From b8a3c946df4a186c96e7d228fd11ae610d2d846d Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 30 Apr 2025 16:03:59 +0000 Subject: [PATCH] Auto-Update: 2025-04-30T16:00:21.515355+00:00 --- CVE-2021/CVE-2021-246xx/CVE-2021-24649.json | 22 +- CVE-2021/CVE-2021-472xx/CVE-2021-47248.json | 195 +++- CVE-2021/CVE-2021-472xx/CVE-2021-47251.json | 127 ++- CVE-2021/CVE-2021-472xx/CVE-2021-47252.json | 212 ++++- CVE-2021/CVE-2021-472xx/CVE-2021-47255.json | 144 ++- CVE-2021/CVE-2021-472xx/CVE-2021-47256.json | 178 +++- CVE-2021/CVE-2021-472xx/CVE-2021-47258.json | 189 +++- CVE-2021/CVE-2021-472xx/CVE-2021-47261.json | 156 +++- CVE-2021/CVE-2021-472xx/CVE-2021-47263.json | 122 ++- CVE-2021/CVE-2021-472xx/CVE-2021-47265.json | 105 ++- CVE-2021/CVE-2021-472xx/CVE-2021-47272.json | 122 ++- CVE-2021/CVE-2021-472xx/CVE-2021-47275.json | 104 ++- CVE-2021/CVE-2021-472xx/CVE-2021-47276.json | 207 ++++- CVE-2021/CVE-2021-472xx/CVE-2021-47277.json | 206 ++++- CVE-2021/CVE-2021-472xx/CVE-2021-47282.json | 139 ++- CVE-2021/CVE-2021-472xx/CVE-2021-47286.json | 107 ++- CVE-2022/CVE-2022-04xx/CVE-2022-0421.json | 22 +- CVE-2022/CVE-2022-15xx/CVE-2022-1578.json | 22 +- CVE-2022/CVE-2022-15xx/CVE-2022-1579.json | 22 +- CVE-2022/CVE-2022-15xx/CVE-2022-1581.json | 22 +- CVE-2022/CVE-2022-204xx/CVE-2022-20427.json | 32 +- CVE-2022/CVE-2022-204xx/CVE-2022-20428.json | 32 +- CVE-2022/CVE-2022-204xx/CVE-2022-20459.json | 32 +- CVE-2022/CVE-2022-204xx/CVE-2022-20460.json | 32 +- CVE-2022/CVE-2022-292xx/CVE-2022-29275.json | 32 +- CVE-2022/CVE-2022-292xx/CVE-2022-29276.json | 32 +- CVE-2022/CVE-2022-292xx/CVE-2022-29277.json | 32 +- CVE-2022/CVE-2022-292xx/CVE-2022-29278.json | 32 +- CVE-2022/CVE-2022-292xx/CVE-2022-29279.json | 32 +- CVE-2022/CVE-2022-302xx/CVE-2022-30257.json | 32 +- CVE-2022/CVE-2022-302xx/CVE-2022-30258.json | 32 +- CVE-2022/CVE-2022-302xx/CVE-2022-30283.json | 32 +- CVE-2022/CVE-2022-33xx/CVE-2022-3336.json | 22 +- CVE-2022/CVE-2022-343xx/CVE-2022-34318.json | 12 +- CVE-2022/CVE-2022-364xx/CVE-2022-36432.json | 32 +- CVE-2022/CVE-2022-36xx/CVE-2022-3600.json | 22 +- CVE-2022/CVE-2022-381xx/CVE-2022-38165.json | 32 +- CVE-2022/CVE-2022-388xx/CVE-2022-38871.json | 32 +- CVE-2022/CVE-2022-408xx/CVE-2022-40846.json | 32 +- CVE-2022/CVE-2022-408xx/CVE-2022-40847.json | 32 +- CVE-2022/CVE-2022-413xx/CVE-2022-41395.json | 32 +- CVE-2022/CVE-2022-413xx/CVE-2022-41396.json | 32 +- CVE-2022/CVE-2022-420xx/CVE-2022-42053.json | 32 +- CVE-2022/CVE-2022-420xx/CVE-2022-42058.json | 32 +- CVE-2022/CVE-2022-421xx/CVE-2022-42118.json | 32 +- CVE-2022/CVE-2022-421xx/CVE-2022-42119.json | 32 +- CVE-2022/CVE-2022-421xx/CVE-2022-42125.json | 32 +- CVE-2022/CVE-2022-421xx/CVE-2022-42126.json | 32 +- CVE-2022/CVE-2022-421xx/CVE-2022-42127.json | 32 +- CVE-2022/CVE-2022-421xx/CVE-2022-42128.json | 32 +- CVE-2022/CVE-2022-421xx/CVE-2022-42131.json | 32 +- CVE-2022/CVE-2022-421xx/CVE-2022-42132.json | 32 +- CVE-2022/CVE-2022-428xx/CVE-2022-42892.json | 22 +- CVE-2022/CVE-2022-428xx/CVE-2022-42893.json | 22 +- CVE-2022/CVE-2022-428xx/CVE-2022-42894.json | 22 +- CVE-2022/CVE-2022-429xx/CVE-2022-42903.json | 32 +- CVE-2022/CVE-2022-429xx/CVE-2022-42904.json | 32 +- CVE-2022/CVE-2022-429xx/CVE-2022-42954.json | 32 +- CVE-2022/CVE-2022-429xx/CVE-2022-42982.json | 22 +- CVE-2022/CVE-2022-430xx/CVE-2022-43096.json | 32 +- CVE-2022/CVE-2022-431xx/CVE-2022-43138.json | 32 +- CVE-2022/CVE-2022-431xx/CVE-2022-43140.json | 32 +- CVE-2022/CVE-2022-432xx/CVE-2022-43265.json | 32 +- CVE-2022/CVE-2022-433xx/CVE-2022-43308.json | 32 +- CVE-2022/CVE-2022-436xx/CVE-2022-43673.json | 32 +- CVE-2022/CVE-2022-436xx/CVE-2022-43693.json | 32 +- CVE-2022/CVE-2022-436xx/CVE-2022-43694.json | 32 +- CVE-2022/CVE-2022-440xx/CVE-2022-44003.json | 32 +- CVE-2022/CVE-2022-440xx/CVE-2022-44004.json | 32 +- CVE-2022/CVE-2022-440xx/CVE-2022-44005.json | 32 +- CVE-2022/CVE-2022-442xx/CVE-2022-44204.json | 32 +- CVE-2022/CVE-2022-443xx/CVE-2022-44378.json | 32 +- CVE-2022/CVE-2022-451xx/CVE-2022-45132.json | 32 +- CVE-2022/CVE-2022-451xx/CVE-2022-45163.json | 12 +- CVE-2022/CVE-2022-453xx/CVE-2022-45380.json | 32 +- CVE-2022/CVE-2022-453xx/CVE-2022-45381.json | 32 +- CVE-2022/CVE-2022-453xx/CVE-2022-45382.json | 32 +- CVE-2022/CVE-2022-453xx/CVE-2022-45383.json | 32 +- CVE-2022/CVE-2022-454xx/CVE-2022-45473.json | 22 +- CVE-2023/CVE-2023-225xx/CVE-2023-22512.json | 89 +- CVE-2023/CVE-2023-225xx/CVE-2023-22514.json | 75 +- CVE-2023/CVE-2023-54xx/CVE-2023-5482.json | 32 +- CVE-2024/CVE-2024-112xx/CVE-2024-11299.json | 64 +- CVE-2024/CVE-2024-202xx/CVE-2024-20259.json | 948 +++++++++++++++++++- CVE-2024/CVE-2024-202xx/CVE-2024-20291.json | 478 +++++++++- CVE-2024/CVE-2024-203xx/CVE-2024-20345.json | 32 +- CVE-2024/CVE-2024-216xx/CVE-2024-21682.json | 87 +- CVE-2024/CVE-2024-268xx/CVE-2024-26870.json | 185 +++- CVE-2024/CVE-2024-275xx/CVE-2024-27570.json | 45 +- CVE-2024/CVE-2024-495xx/CVE-2024-49559.json | 94 +- CVE-2024/CVE-2024-564xx/CVE-2024-56406.json | 77 +- CVE-2024/CVE-2024-576xx/CVE-2024-57698.json | 43 +- CVE-2025/CVE-2025-15xx/CVE-2025-1524.json | 40 +- CVE-2025/CVE-2025-15xx/CVE-2025-1525.json | 40 +- CVE-2025/CVE-2025-217xx/CVE-2025-21756.json | 8 +- CVE-2025/CVE-2025-233xx/CVE-2025-23382.json | 57 +- CVE-2025/CVE-2025-243xx/CVE-2025-24341.json | 56 ++ CVE-2025/CVE-2025-243xx/CVE-2025-24342.json | 56 ++ CVE-2025/CVE-2025-243xx/CVE-2025-24343.json | 56 ++ CVE-2025/CVE-2025-243xx/CVE-2025-24344.json | 56 ++ CVE-2025/CVE-2025-243xx/CVE-2025-24345.json | 56 ++ CVE-2025/CVE-2025-243xx/CVE-2025-24346.json | 56 ++ CVE-2025/CVE-2025-243xx/CVE-2025-24347.json | 56 ++ CVE-2025/CVE-2025-243xx/CVE-2025-24348.json | 56 ++ CVE-2025/CVE-2025-243xx/CVE-2025-24349.json | 56 ++ CVE-2025/CVE-2025-243xx/CVE-2025-24350.json | 56 ++ CVE-2025/CVE-2025-243xx/CVE-2025-24351.json | 56 ++ CVE-2025/CVE-2025-254xx/CVE-2025-25431.json | 10 +- CVE-2025/CVE-2025-271xx/CVE-2025-27134.json | 60 ++ CVE-2025/CVE-2025-271xx/CVE-2025-27188.json | 581 +++++++++++- CVE-2025/CVE-2025-271xx/CVE-2025-27189.json | 124 ++- CVE-2025/CVE-2025-274xx/CVE-2025-27409.json | 60 ++ CVE-2025/CVE-2025-275xx/CVE-2025-27532.json | 56 ++ CVE-2025/CVE-2025-290xx/CVE-2025-29046.json | 55 +- CVE-2025/CVE-2025-290xx/CVE-2025-29047.json | 55 +- CVE-2025/CVE-2025-290xx/CVE-2025-29087.json | 68 +- CVE-2025/CVE-2025-297xx/CVE-2025-29743.json | 39 +- CVE-2025/CVE-2025-299xx/CVE-2025-29924.json | 91 +- CVE-2025/CVE-2025-299xx/CVE-2025-29925.json | 110 ++- CVE-2025/CVE-2025-323xx/CVE-2025-32376.json | 82 ++ CVE-2025/CVE-2025-327xx/CVE-2025-32783.json | 72 +- CVE-2025/CVE-2025-329xx/CVE-2025-32969.json | 76 +- CVE-2025/CVE-2025-329xx/CVE-2025-32970.json | 64 ++ CVE-2025/CVE-2025-329xx/CVE-2025-32971.json | 64 ++ CVE-2025/CVE-2025-329xx/CVE-2025-32972.json | 64 ++ CVE-2025/CVE-2025-329xx/CVE-2025-32973.json | 64 ++ CVE-2025/CVE-2025-329xx/CVE-2025-32974.json | 68 ++ CVE-2025/CVE-2025-33xx/CVE-2025-3341.json | 78 +- CVE-2025/CVE-2025-33xx/CVE-2025-3342.json | 78 +- CVE-2025/CVE-2025-33xx/CVE-2025-3343.json | 78 +- CVE-2025/CVE-2025-33xx/CVE-2025-3344.json | 78 +- CVE-2025/CVE-2025-33xx/CVE-2025-3345.json | 78 +- CVE-2025/CVE-2025-33xx/CVE-2025-3394.json | 100 +++ CVE-2025/CVE-2025-33xx/CVE-2025-3395.json | 104 +++ CVE-2025/CVE-2025-34xx/CVE-2025-3457.json | 69 +- CVE-2025/CVE-2025-34xx/CVE-2025-3458.json | 64 +- CVE-2025/CVE-2025-34xx/CVE-2025-3472.json | 59 +- CVE-2025/CVE-2025-40xx/CVE-2025-4083.json | 43 +- CVE-2025/CVE-2025-41xx/CVE-2025-4114.json | 145 +++ CVE-2025/CVE-2025-41xx/CVE-2025-4115.json | 145 +++ CVE-2025/CVE-2025-41xx/CVE-2025-4116.json | 145 +++ CVE-2025/CVE-2025-41xx/CVE-2025-4117.json | 145 +++ CVE-2025/CVE-2025-41xx/CVE-2025-4118.json | 141 +++ CVE-2025/CVE-2025-41xx/CVE-2025-4119.json | 141 +++ CVE-2025/CVE-2025-41xx/CVE-2025-4120.json | 145 +++ CVE-2025/CVE-2025-41xx/CVE-2025-4121.json | 145 +++ CVE-2025/CVE-2025-41xx/CVE-2025-4122.json | 145 +++ CVE-2025/CVE-2025-450xx/CVE-2025-45007.json | 60 ++ CVE-2025/CVE-2025-450xx/CVE-2025-45009.json | 21 + CVE-2025/CVE-2025-450xx/CVE-2025-45010.json | 21 + CVE-2025/CVE-2025-450xx/CVE-2025-45011.json | 21 + CVE-2025/CVE-2025-450xx/CVE-2025-45015.json | 21 + CVE-2025/CVE-2025-450xx/CVE-2025-45017.json | 21 + CVE-2025/CVE-2025-450xx/CVE-2025-45018.json | 21 + CVE-2025/CVE-2025-450xx/CVE-2025-45019.json | 21 + CVE-2025/CVE-2025-450xx/CVE-2025-45020.json | 60 ++ CVE-2025/CVE-2025-450xx/CVE-2025-45021.json | 21 + CVE-2025/CVE-2025-454xx/CVE-2025-45427.json | 45 +- CVE-2025/CVE-2025-454xx/CVE-2025-45429.json | 45 +- CVE-2025/CVE-2025-462xx/CVE-2025-46238.json | 47 +- CVE-2025/CVE-2025-462xx/CVE-2025-46249.json | 47 +- CVE-2025/CVE-2025-462xx/CVE-2025-46250.json | 47 +- CVE-2025/CVE-2025-462xx/CVE-2025-46251.json | 47 +- CVE-2025/CVE-2025-462xx/CVE-2025-46252.json | 47 +- CVE-2025/CVE-2025-462xx/CVE-2025-46253.json | 47 +- CVE-2025/CVE-2025-462xx/CVE-2025-46254.json | 47 +- CVE-2025/CVE-2025-463xx/CVE-2025-46342.json | 60 ++ CVE-2025/CVE-2025-463xx/CVE-2025-46348.json | 12 +- CVE-2025/CVE-2025-465xx/CVE-2025-46549.json | 12 +- CVE-2025/CVE-2025-465xx/CVE-2025-46550.json | 12 +- CVE-2025/CVE-2025-465xx/CVE-2025-46560.json | 12 +- README.md | 75 +- _state.csv | 330 ++++--- 173 files changed, 11734 insertions(+), 686 deletions(-) create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24341.json create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24342.json create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24343.json create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24344.json create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24345.json create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24346.json create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24347.json create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24348.json create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24349.json create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24350.json create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24351.json create mode 100644 CVE-2025/CVE-2025-271xx/CVE-2025-27134.json create mode 100644 CVE-2025/CVE-2025-274xx/CVE-2025-27409.json create mode 100644 CVE-2025/CVE-2025-275xx/CVE-2025-27532.json create mode 100644 CVE-2025/CVE-2025-323xx/CVE-2025-32376.json create mode 100644 CVE-2025/CVE-2025-329xx/CVE-2025-32970.json create mode 100644 CVE-2025/CVE-2025-329xx/CVE-2025-32971.json create mode 100644 CVE-2025/CVE-2025-329xx/CVE-2025-32972.json create mode 100644 CVE-2025/CVE-2025-329xx/CVE-2025-32973.json create mode 100644 CVE-2025/CVE-2025-329xx/CVE-2025-32974.json create mode 100644 CVE-2025/CVE-2025-33xx/CVE-2025-3394.json create mode 100644 CVE-2025/CVE-2025-33xx/CVE-2025-3395.json create mode 100644 CVE-2025/CVE-2025-41xx/CVE-2025-4114.json create mode 100644 CVE-2025/CVE-2025-41xx/CVE-2025-4115.json create mode 100644 CVE-2025/CVE-2025-41xx/CVE-2025-4116.json create mode 100644 CVE-2025/CVE-2025-41xx/CVE-2025-4117.json create mode 100644 CVE-2025/CVE-2025-41xx/CVE-2025-4118.json create mode 100644 CVE-2025/CVE-2025-41xx/CVE-2025-4119.json create mode 100644 CVE-2025/CVE-2025-41xx/CVE-2025-4120.json create mode 100644 CVE-2025/CVE-2025-41xx/CVE-2025-4121.json create mode 100644 CVE-2025/CVE-2025-41xx/CVE-2025-4122.json create mode 100644 CVE-2025/CVE-2025-450xx/CVE-2025-45007.json create mode 100644 CVE-2025/CVE-2025-450xx/CVE-2025-45009.json create mode 100644 CVE-2025/CVE-2025-450xx/CVE-2025-45010.json create mode 100644 CVE-2025/CVE-2025-450xx/CVE-2025-45011.json create mode 100644 CVE-2025/CVE-2025-450xx/CVE-2025-45015.json create mode 100644 CVE-2025/CVE-2025-450xx/CVE-2025-45017.json create mode 100644 CVE-2025/CVE-2025-450xx/CVE-2025-45018.json create mode 100644 CVE-2025/CVE-2025-450xx/CVE-2025-45019.json create mode 100644 CVE-2025/CVE-2025-450xx/CVE-2025-45020.json create mode 100644 CVE-2025/CVE-2025-450xx/CVE-2025-45021.json create mode 100644 CVE-2025/CVE-2025-463xx/CVE-2025-46342.json diff --git a/CVE-2021/CVE-2021-246xx/CVE-2021-24649.json b/CVE-2021/CVE-2021-246xx/CVE-2021-24649.json index e099d5856d9..2eb4ecd6ce2 100644 --- a/CVE-2021/CVE-2021-246xx/CVE-2021-24649.json +++ b/CVE-2021/CVE-2021-246xx/CVE-2021-24649.json @@ -2,7 +2,7 @@ "id": "CVE-2021-24649", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-21T11:15:12.507", - "lastModified": "2024-11-21T05:53:29.447", + "lastModified": "2025-04-30T14:15:23.043", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47248.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47248.json index 7d75c96fa9c..f8450ad3c1a 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47248.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47248.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47248", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:13.780", - "lastModified": "2024-11-21T06:35:43.190", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T15:21:04.770", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,63 +15,224 @@ "value": " En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: udp: corrige la ejecuci\u00f3n entre close() y udp_abort(). Kaustubh inform\u00f3 y diagnostic\u00f3 un p\u00e1nico en udp_lib_lookup(). La causa principal es que udp_abort() compite con close(). Ambas funciones de ejecuci\u00f3n adquieren el bloqueo del socket, pero udp{v6}_destroy_sock() lo libera antes de realizar acciones destructivas. No podemos extender f\u00e1cilmente el alcance del bloqueo del socket para evitar la ejecuci\u00f3n; en su lugar, usamos el indicador SOCK_DEAD para evitar que udp_abort realice alguna acci\u00f3n cuando ocurre la ejecuci\u00f3n cr\u00edtica. Diagnosticado y probado por: Kaustubh Pandey " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.9", + "versionEndExcluding": "4.9.274", + "matchCriteriaId": "6B5A1555-2CC4-4652-AD96-3529D26B3447" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.238", + "matchCriteriaId": "C3C0DBBF-0923-4D2A-9178-134691F9933F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.196", + "matchCriteriaId": "F3CAB837-7D38-4934-AD4F-195CEFD754E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.128", + "matchCriteriaId": "6267BD4E-BE25-48B5-B850-4B493440DAFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.46", + "matchCriteriaId": "59455D13-A902-42E1-97F7-5ED579777193" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "7806E7E5-6D4F-4E18-81C1-79B3C60EE855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2f73448041bd0682d4b552cfd314ace66107f1ad", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5a88477c1c85e4baa51e91f2d40f2166235daa56", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/65310b0aff86980a011c7c7bfa487a333d4ca241", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8729ec8a2238152a4afc212a331a6cd2c61aeeac", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a0882f68f54f7a8b6308261acee9bd4faab5a69e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a8b897c7bcd47f4147d066e22cc01d1026d7640e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e3c36c773aed0fef8b1d3d555b43393ec564400f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2f73448041bd0682d4b552cfd314ace66107f1ad", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5a88477c1c85e4baa51e91f2d40f2166235daa56", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/65310b0aff86980a011c7c7bfa487a333d4ca241", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8729ec8a2238152a4afc212a331a6cd2c61aeeac", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a0882f68f54f7a8b6308261acee9bd4faab5a69e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a8b897c7bcd47f4147d066e22cc01d1026d7640e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e3c36c773aed0fef8b1d3d555b43393ec564400f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47251.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47251.json index 93b71ef4e79..24dac3e0e5c 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47251.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47251.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47251", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:14.007", - "lastModified": "2024-11-21T06:35:43.570", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T15:18:22.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,140 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mac80211: corrige la verificaci\u00f3n de longitud de skb en ieee80211_scan_rx() Reemplace las constantes de tiempo de compilaci\u00f3n codificadas para la verificaci\u00f3n de la longitud del encabezado con determinaci\u00f3n din\u00e1mica basada en el tipo de trama. De lo contrario, obtendremos un WARN_ON de validaci\u00f3n en cfg80211 m\u00e1s adelante. [correcciones de estilo, reformular mensaje de confirmaci\u00f3n]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10", + "versionEndExcluding": "5.10.46", + "matchCriteriaId": "FD0C8733-D75B-4E30-9D46-CFE48CF2CC1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "7806E7E5-6D4F-4E18-81C1-79B3C60EE855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5a1cd67a801cf5ef989c4783e07b86a25b143126", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d1b949c70206178b12027f66edc088d40375b5cb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e298aa358f0ca658406d524b6639fe389cb6e11e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5a1cd67a801cf5ef989c4783e07b86a25b143126", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d1b949c70206178b12027f66edc088d40375b5cb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e298aa358f0ca658406d524b6639fe389cb6e11e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47252.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47252.json index 4dfbabb8613..5c3361ee0cd 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47252.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47252.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47252", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:14.083", - "lastModified": "2024-11-21T06:35:43.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T15:12:52.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,71 +15,245 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: batman-adv: Evite comprobaciones relacionadas con el tiempo WARN_ON. La interfaz soft/batadv para un MDS en cola se puede cambiar durante el tiempo que el MDS estuvo en cola para transmisi\u00f3n y cuando el MDS realmente se transmite por el trabajador. Pero WARN_ON debe usarse para indicar errores del kernel y no para imprimir simples advertencias. Una advertencia se puede imprimir simplemente usando pr_warn." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.14", + "versionEndExcluding": "4.4.293", + "matchCriteriaId": "0371C13D-9CD9-4497-8E6D-EB0CC0736817" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.274", + "matchCriteriaId": "0A84D5BC-006F-41C5-A54D-6D45236009B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.238", + "matchCriteriaId": "C3C0DBBF-0923-4D2A-9178-134691F9933F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.196", + "matchCriteriaId": "F3CAB837-7D38-4934-AD4F-195CEFD754E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.128", + "matchCriteriaId": "6267BD4E-BE25-48B5-B850-4B493440DAFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.46", + "matchCriteriaId": "59455D13-A902-42E1-97F7-5ED579777193" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "7806E7E5-6D4F-4E18-81C1-79B3C60EE855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/282baa8104af44e04c4af3e7f933b44267c7f86f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2eb4e0b3631832a4291c8bf4c9db873f60b128c8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/45011f2973f6b52cf50db397bb27bf805f5f0e7f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6031daaaf6d5c359c99dfffa102e332df234ff09", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/77a99aad5bc3ea105806ebae6be3cbadc2fc615e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9f460ae31c4435fd022c443a6029352217a16ac1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e7fbd8184fa9e85f0d648c499841cb7ff6dec9f4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e8e9d2968a9d08bf5c683afca182f1537edebf8d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/282baa8104af44e04c4af3e7f933b44267c7f86f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2eb4e0b3631832a4291c8bf4c9db873f60b128c8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/45011f2973f6b52cf50db397bb27bf805f5f0e7f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6031daaaf6d5c359c99dfffa102e332df234ff09", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/77a99aad5bc3ea105806ebae6be3cbadc2fc615e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9f460ae31c4435fd022c443a6029352217a16ac1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e7fbd8184fa9e85f0d648c499841cb7ff6dec9f4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e8e9d2968a9d08bf5c683afca182f1537edebf8d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47255.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47255.json index 70866947adf..4c2fd03c781 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47255.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47255.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47255", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:14.303", - "lastModified": "2024-11-21T06:35:44.037", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T15:11:57.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,161 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: kvm: LAPIC: Restaurar protecci\u00f3n para evitar el acceso ilegal al registro APIC. Seg\u00fan el SDM, \"cualquier acceso que toque los bytes 4 al 15 de un registro APIC puede causar un comportamiento indefinido y no debe ejecutarse \". Peor a\u00fan, dicho acceso en kvm_lapic_reg_read puede resultar en una fuga del contenido de la pila del kernel. Antes de confirmar 01402cf81051 (\"kvm: LAPIC: anotar registros APIC v\u00e1lidos\"), dicho acceso se prohib\u00eda expl\u00edcitamente. Restaura la guardia que se elimin\u00f3 en esa confirmaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3", + "versionEndExcluding": "5.4.128", + "matchCriteriaId": "DC847EC3-F5C9-4A5D-B3AE-048BFB665C62" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.46", + "matchCriteriaId": "59455D13-A902-42E1-97F7-5ED579777193" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "7806E7E5-6D4F-4E18-81C1-79B3C60EE855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/018685461a5b9a9a70e664ac77aef0d7415a3fd5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/218bf772bddd221489c38dde6ef8e917131161f6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a2aff09807fbe4018c269d3773a629949058b210", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bf99ea52970caeb4583bdba1192c1f9b53b12c84", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/018685461a5b9a9a70e664ac77aef0d7415a3fd5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/218bf772bddd221489c38dde6ef8e917131161f6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a2aff09807fbe4018c269d3773a629949058b210", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bf99ea52970caeb4583bdba1192c1f9b53b12c84", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47256.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47256.json index 705b062f850..42d438b827b 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47256.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47256.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47256", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:14.380", - "lastModified": "2024-11-21T06:35:44.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T15:05:57.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,55 +15,203 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/memory-failure: aseg\u00farese de esperar la reescritura de la p\u00e1gina en Memory_failure. Nuestro syzkaller activa el \"BUG_ON(!list_empty(&inode->i_wb_list))\" en clear_inode: kernel BUG en fs /inodo.c:519! Error interno: Oops - BUG: 0 [#1] M\u00f3dulos SMP vinculados en: Proceso syz-executor.0 (pid: 249, l\u00edmite de pila = 0x00000000a12409d7) CPU: 1 PID: 249 Comm: syz-executor.0 No contaminado 4.19. 95 Nombre de hardware: linux,dummy-virt (DT) pstate: 80000005 (Nzcv daif -PAN -UAO) pc: clear_inode+0x280/0x2a8 lr: clear_inode+0x280/0x2a8 Rastreo de llamadas: clear_inode+0x280/0x2a8 ext4_clear_inode+0x38/0xe8 ext4_free_inode+0x130/0xc68 ext4_evict_inode+0xb20/0xcb8 desalojar+0x1a8/0x3c0 iput+0x344/0x460 do_unlinkat+0x260/0x410 __arm64_sys_unlinkat+0x6c/0xc0 el0_svc_common+0xdc /0x3b0 el0_svc_handler+0xf8/0x160 el0_svc+0x10/0x218 P\u00e1nico del kernel: no se sincroniza : Excepci\u00f3n fatal Un volcado de memoria de este problema muestra que alguien llam\u00f3 a __munlock_pagevec para borrar la p\u00e1gina LRU sin lock_page: do_mmap -> mmap_region -> do_munmap -> munlock_vma_pages_range -> __munlock_pagevec. Como resultado, Memory_failure llamar\u00e1 a identify_page_state sin wait_on_page_writeback. Y despu\u00e9s de truncate_error_page, borre el mapeo de esta p\u00e1gina. end_page_writeback no llamar\u00e1 a sb_clear_inode_writeback para borrar inode->i_wb_list. \u00a1Eso activar\u00e1 BUG_ON en clear_inode! Solucionarlo marcando tambi\u00e9n PageWriteback para ayudar a determinar si debemos omitir wait_on_page_writeback." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.16", + "versionEndExcluding": "4.14.238", + "matchCriteriaId": "CC6F60EE-EF5A-4213-9927-5F26053B4B41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.196", + "matchCriteriaId": "F3CAB837-7D38-4934-AD4F-195CEFD754E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.128", + "matchCriteriaId": "6267BD4E-BE25-48B5-B850-4B493440DAFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.46", + "matchCriteriaId": "59455D13-A902-42E1-97F7-5ED579777193" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "7806E7E5-6D4F-4E18-81C1-79B3C60EE855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/28788dc5c70597395b6b451dae4549bbaa8e2c56", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/566345aaabac853aa866f53a219c4b02a6beb527", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6d210d547adc2218ef8b5bcf23518c5f2f1fd872", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9e379da727a7a031be9b877cde7b9c34a0fb8306", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d05267fd27a5c4f54e06daefa3035995d765ca0c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e8675d291ac007e1c636870db880f837a9ea112a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/28788dc5c70597395b6b451dae4549bbaa8e2c56", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/566345aaabac853aa866f53a219c4b02a6beb527", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6d210d547adc2218ef8b5bcf23518c5f2f1fd872", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9e379da727a7a031be9b877cde7b9c34a0fb8306", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d05267fd27a5c4f54e06daefa3035995d765ca0c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e8675d291ac007e1c636870db880f837a9ea112a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47258.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47258.json index 63a27122b0a..819ec6dc4e6 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47258.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47258.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47258", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:14.537", - "lastModified": "2024-11-21T06:35:44.460", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T15:05:14.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,63 +15,218 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: core: corrige el manejo de errores de scsi_host_alloc(). Despu\u00e9s de que el dispositivo se inicializa mediante device_initialize(), o su nombre se establece mediante dev_set_name(), el dispositivo debe liberarse mediante put_device (). De lo contrario, se filtrar\u00e1 el nombre del dispositivo porque se asigna din\u00e1micamente en dev_set_name(). Solucione la fuga reemplazando kfree() con put_device(). Dado que scsi_host_dev_release() maneja adecuadamente la eliminaci\u00f3n de IDA y kthread, elimine tambi\u00e9n estas may\u00fasculas y min\u00fasculas especiales del manejo de errores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.9.273", + "matchCriteriaId": "2AAF8753-C28A-4F2A-8469-E86334097252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.237", + "matchCriteriaId": "83CDDAD5-5539-46C9-9255-C1DAC38F7905" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.195", + "matchCriteriaId": "23EECCE9-4D4C-4684-AB00-10C938F5DDC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.126", + "matchCriteriaId": "876275F9-BEC7-40E8-9D7F-A20729A4A4FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.44", + "matchCriteriaId": "DA547B08-9D25-467B-AD0D-8460FE4EE70D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.11", + "matchCriteriaId": "F914A757-FAFD-407E-9031-21F66635D5EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2dc85045ae65b9302a1d2e2ddd7ce4c030153a6a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/45d83db4728127944b237c0c8248987df9d478e7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/66a834d092930cf41d809c0e989b13cd6f9ca006", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/79296e292d67fa7b5fb8d8c27343683e823872c8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7a696ce1d5d16a33a6cd6400bbcc0339b2460e11", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8958181c1663e24a13434448e7d6b96b5d04900a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/db08ce595dd64ea9859f7d088b51cbfc8e685c66", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2dc85045ae65b9302a1d2e2ddd7ce4c030153a6a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/45d83db4728127944b237c0c8248987df9d478e7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/66a834d092930cf41d809c0e989b13cd6f9ca006", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/79296e292d67fa7b5fb8d8c27343683e823872c8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7a696ce1d5d16a33a6cd6400bbcc0339b2460e11", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8958181c1663e24a13434448e7d6b96b5d04900a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/db08ce595dd64ea9859f7d088b51cbfc8e685c66", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47261.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47261.json index 84c61806c42..254004925ee 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47261.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47261.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47261", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:14.770", - "lastModified": "2024-11-21T06:35:44.887", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T15:03:53.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,177 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: IB/mlx5: Correcci\u00f3n al inicializar el b\u00fafer de fragmentos CQ. Se puede llamar a la funci\u00f3n init_cq_frag_buf() para inicializar el b\u00fafer de fragmentos CQ actual cq->buf, o el cq->resize_buf temporal que es rellenado durante la operaci\u00f3n de cambio de tama\u00f1o de CQ. Sin embargo, la confirmaci\u00f3n infractora comenz\u00f3 a usar la funci\u00f3n get_cqe() para obtener los CQE, el problema con este cambio es que get_cqe() siempre devuelve CQE desde cq->buf, lo que nos lleva a inicializar el b\u00fafer incorrecto y, en caso de ampliarlo, En el CQ intentamos acceder a elementos m\u00e1s all\u00e1 del tama\u00f1o del cq->buf actual y finalmente entramos en p\u00e1nico en el kernel. [excepci\u00f3n RIP: init_cq_frag_buf+103] [ffff9f799ddcbcd8] mlx5_ib_resize_cq en fffffffc0835d60 [mlx5_ib] [ffff9f799ddcbdb0] ib_resize_cq en fffffffc05270df [ib_core] [ffff9f799ddcbdc0] _rdma_setup_qp en ffffffffc0a6a712 [llt] [ffff9f799ddcbe10] llt_rdma_cc_event_action en ffffffffc0a6b411 [llt] [ffff9f799ddcbe98] llt_rdma_client_conn_thread en ffffffffc0a6bb75 [llt] [ffff9f799ddcbec8] kthread en ffffffffa66c5da1 [ffff9f799ddcbf50] ret_from_fork_nospec_begin en ffffffffa6d95ddd Arr\u00e9glelo obteniendo el CQE necesario llamando a mlx5_frag_buf_get_wqe() que toma el b\u00fafer de origen correcto como par\u00e1metro." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-706" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.17", + "versionEndExcluding": "4.19.195", + "matchCriteriaId": "5017B18F-E493-4424-A351-A210614CF65E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.126", + "matchCriteriaId": "876275F9-BEC7-40E8-9D7F-A20729A4A4FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.44", + "matchCriteriaId": "DA547B08-9D25-467B-AD0D-8460FE4EE70D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.11", + "matchCriteriaId": "F914A757-FAFD-407E-9031-21F66635D5EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1ec2dcd680c71d0d36fa25638b327a468babd5c9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2ba0aa2feebda680ecfc3c552e867cf4d1b05a3a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3e670c54eda238cb8a1ea93538a79ae89285c1c4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/91f7fdc4cc10542ca1045c06aad23365f0d067e0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e3ecd9c09fcc10cf6b2bc67e2990c397c40a8c26", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1ec2dcd680c71d0d36fa25638b327a468babd5c9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2ba0aa2feebda680ecfc3c552e867cf4d1b05a3a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3e670c54eda238cb8a1ea93538a79ae89285c1c4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/91f7fdc4cc10542ca1045c06aad23365f0d067e0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e3ecd9c09fcc10cf6b2bc67e2990c397c40a8c26", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47263.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47263.json index 121da5a77d3..719cef2c229 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47263.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47263.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47263", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:15.007", - "lastModified": "2024-11-21T06:35:45.180", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T14:59:24.723", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,135 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: gpio: wcd934x: correcci\u00f3n de error de desplazamiento fuera de los l\u00edmites. La m\u00e1scara de bits para los pines 0 a 4 es BIT(0) a BIT(4); sin embargo, terminamos con BIT( n - 1) lo cual no es correcto, y esto fue detectado por la siguiente verificaci\u00f3n USB UBSAN: shift-out-of-bounds in drivers/gpio/gpio-wcd934x.c:34:14" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.6", + "versionEndExcluding": "5.10.44", + "matchCriteriaId": "ED784810-777C-4118-B4A8-B9C759CB0567" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.11", + "matchCriteriaId": "F914A757-FAFD-407E-9031-21F66635D5EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/dbec64b11c65d74f31427e2b9d5746fbf17bf840", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dd55331d493b7ea75c5db1f24d6822946fde2862", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e0b518a2eb44d8a74c19e50f79a8ed393e96d634", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dbec64b11c65d74f31427e2b9d5746fbf17bf840", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dd55331d493b7ea75c5db1f24d6822946fde2862", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e0b518a2eb44d8a74c19e50f79a8ed393e96d634", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47265.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47265.json index 663c5b337ba..ffad8945f5d 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47265.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47265.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47265", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:15.147", - "lastModified": "2024-11-21T06:35:45.380", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T14:57:20.310", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,114 @@ "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: RDMA: Verificar puerto al crear regla de flujo. Validar valor de puerto proporcionado por el usuario y con ello eliminar la validaci\u00f3n que ya no necesita el controlador. La verificaci\u00f3n que falta en el controlador mlx5_ib podr\u00eda provocar los siguientes errores. Seguimiento de llamadas: _create_flow_rule+0x2d4/0xf28 [mlx5_ib] mlx5_ib_create_flow+0x2d0/0x5b0 [mlx5_ib] ib_uverbs_ex_create_flow+0x4cc/0x624 [ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0xd4/0x1 50 [ib_uverbs] ib_uverbs_cmd_verbs.isra.7+0xb28/0xc50 [ib_uverbs] ib_uverbs_ioctl+0x158 /0x1d0 [ib_uverbs] do_vfs_ioctl+0xd0/0xaf0 ksys_ioctl+0x84/0xb4 __arm64_sys_ioctl+0x28/0xc4 el0_svc_common.constprop.3+0xa4/0x254 el0_svc_handler+0x84/0xa0 0x10/0x26c C\u00f3digo: b9401260 f9615681 51000400 8b001c20 (f9403c1a)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.12", + "versionEndExcluding": "5.12.11", + "matchCriteriaId": "72465A2F-E320-41DA-9DDE-71716705D665" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2adcb4c5a52a2623cd2b43efa7041e74d19f3a5e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8dc1b0e0ca204596c50bcd159ee069ae0f998176", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2adcb4c5a52a2623cd2b43efa7041e74d19f3a5e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8dc1b0e0ca204596c50bcd159ee069ae0f998176", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47272.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47272.json index ccbf05d3006..be5b7d5bf5c 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47272.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47272.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47272", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:15.687", - "lastModified": "2024-11-21T06:35:46.283", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T14:55:59.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,135 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: dwc3: gadget: Bail from dwc3_gadget_exit() si dwc->gadget es NULL. Existe un posible escenario en el que dwc3_gadget_init() puede fallar: durante durante el host -> modo perif\u00e9rico Cambie a dwc3_set_mode() y un controlador de dispositivo pendiente no se vincula. Luego, si el DRD sufre otro cambio de modo desde perif\u00e9rico->host, el dwc3_gadget_exit() resultante intentar\u00e1 hacer referencia a un puntero dwc->gadget no v\u00e1lido y colgante, as\u00ed como llamar a dma_free_coherent() en punteros DMA no asignados. El escenario exacto se puede reproducir de la siguiente manera: - Iniciar DWC3 en modo perif\u00e9rico - Configurar el gadget ConfigFS con la instancia FunctionFS (o usar g_ffs) - Ejecutar la aplicaci\u00f3n de espacio de usuario FunctionFS (abrir EP, escribir descriptores, etc.) - Vincular el controlador del gadget al UDC de DWC3 - Cambiar DWC3 al modo host => se llama a dwc3_gadget_exit(). usb_del_gadget() colocar\u00e1 la instancia del controlador ConfigFS en gadget_driver_pending_list - Detener la aplicaci\u00f3n FunctionFS (cierra los archivos ep) - Cambiar DWC3 al modo perif\u00e9rico => dwc3_gadget_init() falla ya que usb_add_gadget() llama a check_pending_gadget_drivers() e intenta volver a vincular el UDC al El gadget ConfigFS pero falla con -19 (-ENODEV) porque la instancia FFS no est\u00e1 en estado FFS_ACTIVE (el espacio de usuario a\u00fan no se ha reabierto ni escrito los descriptores, es decir, desc_ready!=0). - Vuelva a cambiar DWC3 al modo host => se vuelve a llamar a dwc3_gadget_exit(), pero esta vez dwc->gadget no es v\u00e1lido. Aunque se puede argumentar que el espacio de usuario debe asumir la responsabilidad de garantizar que la aplicaci\u00f3n FunctionFS est\u00e9 lista antes de permitir que el controlador compuesto se vincule al UDC, no hacerlo no deber\u00eda generar p\u00e1nico por parte del controlador del kernel. Solucione este problema configurando dwc->gadget en NULL en la ruta de falla de dwc3_gadget_init() y agregue una marca a dwc3_gadget_exit() para salir del problema a menos que el puntero del gadget sea v\u00e1lido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10", + "versionEndExcluding": "5.10.44", + "matchCriteriaId": "C7E14A6C-41D9-41C0-88FA-8959D208A792" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.11", + "matchCriteriaId": "F914A757-FAFD-407E-9031-21F66635D5EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/03715ea2e3dbbc56947137ce3b4ac18a726b2f87", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4aad390363d2b9b3e92428dd34d27bb7ea8f1ee8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/851dee5a5da56564a70290713aee665403bb0b24", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/03715ea2e3dbbc56947137ce3b4ac18a726b2f87", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4aad390363d2b9b3e92428dd34d27bb7ea8f1ee8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/851dee5a5da56564a70290713aee665403bb0b24", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47275.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47275.json index aab4f69f534..c56d93fe13c 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47275.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47275.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47275", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:15.903", - "lastModified": "2024-11-21T06:35:46.