:03.027000
CVE-2023-28431,0,0,bdced18d12d173f4097de33e1789ec8f8178d1b926c872d9eeac91722bab6d45,2024-11-21T07:55:03.163000
CVE-2023-28432,0,0,9a4fd03c56987630755177000c3bf4a1f5d4fa4e5df8d66fb1229f480422ba97,2024-11-21T07:55:03.283000
CVE-2023-28432,0,1,d221f8ee6677756648f6dbc13491e92b81cce3532c60a827c0a0fa386768de02,2025-03-10T20:49:25.103000
CVE-2023-28433,0,0,f77ff5da7e82bdb3ca8d20a9063f2f1cb1e2547fab79328e85145775f7fffc27,2024-11-21T07:55:03.410000
CVE-2023-28434,0,0,eaf0ddc55ed36f060b80eaf6566c9a7e9d9f3c309db2e6af5d6337e2662708bd,2024-11-21T07:55:03.533000
CVE-2023-28434,0,1,a21ff0c97610ef5ce135d43084bd078b8a2caafdbd894e4ac92239f04965896c,2025-03-10T20:49:43.140000
CVE-2023-28435,0,0,bd9b8e5bb1c97cf9a9845fba35b9297f5173af9b1ec5507d4d0736d64ba79318,2024-11-21T07:55:03.660000
CVE-2023-28436,0,0,c2940754c37ba68a4ac8fe953ce53bf69b3505546621f3c3dcee05b58b036777,2024-11-21T07:55:03.773000
CVE-2023-28437,0,0,9cb1fc60750ce64f67b875fd52232ec14e83e11eb9369beb25393894847604db,2024-11-21T07:55:03.900000
@ -223722,7 +223722,7 @@ CVE-2023-29332,0,0,426a3f2d7c6e1861c2689b1ef1d51fd2ed2c65028037d9c2f1e87622c3393
CVE-2023-29333,0,0,e39ee9256d6cb6e4bbcf62435e196e69d1632189657e25959c48ed30d2e578fe,2025-02-28T20:15:42.797000
CVE-2023-29334,0,0,40a694796c3dfad5000acd1277181ac7ebaccbe7833e8fb5fefb1007db0b3ca0,2025-02-28T20:15:42.943000
CVE-2023-29335,0,0,61181b1a8a11a5838648b960745a60fbd0089db6dfa8e380519644f6fe0f4ebe,2024-11-21T07:56:53.140000
CVE-2023-29336,0,0,4eff31337ef98c9ff29bfcb52467fa2757a57db48d118523b36b87bf90993948,2024-11-21T07:56:53.257000
CVE-2023-29336,0,1,2c67c8801bba907ab027e7224aca30cb2aa812928ff1b9c3d4cb043d96e23183,2025-03-10T20:36:29.143000
CVE-2023-29337,0,0,56f7ebb5d77e680d8eedc44e0115faf21d19e36d9a2d179e33c83a37194e5627,2024-11-21T07:56:53.383000
CVE-2023-29338,0,0,0a206c80a6cbabe76544bbefcbabd7c4cd4e002b38f989e3be76bf80ce800e41,2024-11-21T07:56:53.497000
CVE-2023-2934,0,0,778832cd1bc7f448d8f80d3d8991e2c0037e5e70b5060dfce6fadeb9ab5bcc90,2024-11-21T07:59:35.917000
@ -223743,11 +223743,11 @@ CVE-2023-29353,0,0,e45da25f220130fb5cb22b2ad186a54f698750c2df7dce2298e1cb7352ee3
CVE-2023-29354,0,0,6e6e6f6e09c384de89c89ff717c6b28e221fec8335db9a1d673dc1093d4c046a,2025-02-28T20:15:43.080000
CVE-2023-29355,0,0,37a7c5aee10b1e24a3440064cdb291401fd0f225379840c469ffc476bc6e1e48,2024-11-21T07:56:55.157000
CVE-2023-29356,0,0,60935bcd3b095359e91882913cbcf4abe11e68728d0771cac0006d94e9e34dd9,2024-11-21T07:56:55.277000
CVE-2023-29357,0,0,1d53854bfebe463c63afc97a38a0162781953a5d7535dd4324423be8080bf5be,2024-11-21T07:56:55.393000
CVE-2023-29357,0,1,2c1fa6c58bc572203ae6535480a4b7f815939c544a1d5e39f99a5a2706c59038,2025-03-10T20:44:31.630000
CVE-2023-29358,0,0,7ccae9f82193ec7bc0c32c5adb10e39049b93d1ae77a4746241d0a8ac0d92eca,2024-11-21T07:56:55.520000
CVE-2023-29359,0,0,51914d31d344268e10e3fa53982ed350af46f96e5d10efe6d4cadfbd88d6d4d0,2024-11-21T07:56:55.653000
CVE-2023-2936,0,0,35f1cc12fb7af17c48afd6aa8328fec33f868fc27aead065fec431992c565531,2024-11-21T07:59:36.180000
CVE-2023-29360,0,0,50649ef8203ba94439450a7ed18921a0970cac2b6dd4bfeed4351b345ee583a2,2024-11-21T07:56:55.787000
CVE-2023-29360,0,1,7dda314c37d413a4e0c11f57585df00e028c2ceb7e1fe8d64dba24e3c35c9c4d,2025-03-10T20:45:37.843000
CVE-2023-29361,0,0,d0050d38806dd20e0260e844860d6cf031fbbd3abe4d0c166344fd1826afec3c,2024-11-21T07:56:55.913000
CVE-2023-29362,0,0,794effcc8a78fd69dcca30e59df44544c99f1ac12347f460d805fe0a92bbf06f,2024-11-21T07:56:56.020000
CVE-2023-29363,0,0,0b84a5ccc103207dee77fb5e109928817515938cbc02f20456004850b7c6e677,2024-11-21T07:56:56.143000
@ -223869,7 +223869,7 @@ CVE-2023-29487,0,0,3d13910652c9ceb1782af2c61c24f634eafb36868d369f7b919d47049bc35
CVE-2023-29489,0,0,df6c5af5ac2e3229b6ed02d2d2ee1f81ebf76beb1923252f8aab1d0dd5131466,2024-11-21T07:57:09.780000
CVE-2023-2949,0,0,e8a354e546e4b107ec601ec03b74e830838f361fd676790e29e647a00c7e0f22,2024-11-21T07:59:37.783000
CVE-2023-29491,0,0,18214f055738f9c70b8ea08170c16516e75285c8db1071653aefd6687e9b2983,2024-11-21T07:57:09.933000
CVE-2023-29492,0,0,4f4685c55f6bbe7d9cfbf5960e8880e59ffa020d3df174295de098520679790d,2024-11-21T07:57:10.087000
CVE-2023-29492,0,1,dd1b2bf731e8ee922a4908dea3e81260da3fed69a330327f8909e0d6d7ca0550,2025-03-10T20:49:57.083000
CVE-2023-29494,0,0,b90d8ceeaef9906bc47b80cee9467055cedc2b0aec3c6d26d3bf34d2bba0b1cf,2024-11-21T07:57:10.290000
CVE-2023-29495,0,0,7dad3d0d134689f5f27d6c90d7fbacbcb08c849eae64453f5313d9b46f471707,2024-11-21T07:57:10.430000
CVE-2023-29497,0,0,275bcab71fa31aec3c61d00134fc188f3391177ede5a5f6c28eeb79ddddcfae6,2024-11-21T07:57:10.543000
@ -225587,9 +225587,9 @@ CVE-2023-32042,0,0,5f290f5f1c8d614a89d78dbcfa49809fab027812e6c001b9b3300ec09234c
CVE-2023-32043,0,0,2a7d05fd3f7a70a3d987b95171cfde579b93431ce2de1c4026749db9445afffe,2024-11-21T08:02:35.820000
CVE-2023-32044,0,0,435d711813854754470f6f0cb64b7782fd7dfb824d093076488d02706951d057,2025-01-01T02:15:42.417000
CVE-2023-32045,0,0,6806b381fb83d1d65b0304d5f2c111fb9450cb947867afbbdef666424f8c5da4,2025-01-01T02:15:42.597000
CVE-2023-32046,0,0,b40b9497a6133d2318215c0e2b3db7bc5026ceaeecd36e7beadcd55ab36e521b,2025-01-01T02:15:42.747000
CVE-2023-32046,0,1,ad9c814cd77fb40a827998342e25977be47e487b98c7ca5bc0bf7c87b36aa482,2025-03-10T20:45:52.913000
CVE-2023-32047,0,0,dd872c626a54ae37928bc11d8a2d53e4e59d57c0e0636c20d31bdc391f716f53,2024-11-21T08:02:36.427000
CVE-2023-32049,0,0,8429d1fe4ce20942f535dcb2ce8c09a0b6e6326d445e7bdc51f9b94fa6ecdb63,2024-11-21T08:02:36.543000
CVE-2023-32049,0,1,c0b222c9974b6e1b631fa8a835aea0bd3842558529de4974dbd89c9a75ef3673,2025-03-10T20:46:21.273000
CVE-2023-3205,0,0,f50a33d8c9cf94803a8f87e9e3439b490e3fb5def430be3c992f06dbc5b7bcef,2024-11-21T08:16:41.637000
CVE-2023-32050,0,0,6e6eab390f48e9a9854dfb0c7f4d8bd90f21437b5a0cf5482c1b3d94019e4630,2024-11-21T08:02:36.673000
CVE-2023-32051,0,0,e28d488bef227a840144c7d3649e0e8b2a0cb4501b7002045c5ae6fe6cddd6e9,2024-11-21T08:02:36.810000
@ -225864,7 +225864,7 @@ CVE-2023-32311,0,0,8dd08593fc6ebd80db8873727204100b8929e354f2617334ffb187aea38b0
CVE-2023-32312,0,0,92586a0fe6dbd059e800e2a1b1040848c50cd74c365c0f0c9b0d813114c27816,2024-11-21T08:03:05.380000
CVE-2023-32313,0,0,64947d18d47453fd1f483352582ce21475fdada012efebcb972616f76ae4633e,2024-11-21T08:03:05.510000
CVE-2023-32314,0,0,4f42f2c41a0d9e5e56b6efeaafab9cbae9db2aa5c3a6098596022815ce1097cb,2024-11-21T08:03:05.643000
CVE-2023-32315,0,0,80448fa5e58c75cfdd3920035729e48891874691bf7ae2fda092976b060fe4b3,2024-11-21T08:03:05.767000
CVE-2023-32315,0,1,65cbb904e0805f05aeb038299873b08cbf5286040e9f0fb23691164d8197ca77,2025-03-10T20:36:57.097000
CVE-2023-32316,0,0,b68618955850c159deec6bf37c9b14d85bcb41ed847bb06df9272a53cbddcc2b,2025-01-14T20:15:27.070000
CVE-2023-32317,0,0,42729ba8aff71043c2ebbb52acd4606bdca9561dc5a9be8503917f8360d25570,2024-11-21T08:03:06.027000
CVE-2023-32318,0,0,6fbd6f2a8c5cfa7a14bfc7aa127bc8a45688e4a15812697e46c2b394a952f5db,2024-11-21T08:03:06.160000
@ -226958,9 +226958,9 @@ CVE-2023-33566,0,0,474244334223314bafbbb34726873b97a4d786f3c255b5b6db4b37691b287
CVE-2023-33567,0,0,6f8070242f0b52f35467ff6fa5967af9712ffd9e8a51a555b37438dd5b9a24f4,2024-05-27T01:15:13.333000
