diff --git a/CVE-2011/CVE-2011-20xx/CVE-2011-2005.json b/CVE-2011/CVE-2011-20xx/CVE-2011-2005.json index a631de8074e..18dba092415 100644 --- a/CVE-2011/CVE-2011-20xx/CVE-2011-2005.json +++ b/CVE-2011/CVE-2011-20xx/CVE-2011-2005.json @@ -2,8 +2,8 @@ "id": "CVE-2011-2005", "sourceIdentifier": "secure@microsoft.com", "published": "2011-10-12T02:52:43.910", - "lastModified": "2025-02-10T19:15:30.800", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T14:12:04.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2012/CVE-2012-01xx/CVE-2012-0158.json b/CVE-2012/CVE-2012-01xx/CVE-2012-0158.json index 5c45d7c499f..dda93d3d3ae 100644 --- a/CVE-2012/CVE-2012-01xx/CVE-2012-0158.json +++ b/CVE-2012/CVE-2012-01xx/CVE-2012-0158.json @@ -2,8 +2,8 @@ "id": "CVE-2012-0158", "sourceIdentifier": "secure@microsoft.com", "published": "2012-04-10T21:55:01.687", - "lastModified": "2025-02-10T20:15:32.280", - "vulnStatus": "Modified", + "lastModified": "2025-04-04T15:21:41.613", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2013/CVE-2013-13xx/CVE-2013-1331.json b/CVE-2013/CVE-2013-13xx/CVE-2013-1331.json index 8d4f93b90d0..99f566dae9f 100644 --- a/CVE-2013/CVE-2013-13xx/CVE-2013-1331.json +++ b/CVE-2013/CVE-2013-13xx/CVE-2013-1331.json @@ -2,8 +2,8 @@ "id": "CVE-2013-1331", "sourceIdentifier": "secure@microsoft.com", "published": "2013-06-12T03:29:57.117", - "lastModified": "2025-02-10T19:15:31.597", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T15:24:27.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2013/CVE-2013-39xx/CVE-2013-3900.json b/CVE-2013/CVE-2013-39xx/CVE-2013-3900.json index 0db221a3df6..06dd4439657 100644 --- a/CVE-2013/CVE-2013-39xx/CVE-2013-3900.json +++ b/CVE-2013/CVE-2013-39xx/CVE-2013-3900.json @@ -2,8 +2,8 @@ "id": "CVE-2013-3900", "sourceIdentifier": "secure@microsoft.com", "published": "2013-12-11T00:55:03.693", - "lastModified": "2025-02-10T20:15:35.257", - "vulnStatus": "Modified", + "lastModified": "2025-04-04T15:24:55.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -197,6 +197,11 @@ "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F513002-D8C1-4D3A-9F79-4B52498F67E9" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "A9D54EE6-30AF-411C-A285-A4DCB6C6EC06" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*", @@ -207,6 +212,36 @@ "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*", "matchCriteriaId": "0C3552E0-F793-4CDD-965D-457495475805" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "B2D24C54-F04F-4717-B614-FE67B3ED9DC0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "D5EC3F68-8F41-4F6B-B2E5-920322A4A321" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "B0301BA0-81DB-4FC1-9BC3-EB48A56BC608" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "8E3C1327-F331-4448-A253-00EAC7428317" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:-:*:*:*:*:*:arm64:*", + "matchCriteriaId": "08EE1F3A-A8DE-4867-BB5B-8A8ED867F3CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "B1670829-6A8C-4688-B7A5-3DFB878A4861" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", @@ -256,6 +291,16 @@ "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75CCACE6-A0EE-4A6F-BD5A-7AA504B02717" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2145B2C-E779-4CB3-8D0E-0786DD5A7EE1" } ] } diff --git a/CVE-2016/CVE-2016-00xx/CVE-2016-0034.json b/CVE-2016/CVE-2016-00xx/CVE-2016-0034.json index 3fb259ac270..3f022a759c4 100644 --- a/CVE-2016/CVE-2016-00xx/CVE-2016-0034.json +++ b/CVE-2016/CVE-2016-00xx/CVE-2016-0034.json @@ -2,8 +2,8 @@ "id": "CVE-2016-0034", "sourceIdentifier": "secure@microsoft.com", "published": "2016-01-13T05:59:22.657", - "lastModified": "2025-02-10T19:15:34.910", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T15:27:03.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-82xx/CVE-2018-8298.json b/CVE-2018/CVE-2018-82xx/CVE-2018-8298.json index 3772274c0cc..fa86d711dfe 100644 --- a/CVE-2018/CVE-2018-82xx/CVE-2018-8298.json +++ b/CVE-2018/CVE-2018-82xx/CVE-2018-8298.json @@ -2,8 +2,8 @@ "id": "CVE-2018-8298", "sourceIdentifier": "secure@microsoft.com", "published": "2018-07-11T00:29:01.663", - "lastModified": "2025-02-07T17:15:12.453", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T15:32:27.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,8 @@ "metrics": { "cvssMetricV31": [ { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "source": "nvd@nist.gov", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -36,15 +36,13 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.9 - } - ], - "cvssMetricV30": [ + }, { - "source": "nvd@nist.gov", - "type": "Primary", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.5, "baseSeverity": "HIGH", "attackVector": "NETWORK", @@ -136,7 +134,8 @@ "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", - "VDB Entry" + "VDB Entry", + "Broken Link" ] }, { @@ -161,7 +160,8 @@ "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", - "VDB Entry" + "VDB Entry", + "Broken Link" ] }, { diff --git a/CVE-2018/CVE-2018-85xx/CVE-2018-8589.json b/CVE-2018/CVE-2018-85xx/CVE-2018-8589.json index 291a416a4a4..32b818ea096 100644 --- a/CVE-2018/CVE-2018-85xx/CVE-2018-8589.json +++ b/CVE-2018/CVE-2018-85xx/CVE-2018-8589.json @@ -2,8 +2,8 @@ "id": "CVE-2018-8589", "sourceIdentifier": "secure@microsoft.com", "published": "2018-11-14T01:29:02.067", - "lastModified": "2025-02-07T17:15:13.993", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T15:32:36.710", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,8 @@ "metrics": { "cvssMetricV31": [ { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "source": "nvd@nist.gov", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -36,15 +36,13 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 - } - ], - "cvssMetricV30": [ + }, { - "source": "nvd@nist.gov", - "type": "Primary", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", @@ -140,7 +138,8 @@ "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", - "VDB Entry" + "VDB Entry", + "Broken Link" ] }, { @@ -148,7 +147,8 @@ "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", - "VDB Entry" + "VDB Entry", + "Broken Link" ] }, { @@ -164,7 +164,8 @@ "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", - "VDB Entry" + "VDB Entry", + "Broken Link" ] }, { @@ -172,7 +173,8 @@ "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", - "VDB Entry" + "VDB Entry", + "Broken Link" ] }, { diff --git a/CVE-2019/CVE-2019-02xx/CVE-2019-0211.json b/CVE-2019/CVE-2019-02xx/CVE-2019-0211.json index ab76341c61b..4febe854495 100644 --- a/CVE-2019/CVE-2019-02xx/CVE-2019-0211.json +++ b/CVE-2019/CVE-2019-02xx/CVE-2019-0211.json @@ -2,8 +2,8 @@ "id": "CVE-2019-0211", "sourceIdentifier": "security@apache.org", "published": "2019-04-08T22:29:00.387", - "lastModified": "2025-02-06T21:15:12.750", - "vulnStatus": "Modified", + "lastModified": "2025-04-04T15:34:11.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-06xx/CVE-2019-0604.json b/CVE-2019/CVE-2019-06xx/CVE-2019-0604.json index baca58d1ae4..07e346c8abe 100644 --- a/CVE-2019/CVE-2019-06xx/CVE-2019-0604.json +++ b/CVE-2019/CVE-2019-06xx/CVE-2019-0604.json @@ -2,8 +2,8 @@ "id": "CVE-2019-0604", "sourceIdentifier": "secure@microsoft.com", "published": "2019-03-05T23:29:00.757", - "lastModified": "2025-02-07T17:15:14.890", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T15:33:58.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -148,7 +148,8 @@ "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", - "VDB Entry" + "VDB Entry", + "Broken Link" ] }, { @@ -164,7 +165,8 @@ "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", - "VDB Entry" + "VDB Entry", + "Broken Link" ] }, { diff --git a/CVE-2019/CVE-2019-08xx/CVE-2019-0841.json b/CVE-2019/CVE-2019-08xx/CVE-2019-0841.json index dfc4698ce7d..b6a8d588a8e 100644 --- a/CVE-2019/CVE-2019-08xx/CVE-2019-0841.json +++ b/CVE-2019/CVE-2019-08xx/CVE-2019-0841.json @@ -2,8 +2,8 @@ "id": "CVE-2019-0841", "sourceIdentifier": "secure@microsoft.com", "published": "2019-04-09T21:29:01.990", - "lastModified": "2025-02-07T17:15:16.613", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-04-04T15:34:20.640", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-22xx/CVE-2019-2215.json b/CVE-2019/CVE-2019-22xx/CVE-2019-2215.json index 5555ec8967b..9f6c4eff1f8 100644 --- a/CVE-2019/CVE-2019-22xx/CVE-2019-2215.json +++ b/CVE-2019/CVE-2019-22xx/CVE-2019-2215.json @@ -2,8 +2,8 @@ "id": "CVE-2019-2215", "sourceIdentifier": "security@android.com", "published": "2019-10-11T19:15:10.947", - "lastModified": "2025-02-07T13:15:27.050", - "vulnStatus": "Modified", + "lastModified": "2025-04-04T15:40:44.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-98xx/CVE-2019-9874.json b/CVE-2019/CVE-2019-98xx/CVE-2019-9874.json index e8c8f786eac..2ffc26d0260 100644 --- a/CVE-2019/CVE-2019-98xx/CVE-2019-9874.json +++ b/CVE-2019/CVE-2019-98xx/CVE-2019-9874.json @@ -2,8 +2,8 @@ "id": "CVE-2019-9874", "sourceIdentifier": "cve@mitre.org", "published": "2019-05-31T21:29:06.123", - "lastModified": "2025-03-27T01:00:02.327", - "vulnStatus": "Modified", + "lastModified": "2025-04-04T15:38:31.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,8 @@ "metrics": { "cvssMetricV31": [ { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "source": "nvd@nist.gov", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -36,15 +36,13 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 - } - ], - "cvssMetricV30": [ + }, { - "source": "nvd@nist.gov", - "type": "Primary", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", diff --git a/CVE-2019/CVE-2019-98xx/CVE-2019-9875.json b/CVE-2019/CVE-2019-98xx/CVE-2019-9875.json index 3ddf2e75813..eaf9affe3d3 100644 --- a/CVE-2019/CVE-2019-98xx/CVE-2019-9875.json +++ b/CVE-2019/CVE-2019-98xx/CVE-2019-9875.json @@ -2,8 +2,8 @@ "id": "CVE-2019-9875", "sourceIdentifier": "cve@mitre.org", "published": "2019-05-31T21:29:06.187", - "lastModified": "2025-03-27T01:00:02.343", - "vulnStatus": "Modified", + "lastModified": "2025-04-04T15:39:25.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,8 @@ "metrics": { "cvssMetricV31": [ { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "source": "nvd@nist.gov", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -36,15 +36,13 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 - } - ], - "cvssMetricV30": [ + }, { - "source": "nvd@nist.gov", - "type": "Primary", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", diff --git a/CVE-2020/CVE-2020-06xx/CVE-2020-0646.json b/CVE-2020/CVE-2020-06xx/CVE-2020-0646.json index 6c0f9e29614..47b2d9b042e 100644 --- a/CVE-2020/CVE-2020-06xx/CVE-2020-0646.json +++ b/CVE-2020/CVE-2020-06xx/CVE-2020-0646.json @@ -2,8 +2,8 @@ "id": "CVE-2020-0646", "sourceIdentifier": "secure@microsoft.com", "published": "2020-01-14T23:15:33.143", - "lastModified": "2025-02-07T16:15:31.220", - "vulnStatus": "Modified", + "lastModified": "2025-04-04T15:40:53.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-430xx/CVE-2021-43084.json b/CVE-2021/CVE-2021-430xx/CVE-2021-43084.json index ad9bdb4a890..b029e18b3b1 100644 --- a/CVE-2021/CVE-2021-430xx/CVE-2021-43084.json +++ b/CVE-2021/CVE-2021-430xx/CVE-2021-43084.json @@ -2,7 +2,7 @@ "id": "CVE-2021-43084", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-24T18:15:07.997", - "lastModified": "2024-11-21T06:28:39.667", + "lastModified": "2025-04-04T15:15:06.847", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "57D072D7-5B87-4DE7-A2D3-3D9207D5EED1" + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:4.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C270FB48-DA32-48B8-AD29-A6215B1A7663" } ] } diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47089.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47089.json index 0da3a53ba63..8cfed6fc427 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47089.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47089.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47089", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-04T18:15:07.560", - "lastModified": "2024-11-21T06:35:22.480", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:41:46.367", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,95 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.15.12", + "matchCriteriaId": "5CAD6D48-E560-4E57-93BC-36BEBD6A8FA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*", + "matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*", + "matchCriteriaId": "A73429BA-C2D9-4D0C-A75F-06A1CA8B3983" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F621B5E3-E99D-49E7-90B9-EC3B77C95383" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*", + "matchCriteriaId": "F7BFDCAA-1650-49AA-8462-407DD593F94F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*", + "matchCriteriaId": "6EC9882F-866D-4ACB-8FBC-213D8D8436C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8A0915FE-A4AA-4C94-B783-CF29D81E7E54" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0129ab1f268b6cf88825eae819b9b84aa0a85634", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2f06c8293d27f6337f907042c602c9c953988c48", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0129ab1f268b6cf88825eae819b9b84aa0a85634", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2f06c8293d27f6337f907042c602c9c953988c48", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47114.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47114.json index d5eabddf84c..e9b6cbfbe11 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47114.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47114.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47114", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-15T21:15:06.723", - "lastModified": "2024-11-21T06:35:25.530", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:39:41.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,70 +39,210 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4.272", + "matchCriteriaId": "99854A18-73AB-4333-A59F-D4905B9A977B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.272", + "matchCriteriaId": "8FEC5189-264E-4620-BD41-8B5E44F20D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.236", + "matchCriteriaId": "32BD3098-E25B-4893-87B7-49DAAD61B503" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.194", + "matchCriteriaId": "219AB3A3-BDC8-47F5-A638-4A3D5D451EC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.125", + "matchCriteriaId": "552FBD6A-793D-4EE1-9D44-69978256AA46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.43", + "matchCriteriaId": "B2136BD5-4F86-40C8-96C8-5C90A015490C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.10", + "matchCriteriaId": "27384800-AB48-4C08-891E-34B66F5FC4AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0a31dd6fd2f4e7db538fb6eb1f06973d81f8dd3b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/33e03adafb29eedae1bae9cdb50c1385279fcf65", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/624fa7baa3788dc9e57840ba5b94bc22b03cda57", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6bba4471f0cc1296fe3c2089b9e52442d3074b2e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a1700479524bb9cb5e8ae720236a6fabd003acae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c8d5faee46242c3f33b8a71a4d7d52214785bfcc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cc2edb99ea606a45182b5ea38cc8f4e583aa0774", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cec4e857ffaa8c447f51cd8ab4e72350077b6770", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0a31dd6fd2f4e7db538fb6eb1f06973d81f8dd3b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/33e03adafb29eedae1bae9cdb50c1385279fcf65", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/624fa7baa3788dc9e57840ba5b94bc22b03cda57", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6bba4471f0cc1296fe3c2089b9e52442d3074b2e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a1700479524bb9cb5e8ae720236a6fabd003acae", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c8d5faee46242c3f33b8a71a4d7d52214785bfcc", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cc2edb99ea606a45182b5ea38cc8f4e583aa0774", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cec4e857ffaa8c447f51cd8ab4e72350077b6770", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47126.