Auto-Update: 2025-01-20T13:00:32.644066+00:00

This commit is contained in:
cad-safe-bot 2025-01-20 13:04:00 +00:00
parent 3e5db13241
commit b1609dfbda
4 changed files with 138 additions and 9 deletions

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2023-52923",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-20T11:15:07.670",
"lastModified": "2025-01-20T11:15:07.670",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: adapt set backend to use GC transaction API\n\nUse the GC transaction API to replace the old and buggy gc API and the\nbusy mark approach.\n\nNo set elements are removed from async garbage collection anymore,\ninstead the _DEAD bit is set on so the set element is not visible from\nlookup path anymore. Async GC enqueues transaction work that might be\naborted and retried later.\n\nrbtree and pipapo set backends does not set on the _DEAD bit from the\nsync GC path since this runs in control plane path where mutex is held.\nIn this case, set elements are deactivated, removed and then released\nvia RCU callback, sync GC never fails."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/146c76866795553dbc19998f36718d7986ad302b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/479a2cf5259347d6a1f658b0f791d27a34908e91",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c357648929c8dff891502349769aafb8f0452bc2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cb4d00b563675ba8ff6ef94b077f58d816f68ba3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/df650d6a4bf47248261b61ef6b174d7c54034d15",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e4d71d6a9c7db93f7bf20c3a0f0659d63d7de681",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f6c383b8c31a93752a52697f8430a71dcbc46adf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-0479",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2025-01-20T12:15:23.563",
"lastModified": "2025-01-20T12:15:23.563",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This vulnerability exists in the CP Plus Router due to insecure handling of cookie flags used within its web interface. A remote attacker could exploit this vulnerability by intercepting data transmissions during an HTTP session on the vulnerable system.\n \nSuccessful exploitation of this vulnerability could allow the attacker to obtain sensitive information and compromise the targeted system."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "vdisclose@cert-in.org.in",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "vdisclose@cert-in.org.in",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-614"
},
{
"lang": "en",
"value": "CWE-1004"
}
]
}
],
"references": [
{
"url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2025-0005",
"source": "vdisclose@cert-in.org.in"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-20T11:00:27.962844+00:00
2025-01-20T13:00:32.644066+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-20T10:15:07.710000+00:00
2025-01-20T12:15:23.563000+00:00
```
### Last Data Feed Release
@ -33,21 +33,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
278136
278138
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `2`
- [CVE-2023-52923](CVE-2023/CVE-2023-529xx/CVE-2023-52923.json) (`2025-01-20T11:15:07.670`)
- [CVE-2025-0479](CVE-2025/CVE-2025-04xx/CVE-2025-0479.json) (`2025-01-20T12:15:23.563`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `0`
- [CVE-2024-12569](CVE-2024/CVE-2024-125xx/CVE-2024-12569.json) (`2025-01-20T09:15:07.180`)
- [CVE-2024-3727](CVE-2024/CVE-2024-37xx/CVE-2024-3727.json) (`2025-01-20T10:15:07.710`)
## Download and Usage

View File

@ -240534,6 +240534,7 @@ CVE-2023-5292,0,0,053cd6bdc838ec8e58310af23c6d4e5e608dfbec5f41437eefe04e4d3a1ca9