CVE-2023-33568,0,0,c53755badbd50b80ab85c5708c7b94cbacfbb7f9effcaa8b7be6b9fcf1735b67,2024-11-21T08:05:44.090000
CVE-2023-33569,0,0,73aa9218e9b0ea1c29e740fd31b11bf9a7f06d0020284b0f722e6f62c477c9fd,2025-01-08T17:15:12.283000
CVE-2023-3357,0,0,893d04151b56454ecb74aded74cd09cfafc0605f54872ce5dedb520ddc580244,2024-11-21T08:17:05.570000
CVE-2023-3357,0,1,731ddb62de37847f438e72d994c24a3ffb7f7050ba81b5f11c4229d2184dae54,2025-03-10T21:15:38.650000
CVE-2023-33570,0,0,85cf59e7d43d3b836fbc8ade873b57bf05e4ee43d634b3bb632c5499b8726f78,2024-11-27T17:15:06.687000
CVE-2023-3358,0,0,cbb2ff79b282d095762345ca7bf4fb67fe17cf253ee5cba9d1d8313d2b406f40,2024-11-21T08:17:05.693000
CVE-2023-3358,0,1,fe43f9f3341e75bd6b606633c54a083d5f45bcac94fdaed1e70676b674ad4b5b,2025-03-10T21:15:39.320000
CVE-2023-33580,0,0,1dca35c14ceebd8b2ac2749f958edc5f886e53698ca054ed32052d4e15b7ccab,2024-11-21T08:05:44.550000
CVE-2023-33584,0,0,2845a42f3ce418d0634a650c3ed2178cf03cdca0f27a845f3eeab11506d04457,2024-11-21T08:05:44.707000
CVE-2023-3359,0,0,1c8c0aa4c661e26bbd01074bc5f71d699cd0da432f86560f88fb710ebd41dd26,2025-03-07T16:15:37.470000
@ -227669,7 +227669,7 @@ CVE-2023-34386,0,0,3e21beb4557c98228f588552bee4c4f19f8ee6009689f9ba7ed52ba68790c
CVE-2023-34387,0,0,7031254c429505ad21579b50a14e61d5326f65b6fb9b28c20ecc7368d099b30a,2024-12-13T15:15:15.423000
CVE-2023-34388,0,0,8ada4f02e28c933aad8accb1fa844ba15f4b96b844ed5f7db6f2f7659791f3dd,2024-11-21T08:07:09.263000
CVE-2023-34389,0,0,0053e07969cb197ef103d72413e3df09b0fe796c054d2558b1a87a0e6b018276,2024-11-21T08:07:09.403000
CVE-2023-3439,0,0,3e388d4801902db0764a3c9fb86827d01711c419759d0f3094a18d3ea23d504d,2024-11-21T08:17:16.167000
CVE-2023-3439,0,1,e7de50740aba4bbce687ff49f1b8138892c9e716c53e98a23d0eb64136b0f7a8,2025-03-10T21:15:39.513000
CVE-2023-34390,0,0,bf385404d07f10cd7cb4bebaa52fc316d9dc4147eedd32f71885db8b53be2e41,2024-11-21T08:07:09.550000
CVE-2023-34391,0,0,2850ce35c525b5e171b8e8917e07263b599ec5a37f54cff304be7640551f4ea5,2024-11-21T08:07:09.713000
CVE-2023-34392,0,0,d8289ef9b8ee4c730669c475b92ed9638b79be5cddb18576855295bf53608bd1,2024-11-21T08:07:09.853000
@ -228160,7 +228160,7 @@ CVE-2023-35186,0,0,2330c3077b83f9f6fae9e0eda93500aac3bc9bbd15b777050c1b9b248cf93
CVE-2023-35187,0,0,d435c3fc1573652bac9b174ccf4e3f4282700228ab093cbb54d11cb6634e9fde,2024-11-21T08:08:07.393000
CVE-2023-35188,0,0,20dcd968f47df33dc9f031cc661f6699d605a5c83a53fc048d8db516b33d965c,2024-11-21T08:08:07.530000
CVE-2023-35189,0,0,0c013e229c8b320febe8b95a5660110014abdf3b654e065846aefefa2b1eaf76,2024-11-21T08:08:07.667000
CVE-2023-3519,0,0,d756e30fcc740f09ff56300b626fd88408e5fc2fa13f11a1c6caf045f1e4e15a,2025-02-13T17:16:57.200000
CVE-2023-3519,0,1,d1535571094f1399ff68a09fa774b0dcb6cdbd4a8bcf7a2dc77e64d06e338506,2025-03-10T20:46:43.453000
CVE-2023-35191,0,0,57e2cd323ea5812b05a092bdd798fc25e60bb2f356c1b70cf60026944fad7439,2024-11-21T08:08:07.793000
CVE-2023-35192,0,0,20b85c2be1afce08117fbec37ea7ba8ad0c365657a4a1990271826475914f270,2025-01-23T18:32:53.320000
CVE-2023-35193,0,0,e9a6b5ccac2268d637286d7a1bdb9433afc1109bf4ebb9b8f76e19c20e797054,2024-11-21T08:08:08.043000
@ -229329,7 +229329,7 @@ CVE-2023-36841,0,0,a1fc0a0b13e0ee3d0d61001b90eb0427c7439bb806be4ff039b3472f43d41
CVE-2023-36842,0,0,88bf7bb1a6302a96544abfeea0f3510e84b6ac4a28e7e918042ef4d92b938df9,2024-11-21T08:10:43.597000
CVE-2023-36843,0,0,cbbdfea83c6a7fd5ed1cdf52988f66762e4a2b24f0260a680b1fa2a1f4950fa6,2024-11-21T08:10:43.800000
CVE-2023-36844,0,0,bc6d41b439b8f4d601bb9c02d7b26d2be534ed2ee7be257d11b2e8bfddf0fccf,2025-02-24T14:59:31.717000
CVE-2023-36845,0,0,a2b585a9340e155b8437a91bc7dd8379ff2930d860a6449aea969a0c621f237e,2025-02-13T17:16:43.583000
CVE-2023-36845,0,1,db2436a680cb678fc43dd815b46cd68680d85dfcfab366bbf622d94093d01387,2025-03-10T20:31:09.807000
CVE-2023-36846,0,0,31e0f5cfc64218783c631dcb6ea01294e0b629b622e66caa6ecd46f40b776415,2025-01-27T21:39:36.497000
CVE-2023-36847,0,0,abf946e66b75d4fe6a8324763c422edcfca5bfa6d043c289b569ca20068fadc7,2025-01-27T21:40:15.840000
CVE-2023-36848,0,0,a2151c8586ba65daa2e8cb4be03b6c633a7c5c083fda49d9a275029509f8e399,2024-11-21T08:10:46.410000
@ -230412,7 +230412,7 @@ CVE-2023-38175,0,0,ef1c8529b3657e2f66fcf0c37f671b4b6edc91494a166816094eac680db4d
CVE-2023-38176,0,0,3fdc33ad178160a5c99abc1a3ac59e3e73fc42e8ab098f2163e13646e62e3b2c,2024-11-21T08:13:01.133000
CVE-2023-38177,0,0,730bcd01c82a54192a212d95053de3fec2969268787436a461567cb09272c10c,2024-11-21T08:13:01.270000
CVE-2023-38178,0,0,7c75f8662268ca89daf277bec3375208706881a79c0c88533a7f4fd2922ae19d,2024-11-21T08:13:01.407000
CVE-2023-38180,0,0,ec7ac4671a4a8dfc6569e323af84768a45d38819b4d08cd6ab81a3a8ecb63bda,2025-02-26T17:15:21.023000
CVE-2023-38180,0,1,d0b4cb4f8c5e52ebfd2d3f2ff6c1f4464c074e36e41ce5baa9281678f3bd538f,2025-03-10T20:30:38.527000
CVE-2023-38181,0,0,5a8b679495a586462dbde9c3056012cf04f2dc6c5625ddc2c0a5b368831d71af,2024-11-21T08:13:01.720000
CVE-2023-38182,0,0,4d4a59af220c252b63fea8ea60f7e53085011cf3820ea3ee0c3d6c02139ee575,2024-11-21T08:13:01.853000
CVE-2023-38184,0,0,8041243a4a2b4032f9464c8d84f0fc87c8a2d1f56ecf4620773160e63efc0f4a,2024-11-21T08:13:01.980000
@ -231925,7 +231925,7 @@ CVE-2023-40040,0,0,3f0f5b5a49b077592c19d66c28b8663ac6b131e5e630485bb5cc47d1f9472
CVE-2023-40041,0,0,0f11e9858a34d472a1c0a2761368dcab1b86c026e37567cc77e2eef57d8136b3,2024-11-21T08:18:34.917000
CVE-2023-40042,0,0,02cc6b6d7f0f8d99b35b97fc4aaa74da4d879c8ea2d2a813def81e280356d977,2024-11-21T08:18:35.063000
CVE-2023-40043,0,0,e6e3b1652d04e45dd01a00b692714fc2d7fc4320e17fc563f04510f03243ddd0,2024-11-21T08:18:35.230000
CVE-2023-40044,0,0,9d663ae3fd4d75c75bf60c6f336631e3906a4c3f7f632632135d8ec89f654915,2025-02-13T17:17:00.470000
CVE-2023-40044,0,1,1f3c9e288a2c8e299eb10f21cc5f9bebba0d2fa8a10e95038a35e7c0d9172645,2025-03-10T20:32:25.380000
CVE-2023-40045,0,0,43781d4d06011b7cb9a008f4a0a4b20ebfbf9da03c65a9c98cfad9979bfbd212,2024-11-21T08:18:35.550000
CVE-2023-40046,0,0,9dca0c7c22c2cba01540a6032b47009c83c32bed6d9548f249a8c2fb7b691bbb,2024-11-21T08:18:35.697000
CVE-2023-40047,0,0,163df9c00ca68663e2cc908fd250aa16e79170a6ad54237c242891bee26589e1,2024-11-21T08:18:35.837000
@ -233647,7 +233647,7 @@ CVE-2023-42106,0,0,447b9ae9affd3d0c9de283ba5b34b328b5720b3ab58d3f53e9737107e014d
CVE-2023-42107,0,0,4c6b9e07bb342649063cc5347eca19bb657c8c9fd1d77cb5e4432722215e6dd7,2024-11-21T08:22:17.340000
CVE-2023-42108,0,0,27fddc624a1c5c9018d3d720e5576e631e6a6a8278b5615ec396b1c70bc9e8b9,2024-11-21T08:22:17.460000
CVE-2023-42109,0,0,0ca557e538c7c48ab18ac8bf8c46c110b9da67b5fbbbb7b22c216feaa0e6ddab,2024-11-21T08:22:17.597000
CVE-2023-4211,0,0,b57baa61295b60c90672581b281f09215d0f0771570e0c01435e49359758b1bb,2025-02-04T15:15:17.480000
CVE-2023-4211,0,1,cb5c91527ee40f43d48fa5706a01f8e02d9dcc34686e3ad9022234cd3301736e,2025-03-10T20:32:41.700000
CVE-2023-42110,0,0,28576136c00cb00997c7a4562e8bc812f565322c6205ab39454fc89564f27098,2024-11-21T08:22:17.723000
CVE-2023-42111,0,0,411e4403445247c72b5192b2c32e45d4c38257ebe22f73e5a39910fa8feadc3d,2024-11-21T08:22:17.847000