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47126.json index 8390581f4ea..e428e48a1e4 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47126.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47126.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47126", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-15T21:15:07.357", - "lastModified": "2024-11-21T06:35:26.907", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:48:08.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,38 +51,115 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3", + "versionEndExcluding": "5.4.125", + "matchCriteriaId": "A7346D80-57B1-4BA2-9844-4EB353EC1DFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.43", + "matchCriteriaId": "B2136BD5-4F86-40C8-96C8-5C90A015490C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.10", + "matchCriteriaId": "27384800-AB48-4C08-891E-34B66F5FC4AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/09870235827451409ff546b073d754a19fd17e2e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0a462e25ef0f7ab305081a08d435bbd1f13c0a94", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7ba7fa78a92dc410b6f93ed73075ab669c3a0b59", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/821bbf79fe46a8b1d18aa456e8ed0a3c208c3754", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/09870235827451409ff546b073d754a19fd17e2e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0a462e25ef0f7ab305081a08d435bbd1f13c0a94", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7ba7fa78a92dc410b6f93ed73075ab669c3a0b59", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/821bbf79fe46a8b1d18aa456e8ed0a3c208c3754", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47129.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47129.json index 57492b6a1f1..6bbdb54bd1a 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47129.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47129.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47129", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-15T21:15:07.523", - "lastModified": "2024-11-21T06:35:27.327", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:47:56.107", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,38 +51,115 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3", + "versionEndExcluding": "5.4.125", + "matchCriteriaId": "A7346D80-57B1-4BA2-9844-4EB353EC1DFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.43", + "matchCriteriaId": "B2136BD5-4F86-40C8-96C8-5C90A015490C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.10", + "matchCriteriaId": "27384800-AB48-4C08-891E-34B66F5FC4AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1710eb913bdcda3917f44d383c32de6bdabfc836", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2c0e6b35b88a961127066a1028bce9c727cbc3e5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5f3429c05e4028a0e241afdad856dd15dec2ffb9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/da8d31e80ff425f5a65dab7060d5c4aba749e562", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1710eb913bdcda3917f44d383c32de6bdabfc836", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2c0e6b35b88a961127066a1028bce9c727cbc3e5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5f3429c05e4028a0e241afdad856dd15dec2ffb9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/da8d31e80ff425f5a65dab7060d5c4aba749e562", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47130.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47130.json index 867841f8b91..96d3c3c3c7a 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47130.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47130.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47130", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-15T21:15:07.577", - "lastModified": "2024-11-21T06:35:27.503", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:48:17.330", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,106 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.8", + "versionEndExcluding": "5.10.43", + "matchCriteriaId": "68F5A00C-A198-450B-BB15-3EA45C17519F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.10", + "matchCriteriaId": "27384800-AB48-4C08-891E-34B66F5FC4AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/8a452d62e7cea3c8a2676a3b89a9118755a1a271", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bcd9a0797d73eeff659582f23277e7ab6e5f18f3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c440cd080761b18a52cac20f2a42e5da1e3995af", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8a452d62e7cea3c8a2676a3b89a9118755a1a271", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bcd9a0797d73eeff659582f23277e7ab6e5f18f3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c440cd080761b18a52cac20f2a42e5da1e3995af", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47224.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47224.json index 34c8a24239a..74a9c5fad3c 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47224.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47224.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47224", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:11.687", - "lastModified": "2024-11-21T06:35:39.623", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:32:24.247", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,38 +39,136 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.4.128", + "matchCriteriaId": "3F3CD510-C528-4ECA-AD21-A4F1A661CA40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.46", + "matchCriteriaId": "59455D13-A902-42E1-97F7-5ED579777193" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "7806E7E5-6D4F-4E18-81C1-79B3C60EE855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/019ab7d044d0ebf97e1236bb8935b7809be92358", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6aa32217a9a446275440ee8724b1ecaf1838df47", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6d120ab4dc39a543c6b63361e1d0541c382900a3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e8afe05bd359ebe12a61dbdc94c06c00ea3e8d4b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/019ab7d044d0ebf97e1236bb8935b7809be92358", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6aa32217a9a446275440ee8724b1ecaf1838df47", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6d120ab4dc39a543c6b63361e1d0541c382900a3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e8afe05bd359ebe12a61dbdc94c06c00ea3e8d4b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47225.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47225.json index 5f4521c9f3a..be46de95e7c 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47225.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47225.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47225", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:11.760", - "lastModified": "2024-11-21T06:35:39.800", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:31:52.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,95 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "20B97A76-C4E0-44DF-A13C-08A99794F892" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/8043903fcb72f545c52e3ec74d6fd82ef79ce7c5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d5befb224edbe53056c2c18999d630dafb4a08b9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8043903fcb72f545c52e3ec74d6fd82ef79ce7c5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d5befb224edbe53056c2c18999d630dafb4a08b9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47230.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47230.json index d2924354f7f..cfd32c7dbc8 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47230.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47230.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47230", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:12.400", - "lastModified": "2024-11-21T06:35:40.480", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:31:41.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,38 +51,125 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1", + "versionEndExcluding": "5.4.128", + "matchCriteriaId": "2CC66006-5C54-45A3-8A7B-D5B01896A720" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.46", + "matchCriteriaId": "59455D13-A902-42E1-97F7-5ED579777193" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "7806E7E5-6D4F-4E18-81C1-79B3C60EE855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/669a8866e468fd020d34eb00e08cb41d3774b71b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/78fcb2c91adfec8ce3a2ba6b4d0dda89f2f4a7c6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cbb425f62df9df7abee4b3f068f7ed6ffc3561e2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/df9a40cfb3be2cbeb1c17bb67c59251ba16630f3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/669a8866e468fd020d34eb00e08cb41d3774b71b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/78fcb2c91adfec8ce3a2ba6b4d0dda89f2f4a7c6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cbb425f62df9df7abee4b3f068f7ed6ffc3561e2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/df9a40cfb3be2cbeb1c17bb67c59251ba16630f3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47231.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47231.json index f8b911e77d3..652153cbd00 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47231.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47231.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47231", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:12.477", - "lastModified": "2024-11-21T06:35:40.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:31:28.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,54 +39,179 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.12", + "versionEndExcluding": "4.14.238", + "matchCriteriaId": "FB7125C1-59F2-466B-BC25-9839D4127600" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.196", + "matchCriteriaId": "F3CAB837-7D38-4934-AD4F-195CEFD754E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.128", + "matchCriteriaId": "6267BD4E-BE25-48B5-B850-4B493440DAFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.46", + "matchCriteriaId": "59455D13-A902-42E1-97F7-5ED579777193" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "7806E7E5-6D4F-4E18-81C1-79B3C60EE855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/6bd3d80d1f019cefa7011056c54b323f1d8b8e83", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6f87c0e21ad20dd3d22108e33db1c552dfa352a0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/89df95ce32be204eef2e7d4b2f6fb552fb191a68", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/91c02557174be7f72e46ed7311e3bea1939840b0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a115198caaab6d663bef75823a3c5f0802306d60", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d0760a4ef85697bc756d06eae17ae27f3f055401", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6bd3d80d1f019cefa7011056c54b323f1d8b8e83", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6f87c0e21ad20dd3d22108e33db1c552dfa352a0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/89df95ce32be204eef2e7d4b2f6fb552fb191a68", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/91c02557174be7f72e46ed7311e3bea1939840b0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a115198caaab6d663bef75823a3c5f0802306d60", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d0760a4ef85697bc756d06eae17ae27f3f055401", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47232.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47232.json index ad8bb66d4c6..7a0320b8321 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47232.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47232.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47232", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:12.557", - "lastModified": "2024-11-21T06:35:40.883", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:31:13.503", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,38 +51,125 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4", + "versionEndExcluding": "5.4.128", + "matchCriteriaId": "8C2A72CA-7A16-4ACC-8D7D-6132A9D8B054" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.46", + "matchCriteriaId": "59455D13-A902-42E1-97F7-5ED579777193" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "7806E7E5-6D4F-4E18-81C1-79B3C60EE855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1071065eeb33d32b7d98c2ce7591881ae7381705", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2030043e616cab40f510299f09b636285e0a3678", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/22cba878abf646cd3a02ee7c8c2cef7afe66a256", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/509ab6bfdd0c76daebbad0f0af07da712116de22", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1071065eeb33d32b7d98c2ce7591881ae7381705", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2030043e616cab40f510299f09b636285e0a3678", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/22cba878abf646cd3a02ee7c8c2cef7afe66a256", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/509ab6bfdd0c76daebbad0f0af07da712116de22", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47238.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47238.json index 46397e2a99e..621b027ad8e 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47238.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47238.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47238", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:13.017", - "lastModified": "2024-11-21T06:35:41.743", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:31:03.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,62 +51,202 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.2.87", + "versionEndExcluding": "3.3", + "matchCriteriaId": "EDF220AE-D4D3-4C0B-BFCA-4DDB897A81FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.16.42", + "versionEndExcluding": "3.17", + "matchCriteriaId": "776A78BD-F513-4084-AC1D-66E45A675E72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.9", + "versionEndExcluding": "4.9.274", + "matchCriteriaId": "6B5A1555-2CC4-4652-AD96-3529D26B3447" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.238", + "matchCriteriaId": "C3C0DBBF-0923-4D2A-9178-134691F9933F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.196", + "matchCriteriaId": "F3CAB837-7D38-4934-AD4F-195CEFD754E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.128", + "matchCriteriaId": "6267BD4E-BE25-48B5-B850-4B493440DAFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.46", + "matchCriteriaId": "59455D13-A902-42E1-97F7-5ED579777193" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "7806E7E5-6D4F-4E18-81C1-79B3C60EE855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0dc13e75507faa17ac9f7562b4ef7bf8fcd78422", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1e28018b5c83d5073f74a6fb72eabe8370b2f501", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3dd2aeac2e9624cff9fa634710837e4f2e352758", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6cff57eea3347f79f1867cc53e1093b6614138d8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/77de6ee73f54a9a89c0afa0bf4c53b239aa9953a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ac31cc837cafb57a271babad8ccffbf733caa076", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d8e2973029b8b2ce477b564824431f3385c77083", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0dc13e75507faa17ac9f7562b4ef7bf8fcd78422", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1e28018b5c83d5073f74a6fb72eabe8370b2f501", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3dd2aeac2e9624cff9fa634710837e4f2e352758", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6cff57eea3347f79f1867cc53e1093b6614138d8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/77de6ee73f54a9a89c0afa0bf4c53b239aa9953a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ac31cc837cafb57a271babad8ccffbf733caa076", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d8e2973029b8b2ce477b564824431f3385c77083", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47241.