CVE-2023-52920,0,0,d3f31fdc95b4a67b67ed332bc8577a6c103a6cc3b65bec1715fea71c281674f5,2025-01-09T16:15:35.587000
CVE-2023-52921,0,0,db860eb263bc8c980e12e17429a087c45572e4c4d54038923230b290b9052477,2024-12-11T15:15:07.307000
CVE-2023-52922,0,0,0257647582c181cfc3c3426a0282aca59fe8801f0370a44aec6ca0f680b7f26b,2024-12-11T15:15:07.500000
CVE-2023-52923,1,1,d6676aab56cdab922319c7ca254c484f6213bbcaf2adfcccdb688c34a513a679,2025-01-20T11:15:07.670000
CVE-2023-5293,0,0,9b2cea486d7a7f42acc94669701d574bcf5844db44201d8d4650d958cfdded9f,2024-11-21T08:41:28.027000
CVE-2023-5294,0,0,3f7d530e6cf9dcdc204d5438393ed0130f08c33ee485c7c9370aa028c9815d14,2024-11-21T08:41:28.180000
CVE-2023-52943,0,0,f6ed6bafa02a627fd8483d5444c81747a611e4e8a768a1c76804639f41008cc5,2024-12-04T07:15:04.033000
@ -245441,7 +245442,7 @@ CVE-2024-12564,0,0,0abcb221861e5fc99f1edf43c59fea9ce50a3b4bd68b4b9a5961d76741772
CVE-2024-12566,0,0,cae64572fc707f14425318c88ef9c52b03f915c4164041e3b4f1038d90684dc9,2025-01-13T15:15:07.893000
CVE-2024-12567,0,0,13ab14fb9171447e65350d2236b20d0e0c9f3e46107536c165b19bd4c13ce858,2025-01-13T15:15:08.060000
CVE-2024-12568,0,0,c685936d50ab57dfe5c285322ca955d335948baae78a158fa7194d194f8753c3,2025-01-13T15:15:08.223000
CVE-2024-12569,0,1,6e09cdc54ac1f0c6c03ca9dcb2325cca5e1d87da8b5cab6f52d323bd93e4bc58,2025-01-20T09:15:07.180000
CVE-2024-12569,0,0,6e09cdc54ac1f0c6c03ca9dcb2325cca5e1d87da8b5cab6f52d323bd93e4bc58,2025-01-20T09:15:07.180000
CVE-2024-1257,0,0,7cc030c8f0ebfb33a80da788a5513945114551aaaa2999db4fa614a5f6b08a9b,2024-11-21T08:50:10.443000
CVE-2024-12570,0,0,be94920192af405ec932f38181a462713be2ef7292a21e90f93bf4238cc63d84,2024-12-12T12:15:22.660000
CVE-2024-12571,0,0,4f61ab2b24612e0b1a75d43cf9d9be2b77f4416d126de6e970d9338abb76a3be,2024-12-20T07:15:12.380000
@ -259890,7 +259891,7 @@ CVE-2024-37266,0,0,bfad06f4b7e0ed0e27a2ca57f40272a71ecbbd3e7c155113af0a4c4e9be37
CVE-2024-37267,0,0,2e3809ba7bc3ee639923b028bed9ab4f728ab22816fc66adeb8d662427d75a42,2024-11-21T09:23:30.370000
CVE-2024-37268,0,0,351271f712c107f29c89718f55a9f5394713e5085f67e76faabb556c7b18702f,2024-11-21T09:23:30.510000
CVE-2024-37269,0,0,50cfaed90856887542f673a1dfb88d7fd13e5fdf55b8ad491bbd60ab59cfa8f0,2024-11-01T20:24:53.730000
CVE-2024-3727,0,1,22a0845750f704501f3bf05074914edb2112e8e62a290fec5d926460ffe9e521,2025-01-20T10:15:07.710000
CVE-2024-3727,0,0,22a0845750f704501f3bf05074914edb2112e8e62a290fec5d926460ffe9e521,2025-01-20T10:15:07.710000
CVE-2024-37270,0,0,f4caa4cb7a36858698643ac9409e3f8a4a2754c3391a1e0c22af7a74483970db,2024-11-21T09:23:30.753000
CVE-2024-37271,0,0,65ca3130a4d1f08f82ca6f2d8768dae2cc8655fdc443d30413ce77e2735a94c3,2024-11-21T09:23:30.873000
CVE-2024-37272,0,0,a206017327195d31a4567a6d3181c370f3bb029b5e83668199b2043888bf482f,2025-01-02T12:15:18.710000
@ -277275,6 +277276,7 @@ CVE-2025-0472,0,0,0f40580898fe8da8d58e11b525a8aafe4140ddc85dd699a671742e2ebf135a
CVE-2025-0473,0,0,1dd10a9273539100ae454eabb570ef30f5a1ca54c056c49681717a1070ea05e3,2025-01-16T13:15:07.540000
CVE-2025-0474,0,0,82177afd4a03f9b6718aa062961dc28425e1582c17c2ed083ad764687f417f46,2025-01-14T19:15:32.930000
CVE-2025-0476,0,0,d5dedaf074b8e1ffdbcdfb09b37c5419fb4718d4a0a50274a1a3fdd85de6ca12,2025-01-16T00:15:25.217000
CVE-2025-0479,1,1,bfdb6d7866a82a63111bbbaa015c4aaeff93a67309b3b4a1b57ed4608f112774,2025-01-20T12:15:23.563000
CVE-2025-0480,0,0,0cb09a8f6ce0b89170992f0c154f24058b4f34598442baf21a60641247a52751,2025-01-15T18:15:24.457000
CVE-2025-0481,0,0,ea23d14dcc3acce7aaf6b481730febc16b60b2cfb742b3ce32274b3236e29b50,2025-01-15T19:15:26.807000
CVE-2025-0482,0,0,51755e11e1fe85bcdf8c3ef7c747a7a90c189e81d239d3c797b168fc9a111599,2025-01-15T21:15:14.653000

Can't render this file because it is too large.