CVE-2023-42112,0,0,4c5f6ea3f5a116489efba7e1d9025c3ea82db9123ac6e4046e9eeb7dd1a74684,2024-11-21T08:22:17.967000
@ -234114,7 +234114,7 @@ CVE-2023-4279,0,0,1caed5149541c10d4336248a1287cbb2fb27f3524c93ad81d6b75ca3202c17
CVE-2023-42790,0,0,d4a58d7345844e2500d9a95d1338ce209447c20c8a9a245fefec6b908b6fd44c,2024-11-21T08:23:09.530000
CVE-2023-42791,0,0,9a469e96ceb7289a27f57bada36599a8e7eea3d372acceee964980bff57f3d16,2024-12-16T22:23:14.027000
CVE-2023-42792,0,0,e239ae3986112ad5db11a336cdab21693a34b66ff9212f4cdcebe6d244ac46c9,2025-02-13T17:17:09.380000
CVE-2023-42793,0,0,01a39d3b50c63aef8c1ebe74e63060a424cf6737602773d6c762fbe4a5b5928d,2024-12-16T12:15:04.797000
CVE-2023-42793,0,1,684c2ea437407ce0b0ba50a3b46013b3cd756276275c608703d67a015e17803d,2025-03-10T20:32:11.460000
CVE-2023-42794,0,0,7dc2cfa2877a24ce9ea733c3ef97e22877a47d2eb04c810f3f2306cfedfa262d,2025-02-13T17:17:09.493000
CVE-2023-42795,0,0,2e523bdf521e70992855283f3fa08b34386b8c675ff60321c62eefc1703cc5bd,2025-02-13T17:17:09.610000
CVE-2023-42796,0,0,4e3c42f1018ec4a81d9ac20e8d31eda02f7ba00133483b55be83b5c6fac92755,2024-11-21T08:23:10.387000
@ -242494,7 +242494,7 @@ CVE-2023-6341,0,0,8ecd43f865afd7caa5344b8fe17a3ea7a3522641beb80a8a947afe15992d37
CVE-2023-6342,0,0,2b3c455968258ed34c39ebb191327647c90e3e84685f08ccc9f067b0934df2c8,2024-11-21T08:43:39.507000
CVE-2023-6343,0,0,ed6f2c610ee4698d428e1242bb3c9253625355d55d76cd1ea75478ff32cde2fe,2024-11-21T08:43:39.670000
CVE-2023-6344,0,0,b19585bc4f92d839c4c31e3142088ddaef3492c596de4a6ec59addd057cb77ed,2024-11-21T08:43:39.823000
CVE-2023-6345,0,0,19086f0fb3afb61aa4695d13885be9ee216abace4a98ffb69bfbdbc7ce12d013,2025-02-03T14:15:37.710000
CVE-2023-6345,0,1,b51470da0aa1ff270173db85f07f06ee82bd7755ec27916c55ba017a123e5d4e,2025-03-10T20:33:27.970000
CVE-2023-6346,0,0,69b9fa64118162df8c1ca3fabc04a7b924c72ea3fba2eb0b4d4a970f8597bdb2,2024-11-21T08:43:40.143000
CVE-2023-6347,0,0,b705c1c6a4a54e8880ddce8ea8d2a41c6f19a7013e8b35f73dde8f1f7fd7e6d5,2024-11-21T08:43:40.283000
CVE-2023-6348,0,0,0f7379de56995dc0b0c187185cf9e3fc0fabaf4d795f78271a10ca073a7614ff,2024-11-21T08:43:40.500000
@ -243095,7 +243095,7 @@ CVE-2023-7020,0,0,197fd2fa8d1d4a18a6a4294ec49a94d748ef7ab3b8641e1f8788b50c52350f
CVE-2023-7021,0,0,c90f0d59c2315eb60681259fead187f0526d5fbf18a87677fa680c04abf0c8f3,2024-11-21T08:45:03.430000
CVE-2023-7022,0,0,856fd34983e00eb10af7bbfa2b247782306c3cd9e203e98bbb5f4bce3117af9c,2024-11-21T08:45:03.637000
CVE-2023-7023,0,0,4e802c403a190e5bf3fbdeb4ce4568b9f0ede0742b2ccbd390feda6a6eb357cf,2024-11-21T08:45:03.803000
CVE-2023-7024,0,0,efcf5c42823cc7fa3a82e0c71c9d5f8cea75ae94169a093f7a8797406932fa24,2025-02-03T14:15:37.920000
CVE-2023-7024,0,1,2e15e4cb50cf877257b30786df79ea07d2ac16f011ec0a885bd7a571fd351cc5,2025-03-10T20:33:38.570000
CVE-2023-7025,0,0,145c0a7dc7eb75d64af8eb05c1d2d3dac33609c0032da4138aea95c3c490716a,2024-11-21T08:45:04.097000
CVE-2023-7026,0,0,98716ce8e87964958034bedfc875bd5c13b34d49f4803350e191e9f77d9640fe,2024-11-21T08:45:04.243000
CVE-2023-7027,0,0,1831de41a592a60eace373737109c08997b01ea4f32d34c6623fc7de027bd240,2024-11-21T08:45:04.383000
@ -243168,7 +243168,7 @@ CVE-2023-7097,0,0,bab463a157a0ec4c86b8d05086d020c8321cb0e2ddfa748238550f6301bba5
CVE-2023-7098,0,0,fb45e550044e716b2cd60264b1407659634acf1d3e7cc58f963426aa4635aad8,2024-11-21T08:45:15.690000
CVE-2023-7099,0,0,e5a2b72389968a01cc4f6096c3e1ce4ac890861a6e3386a7275b06db2e27cf70,2024-11-21T08:45:16.090000
CVE-2023-7100,0,0,d677b41de093998f0edb23384ca32d3a17e346e2181a72ddd7db4fe96959d1aa,2025-03-04T17:15:11.650000
CVE-2023-7101,0,0,78a85b1311a31dfa9c8b894c9505c43b5a39d6d339543bcf68dc72fc2d6db90f,2025-02-13T18:16:12.690000
CVE-2023-7101,0,1,d683f053928fc3e4bd18278d2b2b8d9f8cb0c7a0708f1d0bb28e3dd55c1dc483,2025-03-10T20:23:08.703000
CVE-2023-7102,0,0,eda46931e4d5cc965a4562425a4a4a96d50c0b667307576457f7ed3697edc4a3,2024-11-21T08:45:16.750000
CVE-2023-7103,0,0,504008c363eeef54a14a16075674b14134fa024a6160feecad6805fec06dbee4,2025-03-04T12:25:10.853000
CVE-2023-7104,0,0,685626b29f6edd04d4660abe291361929ccac331b20f76b48a7d8dd8219b4857,2024-11-21T08:45:17.067000
@ -246454,7 +246454,7 @@ CVE-2024-12352,0,0,e1ddca6bc02f4291161f9cb613598bb977ed9ee17cca4c5e2325f18c79ad7
CVE-2024-12353,0,0,8e902bdcf1e536e440d27493a45e9676aaf57d7dea9726287e7cfbcce82025ec,2024-12-10T23:37:06.613000
CVE-2024-12354,0,0,10704cc62607ce8f0afc2f3e27b63de336c361854c1ec7cc69d3eb63fb180593,2024-12-10T23:36:25.740000
CVE-2024-12355,0,0,706e4a4ebf8085b58d4c74c52fe82e7439a814fed3c0fd9f69db058153d00a7d,2024-12-10T23:36:03.883000
CVE-2024-12356,0,0,c1d5f9ca3b1db608934567f6ec2906e3a5ff623eb5cc1845b11e1acaaac787fa,2025-02-17T21:15:10.327000
CVE-2024-12356,0,1,4b3deef35ed0ff0efbcd0e1cd934c502b31c09d7ffc78ec57350c7eac8215b2e,2025-03-10T20:27:00.663000
CVE-2024-12357,0,0,8fdce3211cb73cdbfc67b5113b116414bce41bec8c2ccd58fc82212b4bef4cdb,2024-12-10T23:35:15.660000
CVE-2024-12358,0,0,0d0452ecf02cdd382e015110aba817e69e5ce28b817ee4bc639441231292eec1,2024-12-10T23:34:20.467000
CVE-2024-12359,0,0,e103589c18d9a5be84b55f651b08b2895fc765dd7e9223355e8a5f1256c3f028,2024-12-10T23:34:02.110000
@ -249216,7 +249216,7 @@ CVE-2024-20949,0,0,8447586b572938721504c1687180a68e63afc2fdacf6da4b480edb44c75dd
CVE-2024-20950,0,0,f5c99eea8d10c44cb6306cc5eef489fdee68a2f90bacd64ab99a343812559bae,2024-11-21T08:53:29.690000
CVE-2024-20951,0,0,a912377cd9c5e3f36b663316c781a26423eb926f1a59dc0a2f3408b7c7125bd6,2024-11-29T14:07:57.480000
CVE-2024-20952,0,0,974bc5f3b18c2e594a4d1c4bd936f6f9b31dc1a29fe2f12bc3faf51bb8eac324,2024-11-21T08:53:29.903000
CVE-2024-20953,0,0,82765a20964a4a5bab701090b57b1fe4355731cd663540cb37d4d7f85d050f51,2025-02-25T02:00:02.097000
CVE-2024-20953,0,1,b4a3842d63eda45fd21efffeeef1cf36983cfc95e2e0ca5800a1d3edba0c6841,2025-03-10T20:23:29.163000
CVE-2024-20954,0,0,9afc2253774090ba4eb185e93f29f04799d88be99ccffcb7987fb70e621bc5d1,2024-12-06T19:38:00.843000
CVE-2024-20955,0,0,888e1b88ad65bdcadee36bf516889d82a35fb4b5c74e00f287b421d64597a1fe,2024-11-21T08:53:30.257000
CVE-2024-20956,0,0,9661739112364392106915eba09ba3edb13da21796d158c1a55722d67e3804e6,2024-11-27T16:37:04.993000
@ -249684,7 +249684,7 @@ CVE-2024-2141,0,0,9e81dc4008e280636b3df3b06832bc47e054ab7f464649607ad8242783bd7c
CVE-2024-21410,0,0,95d0b95a5f0063806998bacddd7789744542e29655fa4a9d4c4406647d1610d4,2024-11-29T15:28:11.497000
CVE-2024-21411,0,0,014096b872a3129a023c532a8b0c270957fa0df4578b38d594339a889b601731,2024-12-27T17:07:01.770000
CVE-2024-21412,0,0,fe6d0090a3119f8d25267196b6a07a7c56807e1de815457f2dcf42a8c64f6c87,2024-11-29T15:25:25.097000
CVE-2024-21413,0,0,ac761900901205b2941dd65a03a86c00c20357181c39faedef6b68c31b20b93a,2025-02-07T02:00:02.403000
CVE-2024-21413,0,1,88e8b79d8db6a6de7296c263ae3e0ba7e4c2e8544427d9e6ae52e7a1b28cc9ec,2025-03-10T20:23:20.430000
CVE-2024-21414,0,0,c113e0d598bfc7d7070ceff6ac06c1e6a9560a372c30e2934a8ef9d69a624fa1,2025-01-15T22:36:14.993000
CVE-2024-21415,0,0,4b4ee2b6726cf8db1568b3b1590286550c2df48a3dd8b42fa0c2382f5eb16957,2025-01-15T22:34:43.580000
CVE-2024-21416,0,0,93f002464d825de469964fa8d43a5472864f4628746c95028532cc0c5cfb11df,2024-09-20T18:55:14.573000