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T14:49:09.583", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,113 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bcache: evita solicitudes de lectura de gran tama\u00f1o en la ruta del c\u00f3digo faltante de la cach\u00e9. En la ruta del c\u00f3digo faltante de la cach\u00e9 del dispositivo almacenado en cach\u00e9, si una ubicaci\u00f3n adecuada del \u00e1rbol B+ interno coincide con un rango de falta de cach\u00e9, La funci\u00f3n cached_dev_cache_miss() se llamar\u00e1 en cache_lookup_fn() en el siguiente bloque de c\u00f3digo, [bloque de c\u00f3digo 1] 526 unsigned int sectores = KEY_INODE(k) == s->iop.inode 527? min_t(uint64_t, INT_MAX, 528 KEY_START(k) - bio->bi_iter.bi_sector) 529: INT_MAX; 530 int ret = s->d->cache_miss(b, s, bio, sectors); Aqu\u00ed s->d->cache_miss() es el puntero de funci\u00f3n de devoluci\u00f3n de llamada inicializado como cached_dev_cache_miss(), el \u00faltimo par\u00e1metro 'sectors' es una pista importante para calcular el tama\u00f1o de la solicitud de lectura al dispositivo de respaldo de los datos de cach\u00e9 faltantes. El c\u00e1lculo actual en el bloque de c\u00f3digo anterior puede generar un valor sobredimensionado de 'sectors', lo que en consecuencia puede desencadenar 2 posibles p\u00e1nicos del kernel diferentes mediante BUG() o BUG_ON() como se enumera a continuaci\u00f3n, 1) BUG_ON() dentro de bch_btree_insert_key(), [bloque de c\u00f3digo 2 ] 886 BUG_ON(b->ops->is_extents && !KEY_SIZE(k)); 2) BUG() dentro de biovec_slab(), [bloque de c\u00f3digo 3] 51 predeterminado: 52 BUG(); 53 devuelve NULO; Todos los p\u00e1nicos anteriores son originales de cached_dev_cache_miss() por el par\u00e1metro 'sectors' de gran tama\u00f1o. Dentro de cached_dev_cache_miss(), el par\u00e1metro 'sectors' se utiliza para calcular el tama\u00f1o de los datos le\u00eddos desde el dispositivo de respaldo para el cach\u00e9 que falta. Este tama\u00f1o se almacena en s->insert_bio_sectors mediante las siguientes l\u00edneas de c\u00f3digo, [bloque de c\u00f3digo 4] 909 s->insert_bio_sectors = min(sectors, bio_sectors(bio) + reada); Luego, la clave real que se inserta en el \u00e1rbol B+ interno se genera y almacena en s->iop.replace_key mediante las siguientes l\u00edneas de c\u00f3digo, [bloque de c\u00f3digo 5] 911 s->iop.replace_key = KEY(s->iop.inode, 912 bio->bi_iter.bi_sector + s->insertar_bio_sectores, 913 s->insertar_bio_sectores); El par\u00e1metro 'sectors' de gran tama\u00f1o puede provocar p\u00e1nico 1) mediante BUG_ON() del bloque de c\u00f3digo anterior. Y el env\u00edo de biograf\u00eda al dispositivo de respaldo para los datos faltantes se asigna con una sugerencia de s->insert_bio_sectors mediante las siguientes l\u00edneas de c\u00f3digo, [bloque de c\u00f3digo 6] 926 cache_bio = bio_alloc_bioset(GFP_NOWAIT, 927 DIV_ROUND_UP(s->insert_bio_sectors, PAGE_SECTORS), 928 &dc->disk.bio_split); Los 'sectors' de par\u00e1metros de gran tama\u00f1o pueden provocar p\u00e1nico 2) mediante BUG() desde el bloque de c\u00f3digo anterior. Ahora perm\u00edtanme explicar c\u00f3mo se produce el p\u00e1nico en los \"sectors\" sobredimensionados. En el bloque de c\u00f3digo 5, replace_key se genera mediante la macro KEY(). De la definici\u00f3n de macro KEY(), [bloque de c\u00f3digo 7] 71 #define KEY(inode, offset, size) \\ 72 ((struct bkey) { \\ 73 .high = (1ULL << 63) | ((__u64) ( tama\u00f1o) << 20) | (inodo), \\ 74 .low = (desplazamiento) \\ 75 }) Aqu\u00ed 'tama\u00f1o' es un ancho de 16 bits incrustado en el miembro 'alto' de 64 bits de la estructura bkey. Pero en el bloque de c\u00f3digo 1, si \"KEY_START(k) - bio->bi_iter.bi_sector\" es muy probable que sea mayor que (1<<16) - 1, lo que hace que el c\u00e1lculo del tama\u00f1o de la clave b en el bloque de c\u00f3digo 5 se desborde. En un informe de error, el valor del par\u00e1metro 'sectors' es 131072 (= 1 << 17), los 'sectors' desbordados dan como resultado s->insert_bio_sectors desbordados en el bloque de c\u00f3digo 4, luego convierte el campo de tama\u00f1o de s->iop.replace_key en sea 0 en el bloque de c\u00f3digo 5. Luego, el tama\u00f1o 0 s->iop.replace_key se inserta en el \u00e1rbol B+ interno como clave de verificaci\u00f3n de falta de cach\u00e9 (una clave especial para detectar y evitar una ejecuci\u00f3n entre la solicitud de escritura normal y la solicitud de lectura faltante de cach\u00e9) como, [bloque de c\u00f3digo 8] 915 ret = ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.12.11", + "matchCriteriaId": "FB3C9604-BFC9-4C0B-BA5C-974549F97FF6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/41fe8d088e96472f63164e213de44ec77be69478", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/555002a840ab88468e252b0eedf0b05e2ce7099c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/41fe8d088e96472f63164e213de44ec77be69478", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/555002a840ab88468e252b0eedf0b05e2ce7099c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47276.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47276.json index 7107a53c77e..2553e63d338 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47276.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47276.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47276", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:15.983", - "lastModified": "2024-11-21T06:35:46.860", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T14:46:07.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,71 +15,240 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ftrace: no lea ciegamente la direcci\u00f3n IP en ftrace_bug(). Se inform\u00f3 que un error en arm64 provoc\u00f3 que se usara una direcci\u00f3n IP incorrecta para actualizar a un nop en ftrace_init() , pero la ruta de error (con raz\u00f3n) devolvi\u00f3 -EINVAL y no -EFAULT, ya que el error provoc\u00f3 que ocurriera m\u00e1s de un error. Pero debido a que se devolvi\u00f3 -EINVAL, ftrace_bug() intent\u00f3 informar qu\u00e9 hab\u00eda en la ubicaci\u00f3n de la direcci\u00f3n IP y leerlo directamente. Esto provoc\u00f3 que la m\u00e1quina entrara en p\u00e1nico, ya que la IP no apuntaba a una direcci\u00f3n de memoria v\u00e1lida. En su lugar, lea la direcci\u00f3n IP con copy_from_kernel_nofault() para acceder de forma segura a la memoria y, si falla, informe que la direcci\u00f3n fall\u00f3; de lo contrario, informe qu\u00e9 hab\u00eda en esa ubicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-706" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.28", + "versionEndExcluding": "4.4.273", + "matchCriteriaId": "224F5847-99C4-401E-A5D6-712A45CC534F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.273", + "matchCriteriaId": "484D222B-5082-4E28-BF0F-B52766353015" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.237", + "matchCriteriaId": "83CDDAD5-5539-46C9-9255-C1DAC38F7905" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.195", + "matchCriteriaId": "23EECCE9-4D4C-4684-AB00-10C938F5DDC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.126", + "matchCriteriaId": "876275F9-BEC7-40E8-9D7F-A20729A4A4FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.44", + "matchCriteriaId": "DA547B08-9D25-467B-AD0D-8460FE4EE70D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.11", + "matchCriteriaId": "F914A757-FAFD-407E-9031-21F66635D5EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0bc62e398bbd9e600959e610def5109957437b28", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3e4ddeb68751fb4fb657199aed9cfd5d02796875", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4aedc2bc2b32c93555f47c95610efb89cc1ec09b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6c14133d2d3f768e0a35128faac8aa6ed4815051", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7e4e824b109f1d41ccf223fbb0565d877d6223a2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/862dcc14f2803c556bdd73b43c27b023fafce2fb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/97524384762c1fb9b3ded931498dd2047bd0de81", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/acf671ba79c1feccc3ec7cfdcffead4efcec49e7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0bc62e398bbd9e600959e610def5109957437b28", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3e4ddeb68751fb4fb657199aed9cfd5d02796875", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4aedc2bc2b32c93555f47c95610efb89cc1ec09b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6c14133d2d3f768e0a35128faac8aa6ed4815051", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7e4e824b109f1d41ccf223fbb0565d877d6223a2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/862dcc14f2803c556bdd73b43c27b023fafce2fb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/97524384762c1fb9b3ded931498dd2047bd0de81", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/acf671ba79c1feccc3ec7cfdcffead4efcec49e7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47277.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47277.json index 9774746ba4f..6ead77988b5 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47277.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47277.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47277", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:16.053", - "lastModified": "2024-11-21T06:35:46.993", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T14:30:29.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,71 +15,239 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: kvm: evite ataques basados en especulacion desde accesos a memslot fuera de rango. El mecanismo de KVM para acceder a la memoria del invitado traduce una direcci\u00f3n f\u00edsica del invitado (gpa) a una direcci\u00f3n virtual del host usando el bot\u00f3n derecho. gpa desplazado (tambi\u00e9n conocido como gfn) y una estructura kvm_memory_slot. La traducci\u00f3n se realiza en __gfn_to_hva_memslot usando la siguiente f\u00f3rmula: hva = slot->userspace_addr + (gfn - slot->base_gfn) * PAGE_SIZE Se espera que gfn est\u00e9 dentro de los l\u00edmites de la memoria f\u00edsica del hu\u00e9sped. Sin embargo, un invitado puede acceder a direcciones f\u00edsicas no v\u00e1lidas de tal manera que el gfn no sea v\u00e1lido. __gfn_to_hva_memslot se llama desde kvm_vcpu_gfn_to_hva_prot, que primero recupera un memslot a trav\u00e9s de __gfn_to_memslot. Si bien __gfn_to_memslot verifica que el gfn est\u00e9 dentro de los l\u00edmites de la memoria f\u00edsica del hu\u00e9sped o no, una CPU puede especular el resultado de la verificaci\u00f3n y continuar la ejecuci\u00f3n de manera especulativa usando un gfn ilegal. La especulaci\u00f3n puede resultar en el c\u00e1lculo de un hva fuera de los l\u00edmites. Si la direcci\u00f3n virtual del host resultante se utiliza para cargar otra direcci\u00f3n f\u00edsica de invitado, se trata efectivamente de un dispositivo Spectre que consta de dos lecturas consecutivas, la segunda de las cuales depende de los datos de la primera. En este momento no est\u00e1 claro si hay casos en los que esto sea explotable. El autor original de este parche inform\u00f3 un caso interesante que implica visitar tablas de p\u00e1ginas de invitados en x86. En este momento, estos no son vulnerables porque la lectura de hva pasa por get_user(), que contiene una barrera de especulaci\u00f3n LFENCE. Sin embargo, hay parches en progreso para x86 uaccess.h para enmascarar las direcciones del kernel en lugar de usar LFENCE; Una vez que aterrizan, un invitado podr\u00eda usar la especulaci\u00f3n para leer desde el espacio de direcciones del anillo 3 del VMM. Otras arquitecturas, como ARM, ya utilizan el m\u00e9todo de enmascaramiento de direcciones y ser\u00edan susceptibles a este mismo tipo de dispositivos de acceso dependientes de datos. Por lo tanto, este parche protege proactivamente contra estos ataques al enmascarar gfns fuera de los l\u00edmites en __gfn_to_hva_memslot, lo que bloquea la especulaci\u00f3n sobre hvas no v\u00e1lidos. Sean Christopherson se\u00f1al\u00f3 que este parche no cubre kvm_read_guest_offset_cached. Sin embargo, esto se limita a unos pocos bytes despu\u00e9s del final de la cach\u00e9 y, por lo tanto, es poco probable que sea \u00fatil en el contexto de la construcci\u00f3n de una cadena de accesos dependientes de datos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4.273", + "matchCriteriaId": "2A209A4F-1F96-4D92-BCA6-A12D00C4404B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.273", + "matchCriteriaId": "484D222B-5082-4E28-BF0F-B52766353015" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.237", + "matchCriteriaId": "83CDDAD5-5539-46C9-9255-C1DAC38F7905" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.195", + "matchCriteriaId": "23EECCE9-4D4C-4684-AB00-10C938F5DDC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.126", + "matchCriteriaId": "876275F9-BEC7-40E8-9D7F-A20729A4A4FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.44", + "matchCriteriaId": "DA547B08-9D25-467B-AD0D-8460FE4EE70D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.11", + "matchCriteriaId": "F914A757-FAFD-407E-9031-21F66635D5EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/22b87fb17a28d37331bb9c1110737627b17f6781", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3098b86390a6b9ea52657689f08410baf130ceff", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/361ce3b917aff93123e9e966d8608655c967f438", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/740621309b25bbf619b8a0ba5fd50a8e58989441", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7af299b97734c7e7f465b42a2139ce4d77246975", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bff1fbf0cf0712686f1df59a83fba6e31d2746a0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/da27a83fd6cc7780fea190e1f5c19e87019da65c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ed0e2a893092c7fcb4ff7ba74e5efce53a6f5940", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/22b87fb17a28d37331bb9c1110737627b17f6781", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3098b86390a6b9ea52657689f08410baf130ceff", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/361ce3b917aff93123e9e966d8608655c967f438", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/740621309b25bbf619b8a0ba5fd50a8e58989441", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7af299b97734c7e7f465b42a2139ce4d77246975", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bff1fbf0cf0712686f1df59a83fba6e31d2746a0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/da27a83fd6cc7780fea190e1f5c19e87019da65c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ed0e2a893092c7fcb4ff7ba74e5efce53a6f5940", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47282.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47282.json index a3e16e891e1..8282478f1c4 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47282.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47282.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47282", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:16.430", - "lastModified": "2024-11-21T06:35:47.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T14:30:12.573", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,156 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: spi: bcm2835: corrige el acceso fuera de los l\u00edmites con m\u00e1s de 4 esclavos. La confirmaci\u00f3n 571e31fa60b3 (\"spi: bcm2835: valor de registro CS de cach\u00e9 para ->prepare_message()\") limit\u00f3 el n\u00famero de esclavos a 3 en tiempo de compilaci\u00f3n. La limitaci\u00f3n fue necesaria por una matriz de tama\u00f1o est\u00e1tico prepare_cs[] en los datos privados del controlador que contiene un valor de registro por esclavo. La confirmaci\u00f3n buscaba hacer cumplir la limitaci\u00f3n en tiempo de ejecuci\u00f3n estableciendo num_chipselect del controlador en 3: spi_add_device() rechaza los esclavos con una selecci\u00f3n de chip m\u00e1s alta. Sin embargo, la confirmaci\u00f3n omiti\u00f3 que num_chipselect solo limita el n\u00famero de selecciones de chips *nativas*. Si se especifican selecciones de chips GPIO en el \u00e1rbol de dispositivos para m\u00e1s de 3 esclavos, of_spi_get_gpio_numbers() genera silenciosamente num_chipselect y el resultado son accesos fuera de los l\u00edmites a la matriz de tama\u00f1o est\u00e1tico prepare_cs[]. Como soluci\u00f3n curita que se puede volver a transferir a estable, aumente la cantidad de esclavos permitidos a 24 (lo que \"deber\u00eda ser suficiente para cualquiera\"), aplique la limitaci\u00f3n en esclavo -> configuraci\u00f3n y revierta num_chipselect a 3 (que es la cantidad de nativos selecciones de chips admitidas por el controlador). Una pr\u00f3xima confirmaci\u00f3n para la pr\u00f3xima permitir\u00e1 una cantidad arbitraria de esclavos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4", + "versionEndExcluding": "5.4.126", + "matchCriteriaId": "6D23A3FF-8CE4-41A1-9E6A-8138FDC413F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.44", + "matchCriteriaId": "DA547B08-9D25-467B-AD0D-8460FE4EE70D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.11", + "matchCriteriaId": "F914A757-FAFD-407E-9031-21F66635D5EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/01415ff85a24308059e06ca3e97fd7bf75648690", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/13817d466eb8713a1ffd254f537402f091d48444", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/82a8ffba54d31e97582051cb56ba1f988018681e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b5502580cf958b094f3b69dfe4eece90eae01fbc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/01415ff85a24308059e06ca3e97fd7bf75648690", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/13817d466eb8713a1ffd254f537402f091d48444", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/82a8ffba54d31e97582051cb56ba1f988018681e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b5502580cf958b094f3b69dfe4eece90eae01fbc", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47286.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47286.json index 95c44de6432..d95274a6b50 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47286.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47286.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47286", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:16.723", - "lastModified": "2024-11-21T06:35:48.023", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T14:26:35.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,120 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bus: mhi: core: valida el ID del canal al procesar la finalizaci\u00f3n del comando MHI lee el ID del canal del elemento del anillo de eventos enviado por el dispositivo, que puede tener cualquier valor entre 0 y 255. Para evitar accesos fuera de los l\u00edmites, agregue una verificaci\u00f3n del n\u00famero m\u00e1ximo de canales admitidos por el controlador y aquellos canales que a\u00fan no est\u00e1n configurados para omitir el procesamiento de ese elemento del anillo de eventos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.7", + "versionEndExcluding": "5.10.54", + "matchCriteriaId": "ACAFA789-29AA-41E7-9D88-F49BCA874252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.13.6", + "matchCriteriaId": "512C22FC-1524-4E6F-9E62-4F4B7B6E0576" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*", + "matchCriteriaId": "71268287-21A8-4488-AA4F-23C473153131" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*", + "matchCriteriaId": "23B9E5C6-FAB5-4A02-9E39-27C8787B0991" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3efec3b4b16fc7af25676a94230a8ab2a3bb867c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/546362a9ef2ef40b57c6605f14e88ced507f8dd0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aed4f5b51aba41e2afd7cfda20a0571a6a67dfe9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3efec3b4b16fc7af25676a94230a8ab2a3bb867c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/546362a9ef2ef40b57c6605f14e88ced507f8dd0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aed4f5b51aba41e2afd7cfda20a0571a6a67dfe9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-04xx/CVE-2022-0421.json b/CVE-2022/CVE-2022-04xx/CVE-2022-0421.json index a593f4800f1..979250453e8 100644 --- a/CVE-2022/CVE-2022-04xx/CVE-2022-0421.json +++ b/CVE-2022/CVE-2022-04xx/CVE-2022-0421.json @@ -2,7 +2,7 @@ "id": "CVE-2022-0421", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-21T11:15:19.153", - "lastModified": "2024-11-21T06:38:35.540", + "lastModified": "2025-04-30T15:15:50.137", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2022/CVE-2022-15xx/CVE-2022-1578.json b/CVE-2022/CVE-2022-15xx/CVE-2022-1578.json index 87dda2ae93b..bb61fd85218 100644 --- a/CVE-2022/CVE-2022-15xx/CVE-2022-1578.json +++ b/CVE-2022/CVE-2022-15xx/CVE-2022-1578.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1578", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-21T11:15:19.887", - "lastModified": "2024-11-21T06:41:00.377", + "lastModified": "2025-04-30T15:15:51.100", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-15xx/CVE-2022-1579.json b/CVE-2022/CVE-2022-15xx/CVE-2022-1579.json index 37c3340cc17..6bdde2fcf33 100644 --- a/CVE-2022/CVE-2022-15xx/CVE-2022-1579.json +++ b/CVE-2022/CVE-2022-15xx/CVE-2022-1579.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1579", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-21T11:15:19.960", - "lastModified": "2024-11-21T06:41:00.493", + "lastModified": "2025-04-30T15:15:51.260", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-15xx/CVE-2022-1581.json b/CVE-2022/CVE-2022-15xx/CVE-2022-1581.json index 83222e83cec..42cfc0086cf 100644 --- a/CVE-2022/CVE-2022-15xx/CVE-2022-1581.json +++ b/CVE-2022/CVE-2022-15xx/CVE-2022-1581.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1581", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-21T11:15:20.037", - "lastModified": "2024-11-21T06:41:00.723", + "lastModified": "2025-04-30T15:15:51.403", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20427.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20427.json index 22649c7b5fd..e560f0584da 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20427.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20427.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20427", "sourceIdentifier": "security@android.com", "published": "2022-11-17T23:15:12.967", - "lastModified": "2024-11-21T06:42:47.557", + "lastModified": "2025-04-30T14:15:24.230", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20428.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20428.json index bf05a18f79f..aab28fecef4 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20428.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20428.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20428", "sourceIdentifier": "security@android.com", "published": "2022-11-17T23:15:13.490", - "lastModified": "2024-11-21T06:42:47.667", + "lastModified": "2025-04-30T15:15:51.553", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20459.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20459.json index 0115779615b..68cb78e0800 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20459.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20459.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20459", "sourceIdentifier": "security@android.com", "published": "2022-11-17T23:15:13.730", - "lastModified": "2024-11-21T06:42:51.173", + "lastModified": "2025-04-30T15:15:51.723", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-204xx/CVE-2022-20460.json b/CVE-2022/CVE-2022-204xx/CVE-2022-20460.json index b0150b4750f..78e3c1faaa8 100644 --- a/CVE-2022/CVE-2022-204xx/CVE-2022-20460.json +++ b/CVE-2022/CVE-2022-204xx/CVE-2022-20460.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20460", "sourceIdentifier": "security@android.com", "published": "2022-11-17T23:15:14.070", - "lastModified": "2024-11-21T06:42:51.290", + "lastModified": "2025-04-30T15:15:51.880", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-292xx/CVE-2022-29275.json b/CVE-2022/CVE-2022-292xx/CVE-2022-29275.json index 9b5d0e31ec4..4c1c2143dbf 100644 --- a/CVE-2022/CVE-2022-292xx/CVE-2022-29275.json +++ b/CVE-2022/CVE-2022-292xx/CVE-2022-29275.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29275", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-15T21:15:36.607", - "lastModified": "2024-11-21T06:58:51.080", + "lastModified": "2025-04-30T15:15:52.093", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.5, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 6.0 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-292xx/CVE-2022-29276.json b/CVE-2022/CVE-2022-292xx/CVE-2022-29276.json index 93bf894fd35..daedc47746e 100644 --- a/CVE-2022/CVE-2022-292xx/CVE-2022-29276.json +++ b/CVE-2022/CVE-2022-292xx/CVE-2022-29276.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29276", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-15T22:15:10.087", - "lastModified": "2024-11-21T06:58:51.230", + "lastModified": "2025-04-30T15:15:52.360", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.5, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 6.0 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-292xx/CVE-2022-29277.json b/CVE-2022/CVE-2022-292xx/CVE-2022-29277.json index dd2bb2ada1a..c778bed0493 100644 --- a/CVE-2022/CVE-2022-292xx/CVE-2022-29277.json +++ b/CVE-2022/CVE-2022-292xx/CVE-2022-29277.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29277", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-15T22:15:10.933", - "lastModified": "2024-11-21T06:58:51.380", + "lastModified": "2025-04-30T15:15:52.540", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-292xx/CVE-2022-29278.json b/CVE-2022/CVE-2022-292xx/CVE-2022-29278.json index 001cbccf4c1..9ca0d0de2db 100644 --- a/CVE-2022/CVE-2022-292xx/CVE-2022-29278.json +++ b/CVE-2022/CVE-2022-292xx/CVE-2022-29278.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29278", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-15T22:15:11.117", - "lastModified": "2024-11-21T06:58:51.567", + "lastModified": "2025-04-30T15:15:52.750", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.5, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 6.0 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-754" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-292xx/CVE-2022-29279.json b/CVE-2022/CVE-2022-292xx/CVE-2022-29279.json index e1d8b48f591..d3906ddc731 100644 --- a/CVE-2022/CVE-2022-292xx/CVE-2022-29279.json +++ b/CVE-2022/CVE-2022-292xx/CVE-2022-29279.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29279", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-15T22:15:11.277", - "lastModified": "2024-11-21T06:58:51.713", + "lastModified": "2025-04-30T15:15:52.927", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.5, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 6.0 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-302xx/CVE-2022-30257.json b/CVE-2022/CVE-2022-302xx/CVE-2022-30257.json index c5258812a45..cffef278e45 100644 --- a/CVE-2022/CVE-2022-302xx/CVE-2022-30257.json +++ b/CVE-2022/CVE-2022-302xx/CVE-2022-30257.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30257", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-21T22:15:09.773", - "lastModified": "2024-11-21T07:02:27.173", + "lastModified": "2025-04-30T15:15:53.110", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-706" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-706" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-302xx/CVE-2022-30258.json b/CVE-2022/CVE-2022-302xx/CVE-2022-30258.json index a0a4e84bfdf..04806af869c 100644 --- a/CVE-2022/CVE-2022-302xx/CVE-2022-30258.json +++ b/CVE-2022/CVE-2022-302xx/CVE-2022-30258.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30258", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-21T22:15:12.110", - "lastModified": "2024-11-21T07:02:27.317", + "lastModified": "2025-04-30T15:15:53.293", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-706" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-706" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-302xx/CVE-2022-30283.json b/CVE-2022/CVE-2022-302xx/CVE-2022-30283.json index 1bc99f1a3f1..de14ef19170 100644 --- a/CVE-2022/CVE-2022-302xx/CVE-2022-30283.json +++ b/CVE-2022/CVE-2022-302xx/CVE-2022-30283.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30283", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-15T21:15:36.810", - "lastModified": "2024-11-21T07:02:29.650", + "lastModified": "2025-04-30T15:15:53.467", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-33xx/CVE-2022-3336.json b/CVE-2022/CVE-2022-33xx/CVE-2022-3336.json index 0e27adadcc7..d26f7184759 100644 --- a/CVE-2022/CVE-2022-33xx/CVE-2022-3336.json +++ b/CVE-2022/CVE-2022-33xx/CVE-2022-3336.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3336", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-21T11:15:20.340", - "lastModified": "2024-11-21T07:19:19.313", + "lastModified": "2025-04-30T14:15:24.720", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2022/CVE-2022-343xx/CVE-2022-34318.json b/CVE-2022/CVE-2022-343xx/CVE-2022-34318.json index fc1e2c445ea..165e6e8f44e 100644 --- a/CVE-2022/CVE-2022-343xx/CVE-2022-34318.json +++ b/CVE-2022/CVE-2022-343xx/CVE-2022-34318.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34318", "sourceIdentifier": "psirt@us.ibm.com", "published": "2022-12-12T13:15:12.367", - "lastModified": "2024-11-21T07:09:17.337", + "lastModified": "2025-04-30T15:15:53.763", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-1021" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-364xx/CVE-2022-36432.json b/CVE-2022/CVE-2022-364xx/CVE-2022-36432.json index 1e1414790b6..c1f4ff900a1 100644 --- a/CVE-2022/CVE-2022-364xx/CVE-2022-36432.json +++ b/CVE-2022/CVE-2022-364xx/CVE-2022-36432.json @@ -2,7 +2,7 @@ "id": "CVE-2022-36432", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-17T05:15:14.290", - "lastModified": "2024-11-21T07:12:59.810", + "lastModified": "2025-04-30T15:15:53.997", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-36xx/CVE-2022-3600.json b/CVE-2022/CVE-2022-36xx/CVE-2022-3600.json index 62b126700d0..d6cd98f38e2 100644 --- a/CVE-2022/CVE-2022-36xx/CVE-2022-3600.json +++ b/CVE-2022/CVE-2022-36xx/CVE-2022-3600.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3600", "sourceIdentifier": "contact@wpscan.com", "published": "2022-11-21T11:15:20.410", - "lastModified": "2025-02-07T19:44:53.660", + "lastModified": "2025-04-30T14:15:24.883", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-381xx/CVE-2022-38165.json b/CVE-2022/CVE-2022-381xx/CVE-2022-38165.json index 4e56d0a1a41..23ae2c9e5d9 100644 --- a/CVE-2022/CVE-2022-381xx/CVE-2022-38165.json +++ b/CVE-2022/CVE-2022-381xx/CVE-2022-38165.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38165", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-17T23:15:18.003", - "lastModified": "2024-11-21T07:15:55.400", + "lastModified": "2025-04-30T15:15:54.190", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-388xx/CVE-2022-38871.json b/CVE-2022/CVE-2022-388xx/CVE-2022-38871.json index bdf5bc7e98c..5914dcd3a8a 100644 --- a/CVE-2022/CVE-2022-388xx/CVE-2022-38871.json +++ b/CVE-2022/CVE-2022-388xx/CVE-2022-38871.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38871", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-18T23:15:20.117", - "lastModified": "2024-11-21T07:17:12.870", + "lastModified": "2025-04-30T14:15:24.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-408xx/CVE-2022-40846.json b/CVE-2022/CVE-2022-408xx/CVE-2022-40846.json index b8fe36d8e8b..19e579b80ad 100644 --- a/CVE-2022/CVE-2022-408xx/CVE-2022-40846.json +++ b/CVE-2022/CVE-2022-408xx/CVE-2022-40846.json @@ -2,7 +2,7 @@ "id": "CVE-2022-40846", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-15T03:15:14.713", - "lastModified": "2024-11-21T07:22:08.607", + "lastModified": "2025-04-30T15:15:54.480", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-408xx/CVE-2022-40847.json b/CVE-2022/CVE-2022-408xx/CVE-2022-40847.json index c2bbe5c7fe2..979eab5b49d 100644 --- a/CVE-2022/CVE-2022-408xx/CVE-2022-40847.json +++ b/CVE-2022/CVE-2022-408xx/CVE-2022-40847.json @@ -2,7 +2,7 @@ "id": "CVE-2022-40847", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-15T02:15:11.270", - "lastModified": "2024-11-21T07:22:08.760", + "lastModified": "2025-04-30T15:15:54.687", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-413xx/CVE-2022-41395.json b/CVE-2022/CVE-2022-413xx/CVE-2022-41395.json index acd0861b387..b63ff1f6979 100644 --- a/CVE-2022/CVE-2022-413xx/CVE-2022-41395.json +++ b/CVE-2022/CVE-2022-413xx/CVE-2022-41395.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41395", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-15T03:15:14.887", - "lastModified": "2024-11-21T07:23:08.853", + "lastModified": "2025-04-30T15:15:54.867", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-413xx/CVE-2022-41396.json b/CVE-2022/CVE-2022-413xx/CVE-2022-41396.json index fed4faea852..4f172ff0729 100644 --- a/CVE-2022/CVE-2022-413xx/CVE-2022-41396.json +++ b/CVE-2022/CVE-2022-413xx/CVE-2022-41396.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41396", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-15T03:15:15.067", - "lastModified": "2024-11-21T07:23:09.007", + "lastModified": "2025-04-30T15:15:55.063", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-420xx/CVE-2022-42053.json b/CVE-2022/CVE-2022-420xx/CVE-2022-42053.json index 874dddd9412..3ecd79134b2 100644 --- a/CVE-2022/CVE-2022-420xx/CVE-2022-42053.json +++ b/CVE-2022/CVE-2022-420xx/CVE-2022-42053.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42053", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-15T03:15:15.187", - "lastModified": "2024-11-21T07:24:18.170", + "lastModified": "2025-04-30T15:15:55.243", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-420xx/CVE-2022-42058.json b/CVE-2022/CVE-2022-420xx/CVE-2022-42058.json index 375827ec60d..405763f72e5 100644 --- a/CVE-2022/CVE-2022-420xx/CVE-2022-42058.json +++ b/CVE-2022/CVE-2022-420xx/CVE-2022-42058.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42058", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-15T03:15:15.307", - "lastModified": "2024-11-21T07:24:18.587", + "lastModified": "2025-04-30T15:15:55.433", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-421xx/CVE-2022-42118.json b/CVE-2022/CVE-2022-421xx/CVE-2022-42118.json index f3c19e76668..d51d7a98d79 100644 --- a/CVE-2022/CVE-2022-421xx/CVE-2022-42118.json +++ b/CVE-2022/CVE-2022-421xx/CVE-2022-42118.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42118", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-15T01:15:12.410", - "lastModified": "2024-11-21T07:24:23.750", + "lastModified": "2025-04-30T15:15:55.630", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-421xx/CVE-2022-42119.json b/CVE-2022/CVE-2022-421xx/CVE-2022-42119.json index b6bc2552455..ab3d865b758 100644 --- a/CVE-2022/CVE-2022-421xx/CVE-2022-42119.json +++ b/CVE-2022/CVE-2022-421xx/CVE-2022-42119.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42119", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-15T01:15:12.587", - "lastModified": "2024-11-21T07:24:23.913", + "lastModified": "2025-04-30T15:15:55.870", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-421xx/CVE-2022-42125.json b/CVE-2022/CVE-2022-421xx/CVE-2022-42125.json index fbf759ff847..64319dfe719 100644 --- a/CVE-2022/CVE-2022-421xx/CVE-2022-42125.json +++ b/CVE-2022/CVE-2022-421xx/CVE-2022-42125.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42125", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-15T01:15:13.200", - "lastModified": "2024-11-21T07:24:24.877", + "lastModified": "2025-04-30T15:15:56.050", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-421xx/CVE-2022-42126.json b/CVE-2022/CVE-2022-421xx/CVE-2022-42126.json index 925a55f9ff5..b21b1582ef1 100644 --- a/CVE-2022/CVE-2022-421xx/CVE-2022-42126.json +++ b/CVE-2022/CVE-2022-421xx/CVE-2022-42126.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42126", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-15T01:15:13.267", - "lastModified": "2024-11-21T07:24:25.027", + "lastModified": "2025-04-30T15:15:56.240", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-421xx/CVE-2022-42127.json b/CVE-2022/CVE-2022-421xx/CVE-2022-42127.json index 4341c685853..c890d7b2291 100644 --- a/CVE-2022/CVE-2022-421xx/CVE-2022-42127.json +++ b/CVE-2022/CVE-2022-421xx/CVE-2022-42127.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42127", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-15T01:15:13.347", - "lastModified": "2024-11-21T07:24:25.180", + "lastModified": "2025-04-30T15:15:56.417", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-276" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-421xx/CVE-2022-42128.json b/CVE-2022/CVE-2022-421xx/CVE-2022-42128.json index 5582b28b8de..2768b308eb3 100644 --- a/CVE-2022/CVE-2022-421xx/CVE-2022-42128.json +++ b/CVE-2022/CVE-2022-421xx/CVE-2022-42128.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42128", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-15T01:15:13.430", - "lastModified": "2024-11-21T07:24:25.337", + "lastModified": "2025-04-30T15:15:56.587", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-276" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-421xx/CVE-2022-42131.json b/CVE-2022/CVE-2022-421xx/CVE-2022-42131.json index 95b08209312..164038ce3a9 100644 --- a/CVE-2022/CVE-2022-421xx/CVE-2022-42131.json +++ b/CVE-2022/CVE-2022-421xx/CVE-2022-42131.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42131", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-15T02:15:12.087", - "lastModified": "2024-11-21T07:24:25.820", + "lastModified": "2025-04-30T15:15:56.773", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-295" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-421xx/CVE-2022-42132.json b/CVE-2022/CVE-2022-421xx/CVE-2022-42132.json index ff83df38134..aa0ea60f903 100644 --- a/CVE-2022/CVE-2022-421xx/CVE-2022-42132.json +++ b/CVE-2022/CVE-2022-421xx/CVE-2022-42132.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42132", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-15T02:15:12.240", - "lastModified": "2024-11-21T07:24:25.987", + "lastModified": "2025-04-30T15:15:56.963", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-200" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-428xx/CVE-2022-42892.json b/CVE-2022/CVE-2022-428xx/CVE-2022-42892.json index b604deb3cb7..992a9a18d17 100644 --- a/CVE-2022/CVE-2022-428xx/CVE-2022-42892.json +++ b/CVE-2022/CVE-2022-428xx/CVE-2022-42892.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42892", "sourceIdentifier": "productcert@siemens.com", "published": "2022-11-17T17:15:12.880", - "lastModified": "2024-11-21T07:25:32.580", + "lastModified": "2025-04-30T15:15:57.157", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2022/CVE-2022-428xx/CVE-2022-42893.json b/CVE-2022/CVE-2022-428xx/CVE-2022-42893.json index fa85af67636..d52ca00aaee 100644 --- a/CVE-2022/CVE-2022-428xx/CVE-2022-42893.json +++ b/CVE-2022/CVE-2022-428xx/CVE-2022-42893.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42893", "sourceIdentifier": "productcert@siemens.com", "published": "2022-11-17T17:15:13.207", - "lastModified": "2024-11-21T07:25:32.710", + "lastModified": "2025-04-30T15:15:57.337", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-428xx/CVE-2022-42894.json b/CVE-2022/CVE-2022-428xx/CVE-2022-42894.json index 28063661baf..5949584a443 100644 --- a/CVE-2022/CVE-2022-428xx/CVE-2022-42894.json +++ b/CVE-2022/CVE-2022-428xx/CVE-2022-42894.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42894", "sourceIdentifier": "productcert@siemens.com", "published": "2022-11-17T17:15:13.433", - "lastModified": "2024-11-21T07:25:32.830", + "lastModified": "2025-04-30T15:15:57.507", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-429xx/CVE-2022-42903.json b/CVE-2022/CVE-2022-429xx/CVE-2022-42903.json index b84b83857db..b36d5e9800a 100644 --- a/CVE-2022/CVE-2022-429xx/CVE-2022-42903.json +++ b/CVE-2022/CVE-2022-429xx/CVE-2022-42903.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42903", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-17T22:15:10.840", - "lastModified": "2024-11-21T07:25:34.270", + "lastModified": "2025-04-30T15:15:57.673", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-429xx/CVE-2022-42904.json b/CVE-2022/CVE-2022-429xx/CVE-2022-42904.json index 863bf19e537..76976f1d7c5 100644 --- a/CVE-2022/CVE-2022-429xx/CVE-2022-42904.json +++ b/CVE-2022/CVE-2022-429xx/CVE-2022-42904.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42904", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-18T21:15:11.563", - "lastModified": "2024-11-21T07:25:34.440", + "lastModified": "2025-04-30T14:15:25.133", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-429xx/CVE-2022-42954.json b/CVE-2022/CVE-2022-429xx/CVE-2022-42954.json index 0862eda43c1..06aba21a191 100644 --- a/CVE-2022/CVE-2022-429xx/CVE-2022-42954.json +++ b/CVE-2022/CVE-2022-429xx/CVE-2022-42954.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42954", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-17T05:15:15.133", - "lastModified": "2024-11-21T07:25:40.733", + "lastModified": "2025-04-30T15:15:57.860", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-429xx/CVE-2022-42982.json b/CVE-2022/CVE-2022-429xx/CVE-2022-42982.json index af4894362c6..0d1e7ea0abe 100644 --- a/CVE-2022/CVE-2022-429xx/CVE-2022-42982.json +++ b/CVE-2022/CVE-2022-429xx/CVE-2022-42982.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42982", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-17T05:15:15.440", - "lastModified": "2024-11-21T07:25:44.240", + "lastModified": "2025-04-30T14:15:25.340", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-430xx/CVE-2022-43096.json b/CVE-2022/CVE-2022-430xx/CVE-2022-43096.json index 72253908290..922af3dd572 100644 --- a/CVE-2022/CVE-2022-430xx/CVE-2022-43096.json +++ b/CVE-2022/CVE-2022-430xx/CVE-2022-43096.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43096", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-17T23:15:23.810", - "lastModified": "2024-11-21T07:25:55.033", + "lastModified": "2025-04-30T15:15:58.047", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1191" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-431xx/CVE-2022-43138.json b/CVE-2022/CVE-2022-431xx/CVE-2022-43138.json index 519cf379ba2..410b9e04571 100644 --- a/CVE-2022/CVE-2022-431xx/CVE-2022-43138.json +++ b/CVE-2022/CVE-2022-431xx/CVE-2022-43138.