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47241.json index 14a783bd065..0513e582874 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47241.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47241.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47241", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:13.250", - "lastModified": "2024-11-21T06:35:42.163", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:30:41.063", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,104 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.6", + "versionEndExcluding": "5.10.46", + "matchCriteriaId": "EE69F178-DCD1-4D17-B1CF-168946ED1F5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "7806E7E5-6D4F-4E18-81C1-79B3C60EE855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/cfc7f0e70d649e6d2233fba0d9390b525677d971", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e175aef902697826d344ce3a12189329848fe898", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fb3a948143688e14e2cfd2a2812877923d0e5e92", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cfc7f0e70d649e6d2233fba0d9390b525677d971", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e175aef902697826d344ce3a12189329848fe898", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fb3a948143688e14e2cfd2a2812877923d0e5e92", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47242.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47242.json index a478c4e383b..cf33378bb96 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47242.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47242.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47242", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:13.327", - "lastModified": "2024-11-21T06:35:42.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:30:32.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,83 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11.12", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "BED6B205-08A3-4C83-A8D7-DFE4B3FD506B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/27ef25c72373222aaa5fe7b5cd890ae9cfb89a8d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/499ada5073361c631f2a3c4a8aed44d53b6f82ec", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/27ef25c72373222aaa5fe7b5cd890ae9cfb89a8d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/499ada5073361c631f2a3c4a8aed44d53b6f82ec", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47244.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47244.json index b556a7fb401..e730fd077ee 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47244.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47244.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47244", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:13.477", - "lastModified": "2024-11-21T06:35:42.640", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:30:24.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,116 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.6", + "versionEndExcluding": "5.10.46", + "matchCriteriaId": "EE69F178-DCD1-4D17-B1CF-168946ED1F5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.13", + "matchCriteriaId": "7806E7E5-6D4F-4E18-81C1-79B3C60EE855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/07718be265680dcf496347d475ce1a5442f55ad7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/73eeba71dc9932970befa009e68272a3d5ec4a58", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/76e02b8905d0691e89e104a882f3bba7dd0f6037", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/07718be265680dcf496347d475ce1a5442f55ad7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/73eeba71dc9932970befa009e68272a3d5ec4a58", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/76e02b8905d0691e89e104a882f3bba7dd0f6037", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47257.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47257.json index 8725a245ce4..f173a2265a5 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47257.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47257.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47257", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:14.460", - "lastModified": "2024-11-21T06:35:44.263", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:30:16.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,62 +51,177 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.9.274", + "matchCriteriaId": "E1ACD353-DF74-413A-AD4F-18E1F4C7150C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.238", + "matchCriteriaId": "C3C0DBBF-0923-4D2A-9178-134691F9933F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.196", + "matchCriteriaId": "F3CAB837-7D38-4934-AD4F-195CEFD754E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.127", + "matchCriteriaId": "F4B9330C-95B8-4F1B-925D-09F7CC307E25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.45", + "matchCriteriaId": "0CF0334B-62CB-4FBC-8B76-57CC31EBDE56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.12", + "matchCriteriaId": "958321CA-952B-461A-A590-F4096CB20E02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1f95741981c899c4724647291fec5faa3c777185", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5f728ec65485625e30f46e5b4917ff023ad29ea0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9fdd04918a452980631ecc499317881c1d120b70", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c6998ccfefa652bac3f9b236821e392af43efa1e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c7836de2cadd88bc2f20f2c5a3d4ef4c73aef627", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d0f47648b87b6d5f204cb7f3cbce6d36dab85a67", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fdd51e34f45311ab6e48d2147cbc2904731b9993", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1f95741981c899c4724647291fec5faa3c777185", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5f728ec65485625e30f46e5b4917ff023ad29ea0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9fdd04918a452980631ecc499317881c1d120b70", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c6998ccfefa652bac3f9b236821e392af43efa1e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c7836de2cadd88bc2f20f2c5a3d4ef4c73aef627", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d0f47648b87b6d5f204cb7f3cbce6d36dab85a67", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fdd51e34f45311ab6e48d2147cbc2904731b9993", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47259.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47259.json index 5c672593e43..c8e5cd71a60 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47259.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47259.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47259", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:14.610", - "lastModified": "2024-11-21T06:35:44.580", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:30:09.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,54 +51,162 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.13", + "versionEndExcluding": "4.14.237", + "matchCriteriaId": "50FA0DA7-1172-4CFE-A09D-F2AEB8B0FB71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.195", + "matchCriteriaId": "23EECCE9-4D4C-4684-AB00-10C938F5DDC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.126", + "matchCriteriaId": "876275F9-BEC7-40E8-9D7F-A20729A4A4FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.44", + "matchCriteriaId": "DA547B08-9D25-467B-AD0D-8460FE4EE70D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.11", + "matchCriteriaId": "F914A757-FAFD-407E-9031-21F66635D5EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3e3c7ebbfac152d08be75c92802a64a1f6471a15", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/42c10b0db064e45f5c5ae7019bbf2168ffab766c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/476bdb04c501fc64bf3b8464ffddefc8dbe01577", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/72651c6579a25317a90536181d311c663d0329ab", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c3b6cf64dfe4ef96e7341508d50d6998da7062c7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c7eab9e2d7b4e983ce280276fb920af649955897", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3e3c7ebbfac152d08be75c92802a64a1f6471a15", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/42c10b0db064e45f5c5ae7019bbf2168ffab766c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/476bdb04c501fc64bf3b8464ffddefc8dbe01577", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/72651c6579a25317a90536181d311c663d0329ab", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c3b6cf64dfe4ef96e7341508d50d6998da7062c7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c7eab9e2d7b4e983ce280276fb920af649955897", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47267.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47267.json index dd7b535b199..ae5d32e2603 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47267.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47267.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47267", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:15.297", - "lastModified": "2024-11-21T06:35:45.593", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:30:02.130", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,62 +39,194 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.9.273", + "matchCriteriaId": "2AAF8753-C28A-4F2A-8469-E86334097252" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.237", + "matchCriteriaId": "83CDDAD5-5539-46C9-9255-C1DAC38F7905" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.195", + "matchCriteriaId": "23EECCE9-4D4C-4684-AB00-10C938F5DDC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.126", + "matchCriteriaId": "876275F9-BEC7-40E8-9D7F-A20729A4A4FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.44", + "matchCriteriaId": "DA547B08-9D25-467B-AD0D-8460FE4EE70D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.11", + "matchCriteriaId": "F914A757-FAFD-407E-9031-21F66635D5EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/032e288097a553db5653af552dd8035cd2a0ba96", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/45f9a2fe737dc0a5df270787f2231aee8985cd59", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5ef23506695b01d5d56a13a092a97f2478069d75", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/70cd19cb5bd94bbb5bacfc9c1e4ee0071699a604", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b972eff874637402ddc4a7dd11fb22538a0b6d28", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ca6bc277430d90375452b60b047763a090b7673e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fd24be23abf3e94260be0f00bb42c7e91d495f87", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/032e288097a553db5653af552dd8035cd2a0ba96", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/45f9a2fe737dc0a5df270787f2231aee8985cd59", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5ef23506695b01d5d56a13a092a97f2478069d75", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/70cd19cb5bd94bbb5bacfc9c1e4ee0071699a604", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b972eff874637402ddc4a7dd11fb22538a0b6d28", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ca6bc277430d90375452b60b047763a090b7673e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fd24be23abf3e94260be0f00bb42c7e91d495f87", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47271.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47271.json index 6804f00a9bb..223c21353ef 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47271.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47271.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47271", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:15.610", - "lastModified": "2024-11-21T06:35:46.113", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:29:54.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,90 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.11", + "matchCriteriaId": "1D627DFB-1E6A-4B08-B68C-D123B4C3D04C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/a9aecef198faae3240921b707bc09b602e966fce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ae746b6f4ce619cf4032fd798a232b010907a397", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a9aecef198faae3240921b707bc09b602e966fce", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ae746b6f4ce619cf4032fd798a232b010907a397", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47274.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47274.json index a4bd852e34d..b34005c4daa 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47274.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47274.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47274", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:15.830", - "lastModified": "2024-11-21T06:35:46.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:29:40.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,62 +51,183 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.9.258", + "versionEndExcluding": "4.9.273", + "matchCriteriaId": "D73EA9B8-6293-4837-B511-DAD9DBFA5636" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.14.222", + "versionEndExcluding": "4.14.237", + "matchCriteriaId": "678E7D52-5CA6-4608-8727-D74ED21A45B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.177", + "versionEndExcluding": "4.19.195", + "matchCriteriaId": "12CD72A1-696C-421C-AD11-87E6942FC473" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.99", + "versionEndExcluding": "5.4.126", + "matchCriteriaId": "6423589E-DA2E-4EA5-8738-C64751B2DAC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.17", + "versionEndExcluding": "5.10.44", + "matchCriteriaId": "1A5F40E7-CF49-4CBA-90AF-0CAA330EEC45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.12.11", + "matchCriteriaId": "F914A757-FAFD-407E-9031-21F66635D5EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2d598902799886d67947406f26ee8e5fd2ca097f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/31ceae385556c37e4d286cb6378696448f566883", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3e08a9f9760f4a70d633c328a76408e62d6f80a3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/43c32c22254b9328d7abb1c2b0f689dc67838e60", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b16a249eca2230c2cd66fa1d4b94743bd9b6ef92", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d63f00ec908b3be635ead5d6029cc94246e1f38d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/edcce01e0e50840a9aa6a70baed21477bdd2c9f9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2d598902799886d67947406f26ee8e5fd2ca097f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/31ceae385556c37e4d286cb6378696448f566883", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3e08a9f9760f4a70d633c328a76408e62d6f80a3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/43c32c22254b9328d7abb1c2b0f689dc67838e60", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b16a249eca2230c2cd66fa1d4b94743bd9b6ef92", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d63f00ec908b3be635ead5d6029cc94246e1f38d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/edcce01e0e50840a9aa6a70baed21477bdd2c9f9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-211xx/CVE-2022-21191.json b/CVE-2022/CVE-2022-211xx/CVE-2022-21191.json index adf1021aabd..c09ceffb615 100644 --- a/CVE-2022/CVE-2022-211xx/CVE-2022-21191.json +++ b/CVE-2022/CVE-2022-211xx/CVE-2022-21191.