@ -254558,14 +254558,14 @@ CVE-2024-27764,0,0,0de26073946e11961ce062555628b344b9ee32e76db8ae9da9255839134e2
CVE-2024-27765,0,0,04aaaded443f604ce4ee49a08aa743343ef15860fdace32095dfbefb0b186792,2025-01-21T16:52:29.603000
CVE-2024-27766,0,0,4d93d17ae285c958f465adc24a7cf5f24274982fb56935552c3f47d118ead87c,2024-10-21T00:15:12.173000
CVE-2024-27767,0,0,c9ce621c5d6b3464c79bf26ea66f180f15c4c8565ef1098a7e1611746ab9ff91,2025-03-10T18:34:58.663000
CVE-2024-27768,0,1,e1977f6a4ad56310446084f1814fd60386c4e9679c9b981d2a5e7c9a8b926ef2,2025-03-10T18:34:58.663000
CVE-2024-27769,0,1,48741438427ed642b89ac067ebc08c7061ad6f8c65ca09283fdc6a60453ead7c,2025-03-10T18:34:58.663000
CVE-2024-27768,0,0,e1977f6a4ad56310446084f1814fd60386c4e9679c9b981d2a5e7c9a8b926ef2,2025-03-10T18:34:58.663000
CVE-2024-27769,0,0,48741438427ed642b89ac067ebc08c7061ad6f8c65ca09283fdc6a60453ead7c,2025-03-10T18:34:58.663000
CVE-2024-2777,0,0,3d14d6a0d116f1e241e3815d376a67043eb26436ab43f59a526d7cb4efc6dc9b,2025-02-21T18:33:30.590000
CVE-2024-27770,0,1,10bf53dc7a921586f939bccdc57e108f94008b59fce8dfa0e40a6011ad513ac7,2025-03-10T18:34:58.663000
CVE-2024-27771,0,1,d18829a32784e436a98040c1faec2d2d1bc5dd2f9a5216f0f86f1ac290fd10b2,2025-03-10T18:34:58.663000
CVE-2024-27772,0,1,19f4d760b7860238fac5c2e229cf87fc9e09f7d9c2bafdf960728be9ba2517a9,2025-03-10T18:34:58.663000
CVE-2024-27773,0,1,e32c8485db7ae96f311eafb5317d8c247dafc0778b717136a8d0af8eba4c4997,2025-03-10T18:34:58.663000
CVE-2024-27774,0,1,9dd970a6d5dba156468a350b26f104eee81e895b1755debe465c756ed5ae8e19,2025-03-10T18:34:58.663000
CVE-2024-27770,0,0,10bf53dc7a921586f939bccdc57e108f94008b59fce8dfa0e40a6011ad513ac7,2025-03-10T18:34:58.663000
CVE-2024-27771,0,0,d18829a32784e436a98040c1faec2d2d1bc5dd2f9a5216f0f86f1ac290fd10b2,2025-03-10T18:34:58.663000
CVE-2024-27772,0,0,19f4d760b7860238fac5c2e229cf87fc9e09f7d9c2bafdf960728be9ba2517a9,2025-03-10T18:34:58.663000
CVE-2024-27773,0,0,e32c8485db7ae96f311eafb5317d8c247dafc0778b717136a8d0af8eba4c4997,2025-03-10T18:34:58.663000
CVE-2024-27774,0,0,9dd970a6d5dba156468a350b26f104eee81e895b1755debe465c756ed5ae8e19,2025-03-10T18:34:58.663000
CVE-2024-27775,0,0,468f4bdeb691bac934a90af6b47335beff0a01310cc0f12046ca31ea2abc0fb4,2024-11-21T09:05:02.297000
CVE-2024-27776,0,0,73ca15de9b07b4bb856e35745c43f9cd0ea727710915e8a42d139dd029652387,2024-11-21T09:05:02.433000
CVE-2024-27778,0,0,3b61d8453c3de288977eb08a96cca8e26535b9043516770daafb9936f17dae62,2025-01-31T17:35:05.800000
@ -257821,7 +257821,7 @@ CVE-2024-32109,0,0,c9a7cac737476956b9fbf72c1e5d6a8a50bb5a1742710bddb0f71999ccd9d
CVE-2024-3211,0,0,98aac495f2a7a17ab7cb4a24950a45aa52e6a13f3e3a0c46ae3956f9c49aadf2,2024-11-21T09:29:09.530000
CVE-2024-32111,0,0,121bcf9e03eb2023e507e49bca0f378abedab19bac9b9cac33fc8d7c3f599a80,2024-11-21T09:14:29.573000
CVE-2024-32112,0,0,3cc0cdd2e390858089e1a98f8ecf0a04851da7cfb00b76da57093ec0ffbb5739,2024-11-21T09:14:29.720000
CVE-2024-32113,0,0,1ff9a10ff2bbfaa858146d22068a002c7eb5eb7315815d75bc89f4484c2c5787,2025-02-13T18:18:02.173000
CVE-2024-32113,0,1,9aa52de9436e1bb3af8a10658199c74d90b83ec64d6f4907ba38c9763dd74ceb,2025-03-10T20:23:37.390000
CVE-2024-32114,0,0,fa0ace32e8331607700a098defe4a63c95a20c05c2f93247ddd5b9a066e0c181,2025-02-11T16:31:00.073000
CVE-2024-32115,0,0,c848180be95bbc961b1fa26b25498cb9780e7ec1c116797482a6eccbb7c27b46,2025-02-18T22:15:10.747000
CVE-2024-32116,0,0,140b66d8b58d23b0fe567501dcd986adbe9732a7da9e43b727de51e69eac6a7d,2025-01-21T22:19:07.690000
@ -260196,7 +260196,7 @@ CVE-2024-35247,0,0,9fca1cb4035269cd7b45b306e847aee6461e786d5db963e21ee5dcd933452
CVE-2024-35248,0,0,7c3ed5cb016eeae24ebeb7d52be404adf38788725c5e83b5d27391e0dc1d9bf7,2024-11-21T09:20:00.980000
CVE-2024-35249,0,0,302b7c8906e51cdc971703773787e3153a88d65789ad0641a56c6ae0bd42570d,2024-11-21T09:20:01.130000
CVE-2024-3525,0,0,09687499a1e95f8a70d1c5d0062a29c1bb9be88ef5c3b756ad1d4eec0731fddf,2025-02-27T14:54:18.293000
CVE-2024-35250,0,0,5bde149611ef48bb4ae7d3251e5a00ab3ffd8d805b0bd2f0f81388b6ccbf83af,2024-12-17T02:00:02.077000
CVE-2024-35250,0,1,c7a30c5a25a7ca258a48bacf1fbd0698c70444a54d40b03d14ecf4fc74ddde8c,2025-03-10T20:23:53.597000
CVE-2024-35252,0,0,0f8cf4ca91d191378f3442941d01f34b6bf05c200f0024f0bb3474e02f2e50d7,2024-11-21T09:20:01.453000
CVE-2024-35253,0,0,bee685c773d8375872a8fd41de235ce0377b714b15d51115236139dd0a8b700c,2024-11-21T09:20:01.607000
CVE-2024-35254,0,0,0973352a78955e1008d161d71b8515ce181d81658087521aabcddd672b8cbfcc,2024-11-21T09:20:01.750000
@ -267281,7 +267281,7 @@ CVE-2024-44175,0,0,21fd54203e8a328aa6ddadf60d944e0a0983b6a3a07be2abcb838cb48b12d
CVE-2024-44176,0,0,02c607cc196a1e33eb632f0de9814806e6dc69c4ca8e95ed9cdb360698290492,2024-09-25T13:27:13.333000
CVE-2024-44177,0,0,0086874e5f4389e06928db6b81db20629e71c2b6609f712738d0b53b5de5c4fc,2024-09-24T16:28:09.853000
CVE-2024-44178,0,0,3836de3bb945a8f85bde59cc1b4f59deb044b827183198668dedf9e02270b6a7,2024-09-24T16:28:40.960000
CVE-2024-44179,1,1,46c758ad62e26c7275d8e543b6e697adb3aa6c5ab6e016de6f6ac4d3f0e9487f,2025-03-10T19:15:37.960000
CVE-2024-44179,0,0,46c758ad62e26c7275d8e543b6e697adb3aa6c5ab6e016de6f6ac4d3f0e9487f,2025-03-10T19:15:37.960000
CVE-2024-4418,0,0,3c06db20d6f1d09e33f3b0bdaf6cae857194aef327226f05897e6eec0e0197ea,2024-11-21T09:42:47.483000
CVE-2024-44180,0,0,a2247dacac4bd0388809af309fed3d0b9db77eee1ff7dcb46382a6a016edec7a,2024-09-24T19:04:17.890000
CVE-2024-44181,0,0,6d28050393eadf03569f8e946e89b01b126b14e424563728581983befe65d626,2024-09-24T18:39:12.733000
@ -267296,7 +267296,7 @@ CVE-2024-44189,0,0,74bae7e0ea0e127ff0dd8bcfea5ffa0e13e07892dd1a7bf2df17de4205cd8
CVE-2024-4419,0,0,ba2477d3286ec6ab4ab62bfd9b86b02d79b23b6497b6c9703950ad337d472a29,2024-11-21T09:42:47.617000
CVE-2024-44190,0,0,ec036b1f60dea569eef287561200a33a41aeefcf64eef3b61618ae6ebfbc5800,2024-09-24T18:02:25.313000
CVE-2024-44191,0,0,d240f1b8433a5ce6dbe87e65698049b28e8c35859d01c776684fda07dd899ed0,2024-12-02T15:00:03.333000
CVE-2024-44192,1,1,a65508e33916ca678af577c7aa7ef55b7cc3c8e543f48c093bc860c047a01f5c,2025-03-10T19:15:38.080000
CVE-2024-44192,0,0,a65508e33916ca678af577c7aa7ef55b7cc3c8e543f48c093bc860c047a01f5c,2025-03-10T19:15:38.080000
CVE-2024-44193,0,0,e8cd317fa1c1f489397fd49c4be8f85204f966e9fa00998149de32c25c4e3ea8,2024-12-11T02:53:58.413000
CVE-2024-44194,0,0,789113f0658a6ddde1f6417d93be90ede379c24f3199a65cf3b83f7069f1c9c3,2024-12-06T15:15:08.690000
CVE-2024-44195,0,0,793ae5f7226dd15cb3926acd88ee4934145dd1a5d78b00b744cd556289693063,2025-01-23T20:38:14.517000
@ -267326,7 +267326,7 @@ CVE-2024-44222,0,0,73a3c689e7090451963deac3a94c7bd82e8f2ad14cb50c55b40009dcf9370
CVE-2024-44223,0,0,e7c24ca22da306873e19ce1beaefb0f8a859aa352b193df7d6f03bb6b9e568ac,2025-01-06T13:38:02.493000
CVE-2024-44224,0,0,d84e8efd72c988effe9ed335d10230fb30a5bb6791d136b0cee7bff3626fafa4,2024-12-20T19:15:06.757000
CVE-2024-44225,0,0,bebf76d665c6ac22f676be1b98259b9a9d870957d2984f48dd9ae887f391c1cd,2024-12-20T19:15:06.937000
CVE-2024-44227,1,1,688a6229a0be6b2464ec446851c59936134831e22a32b96c1917aa3177fa53c4,2025-03-10T19:15:38.187000
CVE-2024-44227,0,0,688a6229a0be6b2464ec446851c59936134831e22a32b96c1917aa3177fa53c4,2025-03-10T19:15:38.187000