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43138", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-17T17:15:13.543", - "lastModified": "2024-11-21T07:25:58.543", + "lastModified": "2025-04-30T14:15:25.540", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-431xx/CVE-2022-43140.json b/CVE-2022/CVE-2022-431xx/CVE-2022-43140.json index da0791f07df..85e22e5219f 100644 --- a/CVE-2022/CVE-2022-431xx/CVE-2022-43140.json +++ b/CVE-2022/CVE-2022-431xx/CVE-2022-43140.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43140", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-17T17:15:13.613", - "lastModified": "2024-11-21T07:25:58.720", + "lastModified": "2025-04-30T14:15:25.740", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-432xx/CVE-2022-43265.json b/CVE-2022/CVE-2022-432xx/CVE-2022-43265.json index dfd8ed47d7c..673486aae32 100644 --- a/CVE-2022/CVE-2022-432xx/CVE-2022-43265.json +++ b/CVE-2022/CVE-2022-432xx/CVE-2022-43265.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43265", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-15T21:15:38.577", - "lastModified": "2024-11-21T07:26:10.140", + "lastModified": "2025-04-30T15:15:58.230", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-433xx/CVE-2022-43308.json b/CVE-2022/CVE-2022-433xx/CVE-2022-43308.json index 79b63f1eea5..7fbf72af8e9 100644 --- a/CVE-2022/CVE-2022-433xx/CVE-2022-43308.json +++ b/CVE-2022/CVE-2022-433xx/CVE-2022-43308.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43308", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-18T04:15:16.603", - "lastModified": "2024-11-21T07:26:14.757", + "lastModified": "2025-04-30T14:15:25.927", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-269" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-436xx/CVE-2022-43673.json b/CVE-2022/CVE-2022-436xx/CVE-2022-43673.json index 2d630810001..cea741308d7 100644 --- a/CVE-2022/CVE-2022-436xx/CVE-2022-43673.json +++ b/CVE-2022/CVE-2022-436xx/CVE-2022-43673.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43673", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-18T20:15:10.193", - "lastModified": "2024-11-21T07:27:01.090", + "lastModified": "2025-04-30T14:15:26.123", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-532" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-436xx/CVE-2022-43693.json b/CVE-2022/CVE-2022-436xx/CVE-2022-43693.json index fb21b8d14e0..3f05a763197 100644 --- a/CVE-2022/CVE-2022-436xx/CVE-2022-43693.json +++ b/CVE-2022/CVE-2022-436xx/CVE-2022-43693.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43693", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-14T17:15:10.433", - "lastModified": "2024-11-21T07:27:03.677", + "lastModified": "2025-04-30T15:15:58.473", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-436xx/CVE-2022-43694.json b/CVE-2022/CVE-2022-436xx/CVE-2022-43694.json index 5975718ccfe..7f6fe2e78a7 100644 --- a/CVE-2022/CVE-2022-436xx/CVE-2022-43694.json +++ b/CVE-2022/CVE-2022-436xx/CVE-2022-43694.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43694", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-14T19:15:24.813", - "lastModified": "2024-11-21T07:27:03.840", + "lastModified": "2025-04-30T15:15:58.720", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-440xx/CVE-2022-44003.json b/CVE-2022/CVE-2022-440xx/CVE-2022-44003.json index 29688f76aeb..1415dfe06ed 100644 --- a/CVE-2022/CVE-2022-440xx/CVE-2022-44003.json +++ b/CVE-2022/CVE-2022-440xx/CVE-2022-44003.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44003", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-16T23:15:12.017", - "lastModified": "2024-11-21T07:27:30.427", + "lastModified": "2025-04-30T14:15:26.320", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-440xx/CVE-2022-44004.json b/CVE-2022/CVE-2022-440xx/CVE-2022-44004.json index 2b6a2492c69..a58247731ff 100644 --- a/CVE-2022/CVE-2022-440xx/CVE-2022-44004.json +++ b/CVE-2022/CVE-2022-440xx/CVE-2022-44004.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44004", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-16T23:15:12.297", - "lastModified": "2024-11-21T07:27:30.573", + "lastModified": "2025-04-30T14:15:26.520", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-640" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-640" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-440xx/CVE-2022-44005.json b/CVE-2022/CVE-2022-440xx/CVE-2022-44005.json index a3de0c46137..5e06cdbe107 100644 --- a/CVE-2022/CVE-2022-440xx/CVE-2022-44005.json +++ b/CVE-2022/CVE-2022-440xx/CVE-2022-44005.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44005", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-16T23:15:12.613", - "lastModified": "2024-11-21T07:27:30.717", + "lastModified": "2025-04-30T14:15:26.717", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-639" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-442xx/CVE-2022-44204.json b/CVE-2022/CVE-2022-442xx/CVE-2022-44204.json index cd5ac9886d6..c3f30f59a57 100644 --- a/CVE-2022/CVE-2022-442xx/CVE-2022-44204.json +++ b/CVE-2022/CVE-2022-442xx/CVE-2022-44204.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44204", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-18T17:15:10.123", - "lastModified": "2024-11-21T07:27:45.053", + "lastModified": "2025-04-30T14:15:26.907", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-443xx/CVE-2022-44378.json b/CVE-2022/CVE-2022-443xx/CVE-2022-44378.json index 8bfa7ce18ea..9d3ead63e00 100644 --- a/CVE-2022/CVE-2022-443xx/CVE-2022-44378.json +++ b/CVE-2022/CVE-2022-443xx/CVE-2022-44378.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44378", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-18T18:15:10.473", - "lastModified": "2024-11-21T07:27:56.650", + "lastModified": "2025-04-30T14:15:27.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-451xx/CVE-2022-45132.json b/CVE-2022/CVE-2022-451xx/CVE-2022-45132.json index 236e32ee94c..ddf4050b863 100644 --- a/CVE-2022/CVE-2022-451xx/CVE-2022-45132.json +++ b/CVE-2022/CVE-2022-451xx/CVE-2022-45132.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45132", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-18T23:15:29.637", - "lastModified": "2024-11-21T07:28:49.160", + "lastModified": "2025-04-30T15:15:58.903", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-451xx/CVE-2022-45163.json b/CVE-2022/CVE-2022-451xx/CVE-2022-45163.json index b32daaa8677..8c6bd7ef184 100644 --- a/CVE-2022/CVE-2022-451xx/CVE-2022-45163.json +++ b/CVE-2022/CVE-2022-451xx/CVE-2022-45163.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45163", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-18T23:15:29.807", - "lastModified": "2024-11-21T07:28:52.180", + "lastModified": "2025-04-30T15:15:59.090", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-203" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45380.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45380.json index a31460527c3..ad3aadfae55 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45380.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45380.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45380", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-11-15T20:15:11.480", - "lastModified": "2024-11-21T07:29:09.103", + "lastModified": "2025-04-30T15:15:59.297", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45381.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45381.json index af5b468dbad..7bd0b88fb6a 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45381.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45381.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45381", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-11-15T20:15:11.567", - "lastModified": "2024-11-21T07:29:09.217", + "lastModified": "2025-04-30T15:15:59.470", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45382.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45382.json index 6f9774e7c02..5a808af87cb 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45382.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45382.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45382", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-11-15T20:15:11.647", - "lastModified": "2024-11-21T07:29:09.340", + "lastModified": "2025-04-30T14:15:27.683", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45383.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45383.json index 33f90ed6a42..7370764954c 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45383.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45383.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45383", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-11-15T20:15:11.730", - "lastModified": "2024-11-21T07:29:09.450", + "lastModified": "2025-04-30T14:15:27.883", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-454xx/CVE-2022-45473.json b/CVE-2022/CVE-2022-454xx/CVE-2022-45473.json index 8f9313dc8bf..3abf7a9be6d 100644 --- a/CVE-2022/CVE-2022-454xx/CVE-2022-45473.json +++ b/CVE-2022/CVE-2022-454xx/CVE-2022-45473.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45473", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-18T18:15:10.700", - "lastModified": "2024-11-21T07:29:18.763", + "lastModified": "2025-04-30T15:15:59.640", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-225xx/CVE-2023-22512.json b/CVE-2023/CVE-2023-225xx/CVE-2023-22512.json index 26976a8d921..768c3fc0227 100644 --- a/CVE-2023/CVE-2023-225xx/CVE-2023-22512.json +++ b/CVE-2023/CVE-2023-225xx/CVE-2023-22512.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22512", "sourceIdentifier": "security@atlassian.com", "published": "2024-01-16T18:15:09.130", - "lastModified": "2025-03-17T23:15:16.143", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T13:34:35.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@atlassian.com", @@ -39,14 +61,73 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.6", + "versionEndExcluding": "7.19.14", + "matchCriteriaId": "902E46F9-334A-41FF-B018-5EF723F3F1A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.5.1", + "matchCriteriaId": "6864ADF8-9209-4E0A-989A-4BEA4ABC3601" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.6", + "versionEndExcluding": "7.19.14", + "matchCriteriaId": "14D4E84F-17C0-40DF-9234-063D03434DB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.5.1", + "matchCriteriaId": "A2C6F3F1-6E32-4083-A8F6-149C85F31626" + } + ] + } + ] + } + ], "references": [ { "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1283691616", - "source": "security@atlassian.com" + "source": "security@atlassian.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.atlassian.com/browse/CONFSERVER-91258", - "source": "security@atlassian.com" + "source": "security@atlassian.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-225xx/CVE-2023-22514.json b/CVE-2023/CVE-2023-225xx/CVE-2023-22514.json index de4f9fd5597..481e45e272f 100644 --- a/CVE-2023/CVE-2023-225xx/CVE-2023-22514.json +++ b/CVE-2023/CVE-2023-225xx/CVE-2023-22514.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22514", "sourceIdentifier": "security@atlassian.com", "published": "2024-01-16T18:15:09.170", - "lastModified": "2025-03-18T17:15:39.890", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T15:48:04.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "security@atlassian.com", @@ -39,14 +61,59 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:windows:*:*", + "versionStartIncluding": "3.4.0", + "versionEndExcluding": "3.4.15", + "matchCriteriaId": "5B6BE8EF-BAC2-41E9-9D16-A4E99BCF6E58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:sourcetree:*:*:*:*:*:macos:*:*", + "versionStartIncluding": "4.1.0", + "versionEndExcluding": "4.2.5", + "matchCriteriaId": "BFD4799A-F207-47AF-8840-5921E43CF365" + } + ] + } + ] + } + ], "references": [ { "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1299929380", - "source": "security@atlassian.com" + "source": "security@atlassian.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.atlassian.com/browse/SRCTREE-8076", - "source": "security@atlassian.com" + "source": "security@atlassian.com", + "tags": [ + "Vendor Advisory", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5482.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5482.json index a0f044904d3..4a92d5fe7d6 100644 --- a/CVE-2023/CVE-2023-54xx/CVE-2023-5482.json +++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5482.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5482", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-11-01T18:15:09.973", - "lastModified": "2024-11-21T08:41:51.757", + "lastModified": "2025-04-30T15:15:59.840", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-345" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11299.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11299.json index c9e4949f1a2..213d43ae031 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11299.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11299.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11299", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-22T12:15:14.677", - "lastModified": "2025-04-23T14:08:13.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T14:52:15.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:caseproof:memberpress:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.11.37", + "matchCriteriaId": "DF8A0E29-E17E-4716-B46B-2F5A5302C2CF" + } + ] + } + ] } ], "references": [ { "url": "https://memberpress.com/change-log/#1.12.0", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/787cd2bb-489f-471a-82e0-073b4766b45a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20259.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20259.json index a6cc5f01ec7..6b7414b7067 100644 --- a/CVE-2024/CVE-2024-202xx/CVE-2024-20259.json +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20259.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20259", "sourceIdentifier": "psirt@cisco.com", "published": "2024-03-27T17:15:50.913", - "lastModified": "2024-11-21T08:52:07.937", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T15:19:23.213", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 } ] }, @@ -49,16 +69,936 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E306B09C-CB48-4067-B60C-5F738555EEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "CD446C51-E713-4E46-8328-0A0477D140D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF0DD16-D76A-45EA-B01A-20C71AEFA3B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*", + "matchCriteriaId": "4BDD0CEC-4A19-438D-B2A1-8664A1D8F3C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "8B4D4659-A304-459F-8AB3-ED6D84B44C0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "4B7EE7C7-D6C1-4C35-8C80-EAF3FC7E7EFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "B51FA707-8DB1-4596-9122-D4BFEF17F400" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*", + "matchCriteriaId": "C04DF35A-1B6F-420A-8D84-74EB41BF3700" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*", + "matchCriteriaId": "211CC9B2-6108-4C50-AB31-DC527C43053E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "75CCB5F1-27F5-4FF9-8389-0A9ABCF7F070" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "08DCCBA3-82D2-4444-B5D3-E5FC58D024F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "128F95D7-E49F-4B36-8F47-823C0298449E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "E21B3881-37E9-4C00-9336-12C9C28D1B61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*", + "matchCriteriaId": "E54599DB-A85E-4EEA-9985-2CBF90E28A08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*", + "matchCriteriaId": "4046C325-7EDB-4C95-AA98-541BEC8F9E0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*", + "matchCriteriaId": "E5B70A3D-CBE1-4218-A7B4-F85741A57BD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "2B270A04-9961-4E99-806B-441CD674AFBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*", + "matchCriteriaId": "1360069D-0358-4746-8C3F-44C2A40988D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "C5DD2403-113B-4100-8BD4-90E1927E6648" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "DAF73937-BCE2-4BEF-B4B0-83212DA4A6C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*", + "matchCriteriaId": "2DDB1E60-C2A9-4570-BE80-F3D478A53738" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*", + "matchCriteriaId": "9841799A-87E2-46AE-807A-824981EAB35A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*", + "matchCriteriaId": "0CEF022B-271F-4017-B74B-82748D5EBA01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "6B2902D8-3A7B-4C47-9BC6-8CA4C580A346" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*", + "matchCriteriaId": "8871B890-78F4-4D9D-AEFF-6A393493C51E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*", + "matchCriteriaId": "9E489AC5-A445-44FF-AA85-F0915577384E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*", + "matchCriteriaId": "917BA05C-2A18-4C68-B508-85C2B5A94416" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "06337791-7D8D-4EAA-BACC-4E270F377B3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*", + "matchCriteriaId": "336A8630-653C-4E28-8DE1-76CDD8573980" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*", + "matchCriteriaId": "0A1767AE-7D9F-4BAA-90E1-CF8314CD0B53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5A6B707B-4543-41F1-83DF-49A93BF56FB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "DC8F611B-D347-4A21-90E6-56CF4D8A35A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "D9A92CE4-B4B0-4C14-AE11-8DFE511406F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "274E3E6F-4280-4EAE-B102-1BE57FE1F1D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*", + "matchCriteriaId": "46B52A51-51DB-4A12-AB1D-8D9605226599" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "938B0720-8CA7-43BA-9708-5CE9EC7A565A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "D4BE7166-DBD3-4CE6-A14A-725FE896B85E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "4DE62C4B-7C06-4907-BADE-416C1618D2D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "0C60DF3F-DBD9-4BBF-812E-4BB0C47BDF3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*", + "matchCriteriaId": "26FEE2E2-DD85-4006-8895-0BDA04E8EE4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*", + "matchCriteriaId": "A0CD237B-2843-4D37-87D7-AE6D1A53458A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*", + "matchCriteriaId": "1B80614B-6362-45F0-B305-2F137B053DCF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*", + "matchCriteriaId": "47B20C7E-1C9C-4EF4-91E4-388643C4B9C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*", + "matchCriteriaId": "EB7966A0-D84D-47F7-AED9-D041BCDA6703" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "04D19D8C-FACF-49B4-BA99-CC3A3FDADAFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "0B78942C-BEE1-4D18-9075-8E1D991BF621" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*", + "matchCriteriaId": "5B306D35-4A13-4D23-8EC2-D000E8ADCDA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "9F21093D-1036-4F6B-B90F-ACE1EF99EA33" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "280D24C6-A2BF-46E8-B512-6A3FA7833922" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*", + "matchCriteriaId": "1F903F51-ABF4-49B0-A5BA-A6B51F79666F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*", + "matchCriteriaId": "E3F244E7-8EE9-4E58-83FA-EEDD3C8F792D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*", + "matchCriteriaId": "5238B1D1-740D-4B37-A0CB-1B3343E55D05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "38B87B17-C653-40AC-8AE4-066BB1123C88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "9012A66E-82C4-4ACF-A4BB-37EC54B87B50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "9C945710-7DC3-43D9-9FBE-F2A1B8666C73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "849C6FF1-F7C0-4021-BCA2-A791C87E4F37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "7592C7E3-3735-425F-A276-9EE03224CD5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "1103BE75-EB64-4A9A-801E-EDE6A1F861F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5B0C2129-8149-4362-827C-A5494C9D398B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "7452C7E9-6241-42C5-9A7F-13C0BD38A2B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*", + "matchCriteriaId": "38C48FC4-5362-4B61-8B8C-7CAFFB81045E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*", + "matchCriteriaId": "2BC43383-DF99-4D38-A220-0A202623B36A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*", + "matchCriteriaId": "B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*", + "matchCriteriaId": "DE62DC68-E882-49E7-AAD2-2F73637FFB4A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*", + "matchCriteriaId": "57CD29C9-C629-48B0-ABDD-CEC3DEB6FB11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D197445E-EC12-429C-BDD4-F63FA5C1B3E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*", + "matchCriteriaId": "BD27DF50-9E81-4EC5-BA73-513F1DFB972C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*", + "matchCriteriaId": "51EA3EAA-A379-467E-AF9A-FCFBACAE49C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*", + "matchCriteriaId": "4FC63AAF-758F-4A70-9738-96E75A0A1DDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E67BE408-8DCF-491F-9EA9-E368565C1B49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CFE98A-FBA5-4837-BBD9-3C875ECEBF1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*", + "matchCriteriaId": "42FAEC29-D754-49D6-85F1-F5DDFAF6E80F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "CCE76032-948F-444F-BA5D-72A34D1CD382" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*", + "matchCriteriaId": "9A965A2A-129C-45C3-BCB1-2860F583D020" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F313F2EC-F3D6-4639-934C-402DDA3DA806" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "4AFB2CA6-8332-4E4D-BDB4-C3B770D3AD6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*", + "matchCriteriaId": "6F7C157F-5569-4072-805F-7AF598F6B56F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1BF0778B-015D-481B-BAC0-40667F3453D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*", + "matchCriteriaId": "1EEBC0EB-0DBB-4530-AFC4-AA0036469656" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*", + "matchCriteriaId": "66D0DB87-6BB7-4FCF-BF20-6D4D48D72B79" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "749040C6-A21A-4EF3-8213-42EE01CFA303" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F3CCCFE-88CC-4F7B-8958-79CA62516EA9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9105ax:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C76DACE3-7D3B-4FE6-8567-0C9D43FF7A7E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19F93DF4-67DB-4B30-AC22-60C67DF32DB2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59C77B06-3C22-4092-AAAB-DB099A0B16A6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9105i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93510CF6-232E-4FBD-BF01-79070306FB97" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9105w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77BE20A3-964E-46D3-ACA2-B53A175027D9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4081C532-3B10-4FBF-BB22-5BA17BC6FCF8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56A3430C-9AF7-4604-AD95-FCF2989E9EB0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9115ax:-:*:*:*:*:*:*:*", + "matchCriteriaId": "36E2B891-4F41-4D0D-BAA2-0256C0565BDE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE4C56A6-E843-498A-A17B-D3D1B01E70E7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F050F416-44C3-474C-9002-321A33F288D6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4AE36E2-E7E9-4E49-8BFF-615DACFC65C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9117ax:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA8798F4-35BB-4F81-9385-B0274BFAAF15" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A699C5C-CD03-4263-952F-5074B470F20E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A47C2D6F-8F90-4D74-AFE1-EAE954021F46" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C04889F8-3C2A-41AA-9DC9-5A4A4BBE60E7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9120ax:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5889AFA2-752E-4EDD-A837-5C003025B25C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*", + "matchCriteriaId": "46D41CFE-784B-40EE-9431-8097428E5892" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D148A27-85B6-4883-96B5-343C8D32F23B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "735CA950-672C-4787-8910-48AD07868FDE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C11EF240-7599-4138-B7A7-17E4479F5B83" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9124ax:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53852300-C1D2-4F84-B8DA-4EDBCB374075" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E987C945-4D6D-4BE5-B6F0-784B7E821D11" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B434C6D7-F583-4D2B-9275-38A5EC4ECC30" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9124d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D7E3AD79-8F3B-4E8E-8226-2B5101F1A3D2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9124e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B64B8AB-DD2A-4306-8546-1D64E24868F4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9124i:-:*:*:*:*:*:*:*", + "matchCriteriaId": "54712AF5-EF16-4F83-99BB-D3B8D93AF986" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1C8E35A-5A9B-4D56-A753-937D5CFB5B19" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:*", + "matchCriteriaId": "248A3FFC-C33C-4336-A37C-67B6046556E5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9130ax:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CADEB5A-5147-4420-A825-BAB07BD60AA2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EC1F736-6240-4FA2-9FEC-D8798C9D287C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "169E5354-07EA-4639-AB4B-20D2B9DE784C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9136:-:*:*:*:*:*:*:*", + "matchCriteriaId": "09185C81-6FDF-4E6D-B8F7-E4B5D77909F4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9162:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9347227-9FA8-46B6-96EF-713543376296" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9164:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96E81F0A-5B5C-4DD3-A56F-C7BF53D4B070" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9166:-:*:*:*:*:*:*:*", + "matchCriteriaId": "774AEB3E-5D6A-4E66-B0B4-C014A7C180E6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9166d1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E5133F50-F67C-4195-B18F-887EFC88FA52" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC4A5C56-0D08-4423-AEBD-33EDF172FCF9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9200cx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7670A322-31C2-4A8A-86E9-09D63C52E4C2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9200l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D6376BE-3A69-469C-B6A9-2EFB55A3B87F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0972076B-5C87-44B3-90EC-4C200B89318A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-24p-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3765B3DB-8B1B-46EF-AF7D-ED1EB2079C3A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-24p-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74AED057-2458-4DE0-8D51-ABD766D07F68" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-24s-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19538C03-5FB8-4401-8B21-489C629D7E7D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-24s-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B26D7061-F471-4DF0-A892-ED132958B84A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-24t-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "033ED443-80E7-4012-9825-07AAC0D44B96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-24t-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD3F3CC6-A349-47B1-B282-B6458683C191" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-24u-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CB24EF21-1C10-48A7-BC68-FFC842A28D12" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-24u-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED0625A2-BF14-4552-83D8-AEE0A04EA023" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-24ux-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD0D6ED6-AE64-4E20-B9CD-3EAA22709CFF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-24ux-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "21AFDC0D-7629-424E-827B-C8A8767324C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48p-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A263CFF2-A659-405B-90EA-51E49B25C6D3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48p-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEFBD449-217D-4569-99F7-D56B853A3E07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48s-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ED668FC-D1A5-4175-A234-23760BA6E788" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48s-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D650C48-9241-42F7-87A9-20733329489A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48t-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3ED16A65-9AFF-4825-95D1-162FBA0F566D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48t-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82D345E7-8208-41AC-B11A-4425D29E98A1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48u-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E386D461-F1C1-4970-B056-D6119E74D449" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48u-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99F3A466-F665-4132-ABC4-2DFC0A7E2B55" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48un-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3395168-FF2E-4CB6-AABE-5E36DEB241CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48un-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F525CBC-1CE6-4CAB-B1C1-DFA7EA462EF0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48uxm-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "226F985C-4669-4D0A-9DB4-CB1465B37B02" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300-48uxm-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B736A43-6F4E-40A9-84E4-D9E251489234" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2FF888F-46F5-4A79-BB88-BB2EC2D27E24" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26437DA7-2EFE-4CA2-8DB0-9FECBEFAE4EA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E99CA124-7D86-463B-A31E-A7836B7493E6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E014B028-8DD9-428C-B705-8F428F145932" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6C44229-A842-49B2-AD3E-79C83DB63EBE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D56D21F-0F55-4AB1-AB9B-8EAE08F4BEDA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3C0441D-A7AC-4B4E-970A-3A441C2F66B0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5306E847-C718-4C83-9C97-8AB498DC4A88" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18287CEF-B574-4498-A256-567CA6E6CA7C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1E9AAA2C-495E-4FD1-9050-264FDC25254B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5713043E-2535-4540-B3EF-41FAC40BECE9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C0C18E5-45B9-49D2-A4AB-DD8D5CB04C5C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "67701D77-8B03-446A-AE22-4B8CCCD6F029" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B0BEAE3-2056-4B7B-8D7C-AEE3DC86CC2A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "831A2390-7170-4FC0-A95E-3DAB1791017D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F788CBC4-782F-4A43-AC80-4AEF1C43A22D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "493989DC-8F1B-45C9-AD11-38B97B958C9C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300l_stack:-:*:*:*:*:*:*:*", + "matchCriteriaId": "419ABFB5-2C27-4EBE-98EF-8A8B718CD1F9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300lm:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA0DBB2E-DB15-47E1-B8F2-3AC0B1197C5F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9300x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F168FB20-0C44-4A5B-910A-04B9517545C2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "737F22AB-C5A9-4A18-BA3D-38A222491397" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9407r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5508320-8318-41A8-8026-4A61907C1CD7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9600x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4035136-CC10-4DDD-92AF-9DC41D19CF8A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A48E6CF0-7A3B-4D11-8D02-0CD38F2420E9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B9ED0E5-CB20-4106-9CF2-8EB587B33543" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B0E620C-8E09-4F7C-A326-26013173B993" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF93F1C8-669F-4ECB-8D81-ECDA7B550175" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E0BA345-B7D7-4975-9199-4DC7875BBFD0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E9EA95F-4E39-4D9C-8A84-D1F6014A4A40" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA0BC769-C244-41BD-BE80-E67F4E1CDDA4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:dn-apl-tta-m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2CB3ECBF-694B-4799-BF3D-DA47DB2263BF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:dn-apl-tta-m-rf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C69116C-5E42-482D-8CBA-4AC3A34DAA85" + } + ] + } + ] } ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dhcp-dos-T3CXPO9z", - "source": "psirt@cisco.com" + "source": "psirt@cisco.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dhcp-dos-T3CXPO9z", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20291.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20291.json index 45addfb63a7..cd069632bef 100644 --- a/CVE-2024/CVE-2024-202xx/CVE-2024-20291.json +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20291.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20291", "sourceIdentifier": "psirt@cisco.com", "published": "2024-02-29T01:43:59.000", - "lastModified": "2024-11-21T08:52:14.173", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T14:15:10.367", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,16 +69,466 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(10\\):*:*:*:*:*:*:*", + "matchCriteriaId": "350F10D8-221B-4A47-8BF6-CCC421878243" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(11\\):*:*:*:*:*:*:*", + "matchCriteriaId": "C0B4E497-95AE-45FC-8F89-A7959CA9AF4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:nx-os:9.3\\(12\\):*:*:*:*:*:*:*", + "matchCriteriaId": "7385A37A-FC89-44E6-8BD9-C35B2F22714F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_3000_in_standalone_nx-os_mode:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D194B648-4932-482A-88F9-F65E5F5239FC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC2A6C31-438A-4CF5-A3F3-364B1672EB7D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E930332-CDDD-48D5-93BC-C22D693BBFA2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BF4B8FE-E134-4491-B5C2-C1CFEB64731B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4226DA0-9371-401C-8247-E6E636A116C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7664666F-BCE4-4799-AEEA-3A73E6AD33F4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3293438-3D18-45A2-B093-2C3F65783336" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8F43B770-D96C-44EA-BC12-9F39FC4317B9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA782EB3-E8E6-4DCF-B39C-B3CBD46E4384" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CED628B5-97A8-4B26-AA40-BEC854982157" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BB9DD73-E31D-4921-A6D6-E14E04703588" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4532F513-0543-4960-9877-01F23CA7BA1B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B43502B-FD53-465A-B60F-6A359C6ACD99" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3229124-B097-4AAC-8ACD-2F9C89DCC3AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "652A2849-668D-4156-88FB-C19844A59F33" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "24FBE87B-8A4F-43A8-98A3-4A7D9C630937" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6ACD09AC-8B28-4ACB-967B-AB3D450BC137" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D397349-CCC6-479B-9273-FB1FFF4F34F2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC7286A7-780F-4A45-940A-4AD5C9D0F201" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_34200yc-sm:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA52D5C1-13D8-4D23-B022-954CCEF491F1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F7AF8D7-431B-43CE-840F-CC0817D159C0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DAC204C8-1A5A-4E85-824E-DC9B8F6A802D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "10F80A72-AD54-4699-B8AE-82715F0B58E2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9354B6A2-D7D6-442E-BF4C-FE8A336D9E94" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74CB4002-7636-4382-B33E-FBA060A13C34" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*", + "matchCriteriaId": "10CEBF73-3EE0-459A-86C5-F8F6243FE27C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95D2C4C3-65CE-4612-A027-AF70CEFC3233" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9000_in_standalone_nx-os_mode:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1DA62800-F5DC-48DA-8C81-D684EA8EBB9F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0CD9C1F1-8582-4F67-A77D-97CBFECB88B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4283E433-7F8C-4410-B565-471415445811" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80AB6FB-32FD-43D7-A9F1-80FA47696210" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5B2E4C1-2627-4B9D-8E92-4B483F647651" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_92348gc-fx3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19C3A385-319E-4137-8D9A-13B5555897EB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "557ED31C-C26A-4FAE-8B14-D06B49F7F08B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11411BFD-3F4D-4309-AB35-A3629A360FB0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E663DE91-C86D-48DC-B771-FA72A8DF7A7C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A90184B3-C82F-4CE5-B2AD-97D5E4690871" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_93108tc-ex-24:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40E40F42-632A-47DF-BE33-DC25B826310B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4AB89849-6DA4-4C9D-BC3F-EE0E41FD1901" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx-24:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C47F6BF9-2ADB-41A4-8D7D-8BB00141BB23" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C70911ED-371A-4EB6-8DDD-DCE3A21FDBAE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx3h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16C64136-89C2-443C-AF7B-BED81D3DE25A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx3p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BBEF7F26-BB47-44BD-872E-130820557C23" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07DE6F63-2C7D-415B-8C34-01EC05C062F3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "102F91CD-DFB6-43D4-AE5B-DA157A696230" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E952A96A-0F48-4357-B7DD-1127D8827650" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F70D81F1-8B12-4474-9060-B4934D8A3873" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_93180yc-ex-24:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5394DE31-3863-4CA9-B7B1-E5227183100D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7349D69B-D8FA-4462-AA28-69DD18A652D9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx-24:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE4BB834-2C00-4384-A78E-AF3BCDDC58AF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B0D30D52-837F-4FDA-B8E5-A9066E9C6D2F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx3h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6678B8A-D905-447E-BE7E-6BFB4CC5DAFE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx3s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CE49B45-F2E9-491D-9C29-1B46E9CE14E2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B1CC5F78-E88B-4B82-9E3E-C73D3A49DE26" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91231DC6-2773-4238-8C14-A346F213B5E5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2DF88547-BAF4-47B0-9F60-80A30297FCEB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9332d-gx2b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02C3CE6D-BD54-48B1-A188-8E53DA001424" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9332d-h2r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "498991F7-39D6-428C-8C7D-DD8DC72A0346" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "113772B6-E9D2-4094-9468-3F4E1A87D07D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C45A38D6-BED6-4FEF-AD87-A1E813695DE0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F1FC2B1F-232E-4754-8076-CC82F3648730" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9336c-fx2-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CDD27C9-5EAF-4956-8AB7-740C84C9D4FC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*", + "matchCriteriaId": "785FD17C-F32E-4042-9DDE-A89B3AAE0334" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_93400ld-h1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D2DFCA0-36D8-48BC-B20D-84509EB5FF66" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9348d-gx2a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73DC1E93-561E-490C-AE0E-B02BAB9A7C8E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9348gc-fx3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12DA2DE5-8ADA-4D6A-BC1A-9C06FA163B1C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "17C7E3DB-8E1A-47AD-B1C5-61747DC0CFB9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2CF467E2-4567-426E-8F48-39669E0F514C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63842B25-8C32-4988-BBBD-61E9CB09B4F3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9364c-gx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68EA1FEF-B6B6-49FE-A0A4-5387F76303F8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9364c-h1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F2EC055-B309-4F1F-A646-FA47AE344D27" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9364d-gx2a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40D6DB7F-C025-4971-9615-73393ED61078" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9364e-sg2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA4E79EC-8CA8-4515-A333-89C0ECFAB15E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B53BCB42-ED61-4FCF-8068-CB467631C63C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "489D11EC-5A18-4F32-BC7C-AC1FCEC27222" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA022E77-6557-4A33-9A3A-D028E2DB669A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9408:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8D5D5E2-B40B-475D-9EF3-8441016E37E9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDC2F709-AFBE-48EA-A3A2-DA1134534FB6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9804:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A10C9C0A-C96A-4B45-90D0-6ED457EB5F4C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:cisco:nexus_9808:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3284D16F-3275-4F8D-8AE4-D413DE19C4FA" + } + ] + } + ] } ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-po-acl-TkyePgvL", - "source": "psirt@cisco.com" + "source": "psirt@cisco.