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21191", "sourceIdentifier": "report@snyk.io", "published": "2023-01-13T05:15:19.150", - "lastModified": "2024-11-21T06:44:04.130", + "lastModified": "2025-04-04T15:15:42.860", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -79,6 +79,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-319xx/CVE-2022-31901.json b/CVE-2022/CVE-2022-319xx/CVE-2022-31901.json index 77b6e29ebd5..efddae89297 100644 --- a/CVE-2022/CVE-2022-319xx/CVE-2022-31901.json +++ b/CVE-2022/CVE-2022-319xx/CVE-2022-31901.json @@ -2,7 +2,7 @@ "id": "CVE-2022-31901", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-19T23:15:10.530", - "lastModified": "2024-11-21T07:05:27.770", + "lastModified": "2025-04-04T15:15:43.120", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-417xx/CVE-2022-41721.json b/CVE-2022/CVE-2022-417xx/CVE-2022-41721.json index ad75e8786a9..8d2ddac2d63 100644 --- a/CVE-2022/CVE-2022-417xx/CVE-2022-41721.json +++ b/CVE-2022/CVE-2022-417xx/CVE-2022-41721.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41721", "sourceIdentifier": "security@golang.org", "published": "2023-01-13T23:15:09.250", - "lastModified": "2024-11-21T07:23:44.170", + "lastModified": "2025-04-04T15:15:43.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-437xx/CVE-2022-43717.json b/CVE-2022/CVE-2022-437xx/CVE-2022-43717.json index cfe52cce07e..2b896cd9083 100644 --- a/CVE-2022/CVE-2022-437xx/CVE-2022-43717.json +++ b/CVE-2022/CVE-2022-437xx/CVE-2022-43717.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43717", "sourceIdentifier": "security@apache.org", "published": "2023-01-16T11:15:10.370", - "lastModified": "2024-11-21T07:27:07.367", + "lastModified": "2025-04-04T14:15:19.013", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-477xx/CVE-2022-47740.json b/CVE-2022/CVE-2022-477xx/CVE-2022-47740.json index 34e52df8173..5cbb72eb295 100644 --- a/CVE-2022/CVE-2022-477xx/CVE-2022-47740.json +++ b/CVE-2022/CVE-2022-477xx/CVE-2022-47740.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47740", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-19T18:15:14.907", - "lastModified": "2024-11-21T07:32:22.593", + "lastModified": "2025-04-04T14:15:20.173", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-477xx/CVE-2022-47745.json b/CVE-2022/CVE-2022-477xx/CVE-2022-47745.json index 52f5c7f76d0..4d2aafde4b0 100644 --- a/CVE-2022/CVE-2022-477xx/CVE-2022-47745.json +++ b/CVE-2022/CVE-2022-477xx/CVE-2022-47745.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47745", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-19T18:15:15.133", - "lastModified": "2024-11-21T07:32:22.747", + "lastModified": "2025-04-04T14:15:20.397", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-478xx/CVE-2022-47881.json b/CVE-2022/CVE-2022-478xx/CVE-2022-47881.json index 9d2da6909f3..4ca2d28ceb7 100644 --- a/CVE-2022/CVE-2022-478xx/CVE-2022-47881.json +++ b/CVE-2022/CVE-2022-478xx/CVE-2022-47881.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47881", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-18T15:15:11.400", - "lastModified": "2024-11-21T07:32:27.750", + "lastModified": "2025-04-04T15:15:43.720", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0513.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0513.json index ecad17619fa..f53bbf8a46e 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0513.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0513.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0513", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-26T21:18:10.560", - "lastModified": "2024-11-21T07:37:19.303", + "lastModified": "2025-04-04T15:16:10.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -105,9 +105,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:*:*:*:*:*:*:*:*", "versionEndIncluding": "4.0.1", - "matchCriteriaId": "8EB9B216-C72A-4F50-8317-9FD529285B78" + "matchCriteriaId": "409E01F4-8288-49DA-9517-3DB8DFB45A90" } ] } diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1746.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1746.json index 6fecc54f473..3daf1dc484d 100644 --- a/CVE-2023/CVE-2023-17xx/CVE-2023-1746.json +++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1746.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1746", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-30T23:15:06.583", - "lastModified": "2024-11-21T07:39:49.140", + "lastModified": "2025-04-04T15:15:06.847", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -111,9 +111,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:*:*:*:*:*:*:*:*", "versionEndIncluding": "3.5.0", - "matchCriteriaId": "0C1C7C40-7926-43C6-A5FD-BDA75DD02CAA" + "matchCriteriaId": "CFBCDBF8-7F0C-44D7-A8BB-FE3306EB234C" } ] } diff --git a/CVE-2023/CVE-2023-228xx/CVE-2023-22851.json b/CVE-2023/CVE-2023-228xx/CVE-2023-22851.json index c5c1bebce45..443b3f1cf9e 100644 --- a/CVE-2023/CVE-2023-228xx/CVE-2023-22851.json +++ b/CVE-2023/CVE-2023-228xx/CVE-2023-22851.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22851", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-14T02:15:12.340", - "lastModified": "2024-11-21T07:45:31.440", + "lastModified": "2025-04-04T15:15:44.667", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-230xx/CVE-2023-23019.json b/CVE-2023/CVE-2023-230xx/CVE-2023-23019.json index f5ebf7e755f..7076834df48 100644 --- a/CVE-2023/CVE-2023-230xx/CVE-2023-23019.json +++ b/CVE-2023/CVE-2023-230xx/CVE-2023-23019.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23019", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T19:15:20.963", - "lastModified": "2024-11-21T07:45:48.347", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:21:22.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:blog_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "68BDD089-1167-4980-A08F-CBA3E09A73C9" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/enferas/fc3a1b4b3826d0e10cc4a021e5ec1822", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/enferas/fc3a1b4b3826d0e10cc4a021e5ec1822", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2473.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2473.json index b9aa3532d04..21ca5246124 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2473.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2473.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2473", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-02T13:15:25.090", - "lastModified": "2025-01-30T15:15:14.780", + "lastModified": "2025-04-04T15:16:10.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -131,9 +131,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:*:*:*:*:*:*:*:*", "versionEndIncluding": "4.1.3", - "matchCriteriaId": "CA07F976-C035-4B45-83A9-1414D57F3AAF" + "matchCriteriaId": "750BEC92-4A47-48DF-B0F4-FB7A4444FB65" } ] } diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27084.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27084.json index 4698902ee22..66fd4e958ab 100644 --- a/CVE-2023/CVE-2023-270xx/CVE-2023-27084.json +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27084.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27084", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-16T02:15:08.550", - "lastModified": "2025-02-26T20:15:13.003", + "lastModified": "2025-04-04T15:15:06.847", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -86,8 +86,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.0.1:*:*:*:*:*:*:*", - "matchCriteriaId": "E70A0945-89A5-4E5D-B7D2-A1BF9031A966" + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:4.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F3FBBD01-A570-42CF-8FBE-E9F2BF0D040A" } ] } diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43856.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43856.json index f8a00efa090..cff1d35872c 100644 --- a/CVE-2023/CVE-2023-438xx/CVE-2023-43856.json +++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43856.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43856", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-27T15:19:34.767", - "lastModified": "2024-11-21T08:24:53.960", + "lastModified": "2025-04-04T15:15:06.847", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,8 +60,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F8278D9D-0CD5-4659-8BD6-8A4557D57C2C" + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:4.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "113EEBC1-2B91-4AE0-995F-E24A4AD607BC" } ] } diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43857.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43857.json index 550f1d488dd..49b6695aad4 100644 --- a/CVE-2023/CVE-2023-438xx/CVE-2023-43857.json +++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43857.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43857", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-27T15:19:34.827", - "lastModified": "2024-11-21T08:24:54.103", + "lastModified": "2025-04-04T15:15:06.847", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,8 +60,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F8278D9D-0CD5-4659-8BD6-8A4557D57C2C" + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:4.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "113EEBC1-2B91-4AE0-995F-E24A4AD607BC" } ] } diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45901.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45901.json index 2a377f999d4..f81ae7b2262 100644 --- a/CVE-2023/CVE-2023-459xx/CVE-2023-45901.json +++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45901.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45901", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-17T14:15:10.033", - "lastModified": "2024-11-21T08:27:35.520", + "lastModified": "2025-04-04T15:15:06.847", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,8 +60,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F8278D9D-0CD5-4659-8BD6-8A4557D57C2C" + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:4.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "113EEBC1-2B91-4AE0-995F-E24A4AD607BC" } ] } diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45902.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45902.json index 4dc874a82ca..aa5fcc1b344 100644 --- a/CVE-2023/CVE-2023-459xx/CVE-2023-45902.json +++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45902.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45902", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-17T14:15:10.083", - "lastModified": "2024-11-21T08:27:35.683", + "lastModified": "2025-04-04T15:15:06.847", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,8 +60,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F8278D9D-0CD5-4659-8BD6-8A4557D57C2C" + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:4.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "113EEBC1-2B91-4AE0-995F-E24A4AD607BC" } ] } diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45903.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45903.json index efbb0aa8480..0d0adb60b17 100644 --- a/CVE-2023/CVE-2023-459xx/CVE-2023-45903.json +++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45903.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45903", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-17T14:15:10.140", - "lastModified": "2024-11-21T08:27:35.850", + "lastModified": "2025-04-04T15:15:06.847", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,8 +60,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F8278D9D-0CD5-4659-8BD6-8A4557D57C2C" + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:4.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "113EEBC1-2B91-4AE0-995F-E24A4AD607BC" } ] } diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45904.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45904.json index 1590088a31f..ea412dff86d 100644 --- a/CVE-2023/CVE-2023-459xx/CVE-2023-45904.json +++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45904.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45904", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-17T14:15:10.193", - "lastModified": "2024-11-21T08:27:36.010", + "lastModified": "2025-04-04T15:15:06.847", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,8 +60,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F8278D9D-0CD5-4659-8BD6-8A4557D57C2C" + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:4.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "113EEBC1-2B91-4AE0-995F-E24A4AD607BC" } ] } diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45905.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45905.json index 9ee0357d317..ac9007b50a4 100644 --- a/CVE-2023/CVE-2023-459xx/CVE-2023-45905.json +++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45905.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45905", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-17T14:15:10.247", - "lastModified": "2024-11-21T08:27:36.160", + "lastModified": "2025-04-04T15:15:06.847", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,8 +60,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F8278D9D-0CD5-4659-8BD6-8A4557D57C2C" + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:4.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "113EEBC1-2B91-4AE0-995F-E24A4AD607BC" } ] } diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45906.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45906.json index 7082c100a5e..b35d9463a9c 100644 --- a/CVE-2023/CVE-2023-459xx/CVE-2023-45906.json +++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45906.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45906", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-17T14:15:10.307", - "lastModified": "2024-11-21T08:27:36.310", + "lastModified": "2025-04-04T15:15:06.847", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,8 +60,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F8278D9D-0CD5-4659-8BD6-8A4557D57C2C" + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:4.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "113EEBC1-2B91-4AE0-995F-E24A4AD607BC" } ] } diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45907.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45907.json index 304bf950ec5..7f8972d3794 100644 --- a/CVE-2023/CVE-2023-459xx/CVE-2023-45907.json +++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45907.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45907", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-17T14:15:10.360", - "lastModified": "2024-11-21T08:27:36.457", + "lastModified": "2025-04-04T15:15:06.847", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,8 +60,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F8278D9D-0CD5-4659-8BD6-8A4557D57C2C" + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:4.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "113EEBC1-2B91-4AE0-995F-E24A4AD607BC" } ] } diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46886.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46886.json index 69a29316bbb..3cf3a1304c8 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46886.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46886.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46886", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-29T05:15:07.863", - "lastModified": "2024-11-21T08:29:27.850", + "lastModified": "2025-04-04T15:15:06.847", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -90,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.0.1", - "matchCriteriaId": "A95C60AA-7AF7-4345-A810-25BC0EA1A570" + "matchCriteriaId": "F4A6F4C7-2954-4269-8385-C039A20F5A87" } ] } diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46887.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46887.json index 575fbfb5a8e..b46b9b0dd40 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46887.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46887.