CVE-2024-44228,0,0,233a9fa817aba532dc55e3bf55f1e7e1e04a30b62b44a655772ef05440625188,2024-10-30T20:35:27.570000
CVE-2024-44229,0,0,79811515ccef73d41159136745a09e4e9b2ae027bbfa748a8533cf5125c53ff1,2024-10-29T23:15:03.437000
CVE-2024-4423,0,0,904bfc58b1909282d82661cafb70a1a74dc795b741ee1a78c704e0498aedee0e,2024-11-21T09:42:47.973000
@ -270332,7 +270332,7 @@ CVE-2024-48845,0,0,857f78a832caa017ef878dfef403b14f26fbf7efc5e1c67ee960aa7d3092b
CVE-2024-48846,0,0,51afde21886e5f56a9a3629698778341606628c345447801ea3ddeaf37e91512,2025-02-27T15:45:57.977000
CVE-2024-48847,0,0,a822b137fef1fff60ee1d27dd2eb6fdc75846a7dc5d0d2021e0e3c401ab49e18,2025-02-27T15:45:57.977000
CVE-2024-48849,0,0,fd3e8ed6978571ad86ae5ba997c11a31bbd23eae3890b14e5c287c90b96b0482,2025-01-29T19:15:18.547000
CVE-2024-4885,0,0,21797cc64aedc93b02b5b229eaf54af1f7c9fa1facc1df7e5a032ec2a77520b9,2025-03-04T02:00:01.987000
CVE-2024-4885,0,1,617d9649467aef323c74e37ff2643e1496c65f66e83bb5d23af661c7302f090c,2025-03-10T20:24:16.363000
CVE-2024-48852,0,0,30427ab7c643976d46e60ad759beb23222df1040ecb326b48277a708fdeb234f,2025-01-29T19:15:18.720000
CVE-2024-48854,0,0,84036c75cd3838b5b292f21cf5425d491da03d6238f78579c542dad27dcd7589,2025-01-21T18:07:08.960000
CVE-2024-48855,0,0,5bf8afe0e102f23f010396835dba19dff569ccf97c0fb49542dce44c445f45ae,2025-01-21T18:07:12.777000
@ -271597,7 +271597,7 @@ CVE-2024-50299,0,0,0c281bf670f28202ecab6b493ed49cc5ea5a6c8ca6e18d28c043e1650410b
CVE-2024-5030,0,0,d7a01f140218cc5d3b4d9bb19a90752f3ec5a691714edb3528e20e3690587947,2024-11-18T17:11:17.393000
CVE-2024-50300,0,0,7e61bc5452e3c6bf0816fa7f8abf13f64ca5a49dc8874af50150a20d37ed3a6f,2024-11-21T21:11:32.137000
CVE-2024-50301,0,0,7bf644bb8af063938e3e18dc42072a8ce6618f64a2658105524913b296306adf,2024-11-21T20:53:03.823000
CVE-2024-50302,0,0,6a030282f4d61849e6392e1644f5568b4bdfbd5968406e9369851a6137e58404,2025-03-05T02:00:02.390000
CVE-2024-50302,0,1,218f5451e25951a81c398705cbe3fcf7040b512b5c00b4346e3d846acafad777,2025-03-10T20:26:51.137000
CVE-2024-50303,0,0,bc6cc55b32c0f00ab508749d7c62fbc3dbe6ae3c9749209c3284b75426b67658,2024-11-27T21:29:30.267000
CVE-2024-50304,0,0,eeeaee5732dfb12e1aae063256882bc4dd20d6bc10a6f629b1d14550d165b8e7,2025-02-02T11:15:11.207000
CVE-2024-50305,0,0,50fd3aee61add01e589f37a9c6d29b7fd91b0375b90c41822a3e9396b3202d7a,2024-11-15T13:58:08.913000
@ -271911,7 +271911,7 @@ CVE-2024-50614,0,0,29f22ac93163ff1303a42a1fec38fde0552d285d63129bbab00c726fede4a
CVE-2024-50615,0,0,4d2a2e353be570a02fcdfff0b42fb37b106e2c1e8ab4e77f1c580e4daa183aa0,2024-10-30T20:35:37.310000
CVE-2024-50616,0,0,f16f40ce12577bc20e6d17ff8fa15bd5a1f69a543581dc34546ce7e8ac77217c,2024-10-30T20:35:38.380000
CVE-2024-5062,0,0,cdc86dcd84c87200c0328afbc0b136b026f9aaa280f8620d87cfe6bc9e21b227,2024-11-21T09:46:53.077000
CVE-2024-50623,0,0,27494f1797b7bdeb5bac1184b037f385fc45a092b1f9da578da83ae1c13ad739,2024-12-23T06:15:06.357000
CVE-2024-50623,0,1,689897be2bf1eff885c220c68e780397d6277f6ae7515a9445eacbcffea8a3fc,2025-03-10T20:25:14.940000
CVE-2024-50624,0,0,425b4912ca74d0f19519cece63451f565c900b6a769644536a74ca4edcfab020,2024-10-30T21:35:12.223000
CVE-2024-50625,0,0,600a63b94c23d23207c426e1e43b071296b787357ca99d17c5661761f04e2a95,2024-12-12T02:06:32.647000
CVE-2024-50626,0,0,ee346cb1a02e9d6ceaf318c396c6bbfc04e63993edcd6528fb39c33b5fb34c43,2024-12-12T02:06:32.817000
@ -274596,16 +274596,16 @@ CVE-2024-54458,0,0,8fc0df2345a7e6034fc72b73cdebe291a1dfcd54de4856cdb09ddc6c6a5be
CVE-2024-54460,0,0,46a2824e2a284b445162d596321895979fee49d319c455c9a3391c11ac25744d,2025-01-16T15:15:42.083000
CVE-2024-54461,0,0,72c05671de4a0e136e4c9486cbf32b3b7e34b7b81340b6a0dce106246fe274d9,2025-01-29T12:15:28.437000
CVE-2024-54462,0,0,e1698ea74ad0ed475034f1d0c870c2ebf625a89380bf2b138238c5653992a491,2025-01-29T12:15:28.627000
CVE-2024-54463,1,1,69fcf312fe9be708ced913a93142d2cf2ec0a4c529e733d74949a23e79beb19a,2025-03-10T19:15:38.290000
CVE-2024-54463,0,0,69fcf312fe9be708ced913a93142d2cf2ec0a4c529e733d74949a23e79beb19a,2025-03-10T19:15:38.290000
CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61a99,2024-12-16T18:15:11.023000
CVE-2024-54466,0,0,cde2c633b064403c3330cf4e329fab2afdda24c70189b50f9e401743db80aa51,2024-12-18T17:59:28.667000
CVE-2024-54467,1,1,82eca1b40ada26106cfa7e59bfa978740bb5f55bb34ff59e5c1afc674af11938,2025-03-10T19:15:38.387000
CVE-2024-54467,0,0,82eca1b40ada26106cfa7e59bfa978740bb5f55bb34ff59e5c1afc674af11938,2025-03-10T19:15:38.387000
CVE-2024-54468,0,0,a830975289ea24b4b020a52bcfcc38a9f682d3ea938ccb481221a83a22c3f0ba,2025-03-03T22:45:38.540000
CVE-2024-54469,1,1,4e760dca4376bf64d9f2986d2f1ef7bec295203a0efd3d37b57656a39bcbfbff,2025-03-10T19:15:38.493000
CVE-2024-54469,0,0,4e760dca4376bf64d9f2986d2f1ef7bec295203a0efd3d37b57656a39bcbfbff,2025-03-10T19:15:38.493000
CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000
CVE-2024-54470,0,0,fe219ee429ae9d3c4f4ad02abbcafd7f018f3e8df8603d9d5274597d26ba2e87,2025-01-16T17:15:12.433000
CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000
CVE-2024-54473,1,1,304e836f8d4cc8cc4b6bf28c90e798400bbdf32f3b68fe0da887f4773dd8fb17,2025-03-10T19:15:38.600000
CVE-2024-54473,0,0,304e836f8d4cc8cc4b6bf28c90e798400bbdf32f3b68fe0da887f4773dd8fb17,2025-03-10T19:15:38.600000
CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000
CVE-2024-54475,0,0,a64bd081c6112afb87121e755186f1170b928c354a4f743bbaba93305cdbdc46,2025-03-03T22:45:38.540000
CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000
@ -274671,15 +274671,15 @@ CVE-2024-54540,0,0,393848985c31197409a0b6a6ff13f35ecf9e93fddbbd73bfb784c7f01cc31
CVE-2024-54541,0,0,9eb31cc1d58cfd2315f407b93bc0d1327da0fa870162c87480c553f25ee2693e,2025-01-30T17:31:31.880000
CVE-2024-54542,0,0,af0e4b80c4d917d18f55501de0ce4e65090062287609088843853591c52fc5e2,2025-02-18T20:15:22.007000
CVE-2024-54543,0,0,603876c5dd2c62a2a366bc570ded9afb84d36803ecff2c07cec2b1684773ae76,2025-02-05T16:15:41.137000
CVE-2024-54546,1,1,9bb3efd3c7bc71d609945fcd78a9fe90ae03f8c5572866842e9f52d00f7720e5,2025-03-10T19:15:38.697000
CVE-2024-54546,0,0,9bb3efd3c7bc71d609945fcd78a9fe90ae03f8c5572866842e9f52d00f7720e5,2025-03-10T19:15:38.697000
CVE-2024-54547,0,0,a618dc80c063ba06842a7d3f6b960a332bab473379d1eeed9cc28ea9a9897404,2025-02-18T20:15:22.093000
CVE-2024-54549,0,0,17fa8e8a740280ca6b3bfe83e25cd01c11c70fd2adb30c1c3ea7762350a07beb,2025-02-04T22:15:41.357000
CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000
CVE-2024-54550,0,0,37e7e19b86f585f36721504b7c8a72258806c5ed7bd0186e279c332d1969c1cc,2025-02-18T20:15:22.183000
CVE-2024-54557,0,0,3d0baeae19a93d052c3842b20411bb1817950b16584194ccb52fef0fc3d214c6,2025-01-31T22:15:10.300000
CVE-2024-54558,1,1,e3c5d62d7e275cf6a62c99c82c97807831a71ee650a5a0aefd97f6ce300bb30e,2025-03-10T19:15:38.790000
CVE-2024-54558,0,0,e3c5d62d7e275cf6a62c99c82c97807831a71ee650a5a0aefd97f6ce300bb30e,2025-03-10T19:15:38.790000
CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000
CVE-2024-54560,1,1,37d4be383b235d8334353bd9ec26340c9800fe3298056531158b97c0a724ed99,2025-03-10T19:15:38.883000