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-po-acl-TkyePgvL", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20345.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20345.json index c44b90f6cc4..22c8be03cd7 100644 --- a/CVE-2024/CVE-2024-203xx/CVE-2024-20345.json +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20345.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20345", "sourceIdentifier": "psirt@cisco.com", "published": "2024-03-06T17:15:09.973", - "lastModified": "2024-11-21T08:52:25.243", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T14:16:08.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -81,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:appdynamics_controller:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.4.0", + "matchCriteriaId": "4B34D7E2-A2CD-4A47-B228-A2589650A4AB" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appd-traversal-m7N8mZpF", - "source": "psirt@cisco.com" + "source": "psirt@cisco.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-appd-traversal-m7N8mZpF", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21682.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21682.json index bfc99e61a3a..f99d7c46477 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21682.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21682.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21682", "sourceIdentifier": "security@atlassian.com", "published": "2024-02-20T18:15:51.063", - "lastModified": "2024-11-21T08:54:51.163", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T14:06:22.117", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "security@atlassian.com", @@ -51,38 +73,83 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:assets_discovery_data_center:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "6.2.1", + "matchCriteriaId": "92207FBE-A735-4744-9841-308C48C855EC" + } + ] + } + ] + } + ], "references": [ { "url": "https://confluence.atlassian.com/assetapps/assets-discovery-3-2-1-cloud-6-2-1-data_center-1333987182.html", - "source": "security@atlassian.com" + "source": "security@atlassian.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1354501606", - "source": "security@atlassian.com" + "source": "security@atlassian.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.atlassian.com/browse/JSDSERVER-15067", - "source": "security@atlassian.com" + "source": "security@atlassian.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://marketplace.atlassian.com/apps/1214668/assets-discovery?hosting=datacenter&tab=installation", - "source": "security@atlassian.com" + "source": "security@atlassian.com", + "tags": [ + "Product" + ] }, { "url": "https://confluence.atlassian.com/assetapps/assets-discovery-3-2-1-cloud-6-2-1-data_center-1333987182.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1354501606", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.atlassian.com/browse/JSDSERVER-15067", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://marketplace.atlassian.com/apps/1214668/assets-discovery?hosting=datacenter&tab=installation", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26870.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26870.json index 5dbec0a09c2..91965e15454 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26870.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26870.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26870", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:09.460", - "lastModified": "2024-11-21T09:03:15.490", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T14:24:09.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,67 +15,216 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: NFSv4.2: corrige el ERROR del kernel nfs4_listxattr en mm/usercopy.c:102 Una llamada a listxattr() con un tama\u00f1o de b\u00fafer = 0 devuelve el tama\u00f1o real del b\u00fafer necesario para un convocatoria posterior. Cuando el tama\u00f1o > 0, nfs4_listxattr() no devuelve un error porque generic_listxattr() o nfs4_listxattr_nfs4_label() consume exactamente todos los bytes, entonces el tama\u00f1o es 0 al llamar a nfs4_listxattr_nfs4_user(), lo que luego activa el siguiente ERROR del kernel: [99.403778] ERROR del kernel en mm/usercopy.c:102! [99.404063] Error interno: Ups - ERROR: 00000000f2000800 [#1] SMP [99.408463] CPU: 0 PID: 3310 Comm: python3 No contaminado 6.6.0-61.fc40.aarch64 #1 [ 99.415827] Seguimiento de llamadas: [ 99.41 5985] usercopy_abort+0x70/0xa0 [ 99.416227] __check_heap_object+0x134/0x158 [ 99.416505] check_heap_object+0x150/0x188 [ 99.416696] __check_object_size.part.0+0x78/0x168 [ 99.416886 ] __check_object_size+0x28/0x40 [ 99.417078] listxattr+0x8c/0x120 [ 99.417252] path_listxattr+0x78/0xe0 [ 99.417476] __arm64_sys_listxattr+0x28/0x40 [ 99.417723] invoke_syscall+0x78/0x100 [ 99.417929] 48/0xf0 [ 99.418186] do_el0_svc+0x24/0x38 [ 99.418376] el0_svc+0x3c/ 0x110 [ 99.418554] el0t_64_sync_handler+0x120/0x130 [ 99.418788] el0t_64_sync+0x194/0x198 [ 99.418994] C\u00f3digo: aa0003e3 d000a3e0 91310000 97f49bdb (d42 10000) El problema se reproduce cuando generic_listxattr() devuelve 'system.nfs4_acl', llamando as\u00ed a lisxattr() con tama\u00f1o = 16 activar\u00e1 el error. Agregue verificaci\u00f3n en nfs4_listxattr() para devolver el error ERANGE cuando se llama con un tama\u00f1o > 0 y el valor de retorno es mayor que el tama\u00f1o." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.9", + "versionEndExcluding": "5.10.214", + "matchCriteriaId": "A73BE1C2-BC30-4A60-80F0-7975135EB641" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.153", + "matchCriteriaId": "ACB69438-845D-4E3C-B114-3140611F9C0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.83", + "matchCriteriaId": "121A07F6-F505-4C47-86BF-9BB6CC7B6C19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.23", + "matchCriteriaId": "E00814DC-0BA7-431A-9926-80FEB4A96C68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "9B95D3A6-E162-47D5-ABFC-F3FA74FA7CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.2", + "matchCriteriaId": "543A75FF-25B8-4046-A514-1EA8EDD87AB1" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/06e828b3f1b206de08ef520fc46a40b22e1869cb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/23bfecb4d852751d5e403557dd500bb563313baf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/251a658bbfceafb4d58c76b77682c8bf7bcfad65", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4403438eaca6e91f02d272211c4d6b045092396b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/79cdcc765969d23f4e3d6ea115660c3333498768", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/80365c9f96015bbf048fdd6c8705d3f8770132bf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9d52865ff28245fc2134da9f99baff603a24407a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/06e828b3f1b206de08ef520fc46a40b22e1869cb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/23bfecb4d852751d5e403557dd500bb563313baf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/251a658bbfceafb4d58c76b77682c8bf7bcfad65", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4403438eaca6e91f02d272211c4d6b045092396b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/79cdcc765969d23f4e3d6ea115660c3333498768", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/80365c9f96015bbf048fdd6c8705d3f8770132bf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9d52865ff28245fc2134da9f99baff603a24407a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27570.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27570.json index b95828b6994..908520b8205 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27570.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27570.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27570", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-01T14:15:54.247", - "lastModified": "2025-03-14T01:15:38.783", - "vulnStatus": "Modified", + "lastModified": "2025-04-30T12:25:03.213", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -91,8 +91,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:libtor:lbt-t300_firmware:2.2.1.8:*:*:*:*:*:*:*", - "matchCriteriaId": "7452B42B-25F1-4282-BD76-162C8CB43DD7" + "criteria": "cpe:2.3:o:libtor:lbt-t300-t390_firmware:2.2.1.8:*:*:*:*:*:*:*", + "matchCriteriaId": "7DDF9A6F-EDBF-4792-A405-6B25535A956E" } ] }, @@ -102,35 +102,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:libtor:lbt-t300:*:*:*:*:*:*:*:*", - "matchCriteriaId": "25300159-D99C-412B-A2D7-AD8CAD76F4AA" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:libtor:lbt-t390_firmware:2.2.1.8:*:*:*:*:*:*:*", - "matchCriteriaId": "335F6CC9-16B1-4F43-AC7E-491FEA67D5F6" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:h:libtor:lbt-t390:*:*:*:*:*:*:*:*", - "matchCriteriaId": "09D462BE-FE16-4B3A-A19A-14E57EA4995E" + "criteria": "cpe:2.3:h:libtor:lbt-t300-t390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C1C1053-CBC9-4FD8-BBB5-47E9D63CFACD" } ] } @@ -142,14 +115,16 @@ "url": "https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/generate_conf_router.md", "source": "cve@mitre.org", "tags": [ - "Exploit" + "Exploit", + "Third Party Advisory" ] }, { "url": "https://github.com/cvdyfbwa/IoT_LBT_Router/blob/main/generate_conf_router.md", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Exploit" + "Exploit", + "Third Party Advisory" ] } ] diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49559.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49559.json index 323aac39b3c..65ea1fbd572 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49559.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49559.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49559", "sourceIdentifier": "security_alert@emc.com", "published": "2025-03-17T18:15:20.033", - "lastModified": "2025-03-17T18:15:20.033", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T14:30:13.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,24 +69,86 @@ "value": "CWE-1393" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.5.4.0", + "versionEndExcluding": "10.5.4.14", + "matchCriteriaId": "14A2BCBC-C50A-4B11-9871-B84254872EEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.5.5.0", + "versionEndExcluding": "10.5.5.13", + "matchCriteriaId": "A05AAE8C-8DCD-44E9-AC99-0C32F9BD80E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.5.6.0", + "versionEndExcluding": "10.5.6.8", + "matchCriteriaId": "430E412C-6FB3-437C-90D7-C73CBF498801" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.6.0.0", + "versionEndExcluding": "10.6.0.2", + "matchCriteriaId": "E8DC8731-306C-4D6B-84FA-3F13B9E677B1" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000289970/dsa-2025-070-security-update-for-dell-networking-os10-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.dell.com/support/kbdoc/en-us/000293638/dsa-2025-069-security-update-for-dell-networking-os10-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.dell.com/support/kbdoc/en-us/000294091/dsa-2025-079-security-update-for-dell-networking-os10-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.dell.com/support/kbdoc/en-us/000295014/dsa-2025-068-security-update-for-dell-networking-os10-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56406.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56406.json index 4313057f693..ad872339751 100644 --- a/CVE-2024/CVE-2024-564xx/CVE-2024-56406.json +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56406.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56406", "sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e", "published": "2025-04-13T14:15:14.527", - "lastModified": "2025-04-18T17:15:34.370", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T15:21:11.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -53,32 +53,93 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.33.1", + "versionEndExcluding": "5.38.4", + "matchCriteriaId": "F34096A4-1439-4582-8133-8134388418D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.39.0", + "versionEndExcluding": "5.40.2", + "matchCriteriaId": "91EF91EF-222F-42C0-A506-0A57B98F1DA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.41.0", + "versionEndIncluding": "5.41.10", + "matchCriteriaId": "87807B8D-271E-4B95-ADBC-2383FBD07335" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Perl/perl5/commit/87f42aa0e0096e9a346c9672aa3a0bd3bef8c1dd.patch", - "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "tags": [ + "Patch" + ] }, { "url": "https://metacpan.org/release/SHAY/perl-5.38.4/changes", - "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "tags": [ + "Release Notes" + ] }, { "url": "https://metacpan.org/release/SHAY/perl-5.40.2/changes", - "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e" + "source": "9b29abf9-4ab0-4765-b253-1875cd9b441e", + "tags": [ + "Release Notes" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/04/13/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/04/13/4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2025/04/13/5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57698.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57698.json index 4fb7f720e2b..f4dad93420a 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57698.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57698.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57698", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-29T20:15:25.110", - "lastModified": "2025-04-29T20:15:25.110", + "lastModified": "2025-04-30T15:16:00.237", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in modernwms v.1.0 allows an attacker view the MD5 hash of the administrator password and other attributes without authentication, even after initial configuration and password change. This happens due to excessive exposure of information and the lack of adequate access control on the /user/list?culture=en-us endpoint." + }, + { + "lang": "es", + "value": "Un problema en modernwms v.1.0 permite a un atacante ver el hash MD5 de la contrase\u00f1a de administrador y otros atributos sin autenticaci\u00f3n, incluso despu\u00e9s de la configuraci\u00f3n inicial y el cambio de contrase\u00f1a. Esto se debe a la exposici\u00f3n excesiva de informaci\u00f3n y a la falta de un control de acceso adecuado en el endpoint /user/list?culture=en-us." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/rodolfomarianocy/xpl-ModernWMS", diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1524.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1524.json index f8a68520cfc..7822bea29ec 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1524.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1524.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1524", "sourceIdentifier": "contact@wpscan.com", "published": "2025-04-17T06:15:43.793", - "lastModified": "2025-04-17T20:21:48.243", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T15:47:00.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:davidvongries:ultimate_dashboard:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.8.6", + "matchCriteriaId": "4E4AA857-6F04-4A2A-ADE9-3D646A622C8C" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/36aed1e4-05cb-42d2-b835-f6336f1a82cd/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1525.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1525.json index 1f16add4b9e..bdbce87e0f6 100644 --- a/CVE-2025/CVE-2025-15xx/CVE-2025-1525.json +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1525.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1525", "sourceIdentifier": "contact@wpscan.com", "published": "2025-04-17T06:15:43.890", - "lastModified": "2025-04-17T20:21:48.243", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T15:46:20.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:davidvongries:ultimate_dashboard:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.8.6", + "matchCriteriaId": "4E4AA857-6F04-4A2A-ADE9-3D646A622C8C" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/d457733f-72e9-45e2-ac07-4e1b94e46102/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21756.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21756.json index d95bc022644..701515769b4 100644 --- a/CVE-2025/CVE-2025-217xx/CVE-2025-21756.json +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21756.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21756", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-27T03:15:16.250", - "lastModified": "2025-03-24T17:32:35.823", - "vulnStatus": "Analyzed", + "lastModified": "2025-04-30T14:15:28.080", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -154,6 +154,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://github.com/hoefler02/CVE-2025-21756/blob/main/x.c", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-233xx/CVE-2025-23382.json b/CVE-2025/CVE-2025-233xx/CVE-2025-23382.json index a083c066db2..a77b2b69b89 100644 --- a/CVE-2025/CVE-2025-233xx/CVE-2025-23382.json +++ b/CVE-2025/CVE-2025-233xx/CVE-2025-23382.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23382", "sourceIdentifier": "security_alert@emc.com", "published": "2025-03-19T16:15:30.787", - "lastModified": "2025-03-19T16:15:30.787", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T14:43:56.590", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.3, + "impactScore": 4.0 } ] }, @@ -49,12 +69,43 @@ "value": "CWE-497" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:secure_connect_gateway:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.28.00.14", + "matchCriteriaId": "4159A473-5176-4F37-A7D3-EB0E0066ADD2" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-uk/000291028/dell-secure-connect-gateway-security-update-for-multiple-third-party-component-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24341.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24341.json new file mode 100644 index 00000000000..58ed5571cf9 --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24341.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24341", + "sourceIdentifier": "psirt@bosch.com", + "published": "2025-04-30T12:15:15.493", + "lastModified": "2025-04-30T12:15:15.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to induce a Denial-of-Service (DoS) condition on the device via multiple crafted HTTP requests. In the worst case, a full power cycle is needed to regain control of the device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-640452.html", + "source": "psirt@bosch.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24342.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24342.json new file mode 100644 index 00000000000..00779860e80 --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24342.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24342", + "sourceIdentifier": "psirt@bosch.com", + "published": "2025-04-30T12:15:17.490", + "lastModified": "2025-04-30T12:15:17.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the login functionality of the web application of ctrlX OS allows a remote unauthenticated attacker to guess valid usernames via multiple crafted HTTP requests." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-204" + } + ] + } + ], + "references": [ + { + "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-640452.html", + "source": "psirt@bosch.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24343.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24343.json new file mode 100644 index 00000000000..12eefd6e5aa --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24343.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24343", + "sourceIdentifier": "psirt@bosch.com", + "published": "2025-04-30T12:15:17.903", + "lastModified": "2025-04-30T12:15:17.903", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the \u201cManages app data\u201d functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to write arbitrary files in arbitrary file system paths via a crafted HTTP request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] + } + ], + "references": [ + { + "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-640452.html", + "source": "psirt@bosch.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24344.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24344.json new file mode 100644 index 00000000000..125f76fe8d3 --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24344.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24344", + "sourceIdentifier": "psirt@bosch.com", + "published": "2025-04-30T12:15:18.120", + "lastModified": "2025-04-30T12:15:18.120", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the error notification messages of the web application of ctrlX OS allows a remote unauthenticated attacker to inject arbitrary HTML tags and, possibly, execute arbitrary client-side code in the context of another user's browser via a crafted HTTP request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-81" + } + ] + } + ], + "references": [ + { + "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-640452.html", + "source": "psirt@bosch.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24345.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24345.json new file mode 100644 index 00000000000..73b238399ae --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24345.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24345", + "sourceIdentifier": "psirt@bosch.com", + "published": "2025-04-30T12:15:18.310", + "lastModified": "2025-04-30T12:15:18.310", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the \u201cHosts\u201d functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to manipulate the \u201chosts\u201d file in an unintended manner via a crafted HTTP request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1286" + } + ] + } + ], + "references": [ + { + "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-640452.html", + "source": "psirt@bosch.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24346.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24346.json new file mode 100644 index 00000000000..f3ba32a42d8 --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24346.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24346", + "sourceIdentifier": "psirt@bosch.com", + "published": "2025-04-30T12:15:18.503", + "lastModified": "2025-04-30T12:15:18.503", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the \u201cProxy\u201d functionality of the web application of ctrlX OS allows a remote authenticated (lowprivileged) attacker to manipulate the \u201c/etc/environment\u201d file via a crafted HTTP request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1286" + } + ] + } + ], + "references": [ + { + "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-640452.html", + "source": "psirt@bosch.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24347.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24347.json new file mode 100644 index 00000000000..fcb918035f2 --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24347.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24347", + "sourceIdentifier": "psirt@bosch.com", + "published": "2025-04-30T12:15:18.683", + "lastModified": "2025-04-30T12:15:18.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the \u201cNetwork Interfaces\u201d functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to manipulate the network configuration file via a crafted HTTP request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1286" + } + ] + } + ], + "references": [ + { + "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-640452.html", + "source": "psirt@bosch.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24348.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24348.json new file mode 100644 index 00000000000..89362ffa075 --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24348.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24348", + "sourceIdentifier": "psirt@bosch.com", + "published": "2025-04-30T12:15:21.233", + "lastModified": "2025-04-30T12:15:21.233", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the \u201cNetwork Interfaces\u201d functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to manipulate the wireless network configuration file via a crafted HTTP request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1286" + } + ] + } + ], + "references": [ + { + "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-640452.html", + "source": "psirt@bosch.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24349.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24349.json new file mode 100644 index 00000000000..b8747a16c6f --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24349.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24349", + "sourceIdentifier": "psirt@bosch.com", + "published": "2025-04-30T12:15:21.413", + "lastModified": "2025-04-30T12:15:21.413", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the \u201cNetwork Interfaces\u201d functionality of the web application of ctrlX OS allows a remote authenticated (lowprivileged) attacker to delete the configuration of physical network interfaces via a crafted HTTP request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-183" + } + ] + } + ], + "references": [ + { + "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-640452.html", + "source": "psirt@bosch.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24350.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24350.json new file mode 100644 index 00000000000..c2ca4252f92 --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24350.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24350", + "sourceIdentifier": "psirt@bosch.com", + "published": "2025-04-30T12:15:21.573", + "lastModified": "2025-04-30T12:15:21.573", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the \u201cCertificates and Keys\u201d functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to write arbitrary certificates in arbitrary file system paths via a crafted HTTP request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] + } + ], + "references": [ + { + "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-640452.html", + "source": "psirt@bosch.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24351.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24351.json new file mode 100644 index 00000000000..ff5b2ab3867 --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24351.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24351", + "sourceIdentifier": "psirt@bosch.com", + "published": "2025-04-30T12:15:21.937", + "lastModified": "2025-04-30T12:15:21.937", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the \u201cRemote Logging\u201d functionality of the web application of ctrlX OS allows a remote authenticated (low-privileged) attacker to execute arbitrary OS commands in the context of user \u201croot\u201d via a crafted HTTP request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-640452.html", + "source": "psirt@bosch.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-254xx/CVE-2025-25431.json b/CVE-2025/CVE-2025-254xx/CVE-2025-25431.json index 4e13be49071..1b002eb3645 100644 --- a/CVE-2025/CVE-2025-254xx/CVE-2025-25431.json +++ b/CVE-2025/CVE-2025-254xx/CVE-2025-25431.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25431", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-28T18:15:28.407", - "lastModified": "2025-04-29T16:48:57.280", + "lastModified": "2025-04-30T13:55:17.703", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -61,8 +61,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:trendnet:tew-7929dru_firmware:1.0.0.10:*:*:*:*:*:*:*", - "matchCriteriaId": "6DA1DA3C-95AE-456E-BAE6-ECCA2EC30E60" + "criteria": "cpe:2.3:o:trendnet:tew-929dru_firmware:1.0.0.10:*:*:*:*:*:*:*", + "matchCriteriaId": "6C131E15-EB4A-4B45-91F1-ACEAA9656A9F" } ] }, @@ -72,8 +72,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:trendnet:tew-7929dru:-:*:*:*:*:*:*:*", - "matchCriteriaId": "E03CF641-8D1F-4C4F-B8FA-AE07D7E8801E" + "criteria": "cpe:2.3:h:trendnet:tew-929dru:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68AFF640-E5E5-4FCD-94D2-65F20968E589" } ] } diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27134.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27134.json new file mode 100644 index 00000000000..5054dedf019 --- /dev/null +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27134.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-27134", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-30T15:16:00.927", + "lastModified": "2025-04-30T15:16:00.927", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Prior to version 3.3.3, a privilege escalation vulnerability exists in the Joplin server, allowing non-admin users to exploit the API endpoint `PATCH /api/users/:id` to set the `is_admin` field to 1. The vulnerability allows malicious low-privileged users to perform administrative actions without proper authorization. This issue has been patched in version 3.3.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/laurent22/joplin/commit/12baa9827dac9da903f244c9f358e3deb264e228", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/laurent22/joplin/security/advisories/GHSA-xj67-649m-3p8x", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27188.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27188.json index ef5281a3224..3ada3a496ec 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27188.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27188.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27188", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T21:15:50.393", - "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T15:02:38.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,587 @@ "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "76AAB57F-7723-44E0-B91A-9F120C849AC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*", + "matchCriteriaId": "68AAE162-5957-42AF-BE20-40F341837FAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p12:*:*:*:*:*:*", + "matchCriteriaId": "D9D01159-3309-4F6B-93B0-2D89DDD33DEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*", + "matchCriteriaId": "5764CC97-C866-415D-A3A1-5B5B9E1C06A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p11:*:*:*:*:*:*", + "matchCriteriaId": "E82D10D8-2894-4E5B-B47B-F00964DD5CDE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*", + "matchCriteriaId": "8B83729E-80AF-47CE-A70C-32BF83024A40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p9:*:*:*:*:*:*", + "matchCriteriaId": "73D22D42-646D-4955-A6F9-9B7BA63DC0A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "95026AA9-A28B-4D94-BD77-7628429EBA30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p4:*:*:*:*:*:*", + "matchCriteriaId": "83FD1220-7D46-42B2-8110-30A934144572" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.8:beta2:*:*:*:*:*:*", + "matchCriteriaId": "C9E12B43-AD3E-48A2-9042-5586186CA3BE" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p12:*:*:*:*:*:*", + "matchCriteriaId": "491AB715-F62A-46DB-A56E-055CF7CB7BEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p11:*:*:*:*:*:*", + "matchCriteriaId": "0E5ACABA-D6D6-4F29-A9DD-5A04A44ABE64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "45090787-93BF-4683-B1E2-7D12FB18BEED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p4:*:*:*:*:*:*", + "matchCriteriaId": "E14195F1-5016-46BE-A614-6FB4E312FC93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E7671E11-AC9A-47CA-9FE5-C7DEEA708468" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*", + "versionEndExcluding": "2.4.4", + "matchCriteriaId": "8D484416-4968-408A-861A-9130CEBEF37E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p11:*:*:open_source:*:*:*", + "matchCriteriaId": "3252B090-DE40-4F56-B55A-BE20DA2AF606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p12:*:*:open_source:*:*:*", + "matchCriteriaId": "42A23BF0-164F-4342-ADF5-B439B902503E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "783E4AF1-52F3-446B-B003-8079EDA78CBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p11:*:*:open_source:*:*:*", + "matchCriteriaId": "08B7898F-E25A-4D16-A007-6D4543E80C58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "AA9D4DAB-7567-48D7-BE60-2A10B35CFF27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "A91E797D-63F6-4DE8-869C-AF0133DC6C03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "8292888D-B0B0-4DF3-8719-EA4CDCAB39D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9830E074-FDCF-41E9-98C7-10C20424EF4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.8:beta1:*:*:open_source:*:*:*", + "matchCriteriaId": "59C10C74-FDB1-46EC-8F41-F3AC24AEFB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.8:beta2:*:*:open_source:*:*:*", + "matchCriteriaId": "2957B390-52C5-48D7-A6D7-709BC76B9C69" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-26.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Patch", + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-271xx/CVE-2025-27189.json b/CVE-2025/CVE-2025-271xx/CVE-2025-27189.json index 0498eb96f95..eea11015dd8 100644 --- a/CVE-2025/CVE-2025-271xx/CVE-2025-27189.json +++ b/CVE-2025/CVE-2025-271xx/CVE-2025-27189.json @@ -2,8 +2,8 @@ "id": "CVE-2025-27189", "sourceIdentifier": "psirt@adobe.com", "published": "2025-04-08T21:15:50.567", - "lastModified": "2025-04-09T20:02:41.860", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T14:59:09.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,128 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "28120C2E-10AD-4476-B6C3-BE3A43946068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*", + "matchCriteriaId": "F2E771C9-86C4-455C-98D4-6F4FE7A9A822" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p12:*:*:*:*:*:*", + "matchCriteriaId": "491AB715-F62A-46DB-A56E-055CF7CB7BEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "89BAB227-03E6-4776-ADE4-9D9CB666EFD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p11:*:*:*:*:*:*", + "matchCriteriaId": "0E5ACABA-D6D6-4F29-A9DD-5A04A44ABE64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "7930F188-A689-4041-BF4F-FBCA579D2E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "45090787-93BF-4683-B1E2-7D12FB18BEED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*", + "matchCriteriaId": "A21F608C-C356-47B8-8FBB-DB28BABFC4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p4:*:*:*:*:*:*", + "matchCriteriaId": "E14195F1-5016-46BE-A614-6FB4E312FC93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DF9B16-DF4F-4EFC-8747-2CEEA71477DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E7671E11-AC9A-47CA-9FE5-C7DEEA708468" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb25-26.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Patch", + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-274xx/CVE-2025-27409.json b/CVE-2025/CVE-2025-274xx/CVE-2025-27409.json new file mode 100644 index 00000000000..2170a55f90c --- /dev/null +++ b/CVE-2025/CVE-2025-274xx/CVE-2025-27409.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-27409", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-30T15:16:01.067", + "lastModified": "2025-04-30T15:16:01.067", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. Prior to version 3.3.3, path traversal is possible in Joplin Server if static file path starts with `css/pluginAssets` or `js/pluginAssets`. The `findLocalFile` function in the `default route` calls `localFileFromUrl` to check for special `pluginAssets` paths. If the function returns a path, the result is returned directly, without checking for path traversal. The vulnerability allows attackers to read files outside the intended directories. This issue has been patched in version 3.3.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/laurent22/joplin/pull/11916", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/laurent22/joplin/security/advisories/GHSA-5xv6-7jm3-fmg5", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27532.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27532.json new file mode 100644 index 00000000000..77b0ddb68a5 --- /dev/null +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27532.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27532", + "sourceIdentifier": "psirt@bosch.com", + "published": "2025-04-30T12:15:22.230", + "lastModified": "2025-04-30T12:15:22.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the \u201cBackup & Restore\u201d functionality of the web application of ctrlX OS allows a remote authenticated (lowprivileged) attacker to access secret information via multiple crafted HTTP requests." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@bosch.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], + "references": [ + { + "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-640452.html", + "source": "psirt@bosch.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29046.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29046.json index 54c113b89fd..f39d27a846a 100644 --- a/CVE-2025/CVE-2025-290xx/CVE-2025-29046.json +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29046.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29046", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-17T15:15:55.013", - "lastModified": "2025-04-18T13:15:57.827", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T15:38:45.037", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,65 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:alfa:wifi_camppro_firmware:2.29:*:*:*:*:*:*:*", + "matchCriteriaId": "4E2A952F-7468-4360-9BD6-E0C73EAB7B4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:alfa:wifi_camppro:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4771E3E-72D4-4E14-BFF9-5CF39FC73788" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/xyqer1/7f9970240aec0af412caee79271a5be5", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/xyqer1/ALFA-WiFi-CampPro-GreenAP-GAPSMinute3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://gist.github.com/xyqer1/7f9970240aec0af412caee79271a5be5", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/xyqer1/ALFA-WiFi-CampPro-GreenAP-GAPSMinute3", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29047.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29047.json index fcbe128fd03..ea0007ebf3d 100644 --- a/CVE-2025/CVE-2025-290xx/CVE-2025-29047.json +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29047.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29047", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-17T15:15:55.140", - "lastModified": "2025-04-18T13:15:58.000", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T15:32:30.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,65 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:alfa:wifi_camppro_firmware:2.29:*:*:*:*:*:*:*", + "matchCriteriaId": "4E2A952F-7468-4360-9BD6-E0C73EAB7B4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:alfa:wifi_camppro:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4771E3E-72D4-4E14-BFF9-5CF39FC73788" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/xyqer1/74adbc0249eeacf762fb4d33cf93a0f5", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/xyqer1/ALFA-WiFi-CampPro-StorageEditUser-hiddenIndex", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://gist.github.com/xyqer1/74adbc0249eeacf762fb4d33cf93a0f5", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/xyqer1/ALFA-WiFi-CampPro-StorageEditUser-hiddenIndex", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-290xx/CVE-2025-29087.json b/CVE-2025/CVE-2025-290xx/CVE-2025-29087.json index 9f61935c913..ca291805b5c 100644 --- a/CVE-2025/CVE-2025-290xx/CVE-2025-29087.json +++ b/CVE-2025/CVE-2025-290xx/CVE-2025-29087.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29087", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-07T20:15:20.253", - "lastModified": "2025-04-15T16:16:06.233", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T12:43:22.310", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.4, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,20 +69,58 @@ "value": "CWE-190" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.44.0", + "versionEndExcluding": "3.49.1", + "matchCriteriaId": "42F127F3-9545-4944-86C7-38FE88E9DEBA" + } + ] + } + ] } ], "references": [ { "url": "https://gist.github.com/ylwango613/a44a29f1ef074fa783e29f04a0afd62a", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://sqlite.org/releaselog/3_49_1.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.sqlite.org/cves.