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46887", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-29T05:15:07.980", - "lastModified": "2024-11-21T08:29:28.070", + "lastModified": "2025-04-04T15:15:06.847", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,9 +60,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:*:*:*:*:*:*:*:*", "versionEndExcluding": "4.0.1", - "matchCriteriaId": "A95C60AA-7AF7-4345-A810-25BC0EA1A570" + "matchCriteriaId": "F4A6F4C7-2954-4269-8385-C039A20F5A87" } ] } diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4743.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4743.json index fcb90a516d2..ca93a0b33e0 100644 --- a/CVE-2023/CVE-2023-47xx/CVE-2023-4743.json +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4743.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4743", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-03T23:15:40.147", - "lastModified": "2024-11-21T08:35:52.860", + "lastModified": "2025-04-04T15:16:10.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -105,9 +105,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:*:*:*:*:*:*:*:*", "versionEndIncluding": "4.1.3", - "matchCriteriaId": "CA07F976-C035-4B45-83A9-1414D57F3AAF" + "matchCriteriaId": "750BEC92-4A47-48DF-B0F4-FB7A4444FB65" } ] } diff --git a/CVE-2023/CVE-2023-480xx/CVE-2023-48017.json b/CVE-2023/CVE-2023-480xx/CVE-2023-48017.json index ac5b4de5eec..857b3380f37 100644 --- a/CVE-2023/CVE-2023-480xx/CVE-2023-48017.json +++ b/CVE-2023/CVE-2023-480xx/CVE-2023-48017.json @@ -2,7 +2,7 @@ "id": "CVE-2023-48017", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-18T02:15:47.780", - "lastModified": "2024-11-21T08:30:59.873", + "lastModified": "2025-04-04T15:15:06.847", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,8 +60,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F8278D9D-0CD5-4659-8BD6-8A4557D57C2C" + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:4.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "113EEBC1-2B91-4AE0-995F-E24A4AD607BC" } ] } diff --git a/CVE-2023/CVE-2023-480xx/CVE-2023-48058.json b/CVE-2023/CVE-2023-480xx/CVE-2023-48058.json index 92628d3943d..22ed474b238 100644 --- a/CVE-2023/CVE-2023-480xx/CVE-2023-48058.json +++ b/CVE-2023/CVE-2023-480xx/CVE-2023-48058.json @@ -2,7 +2,7 @@ "id": "CVE-2023-48058", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-13T16:15:28.080", - "lastModified": "2024-11-21T08:31:03.437", + "lastModified": "2025-04-04T15:15:06.847", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -90,8 +90,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F8278D9D-0CD5-4659-8BD6-8A4557D57C2C" + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:4.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "113EEBC1-2B91-4AE0-995F-E24A4AD607BC" } ] } diff --git a/CVE-2023/CVE-2023-480xx/CVE-2023-48060.json b/CVE-2023/CVE-2023-480xx/CVE-2023-48060.json index cbb0e15a3a5..6980456dffb 100644 --- a/CVE-2023/CVE-2023-480xx/CVE-2023-48060.json +++ b/CVE-2023/CVE-2023-480xx/CVE-2023-48060.json @@ -2,7 +2,7 @@ "id": "CVE-2023-48060", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-13T16:15:28.150", - "lastModified": "2024-11-21T08:31:03.663", + "lastModified": "2025-04-04T15:15:06.847", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -90,8 +90,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F8278D9D-0CD5-4659-8BD6-8A4557D57C2C" + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:4.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "113EEBC1-2B91-4AE0-995F-E24A4AD607BC" } ] } diff --git a/CVE-2023/CVE-2023-480xx/CVE-2023-48063.json b/CVE-2023/CVE-2023-480xx/CVE-2023-48063.json index 92034009320..180fd696a6d 100644 --- a/CVE-2023/CVE-2023-480xx/CVE-2023-48063.json +++ b/CVE-2023/CVE-2023-480xx/CVE-2023-48063.json @@ -2,7 +2,7 @@ "id": "CVE-2023-48063", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-13T16:15:28.200", - "lastModified": "2024-11-21T08:31:03.913", + "lastModified": "2025-04-04T15:15:06.847", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -60,8 +60,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dreamer_cms_project:dreamer_cms:4.1.3:*:*:*:*:*:*:*", - "matchCriteriaId": "F8278D9D-0CD5-4659-8BD6-8A4557D57C2C" + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:4.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "113EEBC1-2B91-4AE0-995F-E24A4AD607BC" } ] } diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52481.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52481.json index 9a7a7157203..786902c0d14 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52481.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52481.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52481", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-29T06:15:46.060", - "lastModified": "2024-11-21T08:39:52.207", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:59:11.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,105 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.1.57", + "matchCriteriaId": "B0041281-C5B1-49C7-A2E4-004BB44E0F38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.5.7", + "matchCriteriaId": "830A824C-F212-4FDC-ADEF-0EBEC6B2365B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*", + "matchCriteriaId": "84267A4F-DBC2-444F-B41D-69E15E1BEC97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*", + "matchCriteriaId": "FB440208-241C-4246-9A83-C1715C0DAA6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*", + "matchCriteriaId": "0DC421F1-3D5A-4BEF-BF76-4E468985D20B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*", + "matchCriteriaId": "00AB783B-BE05-40E8-9A55-6AA457D95031" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/32b0a4ffcaea44a00a61e40c0d1bcc50362aee25", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/471470bc7052d28ce125901877dd10e4c048e513", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6e3ae2927b432a3b7c8374f14dbc1bd9ebe4372c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/32b0a4ffcaea44a00a61e40c0d1bcc50362aee25", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/471470bc7052d28ce125901877dd10e4c048e513", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6e3ae2927b432a3b7c8374f14dbc1bd9ebe4372c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52492.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52492.json index 339c4550b40..1e1ca4f1189 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52492.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52492.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52492", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-11T18:15:16.877", - "lastModified": "2024-11-21T08:39:53.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:41:10.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,58 +51,159 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.6", + "versionEndExcluding": "5.10.210", + "matchCriteriaId": "9681BF9E-71B2-4874-8F0D-A24B65CC7ACD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.149", + "matchCriteriaId": "0D0465BB-4053-4E15-9137-6696EBAE90FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.76", + "matchCriteriaId": "32F0FEB3-5FE1-4400-A56D-886F09BE872E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.15", + "matchCriteriaId": "87C718CB-AE3D-4B07-B4D9-BFF64183C468" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.3", + "matchCriteriaId": "58FD5308-148A-40D3-B36A-0CA6B434A8BF" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/047fce470412ab64cb7345f9ff5d06919078ad79", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2ab32986a0b9e329eb7f8f04dd57cc127f797c08", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7f0ccfad2031eddcc510caf4e57f2d4aa2d8a50b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9263fd2a63487c6d04cbb7b74a48fb12e1e352d0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9de69732dde4e443c1c7f89acbbed2c45a6a8e17", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f5c24d94512f1b288262beda4d3dcb9629222fc7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/047fce470412ab64cb7345f9ff5d06919078ad79", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2ab32986a0b9e329eb7f8f04dd57cc127f797c08", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7f0ccfad2031eddcc510caf4e57f2d4aa2d8a50b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9263fd2a63487c6d04cbb7b74a48fb12e1e352d0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9de69732dde4e443c1c7f89acbbed2c45a6a8e17", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f5c24d94512f1b288262beda4d3dcb9629222fc7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52581.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52581.json index b334ba8af83..36a39f2cd54 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52581.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52581.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52581", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:49.727", - "lastModified": "2024-11-21T08:40:07.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:46:52.070", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,62 +39,145 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.5", + "versionEndExcluding": "6.5.6", + "matchCriteriaId": "37A7D3E0-22DF-4D92-9B5E-F8505D3471A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*", + "matchCriteriaId": "84267A4F-DBC2-444F-B41D-69E15E1BEC97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*", + "matchCriteriaId": "FB440208-241C-4246-9A83-C1715C0DAA6C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/09c85f2d21ab6b5acba31a037985b13e8e6565b8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4aea243b6853d06c1d160a9955b759189aa02b14", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7cf055b43756b10aa2b851c927c940f5ed652125", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7e5d732e6902eb6a37b35480796838a145ae5f07", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a995a68e8a3b48533e47c856865d109a1f1a9d01", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cf5000a7787cbc10341091d37245a42c119d26c5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ef99506eaf1dc31feff1adfcfd68bc5535a22171", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/09c85f2d21ab6b5acba31a037985b13e8e6565b8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4aea243b6853d06c1d160a9955b759189aa02b14", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7cf055b43756b10aa2b851c927c940f5ed652125", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7e5d732e6902eb6a37b35480796838a145ae5f07", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a995a68e8a3b48533e47c856865d109a1f1a9d01", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cf5000a7787cbc10341091d37245a42c119d26c5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ef99506eaf1dc31feff1adfcfd68bc5535a22171", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52618.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52618.json index 7127bb3a28c..7fad163ada0 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52618.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52618.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52618", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-18T11:15:09.110", - "lastModified": "2024-11-21T08:40:12.740", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:51:32.453", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,58 +39,172 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.8", + "versionEndExcluding": "5.10.210", + "matchCriteriaId": "9487D7F4-8434-4668-8C1F-256A25094E23" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.149", + "matchCriteriaId": "0D0465BB-4053-4E15-9137-6696EBAE90FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.77", + "matchCriteriaId": "0FA28946-970D-4F4D-B759-4E77B28809B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.16", + "matchCriteriaId": "A5007D6A-4B58-423A-8A3A-A1A656A263C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.4", + "matchCriteriaId": "848BC44C-9D25-4557-A50A-4B8BF310FA78" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5b9ea86e662035a886ccb5c76d56793cba618827", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/95bc866c11974d3e4a9d922275ea8127ff809cf7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9e4bf6a08d1e127bcc4bd72557f2dfafc6bc7f41", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a2c6206f18104fba7f887bf4dbbfe4c41adc4339", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af7bbdac89739e2e7380387fda598848d3b7010f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f6abd5e17da33eba15df2bddc93413e76c2b55f7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5b9ea86e662035a886ccb5c76d56793cba618827", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/95bc866c11974d3e4a9d922275ea8127ff809cf7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9e4bf6a08d1e127bcc4bd72557f2dfafc6bc7f41", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a2c6206f18104fba7f887bf4dbbfe4c41adc4339", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af7bbdac89739e2e7380387fda598848d3b7010f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f6abd5e17da33eba15df2bddc93413e76c2b55f7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52699.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52699.json index 404841b6a4e..339e6168e20 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52699.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52699.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52699", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T11:15:47.507", - "lastModified": "2024-11-21T08:40:23.313", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:24:16.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,78 +39,221 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.19.312", + "matchCriteriaId": "23F858DD-6739-4BD9-9DA9-A9F5F66187C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.274", + "matchCriteriaId": "F45A0F3C-C16D-49C4-86D6-D021C3D4B834" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.215", + "matchCriteriaId": "9CD5894E-58E9-4B4A-B0F4-3E6BC134B8F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.155", + "matchCriteriaId": "F11B6314-A852-4FBD-AD84-ECE23F5C092B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.86", + "matchCriteriaId": "F5D13FF4-8931-475F-A397-FD0594589F56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.27", + "matchCriteriaId": "41504EFE-0C3F-4B7C-B855-EFE4FA9ACB84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.6", + "matchCriteriaId": "22CA5433-1303-41EF-AD4C-F4645DC01541" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/13b33feb2ebddc2b1aa607f553566b18a4af1d76", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1b4fe801b5bedec2b622ddb18e5c9bf26c63d79f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/53cb1e52c9db618c08335984d1ca80db220ccf09", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/674c1c4229e743070e09db63a23442950ff000d1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/89e8524135a3902e7563a5a59b7b5ec1bf4904ac", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a69224223746ab96d43e5db9d22d136827b7e2d3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f123dc86388cb669c3d6322702dc441abc35c31e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fd203d2c671bdee9ab77090ff394d3b71b627927", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/13b33feb2ebddc2b1aa607f553566b18a4af1d76", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1b4fe801b5bedec2b622ddb18e5c9bf26c63d79f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/53cb1e52c9db618c08335984d1ca80db220ccf09", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/674c1c4229e743070e09db63a23442950ff000d1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/89e8524135a3902e7563a5a59b7b5ec1bf4904ac", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a69224223746ab96d43e5db9d22d136827b7e2d3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f123dc86388cb669c3d6322702dc441abc35c31e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fd203d2c671bdee9ab77090ff394d3b71b627927", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6957.