CVE-2024-54560,0,0,37d4be383b235d8334353bd9ec26340c9800fe3298056531158b97c0a724ed99,2025-03-10T19:15:38.883000
CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000
CVE-2024-5458,0,0,8dbafb99fb85c57a2766bb8c0351967563ad88f8cfa7b660abd7c7ec5db25669,2024-11-21T09:47:43.413000
CVE-2024-5459,0,0,b7a22fae8a0174b7cca0e1147f2ed714677dfde4089a65746f06fba0f29d7308,2024-11-21T09:47:43.570000
@ -274990,7 +274990,7 @@ CVE-2024-55578,0,0,5c3fcc77d09324042ddbdfd728ad5e7386e7d5896fd6497db19ee19fc8c81
CVE-2024-55579,0,0,eb7b97c3360bce570eb740843f88f428eb8ed07ac934bdc24aaa75a35aac660f,2024-12-10T15:15:08.163000
CVE-2024-5558,0,0,27c470fd7893b831fc84cdde276205428cb613b4f465921ca99eb64316442434,2024-11-21T09:47:55.700000
CVE-2024-55580,0,0,d0db8db8caa9064b5ccfd1ebfcb70a56a05a77720b165abb2a708efdd1b5b12c,2024-12-10T15:15:08.300000
CVE-2024-55581,0,1,f83eba0d1d57dfb0b5f6cd13deb2e137852fa318e3bfeae6027001cd985f5d58,2025-03-10T20:15:13.987000
CVE-2024-55581,0,0,f83eba0d1d57dfb0b5f6cd13deb2e137852fa318e3bfeae6027001cd985f5d58,2025-03-10T20:15:13.987000
CVE-2024-55582,0,0,8c7e64bb3acec7a473c6e65040db0fdec814405cb32a2dc0c98b336fe36f3523,2024-12-11T17:15:21.103000
CVE-2024-55586,0,0,925f554fe1c6418481a3cd536be7ee8d09491d59c7f2a3844aeb8009a61c81a3,2024-12-12T02:08:22.247000
CVE-2024-55587,0,0,043360c021c66dd2c5a5e7aa976c02dd7134a3fcd9d370dcc05a2b2b78d778ba,2024-12-12T17:15:11.197000
@ -275273,12 +275273,14 @@ CVE-2024-56175,0,0,22a48fcf93fd39d784b2031be3d0660428d6c59d54d025f00f9098a9f5f61
CVE-2024-56178,0,0,9564968521bb8f5c11b766d9cc78936576e1fac39bcc14d058711ca02bbf4325,2025-01-28T20:15:51.173000
CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000
CVE-2024-56180,0,0,9a461075be1a2eaf70b03c0f7152f850619b8e5d7322fa7b2ca03c910642bb05,2025-02-18T15:15:16.500000
CVE-2024-56184,1,1,8f6f696205dd460cbdcf502fb64e8d4befa7f056f75ba122cd18b0c1c4f5e809,2025-03-10T19:15:38.983000
CVE-2024-56185,1,1,c37fdf659e7c39460f1175db12112f73d7afc802c2a6cae80fe038b7827dd84a,2025-03-10T19:15:39.097000
CVE-2024-56186,1,1,11acf8f0bb70b3cccc707a3cc5eb1a912874cf4eafd524c30fe5c9098b6f8e82,2025-03-10T19:15:39.193000
CVE-2024-56187,1,1,3639156078a5c2d713cc91bc8115385316c6106e48fedf60d31f8c65ed6c2f1b,2025-03-10T19:15:39.293000
CVE-2024-56188,1,1,754dcb051afab226439b896bcaffa6c79155d464519b66818e7a589f41414022,2025-03-10T19:15:39.393000
CVE-2024-56184,0,0,8f6f696205dd460cbdcf502fb64e8d4befa7f056f75ba122cd18b0c1c4f5e809,2025-03-10T19:15:38.983000
CVE-2024-56185,0,0,c37fdf659e7c39460f1175db12112f73d7afc802c2a6cae80fe038b7827dd84a,2025-03-10T19:15:39.097000
CVE-2024-56186,0,0,11acf8f0bb70b3cccc707a3cc5eb1a912874cf4eafd524c30fe5c9098b6f8e82,2025-03-10T19:15:39.193000
CVE-2024-56187,0,0,3639156078a5c2d713cc91bc8115385316c6106e48fedf60d31f8c65ed6c2f1b,2025-03-10T19:15:39.293000
CVE-2024-56188,0,0,754dcb051afab226439b896bcaffa6c79155d464519b66818e7a589f41414022,2025-03-10T19:15:39.393000
CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000
CVE-2024-56191,1,1,6d6e439309f911cd89fe05c483aed2c6456da3b34def44a970c450b01f649a66,2025-03-10T21:15:39.880000
CVE-2024-56192,1,1,c70740ec10129faece240e224a1d2efd21b1913c8abf85f982388ad67961b19e,2025-03-10T21:15:40.007000
CVE-2024-56195,0,0,17e80087440c26a48bf26150f466408464e462d5b44a69d93d4cf901c8b8922b,2025-03-06T16:15:49.230000
CVE-2024-56196,0,0,12fd90de17993bd12dfedd30b7f3bb5633be1f20034d52a88794197505bacdce,2025-03-06T16:15:49.637000
CVE-2024-56197,0,0,e9afd498035eec9eafab8200bca26d2809dec4007383a3f79e63ae62a3cb2cb9,2025-02-04T21:15:27.260000
@ -280538,7 +280540,7 @@ CVE-2025-0590,0,0,d81cd8b36faa71d41ba820106853d8f1ea4eee3f00df9dab8137d82c49b237
CVE-2025-0591,0,0,31743e528b9642b20d256fb46c14cc7ce872bd582fcdb63a43f5e161426dc8af,2025-02-17T00:15:08.987000
CVE-2025-0592,0,0,92924626baecbab996d0e97311af8c1852928a73cb5e120c4713cb77cb4e663d,2025-02-14T21:15:16.543000
CVE-2025-0593,0,0,f384bb5183fd52ec3bc21aa2809ce1a4d509fdefca6b18add8a3ba9e9b530a58,2025-02-14T21:15:16.680000
CVE-2025-0604,0,1,11b5fa64e0c44fc853249fe566d1ae9520d7be28da05402f93563e9d23c37605,2025-03-10T19:15:39.487000
CVE-2025-0604,0,0,11b5fa64e0c44fc853249fe566d1ae9520d7be28da05402f93563e9d23c37605,2025-03-10T19:15:39.487000
CVE-2025-0611,0,0,d5c9360fc3080a3bf40a56d9e6161f43213715b53cd2c1f914a2626e9581bcd4,2025-02-06T22:15:40.053000
CVE-2025-0612,0,0,7ea4d4aa25f622741c89c8921e9bef8da99d00f4284523c951843203c8182c72,2025-02-04T19:15:32.720000
CVE-2025-0614,0,0,35aebd2508e8a73e5890659bb27b5833c263157a992866f88cfa4a06211488f5,2025-01-21T12:15:27.580000
@ -280560,6 +280562,7 @@ CVE-2025-0648,0,0,14768df502506893e04a871405a68a3a94ff0c449b83e66c30586b78c50c67
CVE-2025-0650,0,0,a9fc324c64dd82aee521d1bffa9b7782cf03bd2f6e410628d7018de6f1170f96,2025-02-06T09:15:11.697000
CVE-2025-0651,0,0,b1abaff9b79f4b2065b368c16dba6244d38fea5352b0c15967b39f4433b66d5f,2025-01-22T18:15:20.363000
CVE-2025-0659,0,0,4fe159addabb5574c2c2f98c745f6aab39810c9877de9d524c91d168b8982ca8,2025-01-28T16:15:40.360000
CVE-2025-0660,1,1,3a4d6510135489f4adf6e8747676d8ea99f497e471f9b966380a3cb7ef6f73d2,2025-03-10T21:15:40.110000
CVE-2025-0661,0,0,b1e3b3e01aec6a0429d6cfbed29279169cf9ca980f886cdc2d225d4899ed12e8,2025-02-24T17:10:16.007000
CVE-2025-0662,0,0,33daf52cdf419d482596718a6ca1d8792f8f25da15f58b8337c49907fcbd7414,2025-02-07T17:15:31.157000
CVE-2025-0665,0,0,8a61fbb47215c485ccfd4b2365ef7f5f454b101245ea0ea879ec01e25fde9fc3,2025-03-07T01:15:12.293000
@ -280784,7 +280787,7 @@ CVE-2025-1011,0,0,c7aab2f6a9c0415627154b90d3f96ebb209e4ddce064fa55ea39e2629e66c9
CVE-2025-1012,0,0,7b0c4ab0855cffefa552cdbb9537cf53fcf1593bbc730581babeb8c5fa1ab156,2025-02-06T19:33:46.407000
CVE-2025-1013,0,0,651300f5a902e2a90163edfab2155a83dd0507c6882d48dd9ffa23457be2f8b0,2025-02-04T22:15:41.743000
CVE-2025-1014,0,0,c6156421e09c044512d56480035ada4fc6ec0f71d0de078370b84abda2b3d73f,2025-02-06T21:15:22.397000
CVE-2025-1015,0,1,c0fb0efc7bcd0a499f759d56d25d3e4c19351e1b390774630a281c721e58035d,2025-03-10T19:15:39.590000
CVE-2025-1015,0,0,c0fb0efc7bcd0a499f759d56d25d3e4c19351e1b390774630a281c721e58035d,2025-03-10T19:15:39.590000
CVE-2025-1016,0,0,2e0db284a246d9cb5702937ac7dbd1f00f468e9b4a4a58c00bbc39db26d0ee7b,2025-02-06T21:15:22.560000
CVE-2025-1017,0,0,bd3fa4a4136a68bd2fd99ce26d51913b65870c34b7ef3850591eced198182568,2025-02-06T21:15:22.760000
CVE-2025-1018,0,0,2c63b770ee1eb8404a9ddd357bafe82e637b324657da1135e622c93e59b669ec,2025-02-06T19:40:01.263000
@ -281016,7 +281019,7 @@ CVE-2025-1387,0,0,b80cfff8816a5a4c7344419c24985cf6849d91e56da599c269854d931b9368
CVE-2025-1388,0,0,8e601c55f63d7c4a99175dca26ea6e765f5666baba3a63fcb66bd4e1e37a8c84,2025-02-17T04:15:08.960000
CVE-2025-1389,0,0,795a35efe21e6a34ebaee5d031621504f5de1cd150eb87bc8f92558df8e46474,2025-02-17T05:15:10.317000
CVE-2025-1390,0,0,4fc86a10da8dd3f0a18ea2e30ae82e3cb10771daa7275bed87235a02cfa82a05,2025-02-18T03:15:10.447000
CVE-2025-1391,0,1,92923563d5f6ebe7489c1cf297a79c50e1a9d080a96d841d79358c408c639ed2,2025-03-10T19:15:39.860000
CVE-2025-1391,0,0,92923563d5f6ebe7489c1cf297a79c50e1a9d080a96d841d79358c408c639ed2,2025-03-10T19:15:39.860000
CVE-2025-1392,0,0,f08bbb9b69f485fd54fc78272460b890a55805f93dc93ed202a1f5ce9ea26d62,2025-02-17T16:15:16.120000