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-297xx/CVE-2025-29743.json b/CVE-2025/CVE-2025-297xx/CVE-2025-29743.json index 56ee9f20dc0..ba1453e739d 100644 --- a/CVE-2025/CVE-2025-297xx/CVE-2025-29743.json +++ b/CVE-2025/CVE-2025-297xx/CVE-2025-29743.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29743", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-22T20:15:28.603", - "lastModified": "2025-04-23T14:08:13.383", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T13:54:38.493", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-816_firmware:1.10_b05:*:*:*:*:*:*:*", + "matchCriteriaId": "3D558A03-CDC3-4E39-933C-73EE416992A1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-816:a2:-:*:*:*:*:*:*", + "matchCriteriaId": "A3444991-DF9E-4E55-B671-286AA8CB4197" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/n0wstr/IOTVuln/blob/main/DIR-816/DelRouting/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29924.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29924.json index efdfafb3e28..49f7fd3fb28 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29924.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29924.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29924", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-19T18:15:25.147", - "lastModified": "2025-03-19T20:15:19.873", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T15:58:41.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -71,24 +93,81 @@ "value": "CWE-269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1", + "versionEndExcluding": "15.10.14", + "matchCriteriaId": "330D3D50-99A5-4FE0-A8D5-1CC4399274CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.4.6", + "matchCriteriaId": "8BFE4D4B-D3CB-46DB-BAC6-2615398EA883" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.5.0", + "versionEndIncluding": "16.10.0", + "matchCriteriaId": "E72285EA-C42B-42E5-8402-73C42E2A263D" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/xwiki/xwiki-platform/commit/5f98bde87288326cf5787604e2bb87836875ed0e", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gq32-758c-3wm3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.xwiki.org/browse/XWIKI-22640", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://jira.xwiki.org/browse/XWIKI-22640", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29925.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29925.json index cefef7377e2..cd143438acd 100644 --- a/CVE-2025/CVE-2025-299xx/CVE-2025-29925.json +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29925.json @@ -2,8 +2,8 @@ "id": "CVE-2025-29925", "sourceIdentifier": "security-advisories@github.com", "published": "2025-03-19T18:15:25.300", - "lastModified": "2025-03-19T20:15:19.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T15:57:32.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } ] }, "weaknesses": [ @@ -71,36 +93,106 @@ "value": "CWE-402" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.9", + "versionEndExcluding": "15.10.14", + "matchCriteriaId": "A2AF24BE-3AFD-4D9C-B2E0-1D5E617D3DCF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.4.6", + "matchCriteriaId": "8BFE4D4B-D3CB-46DB-BAC6-2615398EA883" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.5.0", + "versionEndIncluding": "16.10.0", + "matchCriteriaId": "E72285EA-C42B-42E5-8402-73C42E2A263D" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/xwiki/xwiki-platform/commit/1fb12d2780f37b34a1b4dfdf8457d97ce5cbb2df", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/commit/bca72f5ce971a31dba2a016d8dd8badda4475206", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-22q5-9phm-744v", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.xwiki.org/browse/XWIKI-22630", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://jira.xwiki.org/browse/XWIKI-22639", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://jira.xwiki.org/browse/XWIKI-22630", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://jira.xwiki.org/browse/XWIKI-22639", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-323xx/CVE-2025-32376.json b/CVE-2025/CVE-2025-323xx/CVE-2025-32376.json new file mode 100644 index 00000000000..f204890b74c --- /dev/null +++ b/CVE-2025/CVE-2025-323xx/CVE-2025-32376.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-32376", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-30T15:16:01.217", + "lastModified": "2025-04-30T15:16:01.217", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Discourse is an open-source discussion platform. Prior to versions 3.4.3 on the stable branch and 3.5.0.beta3 on the beta branch, the users limit for a DM can be bypassed, thus giving the ability to potentially create a DM with every user from a site in it. This issue has been patched in stable version 3.4.3 and beta version 3.5.0.beta3." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/discourse/discourse/commit/21a7f3162221c393f9bb13721451aa7f237d881a", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/discourse/discourse/security/advisories/GHSA-mqqq-h2x3-46fr", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-327xx/CVE-2025-32783.json b/CVE-2025/CVE-2025-327xx/CVE-2025-32783.json index 6b7a1511644..e62765938bc 100644 --- a/CVE-2025/CVE-2025-327xx/CVE-2025-32783.json +++ b/CVE-2025/CVE-2025-327xx/CVE-2025-32783.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32783", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-16T22:15:14.523", - "lastModified": "2025-04-17T20:21:48.243", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T15:56:09.633", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,20 +69,62 @@ "value": "CWE-668" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0", + "versionEndIncluding": "16.7.1", + "matchCriteriaId": "B790A4B5-710C-4878-9784-411F39BF2917" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-42fh-pvvh-999x", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.xwiki.org/browse/XWIKI-17154", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://jira.xwiki.org/browse/XWIKI-17154", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32969.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32969.json index c7361f6c6c3..22713fa5d54 100644 --- a/CVE-2025/CVE-2025-329xx/CVE-2025-32969.json +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32969.json @@ -2,8 +2,8 @@ "id": "CVE-2025-32969", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-23T16:15:47.797", - "lastModified": "2025-04-29T13:52:47.470", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T15:50:37.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -73,18 +95,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.8", + "versionEndExcluding": "15.10.16", + "matchCriteriaId": "A2F4E27B-4256-40AC-8DF8-62192CAD4235" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0.0", + "versionEndExcluding": "16.4.6", + "matchCriteriaId": "8BFE4D4B-D3CB-46DB-BAC6-2615398EA883" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.5.0", + "versionEndExcluding": "16.10.1", + "matchCriteriaId": "8150C269-44A7-486B-A7BB-06CB0D631348" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/xwiki/xwiki-platform/commit/5c11a874bd24a581f534d283186e209bbccd8113", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-f69v-xrj8-rhxf", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://jira.xwiki.org/browse/XWIKI-22691", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32970.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32970.json new file mode 100644 index 00000000000..eb713e4418e --- /dev/null +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32970.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-32970", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-30T15:16:01.397", + "lastModified": "2025-04-30T15:16:01.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "XWiki is a generic wiki platform. In versions starting from 13.5-rc-1 to before 15.10.13, from 16.0.0-rc-1 to before 16.4.4, and from 16.5.0-rc-1 to before 16.8.0, an open redirect vulnerability in the HTML conversion request filter allows attackers to construct URLs on an XWiki instance that redirects to any URL. This issue has been patched in versions 15.10.13, 16.4.4, and 16.8.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xwiki/xwiki-platform/commit/6dab7909f45deb00efd36a0cd47788e95ad64802", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-pjhg-9wr9-rj96", + "source": "security-advisories@github.com" + }, + { + "url": "https://jira.xwiki.org/browse/XWIKI-22487", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32971.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32971.json new file mode 100644 index 00000000000..b86a28a5fc9 --- /dev/null +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32971.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-32971", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-30T15:16:01.540", + "lastModified": "2025-04-30T15:16:01.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "XWiki is a generic wiki platform. In versions starting from 4.5.1 to before 15.10.13, from 16.0.0-rc-1 to before 16.4.4, and from 16.5.0-rc-1 to before 16.8.0-rc-1, the Solr script service doesn't take dropped programming rights into account. The Solr script service that is accessible in XWiki's scripting API normally requires programming rights to be called. Due to using the wrong API for checking rights, it doesn't take the fact into account that programming rights might have been dropped by calling `$xcontext.dropPermissions()`. If some code relies on this for the safety of executing Velocity code with the wrong author context, this could allow a user with script rights to either cause a high load by indexing documents or to temporarily remove documents from the search index. This issue has been patched in versions 15.10.13, 16.4.4, and 16.8.0-rc-1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 3.8, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xwiki/xwiki-platform/commit/6570f40f976aec82baf388b5239d1412cab238c9", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-987p-r3jc-8c8v", + "source": "security-advisories@github.com" + }, + { + "url": "https://jira.xwiki.org/browse/XWIKI-22474", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32972.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32972.json new file mode 100644 index 00000000000..787b3e8f37e --- /dev/null +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32972.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-32972", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-30T15:16:01.680", + "lastModified": "2025-04-30T15:16:01.680", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "XWiki is a generic wiki platform. In versions starting from 6.1-milestone-1 to before 15.10.12, from 16.0.0-rc-1 to before 16.4.3, and from 16.5.0-rc-1 to before 16.8.0-rc-1, the script API of the LESS compiler in XWiki is incorrectly checking for rights when calling the cache cleaning API, making it possible to clean the cache without having programming right. The only impact of this is a slowdown in XWiki execution as the caches are re-filled. As this vulnerability requires script right to exploit, and script right already allows unlimited execution of scripts, the additional impact due to this vulnerability is low. This issue has been patched in versions 15.10.12, 16.4.3, and 16.8.0-rc-1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 2.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xwiki/xwiki-platform/commit/91752122d8782f171f8728004a57bdaefc34253e", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-rp38-24m3-rx87", + "source": "security-advisories@github.com" + }, + { + "url": "https://jira.xwiki.org/browse/XWIKI-22462", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32973.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32973.json new file mode 100644 index 00000000000..7bd615c7332 --- /dev/null +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32973.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-32973", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-30T15:16:01.823", + "lastModified": "2025-04-30T15:16:01.823", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "XWiki is a generic wiki platform. In versions starting from 15.9-rc-1 to before 15.10.12, from 16.0.0-rc-1 to before 16.4.3, and from 16.5.0-rc-1 to before 16.8.0-rc-1, when a user with programming rights edits a document in XWiki that was last edited by a user without programming rights and contains an XWiki.ComponentClass, there is no warning that this will grant programming rights to this object. An attacker who created such a malicious object could use this to gain programming rights on the wiki. For this, the attacker needs to have edit rights on at least one page to place this object and then get an admin user to edit that document. This issue has been patched in versions 15.10.12, 16.4.3, and 16.8.0-rc-1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xwiki/xwiki-platform/commit/1a6f1b2e050770331c9a63d12a3fd8a36d199f62", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-x7wv-5qg4-vmr6", + "source": "security-advisories@github.com" + }, + { + "url": "https://jira.xwiki.org/browse/XWIKI-22460", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-329xx/CVE-2025-32974.json b/CVE-2025/CVE-2025-329xx/CVE-2025-32974.json new file mode 100644 index 00000000000..e4c23f7b8a2 --- /dev/null +++ b/CVE-2025/CVE-2025-329xx/CVE-2025-32974.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-32974", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-30T15:16:01.973", + "lastModified": "2025-04-30T15:16:01.973", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "XWiki is a generic wiki platform. In versions starting from 15.9-rc-1 to before 15.10.8 and from 16.0.0-rc-1 to before 16.2.0, the required rights analysis doesn't consider TextAreas with default content type. When editing a page, XWiki warns since version 15.9 when there is content on the page like a script macro that would gain more rights due to the editing. This analysis doesn't consider certain kinds of properties, allowing a user to put malicious scripts in there that will be executed after a user with script, admin, or programming rights edited the page. Such a malicious script could impact the confidentiality, integrity and availability of the whole XWiki installation. This issue has been patched in versions 15.10.8 and 16.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + }, + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xwiki/xwiki-platform/commit/153dbfa2ef1a7a0a644fe3f889684c6a8738c5fc", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mvgm-3rw2-7j4r", + "source": "security-advisories@github.com" + }, + { + "url": "https://jira.xwiki.org/browse/XWIKI-22002", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3341.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3341.json index 5168659c505..39a738fbbae 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3341.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3341.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3341", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T07:15:39.573", - "lastModified": "2025-04-07T14:17:50.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T13:44:36.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,68 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:online_restaurant_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F45638F7-8DDF-4E00-A3D9-C2DE0E726C17" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/p1026/CVE/issues/56", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.303555", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303555", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.551915", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3342.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3342.json index db8fb9b7584..f79d755fb8b 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3342.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3342.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3342", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T08:15:13.910", - "lastModified": "2025-04-07T14:17:50.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T13:40:02.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,68 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:online_restaurant_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F45638F7-8DDF-4E00-A3D9-C2DE0E726C17" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/p1026/CVE/issues/57", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.303556", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303556", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.551916", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3343.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3343.json index fc4ba927622..a70046d1202 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3343.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3343.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3343", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T08:15:14.120", - "lastModified": "2025-04-07T14:17:50.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T13:10:06.073", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,68 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:online_restaurant_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F45638F7-8DDF-4E00-A3D9-C2DE0E726C17" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/p1026/CVE/issues/58", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.303557", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303557", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.551917", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3344.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3344.json index 293a5e68bbf..5b7f5838a01 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3344.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3344.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3344", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T09:15:16.850", - "lastModified": "2025-04-07T14:17:50.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T13:06:52.310", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,68 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:online_restaurant_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F45638F7-8DDF-4E00-A3D9-C2DE0E726C17" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/p1026/CVE/issues/59", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.303558", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303558", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.551918", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3345.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3345.json index cfd1230a004..1cf584fd603 100644 --- a/CVE-2025/CVE-2025-33xx/CVE-2025-3345.json +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3345.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3345", "sourceIdentifier": "cna@vuldb.com", "published": "2025-04-07T09:15:17.047", - "lastModified": "2025-04-07T14:17:50.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T13:04:12.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -122,24 +142,68 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:online_restaurant_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F45638F7-8DDF-4E00-A3D9-C2DE0E726C17" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/p1026/CVE/issues/60", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.303559", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.303559", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.551919", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3394.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3394.json new file mode 100644 index 00000000000..906b8a95372 --- /dev/null +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3394.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-3394", + "sourceIdentifier": "cybersecurity@ch.abb.com", + "published": "2025-04-30T13:15:48.400", + "lastModified": "2025-04-30T13:15:48.400", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Permission Assignment for Critical Resource vulnerability in ABB Automation Builder.This issue affects Automation Builder: through 2.8.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://search.abb.com/library/Download.aspx?DocumentID=3ADR011407&LanguageCode=en&DocumentPartId=&Action=Launch", + "source": "cybersecurity@ch.abb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-33xx/CVE-2025-3395.json b/CVE-2025/CVE-2025-33xx/CVE-2025-3395.json new file mode 100644 index 00000000000..7c7d6210eb9 --- /dev/null +++ b/CVE-2025/CVE-2025-33xx/CVE-2025-3395.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2025-3395", + "sourceIdentifier": "cybersecurity@ch.abb.com", + "published": "2025-04-30T13:15:49.130", + "lastModified": "2025-04-30T13:15:49.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Permission Assignment for Critical Resource, Cleartext Storage of Sensitive Information vulnerability in ABB Automation Builder.This issue affects Automation Builder: through 2.8.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + }, + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://search.abb.com/library/Download.aspx?DocumentID=3ADR011407&LanguageCode=en&DocumentPartId=&Action=Launch", + "source": "cybersecurity@ch.abb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3457.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3457.json index 16df157fc36..4a3f891a9e0 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3457.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3457.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3457", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-22T12:15:16.350", - "lastModified": "2025-04-23T14:08:13.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T14:07:52.490", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,26 +71,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oceanwp:ocean_extra:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4.7", + "matchCriteriaId": "BC6D521C-0C9D-49F8-AB62-6FCD28233625" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/ocean-extra/tags/2.4.5/includes/shortcodes/shortcodes.php#L838", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3277977/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://themes.trac.wordpress.org/browser/oceanwp/4.0.6/inc/oceanwp-theme-icons.php#L819", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://themes.trac.wordpress.org/browser/oceanwp/4.0.6/inc/oceanwp-theme-icons.php#L866", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/362a01c0-8b97-40dc-8af5-0d904da96576?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3458.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3458.json index 5f6df3fab91..9aec21c911f 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3458.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3458.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3458", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-22T12:15:16.507", - "lastModified": "2025-04-23T14:08:13.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T14:05:12.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,22 +71,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oceanwp:ocean_extra:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4.7", + "matchCriteriaId": "BC6D521C-0C9D-49F8-AB62-6FCD28233625" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/ocean-extra/tags/2.4.6/includes/metabox/gallery-metabox/gallery-metabox.php#L113", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/ocean-extra/tags/2.4.6/includes/metabox/gallery-metabox/gallery-metabox.php#L162", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3277977/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7595a1f6-6923-4102-8efe-a414adebce65?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-34xx/CVE-2025-3472.json b/CVE-2025/CVE-2025-34xx/CVE-2025-3472.json index 537d9a43631..67e4a302a29 100644 --- a/CVE-2025/CVE-2025-34xx/CVE-2025-3472.json +++ b/CVE-2025/CVE-2025-34xx/CVE-2025-3472.json @@ -2,8 +2,8 @@ "id": "CVE-2025-3472", "sourceIdentifier": "security@wordfence.com", "published": "2025-04-22T12:15:16.657", - "lastModified": "2025-04-23T14:08:13.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T14:01:15.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,18 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oceanwp:ocean_extra:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4.7", + "matchCriteriaId": "BC6D521C-0C9D-49F8-AB62-6FCD28233625" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/ocean-extra/trunk/includes/shortcodes/shortcodes.php#L618", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3277977/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/74428e76-1946-408f-8adc-24ab4b7e46c5?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-40xx/CVE-2025-4083.json b/CVE-2025/CVE-2025-40xx/CVE-2025-4083.json index 4595b2ce419..6a0ab6e01ac 100644 --- a/CVE-2025/CVE-2025-40xx/CVE-2025-4083.json +++ b/CVE-2025/CVE-2025-40xx/CVE-2025-4083.json @@ -2,16 +2,55 @@ "id": "CVE-2025-4083", "sourceIdentifier": "security@mozilla.org", "published": "2025-04-29T14:15:35.003", - "lastModified": "2025-04-29T14:15:35.003", + "lastModified": "2025-04-30T14:15:30.400", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A process isolation vulnerability in Firefox stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird ESR < 128.10." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de aislamiento de procesos en Firefox se origin\u00f3 debido a una gesti\u00f3n inadecuada de las URI de JavaScript, lo que podr\u00eda permitir que el contenido se ejecutara en el proceso del documento de nivel superior en lugar del marco previsto, lo que podr\u00eda habilitar un escape de la zona protegida. Esta vulnerabilidad afecta a Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138 y Thunderbird ESR < 128.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-653" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1958350", diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4114.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4114.json new file mode 100644 index 00000000000..3700c66f1f6 --- /dev/null +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4114.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-4114", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-30T12:15:22.640", + "lastModified": "2025-04-30T12:15:22.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in Netgear JWNR2000v2 1.0.0.11. Affected is the function check_language_file. The manipulation of the argument host leads to buffer overflow. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jylsec/vuldb/blob/main/Netgear/netgear_JWNR2000v2/Buffer_overflow-check_language_file-GUI_Region/README.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306594", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306594", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.560768", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.netgear.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4115.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4115.json new file mode 100644 index 00000000000..59b22fdbef6 --- /dev/null +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4115.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-4115", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-30T13:15:49.663", + "lastModified": "2025-04-30T13:15:49.663", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in Netgear JWNR2000v2 1.0.0.11. Affected by this vulnerability is the function default_version_is_new. The manipulation of the argument host leads to buffer overflow. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jylsec/vuldb/blob/main/Netgear/netgear_JWNR2000v2/Buffer_overflow-defualt_version_is_new-StringTable_NonEnglish_Ver/README.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306595", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306595", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.560769", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.netgear.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4116.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4116.json new file mode 100644 index 00000000000..8a60b7fbfbb --- /dev/null +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4116.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-4116", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-30T13:15:49.867", + "lastModified": "2025-04-30T13:15:49.867", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in Netgear JWNR2000v2 1.0.0.11. Affected by this issue is the function get_cur_lang_ver. The manipulation of the argument host leads to buffer overflow. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jylsec/vuldb/blob/main/Netgear/netgear_JWNR2000v2/Buffer_overflow-get_cur_lang_ver-StringTable_NonEnglish_Ver/README.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306596", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306596", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.560770", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.netgear.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4117.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4117.json new file mode 100644 index 00000000000..2c3a5c4edf6 --- /dev/null +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4117.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-4117", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-30T13:15:50.070", + "lastModified": "2025-04-30T13:15:50.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in Netgear JWNR2000v2 1.0.0.11. This affects the function sub_41A914. The manipulation of the argument host leads to buffer overflow. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 5.2, + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 5.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jylsec/vuldb/blob/main/Netgear/netgear_JWNR2000v2/Buffer_overflow-sub_41A914-GUI_Region/README.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306597", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306597", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.560771", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.netgear.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4118.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4118.json new file mode 100644 index 00000000000..0e974d0d51e --- /dev/null +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4118.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-4118", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-30T14:15:30.833", + "lastModified": "2025-04-30T14:15:30.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in Weitong Mall 1.0.0. This affects an unknown part of the file /historyList of the component Product History Handler. The manipulation of the argument isDelete with the input 1 leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.306603", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306603", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.560777", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.cnblogs.com/aibot/p/18830907", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4119.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4119.json new file mode 100644 index 00000000000..e8a45235ded --- /dev/null +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4119.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-4119", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-30T14:15:31.020", + "lastModified": "2025-04-30T14:15:31.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in Weitong Mall 1.0.0. This vulnerability affects unknown code of the file /queryTotal of the component Product Statistics Handler. The manipulation of the argument isDelete with the input 1 leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.306604", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306604", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.560778", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.cnblogs.com/aibot/p/18830908", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4120.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4120.json new file mode 100644 index 00000000000..14a9856b789 --- /dev/null +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4120.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-4120", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-30T14:15:31.200", + "lastModified": "2025-04-30T14:15:31.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Netgear JWNR2000v2 1.0.0.11. It has been classified as critical. Affected is the function sub_4238E8. The manipulation of the argument host leads to buffer overflow. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "baseScore": 9.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + }, + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jylsec/vuldb/blob/main/Netgear/netgear_JWNR2000v2/Buffer_overflow-sub_4238E8-log_type/README.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306600", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306600", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.560774", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.netgear.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4121.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4121.json new file mode 100644 index 00000000000..d54d3bc3724 --- /dev/null +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4121.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-4121", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-30T14:15:31.423", + "lastModified": "2025-04-30T14:15:31.423", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Netgear JWNR2000v2 1.0.0.11. It has been declared as critical. Affected by this vulnerability is the function cmd_wireless. The manipulation of the argument host leads to command injection. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jylsec/vuldb/blob/main/Netgear/netgear_JWNR2000v2/Command_injection-cmd_wireless-port_phy_set/README.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306601", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306601", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.560775", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.netgear.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-41xx/CVE-2025-4122.json b/CVE-2025/CVE-2025-41xx/CVE-2025-4122.json new file mode 100644 index 00000000000..250dbc8a898 --- /dev/null +++ b/CVE-2025/CVE-2025-41xx/CVE-2025-4122.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-4122", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-04-30T15:16:02.590", + "lastModified": "2025-04-30T15:16:02.590", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Netgear JWNR2000v2 1.0.0.11. It has been rated as critical. Affected by this issue is the function sub_435E04. The manipulation of the argument host leads to command injection. The attack may be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jylsec/vuldb/blob/main/Netgear/netgear_JWNR2000v2/Command_injection-sub_435E04-auth_mac/README.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.306602", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.306602", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.560776", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.netgear.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-450xx/CVE-2025-45007.json b/CVE-2025/CVE-2025-450xx/CVE-2025-45007.json new file mode 100644 index 00000000000..a583ce6e64c --- /dev/null +++ b/CVE-2025/CVE-2025-450xx/CVE-2025-45007.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-45007", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-30T13:15:49.310", + "lastModified": "2025-04-30T15:16:02.120", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the profile.php file of PHPGurukul Timetable Generator System v1.0. This vulnerability allows remote attackers to execute arbitrary JavaScript code via the adminname POST request parameter." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/Time-Table-Generator-System/xss-injection.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/Time-Table-Generator-System/xss-injection.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-450xx/CVE-2025-45009.json b/CVE-2025/CVE-2025-450xx/CVE-2025-45009.json new file mode 100644 index 00000000000..58c7f7b6e4a --- /dev/null +++ b/CVE-2025/CVE-2025-450xx/CVE-2025-45009.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-45009", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-30T14:15:28.890", + "lastModified": "2025-04-30T14:15:28.890", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A HTML Injection vulnerability was discovered in the normal-search.php file of PHPGurukul Park Ticketing Management System v2.0. This vulnerability allows remote attackers to execute arbitrary code via the searchdata parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/Park-Ticketing-Management-System-Project/normal-search-html-injection.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-450xx/CVE-2025-45010.json b/CVE-2025/CVE-2025-450xx/CVE-2025-45010.json new file mode 100644 index 00000000000..9b637b8a365 --- /dev/null +++ b/CVE-2025/CVE-2025-450xx/CVE-2025-45010.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-45010", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-30T14:15:29.080", + "lastModified": "2025-04-30T14:15:29.080", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A HTML Injection vulnerability was discovered in the normal-bwdates-reports-details.php file of PHPGurukul Park Ticketing Management System v2.0. This vulnerability allows remote attackers to execute arbitrary code via the fromdate and todate POST request parameters." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/Park-Ticketing-Management-System-Project/normal-bwdates-reports-details-html-injection.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-450xx/CVE-2025-45011.json b/CVE-2025/CVE-2025-450xx/CVE-2025-45011.json new file mode 100644 index 00000000000..d92af4b1293 --- /dev/null +++ b/CVE-2025/CVE-2025-450xx/CVE-2025-45011.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-45011", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-30T14:15:29.193", + "lastModified": "2025-04-30T14:15:29.193", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A HTML Injection vulnerability was discovered in the foreigner-search.php file of PHPGurukul Park Ticketing Management System v2.0. This vulnerability allows remote attackers to execute arbitrary code via the searchdata POST request parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/Park-Ticketing-Management-System-Project/foreigner-search-html-injection.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-450xx/CVE-2025-45015.json b/CVE-2025/CVE-2025-450xx/CVE-2025-45015.json new file mode 100644 index 00000000000..2b9d8657190 --- /dev/null +++ b/CVE-2025/CVE-2025-450xx/CVE-2025-45015.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-45015", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-30T14:15:29.313", + "lastModified": "2025-04-30T14:15:29.313", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Scripting (XSS) vulnerability was discovered in the foreigner-bwdates-reports-details.php file of PHPGurukul Park Ticketing Management System v2.0. The vulnerability allows remote attackers to inject arbitrary JavaScript code via the fromdate and todate parameters." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/Park-Ticketing-Management-System-Project/XSS/foreigner-bwdates-reports-details-XSS-injection.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-450xx/CVE-2025-45017.json b/CVE-2025/CVE-2025-450xx/CVE-2025-45017.json new file mode 100644 index 00000000000..fc03fc26c24 --- /dev/null +++ b/CVE-2025/CVE-2025-450xx/CVE-2025-45017.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-45017", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-30T14:15:29.427", + "lastModified": "2025-04-30T14:15:29.427", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection vulnerability was discovered in edit-ticket.php of PHPGurukul Park Ticketing Management System v2.0. This vulnerability allows remote attackers to execute arbitrary code via the tprice POST request parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/Park-Ticketing-Management-System-Project/SQL/SQL_injection_in_edit_ticket.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-450xx/CVE-2025-45018.json b/CVE-2025/CVE-2025-450xx/CVE-2025-45018.json new file mode 100644 index 00000000000..a03ff1dffda --- /dev/null +++ b/CVE-2025/CVE-2025-450xx/CVE-2025-45018.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-45018", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-30T14:15:29.547", + "lastModified": "2025-04-30T14:15:29.547", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL Injection vulnerability was discovered in the foreigner-bwdates-reports-details.php file of PHPGurukul Park Ticketing Management System v2.0. This vulnerability allows remote attackers to execute arbitrary SQL code via the todate parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/Park-Ticketing-Management-System-Project/SQL/SQl_Injection_in_was_foreigner-bwdates-reports-details.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-450xx/CVE-2025-45019.json b/CVE-2025/CVE-2025-450xx/CVE-2025-45019.json new file mode 100644 index 00000000000..d86712954ee --- /dev/null +++ b/CVE-2025/CVE-2025-450xx/CVE-2025-45019.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-45019", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-30T14:15:29.660", + "lastModified": "2025-04-30T14:15:29.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL injection vulnerability was discovered in /add-foreigners-ticket.php file of PHPGurukul Park Ticketing Management System v2.0. This vulnerability allows remote attackers to execute arbitrary code via the cprice POST request parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/Park-Ticketing-Management-System-Project/SQL/SQL_injection_add_foreigners_ticket.