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6957.json index ff5f74d2139..3993c3b0784 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6957.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6957.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6957", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:09.517", - "lastModified": "2025-04-03T13:14:07.387", + "lastModified": "2025-04-04T15:45:18.910", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:wpmanageninja:fluent_forms:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:fluentforms:contact_form:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "5.1.10", - "matchCriteriaId": "A1B0A40A-ADA9-4465-88DC-6885206007C7" + "matchCriteriaId": "1ED68AB6-5CF8-4C82-A5D3-8B7AB4935C0F" } ] } diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10004.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10004.json index 078a128d544..209e87e5c5c 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10004.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10004.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10004", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-15T22:15:03.197", - "lastModified": "2024-10-16T20:35:08.850", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:36:06.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "131.2.0", + "matchCriteriaId": "E072C4E0-49F0-4DB3-936E-8CFF784E3385" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1904885", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking", + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-54/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-258xx/CVE-2024-25811.json b/CVE-2024/CVE-2024-258xx/CVE-2024-25811.json index 9696a8eaa5f..85d1f9a4415 100644 --- a/CVE-2024/CVE-2024-258xx/CVE-2024-25811.json +++ b/CVE-2024/CVE-2024-258xx/CVE-2024-25811.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25811", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-21T02:52:15.060", - "lastModified": "2024-11-21T09:01:22.550", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:12:45.133", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:4.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F3FBBD01-A570-42CF-8FBE-E9F2BF0D040A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:iteachyou:dreamer_cms:4.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "113EEBC1-2B91-4AE0-995F-E24A4AD607BC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Fei123-design/vuln/blob/master/Dreamer%20CMS%20Unauthorized%20access%20vulnerability.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/Fei123-design/vuln/blob/master/Dreamer%20CMS%20Unauthorized%20access%20vulnerability.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26633.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26633.json index bc987acdb34..cd73ff46fa4 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26633.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26633.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26633", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-18T11:15:09.867", - "lastModified": "2024-12-20T13:15:19.710", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:49:01.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,82 +39,681 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.19.306", + "matchCriteriaId": "9E6972CF-7270-4681-AC42-1BC6AAEB7CDE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.268", + "matchCriteriaId": "991BF737-6083-429B-ACD5-FB27D4143E2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.209", + "matchCriteriaId": "74979A03-4B10-4815-AE3E-C8C0D2FDAA39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.148", + "matchCriteriaId": "2ED0CDB9-61B0-408E-B2A8-5199107F7868" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.75", + "matchCriteriaId": "070D0ED3-90D0-4F95-B1FF-57D7F46F332D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.14", + "matchCriteriaId": "5C6B50A6-3D8B-4CE2-BDCC-A098609CBA14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.2", + "matchCriteriaId": "7229C448-E0C9-488B-8939-36BA5254065E" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:*", + "matchCriteriaId": "C2D814BE-93EC-42EF-88C5-EA7E7DF07BE5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:a1k_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F65C59D-249A-4790-892C-B78CF82E51CF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:a1k:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9F1BD97F-CA60-4401-B1A0-EC4EA5647251" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:a70_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6F7D6B02-55FE-4BF1-8607-A0D703E61055" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:a70:*:*:*:*:*:*:*:*", + "matchCriteriaId": "532FE51E-41FA-4BFF-81E6-4A6B2666F6F8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:a90_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "550C1E38-56A3-4676-9D28-D66F66BA2FC8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:a90:*:*:*:*:*:*:*:*", + "matchCriteriaId": "E0DD2BF6-0943-48C4-BB63-840FC7F0376D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:a800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B36CECA5-4545-49C2-92EB-B739407B207F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:a800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5FE69B5A-CFC0-470E-9846-7D8086814986" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:c800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5AE3364-DB2D-4543-B1E2-175BF8BEBEE7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:c800:*:*:*:*:*:*:*:*", + "matchCriteriaId": "11E837C7-F91E-4486-B0FD-3222E69AB17D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:a900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93B9B933-7D69-4B33-8983-C1CEC000B38B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:a900:*:*:*:*:*:*:*:*", + "matchCriteriaId": "048F04A2-5630-453A-A855-E9314B2BAB62" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:9500_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "866CB169-576D-4ED7-AB9A-2C01D60C26D6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:9500:*:*:*:*:*:*:*:*", + "matchCriteriaId": "27E91650-A0AF-43BF-985D-7F89D8E8CD31" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:c190_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75A43965-CB2E-4C28-AFC3-1ADE7A6B845C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:c190:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8D3202DD-7616-4C9E-AFA1-61A1311F6C42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:a150_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "775078AE-16E0-4AF6-9022-372FC2852107" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:a150:*:*:*:*:*:*:*:*", + "matchCriteriaId": "23BA50E9-44A7-4443-AAE7-59911BB24EFE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:a220_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4F2D2745-242C-4603-899E-70C9025BDDD2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:a220:*:*:*:*:*:*:*:*", + "matchCriteriaId": "92AFCF5D-1291-4E75-A12B-B95BBDAC3440" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:fas2720_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B7FD1DA9-7980-4643-B378-7095892DA176" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:fas2720:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9C227886-9186-49C3-A2B1-A0C1D5E5705A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:fas2750_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD661062-0D5B-4671-9D92-FEF8D7395C1E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:fas2750:*:*:*:*:*:*:*:*", + "matchCriteriaId": "50B5C295-3711-4002-9D6D-72B6A237F650" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:fas2820_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F997DB9A-AF66-4CE1-B33B-A04493ECBA19" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:fas2820:*:*:*:*:*:*:*:*", + "matchCriteriaId": "22D33DD7-EB3F-4B85-B9F8-1D744112C9E0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89612649-BACF-4FAC-9BA4-324724FD93A6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h610c:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3A2FDC2F-BC6C-4845-BF4F-572B7A1432C6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD7CFE0E-9D1E-4495-B302-89C3096FC0DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h610s:*:*:*:*:*:*:*:*", + "matchCriteriaId": "80A6BDDA-17BE-4EE5-BEFC-F24235A3C9F3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5921A877-18BF-43FE-915C-D226E140ACFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netapp:h615c:*:*:*:*:*:*:*:*", + "matchCriteriaId": "136641AA-7976-4F2D-8336-D75F440D2058" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/135414f300c5db995e2a2f3bf0f455de9d014aee", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3f15ba3dc14e6ee002ea01b4faddc3d49200377c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4329426cf6b8e22b798db2331c7ef1dd2a9c748d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/62a1fedeb14c7ac0947ef33fadbabd35ed2400a2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/687c5d52fe53e602e76826dbd4d7af412747e183", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ba8d904c274268b18ef3dc11d3ca7b24a96cb087", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d375b98e0248980681e5e56b712026174d617198", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/da23bd709b46168f7dfc36055801011222b076cd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/135414f300c5db995e2a2f3bf0f455de9d014aee", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3f15ba3dc14e6ee002ea01b4faddc3d49200377c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4329426cf6b8e22b798db2331c7ef1dd2a9c748d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/62a1fedeb14c7ac0947ef33fadbabd35ed2400a2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/687c5d52fe53e602e76826dbd4d7af412747e183", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ba8d904c274268b18ef3dc11d3ca7b24a96cb087", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d375b98e0248980681e5e56b712026174d617198", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/da23bd709b46168f7dfc36055801011222b076cd", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20241220-0001/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26723.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26723.json index 32df6a03b46..acb1f24b257 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26723.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26723.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26723", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T15:15:54.143", - "lastModified": "2024-11-21T09:02:55.350", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:04:57.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,38 +51,115 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1", + "versionEndExcluding": "6.1.79", + "matchCriteriaId": "6C98214F-2BB3-4FAF-A9B6-CEFB3F97E58B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.18", + "matchCriteriaId": "BD961E49-FEDA-47CF-BF23-4D2BD942B4E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.6", + "matchCriteriaId": "C6D6A5C8-7308-42A9-8A72-ABF3DEA4BB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/15faa1f67ab405d47789d4702f587ec7df7ef03e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2a492f01228b7d091dfe38974ef40dccf8f9f2f1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/48fae67d837488c87379f0c9f27df7391718477c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b9357489c46c7a43999964628db8b47d3a1f8672", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/15faa1f67ab405d47789d4702f587ec7df7ef03e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2a492f01228b7d091dfe38974ef40dccf8f9f2f1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/48fae67d837488c87379f0c9f27df7391718477c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b9357489c46c7a43999964628db8b47d3a1f8672", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26737.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26737.json index 5a57ae94c91..6556b4105be 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26737.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26737.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26737", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:51.243", - "lastModified": "2024-11-21T09:02:57.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:34:28.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,46 +39,153 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.150", + "matchCriteriaId": "CD186D78-4011-4C0F-87C3-C9E66FC1D487" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.80", + "matchCriteriaId": "BA7850CE-97C9-4408-A348-6173296BCA2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.19", + "matchCriteriaId": "8D82004C-B2AE-4048-9344-32EFF65953B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0281b919e175bb9c3128bd3872ac2903e9436e3f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5268bb02107b9eedfdcd51db75b407d10043368c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7d80a9e745fa5b47da3bca001f186c02485c7c33", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8327ed12e8ebc5436bfaa1786c49988894f9c8a6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/addf5e297e6cbf5341f9c07720693ca9ba0057b5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0281b919e175bb9c3128bd3872ac2903e9436e3f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5268bb02107b9eedfdcd51db75b407d10043368c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7d80a9e745fa5b47da3bca001f186c02485c7c33", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8327ed12e8ebc5436bfaa1786c49988894f9c8a6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/addf5e297e6cbf5341f9c07720693ca9ba0057b5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26744.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26744.json index 9db48fbc900..bc5f8bc09dd 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26744.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26744.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26744", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:51.627", - "lastModified": "2024-11-21T09:02:58.190", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:33:24.960", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,70 +51,212 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3", + "versionEndExcluding": "4.19.308", + "matchCriteriaId": "C99F8CEC-4E57-4634-85BD-6185877083C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.10.211", + "matchCriteriaId": "FA50FF69-4911-4529-BD66-2C558219CF6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.150", + "matchCriteriaId": "CB6C60DE-9E0C-46C5-904D-D4F4031F8E95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.80", + "matchCriteriaId": "BA7850CE-97C9-4408-A348-6173296BCA2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.19", + "matchCriteriaId": "8D82004C-B2AE-4048-9344-32EFF65953B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5a5c039dac1b1b7ba3e91c791f4421052bf79b82", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/84f1dac960cfa210a3b7a7522e6c2320ae91932b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/989af2f29342a9a7c7515523d879b698ac8465f4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aee4dcfe17219fe60f2821923adea98549060af8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c99a827d3cff9f84e1cb997b7cc6386d107aa74d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fdfa083549de5d50ebf7f6811f33757781e838c0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fe2a73d57319feab4b3b175945671ce43492172f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5a5c039dac1b1b7ba3e91c791f4421052bf79b82", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/84f1dac960cfa210a3b7a7522e6c2320ae91932b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/989af2f29342a9a7c7515523d879b698ac8465f4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aee4dcfe17219fe60f2821923adea98549060af8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c99a827d3cff9f84e1cb997b7cc6386d107aa74d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fdfa083549de5d50ebf7f6811f33757781e838c0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fe2a73d57319feab4b3b175945671ce43492172f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26745.