CVE-2025-1393,0,0,3159a68724e79b452459f4be37f745c49bffd3a249ca4341751e3e0030245eee,2025-03-05T08:15:35.107000
CVE-2025-1402,0,0,c23c451cfa1d570fb16b3d38ae224aa085b42cdb084d4b1dbd67b0732fd42aba,2025-02-25T04:04:59.860000
@ -281278,6 +281281,7 @@ CVE-2025-1916,0,0,62cbf7d0baf3b65340e1dd71d636637dffa9fe88a30cf5f1b31df7c201565e
CVE-2025-1917,0,0,a45aaaab45a99ee616555c7303ae35fa5deaa8caf5cbc67c816a0b6730fb0cec,2025-03-05T15:15:16.067000
CVE-2025-1918,0,0,0b969e174274812299d3170aab0162f6660668a900b37b5060bb255adfce2bba,2025-03-05T15:15:16.223000
CVE-2025-1919,0,0,fdbf01b21cd0a0a7341c004e74c5a0f8896d5fa9b9090a1373c391c776ac0904,2025-03-05T15:15:16.383000
CVE-2025-1920,1,1,a0d0c9fb951cf98495373119c44fed133186b818c653aa305539ce35dd9f9779,2025-03-10T21:15:40.280000
CVE-2025-1921,0,0,52bb07cc9f6cf05de10de265c3df2b2725a17528bd0219c2e259fa5ff16cca5e,2025-03-05T15:15:16.537000
CVE-2025-1922,0,0,de1e1ca67fdc901d18061c6676a386188acf9c3e5652956afbc8bfc4df588be3,2025-03-05T15:15:16.700000
CVE-2025-1923,0,0,fb6bb796e915c4eb19c73c083cba3d2b11c3c2b6d1b2cce8fa809b77f776c071,2025-03-05T15:15:16.857000
@ -281743,6 +281747,7 @@ CVE-2025-21346,0,0,6da1a91fd51d1c7f9efc77c3676ffc0110c4bfd2b3a26770e9ad9795c951b
CVE-2025-21347,0,0,8cfce27db856ce3eff69887f010f026ad9562bd729925a63d44c80288ecaad45,2025-02-28T16:02:50.353000
CVE-2025-21348,0,0,36348027e40942c567c69f35820a402c8269c98d7a09f418c29d2484864f7193,2025-01-21T19:30:06.410000
CVE-2025-21349,0,0,db46bd1602eca8cc8efcbc08138ac4fee6a0023cf9b4457ce7e79e213146e7e0,2025-02-28T16:02:50.353000
CVE-2025-2135,1,1,058838e592421d8b6728ed0a278da453199aa29ff40fb15b025017a98dc3d7f3,2025-03-10T21:15:40.613000
CVE-2025-21350,0,0,946270e0dd658c25e6baa6b79bc8dec8ca08afc3ec5969e08e7326bdd4ced332,2025-02-28T16:02:50.353000
CVE-2025-21351,0,0,a8cc52c1540160220e99bf210dd11c147b7b880231f4989a6829acfc1674ce66,2025-02-14T22:58:21.470000
CVE-2025-21352,0,0,0ba629188bae210f91f5419cfa07cb82a22f183de23a9ab56a9d3d4e6fb7c03d,2025-02-14T22:55:17.187000
@ -281752,6 +281757,7 @@ CVE-2025-21356,0,0,f7ea5cba60a230879dca18c3ee9d0c02c15b08e12f56fbab6a571232794a0
CVE-2025-21357,0,0,f113e4301bd00fab146fb1b2c2663099f0920807897ab88a84dd70d6d7ccbaa8,2025-01-21T19:40:05.823000
CVE-2025-21358,0,0,dab5145a40f866bd6dc784e58f5b52a4233c1ecc2ba83c4c10bd60eb1e0cf109,2025-02-14T22:53:11.470000
CVE-2025-21359,0,0,b08a0e3b95bd80411438de60c10b9f10ab424a6c433a2a5fc5fbadceddca0f2d,2025-02-14T22:50:04.610000
CVE-2025-2136,1,1,6f7b0d27733ecd5995b75026a215f5a404b68c1ef1ebb012b469dc667f933f0e,2025-03-10T21:15:40.730000
CVE-2025-21360,0,0,1b890933152e0ad6c56f74976ff5f8eaba0ff19a3ed4db064fae08186acb8dc8,2025-01-17T20:40:22.527000
CVE-2025-21361,0,0,15333b9f9e4e095e5eb0227b45a3d79a56875bc396c0df556b7a044756c81d2f,2025-01-17T20:39:49.017000
CVE-2025-21362,0,0,2902d63a2e75a1ecbc123770588d73eec93458274a31a234a8cbf1bc4f8d0b31,2025-01-17T20:38:30.560000
@ -281762,6 +281768,7 @@ CVE-2025-21366,0,0,a59588c0dfff3655b9552370538e4464b57213529c36230194728bdd056ea
CVE-2025-21367,0,0,ee574f31e150644922f442d6f99c433b14b4fc5cc545ddcec754dd048735da70,2025-02-14T22:46:58.147000
CVE-2025-21368,0,0,6c0f601be861c16b3bf5acbace3cefe9363096c39f16a1f2cff45abb52cfb9f0,2025-02-26T15:23:31.897000
CVE-2025-21369,0,0,d0f7f9a542e9386cee8bc2fe054aad034a1d34994bfe93b9978ffac49c3bff63,2025-02-26T15:23:31.897000
CVE-2025-2137,1,1,574f8116782e68fbf81613d426d526d5951a69f54af0f3511fb6eb1e9bdb0a9c,2025-03-10T21:15:40.857000
CVE-2025-21370,0,0,4f2d9ad677d80f1448cc8df24916a78dc10d6e491dbdc144c8692d9ee5b64fb9,2025-01-17T15:33:41.967000
CVE-2025-21371,0,0,f41819969d65dc6998fb17f05a6a2ed4a10ad2f05a6bab1e2a1104b97d6ce0fd,2025-03-03T22:15:37.820000
CVE-2025-21372,0,0,3a043b222986f0210a248c5eb2603857944565822a2729da3fb2f989508cf536,2025-01-17T15:36:24.423000
@ -282398,7 +282405,7 @@ CVE-2025-22599,0,0,1679c6ac5484b7793289eabf6194cbd25427299caec44c6a27aa8b57d1a02
CVE-2025-22600,0,0,f110ec74413c49b371a01e714512d4c9c7c3871d9aa7d096e2f2f2161dd61f8a,2025-01-10T16:15:30.940000
CVE-2025-22601,0,0,e5a036684b4e6e1204af1b20135d30f3904e4c5af4a80eedecb01794128ea749,2025-02-04T21:15:27.800000
CVE-2025-22602,0,0,c8f7aea9374385130d2049dfea6e2ee228c262f087909008185d3a99dec96d21,2025-02-04T21:15:27.950000
CVE-2025-22603,1,1,e02b821a7b43af142b67dcb984d912792b271a05001313a5778b74f75a874a9d,2025-03-10T19:15:39.970000
CVE-2025-22603,0,0,e02b821a7b43af142b67dcb984d912792b271a05001313a5778b74f75a874a9d,2025-03-10T19:15:39.970000
CVE-2025-22604,0,0,e77b02e1f62ca8c90b9aef1da0c6c55d8a3e02e8a7f5ed82d610d0ba53646361,2025-03-04T14:45:17.807000
CVE-2025-22605,0,0,e020c4b8ee74d3a7b5ae92905dc162b067bc2ecec9d0c7b4511ad2cc05d6d46e,2025-01-24T15:15:12.330000
CVE-2025-22606,0,0,6897f6b106e13df92057dcf3df4b4ec47dbbfa122118bcfc3d42e2e512504801,2025-01-24T16:15:38.307000
@ -283711,7 +283718,7 @@ CVE-2025-24807,0,0,a9342833f23aca9efb5658eaedc615b0791a1b8d97d1be177e79dcc0108d2
CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867e23,2025-01-28T05:15:11.413000
CVE-2025-24811,0,0,2da7e99907675b0c3b84fff601eb43c4c4c27c662d95c7205901bce5bb8705d8,2025-02-11T11:15:16.907000
CVE-2025-24812,0,0,3542fd62679fcd1754aabe0f38d924c5bd34578dfc13aa46aeaa150dd810a16a,2025-02-11T11:15:17.080000
CVE-2025-24813,0,1,72aeb96a70e6c87f11d8b70df499c8832a593f0da0714e2708f36c7bd578eb58,2025-03-10T19:15:40.123000
CVE-2025-24813,0,0,72aeb96a70e6c87f11d8b70df499c8832a593f0da0714e2708f36c7bd578eb58,2025-03-10T19:15:40.123000
CVE-2025-24814,0,0,778c51f4f444afc315901ebeb1d1515ad066d9ae9182f0d62b926c00ff924803,2025-02-15T01:15:11.157000
CVE-2025-24826,0,0,afc4a3c6aa0e8288830e8c91cc81c25b8636a1b49a80120ea49c59c3d903f3ac,2025-01-28T21:15:18.817000
CVE-2025-24827,0,0,9def413bdd8ee8b51fbd9a0d5033d038fbca6373f01b1c0b3f27d7c9c702b649,2025-02-18T19:15:27.587000
@ -283952,7 +283959,7 @@ CVE-2025-25302,0,0,c00a60e460c085bc6071f27703e95f8cb2f218886d77664be4a3a5d8bb045
CVE-2025-25303,0,0,8087be36edeb3ab573dca03ab7057565aee5eccfb2b150643eefa5418be83c63,2025-03-03T17:15:15.073000
CVE-2025-25304,0,0,7deb89a558ae2974a24d9b6d35c21d12df30c14623e00d1a3e10b48167354c5e,2025-02-14T20:15:36.903000
CVE-2025-25305,0,0,f9de35ea3a1d1f816c6badb532d5c4e886ee750e6a306cd0122b4c0858013f3f,2025-02-18T19:15:29.083000
CVE-2025-25306,1,1,266c3bc8e39aca90616fb10b87b722dbc75ab7ee9af63d373d4c2b5479d4e2d6,2025-03-10T19:15:40.230000
CVE-2025-25306,0,0,266c3bc8e39aca90616fb10b87b722dbc75ab7ee9af63d373d4c2b5479d4e2d6,2025-03-10T19:15:40.230000
CVE-2025-25323,0,0,5f6bd7010a898a73be4f0d89a8bf4eb9d634056c62096bd3ccd537e03cf653ed,2025-02-28T16:15:38.153000
CVE-2025-25324,0,0,10b5e56d5c4fef0fd94ff417565d1842ebba06a2cb1e43a67f1d659dbc38824a,2025-02-28T16:15:38.307000
CVE-2025-25325,0,0,199803a0e51b1376c31d6c016e0d2871bebff8e1307a37a1fcc1d818a404f722,2025-02-28T16:15:38.457000
@ -284026,11 +284033,11 @@ CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d30
CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000
CVE-2025-25609,0,0,266dd94a110ece3c3e14be6241a6b4dfd9dca67d8afeac437f4e4e876c6d5556,2025-03-05T16:15:39.460000