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-450xx/CVE-2025-45020.json b/CVE-2025/CVE-2025-450xx/CVE-2025-45020.json new file mode 100644 index 00000000000..30a32e89cbf --- /dev/null +++ b/CVE-2025/CVE-2025-450xx/CVE-2025-45020.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-45020", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-30T13:15:49.480", + "lastModified": "2025-04-30T15:16:02.287", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL Injection vulnerability was discovered in the normal-bwdates-reports-details.php file of PHPGurukul Park Ticketing Management System v2.0. This vulnerability allows remote attackers to execute arbitrary SQL code via the todate parameter in a POST request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/Park-Ticketing-Management-System-Project/SQL/SQL_Injection_normal-bwdates-reports-details.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/Park-Ticketing-Management-System-Project/SQL/SQL_Injection_normal-bwdates-reports-details.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-450xx/CVE-2025-45021.json b/CVE-2025/CVE-2025-450xx/CVE-2025-45021.json new file mode 100644 index 00000000000..380591f9500 --- /dev/null +++ b/CVE-2025/CVE-2025-450xx/CVE-2025-45021.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-45021", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-30T14:15:29.777", + "lastModified": "2025-04-30T14:15:29.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL Injection vulnerability was identified in the admin/edit-directory.php file of the PHPGurukul Directory Management System v2.0. Attackers can exploit this vulnerability via the email parameter in a POST request to execute arbitrary SQL commands." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/Directory%20Management%20System/SQL/SQl_Injection_in_edit-directory.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-454xx/CVE-2025-45427.json b/CVE-2025/CVE-2025-454xx/CVE-2025-45427.json index 44611f86dc8..cc5ecbba22d 100644 --- a/CVE-2025/CVE-2025-454xx/CVE-2025-45427.json +++ b/CVE-2025/CVE-2025-454xx/CVE-2025-45427.json @@ -2,8 +2,8 @@ "id": "CVE-2025-45427", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-23T15:16:00.880", - "lastModified": "2025-04-29T13:52:47.470", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T13:51:20.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac9_firmware:15.03.05.14_multi:*:*:*:*:*:*:*", + "matchCriteriaId": "D1A7C986-BA06-44DB-A271-91B88853CA43" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac9:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "566DA530-18FC-4A46-95B4-2A7D343A96A7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/shuqi233/loophole/blob/main/Tenda%20AC9/WifiBasicSet-security.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/shuqi233/loophole/blob/main/Tenda%20AC9/WifiBasicSet-security.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-454xx/CVE-2025-45429.json b/CVE-2025/CVE-2025-454xx/CVE-2025-45429.json index c0bb1dca775..30e4fd1a230 100644 --- a/CVE-2025/CVE-2025-454xx/CVE-2025-45429.json +++ b/CVE-2025/CVE-2025-454xx/CVE-2025-45429.json @@ -2,8 +2,8 @@ "id": "CVE-2025-45429", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-23T16:15:48.473", - "lastModified": "2025-04-29T13:52:47.470", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-30T15:48:51.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac9_firmware:15.03.05.14_multi:*:*:*:*:*:*:*", + "matchCriteriaId": "D1A7C986-BA06-44DB-A271-91B88853CA43" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac9:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "566DA530-18FC-4A46-95B4-2A7D343A96A7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/shuqi233/loophole/blob/main/Tenda%20AC9/WifiWpsStart-index.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/shuqi233/loophole/blob/main/Tenda%20AC9/WifiWpsStart-index.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-462xx/CVE-2025-46238.json b/CVE-2025/CVE-2025-462xx/CVE-2025-46238.json index 843a5bf7906..11158f7a486 100644 --- a/CVE-2025/CVE-2025-462xx/CVE-2025-46238.json +++ b/CVE-2025/CVE-2025-462xx/CVE-2025-46238.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46238", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-22T10:15:17.317", - "lastModified": "2025-04-23T14:08:13.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T15:27:17.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rolandbaer:list_last_changes:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.2", + "matchCriteriaId": "364D43E8-FE0D-419B-8B3D-FA72C1C746E1" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/list-last-changes/vulnerability/wordpress-list-last-changes-1-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-462xx/CVE-2025-46249.json b/CVE-2025/CVE-2025-462xx/CVE-2025-46249.json index 43c56e6b749..e2c4c97a497 100644 --- a/CVE-2025/CVE-2025-462xx/CVE-2025-46249.json +++ b/CVE-2025/CVE-2025-462xx/CVE-2025-46249.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46249", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-22T10:15:19.403", - "lastModified": "2025-04-23T14:08:13.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T15:24:39.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:migaweb:simple_calendar_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.6.5", + "matchCriteriaId": "DE2AC8C7-C91B-4378-9AE5-BECD5676B662" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/simple-calendar-for-elementor/vulnerability/wordpress-simple-calendar-for-elementor-1-6-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-462xx/CVE-2025-46250.json b/CVE-2025/CVE-2025-462xx/CVE-2025-46250.json index d004fed0295..7c111b519f8 100644 --- a/CVE-2025/CVE-2025-462xx/CVE-2025-46250.json +++ b/CVE-2025/CVE-2025-462xx/CVE-2025-46250.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46250", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-22T10:15:19.590", - "lastModified": "2025-04-23T14:08:13.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T15:22:06.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vikasratudi:lifetime_free_drag_\\&_drop_contact_form_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.15", + "matchCriteriaId": "202814FD-84CE-4696-A391-139B2AB52C95" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/v-form/vulnerability/wordpress-vform-3-1-14-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-462xx/CVE-2025-46251.json b/CVE-2025/CVE-2025-462xx/CVE-2025-46251.json index d7d0da964c4..153cb4a92b1 100644 --- a/CVE-2025/CVE-2025-462xx/CVE-2025-46251.json +++ b/CVE-2025/CVE-2025-462xx/CVE-2025-46251.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46251", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-22T10:15:19.790", - "lastModified": "2025-04-23T14:08:13.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T15:16:39.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:e4jconnect:vikrestaurants_table_reservations_and_take-away:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.4", + "matchCriteriaId": "2667BD71-813B-4C71-9DC2-2617DD16C9A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/vikrestaurants/vulnerability/wordpress-vikrestaurants-table-reservations-and-take-away-plugin-1-3-3-csrf-to-stored-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-462xx/CVE-2025-46252.json b/CVE-2025/CVE-2025-462xx/CVE-2025-46252.json index a968b16e272..e4e04413616 100644 --- a/CVE-2025/CVE-2025-462xx/CVE-2025-46252.json +++ b/CVE-2025/CVE-2025-462xx/CVE-2025-46252.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46252", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-22T10:15:19.970", - "lastModified": "2025-04-23T14:08:13.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T15:10:04.440", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kofimokome:message_filter_for_contact_form_7:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.6.3.3", + "matchCriteriaId": "1DA61ACE-ACAA-49EB-A02E-19E0D9CE8DEA" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/cf7-message-filter/vulnerability/wordpress-message-filter-for-contact-form-7-plugin-1-6-3-2-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-462xx/CVE-2025-46253.json b/CVE-2025/CVE-2025-462xx/CVE-2025-46253.json index ea71f891e2a..df095852f93 100644 --- a/CVE-2025/CVE-2025-462xx/CVE-2025-46253.json +++ b/CVE-2025/CVE-2025-462xx/CVE-2025-46253.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46253", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-22T10:15:20.133", - "lastModified": "2025-04-23T14:08:13.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T15:08:45.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpmet:gutenkit:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.3", + "matchCriteriaId": "CF5825C3-6E89-4971-ACFC-45A5351A4009" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/gutenkit-blocks-addon/vulnerability/wordpress-gutenkit-plugin-2-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-462xx/CVE-2025-46254.json b/CVE-2025/CVE-2025-462xx/CVE-2025-46254.json index 85403fe5d5b..1980741d80a 100644 --- a/CVE-2025/CVE-2025-462xx/CVE-2025-46254.json +++ b/CVE-2025/CVE-2025-462xx/CVE-2025-46254.json @@ -2,8 +2,8 @@ "id": "CVE-2025-46254", "sourceIdentifier": "audit@patchstack.com", "published": "2025-04-22T10:15:20.307", - "lastModified": "2025-04-23T14:08:13.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-30T14:59:42.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:visualcomposer:visual_composer_website_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "45.11.0", + "matchCriteriaId": "8421875A-1118-43D9-8A6E-A4F90952AE41" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/visualcomposer/vulnerability/wordpress-visual-composer-website-builder-plugin-45-10-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-463xx/CVE-2025-46342.json b/CVE-2025/CVE-2025-463xx/CVE-2025-46342.json new file mode 100644 index 00000000000..1578c389703 --- /dev/null +++ b/CVE-2025/CVE-2025-463xx/CVE-2025-46342.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-46342", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-30T15:16:02.440", + "lastModified": "2025-04-30T15:16:02.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to versions 1.13.5 and 1.14.0, it may happen that policy rules using namespace selector(s) in their match statements are mistakenly not applied during admission review request processing due to a missing error propagation in function `GetNamespaceSelectorsFromNamespaceLister` in `pkg/utils/engine/labels.go`. As a consequence, security-critical mutations and validations are bypassed, potentially allowing attackers with K8s API access to perform malicious operations. This issue has been patched in versions 1.13.5 and 1.14.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1287" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/kyverno/kyverno/commit/3ff923b7756e1681daf73849954bd88516589194", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/kyverno/kyverno/security/advisories/GHSA-jrr2-x33p-6hvc", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-463xx/CVE-2025-46348.json b/CVE-2025/CVE-2025-463xx/CVE-2025-46348.json index e42c5d8c1ed..d7212513cea 100644 --- a/CVE-2025/CVE-2025-463xx/CVE-2025-46348.json +++ b/CVE-2025/CVE-2025-463xx/CVE-2025-46348.json @@ -2,13 +2,17 @@ "id": "CVE-2025-46348", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-29T21:15:52.120", - "lastModified": "2025-04-29T21:15:52.120", + "lastModified": "2025-04-30T14:15:29.943", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "YesWiki is a wiki system written in PHP. Prior to version 4.5.4, the request to commence a site backup can be performed and downloaded without authentication. The archives are created with a predictable filename, so a malicious user could create and download an archive without being authenticated. This could result in a malicious attacker making numerous requests to create archives and fill up the file system, or by downloading the archive which contains sensitive site information. This issue has been patched in version 4.5.4." + }, + { + "lang": "es", + "value": "YesWiki es un sistema wiki escrito en PHP. Antes de la versi\u00f3n 4.5.4, la solicitud para iniciar una copia de seguridad del sitio pod\u00eda ejecutarse y descargarse sin autenticaci\u00f3n. Los archivos se crean con un nombre predecible, por lo que un usuario malintencionado podr\u00eda crear y descargar un archivo sin autenticarse. Esto podr\u00eda provocar que un atacante realizara numerosas solicitudes para crear archivos y saturar el sistema de archivos, o que descargara el archivo que contiene informaci\u00f3n confidencial del sitio. Este problema se ha corregido en la versi\u00f3n 4.5.4." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -59,6 +63,10 @@ { "url": "https://github.com/YesWiki/yeswiki/security/advisories/GHSA-wc9g-6j9w-hr95", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/YesWiki/yeswiki/security/advisories/GHSA-wc9g-6j9w-hr95", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-465xx/CVE-2025-46549.json b/CVE-2025/CVE-2025-465xx/CVE-2025-46549.json index 331baca8486..872a09cce82 100644 --- a/CVE-2025/CVE-2025-465xx/CVE-2025-46549.json +++ b/CVE-2025/CVE-2025-465xx/CVE-2025-46549.json @@ -2,13 +2,17 @@ "id": "CVE-2025-46549", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-29T21:15:52.270", - "lastModified": "2025-04-29T21:15:52.270", + "lastModified": "2025-04-30T14:15:30.063", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "YesWiki is a wiki system written in PHP. Prior to version 4.5.4, an attacker can use a reflected cross-site scripting attack to steal cookies from an authenticated user by having them click on a malicious link. Stolen cookies allow the attacker to take over the user\u2019s session. This vulnerability may also allow attackers to deface the website or embed malicious content. This issue has been patched in version 4.5.4." + }, + { + "lang": "es", + "value": "YesWiki es un sistema wiki escrito en PHP. Antes de la versi\u00f3n 4.5.4, un atacante pod\u00eda usar un ataque de cross-site scripting reflejado para robar cookies de un usuario autenticado al hacer que hiciera clic en un enlace malicioso. Las cookies robadas permiten al atacante controlar la sesi\u00f3n del usuario. Esta vulnerabilidad tambi\u00e9n puede permitir a los atacantes desfigurar el sitio web o incrustar contenido malicioso. Este problema se ha corregido en la versi\u00f3n 4.5.4." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +59,10 @@ { "url": "https://github.com/YesWiki/yeswiki/security/advisories/GHSA-r9gv-qffm-xw6f", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/YesWiki/yeswiki/security/advisories/GHSA-r9gv-qffm-xw6f", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-465xx/CVE-2025-46550.json b/CVE-2025/CVE-2025-465xx/CVE-2025-46550.json index 494b91e1dd1..8014709b86c 100644 --- a/CVE-2025/CVE-2025-465xx/CVE-2025-46550.json +++ b/CVE-2025/CVE-2025-465xx/CVE-2025-46550.json @@ -2,13 +2,17 @@ "id": "CVE-2025-46550", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-29T21:15:52.467", - "lastModified": "2025-04-29T21:15:52.467", + "lastModified": "2025-04-30T14:15:30.170", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "YesWiki is a wiki system written in PHP. Prior to version 4.5.4, the `/?BazaR` endpoint and `idformulaire` parameter are vulnerable to cross-site scripting. An attacker can use a reflected cross-site scripting attack to steal cookies from an authenticated user by having them click on a malicious link. Stolen cookies allow the attacker to take over the user\u2019s session. This vulnerability may also allow attackers to deface the website or embed malicious content. This issue has been patched in version 4.5.4." + }, + { + "lang": "es", + "value": "YesWiki es un sistema wiki escrito en PHP. Antes de la versi\u00f3n 4.5.4, el endpoint `/?BazaR` y el par\u00e1metro `idformulaire` eran vulnerables a ataques de cross-site scripting. Un atacante puede usar un ataque de cross-site scripting reflejado para robar cookies de un usuario autenticado al hacer que haga clic en un enlace malicioso. Las cookies robadas permiten al atacante controlar la sesi\u00f3n del usuario. Esta vulnerabilidad tambi\u00e9n puede permitir a los atacantes desfigurar el sitio web o incrustar contenido malicioso. Este problema se ha corregido en la versi\u00f3n 4.5.4." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +59,10 @@ { "url": "https://github.com/YesWiki/yeswiki/security/advisories/GHSA-ggqx-43h2-55jp", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/YesWiki/yeswiki/security/advisories/GHSA-ggqx-43h2-55jp", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-465xx/CVE-2025-46560.json b/CVE-2025/CVE-2025-465xx/CVE-2025-46560.json index 6ffd30bea92..1f8abdf1cdd 100644 --- a/CVE-2025/CVE-2025-465xx/CVE-2025-46560.json +++ b/CVE-2025/CVE-2025-465xx/CVE-2025-46560.json @@ -2,13 +2,17 @@ "id": "CVE-2025-46560", "sourceIdentifier": "security-advisories@github.com", "published": "2025-04-30T01:15:52.097", - "lastModified": "2025-04-30T01:15:52.097", + "lastModified": "2025-04-30T14:15:30.283", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "vLLM is a high-throughput and memory-efficient inference and serving engine for LLMs. Versions starting from 0.8.0 and prior to 0.8.5 are affected by a critical performance vulnerability in the input preprocessing logic of the multimodal tokenizer. The code dynamically replaces placeholder tokens (e.g., <|audio_|>, <|image_|>) with repeated tokens based on precomputed lengths. Due to \u200b\u200binefficient list concatenation operations\u200b\u200b, the algorithm exhibits \u200b\u200bquadratic time complexity (O(n\u00b2))\u200b\u200b, allowing malicious actors to trigger resource exhaustion via specially crafted inputs. This issue has been patched in version 0.8.5." + }, + { + "lang": "es", + "value": "vLLM es un motor de inferencia y servicio de alto rendimiento y eficiente en memoria para LLM. Las versiones a partir de la 0.8.0 y anteriores a la 0.8.5 se ven afectadas por una vulnerabilidad cr\u00edtica de rendimiento en la l\u00f3gica de preprocesamiento de entrada del tokenizador multimodal. El c\u00f3digo reemplaza din\u00e1micamente los tokens de marcador de posici\u00f3n (p. ej., <|audio_|>, <|image_|>) con tokens repetidos basados ??en longitudes precalculadas. Debido a las ineficientes operaciones de concatenaci\u00f3n de listas, el algoritmo presenta una complejidad temporal cuadr\u00e1tica (O(n\u00b2)), lo que permite a los actores maliciosos activar el agotamiento de recursos mediante entradas especialmente manipuladas. Este problema se ha corregido en la versi\u00f3n 0.8.5." } ], "metrics": { @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +59,10 @@ { "url": "https://github.com/vllm-project/vllm/security/advisories/GHSA-vc6m-hm49-g9qg", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/vllm-project/vllm/security/advisories/GHSA-vc6m-hm49-g9qg", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 28fa1045c2c..854d4009a3b 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-04-30T12:00:24.000346+00:00 +2025-04-30T16:00:21.515355+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-04-30T11:26:49.620000+00:00 +2025-04-30T15:58:41.807000+00:00 ``` ### Last Data Feed Release @@ -33,34 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -291766 +291808 ``` ### CVEs added in the last Commit -Recently added CVEs: `9` +Recently added CVEs: `42` -- [CVE-2025-24338](CVE-2025/CVE-2025-243xx/CVE-2025-24338.json) (`2025-04-30T11:15:48.150`) -- [CVE-2025-24339](CVE-2025/CVE-2025-243xx/CVE-2025-24339.json) (`2025-04-30T11:15:49.623`) -- [CVE-2025-24340](CVE-2025/CVE-2025-243xx/CVE-2025-24340.json) (`2025-04-30T11:15:49.797`) -- [CVE-2025-4108](CVE-2025/CVE-2025-41xx/CVE-2025-4108.json) (`2025-04-30T10:15:18.407`) -- [CVE-2025-4109](CVE-2025/CVE-2025-41xx/CVE-2025-4109.json) (`2025-04-30T10:15:18.813`) -- [CVE-2025-4110](CVE-2025/CVE-2025-41xx/CVE-2025-4110.json) (`2025-04-30T11:15:49.983`) -- [CVE-2025-4111](CVE-2025/CVE-2025-41xx/CVE-2025-4111.json) (`2025-04-30T11:15:50.283`) -- [CVE-2025-4112](CVE-2025/CVE-2025-41xx/CVE-2025-4112.json) (`2025-04-30T11:15:50.500`) -- [CVE-2025-4113](CVE-2025/CVE-2025-41xx/CVE-2025-4113.json) (`2025-04-30T11:15:50.760`) +- [CVE-2025-32972](CVE-2025/CVE-2025-329xx/CVE-2025-32972.json) (`2025-04-30T15:16:01.680`) +- [CVE-2025-32973](CVE-2025/CVE-2025-329xx/CVE-2025-32973.json) (`2025-04-30T15:16:01.823`) +- [CVE-2025-32974](CVE-2025/CVE-2025-329xx/CVE-2025-32974.json) (`2025-04-30T15:16:01.973`) +- [CVE-2025-3394](CVE-2025/CVE-2025-33xx/CVE-2025-3394.json) (`2025-04-30T13:15:48.400`) +- [CVE-2025-3395](CVE-2025/CVE-2025-33xx/CVE-2025-3395.json) (`2025-04-30T13:15:49.130`) +- [CVE-2025-4114](CVE-2025/CVE-2025-41xx/CVE-2025-4114.json) (`2025-04-30T12:15:22.640`) +- [CVE-2025-4115](CVE-2025/CVE-2025-41xx/CVE-2025-4115.json) (`2025-04-30T13:15:49.663`) +- [CVE-2025-4116](CVE-2025/CVE-2025-41xx/CVE-2025-4116.json) (`2025-04-30T13:15:49.867`) +- [CVE-2025-4117](CVE-2025/CVE-2025-41xx/CVE-2025-4117.json) (`2025-04-30T13:15:50.070`) +- [CVE-2025-4118](CVE-2025/CVE-2025-41xx/CVE-2025-4118.json) (`2025-04-30T14:15:30.833`) +- [CVE-2025-4119](CVE-2025/CVE-2025-41xx/CVE-2025-4119.json) (`2025-04-30T14:15:31.020`) +- [CVE-2025-4120](CVE-2025/CVE-2025-41xx/CVE-2025-4120.json) (`2025-04-30T14:15:31.200`) +- [CVE-2025-4121](CVE-2025/CVE-2025-41xx/CVE-2025-4121.json) (`2025-04-30T14:15:31.423`) +- [CVE-2025-4122](CVE-2025/CVE-2025-41xx/CVE-2025-4122.json) (`2025-04-30T15:16:02.590`) +- [CVE-2025-45007](CVE-2025/CVE-2025-450xx/CVE-2025-45007.json) (`2025-04-30T13:15:49.310`) +- [CVE-2025-45009](CVE-2025/CVE-2025-450xx/CVE-2025-45009.json) (`2025-04-30T14:15:28.890`) +- [CVE-2025-45010](CVE-2025/CVE-2025-450xx/CVE-2025-45010.json) (`2025-04-30T14:15:29.080`) +- [CVE-2025-45011](CVE-2025/CVE-2025-450xx/CVE-2025-45011.json) (`2025-04-30T14:15:29.193`) +- [CVE-2025-45015](CVE-2025/CVE-2025-450xx/CVE-2025-45015.json) (`2025-04-30T14:15:29.313`) +- [CVE-2025-45017](CVE-2025/CVE-2025-450xx/CVE-2025-45017.json) (`2025-04-30T14:15:29.427`) +- [CVE-2025-45018](CVE-2025/CVE-2025-450xx/CVE-2025-45018.json) (`2025-04-30T14:15:29.547`) +- [CVE-2025-45019](CVE-2025/CVE-2025-450xx/CVE-2025-45019.json) (`2025-04-30T14:15:29.660`) +- [CVE-2025-45020](CVE-2025/CVE-2025-450xx/CVE-2025-45020.json) (`2025-04-30T13:15:49.480`) +- [CVE-2025-45021](CVE-2025/CVE-2025-450xx/CVE-2025-45021.json) (`2025-04-30T14:15:29.777`) +- [CVE-2025-46342](CVE-2025/CVE-2025-463xx/CVE-2025-46342.json) (`2025-04-30T15:16:02.440`) ### CVEs modified in the last Commit -Recently modified CVEs: `6` +Recently modified CVEs: `129` -- [CVE-2020-27792](CVE-2020/CVE-2020-277xx/CVE-2020-27792.json) (`2025-04-30T10:15:15.363`) -- [CVE-2024-27567](CVE-2024/CVE-2024-275xx/CVE-2024-27567.json) (`2025-04-30T11:24:35.913`) -- [CVE-2024-27568](CVE-2024/CVE-2024-275xx/CVE-2024-27568.json) (`2025-04-30T11:25:24.113`) -- [CVE-2024-27569](CVE-2024/CVE-2024-275xx/CVE-2024-27569.json) (`2025-04-30T11:25:47.437`) -- [CVE-2024-27571](CVE-2024/CVE-2024-275xx/CVE-2024-27571.json) (`2025-04-30T11:26:03.620`) -- [CVE-2024-27572](CVE-2024/CVE-2024-275xx/CVE-2024-27572.json) (`2025-04-30T11:26:49.620`) +- [CVE-2025-29925](CVE-2025/CVE-2025-299xx/CVE-2025-29925.json) (`2025-04-30T15:57:32.057`) +- [CVE-2025-32783](CVE-2025/CVE-2025-327xx/CVE-2025-32783.json) (`2025-04-30T15:56:09.633`) +- [CVE-2025-32969](CVE-2025/CVE-2025-329xx/CVE-2025-32969.json) (`2025-04-30T15:50:37.270`) +- [CVE-2025-3341](CVE-2025/CVE-2025-33xx/CVE-2025-3341.json) (`2025-04-30T13:44:36.660`) +- [CVE-2025-3342](CVE-2025/CVE-2025-33xx/CVE-2025-3342.json) (`2025-04-30T13:40:02.850`) +- [CVE-2025-3343](CVE-2025/CVE-2025-33xx/CVE-2025-3343.json) (`2025-04-30T13:10:06.073`) +- [CVE-2025-3344](CVE-2025/CVE-2025-33xx/CVE-2025-3344.json) (`2025-04-30T13:06:52.310`) +- [CVE-2025-3345](CVE-2025/CVE-2025-33xx/CVE-2025-3345.json) (`2025-04-30T13:04:12.360`) +- [CVE-2025-3457](CVE-2025/CVE-2025-34xx/CVE-2025-3457.json) (`2025-04-30T14:07:52.490`) +- [CVE-2025-3458](CVE-2025/CVE-2025-34xx/CVE-2025-3458.json) (`2025-04-30T14:05:12.373`) +- [CVE-2025-3472](CVE-2025/CVE-2025-34xx/CVE-2025-3472.json) (`2025-04-30T14:01:15.660`) +- [CVE-2025-4083](CVE-2025/CVE-2025-40xx/CVE-2025-4083.json) (`2025-04-30T14:15:30.400`) +- [CVE-2025-45427](CVE-2025/CVE-2025-454xx/CVE-2025-45427.json) (`2025-04-30T13:51:20.023`) +- [CVE-2025-45429](CVE-2025/CVE-2025-454xx/CVE-2025-45429.json) (`2025-04-30T15:48:51.963`) +- [CVE-2025-46238](CVE-2025/CVE-2025-462xx/CVE-2025-46238.json) (`2025-04-30T15:27:17.047`) +- [CVE-2025-46249](CVE-2025/CVE-2025-462xx/CVE-2025-46249.json) (`2025-04-30T15:24:39.767`) +- [CVE-2025-46250](CVE-2025/CVE-2025-462xx/CVE-2025-46250.json) (`2025-04-30T15:22:06.850`) +- [CVE-2025-46251](CVE-2025/CVE-2025-462xx/CVE-2025-46251.json) (`2025-04-30T15:16:39.360`) +- [CVE-2025-46252](CVE-2025/CVE-2025-462xx/CVE-2025-46252.json) (`2025-04-30T15:10:04.440`) +- [CVE-2025-46253](CVE-2025/CVE-2025-462xx/CVE-2025-46253.json) (`2025-04-30T15:08:45.127`) +- [CVE-2025-46254](CVE-2025/CVE-2025-462xx/CVE-2025-46254.json) (`2025-04-30T14:59:42.390`) +- [CVE-2025-46348](CVE-2025/CVE-2025-463xx/CVE-2025-46348.json) (`2025-04-30T14:15:29.943`) +- [CVE-2025-46549](CVE-2025/CVE-2025-465xx/CVE-2025-46549.json) (`2025-04-30T14:15:30.063`) +- [CVE-2025-46550](CVE-2025/CVE-2025-465xx/CVE-2025-46550.json) (`2025-04-30T14:15:30.170`) +- [CVE-2025-46560](CVE-2025/CVE-2025-465xx/CVE-2025-46560.json) (`2025-04-30T14:15:30.283`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 81c9def011d..1383f7e6ee8 100644 --- a/_state.csv +++ b/_state.csv @@ -156645,7 +156645,7 @@ CVE-2020-27789,0,0,b3222c3c02699b580895e7172ebafc73b737a78052c9b1d7d86d99b0e1c0c CVE-2020-2779,0,0,b546cdc21687409569d1539faaab8179ac026868e05268399c4a7381bea6b326,2024-11-21T05:26:14.967000 CVE-2020-27790,0,0,e2ba23c1880812cb44323bec3dedaa842c5eb4e6c0e4d691cf11e7f572c85aeb,2025-04-11T12:27:55.013000 CVE-2020-27791,0,0,bd58b5a63fb12f23763b7a92ad2bfd8f2392941dd2a626792c7548135e9e365d,2023-11-07T03:21:01.037000 -CVE-2020-27792,0,1,a0d3ac6e03c27749af9104f88874bff88cd4d1e56b0e01c387136cab45e0c38d,2025-04-30T10:15:15.363000 +CVE-2020-27792,0,0,a0d3ac6e03c27749af9104f88874bff88cd4d1e56b0e01c387136cab45e0c38d,2025-04-30T10:15:15.363000 CVE-2020-27793,0,0,e4b8108131c7eae79f8ef1ed36b42a40d0e0321ad5a607ce3ebd72c17bd69d63,2024-11-21T05:21:50.600000 CVE-2020-27794,0,0,e4205ad077184110f8b3b0bbebf84f46a006c33feb38f0ae4a8074048f46fc58,2024-11-21T05:21:50.713000 CVE-2020-27795,0,0,5d7d09a109d60815049e72fd6d58e57ade47f013cb01bd7f35726f79967bc78c,2024-11-21T05:21:50.820000 @@ -170846,7 +170846,7 @@ CVE-2021-24645,0,0,7d149553cba89e5926f3663a95b9b326f71e9864ffaf9f97114d6a6e99cb2 CVE-2021-24646,0,0,c34f8ef2a9801a57856ddc2a7728fb4e82a97976b881bbd059bb2af5aeeb6d3a,2024-11-21T05:53:29.060000 CVE-2021-24647,0,0,0463786b53267de4868e588c5b1910586dd4a52152fec389d39eeced56b8f8c3,2024-11-21T05:53:29.197000 CVE-2021-24648,0,0,c7243b7ea2a7d2fb5a96ada42f18601ffc41e986c44397685eb76d7da9d28ee8,2024-11-21T05:53:29.320000 -CVE-2021-24649,0,0,fadc79dd5ba77bf1de2fcfd3b1bba2940c855e94a3e110b46d33be78cb83b0ca,2024-11-21T05:53:29.447000 +CVE-2021-24649,0,1,a9430df4ba7e7c23af65c76cb513e84708d99d7eea527eff93a3f9e5c3174b9d,2025-04-30T14:15:23.043000 CVE-2021-24651,0,0,83507ed7a0c1b8381c1b8e7c51f8673b4429ec5d409d94d261bb1645fa9af67d,2024-11-21T05:53:29.583000 CVE-2021-24652,0,0,51e7b4f73aceaa36111a4787b567372518fcd9e514fb6137c41b1c0cada1ea85,2024-11-21T05:53:29.737000 CVE-2021-24653,0,0,ff5977838c374ea8721b9de5c60fedf7a8260c12ae3dafb2f25a90b616019c4c,2024-11-21T05:53:29.860000 @@ -187561,45 +187561,45 @@ CVE-2021-47244,0,0,b66d044a83e59f75875eadae88b0ee07100402065cec11a916dc7f6f17841 CVE-2021-47245,0,0,4b0fd78442e693c8c9ad1c36bf34d80eb49c87d890eb02e4e5da728a0703b468,2024-12-30T19:03:58.273000 CVE-2021-47246,0,0,5e139cc160b0f800742cace44b48d1a1295bb88daa9600fd02e045609c4110f6,2025-04-29T19:45:28.480000 CVE-2021-47247,0,0,cf90397ea9a0d803e299cc12d5f4b86d634ea5464c7c4e150ba6bab1f935c450,2024-12-30T19:03:42.583000 -CVE-2021-47248,0,0,6815ade5961ff0ed77e72f0840fb9b58804880066f8794fef7922658c81186c7,2024-11-21T06:35:43.190000 +CVE-2021-47248,0,1,cdf47fe15c6b2d383181ff2f394f5fb2b585fb74b378b18ef45cc94220c65a3c,2025-04-30T15:21:04.770000 CVE-2021-47249,0,0,9df064926874e19baf591bf7503852913c51ff093c8d41822dae8720c5b2ce56,2024-12-30T19:01:43.417000 CVE-2021-47250,0,0,3895234a4bca9fd42201e364d83eda41b7862d08052563ff8d97516234423938,2024-12-30T19:00:27.217000 -CVE-2021-47251,0,0,910383b3bb8c00e34855fcda8c3ec1d6bd52252a19036ebff555cedb288a9861,2024-11-21T06:35:43.570000 -CVE-2021-47252,0,0,8f2ae53195e1d344dcddbea9cafebc6f137c371b83b1765850464be0bba730c1,2024-11-21T06:35:43.683000 +CVE-2021-47251,0,1,1815bd93564dcc2ee6942704cf02b88931e1dc6b47b1a5c6c1a617ae5e4c14ea,2025-04-30T15:18:22.460000 +CVE-2021-47252,0,1,2643fdb5d0d85f1db8be158f98812b96af5f170d213e82266700008f4d53eb6c,2025-04-30T15:12:52.080000 CVE-2021-47253,0,0,9bc677a4b5d13cd8fd06f4b9374a9aa62a3778e7b12c1d5302b8dc1a583e0856,2024-12-30T18:59:10.807000 CVE-2021-47254,0,0,8ad5e1955743b8c3f06c84a200072a25601d6c4b3267d5b5db59a4daa0deeb02,2024-12-30T19:50:58.543000 -CVE-2021-47255,0,0,ab70f22d16c8786e854f11454b2eea8afe54254c834b2d2bd6063c66081a9479,2024-11-21T06:35:44.037000 -CVE-2021-47256,0,0,0f51de379b692c2d0a857a25782e52c1e5499b2d759e9b9b493c9ede6fbb425a,2024-11-21T06:35:44.143000 +CVE-2021-47255,0,1,cd6cd4d943b48df00d43304d0d9511bd6d738b54b01afeb2859aa9916f6c6ccd,2025-04-30T15:11:57.737000 +CVE-2021-47256,0,1,462d4828eeaf27e9a4ccdb2d207c20b5e777e00472d48f985a7c7511745eef97,2025-04-30T15:05:57.057000 CVE-2021-47257,0,0,4b2ca160667ba35f82809e8bcdbf9da0dee4c2ac8ff284def180e47cc31485d9,2025-04-04T14:30:16.270000 -CVE-2021-47258,0,0,4f4a1b110d061f9673aadaa4c56bdd1be27db2e710cd72471ea9130817d04f49,2024-11-21T06:35:44.460000 +CVE-2021-47258,0,1,001cf6045cfdf204d65bd29856bae587ea4edd3d72565a2cc97a4ed07a62af35,2025-04-30T15:05:14.067000 CVE-2021-47259,0,0,9c2be4f657bb13540b70d0921f9256991628baba34117236ba73f87dd79d3c4f,2025-04-04T14:30:09.120000 CVE-2021-47260,0,0,de274856a3b7f8e1f610fc2a4bb8c9f374b43bf7a91582bdc883aad46edd7aa3,2024-12-24T16:35:01.477000 -CVE-2021-47261,0,0,084fc9509ee193d5a7bc1452c8c4e9638fc55f422c0fdcba5f460a2a51edfab6,2024-11-21T06:35:44.887000 +CVE-2021-47261,0,1,0ea64ab40197b945c58b392caf14830b92dfc9a64600d8c71713118b0d558a6b,2025-04-30T15:03:53.077000 CVE-2021-47262,0,0,461d2312c88f5c3d90b68aeac4255bd5721c21df1555b4eaef5e703311044b06,2024-11-21T06:35:45 -CVE-2021-47263,0,0,dcefe631c466b35e0f40540ba2b98e1ec31fbbaf55744f2fa7ba06315fc7b1d2,2024-11-21T06:35:45.180000 +CVE-2021-47263,0,1,eb21ffb7ab947ecf50c690d3d6f17f26ef44b968bd5ab2b631cb5551ca952a40,2025-04-30T14:59:24.723000 CVE-2021-47264,0,0,ca0befb3f2cfeab4dd46a812016c35d2cc4743784a96a99ddec4e72f3ad432ae,2024-12-24T16:34:16.977000 -CVE-2021-47265,0,0,30e7ca1b9773cb91789e3a60b13ecb7cec823e9a9924c6b30e3f34f498c2886d,2024-11-21T06:35:45.380000 +CVE-2021-47265,0,1,95490c5d0958a2526b52192569daca2472b73af2f61007cfc11b8ce354d99f2b,2025-04-30T14:57:20.310000 CVE-2021-47266,0,0,8fe22556c970090a48c2d282192a952d7718c0b55583c4da380c25ceaddf3afa,2024-12-26T20:41:25.273000 CVE-2021-47267,0,0,6dcbda73eb25a692018319c860316593e409b5b710bb410c2e43720a439d8033,2025-04-04T14:30:02.130000 CVE-2021-47268,0,0,c96a764ea61abe21b4dca87e4ec7590da2cd04480f8a40417548714fc05c32e9,2024-12-26T20:42:00.700000 CVE-2021-47269,0,0,4f34e7fdaf8069233f091ee4d570e2e19ca836c2f25897723ed1ff765446df2c,2024-12-24T16:33:36.863000 CVE-2021-47270,0,0,c225feecb56e43fc5dbc2007585ca168570d4e33bb3e9e3172076816604c85fc,2024-12-24T16:32:36.987000 CVE-2021-47271,0,0,d9346b55778edf12a487f56d16b46df43a6eb384225e026b1ab86edd026e7bed,2025-04-04T14:29:54.180000 -CVE-2021-47272,0,0,c69eb2be8fce6d6565e5cc4d65c854c3be154d237268aa1e8cd3b803b2dfb1db,2024-11-21T06:35:46.283000 +CVE-2021-47272,0,1,28d3aae19fe224778201e89453de4f48e5e19b99b7f11c6f6cda8cc35c28a1ec,2025-04-30T14:55:59.530000 CVE-2021-47273,0,0,62aeef2b5f4a04d548c1cdb3808d0b3c755fbb7fdeec2f7d272fe5851d81110d,2024-12-26T20:48:47.207000 CVE-2021-47274,0,0,abd5118b2c1421cfb276c676cd6020fcd786354ced7e4059ee79fd4712bfbae9,2025-04-04T14:29:40.560000 -CVE-2021-47275,0,0,ba8f23f46e5f9c8a8196ced2309dd609ba17bbed5666b23650763bf7e676fd4d,2024-11-21T06:35:46.750000 -CVE-2021-47276,0,0,4ac47ce93ef1167f4ed4314455eee89eff59b1a95f594d66693d87bab1dd295c,2024-11-21T06:35:46.860000 -CVE-2021-47277,0,0,8690d7a30f6cb1d12af1b6c72d1e9e505e72994dacdc75c1965f64f8c7cb82a2,2024-11-21T06:35:46.993000 +CVE-2021-47275,0,1,86553048753e6298c8091a82bd05a8b2a2936cbed1f225d71bd0c006ed30890d,2025-04-30T14:49:09.583000 +CVE-2021-47276,0,1,254959286613493273d7a16197d51a134bae8f0209f67c09e732ff19356b5587,2025-04-30T14:46:07.833000 +CVE-2021-47277,0,1,8ba621c28a9d60b20f678326ff03c2edf4089d10960b81bfa4e19fb6c48a03ce,2025-04-30T14:30:29.513000 CVE-2021-47278,0,0,747ad576b9cf026fa4d2706df0f8ba2704f34f731a6ceeff9bf67b66527f2bbc,2024-12-26T20:48:56.327000 CVE-2021-47279,0,0,79987a828c416c7e0f52b64f3120ac5d6c6abea85d94078b31c22aec813ad765,2024-12-26T20:49:05.890000 CVE-2021-47280,0,0,fa99d562ed370ef88c7a6108c724dc45b3f7a6ac4775aca24ab929a5be7fc204,2024-12-24T16:31:41.267000 CVE-2021-47281,0,0,445edac3985fca4436c6fe2478adb4d7551697c7289c147f32e873b96f53b9ed,2024-12-24T16:30:22.490000 -CVE-2021-47282,0,0,6483193e9b3445a7b4bf4be780076723f767023b65b10374e78c42c375e2ffff,2024-11-21T06:35:47.563000 +CVE-2021-47282,0,1,0cb13bea46d62da0c7332d1508a890f0c34eba33df51dfcc38db02bca683eac9,2025-04-30T14:30:12.573000 CVE-2021-47283,0,0,13bb485404bfc9e6736f19647a055b33f25828dba6024202a054eb1f61e535f6,2024-12-26T20:49:20.487000 CVE-2021-47284,0,0,81083467c4b5112a333822ec805a62f657ec6604ef5ab248a6a5f931c678e050,2025-04-02T14:48:11.093000 CVE-2021-47285,0,0,996ea18361ebd04fd45b1694fe1d9404484a2740395fd8ca2c06e472a7098e5f,2024-07-02T20:15:04.637000 -CVE-2021-47286,0,0,8a9dda2b710d3f7c5ee0e5600f2738fe2dadd04ede6bd48b4fdd8ee5eef986b1,2024-11-21T06:35:48.023000 +CVE-2021-47286,0,1,c1296ab37caf2c5750acdb8bb819b40a114b8b0fe2962a67b6d6867778705936,2025-04-30T14:26:35.967000 CVE-2021-47287,0,0,138f31d7b0e9d19657615ee45bd5f3769023858d5034e20a324f96d577a4813b,2024-12-23T16:40:14.130000 CVE-2021-47288,0,0,10f648f93aa3c3d05c67ae1659e512ad35e4a307ec2be2981e78f3640b1e2b28,2024-12-23T16:45:23.720000 CVE-2021-47289,0,0,1d0a30807f526ae47126ab0d2cad5d0e632dee4377451fd59938c967863cfac7,2024-12-23T16:46:39.860000 @@ -188327,7 +188327,7 @@ CVE-2022-0417,0,0,864e0142d25909360df8989ec698c01c59fca909020db35cbf2b54d9834af9 CVE-2022-0418,0,0,f06db0ad52da61956ba44e6466e04c2df8f9d206007ee7700c7f8be4a47ced73,2024-11-21T06:38:35.123000 CVE-2022-0419,0,0,5b9750280b2f526e9327438fc72b6229fda79567e70183d00e6e31ce29f6876e,2024-11-21T06:38:35.257000 CVE-2022-0420,0,0,5456f428d72ce2900662e21d51ec72439c4f91d3fad6b905405ceec3f5dcb53f,2024-11-21T06:38:35.420000 -CVE-2022-0421,0,0,69293d062cbab5e53b692e4237f6cee579560d59e70c7869616c4a6a4930ddf5,2024-11-21T06:38:35.540000 +CVE-2022-0421,0,1,be95f2a943a7307ad73ce48232bfa822c729977ce0058279325d4993f13b49e0,2025-04-30T15:15:50.137000 CVE-2022-0422,0,0,fc956314dcce6d90e522e04a586056ddfdbf3c524f3861045ab06f3064a5d5ce,2024-11-21T06:38:35.663000 CVE-2022-0423,0,0,9a12bd788a0705ca89fe14e8adf13035da5e4b35b6354a3664d6fe136758e20b,2024-11-21T06:38:35.797000 CVE-2022-0424,0,0,fbf318791ebf2cfbc314704b3f8f871f1c52487f1725cc240776b22687a1c039,2024-11-21T06:38:35.920000 @@ -189446,10 +189446,10 @@ CVE-2022-1574,0,0,9beabb6ec60271c78c06df21cb1d93f5ec86f1b7fb4beecaec3cc989ef946d CVE-2022-1575,0,0,9a5a96f79c1560516c625d146b7fbab22e4ab19737cb15977f34a4b31043d839,2024-11-21T06:41:00.007000 CVE-2022-1576,0,0,dae5b875a8b935933f9192896b7b67fb1e1d2e5e7781d1ce5e2358511effe017,2024-11-21T06:41:00.133000 CVE-2022-1577,0,0,288c241089ab75419d5e23bc30be91adb707fb825e140c6fb2d02a9717c3c0ac,2024-11-21T06:41:00.253000 -CVE-2022-1578,0,0,64c9a24f77f43d0af1273b05e7025399b6ffbb7e99ae42f9d52975a77bda6bae,2024-11-21T06:41:00.377000 -CVE-2022-1579,0,0,46066c4b1eb256e2ecaed7db775b2fc9de78728c00ec14e30c4b3a3f6ebbf243,2024-11-21T06:41:00.493000 +CVE-2022-1578,0,1,ed89335693404cd4cb83187b534761a7a51ce22839bf605ae17f9c6549505a7f,2025-04-30T15:15:51.100000 +CVE-2022-1579,0,1,e9f3ee5f73fcfd06491f89b31afe1b8ed8dec58840b81e9df30f175918ca447a,2025-04-30T15:15:51.260000 CVE-2022-1580,0,0,7752ef164d312f8047682c27b0b49981cd1358f97bd8272827699866daa91f07,2024-11-21T06:41:00.607000 -CVE-2022-1581,0,0,a545380378afa634fd97a3885ba06132e9b6ba239bc4837b4e2b62c74cab5be7,2024-11-21T06:41:00.723000 +CVE-2022-1581,0,1,0ca1eb86054484d5c2aca354636e3671e0bd8cd483beadbaad7aa54705196fa3,2025-04-30T15:15:51.403000 CVE-2022-1582,0,0,dace5e4010745f77894b12ada5b9e82644ec62025375cf740a6b2ebdd764acf8,2024-11-21T06:41:00.830000 CVE-2022-1583,0,0,9fc38651a069d6f2da6bd685610c015b33d8de1f21446b0fc9bccaccc34c643a,2024-11-21T06:41:00.943000 CVE-2022-1584,0,0,fd8ea0d786a8cc4ee1614f65f6ce5bd87dad6e566c4414065756f607612464af,2024-11-21T06:41:01.053000 @@ -190307,8 +190307,8 @@ CVE-2022-20423,0,0,5b0f8fa0276a77b877e3bc46dca6698863051a35fdb0bdbcdbcd847d9111c CVE-2022-20424,0,0,27ae6173c180ca23f22c2f0b22e02e67de11e305686bf1ea34272e18ce544d2a,2023-11-07T03:42:25.907000 CVE-2022-20425,0,0,2d24c3714014dd8c0069fb192040cc354c7c4aa17cd46433dc6944ad8fadf107,2024-11-21T06:42:47.333000 CVE-2022-20426,0,0,88d36aab410f6f8f9d5156ffa0ed71d92ca1a0cf1f34fcc56e8d7427f8d982bf,2024-11-21T06:42:47.440000 -CVE-2022-20427,0,0,5bcab4368c88b4865649c19c1c9a3fae3406592ba77adce5696a511ef1b4d606,2024-11-21T06:42:47.557000 -CVE-2022-20428,0,0,a468c968613fe00a7516f5f9ef1ea0205ee5e8fd2df38afc3d3a9d822859bc4e,2024-11-21T06:42:47.667000 +CVE-2022-20427,0,1,48d4f6d7569ef4d3000422793ca3ca3b7cb03b73dcaf39c07c5eb7c7eae395b4,2025-04-30T14:15:24.230000 +CVE-2022-20428,0,1,c8fb23d2f810404b302683cb4985f8baf34126bd0bf5ba201f5d98bb9867314c,2025-04-30T15:15:51.553000 CVE-2022-20429,0,0,5ddbe1b3c62e87b761771f081ef7bb2819f68af014e1ed8095747e409a4178ab,2024-11-21T06:42:47.773000 CVE-2022-2043,0,0,7487e6709bba2c7abf2441e8394da9f778035ceaf3fb9415e32f8858af2ff971,2024-11-21T07:00:13.480000 CVE-2022-20430,0,0,c53f77484fce3779e6e14d0be131b182847ad2b95ead8c47867167a7849aa2a8,2024-11-21T06:42:47.873000 @@ -190341,9 +190341,9 @@ CVE-2022-20455,0,0,9ee1d02675db9081ca099f28409504311fb0b1f5e1a97df17c6b2fa8610b4 CVE-2022-20456,0,0,5d683414f4fb49396205b59409059fe67d56b28eedf7fcd7f133d3bf16a1289d,2025-04-02T15:15:43.643000 CVE-2022-20457,0,0,c1ba779a51a8d91950341b17e3855532d339d8d8172ee9a80003c60ef7125986,2024-11-21T06:42:50.937000 CVE-2022-20458,0,0,3002343c55e2e232841b781a12fc99156df04d060086ca08efbfd936856cc6a9,2025-04-02T15:15:44.183000 -CVE-2022-20459,0,0,3a6e354b7201c041e7a522eac40835e92167926b6a42e4014d52c23b947c4582,2024-11-21T06:42:51.173000 +CVE-2022-20459,0,1,af5abb6e4c9ca6c6f83e4c85ba8d88fb73d07c390adf3f1475a9a121a44b2b17,2025-04-30T15:15:51.723000 CVE-2022-2046,0,0,49a5ef6ee6e929525d0fda489fe456e3c5065c6917b4827979ef811047011c93,2024-11-21T07:00:13.733000 -CVE-2022-20460,0,0,9db31a529f110aa5573c545745df4976a31220d3395501aca0a1049888cde7c6,2024-11-21T06:42:51.290000 +CVE-2022-20460,0,1,c3ce0cc489bd45ba32d1e525c4d31ae996238805962fef693d67450af2984407,2025-04-30T15:15:51.880000 CVE-2022-20461,0,0,ec6116fc7ec76d2ef2e26370c1d7f5d30082f8593cff7bdbda8759522d8c3e47,2025-04-02T16:15:20.213000 CVE-2022-20462,0,0,de64f96653642f33c8982731ab2b6d6f26bf25e74a32801ba6db0441b455b49e,2024-11-21T06:42:51.520000 CVE-2022-20463,0,0,f740ca12bd3ad11a241afab7b7f7cf6b59dd2ba49cf45cb3de7e3d883d4bdd8d,2023-11-07T03:42:26.920000 @@ -198036,11 +198036,11 @@ CVE-2022-29270,0,0,81fa9d0e50567dd746f0e73f89adca885774b6d5d17918e71b7eb401f78ab CVE-2022-29271,0,0,65522c0726ad9f284e80d128c35666e4c861d22234fb3b2f633d540d2a16449f,2024-11-21T06:58:50.650000 CVE-2022-29272,0,0,f213ee633337764dc2d30097eb488a729a822422e8790ed4c23efe431e5d1040,2024-11-21T06:58:50.790000 CVE-2022-29273,0,0,f2954e323c8df8ec4d727c541886facaa31c282e9e4f519c7fdd25bf4dd049f7,2024-11-21T06:58:50.937000 -CVE-2022-29275,0,0,e8efd4a80df1beb1f6b731e806df7ecfb858136676a503269997ae2e3802da4a,2024-11-21T06:58:51.080000 -CVE-2022-29276,0,0,249bfaf82e3fc49ff9888f40b26838f2e848fcd6eb8dcf4eefd454d8c5b44909,2024-11-21T06:58:51.230000 -CVE-2022-29277,0,0,9974eabe163d23c1e90758f42af31724a8cd8e07ce2801942c233b4109b5c135,2024-11-21T06:58:51.380000 -CVE-2022-29278,0,0,9918c8767deffbd32376ecc162063d82f99a2b14f6f0664792de8ff611826474,2024-11-21T06:58:51.567000 -CVE-2022-29279,0,0,1227033b4a011e5bac261ca2ad4ca32118cb2fa4d541c12d78694be8b3368fe4,2024-11-21T06:58:51.713000 +CVE-2022-29275,0,1,d8f6065a83c723fffd049a79d6e1d2e8dc1fe694fbbc8c1e452030094bd327cd,2025-04-30T15:15:52.093000 +CVE-2022-29276,0,1,9ca970254de7097664ca788824169e8aa1bd51ef99faf0c5a75fda372df31206,2025-04-30T15:15:52.360000 +CVE-2022-29277,0,1,510da533f50971855ac5c21b7cf686d28874cf8f19de1370dbf490ef9e24ea2b,2025-04-30T15:15:52.540000 +CVE-2022-29278,0,1,e487cfe13bbff19925ead87e76b881956e97ed8b247e91f294545174ec60faed,2025-04-30T15:15:52.750000 +CVE-2022-29279,0,1,3f1e639d8d44de1a7e5192987f41adb169824609dd3b466cfcec9a97cd105c47,2025-04-30T15:15:52.927000 CVE-2022-2928,0,0,4c36cbb8fc95fbe2985a485ae3e735fedef79a2643a11cf2b16c1824caf1f387,2024-11-21T07:01:56.183000 CVE-2022-29280,0,0,2dcca8646d4c88aa992b5cf14827c52673bc75598717d7c9a2b9a22425ea6a40,2023-11-07T03:46:00.283000 CVE-2022-29281,0,0,a540f7c71f7476420a6b6ede7b19c5b3c03ebb18d0c7f18a428265b2c26326cd,2024-11-21T06:58:51.870000 @@ -198818,8 +198818,8 @@ CVE-2022-30244,0,0,4f5f62d8cb425d21a241639dae2f56d791723e444f7285c5e4806a34b5466 CVE-2022-30245,0,0,8ebbc43cefc34b7a3a43010dc702b6770db0d977614f8a33195a08ac76a8ad6c,2024-11-21T07:02:26.880000 CVE-2022-3025,0,0,afc40385840a5a6fea16a29e874171bb711b71189df171a7790ac5f6c9041b12,2024-11-21T07:18:39.553000 CVE-2022-30256,0,0,83bb6e6bdb1c27b45a5227abf93e181a079b96fb729a3bd5f815d679421c033b,2025-04-29T15:15:47.353000 -CVE-2022-30257,0,0,0b1b5f051e0ff861e4dd3371bd884ff7aad699faa247702475614f0ae59708d0,2024-11-21T07:02:27.173000 -CVE-2022-30258,0,0,e033892145e84456f04b16df0386a19c4ee7280438a2d744ad19370de60c0072,2024-11-21T07:02:27.317000 +CVE-2022-30257,0,1,78bc9ea9b840d45fde7c946e904d66951037878628d3d7ce01f18226a75664b5,2025-04-30T15:15:53.110000 +CVE-2022-30258,0,1,f1515228690fbbdd81ee67f0c1d6ddd565c3c4a7f72c0e902714711d11d7d79b,2025-04-30T15:15:53.293000 CVE-2022-3026,0,0,9d5029001ca2619283973411836881bea05be51a70e94dcfda2c18631f9ce669,2024-11-21T07:18:39.677000 CVE-2022-30260,0,0,8ce0e29109e3c4d2ed5d97023e626229b957450ca32fd9fd74a9c46ac687f01f,2024-11-21T07:02:27.457000 CVE-2022-30262,0,0,c0b8330eff55e9047411e9f4828f20d6590c552e3711e5f2e6623fec8bc3f884,2024-11-21T07:02:27.627000 @@ -198838,7 +198838,7 @@ CVE-2022-30278,0,0,a2cb101491b03de77b0de6332f4fc10db206012ecd38a40e27b9a6661ea0d CVE-2022-30279,0,0,d2d95e866afc4bbc97fbcd7dd34779e42a5ac3bcd178bd83b0aa97f92a8f605e,2024-11-21T07:02:29.373000 CVE-2022-3028,0,0,425938d07d047cbf2fdc8d1e6e6ce2f80aae9b78c8adfa7a45b3b9f7b78940fd,2024-11-21T07:18:39.960000 CVE-2022-30280,0,0,f07b0e42719aa0092b6a021d969a6124ebd80a43aac8bed727b3e0c0d0c3da25,2024-11-21T07:02:29.507000 -CVE-2022-30283,0,0,6421331a8b9ade34e75cb47ae3ce2b2710a41138885c02f5858badd3a90272cb,2024-11-21T07:02:29.650000 +CVE-2022-30283,0,1,832c2910e3ad505d239c1592a2c11680d4038880a3b9fde811383be820f3e42a,2025-04-30T15:15:53.467000 CVE-2022-30284,0,0,b8d938f4d23c2278265530a5c6b7798a37e8fa04c1e02bdd04a106452d61a5da,2024-11-21T07:02:29.797000 CVE-2022-30285,0,0,7359db072f73dc485b25712c5f9ee00263a775a694be1ad795c7768273f1344f,2024-11-21T07:02:29.960000 CVE-2022-30286,0,0,865cdee35d3a301ea52dde38bca69bc80f4996b007aec4b5fc97670f4333f666,2024-11-21T07:02:30.093000 @@ -201469,7 +201469,7 @@ CVE-2022-33329,0,0,0993b34e1bca5933c32dee1a04f12bfbf16754a65cf6732640f04067ccbe3 CVE-2022-3333,0,0,d21365cb78740f3511a63356c7f956954f54261ebcf5c91194ac6c60c53f2ada,2024-11-21T07:19:18.943000 CVE-2022-3334,0,0,d69e915a65b21ebf5d9e27f0fd8978b777b768bf7639cbe74bf878ea9269f257,2024-11-21T07:19:19.073000 CVE-2022-3335,0,0,06fccf352a0a84fe1516ae0b845c856a0dbd47d9b31a3be8aa5d57433889bf1c,2024-11-21T07:19:19.197000 -CVE-2022-3336,0,0,c1203d9f6d9630e598b0d370668100945b6759133ac13e31dd88f01ac12c17e5,2024-11-21T07:19:19.313000 +CVE-2022-3336,0,1,c01273d99dc8b5c9774aa1b8cfe8088a8fc551fc9a60ad2e520b7a8fc54ecbaf,2025-04-30T14:15:24.720000 CVE-2022-3337,0,0,b8b8018f10fa7252e9e34d4463034ecf4f1ec882bb95aef9f6771c1a48acfc20,2024-11-21T07:19:19.430000 CVE-2022-3338,0,0,23d03f4e1333d230671ded29ceac962c46fd09c965c4589fbe1e58e69735ea5a,2024-11-21T07:19:19.557000 CVE-2022-3339,0,0,cbffe13fb6b0e87f46c669e1b9447ed44fe8afa7993f51a3a517ffb01a6e3f6f,2024-11-21T07:19:19.710000 @@ -202040,7 +202040,7 @@ CVE-2022-34314,0,0,6d016c5db38e5a1218ca341be157ff7d1f17760b49b86851f5e6bda59c256 CVE-2022-34315,0,0,e4d4a9ddbef88784ddb5940c4bd9e096a6b16b0610d4d1a543a663ce7ef1ca4f,2024-11-21T07:09:16.987000 CVE-2022-34316,0,0,c122c9c2eed3f953e4fcfbfa3ba2ef27be7c0ec1085c95e18a1b8f7dd02427cf,2024-11-21T07:09:17.103000 CVE-2022-34317,0,0,d614bbe867658a113253046fc0385054551564a76f331f8e137d0610e904fc45,2024-11-21T07:09:17.227000 -CVE-2022-34318,0,0,f9a861333799e9b64876ae44ef179644f0a31b1709d00283de6db5a7de986581,2024-11-21T07:09:17.337000 +CVE-2022-34318,0,1,d34d26c727fef137bc15fc773739d280bcf302ea2bbe5200b6fcc209fcf8ca05,2025-04-30T15:15:53.763000 CVE-2022-34319,0,0,aef60ca70699e8d1b26e5d11ea0634e0df9cc8b3b26427eeee0f68ebe3078d95,2024-11-21T07:09:17.443000 CVE-2022-3432,0,0,ed8c3d3c053de14c7cd1e0678b6c1f6cf7da74e48258f34e50461d133dffb1ce,2024-11-21T07:19:30.240000 CVE-2022-34320,0,0,245655b0171fab34d7184a3dfd840d8991cc2b17e8dd724426634875a48a8305,2024-11-21T07:09:17.557000 @@ -203498,7 +203498,7 @@ CVE-2022-35996,0,0,8ef0b0cf5b09bb0e08fc94d26d98abe8568992d7c2b6e312220c0438474c9 CVE-2022-35997,0,0,8efa438b45fd900891ae84c30efd23f0493af0ab2906cb4e030b9e270918a70c,2024-11-21T07:12:08.743000 CVE-2022-35998,0,0,e80bfa0bf2928d5cf49b27c7bf8f25e8f4bd05df3602d783b182072b5deea2c5,2024-11-21T07:12:08.877000 CVE-2022-35999,0,0,90dc165079a8815b5daee74d33baa3bbe473092ec9abd163f3d2331b4e8e09ab,2024-11-21T07:12:09.023000 -CVE-2022-3600,0,0,d72c5807c03078c3c8647e8c4501f7766ee9a95c1515f1f7936c1971248ebe5c,2025-02-07T19:44:53.660000 +CVE-2022-3600,0,1,b5e0b18d2679627c398959cd5a6f31b51559ace89c24dfa24268ecae7942ea5d,2025-04-30T14:15:24.883000 CVE-2022-36000,0,0,8492880531286eea69917027a4d244a15a3f2fa171ee081476026a7a4d42c0c5,2024-11-21T07:12:09.177000 CVE-2022-36001,0,0,6a7866eea9045a8c4d8dd917c08d0f3d53a23ea1983cd1bff06302c3f7c41116,2024-11-21T07:12:09.320000 CVE-2022-36002,0,0,c4188d6c09afbacb6a3ec4e2327b8f61f47208080bfee3c502612c6963db948b,2024-11-21T07:12:09.457000 @@ -203874,7 +203874,7 @@ CVE-2022-36428,0,0,4f8fabc61ec2a85cbecb64d6f12c18af928e3acd0a40974c1639a62a6e79d CVE-2022-36429,0,0,20fb49e56c6f1adf794f2232cd360d3fc8e2dada5eda76f7ff2b356dd55c2774,2024-11-21T07:12:59.513000 CVE-2022-3643,0,0,7aaaf9084bb84ab92fa70840701773c2dfe43e0ea77f112347b533a9f79656a6,2024-11-21T07:19:56.600000 CVE-2022-36431,0,0,ee12d34e458b3a3de33896b6afaca59da233821f7619d0c729cbab04e054dfd4,2025-04-24T18:15:17.247000 -CVE-2022-36432,0,0,40f0f1ce1fba46db4fc49c3ddcc8785372b185cbc0738759f144e2ddbd897174,2024-11-21T07:12:59.810000 +CVE-2022-36432,0,1,e4f395aba09ffdcd780387fd544fda43f5fcdbe2678af423ba6fb4d4d3af5cd1,2025-04-30T15:15:53.997000 CVE-2022-36433,0,0,72b9b679a2a29f3c1783e5801f15c3bcbd338983499be1ab0f4ef57ccf612fb3,2025-04-25T15:15:30.917000 CVE-2022-36436,0,0,9434892c0b256e55b1874516de3b5aa1348074c0cf8597a6066c5a94f012bba9,2024-11-21T07:13:00.140000 CVE-2022-36437,0,0,3153b59c88a0f5f7aa8f3a5a6e4669887b4635cb5dfc156c694a9b92b4f26c6a,2025-04-11T23:15:26.833000 @@ -205173,7 +205173,7 @@ CVE-2022-38161,0,0,5675014ac752e524bf6db1c65d676a4339dcdb2c649e4d147aed87cddd5ad CVE-2022-38162,0,0,66e6ba15db1f52310bf3b88f701928ff4a3ec9cb3de095704a9a90ec13f97a4c,2024-11-21T07:15:54.843000 CVE-2022-38163,0,0,4234119abd209fd042c7f7a86093912dd7d8348a5041fd0b58b8fc45ce096fcc,2024-11-21T07:15:54.997000 CVE-2022-38164,0,0,0e4ed8aaa906f90a20e6ed87de84c54b21f926756becc4ef5c9749ff5741d85e,2024-11-21T07:15:55.160000 -CVE-2022-38165,0,0,a68e3fdb8ffff7f16aa37d378e746268fd3459bcf43313b15744562b00d8c2e0,2024-11-21T07:15:55.400000 +CVE-2022-38165,0,1,c37d50812a5ce55ecd7a43bdcaf173380a85c776d21714ae325dd8a82703bbfd,2025-04-30T15:15:54.190000 CVE-2022-38166,0,0,526f9a7dc4ec70182bb59b61e0c18eba8bbd7d9aaa9014ef025e64f131d3cfd5,2025-04-29T15:15:48.190000 CVE-2022-38167,0,0,9ba2563e19c68697da47170bb892fb932062128e2e56d4d9f7868b6b2e16ca18,2024-11-21T07:15:55.687000 CVE-2022-38168,0,0,dc2fadc445cd9df99a532a0c39f0e26523e56dcde3027d246cd2f5964245823f,2024-11-21T07:15:55.830000 @@ -205719,7 +205719,7 @@ CVE-2022-38867,0,0,4b8cf32061422dbf4e6754f728004922bb25fa16ada8aded45d45a7b72675 CVE-2022-38868,0,0,a329e5aa5f67a0e1f151d9c71d61b4d476d8a4b5fcbcfd6d9c7a6c8fe931c8a4,2025-03-19T19:15:38.210000 CVE-2022-3887,0,0,06c658cfbdd81eef4d6500a637650189da6a52b1e7f7631d7ae6ba5ec9938709,2024-11-21T07:20:26.720000 CVE-2022-38870,0,0,e70b6b96c4141983a674b240e16125c6a6a7f9ff2f0a05dd5d6b5a6c0a0c5ece,2024-11-21T07:17:12.687000 -CVE-2022-38871,0,0,653879fc9609700ed09ec778b9771c266a8d9b487aa13665630d7387a356abe3,2024-11-21T07:17:12.870000 +CVE-2022-38871,0,1,53b15f808207b0e39ffe648db2d65cb55d663aab02d1d168ed14e7199be9118d,2025-04-30T14:15:24.510000 CVE-2022-38873,0,0,b5054676743f28620381e7d6efb1cc1ba6e73f7d8c8e58c775f25ee22de1d1a8,2025-04-17T14:15:20.023000 CVE-2022-38877,0,0,4701a43015b4cb4d459803d0517c56aaad73426435129e2d43405fd1bdba4c12,2024-11-21T07:17:13.210000 CVE-2022-38878,0,0,dcbbdd56e6aab13167b0694bbaf8f09085e228dc467c626e7970da6bb7e050bc,2024-11-21T07:17:13.353000 @@ -207133,8 +207133,8 @@ CVE-2022-40842,0,0,773ad69ed3991ca73cf7c697bc1014c6147905c7e9488de3d9cdc397f2a2b CVE-2022-40843,0,0,dbc3b64bbae9e3003cb4a7d3be2b9844f1518f802d99f29951d3ef6d0feafcef,2024-11-21T07:22:08.140000 CVE-2022-40844,0,0,42d431581ef589b315c3d978062dc0a27eb1f8820567e5b1ce0eb85c1a9e98a5,2024-11-21T07:22:08.290000 CVE-2022-40845,0,0,841976951f1c9f397f9693c32bc8758dcc454d39eb41e7e93febd880628d6e4f,2024-11-21T07:22:08.460000 -CVE-2022-40846,0,0,12c16294ce4b05de3f7d70379ce4b5d722e19cd1612cbb31270ffd2deb9abdcb,2024-11-21T07:22:08.607000 -CVE-2022-40847,0,0,c03e0277d3700c4cde76b5c4564618e56e35f10cee3219661d00fa55634038e0,2024-11-21T07:22:08.760000 +CVE-2022-40846,0,1,39b566cb8c950a55d3fe27f102a12d7916b948c0545376a036e9592a6313e3bb,2025-04-30T15:15:54.480000 +CVE-2022-40847,0,1,6d2d0f86090c44a40af4507c155fe50cbd34a952da7848b6f9cadba8ca5e947f,2025-04-30T15:15:54.687000 CVE-2022-40849,0,0,58c086a5a812359f1ad94543797bf00465323b980beacabbf6e896acf7e93ca8,2025-04-24T21:15:19.460000 CVE-2022-4085,0,0,4d38d3c82e4b5bfbf2805b2ef3b76b1764d3ff9d973c83a4cf2fc16a09a004f2,2023-11-07T03:56:53.213000 CVE-2022-40851,0,0,f0e55134147d65efa1af9546d6751a8cc15650fe5de7eca49e0776bc369d9a26,2024-11-21T07:22:09.057000 @@ -207609,8 +207609,8 @@ CVE-2022-4139,0,0,70bd0c4438e0d42816803bf10c2cda7fd805cb562599c934f3e9758b483944 CVE-2022-41390,0,0,56282c1b0d50d5dbe9d9a0b2cffa175b8f3ee590c5d0a11cd16e1a827766a512,2024-11-21T07:23:08.463000 CVE-2022-41391,0,0,d32d0bc5c5503b3baf71b6f7bb7b6ecb80cfe87a48540259065e2b4987be9a93,2024-11-21T07:23:08.590000 CVE-2022-41392,0,0,70dde2ed73a2ca1acb62d97f1037a10d759d68feeff01292c17a88ef4c4582cb,2024-11-21T07:23:08.720000 -CVE-2022-41395,0,0,1f8091ff0b78eec931ef0697c070bbd35a1f58b56dc2f1c5f7690a3194688395,2024-11-21T07:23:08.853000 -CVE-2022-41396,0,0,1cbf100dab8252b6b1e9a6f4ef622626ef406aa2ff4caa7044120fcbba7e7598,2024-11-21T07:23:09.007000 +CVE-2022-41395,0,1,2ee3617b991cb132d819874536cd37c52204bf8c30d4782d77ef5817a280aa28,2025-04-30T15:15:54.867000 +CVE-2022-41396,0,1,932b5992c212800aa94d5191a2290d6f113e3e4513b68cdb137f43d060f95ea4,2025-04-30T15:15:55.063000 CVE-2022-41397,0,0,c0e9869db0b13268b06eb3421b088956793e4cd60d97884cf46f5a0f733cb4d1,2025-01-31T18:15:30.750000 CVE-2022-41398,0,0,69ef4933c7ac0d2bbe3d2169ffbca7425bcde1676b28eaf93f4fa5178e8a6f9f,2025-01-31T17:15:09.463000 CVE-2022-41399,0,0,03431e8c2d0e990b1359f18724462ed7aeccbe840e45e68c8417db2e9b358cfc,2025-01-31T17:15:09.690000 @@ -208187,10 +208187,10 @@ CVE-2022-42044,0,0,4b003b79d52c535b15980d22035b09add42a881d46b97e131b92acf23be4c CVE-2022-42045,0,0,fa00602f5cacf506918aa2a538c073f64bc94c453b34f187b7f24627ad627bc3,2024-11-21T07:24:17.850000 CVE-2022-42046,0,0,d1626a93ad5f917ee334e5d45b00485ffaab2dd7cc24ce92d44ec6b61d6477a9,2025-04-17T14:15:21.323000 CVE-2022-4205,0,0,e891f9dad69dda63da83ad9de4923fd4fbc6a08687e2f527445106dd9a27f918,2025-03-27T21:15:40.837000 -CVE-2022-42053,0,0,f84a20c57a710046a5921125f009eeb322bba75b83b8298d0d45d35581efe069,2024-11-21T07:24:18.170000 +CVE-2022-42053,0,1,134afbae11d9a2731f9a514c04e46eb08f1a10f663d658ea0a2bf0744e34ab31,2025-04-30T15:15:55.243000 CVE-2022-42054,0,0,1fbb4b57f03684db196fe4e0f7bcc23fb563b88cf54c3ba3d883f33a3d523443,2024-11-21T07:24:18.310000 CVE-2022-42055,0,0,a8ed70eb089ad7ed9ddaba439a26deb8a495368153eed37543d58dae4755494a,2024-11-21T07:24:18.450000 -CVE-2022-42058,0,0,8ba47c62fa6a3380af828805792039874b6ea3dd056b408534a838e303e6bfff,2024-11-21T07:24:18.587000 +CVE-2022-42058,0,1,acb178eec892b90a3d75218b5062181ef274af9a5768cfafd1e0414f059e07da,2025-04-30T15:15:55.433000 CVE-2022-4206,0,0,27a7802016d54c36e961126dfd64e995f2d60aea6b471f486f4bc17640381ff3,2025-03-27T15:15:41.350000 CVE-2022-42060,0,0,7b37cc746910e6c0e6f8a568005d22f0226ff8b766e0fffdd75d16d18c92f8bc,2024-11-21T07:24:18.723000 CVE-2022-42064,0,0,bea86809ebe691b63bb1b74ba5dc7262d76357532a01601e96663d3b50365e14,2024-11-21T07:24:18.863000 @@ -208231,23 +208231,23 @@ CVE-2022-42114,0,0,8ebdc134adad50d7e10170be43888f3538c1733fdad30adbc0e9dcb6d704e CVE-2022-42115,0,0,e15e0fe553dd859870b2c54bdcd39ca949ef7d169da417a80675d03e338be514,2024-11-21T07:24:23.300000 CVE-2022-42116,0,0,86a62a289bf2aeb1827a7b60ec326a0067a9da46a94aee987a861243686ba1af,2024-11-21T07:24:23.450000 CVE-2022-42117,0,0,7ae3a2f67442fa2200ea9aa8adf389ef3395bb4dad4f3b275d0db7cc022fc7a1,2024-11-21T07:24:23.603000 -CVE-2022-42118,0,0,d7f0394676bc77f398d1222218bbc52b52534d490d4c501701c1fedcb11994c8,2024-11-21T07:24:23.750000 -CVE-2022-42119,0,0,8deb8dfd153f7bc4b74ed4c3ef4caa9274f31eba056c763f162f9d83d1e3fe1f,2024-11-21T07:24:23.913000 +CVE-2022-42118,0,1,20acf42127e4c2da7d7ac6ddcd04d93eb421c561a400747532ebfc30e2240b09,2025-04-30T15:15:55.630000 +CVE-2022-42119,0,1,d3e5e8d29e80c2add3dbb6634fe612a94e2505be194e39e2dcbd452f0fc47b2e,2025-04-30T15:15:55.870000 CVE-2022-4212,0,0,7b822600ffbe4267e362715e2228cae0582f5e5c31fe6b462a17b635418a1767,2024-11-21T07:34:48.033000 CVE-2022-42120,0,0,4643f2696f1b1f5d029b5a864a860a83ddcc6aa55d0246ef33d37d00a0c681a1,2024-11-21T07:24:24.070000 CVE-2022-42121,0,0,3cba154c105e920a69f15bade6a6da97e0654aa5d8e2ab56a3ecded3df012d1d,2024-11-21T07:24:24.230000 CVE-2022-42122,0,0,10ae83a255bbd9e7b2d8a820e9a2a3500199b1ceb949e0c11dcc2ff1249611b2,2024-11-21T07:24:24.393000 CVE-2022-42123,0,0,03b6fa97db446bb4e663262713904f76a8cc2fe5302128d0cfd4dd3d456274d0,2024-11-21T07:24:24.557000 CVE-2022-42124,0,0,8b3875d0b3a019fbeca47702a1b454aa1fa6d77da22852fe87cf375ac66565ce,2024-11-21T07:24:24.717000 -CVE-2022-42125,0,0,a9e9f86cdef58f39f522e0d815b1100f09c2334cc90959601158b2cf9adcc0f7,2024-11-21T07:24:24.877000 -CVE-2022-42126,0,0,16f3beab05dfeba0ae8cbd0e9a47be928375fa06e921e97b69d3d5bf02b127e4,2024-11-21T07:24:25.027000 -CVE-2022-42127,0,0,f1f6c1a7e41d07edbbf4f78c5b25f08c9eedba308f070c6b0477a70b3641e415,2024-11-21T07:24:25.180000 -CVE-2022-42128,0,0,b14797b266797ac94f09c5a945299112a192e8ab735737acd31233b6140bdb57,2024-11-21T07:24:25.337000 +CVE-2022-42125,0,1,6f8a3af46b7a929db13c54f7e566b15f1e17f37e45536938ca9fe8bb260c5207,2025-04-30T15:15:56.050000 +CVE-2022-42126,0,1,ec131c18c3d99aa56587d1f158574dc3ff27f528e90c679a0cee9998e07b390e,2025-04-30T15:15:56.240000 +CVE-2022-42127,0,1,4380f08f77273f8e1c1be58d3fdfae522b6a75033549638828ea1822d99d680d,2025-04-30T15:15:56.417000 +CVE-2022-42128,0,1,eff2ea23a7009bc0046ea1b455c1cbd988865814a3e46fcc916df83ae022c8b8,2025-04-30T15:15:56.587000 CVE-2022-42129,0,0,eee184ef6698f293c825129e25a0be3334d8e1390c28572630d2715985c06b81,2024-11-21T07:24:25.490000 CVE-2022-4213,0,0,98189607873598b4e1fb2108caf865c8d4ab70f478d6833a6316893c23040da5,2024-11-21T07:34:48.150000 CVE-2022-42130,0,0,2a82c49d271ca53be794210ddf3138a8f4fbf1de7c532249efc68a7aef2fe9fd,2024-11-21T07:24:25.640000 -CVE-2022-42131,0,0,946cf625234d17b729412c54db5b62e739fb2f7fc0bd02bc2cbe649c1bb15973,2024-11-21T07:24:25.820000 -CVE-2022-42132,0,0,6b091e286b08827885d95f28214a488d88c54ce1089919af2dff88cfaa15a6c5,2024-11-21T07:24:25.987000 +CVE-2022-42131,0,1,3086c04b26b14acda467d8a0c598b201b829617b87c2c831240610a9e5166aaf,2025-04-30T15:15:56.773000 +CVE-2022-42132,0,1,aed24c106d1c24a6dca897bb00ebd8be61e7bfd255c3404fb7350a22f25e5d0f,2025-04-30T15:15:56.963000 CVE-2022-42136,0,0,d46e718ebcd9a99f8f7ed719cbd360c1f5e6f7f4d59d5ae87271a8e81cf90384,2025-04-07T19:15:43.457000 CVE-2022-42139,0,0,66a07ebf1e86906b61abc345b7822ddd7bcc304fd1d3e75b551b189246e1a847,2025-04-22T16:15:38.230000 CVE-2022-4214,0,0,63f48ce7f983a4fc0be762edb285f882bb8f489ad2b5c9d66584168962c0c3cc,2024-11-21T07:34:48.280000 @@ -208809,9 +208809,9 @@ CVE-2022-42889,0,0,12f8aa79644d1a8ceb954d3881cc3c3e147b831ed0b5b087c6ef569712e39 CVE-2022-4289,0,0,0359a1ea343d33470121bf5b468eaaeb846fcec66c482ffa9331f634e7bdd780,2024-11-21T07:34:56.880000 CVE-2022-42890,0,0,a6234758517e8779b99f2b8ac253047ba51337266ba8a46fda06ffee6b9930f5,2024-11-21T07:25:32.273000 CVE-2022-42891,0,0,02dc25bf626831ec85570529b5c253353d3166c43b5befe4e481ba126e8a4e83,2025-04-29T20:15:21.857000 -CVE-2022-42892,0,0,fbd6274639be630bb04e5350d383c444d8c0d6c49cd930dd6be1919b0bd892b8,2024-11-21T07:25:32.580000 -CVE-2022-42893,0,0,c2ea60732803a79b219e7ce364e543b8f3fef4883b414db57f518730e1385c9b,2024-11-21T07:25:32.710000 -CVE-2022-42894,0,0,6870a969ffbd3168a346db2fb3f880ab199dcdeff8e0a3c7bb6f53d8a7926f98,2024-11-21T07:25:32.830000 +CVE-2022-42892,0,1,1e3335e2f45e00a6efaaec8413f38932dd7681d5b86e68ae7fe178aeb6cc4fd4,2025-04-30T15:15:57.157000 +CVE-2022-42893,0,1,21271fb809fe054b176ddc9419a500e5f572da0cf1d59f3a5ec4ea3fcc78d800,2025-04-30T15:15:57.337000 +CVE-2022-42894,0,1,ea6b532b056784ab87988b25356fad9d0de5be689469f97726aaa046dc1db9c0,2025-04-30T15:15:57.507000 CVE-2022-42895,0,0,9bbffea0d6c84fc0fce63664946a754ce3cfa9225b9dd4f7d84de6898dfc53a2,2024-11-21T07:25:32.957000 CVE-2022-42896,0,0,6d2828ebf7107e04fe3a7c91651620fd220727514028f2eac268472ed6e97717,2024-11-21T07:25:33.110000 CVE-2022-42897,0,0,076ab498b1351dcda80fbe9ffdd078bd615d9b16cdf32cef9eb7d60c9b3326c5,2024-11-21T07:25:33.257000 @@ -208821,8 +208821,8 @@ CVE-2022-4290,0,0,802b2748fd428daf8579b1f2d82e0d79f4203a235db9a1df062a5931603583 CVE-2022-42900,0,0,53f2980452c464cc64d37b8483a94825be07cc236e396c928b209cc67a55872e,2024-11-21T07:25:33.797000 CVE-2022-42901,0,0,19ae881bd434a7252b4c36612d43bdf9226f298f6442b22630a1f472ea623359,2024-11-21T07:25:33.967000 CVE-2022-42902,0,0,ac08285b22992b7647f1d0763e7d3869a9b6488e8b4fecdabb3108c7532870f8,2024-11-21T07:25:34.113000 -CVE-2022-42903,0,0,d82aa3c6b3ece8f45ff64b06958efd13b9dc0b658e9e3c1d3085af8e1b77fc57,2024-11-21T07:25:34.270000 -CVE-2022-42904,0,0,4710c607a62ace4501c85c20d3711431aa4115a75e080d62a0b87b49dbe00747,2024-11-21T07:25:34.440000 +CVE-2022-42903,0,1,c94e8ac79550413f4885812ad2abd463d1f622a0b72f34e6f4d6d0798e479fae,2025-04-30T15:15:57.673000 +CVE-2022-42904,0,1,c62b2a9e334855cd229421a6534eb8ce55ab79079c2feceaac8bc23d58f1b20f,2025-04-30T14:15:25.133000 CVE-2022-42905,0,0,9815adbc76d85ca9590eab15675318abf7c788c40082aa0fc127e32bc76b46a2,2024-11-21T07:25:34.620000 CVE-2022-42906,0,0,319861dca9b94aee5457c921829df262cc9551d1676d58a7a0abd898cb41bea6,2024-11-21T07:25:34.783000 CVE-2022-42908,0,0,13e6316050d91f2948cc3645befdce12bd60865fe831dab9939445c0939d5acd,2024-11-21T07:25:34.950000 @@ -208865,7 +208865,7 @@ CVE-2022-4295,0,0,573cb5aa4fa5b5d665188bd5a0544e652e5b3ca9e959d43dfd6b585cf785b3 CVE-2022-42950,0,0,20d4082bffbc77fa3560921770930640b675e908f7bc2394264650dd258e0603,2025-03-26T15:15:39.937000 CVE-2022-42951,0,0,1c030da7f5ff30312033b2bc3d23eeed5ac1b7e402a7fea4ff36f2ef213b6a3f,2025-03-26T15:15:40.167000 CVE-2022-42953,0,0,1e06308b9e96596dedafb54de661b26e4eca66a689fa635df055d1db60dc0d3f,2025-04-15T14:15:33.560000 -CVE-2022-42954,0,0,097f447b99a7c952c456fbd966423e13cf9fa75d291e4dea19788279138e2e32,2024-11-21T07:25:40.733000 +CVE-2022-42954,0,1,c7cd0bbb3a807b191d2c0198f361bfe595e5e21ef2475236f2f51b895b08d29c,2025-04-30T15:15:57.860000 CVE-2022-42955,0,0,17fb1ae49670698a4e8adcb5ca942fc742f29fd42100c8f53f2777ea4e43ec26,2024-11-21T07:25:40.903000 CVE-2022-42956,0,0,0cc8f2156a3a4139aed3f88fd2c93a076d17702abfe220c1c52f72367b9eb0a1,2024-11-21T07:25:41.073000 CVE-2022-4296,0,0,95538a4b65e537a3557845a12e8b70a31c904b8375e91a729002961ad96f5e82,2024-11-21T07:34:57.730000 @@ -208889,7 +208889,7 @@ CVE-2022-42978,0,0,5f3dd813ded3f3d313e6d9d57bf5ad8eaaff7e4dfc8eeb00569f3e0cb267b CVE-2022-42979,0,0,d299466bb652769abe6460aec0c281dacb7f0e015ae1731494b49a7d34a29662,2025-04-09T21:15:41.887000 CVE-2022-4298,0,0,3d6848b8802c6f93a3e3e8967470123b461bb43d7374e3372e44663cac0fac20,2025-04-10T19:15:52.410000 CVE-2022-42980,0,0,62071fd533e66a82dd4e545033615354a7020c4f40fea646d400f8c6e521d08e,2024-11-21T07:25:44.080000 -CVE-2022-42982,0,0,ebdbde38528726bc6106aae53e21478878d93a79b87c6155f4fcc4762d697a1d,2024-11-21T07:25:44.240000 +CVE-2022-42982,0,1,52dbffec9fa13680b65cd2ad085be96fc123fd989bcb40277d3fc924f492aadf,2025-04-30T14:15:25.340000 CVE-2022-42983,0,0,975d0476285279dffd4982381e83c271ebf9d1c73d5391ae041d191656c9b80b,2024-11-21T07:25:44.407000 CVE-2022-42984,0,0,fcfe28b8dbe5f84aab1316e2459e35c4b5b1076a57522be4205d9d3a3a8abe6b,2024-11-21T07:25:44.590000 CVE-2022-42985,0,0,6d833b4dcbc02c7f639fd821a7be3994403f1c65257b700c5514a6418627d0c3,2025-04-25T21:15:34.313000 @@ -208968,7 +208968,7 @@ CVE-2022-43084,0,0,6540c9f7a568cba9bf18b75586b51b6c174f706072c405d922aa7a339d0c4 CVE-2022-43085,0,0,0e49daa42dd0c0a58e714a8dae9e4ce995e08f6b0b671b85ca79944a4d2ddd5d,2024-11-21T07:25:54.727000 CVE-2022-43086,0,0,6a2baf73aed9ae1fcbda843fcacb4c1c2e720c1624b6fef164b3e8cdadfdb5f3,2024-11-21T07:25:54.880000 CVE-2022-4309,0,0,5bf2d01c047a68da2e75dc978452e16fa48b4902883fb5724854f2d83868ac0c,2025-04-07T17:15:35.277000 -CVE-2022-43096,0,0,3af4385f345733605ad2d7308f04a0ff53f51d337ecb9a7655ec6ac89f94b36a,2024-11-21T07:25:55.033000 +CVE-2022-43096,0,1,cacb1808d34e87df5c98f16d577b4118fd80380ac6607c52704f978b00a2a661,2025-04-30T15:15:58.047000 CVE-2022-43097,0,0,75175cda063a45de8079a876b054bcaeb70113eec573f645c96fe03e16194fe2,2025-04-24T15:15:50.910000 CVE-2022-4310,0,0,316cd0851567879079e7e9236f16cd17e2020245edfd6d8b8e2803e6a8f4e235,2025-04-09T20:15:24.037000 CVE-2022-43101,0,0,1dc16e6403bbc38246f8ed72e79f67c6ec8a6688f5b0936fd22625c276edb1b3,2024-11-21T07:25:55.370000 @@ -208994,9 +208994,9 @@ CVE-2022-43127,0,0,92fe347fff41b643a94872eab09e93681058f003e07c2555a4983f742d9d4 CVE-2022-43128,0,0,f007c9f0be159632f9e69ff9af025b1f1f904f8a4fea112fe37a153e0ec1a85e,2023-11-07T03:53:43.393000 CVE-2022-4313,0,0,086460c5bd76f1575461d5a5457e280fc6c4e01652ae257ce74e884478d4e479,2025-02-27T19:15:47.290000 CVE-2022-43135,0,0,5f52f089226dd60a83b3618a46f3f76a0f0a1b462fd33efd8408bc88757a6756,2024-11-21T07:25:58.380000 -CVE-2022-43138,0,0,76d290a775639434284c4f96d9c851e3f696d343fa7835c0756314b22ca4d30a,2024-11-21T07:25:58.543000 +CVE-2022-43138,0,1,2d4a46c39862fdb33bd71419c5d552adb64b2b5bf44386ffeff2c5a6b8b0b610,2025-04-30T14:15:25.540000 CVE-2022-4314,0,0,b2d7e2c2d34983b5612bbe613ee90b322bcf58c270b648e62d25d8832fa87daf,2024-11-21T07:35:00.987000 -CVE-2022-43140,0,0,0f31a8aaf78a97f6aa0f2934b7d57f151d32a54ad6fc5a361944a1acc07369ed,2024-11-21T07:25:58.720000 +CVE-2022-43140,0,1,c9d53be271af91e52214186c9df783071208bd0020ca24effbc1828c10837e73,2025-04-30T14:15:25.740000 CVE-2022-43142,0,0,8a22fc2eb35900f908f884c1ac55d8d632fa2450cacd301c94373997ac788ac6,2025-04-29T16:15:25.667000 CVE-2022-43143,0,0,5c01884f0a97afe708a14aaa834e46a63f8946a303b61ee1c0b8709f41971d1c,2025-04-29T20:15:22.233000 CVE-2022-43144,0,0,b4d526f2c0777c15dfcdb374db47406c2f99a3af19d967e0e1257848d30d33f4,2024-11-21T07:25:59.257000 @@ -209071,7 +209071,7 @@ CVE-2022-43260,0,0,139ca2a9a2d88cba30f26ee4b3a8afe3fc614054494f5f4e6a85395191485 CVE-2022-43262,0,0,55f3db277bbf6eaa0e5e0213370d29569be7bc222a4343b6121ba179660ab36f,2024-11-21T07:26:09.607000 CVE-2022-43263,0,0,014b02278bbbb59cdfe810c13f79f779dbf207a8012f571d2cefe05c926a3648,2024-11-21T07:26:09.797000 CVE-2022-43264,0,0,4c8e1ed324141446e024a1fd0f2442853b99c35602ba83eb3a828c34fd0c6b64,2024-11-21T07:26:09.960000 -CVE-2022-43265,0,0,2b87d23decda6a7a1131f68b2d00d581895ea446955d9b9c0f8223514790c67e,2024-11-21T07:26:10.140000 +CVE-2022-43265,0,1,0ee087bea9ec0a8585a1e2ff03030d961138867fcecdc302885ba3466e603094,2025-04-30T15:15:58.230000 CVE-2022-4327,0,0,d690c3d80749145d53b9bf27d9c3b8414a5bd992f5d9b0dbe48f6aab923a6f00,2023-11-07T03:57:33.320000 CVE-2022-43271,0,0,63219fad6f7b47f5fe0dec5db6b7ebfffacb419ff76128afed582232d3348bbf,2025-04-15T16:15:20.610000 CVE-2022-43272,0,0,2afda374589c1f08a0356af2423410bcd88347c3fcb947a3aa7396370cad39c8,2024-11-21T07:26:10.477000 @@ -209102,7 +209102,7 @@ CVE-2022-43303,0,0,6dd3ebc2e2bd8693b72f3d334b5d67ef6b02159323aafbfb5ba42a79e9f51 CVE-2022-43304,0,0,d05c09f1096911c2e5d84ce310bee532b41d87ba2a6aa94adfb15c981d5dae53,2024-11-21T07:26:14.283000 CVE-2022-43305,0,0,12c27bf76a3d51e933d67b2c21d011066d54bef11315e21d3959af0ec4462ec7,2024-11-21T07:26:14.430000 CVE-2022-43306,0,0,daa702927085118174c9cf30f54cfa5109f225e65533a274b75cecccec70508b,2024-11-21T07:26:14.587000 -CVE-2022-43308,0,0,a3c32d5f52554878946f0e8e173050faa4c314234b1af4d9eb5b16ebf4a896c5,2024-11-21T07:26:14.757000 +CVE-2022-43308,0,1,b94a0ef725d0e1e039b30468f5be77191d0ac3679ceee6c0d2ea1cef17c69a61,2025-04-30T14:15:25.927000 CVE-2022-43309,0,0,25335bc44ff0eaaf094c1babc3cc34e726365ea079646d7153cb7f44379d21bc,2025-02-11T21:15:09.697000 CVE-2022-4331,0,0,324c3e522222b33aaeb07e99c338d86895ba38dd3746448869cd7624cb0108c3,2025-02-28T18:15:25.947000 CVE-2022-43310,0,0,ccc191578241357ed39d1d7217e9ce9b105d084e09c97025bcc9eaacd64cc88e,2024-11-21T07:26:15.830000 @@ -209440,7 +209440,7 @@ CVE-2022-4367,0,0,2ecfe9487260e4fbbc938ed964d8882de4bc06b4d92d8d90e5e1dc94d9481d CVE-2022-43670,0,0,cf0124eb89ba75d1963b082c42653c894876b5cfc18cc82aa1497ee9e375b859,2024-11-21T07:27:00.633000 CVE-2022-43671,0,0,b37221a5fd014d55b591300a7ad3ab9eed2337b918e298bcb5432b96e2827b3e,2024-11-21T07:27:00.770000 CVE-2022-43672,0,0,35b42d1f55c34ba43680097f5089bbd5e105885eee6ce751e6039683380ebbee,2024-11-21T07:27:00.930000 -CVE-2022-43673,0,0,ff29f184a6136bbd367a91b1a5291d1af24f95648331d6831e652d2383665816,2024-11-21T07:27:01.090000 +CVE-2022-43673,0,1,c719d346303e4c5ca037f36ce523db143e84651cfde2eb5975c3166e63f52038,2025-04-30T14:15:26.123000 CVE-2022-43675,0,0,80ab6c34f00d25d42f79a1f34e98529368b7e07007d03a00563f96750ebf540d,2024-11-21T07:27:01.253000 CVE-2022-43677,0,0,64aff65a74e27acd0bceca2930f64d60e62dbcc9be739ae554e0b342381eb1fb,2024-11-21T07:27:01.420000 CVE-2022-43679,0,0,7a76485b402f05d7f1a9b6898737b65ebbc27f92b1048839fef24c5e170c6762,2024-11-21T07:27:01.600000 @@ -209457,8 +209457,8 @@ CVE-2022-4369,0,0,189be51bee57df8453a6191b23d8cb4a4a7bae56cca443010d0efeaa3a3e43 CVE-2022-43690,0,0,89400296d647e6f20853cf32eab1bcb82371a6c2d8f551ea6751034ec22d29b3,2024-11-21T07:27:03.190000 CVE-2022-43691,0,0,8c52974bf0445d4d479a5f39460d118e27999df529504c564a40d7154f5c253c,2024-11-21T07:27:03.350000 CVE-2022-43692,0,0,1a1c8b3939595f5c4d6b33ad14cb150e721d94cbdde1f60dc017eb270c3232a0,2024-11-21T07:27:03.513000 -CVE-2022-43693,0,0,073cee6eb36a5da549b6a6c378a43855189166233e5f4a93ea84dbcddaf8f62b,2024-11-21T07:27:03.677000 -CVE-2022-43694,0,0,6f8fdc2bf1194d6aba7892a5175315c9303d4dfd9ac079545cb8c15aff7cc5c8,2024-11-21T07:27:03.840000 +CVE-2022-43693,0,1,f3c0e5bf67f12dd41f071a37be336c23b9c4392a9ff72f418e2f501a73a021ae,2025-04-30T15:15:58.473000 +CVE-2022-43694,0,1,54b85223f6afebc9dbc88e2b8b9af432f3ada4ebd24957abba9b10133af70cfe,2025-04-30T15:15:58.720000 CVE-2022-43695,0,0,293d53e20c59cab27ffb6472a0f3193409c1efc1243a6e9d93a007235f6427a4,2024-11-21T07:27:04.013000 CVE-2022-43696,0,0,1c9318af86f3e9f799b8c0dc1d01215131459e618231a94eb59c856045ac23eb,2025-02-06T16:15:30.750000 CVE-2022-43697,0,0,0eb27bbcc4d67b58bef62bd1307848241191f4dd4aea2df6833a2ac157b87576,2025-02-06T21:15:17.633000 @@ -209713,9 +209713,9 @@ CVE-2022-4400,0,0,9d4cfb592ba893bedee7b3ac66c5190c96977f219ffb228c2acad620bb068c CVE-2022-44000,0,0,1cc26be500407e4f3ae3ed97d83d2ffe6885c9a39c0c935251b4f3f6d8f791ba,2024-11-21T07:27:29.983000 CVE-2022-44001,0,0,bb5457e32199bf9d8dc0b48e7f59d55c2881e3bea29c6254adfa3e876e2967e6,2025-04-29T15:15:50.707000 CVE-2022-44002,0,0,904d1fe1e7554ef92e30410d7865c5f0c05f196240e543cd6701bfb938b7d40c,2024-11-21T07:27:30.283000 -CVE-2022-44003,0,0,12d95f101e48d8e51fad8c4c268b2369b3cdd00baf4bb25fe897d6e0310b8fee,2024-11-21T07:27:30.427000 -CVE-2022-44004,0,0,487400f23b585b129df183c8651662267d7bc70f3e8fb493c9091f5a97a6c8d1,2024-11-21T07:27:30.573000 -CVE-2022-44005,0,0,c65533f679a6c99e01432945b2ecbc0f2a6b926469a732422b940171e5dc192c,2024-11-21T07:27:30.717000 +CVE-2022-44003,0,1,9386cefa276cfad553577a8e457101870222b10176892193e525843693a2ad8e,2025-04-30T14:15:26.320000 +CVE-2022-44004,0,1,bc555306f3b135a50ba87daf817468ce11d8b964b20f89bea0981b74f8f8833f,2025-04-30T14:15:26.520000 +CVE-2022-44005,0,1,533fc5a4625abad34d20ce084adc2a651d385a436a8c6314cc0e2ef9fc947464,2025-04-30T14:15:26.717000 CVE-2022-44006,0,0,077a99bc29163efa6523809b9125ef0144d55c0ea6d0b95ad6b62e42aaf7e131,2024-11-21T07:27:30.850000 CVE-2022-44007,0,0,4f38e4dc1b43a6564091da469008f51973e1195684cda36ef5c9412569390b35,2025-04-29T21:15:49.783000 CVE-2022-44008,0,0,433f137006b5b79169872d32d53ca6d21d2d9d35059d9e0b8fcf9412a069546f,2024-11-21T07:27:31.137000 @@ -209826,7 +209826,7 @@ CVE-2022-44199,0,0,78b32d1916bdc46161f183f2e0cbe53725d0bcd110c6dce1a1da49ef000ae CVE-2022-44200,0,0,6c5510828dbcbbc145e751d8ebfd59147d993f5f4537f549452ae796c1360111,2025-04-29T04:15:28.823000 CVE-2022-44201,0,0,99a920e96d3e2b4f2bb057988f720392d4dc50e2840d3acd611ca6c79469ea5d,2025-04-29T04:15:29.437000 CVE-2022-44202,0,0,23daa1372111fbb9524b60cdac1de1aef798d27470ad7cf2df95f958a56041b0,2025-04-29T20:15:23.290000 -CVE-2022-44204,0,0,968a0ed7c6fb879979bec65a76cbcc897aa40c57f5c5c25489c059f9e2df24a6,2024-11-21T07:27:45.053000 +CVE-2022-44204,0,1,25d5c89b5c9d64cdac427c7ecf3976b9da90a4ecb75c2e91eb29d3781f949471,2025-04-30T14:15:26.907000 CVE-2022-4421,0,0,805b2d0499816258e8b83aa7debba6c78459f94d28cb0b24797dd20e11e51b9a,2024-11-21T07:35:14.110000 CVE-2022-44211,0,0,a6fb5987feafa1f5c695d0edcb2f84fd71923e85c0fb60885e68baa59f5ce3d3,2025-04-24T18:15:19.183000 CVE-2022-44212,0,0,5023993b83d209aacc12baa66f516084356ec83a6c75b45d2e4dac1f3958f422,2025-04-24T18:15:19.380000 @@ -209918,7 +209918,7 @@ CVE-2022-4437,0,0,10aae8553953fda46b9a78d397e2c53ffbe24e7259909a5bf2168d3d5191c6 CVE-2022-44370,0,0,f4e16b34f6af07c0f639267317406f0d47d22b553c04017ee06c22c15666b13c,2024-11-21T07:27:56.220000 CVE-2022-44371,0,0,8764443fb004b13e9f6ecca29e678408b858a6227fbe8e21e4759f842ae1d336,2025-04-23T14:15:23.333000 CVE-2022-44373,0,0,eb0fc8fb06a7ba3c76b5dec82db3df66428056f66d6a00764c87cd18c2889ee8,2025-04-23T14:15:23.517000 -CVE-2022-44378,0,0,e154b0a711240813b022f487e9fb8849bb14f762d583084373e5b0982a813edb,2024-11-21T07:27:56.650000 +CVE-2022-44378,0,1,c3e35b488f5307204672ef94697d88a949a056f03dc51892eaea3923b61e3e3e,2025-04-30T14:15:27.430000 CVE-2022-44379,0,0,84900714b862824db20a17239e0bb32daec84bacdee2b7c6aa11c6fc779f9aff,2025-04-29T19:15:52.057000 CVE-2022-4438,0,0,01a8c55413bf44231b91007a4a9fba71d74f3071782fc299ece34ef0621107b7,2024-11-21T07:35:15.770000 CVE-2022-44380,0,0,d351aaf3ec06429312590456e619ba9c085c0c996ae982a9a0f32f7df13d46ba,2025-04-15T14:15:35.050000 @@ -210406,7 +210406,7 @@ CVE-2022-45128,0,0,908d4cef3456a3fe5c729291f04d4cd21b2dea47b1e5f3f07467da58aabe0 CVE-2022-45129,0,0,9030ac2ebc68734e4da469d863bb50bc8c26c5790ed2f78fd2683f9be5b0e0c6,2024-11-21T07:28:48.863000 CVE-2022-4513,0,0,0b5b5c4c5b735f2a974d07454579947c4d6ba1ed39abe1c5c55228e4f332fce7,2024-11-21T07:35:24.770000 CVE-2022-45130,0,0,cacfae99d9b586dcec18f5c9f304eb626685ab33619b983eba21cef0962b5a7f,2024-11-21T07:28:49.017000 -CVE-2022-45132,0,0,09bbbc3480209adc2e480c55919163bf52038654f40203af46b5e0545d773588,2024-11-21T07:28:49.160000 +CVE-2022-45132,0,1,8405dd17892248ba8fc5cbba5b53230b59644fd35ad4423d03d634073b5b3038,2025-04-30T15:15:58.903000 CVE-2022-45135,0,0,6b748f0ebebf797786717aa2bff608b8889dec057a59be4215578ae83fbb5c9d,2025-02-13T17:15:47.170000 CVE-2022-45136,0,0,244a384320355af72f139abecaa61d966f0db7c54fd5863278294b5f2a8cab07,2024-11-21T07:28:49.510000 CVE-2022-45137,0,0,8504ab807759f70618f74e32c1364cc953667ff66d9402b76876fa8e44ecbc4c,2024-11-21T07:28:49.723000 @@ -210432,7 +210432,7 @@ CVE-2022-45154,0,0,f6a456d92e0c2687c1b23662c4039cfb6f45a1636cbacfc1ef4c78546c35c CVE-2022-45155,0,0,d0f03d4e402db3811f534d24b44ae31995397e31a4e0f4971aca9efdffb19c6c,2024-11-21T07:28:51.967000 CVE-2022-45157,0,0,243140b9c1cdefa2ae4db1de4076cb46aed5526d5c1560ba226b484226718a0b,2024-11-13T17:01:16.850000 CVE-2022-4516,0,0,e91ea5be617d8d1653712140a020bcacbe9abef83b454eaba5e38eccb26bf96b,2023-11-07T03:58:02.840000 -CVE-2022-45163,0,0,80cedcffa8e94c18c3961209db4892e467a53c6c86ed2e2d5785db9c172ac4d7,2024-11-21T07:28:52.180000 +CVE-2022-45163,0,1,78a35f3c5deb1f9831e24803c5556f259e4f1635e2b5115bedccc0c7bc392a9b,2025-04-30T15:15:59.090000 CVE-2022-45164,0,0,8ee37e4770a40bb859ddac3c494e5a6065453d5bd2266fa787a4f797ca837338,2025-04-09T16:15:20.687000 CVE-2022-45165,0,0,e29651141666abeb6694b681dc9dea263b8b715930be47579c71855b695f1fb8,2025-04-09T16:15:20.870000 CVE-2022-45166,0,0,c98e55a313c609d34bbcbf2b4013fb4532192d83a1b653d9060df6d2600831fb,2025-04-09T16:15:21.047000 @@ -210566,10 +210566,10 @@ CVE-2022-45377,0,0,12ff570f8446adf412a920c461671c0d25d119cabe090ae5cf9a32a2a2153 CVE-2022-45378,0,0,28d45c0b36ea8bab78873942c1ccae9a48f0dbfb8e1ccb627e12798cdfecadfd,2024-11-21T07:29:08.787000 CVE-2022-45379,0,0,690ebcc56f8b7eaa2c5dcff6f5354fe13a16af64e2360df4a5edd6637a557996,2024-11-21T07:29:08.990000 CVE-2022-4538,0,0,855a51b3d4a66eb406c807788dc068468320fbb4549a4793d6e9b8d3c243d169,2024-08-30T21:15:14.340000 -CVE-2022-45380,0,0,acf27f218498f24d243d90e91926bd7c93dbb9af60fdd5b6501c58d3575d0d95,2024-11-21T07:29:09.103000 -CVE-2022-45381,0,0,c8b38082add94cbeeaca315ab04b0c59a22ef760117ce13362c36a761f2609d5,2024-11-21T07:29:09.217000 -CVE-2022-45382,0,0,0db8eec1baae6a7006d509e1ccf4a8f96d5cbc442a03ac2490498a984113fc8d,2024-11-21T07:29:09.340000 -CVE-2022-45383,0,0,3ae0a707e28d97e77b8cfecca31fe662595009673657c4c2eeb73bad85b6ccc8,2024-11-21T07:29:09.450000 +CVE-2022-45380,0,1,9e73fa4c45dce350fb24ced12a94fad3f96910af3a75bcf3e5906025ce1cfbda,2025-04-30T15:15:59.297000 +CVE-2022-45381,0,1,b9bb6707eba2f8523b954b53de75dc724750ff66ed1970ea136d47cf0296afed,2025-04-30T15:15:59.470000 +CVE-2022-45382,0,1,ce9bb5cdb7b31fc80834f1861885934ad04dae7032d9aa35443e1679adb9ce8d,2025-04-30T14:15:27.683000 +CVE-2022-45383,0,1,ecc973fa8fc0e822f72c98ca1c76f2e7a6ad2ce8b1b6984766398ac18392e550,2025-04-30T14:15:27.883000 CVE-2022-45384,0,0,a59671e099726c5bafb219c3b0e8516fbeeda1908b74bbd1895b8cc0c3c9b9f2,2024-11-21T07:29:09.570000 CVE-2022-45385,0,0,cecac9a37c50f89a1927ae9e8114fcaa851974d8aa1c2949ff60b4c0d5398ad7,2024-11-21T07:29:09.690000 CVE-2022-45386,0,0,012b5cafea7be290d36fb7d5fae24188010f6aeb27c5a86978c44ae70016a1b2,2024-11-21T07:29:09.813000 @@ -210660,7 +210660,7 @@ CVE-2022-4547,0,0,07613f52bc490b06815bd631c31a1325f69c8bbd4a4c6629d352538c8682ef CVE-2022-45470,0,0,80566dceac7a6cec6734ac1bb3128dbc6b7a57cb0e527f8e974f3e0987e2e15c,2025-04-29T14:15:27.557000 CVE-2022-45471,0,0,559a6e87408c334e4456c48307db55502b98bc2d1450613e64712caf20994238,2024-11-21T07:29:18.520000 CVE-2022-45472,0,0,21957b961a2b40f75b3b33b39845961d374085e4c6d52e2e3df939569be290a8,2025-04-25T19:15:47.447000 -CVE-2022-45473,0,0,950e04aa97a1f2a1b81a40a1e88bed2d0f055b87af1fec2d92866f355f6e6629,2024-11-21T07:29:18.763000 +CVE-2022-45473,0,1,4f4424fb7f4972642624458c823341323f1cf0ca66bd1beeff451e42f421c785,2025-04-30T15:15:59.640000 CVE-2022-45474,0,0,0fad0eee4a1b0a69698057dca62119b05e9cc4a20a282bda1fb9d26bb7d17e91,2025-04-29T19:15:53.150000 CVE-2022-45475,0,0,c0e6bb9934d5d03ca39fa1e399952b5a10260dd300dc1ed11357f59775084fa0,2025-04-29T14:15:27.767000 CVE-2022-45476,0,0,d4fdafe941b37e25ef536e24a579a780d65470e38d4bae2d6e494d4792027e68,2025-04-29T14:15:27.947000 @@ -218222,9 +218222,9 @@ CVE-2023-22507,0,0,03c2d0327d622fb695996120e3c81ffc89aa1ff695929971e8f15868d4423 CVE-2023-22508,0,0,025a8b6686fac397e0be875d3eff08947330e24a2741d8f677d0048a66c887c7,2024-11-21T07:44:57.507000 CVE-2023-2251,0,0,7074e1cc6f181fe6e60c053fdd1b25d246d4630a51626bbe6a34476d29827815,2024-11-21T07:58:14.463000 CVE-2023-22510,0,0,38d30730c5e8469e4213ddc4af4d979fe2b3cf6dc59d9fd49be1de40d36686cc,2024-01-16T18:15:09.080000 -CVE-2023-22512,0,0,6a74bb633686adcac6e159af825162cfc856a649953622709b588304601ebb56,2025-03-17T23:15:16.143000 +CVE-2023-22512,0,1,5328709d331daf75fec34a61ccd1a6974f61b481fcd4ff925551e97a93597bee,2025-04-30T13:34:35.110000 CVE-2023-22513,0,0,d1d5d1b202ce20d05345e39cea416a9fec7a297999b594a85af13f30835d0912,2025-03-06T16:15:40.103000 -CVE-2023-22514,0,0,b7c001e8da633bf3b1bda94548a00403e104d2318c09bd15970cf4abd2ebcd46,2025-03-18T17:15:39.890000 +CVE-2023-22514,0,1,121ac3adb7a4a500a2f4b8a9378df185915b1f4c711c18d5c384d7a1b963f351,2025-04-30T15:48:04.253000 CVE-2023-22515,0,0,e1b3a5c24dec069d33c73f20bc1e55691c01a674db9c1c72e0df3398fa55e1d8,2025-02-09T20:49:55.073000 CVE-2023-22516,0,0,001864230f9bc370fdca0f79ab8ffe9d7082f111d6a1d9cf3af59d82a0bf4574,2024-11-21T07:44:58.067000 CVE-2023-22518,0,0,ffd5fb533725d5d514e6c5e19fe2c7a3ae793b884c40ee98301804be4b645b91,2025-02-10T17:57:38.567000 @@ -241966,7 +241966,7 @@ CVE-2023-5478,0,0,cc7b80d1b8bb417dbded88cc2ac5f6a8850fd874b0a11d9c4e4dbe5191289d CVE-2023-5479,0,0,e5cf8e214ced58ee69b13fef527a65865cd669b2cd1afde07fc5b19bcbf70e48,2024-11-21T08:41:51.330000 CVE-2023-5480,0,0,991cde8e23a35d0eac260a31da71a6b79eef0dcf05d2ff3944f6e4f5727972be,2024-11-21T08:41:51.460000 CVE-2023-5481,0,0,a5f2c0d2cd62e8c2f272fce0769f4a06768270d43a5ae78740799c92a6b6077d,2024-11-21T08:41:51.627000 -CVE-2023-5482,0,0,c3fcd1543c08d00a0698f7a4724de16ec18ace042db3d7df8334b3d25c28d75f,2024-11-21T08:41:51.757000 +CVE-2023-5482,0,1,6a1350c1e98519b3a4979d50f7684f1a30d5742df30cdfc8549df87c24c4e65e,2025-04-30T15:15:59.840000 CVE-2023-5483,0,0,490e8e86b5b0f78e250b41cbcce340e1b85be79bef46ab8d787901b2c1aaba02,2024-11-21T08:41:51.903000 CVE-2023-5484,0,0,bbd99d000bf5d6ee4b36729de9808242de9eca42175ae849236f74ebb5fde667,2024-11-21T08:41:52.037000 CVE-2023-5485,0,0,4313b9587aed62c528dcab253c0433e836c67e4113342b1a9b2920d7e4969960,2024-11-21T08:41:52.180000 @@ -245833,7 +245833,7 @@ CVE-2024-11295,0,0,daf1e87bfad04e12bfa7ad18000186885dfa1c89e1d5fad04ebfd1bc4aed9 CVE-2024-11296,0,0,fb7d94da02b5205207d7d82f7728d17cf0d45360472acb20ff8132fc89a748af,2024-11-22T23:15:04.507000 CVE-2024-11297,0,0,71ce10fedec1c85ff215a977a1373e8d6c96e84b0bccc7f200797c8573787df1,2024-12-20T16:15:22.107000 CVE-2024-11298,0,0,cd8027ff7c1e39b70cf43f7d5a6cec3a72565a042c79fb93ed3ff58ccba5dece,2024-11-22T23:15:04.983000 -CVE-2024-11299,0,0,2942989cdf2a97ce37af0c2838dcf9e27f09fdabfdbdcd20dbeb8376bfcb99bb,2025-04-23T14:08:13.383000 +CVE-2024-11299,0,1,5b4394fe2aa80862409246ed4c3feac26c1712c3bcb574f58a66e2a4a1c6972d,2025-04-30T14:52:15.387000 CVE-2024-1130,0,0,679ee2f34d13ebb9df2fe1e2f1252066bb0e47c7a2921656bbd7730c6eaa121e,2025-01-15T17:29:06.433000 CVE-2024-11300,0,0,17e6044959868c1f0bfbb5c535147bb16853bb47032cabda2a83334d5515df63,2025-04-01T20:35:24.003000 CVE-2024-11301,0,0,6bc5810ef3e816290502217a0822b9a4fd42d48506ddfb4141c56c52ed5d3d4a,2025-03-20T10:15:24.890000 @@ -249223,7 +249223,7 @@ CVE-2024-20255,0,0,e3893ccf83602ff30abb45ccea127011a5ad84f562261a62f48d79a8f76d5 CVE-2024-20256,0,0,6e580ac63179c214f79133f9a48010102f34cfd65db764de14a2f9830976ed12,2024-11-21T08:52:07.503000 CVE-2024-20257,0,0,0296dfa4c15085dd97997fb62b70023a7b7e5509962b5093125b435ed3825923,2024-11-21T08:52:07.650000 CVE-2024-20258,0,0,7a16291e32c5eb8359e34c7f1f4a84cd294d806210858b4ddbc89ddde444b70d,2024-11-21T08:52:07.790000 -CVE-2024-20259,0,0,b60cd10eb78028600144229d7ab9bbb47c32c24be1bdfa9ec30c426346f5359a,2024-11-21T08:52:07.937000 +CVE-2024-20259,0,1,a790d96a8c6f2732364178c15af85bd16997f4c2c36f94815e261fb3ccd446d7,2025-04-30T15:19:23.213000 CVE-2024-2026,0,0,dede1d92cd93017365b387602839e9d76944a6d83a5aa48a597c0c4043de04a5,2024-11-21T09:08:52.090000 CVE-2024-20260,0,0,6c723ab8833ea7a01f46fffd704be928a7d802c1c187406a0ffeed6e65e3caf6,2024-10-25T12:56:36.827000 CVE-2024-20261,0,0,b49af53e0d46b7dbe081123492f99281d6a77ef6ef1b33af41c98c1fa32a1c7f,2024-11-21T08:52:08.300000 @@ -249258,7 +249258,7 @@ CVE-2024-20287,0,0,f59e167771c566ea49a772716721cd0bee31092f0381b7acc8ce94fb9f699 CVE-2024-20289,0,0,5a41bc3598f1aaec7151598e1fa9b8bdf8e15887462c2c995bc9a053cd9eb195,2024-08-29T13:25:27.537000 CVE-2024-2029,0,0,b4ec0fb87b25dbda385a151f4a9390a5913fdb85d70aeda457cf530e66ab8d7c,2024-11-21T09:08:52.600000 CVE-2024-20290,0,0,0babbf7a7f9d2f4798677a463b58b8e44a6aa9038067184cbb9fb6075566f6d6,2024-11-21T08:52:14.023000 -CVE-2024-20291,0,0,974803ac7c85a30d4018d18fd6cfbc1e50a0ca7e8daf5c84f30c984d75dc52ca,2024-11-21T08:52:14.173000 +CVE-2024-20291,0,1,59ff9914e00ba70d378e9646932dbac6ba049dd21ac447470d3ac7206424035e,2025-04-30T14:15:10.367000 CVE-2024-20292,0,0,2ae4b2a0092af513b2a969df74bc0e8de5c71055687517b95ced80ad1ccc2c0d,2025-03-24T13:56:44.540000 CVE-2024-20293,0,0,699e1ee34bc0f92d31d8dc082f608b5ec46fd158fcf8f4fea9b6469de92ce39e,2024-11-21T08:52:14.410000 CVE-2024-20294,0,0,d35a73058b7d3c68de70ca0ece261bc77713ae529012bd3ea6a14a431f4e0abf,2024-11-21T08:52:14.550000 @@ -249316,7 +249316,7 @@ CVE-2024-20341,0,0,9651f6f38501301c3bd30b4b19b07df359bcab6057dd117ec8a01cdc718cf CVE-2024-20342,0,0,eb1806cb116ea10d26bc07727e16c89c1044a495927bbc73bf967ad54f284ddc,2025-01-13T18:15:17.057000 CVE-2024-20343,0,0,e801b24910791de89ac056a612768d12f67c1a71b10adf39fbb30483542cf9c3,2024-10-07T17:42:40.777000 CVE-2024-20344,0,0,ba0790bcab4abd6157c437f510281a8bc5f968273a90f35e5753f323a29b65ca,2024-11-21T08:52:25.117000 -CVE-2024-20345,0,0,439e067522e70cbb9285e37c98671fd802e2ce824b3d37f61cfea7b8f1fe7f5a,2024-11-21T08:52:25.243000 +CVE-2024-20345,0,1,c04679c19653230ae7ffe632f4be071aa240558096e489a8a456ff4745395fee,2025-04-30T14:16:08.823000 CVE-2024-20346,0,0,80a231653731820eb812f047efc0bb1fd76ea9c02656ba45ca12552003770e1c,2024-11-21T08:52:25.453000 CVE-2024-20347,0,0,3565ce4dd352d6fa29dcb4b8546bbc636a9805e464d723eb5c9080e89a1931db,2025-04-11T15:47:24.267000 CVE-2024-20348,0,0,262a0c337ddd21940bbf83400ce48ed5e0e755d52c9785e1c3b1b394aa3e7f8c,2024-11-21T08:52:25.713000 @@ -250561,7 +250561,7 @@ CVE-2024-21677,0,0,b5fb81334d929ae4e0397cb8da924f1ad13fdd6ba9e99f93060a1b9d758ae CVE-2024-21678,0,0,de0bfe83eb9b0a3d9a232ae0fdbb876adc0e4e74ded929e735ea965a744e60bc,2024-11-21T08:54:51.023000 CVE-2024-21679,0,0,2048f2c30821e4fc7f65b5afa24a1dc9e951f3f1b6500cadc21e31d98886d595,2025-01-01T00:15:07.267000 CVE-2024-2168,0,0,3a446281083107f8135ac556f6c8d1f0e6649d8dade7a1d9bf5aa463a4effe95,2025-02-18T16:14:41.327000 -CVE-2024-21682,0,0,4e41c325c8cac12f335327d6be7cfbbe9f984df74bf20fe06407f95b49c703ba,2024-11-21T08:54:51.163000 +CVE-2024-21682,0,1,c7f32948c12fbc80334c1afc014f9b6417fdfd95a7e37f2ce8c6c690033917e2,2025-04-30T14:06:22.117000 CVE-2024-21683,0,0,940cf0d1296523f16d6a39c0e79860b394b8429e7f4d80ebc90cf15feb6b8bd4,2025-04-10T19:54:01.040000 CVE-2024-21684,0,0,4b2333e2512707190c29988a522c4ec0439292c692042fe9b25ab7fda6a4930b,2024-11-21T08:54:51.503000 CVE-2024-21685,0,0,346bc4b5792cb2032fa2d12dece43f65235af6cb4059de4b308aa50e2caa89a3,2025-03-17T15:15:40.387000 @@ -254449,7 +254449,7 @@ CVE-2024-26867,0,0,3ce562417006387f6f353e4f1dc0629cc5bbe7c470101cd8697f401dae548 CVE-2024-26868,0,0,470780f3eedbe54e0715c09aacacd15d602e690928f9f1f3cc056aa7f149c140,2025-01-14T14:45:52.020000 