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26745.json index e851427dc82..4e8a0874d3d 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26745.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26745.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26745", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:07.713", - "lastModified": "2024-11-21T09:02:58.403", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:12:28.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,38 +39,142 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.19.2", + "versionEndExcluding": "6.1.81", + "matchCriteriaId": "4ACC7DC7-7507-45C0-A6E1-83E11B1EB2C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.21", + "matchCriteriaId": "B19074A2-9FE5-4E7D-9E2D-020F95013ADA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.9", + "matchCriteriaId": "1C538467-EDA0-4A9A-82EB-2925DE9FF827" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.18.18:*:*:*:*:*:*:*", + "matchCriteriaId": "10554B6D-B852-450C-BED6-E1A809C423AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", + "matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/09a3c1e46142199adcee372a420b024b4fc61051", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5da6d306f315344af1ca2eff4bd9b10b130f0c28", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7eb95e0af5c9c2e6fad50356eaf32d216d0e7bc3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d4d1e4b1513d975961de7bb4f75e450a92d65ebf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/09a3c1e46142199adcee372a420b024b4fc61051", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5da6d306f315344af1ca2eff4bd9b10b130f0c28", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7eb95e0af5c9c2e6fad50356eaf32d216d0e7bc3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d4d1e4b1513d975961de7bb4f75e450a92d65ebf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26747.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26747.json index 8b1256c1c32..8320c5eee35 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26747.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26747.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26747", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:51.680", - "lastModified": "2024-11-21T09:02:58.743", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:32:01.163", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,58 +51,184 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19", + "versionEndExcluding": "5.10.211", + "matchCriteriaId": "4CF1F665-F75F-44AC-A478-F527038476AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.150", + "matchCriteriaId": "CB6C60DE-9E0C-46C5-904D-D4F4031F8E95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.80", + "matchCriteriaId": "BA7850CE-97C9-4408-A348-6173296BCA2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.19", + "matchCriteriaId": "8D82004C-B2AE-4048-9344-32EFF65953B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0158216805ca7e498d07de38840d2732166ae5fa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/01f82de440f2ab07c259b7573371e1c42e5565db", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1c9be13846c0b2abc2480602f8ef421360e1ad9e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4b45829440b1b208948b39cc71f77a37a2536734", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e279bf8e51893e1fe160b3d8126ef2dd00f661e1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ef982fc41055fcebb361a92288d3225783d12913", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0158216805ca7e498d07de38840d2732166ae5fa", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/01f82de440f2ab07c259b7573371e1c42e5565db", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1c9be13846c0b2abc2480602f8ef421360e1ad9e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4b45829440b1b208948b39cc71f77a37a2536734", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e279bf8e51893e1fe160b3d8126ef2dd00f661e1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ef982fc41055fcebb361a92288d3225783d12913", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26755.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26755.json index 78f1b61f8d0..0fba274b884 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26755.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26755.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26755", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:52.103", - "lastModified": "2024-11-21T09:02:59.840", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:30:49.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,90 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/60d6130d0ac1d883ed93c2a1e10aadb60967fd48", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9e46c70e829bddc24e04f963471e9983a11598b7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/60d6130d0ac1d883ed93c2a1e10aadb60967fd48", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9e46c70e829bddc24e04f963471e9983a11598b7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26757.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26757.json index 75472f7fb51..0e965868407 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26757.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26757.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26757", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:52.207", - "lastModified": "2024-11-21T09:03:00.147", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:30:42.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.8", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "EE20C08B-77CC-4CF7-A5CD-5157B5F7C0F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2ea169c5a0b1134d573d07fc27a16f327ad0e7d3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/55a48ad2db64737f7ffc0407634218cc6e4c513b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2ea169c5a0b1134d573d07fc27a16f327ad0e7d3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/55a48ad2db64737f7ffc0407634218cc6e4c513b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26758.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26758.json index 93e50f1b9f1..db8e5ffc231 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26758.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26758.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26758", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:52.263", - "lastModified": "2024-11-21T09:03:00.333", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:30:16.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "8BFBD4BD-8E19-4C1E-92AD-87A88145AA96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1baae052cccd08daf9a9d64c3f959d8cdb689757", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a55f0d6179a19c6b982e2dc344d58c98647a3be0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1baae052cccd08daf9a9d64c3f959d8cdb689757", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a55f0d6179a19c6b982e2dc344d58c98647a3be0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26768.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26768.json index acda13ee37f..819139aabb1 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26768.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26768.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26768", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:52.800", - "lastModified": "2024-11-21T09:03:01.570", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:19:41.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,89 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.19", + "versionEndExcluding": "6.6.19", + "matchCriteriaId": "296B2324-E9B8-417F-A82B-B8C508688E14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0f6810e39898af2d2cabd9313e4dbc945fb5dfdd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4551b30525cf3d2f026b92401ffe241eb04dfebe", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/88e189bd16e5889e44a41b3309558ebab78b9280", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0f6810e39898af2d2cabd9313e4dbc945fb5dfdd", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4551b30525cf3d2f026b92401ffe241eb04dfebe", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/88e189bd16e5889e44a41b3309558ebab78b9280", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26769.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26769.json index 40283dd0dd9..17136ff4330 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26769.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26769.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26769", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:52.853", - "lastModified": "2024-11-21T09:03:01.763", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:17:18.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,46 +39,137 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.150", + "matchCriteriaId": "7A7524E0-82D9-422E-BD7A-99C27CD188A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.80", + "matchCriteriaId": "BA7850CE-97C9-4408-A348-6173296BCA2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.19", + "matchCriteriaId": "8D82004C-B2AE-4048-9344-32EFF65953B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1d86f79287206deec36d63b89c741cf542b6cadd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5e0bc09a52b6169ce90f7ac6e195791adb16cec4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/710c69dbaccdac312e32931abcb8499c1525d397", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9e6987f8937a7bd7516aa52f25cb7e12c0c92ee8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eaf0971fdabf2a93c1429dc6bedf3bbe85dffa30", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1d86f79287206deec36d63b89c741cf542b6cadd", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5e0bc09a52b6169ce90f7ac6e195791adb16cec4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/710c69dbaccdac312e32931abcb8499c1525d397", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9e6987f8937a7bd7516aa52f25cb7e12c0c92ee8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eaf0971fdabf2a93c1429dc6bedf3bbe85dffa30", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26772.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26772.json index 77e5367cf72..e73682af634 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26772.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26772.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26772", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:53.023", - "lastModified": "2024-11-21T09:03:02.190", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:16:47.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,78 +39,229 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.19.308", + "matchCriteriaId": "B6FB6042-3E0F-4A36-8DED-B3C350612BDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.270", + "matchCriteriaId": "5D8044B1-C7E8-44A4-9F03-A4D7BCDB1721" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.211", + "matchCriteriaId": "7DDA4DCF-671D-415D-94DF-6E3C77DF0704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.150", + "matchCriteriaId": "CB6C60DE-9E0C-46C5-904D-D4F4031F8E95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.80", + "matchCriteriaId": "BA7850CE-97C9-4408-A348-6173296BCA2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.19", + "matchCriteriaId": "8D82004C-B2AE-4048-9344-32EFF65953B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/21dbe20589c7f48e9c5d336ce6402bcebfa6d76a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5a6dcc4ad0f7f7fa8e8d127b5526e7c5f2d38a43", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6b92b1bc16d691c95b152c6dbf027ad64315668d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/832698373a25950942c04a512daa652c18a9b513", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8de8305a25bfda607fc13475ebe84b978c96d7ff", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d3bbe77a76bc52e9d4d0a120f1509be36e25c916", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d639102f4cbd4cb65d1225dba3b9265596aab586", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ffeb72a80a82aba59a6774b0611f792e0ed3b0b7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/21dbe20589c7f48e9c5d336ce6402bcebfa6d76a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5a6dcc4ad0f7f7fa8e8d127b5526e7c5f2d38a43", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6b92b1bc16d691c95b152c6dbf027ad64315668d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/832698373a25950942c04a512daa652c18a9b513", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8de8305a25bfda607fc13475ebe84b978c96d7ff", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d3bbe77a76bc52e9d4d0a120f1509be36e25c916", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d639102f4cbd4cb65d1225dba3b9265596aab586", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ffeb72a80a82aba59a6774b0611f792e0ed3b0b7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26779.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26779.json index 7efd2236943..076af5f6a34 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26779.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26779.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26779", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:53.423", - "lastModified": "2024-11-21T09:03:03.160", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:15:05.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,78 +51,212 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.19.308", + "matchCriteriaId": "B6FB6042-3E0F-4A36-8DED-B3C350612BDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.270", + "matchCriteriaId": "5D8044B1-C7E8-44A4-9F03-A4D7BCDB1721" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.211", + "matchCriteriaId": "7DDA4DCF-671D-415D-94DF-6E3C77DF0704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.150", + "matchCriteriaId": "CB6C60DE-9E0C-46C5-904D-D4F4031F8E95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.80", + "matchCriteriaId": "BA7850CE-97C9-4408-A348-6173296BCA2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.19", + "matchCriteriaId": "8D82004C-B2AE-4048-9344-32EFF65953B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/281280276b70c822f55ce15b661f6d1d3228aaa9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/54b79d8786964e2f840e8a2ec4a9f9a50f3d4954", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5ffab99e070b9f8ae0cf60c3c3602b84eee818dd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/76fad1174a0cae6fc857b9f88b261a2e4f07d587", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/85720b69aef177318f4a18efbcc4302228a340e5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/88c18fd06608b3adee547102505d715f21075c9d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bcbc84af1183c8cf3d1ca9b78540c2185cd85e7f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eb39bb548bf974acad7bd6780fe11f9e6652d696", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/281280276b70c822f55ce15b661f6d1d3228aaa9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/54b79d8786964e2f840e8a2ec4a9f9a50f3d4954", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5ffab99e070b9f8ae0cf60c3c3602b84eee818dd", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/76fad1174a0cae6fc857b9f88b261a2e4f07d587", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/85720b69aef177318f4a18efbcc4302228a340e5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/88c18fd06608b3adee547102505d715f21075c9d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bcbc84af1183c8cf3d1ca9b78540c2185cd85e7f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eb39bb548bf974acad7bd6780fe11f9e6652d696", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26785.