CVE-2025-25610,0,0,fe8057df3f08f41d60fe1ebc6a06e1b6051f3d9bb1f1a3b3ed10e5a9eef74dbc,2025-03-05T16:15:39.623000
CVE-2025-25614,0,1,03a1628a93d71e2397dcb6c3721d2be49a1a0063c0ed362c346e24f4ddaaf8b7,2025-03-10T20:15:14.280000
CVE-2025-25614,0,0,03a1628a93d71e2397dcb6c3721d2be49a1a0063c0ed362c346e24f4ddaaf8b7,2025-03-10T20:15:14.280000
CVE-2025-25615,0,0,986bdae7b0adb7aed092d2b5d085e2ba1027ce1007b67de14c453c095ac6733a,2025-03-10T14:15:24.960000
CVE-2025-25616,0,0,ea666550f20d27aba2fe037670d1f7afca9196f806e53b0b714782b8fa677d6a,2025-03-10T14:15:25.097000
CVE-2025-25617,0,0,aadd1592880ad6d511d461bb2e93fc58cd011b7a0023bcbd3ae23df0a4c6c5a8,2025-03-07T18:15:47.840000
CVE-2025-25620,0,1,1205eefd0528c936e3ebbd6ac29c3db7bb0c99b1253ae44cf7a8d8848b7b0308,2025-03-10T19:15:40.393000
CVE-2025-25620,0,0,1205eefd0528c936e3ebbd6ac29c3db7bb0c99b1253ae44cf7a8d8848b7b0308,2025-03-10T19:15:40.393000
CVE-2025-25632,0,0,fc07c1c8054a4d9104d3986b5c4aae35472ab79903ea3550918ece4e63e78a9f,2025-03-06T15:15:17.770000
CVE-2025-25634,0,0,c65724cf9c9f8a6f5918311d4cf2659bb1ddbd0a8ea6bef01873f68d34182505,2025-03-06T22:15:35.290000
CVE-2025-25635,0,0,0db247b70226e51b14344c6fcb3514df042659a07d0da107baaaba8517f711fd,2025-03-05T16:15:39.793000
@ -284104,6 +284111,8 @@ CVE-2025-25898,0,0,04c24c833076238e0492d1c61fe2318923b61fe34c2d487dd0ee957f99c08
CVE-2025-25899,0,0,0a94e1ac94f2348ced8620095f1a1cdbc8d00da1d929db972e382fd33828a613,2025-02-13T20:15:49.913000
CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03dec,2025-02-13T16:16:50.037000
CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000
CVE-2025-25907,1,1,e5237174c73183bb9c4faed1ab9448b1c1549126d28490fd2a4de3eda386c7ec,2025-03-10T22:15:26.533000
CVE-2025-25908,1,1,27b564080d99cedf990d09d8e4212c143da715fb09167f046532fc22ff354cc0,2025-03-10T22:15:27.150000
CVE-2025-25916,0,0,91ba974117f22dab8d3678a8beecd3ea90efc52e588600708e1af441e5e35add,2025-02-28T16:15:39.867000
CVE-2025-25939,0,0,7dbd849d533c834d2205e6078f0487c45587eccd9cff67e78aa1acfe6cb8ca0d,2025-03-06T12:21:35.360000
CVE-2025-25940,0,0,f334f2d66750e54c404e803d4cea64ae4d9a0e34417258e5cbd6420f47db59a8,2025-03-10T16:15:13.520000
@ -284299,8 +284308,8 @@ CVE-2025-26622,0,0,c1b7d21410dfbb6fcbf2a06b2b329547947b3063e917e17430eb0992177b0
CVE-2025-26623,0,0,d192a090780b2dcdc669e9e692f962aa45c7b001bdc2d92981daf17d836bb16f,2025-02-18T20:15:33.153000
CVE-2025-26624,0,0,933774cf8883da910c74db2937793adaa8c4da49496d875f26d7c862a7576875,2025-02-18T23:15:10.810000
CVE-2025-26643,0,0,2fdd3ead42b670e7e33c7c2f3b0e92746e3358911492be2252e618821cbc493a,2025-03-07T19:15:37.180000
CVE-2025-26695,1,1,c6eed7f6dcf8d74bcbdaf5148c2f95c49bfc0eb871e72168d5fa03bd63ce6032,2025-03-10T19:15:40.567000
CVE-2025-26696,1,1,ed34c27a9a2c2a385def969c8e6d8d8bba973273db11fc413b8c9eeee171cc25,2025-03-10T19:15:40.670000
CVE-2025-26695,0,0,c6eed7f6dcf8d74bcbdaf5148c2f95c49bfc0eb871e72168d5fa03bd63ce6032,2025-03-10T19:15:40.567000
CVE-2025-26696,0,0,ed34c27a9a2c2a385def969c8e6d8d8bba973273db11fc413b8c9eeee171cc25,2025-03-10T19:15:40.670000
CVE-2025-26698,0,0,02e1c85350f9590f950db8be3fe5f72c9485333903c0f224a4be86e1fd66bec5,2025-02-26T13:15:41.983000
CVE-2025-26699,0,0,87cf95ca9a4284692cb3c070ce904e940ed4f976fad521177b72ff58a22d0261,2025-03-06T19:15:27.683000
CVE-2025-26700,0,0,6e3b394d53337ab4fe903b88ec563a5f9fa1519ac62684b203abb3bd4f953337,2025-02-17T03:15:09.750000
@ -284444,7 +284453,7 @@ CVE-2025-27112,0,0,ad3bd22bf68a43e9ef7354153af5bf27543e71ad253b691f1b313d10f7020
CVE-2025-27113,0,0,0c2510791ac2acff399d905c10fa8f507294f3cb49dcdb258cd51fa637009d3b,2025-03-07T01:15:12.823000
CVE-2025-27133,0,0,bfde01faa06d9963c59eea543f4fa6168a24602a8639d07c356f8930ec6d4154,2025-02-28T16:07:41.847000
CVE-2025-27135,0,0,c70a322e27444296c26cd6106b31fd9aba6c1cddbfdd6c3a2a1f8979a39b788d,2025-02-25T19:15:15.677000
CVE-2025-27136,1,1,b6c8eabc30ae3af9599a6fc890ae8d613bd7771786a491986d7f20a0a4503844,2025-03-10T19:15:40.770000
CVE-2025-27136,0,0,b6c8eabc30ae3af9599a6fc890ae8d613bd7771786a491986d7f20a0a4503844,2025-03-10T19:15:40.770000
CVE-2025-27137,0,0,5824d60f023fc733adf708b73443cf5ddf0a1c321fa7b10d5058188a954ef313,2025-02-24T21:15:11.213000
CVE-2025-27139,0,0,2cb35550ba4d0a90ab72e4571ad148f33e854944ca8f8e710e17710ac500936e,2025-02-28T13:35:22.340000
CVE-2025-27140,0,0,d3c1009e4516057e75528f0ea0c1750c681f482aac5f8e727817e26f4972cc64,2025-02-28T16:07:41.847000
@ -284584,13 +284593,13 @@ CVE-2025-27600,0,0,8b710cbe29c4262a75baeb6eae5e68d150a67d7271571cd258a60494511c3
CVE-2025-27603,0,0,f9c7ddeb8ce74cd54f0397839af1f26d47d617c308be8dcd0c12cfaac63eb48c,2025-03-07T18:15:48.293000
CVE-2025-27604,0,0,52aff360271261f8fa4246ad7435647d74e939ffea0a51055b3b8569444bea06,2025-03-07T17:15:22.290000
CVE-2025-27607,0,0,2a3ab37b8dc052c83770a9345ff1d91d3383eb713728d7b951bbcbdb63a1534a,2025-03-07T18:15:48.483000
CVE-2025-27615,1,1,1d9b17fd6d1efa58df936827bdc2b29656e574c998ae5df70178cd728c98c177,2025-03-10T19:15:40.917000
CVE-2025-27616,1,1,124b4c8a641b46285e5ff925029836649f77d1ae4fc7a43a77192949c8ad959b,2025-03-10T19:15:41.080000
CVE-2025-27615,0,0,1d9b17fd6d1efa58df936827bdc2b29656e574c998ae5df70178cd728c98c177,2025-03-10T19:15:40.917000
CVE-2025-27616,0,0,124b4c8a641b46285e5ff925029836649f77d1ae4fc7a43a77192949c8ad959b,2025-03-10T19:15:41.080000
CVE-2025-27622,0,0,aab424c81f70efb6c2294313600d100f64e720f683885d3b6918b7e0d0c95ce5,2025-03-06T17:15:23.497000
CVE-2025-27623,0,0,a7729605ea601dac947d3c9e9dda3f4cf0fc759f67e3d847999a08d4d426400f,2025-03-06T17:15:23.647000
CVE-2025-27624,0,0,386e769fd54c9c9e387001be90fa20a8140740d08fb61eb8c2dc8cbb750364f8,2025-03-06T17:15:23.797000
CVE-2025-27625,0,0,85889be78be476b146c5fda687cdd2b7a01a613eea674a60ada7a9651223e2d5,2025-03-06T17:15:23.960000
CVE-2025-27636,0,1,6f0982eaa03c91e53a5974672e67fb384f05769dea0cfea98163b0cc00a8d575,2025-03-10T19:15:41.240000
CVE-2025-27636,0,0,6f0982eaa03c91e53a5974672e67fb384f05769dea0cfea98163b0cc00a8d575,2025-03-10T19:15:41.240000
CVE-2025-27637,0,0,9c062615c8ec6a3ced4ee678ddb923b6d263f273f4e63f5f7bf9a46985accf21,2025-03-05T16:15:40.713000
CVE-2025-27638,0,0,799c839b25e9819e4ec80c30ab7682e659f557f1c902bc7211099cb508098b42,2025-03-05T17:15:16.853000
CVE-2025-27639,0,0,a0477d98f560583497b6432bc3e9038f2aa7b8df2110514ba2e616c075cb3f66,2025-03-05T17:15:17.027000
@ -284650,4 +284659,5 @@ CVE-2025-27825,0,0,99e9b9d3befd54cbb55880416607fbc7e5d90c9fee9cdc2881cb2480979fe
CVE-2025-27826,0,0,83fe28f5c1c38336a328c924367a016f575cf3bedee9c6070949943b515ded3d,2025-03-07T22:15:38.527000
CVE-2025-27839,0,0,212b3d30d2c1f53f372c7e143c6e03922deeb9da14f018db14d5749815db8000,2025-03-08T00:15:38.340000
CVE-2025-27840,0,0,31b43659fdf50a1c837def79b3ff8549c2485895c251972e0cf021cb5a031b4d,2025-03-10T14:15:25.943000
CVE-2025-27913,1,1,6f0bd3601f96716de702de6a067ea8085488a5f63b84b8fb03e2b0e08a5595da,2025-03-10T20:15:14.500000
CVE-2025-27910,1,1,563dfaf4a98237987ed986f935d53295ee6e1d7704cf33b760a3d1b009fcbb36,2025-03-10T22:15:27.287000
CVE-2025-27913,0,1,e681422c2870f7557e227a904142f507f947df7c17e14a658700958ba9e15e29,2025-03-10T21:15:40.430000

Can't render this file because it is too large.