CVE-2024-26869,0,0,02922038ad2af42246888c4202e00a6e69990dd39e8a7ee4b0bde6c82bbc6099,2024-11-21T09:03:15.370000 CVE-2024-2687,0,0,62264952bbc7e2ac7aeacc137d3d21488d3071e44515c99fa1f3e90270b3f0b2,2025-02-21T16:30:17.263000 -CVE-2024-26870,0,0,776241d886b8b967d554fc3121407efd0d0555c5d6daeb1512358d000ca9a5ae,2024-11-21T09:03:15.490000 +CVE-2024-26870,0,1,66461b9673c6b2716a8909f607a9a1c982e2fb2a2fe5c61a836062a57320b848,2025-04-30T14:24:09.883000 CVE-2024-26871,0,0,869aa89d9c16dccb1fc19ae6f3deafd10c976839580428434667c5b886257213,2025-01-14T14:46:37.293000 CVE-2024-26872,0,0,b3f0785a1094eb7c52be9a86333fc5c90cb8793ff5f3ce4ab87f73bd4861315b,2025-03-04T15:51:23.360000 CVE-2024-26873,0,0,65d9833100a12a05ec6dd2cea519a8e619a52464806ebff7909cd8d25bbed206,2025-01-10T18:28:25.100000 @@ -255103,13 +255103,13 @@ CVE-2024-27561,0,0,fc16f92d17651bc7c1c4e9050d562b06f5135d4a3f335b425cd240bae1399 CVE-2024-27563,0,0,5533c243cccd53d02317f51d488d5c114a766a4a03a83659e29f733a18ae8237,2025-01-21T15:08:45.213000 CVE-2024-27564,0,0,e91219478d8b2c2aff51f0a7bd341b7f0fb0cc52077d3e34e633b49f9d664e20,2025-03-20T15:15:41.543000 CVE-2024-27565,0,0,a3b38ad3cbec062b28bbaa8b020ffb17a64d4ab23e3a1af71e103df51fce5c55,2025-01-21T15:11:29.370000 -CVE-2024-27567,0,1,657d583e4bf717cbd446c99d9464cf362560078109f21bcf791ee78fc86cd7d8,2025-04-30T11:24:35.913000 -CVE-2024-27568,0,1,63eaff0d823d4aa90bd90229f4b7910e21410a2b51ca2379a4f3a541dfc25fb9,2025-04-30T11:25:24.113000 -CVE-2024-27569,0,1,fdaf19b4684f0f321f2de3c1f992482f70a557e984ccc2a3178e60f53059d59a,2025-04-30T11:25:47.437000 +CVE-2024-27567,0,0,657d583e4bf717cbd446c99d9464cf362560078109f21bcf791ee78fc86cd7d8,2025-04-30T11:24:35.913000 +CVE-2024-27568,0,0,63eaff0d823d4aa90bd90229f4b7910e21410a2b51ca2379a4f3a541dfc25fb9,2025-04-30T11:25:24.113000 +CVE-2024-27569,0,0,fdaf19b4684f0f321f2de3c1f992482f70a557e984ccc2a3178e60f53059d59a,2025-04-30T11:25:47.437000 CVE-2024-2757,0,0,b6a58696e8d78b44d11f214bd59212dee93b29323cf80730dfa63c3675a6e16c,2025-02-13T18:17:57.187000 -CVE-2024-27570,0,0,c44a55b067208addadad955f2c5db94e9753aa69ffa8333feeae68fe65e998fc,2025-03-14T01:15:38.783000 -CVE-2024-27571,0,1,39e1e124c341cd4168ecf30639dd3480a51a059e81cfe3db5f24cbe80da90c31,2025-04-30T11:26:03.620000 -CVE-2024-27572,0,1,3a11639b43d227027e00f6fc3f89aff940a03f6cf64d2cfc8ceb3a3dd996a32c,2025-04-30T11:26:49.620000 +CVE-2024-27570,0,1,72f871072cefa14795fcbd8ed71fa06ea099793a5f0662fed017971896a4507b,2025-04-30T12:25:03.213000 +CVE-2024-27571,0,0,39e1e124c341cd4168ecf30639dd3480a51a059e81cfe3db5f24cbe80da90c31,2025-04-30T11:26:03.620000 +CVE-2024-27572,0,0,3a11639b43d227027e00f6fc3f89aff940a03f6cf64d2cfc8ceb3a3dd996a32c,2025-04-30T11:26:49.620000 CVE-2024-27574,0,0,1ed2792d66dba95eaf1291cd1f79efcac416f4905846dac9ed130d5eee0c5e62,2024-11-21T09:04:46.483000 CVE-2024-27575,0,0,c6c51e5ffbe8a47b581795b30fd037904da94b8aa82eb6eefa43d6fc895baf4f,2024-11-21T09:04:46.687000 CVE-2024-2758,0,0,3750812ffd0bc2f74afa8a930d62773b666d568dbe350389af15f011876a0c16,2024-11-21T09:10:26.913000 @@ -271678,7 +271678,7 @@ CVE-2024-49553,0,0,eb55870165fda3571b7ba6c0913cad8b831c7cff4c74e1be9ab313aaf34a7 CVE-2024-49554,0,0,9fed37ff04eac9a74771214a2591c8062f71b41f5a61981624c0ed7a40fac3e2,2024-12-18T14:44:39.800000 CVE-2024-49557,0,0,6601a96c4bc210f01d32593bfa488dfcd4eaf5855ed8b64d0dab8c422cb09b1a,2024-11-15T17:36:47.110000 CVE-2024-49558,0,0,d6190c4fa083ad35fb776a8089e14895ccaced89c942fbc8e925117ea666e076,2024-11-15T17:35:54.480000 -CVE-2024-49559,0,0,d2c813fb740ca15f163ea919d5f80ff773b3e66899f163e76b5b13214dd7feff,2025-03-17T18:15:20.033000 +CVE-2024-49559,0,1,c9f99cd65622b1eab96771f64f0c9193f69cfbcd0c1ae00774d11ec2348e3c83,2025-04-30T14:30:13.570000 CVE-2024-4956,0,0,b59f0fa653d583ff50139b3494916619d3242eed1a7ae59aab01da9b6e8c6c91,2024-11-21T09:43:56.520000 CVE-2024-49560,0,0,3f26500c4dded44eae4dc46589e64362e416f55913f19fef12f4ea5a50ab24a4,2024-11-15T17:35:25.407000 CVE-2024-49561,0,0,1b32846a009c403b581ef70cd7919967c62d38ba68386993b5ed55b52ed1e315,2025-03-17T18:15:20.270000 @@ -276396,7 +276396,7 @@ CVE-2024-5638,0,0,4a64496852c4ee147220588b5d1940917ce749a1b3dd56d16a77a8cf3ed54b CVE-2024-5639,0,0,78123d59d6ff1062d5cdcc1456c84b89eb240e57bd822aee818d4edc5bb804e5,2024-11-21T09:48:04.290000 CVE-2024-5640,0,0,01c62801966d56f9308a985efd017779bd36dfe950ad675d920936fb65a56c1f,2024-11-21T09:48:04.440000 CVE-2024-56404,0,0,0922979315c1e629cdb1fe6a847df3905e5c41f9b68e7cd17dbd9ff65fcb7683,2025-01-24T18:15:31.883000 -CVE-2024-56406,0,0,f1cc3d42e81cbf110160280cdcf4b414f213606556a1ede59e4af760c0150594,2025-04-18T17:15:34.370000 +CVE-2024-56406,0,1,3736e40c34e7074492674a4d40557cb77a7681e91f82262e88c19c2f994a5ef0,2025-04-30T15:21:11.547000 CVE-2024-56408,0,0,979f73a5c009249e5cb4971cd41bf7cb915a3c3ec727bc94130c88ad7cfbdaf9,2025-04-21T16:58:23.370000 CVE-2024-56409,0,0,94a67396b70c78b5d8549b6f98daacbf997b17c3314963d8b6dec3606ad831a3,2025-04-21T17:14:40.833000 CVE-2024-5641,0,0,2dd93bc7f72d9dace7fe09cc2f2eb2c7de91223a0269467571863f0c170a0712,2024-11-21T09:48:04.573000 @@ -277184,7 +277184,7 @@ CVE-2024-57685,0,0,4a00cfd1abce6a2e0519097fb6cb1a5d4f69fe6690ab459a9adedbc723fb3 CVE-2024-57686,0,0,5b766596dd73178cc11abbcc48e7a179102c3199e3151898d4423b80d212902b,2025-03-28T19:17:41.700000 CVE-2024-57687,0,0,fd17afd2ff7131d64aa770c0cef5952b4d797e62edffaacc35acb229d78421b9,2025-03-28T19:16:24.640000 CVE-2024-5769,0,0,abfeb18ae91d2e4533cdbeb4bf7ad73d20beb760222f23226220c40a5c6d9f91,2025-01-09T11:15:16.127000 -CVE-2024-57698,0,0,778fc47848a666f093478e16b58c8f710943b4cd1809a0d21154f44f7cc08920,2025-04-29T20:15:25.110000 +CVE-2024-57698,0,1,b7d26fcafba4eaf324739c3d6a9b36b1a8238c2c264ebfadf2adbf8314003269,2025-04-30T15:16:00.237000 CVE-2024-57699,0,0,9810302493558cd2aa388d92a46812487319c834736468c7ce96e6ee43329a39,2025-02-06T16:15:41.170000 CVE-2024-5770,0,0,918380eecb24f860d41c083e6e9a778682d01ec1efa0eb8b0287a3dccfe91d0a,2024-11-21T09:48:18.730000 CVE-2024-57703,0,0,821fb847a6deac1e43851cd3ab1eea58d6954af60eadb9972d53f3a457a3248d,2025-03-17T14:59:32.307000 @@ -282461,8 +282461,8 @@ CVE-2025-1520,0,0,d67f464317150898182b413758fbb1b35da6b45607260a101639a8a467e19c CVE-2025-1521,0,0,c58c6e339d3d072b9154e8ec6f0efe9fcbf05ef2bf1c2ef088a2c3886c5f9b87,2025-04-29T13:52:47.470000 CVE-2025-1522,0,0,a5ced9349a9d1cc30825120d325677e99c4dfef29626ad826fd8b8f0ca23dde8,2025-04-29T13:52:47.470000 CVE-2025-1523,0,0,7daa3b55f2e4cb1f6a2f3a191a3e3f9efc3cecb80f9cab3673720bb9cf727d5d,2025-04-29T19:06:48.263000 -CVE-2025-1524,0,0,6b7ed59aa55768a97f04972f4e7ca7e6ec0d06a3ca74dba09aa8f8affcbea819,2025-04-17T20:21:48.243000 -CVE-2025-1525,0,0,947db4cb7934a3ff926b421049bc6ab4e8779b5ef2c183aae327f5cff02a680e,2025-04-17T20:21:48.243000 +CVE-2025-1524,0,1,84b7e066df088635a8c9584aaf165e45871fdeb1ae3f1ac11a5c28bbd43308c3,2025-04-30T15:47:00.377000 +CVE-2025-1525,0,1,56f5cf451ca8c66d91cb2e8b96d22f5423c38f7de01ea72992906057bb56a955,2025-04-30T15:46:20.947000 CVE-2025-1526,0,0,dc577948525af4962caef0feff11f01d08897db3dd0fe72a79c53b4a55322150,2025-03-24T18:04:40.790000 CVE-2025-1527,0,0,7be240da06a123eaef4b9aa76c072e4e6a6c01ee83d4c1bebb95f9baf79b5a8f,2025-03-24T17:50:57.550000 CVE-2025-1528,0,0,7b51d848bb252c8d2ce8faab7faf50aeaf0b47cac9c6975607b632c5e9c036f9,2025-03-14T05:15:42.170000 @@ -283738,7 +283738,7 @@ CVE-2025-21752,0,0,c6005c7571dda61e561f600bc36d34c4336c7e7f09eef390b43a73c7d523b CVE-2025-21753,0,0,5ffc950736182b4e16af3a1e912a74c429a8fa5eb78beddd85d1995353c22941,2025-03-24T17:20:58.107000 CVE-2025-21754,0,0,1b750cbe41c9b3bbcc7f63c20e66c80f94709b9489678aac8e0d85f9304ce084,2025-02-27T03:15:16.050000 CVE-2025-21755,0,0,5b6fdcfde426ade14baf03234c7c2cdc895a03f72b1736bdc59fe6d77acd75d3,2025-03-27T14:15:42.423000 -CVE-2025-21756,0,0,c40199821a5da6ce68a70efd9a54a32f4464f1fd231cf3e4835543cd9fd53fb7,2025-03-24T17:32:35.823000 +CVE-2025-21756,0,1,62bbcbe27604ab45814c7199a86fbc035ef8db1fd80cebfdd46985fcbc91fc23,2025-04-30T14:15:28.080000 CVE-2025-21757,0,0,ab8b45e5a003741815b72443c665faf05d0db02244ec489164dd1e3c390b1bbd,2025-03-25T02:15:14.073000 CVE-2025-21758,0,0,dd3a68f6ecd8249710aa02c611213c6149de3eb31e7b461e4834e08f0eb3f850,2025-03-13T13:15:52.750000 CVE-2025-21759,0,0,d073696add3fce6b2281a67ef636d78e4fa3bd2f3ca3af9bcf1820987292ecef,2025-03-24T17:33:09.887000 @@ -284995,7 +284995,7 @@ CVE-2025-23376,0,0,f0f8849d8b4cac0adcdd8fa97b555bf9b36f553e61ef5a94e3e166be5397b CVE-2025-23377,0,0,dcc809dfe584cd4bc49609356a12d4305086dfb78721ffdb597c78133e657386,2025-04-29T13:52:10.697000 CVE-2025-23378,0,0,7d1f583ba2fbd4a87629a0c6e9b1a82753dab9032ddd798f8461f250af5dc576,2025-04-11T15:40:10.277000 CVE-2025-2338,0,0,d6a145ee9d99f0b331d4e327057f954207c4362f81df3d1dbf4d76a1b480aa57,2025-03-17T15:15:45.113000 -CVE-2025-23382,0,0,22d0333b6ebd7b3c598a3add3cb34bf6adf53ccfd12bc4731614dfff20d58612,2025-03-19T16:15:30.787000 +CVE-2025-23382,0,1,fb926f7909abd08e6b1d8e7bab3a0c1dddf590c23ce61e02b53329a3e1df6e78,2025-04-30T14:43:56.590000 CVE-2025-23383,0,0,d1c3a17d942c6d64a3ee69d53222a9b28d391e05933c2067234fce4a24ef08cd,2025-03-28T18:11:40.180000 CVE-2025-23384,0,0,d7685224b7a10743fe5eae6a1ebefcafcac773ad88bd00cac8b6407ed3adf454,2025-03-11T10:15:16.330000 CVE-2025-23385,0,0,44f68c3210fdb2f588e2b733b3276d4f924d74ac5df4660c1e28e1d2bd89eca2,2025-01-28T16:15:41.377000 @@ -285884,9 +285884,20 @@ CVE-2025-24320,0,0,22204bebd126ec0b8efa20c54300c5d2c2817352b294d53c5a23f29d2ef87 CVE-2025-24326,0,0,dd13af4709b7b17ac448c947eb2606b60fddc8b7e04055280df591b39ac70dcf,2025-02-05T18:15:35.420000 CVE-2025-24336,0,0,0c1fb43f965e1337be57c1e176a52234211acbdc43cd0f3b53a81b279dc7a08b,2025-01-31T00:15:20.607000 CVE-2025-24337,0,0,909a943b00c8b637d3fed5ce70273699981b2448e37e3c32ed1614924942542d,2025-01-20T14:15:27.130000 -CVE-2025-24338,1,1,297260a5316cce01dbb804bde426952e0fbed76f4139198ad513a9fc04da5620,2025-04-30T11:15:48.150000 -CVE-2025-24339,1,1,7d29129baa469ae986fd5fe11e38eaebe81149342a7d9beb238fac29e6b9cdc0,2025-04-30T11:15:49.623000 -CVE-2025-24340,1,1,9310ef395b544b7f75fbdcd4fbd2522e545d2f95ea0d4c0b36bfab15e8e36f39,2025-04-30T11:15:49.797000 +CVE-2025-24338,0,0,297260a5316cce01dbb804bde426952e0fbed76f4139198ad513a9fc04da5620,2025-04-30T11:15:48.150000 +CVE-2025-24339,0,0,7d29129baa469ae986fd5fe11e38eaebe81149342a7d9beb238fac29e6b9cdc0,2025-04-30T11:15:49.623000 +CVE-2025-24340,0,0,9310ef395b544b7f75fbdcd4fbd2522e545d2f95ea0d4c0b36bfab15e8e36f39,2025-04-30T11:15:49.797000 +CVE-2025-24341,1,1,af37fdf021c963010b9f04a8080b68c7d2aac09a393196007103a1e4499a1e9a,2025-04-30T12:15:15.493000 +CVE-2025-24342,1,1,cc5be72bf95e43ed9f434f31bae893c5ddcf64c420da6ca3b70926265ff7b71b,2025-04-30T12:15:17.490000 +CVE-2025-24343,1,1,3a41787d2b1a53bddffef186066f6a015c68e997a6f9e91098bdb27703fb8620,2025-04-30T12:15:17.903000 +CVE-2025-24344,1,1,c063666fc4a0b2b8b2ff5cd607edbe5f7cba5543b0140dbc9819f0a72ba5bf14,2025-04-30T12:15:18.120000 +CVE-2025-24345,1,1,4b8bbf50d326aca4555ea12b5c00d2fdc6d3bcfbc45bb7ab0623d3ae3aa36827,2025-04-30T12:15:18.310000 +CVE-2025-24346,1,1,c0597eb6db9cc4e27edaa4c6e08217f15fc9be7d3e6d4e9f275ed4c151480c5f,2025-04-30T12:15:18.503000 +CVE-2025-24347,1,1,3d45b28c32abc7132f2d0b12317cbd968e005240c7e50b86fd50e71b0abdcdd7,2025-04-30T12:15:18.683000 +CVE-2025-24348,1,1,1d19b442f5a766586d6574137f8df26f5b4a2ed5798bdfd795eb2fad6872d00a,2025-04-30T12:15:21.233000 +CVE-2025-24349,1,1,5429e3f80afb18e2e443ba8b460d0fcbd9fc292887045e8356c25f910a50574f,2025-04-30T12:15:21.413000 +CVE-2025-24350,1,1,6ca6178b61414313d10e1b93f3905daef80c3ef20413e12a2cd22fe5ec48d478,2025-04-30T12:15:21.573000 +CVE-2025-24351,1,1,f9eb46c1b3724bc460f885336e1a6b8b36fdc1fe4a4e922aac8ca4c90965670c,2025-04-30T12:15:21.937000 CVE-2025-24353,0,0,73a00e82e652255c53e1c9aa441604ca19c4f6e89dc8a22b2403655764d58be1,2025-01-23T18:15:33.990000 CVE-2025-24354,0,0,33e96f6ab404cf45f0a4405c77520b82358348aceacdc778687814571e590be5,2025-01-27T18:15:41.197000 CVE-2025-24355,0,0,2b68b163db748dec99ff55b2d4d371492d44a4482a7f15b8973aa6b3a0f994c5,2025-01-24T17:15:16.047000 @@ -286675,7 +286686,7 @@ CVE-2025-25428,0,0,a4039c579030febd59545c017c3c1beb99a5f4778526e73f910acc016f0ed CVE-2025-25429,0,0,a95bef6ecb2c9e9037f1ebf79f87a2b0c7101933c3f64e22cf3f921f022ed0ed,2025-02-28T23:15:10.903000 CVE-2025-2543,0,0,e89290715b7ff44fef4dfaed136aca0776aa85b6a60156361d49a21cd6e6377f,2025-04-29T13:52:47.470000 CVE-2025-25430,0,0,9163efbf1f16deef9388edc5dfce8619e56506503048f018e2813a808e54d729,2025-03-04T16:15:39.763000 -CVE-2025-25431,0,0,5e4f6fd5d741dbc0900436294185ed7d3d147620f9b3d44fed0ad3ed88f5b139,2025-04-29T16:48:57.280000 +CVE-2025-25431,0,1,6493b573a6bc4f77e64c4c34f4cdf2e4b7b95c4c86320184de47aad5a831415a,2025-04-30T13:55:17.703000 CVE-2025-2544,0,0,61f3dad808e2359bbac367a26f479ab656345326f5e769e424e5a0af4077faa5,2025-04-07T14:17:50.220000 CVE-2025-25450,0,0,e3ddffa39d860b594bb74ab98ef16e7416f14ecc887f5721e7943e1b1d73ce80,2025-03-07T17:15:21.640000 CVE-2025-25451,0,0,4c60686324e8dfbebc3bac09932f9dca9715cd901e8b055c1d7eb1acd46fa78d,2025-03-07T17:15:21.803000 @@ -287569,6 +287580,7 @@ CVE-2025-2712,0,0,f459821222a72c79cc7ff9a9b481a8bc6ba3bcc2247f05dabdfc4ed09d6e19 CVE-2025-2713,0,0,96d615228bbe2400210a94715d82e0cb4affc98dd4349c31070f30252b2cc770,2025-03-28T18:11:40.180000 CVE-2025-27130,0,0,a1dc5070cb706965f29565e1845bf948cc8ae12d305309227937d0f3062f821a,2025-04-01T20:26:11.547000 CVE-2025-27133,0,0,6a9a66aab6e9ca89b44a7c5cb67994f31f8bbf17a0a742bf21f793ab1c58a1a0,2025-02-28T16:49:04.283000 +CVE-2025-27134,1,1,7680c372b398916f40dc450c80acba3fffb27c83b417919200afc66676e0f399,2025-04-30T15:16:00.927000 CVE-2025-27135,0,0,42c245b352c28322ceaa01f8d09056ec5a9d4c1b14ee10a7d27b83e8e078260c,2025-04-22T12:57:00.213000 CVE-2025-27136,0,0,c01448066d938a954aacb43927a32ddc1070de1cae5a8be4183115a3e5216889,2025-03-10T19:15:40.770000 CVE-2025-27137,0,0,5824d60f023fc733adf708b73443cf5ddf0a1c321fa7b10d5058188a954ef313,2025-02-24T21:15:11.213000 @@ -287623,8 +287635,8 @@ CVE-2025-27184,0,0,e6149fd65e46b5854fee94f2de03fd44c85ae65131821f271d09a5b6c7a66 CVE-2025-27185,0,0,c30bbc9646936df980735d902ff64b4c34288cb3c4ceabc380df571dcebd3311,2025-04-18T14:38:49.510000 CVE-2025-27186,0,0,44a8e92bf9434680bd487917bded79fc72095f247bde46cf38e1629246e811a9,2025-04-18T14:38:32.703000 CVE-2025-27187,0,0,5d9a84c966c9abc49dd16f1baaa0732eb8143073d03564c576c529a906480bd3,2025-04-18T14:38:20.120000 -CVE-2025-27188,0,0,c32e7776add5e5f9fd2df2593f3496255f3da2a49abd20a33f8d088aec5f4df9,2025-04-09T20:02:41.860000 -CVE-2025-27189,0,0,6e969a863f50f64cd79a066f96b8d4dc2371bfe9eaff65ff82eda113f344a55b,2025-04-09T20:02:41.860000 +CVE-2025-27188,0,1,5589566472e301b0715571d4b556ae75e88121252adcd39511166c66cac05a6f,2025-04-30T15:02:38.357000 +CVE-2025-27189,0,1,096c257f85297617cb727b6f0986e74b141270d8532e0b124bc7236c8d913f6e,2025-04-30T14:59:09.547000 CVE-2025-2719,0,0,aab61dbd321f094053bdc03116bddf17d81ea49d4be45c3ea7db49b33c86fb71,2025-04-11T15:39:52.920000 CVE-2025-27190,0,0,f6f93c1a2aea709128307aab4dd8f7522a1d7f29cb3bdc0326949ea46ad2467a,2025-04-09T20:02:41.860000 CVE-2025-27191,0,0,4f5df9b8c88675a85a7e789e6b2d5ccdb0b9a9567f661f6a44fa4181c1411c1b,2025-04-09T20:02:41.860000 @@ -287786,6 +287798,7 @@ CVE-2025-27405,0,0,663163c6c073b18f53346712329739a975081e88ca8125075a565c094735c CVE-2025-27406,0,0,16d66ed71bcc122eca2801ed1c57d9068f62c5d5532697159291cafa7e5c3495,2025-03-27T16:45:27.850000 CVE-2025-27407,0,0,1d15654ef204c91cd32beae5fe1b20af01b3f98dc702fb1b2edea51c8a7ee1cf,2025-03-12T21:15:42.560000 CVE-2025-27408,0,0,93737553abae903ea76018e61e22703521d366acf436a7c85e20d8d3f4423a3a,2025-03-04T23:15:10.897000 +CVE-2025-27409,1,1,ad63d41dd55ea3c2bd1b8c2a23a5369abeda248e1d7d22d10e3109898c68fc18,2025-04-30T15:16:01.067000 CVE-2025-27410,0,0,a05a17639c1b1b86ae196b7a01c237a501afb172d4aaf15631790229df7af6ab,2025-04-16T13:04:55.890000 CVE-2025-27411,0,0,0a8c61754ca17a315a8d6c0a67146f15c92b522c31bf75cc818698eafa246ea6,2025-03-05T16:15:40.310000 CVE-2025-27412,0,0,d9bbfd830ce3a327538dfaf425c1c45f17af21af968a5c50b137821ea628ebef,2025-03-05T16:15:40.457000 @@ -287878,6 +287891,7 @@ CVE-2025-2752,0,0,2f419f61cff45431dc494e5de187ba8801ef12bb80b36cdd91ab6ec55e9d9f CVE-2025-27520,0,0,eb3d510e2ec71b4e6facfc8b91a612963b703d70470ba5885965b0fab915d40f,2025-04-07T14:18:15.560000 CVE-2025-27521,0,0,3b64245e66b6009e2ff156d542cd7e2067920fb3d6a5d36cfbeb94f5872a522c,2025-03-05T14:00:54.577000 CVE-2025-2753,0,0,e912daa6c2718d8ed3f24e43ec3e9ee9f4a48455fb53e9e67461e5144c99f550,2025-03-27T16:45:46.410000 +CVE-2025-27532,1,1,5ab43bcfe7e1f9781745a5610117ff2b8f1c1100472f0a689cedb46c858514c8,2025-04-30T12:15:22.230000 CVE-2025-27534,0,0,e40558e45672ac9b9a33735fa16ef08f02dcb0996c9978ce0ed6bcd8b32d3dcd,2025-04-07T14:17:50.220000 CVE-2025-27538,0,0,f1e1ef82e819f0c41a8132d8d5deb4b21b908fca68acfe18077b1f8576b7daf2,2025-04-16T13:25:37.340000 CVE-2025-27539,0,0,3f964aae84dd1107bffd4c9d6998680d3acc5330401b61db9424e5702a0b1760,2025-04-17T20:22:16.240000 @@ -288397,8 +288411,8 @@ CVE-2025-29042,0,0,2d0230a4f27f8c90c859c9e34754c9a1e3a510ddc3e4f99c877efc19ebb8f CVE-2025-29043,0,0,1cef223cd8fe283b6ca31c2b51ea32a91259cc12b1a64f8c47d9023c163fcf4b,2025-04-25T18:32:43.667000 CVE-2025-29044,0,0,97c1f84201c58c1cd211c59dd61961380f9d3f314950e59244831d0ef457598e,2025-04-21T18:42:48.887000 CVE-2025-29045,0,0,1963dc8d4038da2fbcb2fba081a2d74132412c687c5a7af4af339558b443c2d6,2025-04-21T18:47:56.740000 -CVE-2025-29046,0,0,672c02654ade010bbf9a14b06691ddbeed6fd10e81649190904253d31bdbdbb6,2025-04-18T13:15:57.827000 -CVE-2025-29047,0,0,831a44daa781024efc6ca6092b07c5848ae256196afca3af767dfbc050de27c3,2025-04-18T13:15:58 +CVE-2025-29046,0,1,97c704d53eaab90ebd050fb706002e2d0c0d26d31e8336e6914769a779ce73be,2025-04-30T15:38:45.037000 +CVE-2025-29047,0,1,ab9e56c52d1b5d7ce28982f238deab131b797a6e3c2a7fe7bd1afe31cde47f19,2025-04-30T15:32:30.690000 CVE-2025-29049,0,0,5d330c70d7d31103316e937aa271bd3496ea507fadb908ea97bf504a0ca30485,2025-04-02T14:58:07.527000 CVE-2025-29058,0,0,7bc50f4cade840847079528b991d483c5848c526d0c824da3719f4b63ecc56c6,2025-04-21T14:23:45.950000 CVE-2025-2906,0,0,a9a7d8b41557888835e1c79dd2617916cc6b4f3c0d6d09861e305343a3b52d6a,2025-04-01T20:26:11.547000 @@ -288411,7 +288425,7 @@ CVE-2025-29070,0,0,01291a5766bf65c1287ee0f6127f3a568879dd8e4b1dbd2e417b1c53e816c CVE-2025-29072,0,0,fd95fded2fd85d3027eac83af76782f039ae97bbb9711a4bf20a00b195ae0993,2025-04-11T17:20:02.963000 CVE-2025-2908,0,0,79924d3ecfe8650096befc9934447812930496f664f45bff66577cd53948d0ef,2025-03-28T18:11:40.180000 CVE-2025-29085,0,0,f3b0229b2dbdb0918b1860c20c86a23a202aa8fd27b32fb25e3773ee78d284c2,2025-04-07T14:18:34.453000 -CVE-2025-29087,0,0,40c2c20dd6d1866b72f347824f123f284f290bae2a233ec0ce02d7c4a86da9cb,2025-04-15T16:16:06.233000 +CVE-2025-29087,0,1,96310ab4194efc591e716244a7113a4ab34b3e0d22000bedfc97cc87cdfe82a0,2025-04-30T12:43:22.310000 CVE-2025-29088,0,0,34b28cff3ad127ef60cdf150bca507f5c29648152a26882c7cf88f8b7391d0cd,2025-04-14T14:15:23.993000 CVE-2025-2909,0,0,42f5781e40cc939d92fe9597195ba6ab452b710720c9766b4ca6896cfde9e954,2025-03-28T18:11:40.180000 CVE-2025-2910,0,0,5af52bdcf7582d7e133344b6a01509f55f8b432f92637557c86a5b2988938918,2025-03-28T18:11:40.180000 @@ -288593,7 +288607,7 @@ CVE-2025-29720,0,0,5ec932914a7d81da0b10599d75c12821d0c2e8eb7f364340baae17593b197 CVE-2025-29722,0,0,ca2877891fb5b9bd3510371a0bd9d38fa50473b0a31dcb3ab5591fd6a04068ac,2025-04-23T18:49:16.977000 CVE-2025-2973,0,0,f988078874627143c2def1ab30019bab3c4d13be44205338de0c50c2330cd94b,2025-04-10T14:34:24.567000 CVE-2025-2974,0,0,695ae768ef6524a31e333a2a15c7b6d7e58b63b62d57be8f5f977780042de419,2025-04-01T20:26:30.593000 -CVE-2025-29743,0,0,b4dbff6405d0e0d682be0060767ea784709b7d917850523de17a2569cca450ff,2025-04-23T14:08:13.383000 +CVE-2025-29743,0,1,81120842f22b2571ea7e3fe058ac6f5d5658e8dd31a46120b990d9a82771d185,2025-04-30T13:54:38.493000 CVE-2025-2975,0,0,a51ab4826f882dfc9eb64143ebea4f1b786d39ebf186c00a08fe8a9302ac16b4,2025-04-01T20:26:30.593000 CVE-2025-2976,0,0,2714beee469a94bef5bdeffcc7963fd27d32ec325e019e7704104b1aec409041,2025-04-01T20:26:30.593000 CVE-2025-29766,0,0,d0d6c01c0aacc0172ff6cf10187bd4c58c9fb5a0b02e4e65dffc9f50e759cbe7,2025-04-01T20:26:22.890000 @@ -288684,8 +288698,8 @@ CVE-2025-29918,0,0,b846536cee2ef9c1b6ff104c6fff6ba674ac3166697c8fb9b3e0ace627799 CVE-2025-2992,0,0,6f73059124bdde16f39ed1a8331a9b4d6893670814ca0bc0ad31cf14cfa49c3d,2025-04-07T14:40:55.240000 CVE-2025-29922,0,0,d0ea3f99c32522e6a5f307d78c24d8bb052680d16554a2e119aff7977211b452,2025-03-20T18:15:19.063000 CVE-2025-29923,0,0,89bab0cfc368a6ef6eb66f57c2b9e15b441c30032ed6f96b7591687487c7ffc7,2025-03-20T18:15:19.230000 -CVE-2025-29924,0,0,33ff2ffe448b023fe20ba1aebf83c3931032be11ba9e01550609a234d855b785,2025-03-19T20:15:19.873000 -CVE-2025-29925,0,0,53b6adff79028a26a70908208cd05b264ecb017e2af474d23bebc859334f4bdc,2025-03-19T20:15:19.987000 +CVE-2025-29924,0,1,c512387d679c32f7b33af62fb14927a66704b663529316afa0da8c1182be8593,2025-04-30T15:58:41.807000 +CVE-2025-29925,0,1,b68bf14ee1f0754c261e199693984f88b0357d310728801b84830da158f182a0,2025-04-30T15:57:32.057000 CVE-2025-29926,0,0,40b05deb93101dbe75086a11818b59b57b6a814b20f271aa3698b66c8a60145c,2025-03-19T18:15:25.770000 CVE-2025-29927,0,0,9fe894281a445dc82cf58faae8c30ef1547051185123f2b9469125b69f8ac336,2025-04-08T14:15:33.973000 CVE-2025-29928,0,0,e7378b2e927fc5fc3ba1dc54c402e9255b7beb92fd05fe3fde032f3211ae2ede,2025-03-28T18:11:40.180000 @@ -290328,6 +290342,7 @@ CVE-2025-32372,0,0,22fa8cd3b893bf372ec04eb7ac8472eb8e3dd42f66fa10fd7098be2daa4ab CVE-2025-32373,0,0,025c5269a7b1b1129fc7ffc74fdb2837ddf73799e72d1d730dc03f5987178867,2025-04-09T20:02:41.860000 CVE-2025-32374,0,0,9ba0f888a2a53259377f24776eaa5d5e6e9d144402901507c323139add50fa45,2025-04-09T20:02:41.860000 CVE-2025-32375,0,0,7ac1a47d7ee7d2e87f55bd5739fe3e056b666a799259440fbcdb8f1a26580735,2025-04-22T16:52:36.937000 +CVE-2025-32376,1,1,1afb132c84585661c13920d34b095d0a3651f241fea678e5f6248bda97d12c18,2025-04-30T15:16:01.217000 CVE-2025-32377,0,0,3959f64a71a81c2db06861040d54b2d27267b06ce7a2b21399dd52ecf11f7025,2025-04-21T14:23:45.950000 CVE-2025-32378,0,0,38997789d174dd718c93596d5b05906382d079ef3dfbe80e93c65d87083adb91,2025-04-09T20:02:41.860000 CVE-2025-32379,0,0,ae2c164887e722d2185678f110673598ee5e1eaa1abf29e9367b358c40092899,2025-04-09T20:02:41.860000 @@ -290643,7 +290658,7 @@ CVE-2025-32779,0,0,484fa49b49a3739cc49013aa2542a6bc2b148ed847893f37332cd59a6ceca CVE-2025-3278,0,0,c2af16655bcc07884768df8ec11dc36933db3c24d042e90eae6f55c019582e4b,2025-04-21T14:23:45.950000 CVE-2025-32780,0,0,83112f8171986ec9095c370ce6b17488e74e84526986f45dd3db235bd146a354,2025-04-15T18:39:27.967000 CVE-2025-32782,0,0,ea3e82903e807a520de4c91c10f7d08fd70839175e235aa475d1b12f4a8b1338,2025-04-16T13:25:37.340000 -CVE-2025-32783,0,0,e0ee9823760d978eb94c4b39418c71131bc1c3fcedb35009951c79bf8cc2440b,2025-04-17T20:21:48.243000 +CVE-2025-32783,0,1,4027bdb576fbefefd69801d71dffe5732fc72b2eb57e330484f01b9f44e4bc50,2025-04-30T15:56:09.633000 CVE-2025-32784,0,0,f07e1bae891c8076c2e74beba24dfa0a792bdc8c6b542f23984d9697f06bd191,2025-04-16T13:25:37.340000 CVE-2025-32787,0,0,8a246667f42b8c93bdf6ea46fc5b0e98103cc9f313dbb1cf2d73b44e0183e974,2025-04-17T20:21:48.243000 CVE-2025-32788,0,0,07f6f1617e4979493620e815ebad192167cffacee82db0ec83b1df68d847543d,2025-04-23T14:08:13.383000 @@ -290768,8 +290783,13 @@ CVE-2025-32964,0,0,4888a0e10e79d0ed3594483fc2ed6600854a9f5d4bcd7e5a46eaa049a6538 CVE-2025-32965,0,0,9c591eb8f7767f7670b5d9ffa132f31e95534cbba47f04a42be79e14a610455b,2025-04-23T14:08:13.383000 CVE-2025-32966,0,0,ad89d18bacac49b615f22cd84fc2faeab22cc6074cae40f48dab36328b9fc8ce,2025-04-29T13:52:47.470000 CVE-2025-32968,0,0,571a9a7aac92637556c2d8a39931874ac725ec1a047714df4d5ca6f6ca333754,2025-04-29T13:52:47.470000 -CVE-2025-32969,0,0,ef4541fcdac2aaae5e1da58f8e89707a4fd3aa1103c0df7257cf86f92e08f7f0,2025-04-29T13:52:47.470000 +CVE-2025-32969,0,1,3bdd2f63f1a99d30643e49d8e7a680b03396dd95001a24cde2ccd1ec66f347c4,2025-04-30T15:50:37.270000 CVE-2025-3297,0,0,f3faf1e3ad604dfa1f7c47fce9497b7cd8333099ba83659c1904627c06ced289,2025-04-08T16:49:12.910000 +CVE-2025-32970,1,1,bea6324822db580e6ba5baee5d2892cd9e5e884b8df8227f4893ddddd35cd5f4,2025-04-30T15:16:01.397000 +CVE-2025-32971,1,1,2134699cdc0a67949ae4e95924945f13e3189f621b8f432fd4ffb9850de323eb,2025-04-30T15:16:01.540000 +CVE-2025-32972,1,1,9e0eeaad37e14f74903c80246bd9ec8a67e9e3699411aeb3d3882fe2dc60d16f,2025-04-30T15:16:01.680000 +CVE-2025-32973,1,1,1ac0c1bd77dc27fab6cb2ea761f31b185f80af136cc24bb895c84c303df5ed71,2025-04-30T15:16:01.823000 +CVE-2025-32974,1,1,f17b4fb945c2103d4702544cb910dc398703f0b402cf78bbf8bb16c5c054f344,2025-04-30T15:16:01.973000 CVE-2025-32979,0,0,f1833426290c14e0099e0331e19b62a258cc1db9f3379ed30ba118fcd5db0566,2025-04-29T16:15:34.913000 CVE-2025-3298,0,0,42b3c11a03b3e330acf149137409814de4838d8396b46617a725d88596b9ad1f,2025-04-08T16:49:00.290000 CVE-2025-32980,0,0,3dd20b282accd80f93457ce23840b74ef7abed775a357a8bccd4dae346a6695e,2025-04-29T16:15:35.103000 @@ -290823,11 +290843,11 @@ CVE-2025-3337,0,0,589e3cb49fe4109a80c13566529845d81cb90b9b7d8801bfdb44ce3c03b8b9 CVE-2025-3338,0,0,bd5063eefe66f9ab179b1562a85f71a5b1f01bf5631c5885e4d10daef8f1fa4d,2025-04-29T19:29:51.553000 CVE-2025-3339,0,0,c44f98b622f5e762b9fe5c0dd70b6597740a59d8acb5efd00ca2226745a4a82a,2025-04-29T19:29:05.240000 CVE-2025-3340,0,0,2e3f67761fed17aab7768d1abb18b7f70096f2b8bc6e9e174567733843284de5,2025-04-29T19:25:09.687000 -CVE-2025-3341,0,0,ecbb4b64cbd9ccfc432e7f91768245a6eb47625a8c2dbfe1120863298b805df9,2025-04-07T14:17:50.220000 -CVE-2025-3342,0,0,a658af572dac36d420f981c7a655bd41788a35b688c79fcb5c0f562141609df7,2025-04-07T14:17:50.220000 -CVE-2025-3343,0,0,5bb73d588314dedd5422b69d77e619922b27dd344ad4b6ccb3d4630f3ab563c2,2025-04-07T14:17:50.220000 -CVE-2025-3344,0,0,97bfd9900ef6c4eb109478479ad465f51b8231dd17edb9388d3603477eb7f817,2025-04-07T14:17:50.220000 -CVE-2025-3345,0,0,c9ad69ca7236cb20c05e7db7a0f51e10a55722df93ee124d21eaf2954f1fada3,2025-04-07T14:17:50.220000 +CVE-2025-3341,0,1,39a9be508af9e21a542bb29d3e1e1e5c2f537bd53ecade342111432d6aa26409,2025-04-30T13:44:36.660000 +CVE-2025-3342,0,1,f4628ee46f4f5ac201321dd4e60ffee3b0dc45d847afb7fc5ed6acd1e22f2792,2025-04-30T13:40:02.850000 +CVE-2025-3343,0,1,73ad600b0dc0ca5182a42c2fbcca32910d08b8d9ad4723ebffaada1d6a25e7ab,2025-04-30T13:10:06.073000 +CVE-2025-3344,0,1,58b4e188358b2259326efdba3a51344b1877862384a11e32203a55c969204bb2,2025-04-30T13:06:52.310000 +CVE-2025-3345,0,1,c084aefd60da115a087a80dd87b74be5d0495bb29564aa25b64613b1382b7ba5,2025-04-30T13:04:12.360000 CVE-2025-3346,0,0,d48cf13758ab7228b47d48e98a1bf981fda53d3ec4136a5137d60b6090ed43dd,2025-04-07T14:17:50.220000 CVE-2025-3347,0,0,28e9b5e41d2b9aa84b204e414f803911e93712b64da57a68e7123d621b38c28d,2025-04-07T14:17:50.220000 CVE-2025-3348,0,0,443fb44b45d0c58dba3a1cac369e49865cc36af72e63315c8f352345cb48c6f2,2025-04-07T14:17:50.220000 @@ -290868,6 +290888,8 @@ CVE-2025-3390,0,0,21f843398beaad64b8ae88ef3e13bc844dd5bad9f7e43bd9308c133d46693d CVE-2025-3391,0,0,a5a7b34a8f0b790273252af3d04e24537f70b23a71783a7fb156bc1455d210f1,2025-04-08T18:13:53.347000 CVE-2025-3392,0,0,8b1de0045023e0051cd6daa3b1967a18fb19493ffe05e0edeed5a3e49fafe927,2025-04-08T18:13:53.347000 CVE-2025-3393,0,0,70de7b98b5124ffd75cf4788f09d2af5335b7839f939fabb9280ce2b43755c34,2025-04-08T18:13:53.347000 +CVE-2025-3394,1,1,e33f5d32c3747710c8f1d0bba4e26bc73e0181fdbc975d50e5367811da69a453,2025-04-30T13:15:48.400000 +CVE-2025-3395,1,1,1f586615689eb56f5a35ac84b7af6ba3c0a95ebafe623f922f3943234fc49018,2025-04-30T13:15:49.130000 CVE-2025-3397,0,0,1d5b326282d24f2791bf6b13998df05b87e037361f5ada975a2294772d877d91,2025-04-09T14:37:11.503000 CVE-2025-3398,0,0,819dc858f22f99096dfba4356b31ee59577b479c8ca03b51afbbbb0eac5c54a9,2025-04-08T18:13:53.347000 CVE-2025-3399,0,0,feb74b6fb2a662d19abda10e01b3f11229d415dbdf4afe9748979f241aa09bf4,2025-04-09T14:14:00.427000 @@ -290915,12 +290937,12 @@ CVE-2025-34490,0,0,4904c3774b141eba5cf759d0d1675a86a38d70b92548ea2bd290fa9a6b551 CVE-2025-34491,0,0,450aa5bf165047eec7d6f26286c3786110cac823a019713c95ad3d4d2247d8e3,2025-04-29T13:52:10.697000 CVE-2025-3452,0,0,caa9cc858df3d7407943785a6f3a392b52c68ea3e2cbb5294c6afffa63430be2,2025-04-29T13:52:10.697000 CVE-2025-3453,0,0,6d4c3756403d2c169f24bd9cd170cc74dc819f8c072954929ebcb8b579bf19de,2025-04-17T20:21:48.243000 -CVE-2025-3457,0,0,a523da33f81c9e1e077033bed7863910db875409f58d4964d00736d5604ca87a,2025-04-23T14:08:13.383000 -CVE-2025-3458,0,0,0415e5078f11ddf0e286ef1d5cad3fb50ad1607a82f18290577a209ff15dc95c,2025-04-23T14:08:13.383000 +CVE-2025-3457,0,1,1ce8b706c7f27acea549531081740896317ac6a97554394545c243bd2df931ba,2025-04-30T14:07:52.490000 +CVE-2025-3458,0,1,f4c08c655e5360e2158789a545b6b552e0aff82df287be3ab4de5c3123f29f32,2025-04-30T14:05:12.373000 CVE-2025-3469,0,0,4bca5426f9919f93dad9a4b1c330f34d47eacab0082cc9b29903729bbc139092,2025-04-11T15:39:52.920000 CVE-2025-3470,0,0,19aa6171d68cb7df7c1f3be18d7bfe917a85b5b7f1d5f3673d31726045a39093,2025-04-15T18:39:27.967000 CVE-2025-3471,0,0,658552204815767a3678db10fa35cf3cae525d71b01764ee1e8887665ab6a26e,2025-04-30T06:15:53.153000 -CVE-2025-3472,0,0,11e3c105779f6d6a496aeced00de3a3c3646952e6f66369a67b33d817aacd1a0,2025-04-23T14:08:13.383000 +CVE-2025-3472,0,1,8edf39375c9ab0caa46bc4f64a877600d35e92d464dc8269fd628758acc904e2,2025-04-30T14:01:15.660000 CVE-2025-3474,0,0,b6de92ac438f32870a4d6c552a2123f6f68213b92be966aee0e7401ddd248d53,2025-04-09T20:02:41.860000 CVE-2025-3475,0,0,ff2d6c8584b1bcdb40146c2b5f353ed3942d3a2ca7a36d451238afc4497ce8f1,2025-04-09T20:02:41.860000 CVE-2025-3479,0,0,8f80f1c1f44c7d058394a2dc8af5ea1237f4382d2f768655200c00d11d9bc20e,2025-04-17T20:21:48.243000 @@ -291453,7 +291475,7 @@ CVE-2025-4078,0,0,7288333f832f7fd27a3b40295f554ab15cc26514fc8aff7c6ba8014ae250d8 CVE-2025-4079,0,0,c893a89f4e539f896a7507b17bf60322d7f349e7dc057d586c3553b3be6e7ac0,2025-04-29T19:15:54.130000 CVE-2025-4080,0,0,bb404453e5af2d8b97d5583579361a06a509589c046261a190fa4fafa683a363,2025-04-29T20:15:25.563000 CVE-2025-4082,0,0,90e7b89133921d81807e3efe927234ef84a565217feefda402e0b971385b6471,2025-04-29T14:15:34.913000 -CVE-2025-4083,0,0,d51d719179ad663d64c60303214fb0b52c22b7599a821fb4041e9ba063122ef6,2025-04-29T14:15:35.003000 +CVE-2025-4083,0,1,77e2dc0fdd17e28b1ef1d12331400e4393c13b88b980a12893fa2b2aa2e046ec,2025-04-30T14:15:30.400000 CVE-2025-4084,0,0,11a3ccdc685cf369e23ec9e32764decd23954557e20f48f0a86d8cdca29331a0,2025-04-29T14:15:35.097000 CVE-2025-4085,0,0,0b53c08d7349c7451ced0fb99a492d145a2cf0c7e9b051ab37167395bfc79354,2025-04-29T14:15:35.187000 CVE-2025-4086,0,0,9e6a782aadf1dc316ab051b20dde0085dd689edc1799ecbf3c399fe566eb92a7,2025-04-29T16:15:38.873000 @@ -291465,12 +291487,21 @@ CVE-2025-4091,0,0,be76f80720d6507adedb56244fc15d9bfa10d0652d1ed50301d66beeacf973 CVE-2025-4092,0,0,200d711ebe2e15156ad0230ced68f0f5a246d532b5d02cde90c654c8fdd064ec,2025-04-29T16:15:39.707000 CVE-2025-4093,0,0,d891b279ce00073f17d8f58a8ebf719e451cb06357235d1b137c7bf6521fbbb1,2025-04-29T16:15:39.850000 CVE-2025-4095,0,0,f2539477bf5eaf9485d044b6cf6e79bb8583734ab1b2d0e4b42ac3598cab5848,2025-04-29T18:15:46.180000 -CVE-2025-4108,1,1,9bfd6d1ad4fcc03f836aae2b64adaf887b9300aa371e576f132f375b19a71239,2025-04-30T10:15:18.407000 -CVE-2025-4109,1,1,dc55813f8b4d8971c2db3d8e03f9b60d13669f4e540622a7a0de82c2044c0fb3,2025-04-30T10:15:18.813000 -CVE-2025-4110,1,1,196e64505e5460ba2420017a2a68042ee5b550e797cc65f00f251cf067b66bb8,2025-04-30T11:15:49.983000 -CVE-2025-4111,1,1,f0b05f0d6da948ca73a43bc559b2f71a2a5f78e63f1cdc9e72297ca6f5d78aca,2025-04-30T11:15:50.283000 -CVE-2025-4112,1,1,f41dfb5d617f985da38472fed0d63571d8946e35ce49689d95db2f21d2a12acd,2025-04-30T11:15:50.500000 -CVE-2025-4113,1,1,e4e796ce680a15d0f27b4a9e929f8e824962cee8d2a67533fc94ca512ace1d62,2025-04-30T11:15:50.760000 +CVE-2025-4108,0,0,9bfd6d1ad4fcc03f836aae2b64adaf887b9300aa371e576f132f375b19a71239,2025-04-30T10:15:18.407000 +CVE-2025-4109,0,0,dc55813f8b4d8971c2db3d8e03f9b60d13669f4e540622a7a0de82c2044c0fb3,2025-04-30T10:15:18.813000 +CVE-2025-4110,0,0,196e64505e5460ba2420017a2a68042ee5b550e797cc65f00f251cf067b66bb8,2025-04-30T11:15:49.983000 +CVE-2025-4111,0,0,f0b05f0d6da948ca73a43bc559b2f71a2a5f78e63f1cdc9e72297ca6f5d78aca,2025-04-30T11:15:50.283000 +CVE-2025-4112,0,0,f41dfb5d617f985da38472fed0d63571d8946e35ce49689d95db2f21d2a12acd,2025-04-30T11:15:50.500000 +CVE-2025-4113,0,0,e4e796ce680a15d0f27b4a9e929f8e824962cee8d2a67533fc94ca512ace1d62,2025-04-30T11:15:50.760000 +CVE-2025-4114,1,1,f5e9a86e23c1e640dd8e5b0c9dbb04d9c64c383a3b575e698a20cf894c98de62,2025-04-30T12:15:22.640000 +CVE-2025-4115,1,1,dbbea0e5fb91f8252aa72ea68776462d13fa181472e87ea68835736dafd962ae,2025-04-30T13:15:49.663000 +CVE-2025-4116,1,1,dc35291c9e61854c8202b3b72f9154c1e2a78c516d176455adafde73732357a4,2025-04-30T13:15:49.867000 +CVE-2025-4117,1,1,9fbed8ff13a55dbee1bdf8fd39204d9db58b1b89f5dbe53ceb6115e8673c9a0e,2025-04-30T13:15:50.070000 +CVE-2025-4118,1,1,98ceb0d36f8d4788b254d6491a17a77cd622be1894a5b80fde1455fdd078baaf,2025-04-30T14:15:30.833000 +CVE-2025-4119,1,1,e3529cb5682e300b35a72ba0e8d69a0231e75a726f77882cffa168710bfad29a,2025-04-30T14:15:31.020000 +CVE-2025-4120,1,1,cea237e50288ba74a2deead9e2efba597856a2c82c57fa104dc27a9fd0b549d2,2025-04-30T14:15:31.200000 +CVE-2025-4121,1,1,74b89bd908ebb67e1206e8a4942689844ca7878f307588b79c8632f33dd647d0,2025-04-30T14:15:31.423000 +CVE-2025-4122,1,1,6c0cd4474931d5983518e61b80354459c24c60f35499b4e5ce69cd237edb850b,2025-04-30T15:16:02.590000 CVE-2025-4124,0,0,5de9fad0aff01bcc9b08950740facb2df74f7717b7ae5c11db77f58373920085,2025-04-30T09:15:17.300000 CVE-2025-4125,0,0,16c5f2432c5bb3ea366fa409fa144ceffae152b47513b47039009d6c13254fc7,2025-04-30T09:15:17.523000 CVE-2025-41395,0,0,65b9e3526569f587eb1cd97410ac7325e217f46717fe2bbf0abfe0a9511ead3c,2025-04-29T13:52:47.470000 @@ -291545,9 +291576,19 @@ CVE-2025-43972,0,0,6cf5ff80d84e20a9d9ef8fb7311e786d26897e991bd2151d39ead59adce39 CVE-2025-43973,0,0,13dab0fb1f701205cfd9cad27015dccaf756a3a9efa54232fb7a7485989ce4fa,2025-04-21T14:23:45.950000 CVE-2025-44134,0,0,c0decd3d363f604830285cd961562924fffe823a249ba621863dcb721cf11427,2025-04-29T13:52:47.470000 CVE-2025-44135,0,0,2f14d8cd913bdc3dc0575273f090317f2dea5d37f51e4b759398031eab8adf71,2025-04-29T13:52:47.470000 -CVE-2025-45427,0,0,1fd0e2ecdffc18a690e574c019eaeaf3edc6ada359750cf31de9496a048391aa,2025-04-29T13:52:47.470000 +CVE-2025-45007,1,1,100485181c0bf0632d780c3e19c796fdb1d0c7eb9eb6723940430db4fd763513,2025-04-30T15:16:02.120000 +CVE-2025-45009,1,1,51774cb5f54d3a32b1a3210a4923155ece32b9d2197117bc686b00424db3cb64,2025-04-30T14:15:28.890000 +CVE-2025-45010,1,1,ef3df8d85ef41b76383864e996df453f8be4cdee5fe7258881fd36340125ef5d,2025-04-30T14:15:29.080000 +CVE-2025-45011,1,1,f3778ca38688493623585405da1f22c8d1fe819d7247e34d20b200789ac5be09,2025-04-30T14:15:29.193000 +CVE-2025-45015,1,1,9996ffea28b2d8dc12e71f7156ffd94de762d8b4458eec4ab9287083309ad835,2025-04-30T14:15:29.313000 +CVE-2025-45017,1,1,5c1c74974de962518217ef8c55f90f67f4128d9ab87b2531c8a4ed7fc9bfcc76,2025-04-30T14:15:29.427000 +CVE-2025-45018,1,1,741e7439659e3c0bc42e44b22c666d7164ce788f317289ab563de7d9097b770e,2025-04-30T14:15:29.547000 +CVE-2025-45019,1,1,b28b27af5b69d757be6e224c7e417e74a8c024d1eeeba755825df54231c42c35,2025-04-30T14:15:29.660000 +CVE-2025-45020,1,1,d0fe8598a07b6888f833658592de86176014f8feca1579c83796cecc2dee5bca,2025-04-30T15:16:02.287000 +CVE-2025-45021,1,1,62c2ee1df4b358445e63e7e458dbabb3bdf07e206b2a9f13ca25095cfdba9916,2025-04-30T14:15:29.777000 +CVE-2025-45427,0,1,2acb289b4531d79e0a4fdda0743ea875280a2030836ee1f38a4e78112f2ff823,2025-04-30T13:51:20.023000 CVE-2025-45428,0,0,2f4a1d7515cf4644930324371a5bd35497d397ced03d0c03af99ec545de0e638,2025-04-29T13:52:47.470000 -CVE-2025-45429,0,0,cd6c316eb3e15c4fc2a558603901315982b1b249adda510ded4c9a248c4c6c4e,2025-04-29T13:52:47.470000 +CVE-2025-45429,0,1,32099a126e41e157c073e4b282e42326bf59a85e3c0de57c5dd11afb3e22532d,2025-04-30T15:48:51.963000 CVE-2025-45947,0,0,0cd4eb35605e38d6beafe0e5142e00be98e0a9a86813c6e53390cf0e51069caf,2025-04-29T14:15:32.963000 CVE-2025-45949,0,0,ac65e8085ff0434769ff2d9579f4348c0147c0d6253a297e3821367f69e3d27c,2025-04-29T14:15:33.163000 CVE-2025-45953,0,0,b7e4636e223e9443bf4ceb70aa1bfa6bac5a6ca02a24969ead6f03ebd32e187c,2025-04-29T14:15:33.350000 @@ -291574,7 +291615,7 @@ CVE-2025-46234,0,0,584377ebc4e5678bcbfe835b62d69feedcbdf9915324e0552fd111e5bbb58 CVE-2025-46235,0,0,734efe580cc5e7cd9aef477d65cb11e20214cdaa748049c96675623d232de593,2025-04-23T14:08:13.383000 CVE-2025-46236,0,0,8b8affe299306142f5ddebf9735c0f8b331fbdc704d54dd4ca3bba8a74a23efa,2025-04-23T14:08:13.383000 CVE-2025-46237,0,0,861e8f18c43414bfd07cdcca1d165e11e624d67d97a9de32bdc44c95d856df19,2025-04-23T14:08:13.383000 -CVE-2025-46238,0,0,a72ac60414c5163d965e8040051a2b14dd35d0fd78ca88b4c17e08a8e92b7b03,2025-04-23T14:08:13.383000 +CVE-2025-46238,0,1,0fd1ea3f170bb82d18ac0fec1280957e12e2288593be59434b2337af184395c5,2025-04-30T15:27:17.047000 CVE-2025-46239,0,0,bd231629064215abc4d96eaa38d921cda2cf697934ca0a20ce561acde3320bc8,2025-04-29T18:54:46.143000 CVE-2025-46240,0,0,9db4e1600e65dd37c7a9e3dc4bfbcec377d46ba7710a17a5108d73cab577189b,2025-04-29T18:52:17.683000 CVE-2025-46241,0,0,0e246892c63f826ee9efba950dc941d7f60964c3e0c57f82e308fdc7b57a66fb,2025-04-29T18:48:56.777000 @@ -291585,12 +291626,12 @@ CVE-2025-46245,0,0,01ba8c0c2dbb11525a4c06abacf443921c722a6598e655f5c45acf3c661b8 CVE-2025-46246,0,0,7e766c024b4b26dc6c3ffbc02ed6abdb467bac6d2983c98a5b2b457946fabef6,2025-04-29T18:22:45.507000 CVE-2025-46247,0,0,e6d6ed24b8fd0054e0a7b1b7b96320dbf1891d65493f038b9f1935e443cf9dcd,2025-04-29T18:17:58.223000 CVE-2025-46248,0,0,3d46838d829b771d84a2100c9abf020cbda99f4a4c58fa6a8434ab8154157bb1,2025-04-29T13:52:28.490000 -CVE-2025-46249,0,0,a0263976af3bb1e16fadd8845abd48fb9b6661a9aaac8607503e6b8a62a3343e,2025-04-23T14:08:13.383000 -CVE-2025-46250,0,0,feff0b403f69cd58de415cd8153f4d139fc243e6a7c2ee3793f77d0a996b1683,2025-04-23T14:08:13.383000 -CVE-2025-46251,0,0,120525bcfb77d3ca6a32c1ebb51a6147327de303872bb2906eedfc3ca9a5ec6b,2025-04-23T14:08:13.383000 -CVE-2025-46252,0,0,79988ba478e8fdb1ac986a8e7ffc651ddd650a1b1d8c65fb599b55e46ec4487e,2025-04-23T14:08:13.383000 -CVE-2025-46253,0,0,efab1d5977b33bba2207134d3fce6961923175b9005287fa6e4fca40b06bdd89,2025-04-23T14:08:13.383000 -CVE-2025-46254,0,0,7daea33d7fc6848aa5314ce7fe7cde873b47d4b9860193ec563457b4e997fcd8,2025-04-23T14:08:13.383000 +CVE-2025-46249,0,1,82f0756c730bed3bd2b42bd6fd769551086c8520b3066c51033df3dfddc898a4,2025-04-30T15:24:39.767000 +CVE-2025-46250,0,1,eec9069ecffcf04208f338364b52caf38dc527a341f61f357c4156576a4f64e0,2025-04-30T15:22:06.850000 +CVE-2025-46251,0,1,d17dbf4e8e21c626e2d5432aff3bc0ed6b69b0ab0b53ad1b17cc7c8b8336e440,2025-04-30T15:16:39.360000 +CVE-2025-46252,0,1,c50b6d0ac2ae9d7ce943a5ed8ef2fd6da152fdf4666412ab5a89649c7df0b743,2025-04-30T15:10:04.440000 +CVE-2025-46253,0,1,b25f3cee4a5e94813fb7283f6e435befe966b21315e8df614c830de7a55808b6,2025-04-30T15:08:45.127000 +CVE-2025-46254,0,1,5e703cc2f27dee605c5157342c085d9f1bee15259d5841a98b801a9b78337a6f,2025-04-30T14:59:42.390000 CVE-2025-46260,0,0,de05a0a1a6df47faa889a46f36513cb0a0e28fdfce45e20918b1c808a2fd7912,2025-04-29T13:52:28.490000 CVE-2025-46261,0,0,f73cf724c402394b3913a420df099a6b766492bce3124de0e7d9c6a51320fc7a,2025-04-29T13:52:28.490000 CVE-2025-46264,0,0,23a0001559bc23339f580af9cbe1584d0a33730fcb8dc7be045aad5825308875,2025-04-29T13:52:28.490000 @@ -291606,11 +291647,12 @@ CVE-2025-46329,0,0,1d8b0b655c5ee4be78d21cf937cad34a0490b04921710a8a7012c30d06a78 CVE-2025-46330,0,0,51af3999ada150afbbf505b46b013fc8998be7f881a043ebf16b2f9bf195bef4,2025-04-29T13:52:10.697000 CVE-2025-46333,0,0,4ca215b72a98284b0530b719160d5251f8056ccde380184cb21e0e8b208b2507,2025-04-29T13:52:10.697000 CVE-2025-46338,0,0,8dd5ab3bf26120dbbf3d57add19341ad71bb2d2b518d4a3f65a5105f8b059051,2025-04-29T13:52:10.697000 +CVE-2025-46342,1,1,743df6e5d851509c117755f99755388ba8fd2f50387aa4bdd8188053111505f0,2025-04-30T15:16:02.440000 CVE-2025-46343,0,0,52577a02becc74f566d147c93aa34d1201c2aeb60bd9c6b3587e72786d7cfdf1,2025-04-29T13:52:10.697000 CVE-2025-46344,0,0,0e1bdd0abc274d8b4f72165decf505184fe3cac2027aba198740472c192425dc,2025-04-29T21:15:51.987000 CVE-2025-46346,0,0,efb4a705dea859f4963def5401db351bc3f21e31297583e9052f4256f9c73a74,2025-04-29T18:15:44.570000 CVE-2025-46347,0,0,cb06edc7de7f9bb5de1509e59cff9ca8a65435b351fa5c6baf03122bc5d13953,2025-04-29T19:15:53.650000 -CVE-2025-46348,0,0,c86e2ecfb7f9c5d0ed7adc184dc2dec8f652d07762c4ba6cbeacd5ab7332540c,2025-04-29T21:15:52.120000 +CVE-2025-46348,0,1,91b522b743e4fe5635d77be2a9fc5f8cbd948781a366b749212a960d501f2cda,2025-04-30T14:15:29.943000 CVE-2025-46349,0,0,d828f0cc1d7d021048eb925fc280c5a254bc7b101db9a59aecbe1121461ed35c,2025-04-29T18:15:44.803000 CVE-2025-46350,0,0,28b5801b72e751d63e33c418c6568d7f1153cb152b9a92a3307db4fdde8a878e,2025-04-29T18:15:44.950000 CVE-2025-46374,0,0,0df9474f29e53d817d13f584af47eb0c12cf27caea3c45635f75daa159094ef3,2025-04-24T03:15:15.797000 @@ -291717,10 +291759,10 @@ CVE-2025-46544,0,0,4120aae58d7c5277d6551ad1cdb9c175cafe443f251085276d872524c1be7 CVE-2025-46545,0,0,49c64419c783edc04be167542f9c9c5b3bb0718a9532c122371098e6fd9aab5b,2025-04-29T13:52:28.490000 CVE-2025-46546,0,0,96c9755ac24b0a80a46cd7d4b516355010ab85eac7107b893b6b384fa219f3a1,2025-04-29T13:52:28.490000 CVE-2025-46547,0,0,8acc1afe45e6a60f966cb7e5b4fe1e3f801c3ab7386ec5552ef5a599cdb15e24,2025-04-29T13:52:28.490000 -CVE-2025-46549,0,0,079b8438aa8e9182cc520cc44c9c85fe7cc153be7215108a0a4af26f87cce47c,2025-04-29T21:15:52.270000 -CVE-2025-46550,0,0,bd233b3987594e36e2683a1a6fd6ab0c01af30d2cace75ee727b60cf354f5e6e,2025-04-29T21:15:52.467000 +CVE-2025-46549,0,1,40df4f6298aa907ddea8cda472c0c62e064a2add67e0ba03796e0cadcb524084,2025-04-30T14:15:30.063000 +CVE-2025-46550,0,1,264c4fc648b8fe5693f9bff713448fd2be37c6984e0527c86ff844266ee9fc81,2025-04-30T14:15:30.170000 CVE-2025-46552,0,0,439f32ac3363666b839c59a59a600547dce2143cc5444306066ec06cffbabcc5,2025-04-29T23:16:04.957000 -CVE-2025-46560,0,0,94d805d5a40d8a2cbba49a2d93017abd970b3f4020aeeb68780a7924834eee68,2025-04-30T01:15:52.097000 +CVE-2025-46560,0,1,2abe4e922ac573be38bde81d641cdbd289da9155f6f595038ac325bfcc6e0ec1,2025-04-30T14:15:30.283000 CVE-2025-46574,0,0,92478992098cfd3e1c073cf382d77a474f9304fa70a4c0ac8d3d7924ea977234,2025-04-29T13:52:10.697000 CVE-2025-46575,0,0,2f0a5b24310dd6fd0827bf911a3730e65f94967c7a1c701ec5837ae7adf431ee,2025-04-29T13:52:10.697000 CVE-2025-46576,0,0,2a8d4b326347bdc18987acae65447d891b53c21b768c7297f2b5b705e0556ad3,2025-04-29T13:52:10.697000