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26785.json index fe4f12b796e..7ecaeb3fd35 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26785.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26785.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26785", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:08.187", - "lastModified": "2024-11-21T09:03:03.967", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:04:07.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,26 +51,90 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.7.9", + "matchCriteriaId": "C85279DE-3279-481E-B737-8FD30F6B3A47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", + "matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/cf7c2789822db8b5efa34f5ebcf1621bc0008d48", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fc719ecbca45c9c046640d72baddba3d83e0bc0b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fd4d5cd7a2e8f08357c9bfc0905957cffe8ce568", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cf7c2789822db8b5efa34f5ebcf1621bc0008d48", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fc719ecbca45c9c046640d72baddba3d83e0bc0b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26786.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26786.json index c3e07a4b68f..414e6e59d63 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26786.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26786.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26786", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:08.247", - "lastModified": "2024-11-21T09:03:04.153", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:29:50.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,104 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.21", + "matchCriteriaId": "084897EF-9F0A-4459-ADD9-E47D969EF093" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.9", + "matchCriteriaId": "1C538467-EDA0-4A9A-82EB-2925DE9FF827" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", + "matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/9526a46cc0c378d381560279bea9aa34c84298a0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aeb004c0cd6958e910123a1607634401009c9539", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f1fb745ee0a6fe43f1d84ec369c7e6af2310fda9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9526a46cc0c378d381560279bea9aa34c84298a0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aeb004c0cd6958e910123a1607634401009c9539", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f1fb745ee0a6fe43f1d84ec369c7e6af2310fda9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26789.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26789.json index d20075a4d1c..36fb75ffe8f 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26789.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26789.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26789", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:08.400", - "lastModified": "2024-11-21T09:03:04.573", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:29:32.797", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,38 +39,137 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndIncluding": "6.1.81", + "matchCriteriaId": "1A9913CC-4834-4BF1-84EE-DED6A4487908" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndIncluding": "6.6.21", + "matchCriteriaId": "3934D9E1-5758-4BD7-8C2C-D766A4602C73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndIncluding": "6.7.9", + "matchCriteriaId": "3631BA84-9BEC-4458-8C20-8D270B4B8BAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", + "matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/034e2d70b5c7f578200ad09955aeb2aa65d1164a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1291d278b5574819a7266568ce4c28bce9438705", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1c0cf6d19690141002889d72622b90fc01562ce4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9e8ecd4908b53941ab6f0f51584ab80c6c6606c4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/034e2d70b5c7f578200ad09955aeb2aa65d1164a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1291d278b5574819a7266568ce4c28bce9438705", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1c0cf6d19690141002889d72622b90fc01562ce4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9e8ecd4908b53941ab6f0f51584ab80c6c6606c4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26794.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26794.json index 1d3dff95b96..88c347b6998 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26794.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26794.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26794", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:08.683", - "lastModified": "2024-11-21T09:03:05.240", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:28:38.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,82 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.6.24:*:*:*:*:*:*:*", + "matchCriteriaId": "6780E887-1EB4-4EE5-9542-B333E869A101" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.7.12:*:*:*:*:*:*:*", + "matchCriteriaId": "8790AB97-4076-49F9-AEF1-60DFBD74D917" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/31d07a757c6d3430e03cc22799921569999b9a12", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a1a4a9ca77f143c00fce69c1239887ff8b813bec", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d43f8e58f10a44df8c08e7f7076f3288352cd168", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/31d07a757c6d3430e03cc22799921569999b9a12", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a1a4a9ca77f143c00fce69c1239887ff8b813bec", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d43f8e58f10a44df8c08e7f7076f3288352cd168", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26797.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26797.json index d8fbb4097c2..c865f302caa 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26797.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26797.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26797", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:08.843", - "lastModified": "2024-11-21T09:03:05.660", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:28:24.440", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,83 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.9", + "matchCriteriaId": "1C538467-EDA0-4A9A-82EB-2925DE9FF827" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", + "matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0f8ca019544a252d1afb468ce840c6dcbac73af4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/50a6302cf881f67f1410461a68fe9eabd00ff31d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0f8ca019544a252d1afb468ce840c6dcbac73af4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/50a6302cf881f67f1410461a68fe9eabd00ff31d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26799.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26799.json index 02e4bd9b974..12e128806dc 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26799.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26799.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26799", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:08.953", - "lastModified": "2024-11-21T09:03:05.970", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:28:13.790", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,116 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-824" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "6.6.21", + "matchCriteriaId": "E53CB5C6-7BC3-4304-8B6F-53F9F5E348F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.9", + "matchCriteriaId": "1C538467-EDA0-4A9A-82EB-2925DE9FF827" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", + "matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1382d8b55129875b2e07c4d2a7ebc790183769ee", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/99adc8b4d2f38bf0d06483ec845bc48f60c3f8cf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d5a7726e6ea62d447b79ab5baeb537ea6bdb225b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1382d8b55129875b2e07c4d2a7ebc790183769ee", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/99adc8b4d2f38bf0d06483ec845bc48f60c3f8cf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d5a7726e6ea62d447b79ab5baeb537ea6bdb225b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26808.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26808.json index b0f5f4d1286..a9f98101a6c 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26808.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26808.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26808", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T10:15:08.943", - "lastModified": "2024-11-21T09:03:07.277", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:21:16.990", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,58 +39,176 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10", + "versionEndExcluding": "5.10.210", + "matchCriteriaId": "2D2F0709-60B3-49A5-80BB-D9815B21843F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.149", + "matchCriteriaId": "0D0465BB-4053-4E15-9137-6696EBAE90FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndIncluding": "6.1.76", + "matchCriteriaId": "5167221A-94B4-496E-8C6F-3DD86D2A7E44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.15", + "matchCriteriaId": "87C718CB-AE3D-4B07-B4D9-BFF64183C468" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.3", + "matchCriteriaId": "58FD5308-148A-40D3-B36A-0CA6B434A8BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/01acb2e8666a6529697141a6017edbf206921913", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/36a0a80f32209238469deb481967d777a3d539ee", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/70f17b48c86622217a58d5099d29242fc9adac58", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9489e214ea8f2a90345516016aa51f2db3a8cc2f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af149a46890e8285d1618bd68b8d159bdb87fdb3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e5888acbf1a3d8d021990ce6c6061fd5b2bb21b4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/01acb2e8666a6529697141a6017edbf206921913", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/36a0a80f32209238469deb481967d777a3d539ee", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/70f17b48c86622217a58d5099d29242fc9adac58", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9489e214ea8f2a90345516016aa51f2db3a8cc2f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af149a46890e8285d1618bd68b8d159bdb87fdb3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e5888acbf1a3d8d021990ce6c6061fd5b2bb21b4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30858.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30858.json index 072c3ea64aa..ad3b046b223 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30858.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30858.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30858", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-01T16:15:09.530", - "lastModified": "2024-11-21T09:12:28.333", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:45:58.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netentsec:ns-asg_firmware:6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6B9BEF1C-D57F-4289-8AE8-D29A43C8F7E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netentsec:ns-asg:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7FC64EC-FBAF-42F3-B743-C4873014168C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-edit_fire_wall.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-edit_fire_wall.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30859.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30859.json index 70e54ad3e64..ab943d70d52 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30859.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30859.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30859", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-01T16:15:20.407", - "lastModified": "2024-11-21T09:12:28.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:45:54.193", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netentsec:ns-asg_firmware:6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6B9BEF1C-D57F-4289-8AE8-D29A43C8F7E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netentsec:ns-asg:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7FC64EC-FBAF-42F3-B743-C4873014168C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-config_ISCGroupSSLCert.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-config_ISCGroupSSLCert.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30860.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30860.json index 7f4d32885b7..0ebdece9d0c 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30860.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30860.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30860", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-01T16:15:31.403", - "lastModified": "2024-11-21T09:12:28.790", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:46:05.710", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netentsec:ns-asg_firmware:6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6B9BEF1C-D57F-4289-8AE8-D29A43C8F7E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netentsec:ns-asg:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7FC64EC-FBAF-42F3-B743-C4873014168C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-export_excel_user.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-export_excel_user.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30861.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30861.json index 2744d8f48ea..5f474a4b22d 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30861.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30861.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30861", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-01T16:15:38.207", - "lastModified": "2024-11-22T20:15:08.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:46:01.493", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netentsec:ns-asg_firmware:6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6B9BEF1C-D57F-4289-8AE8-D29A43C8F7E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netentsec:ns-asg:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7FC64EC-FBAF-42F3-B743-C4873014168C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-ipsec_guide_1.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-ipsec_guide_1.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30862.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30862.json index 3f8202d1a3a..3f2a8a9ecb0 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30862.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30862.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30862", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-01T16:15:43.537", - "lastModified": "2024-11-21T09:12:29.160", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:45:49.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netentsec:ns-asg_firmware:6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6B9BEF1C-D57F-4289-8AE8-D29A43C8F7E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netentsec:ns-asg:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7FC64EC-FBAF-42F3-B743-C4873014168C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-index.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-index.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30863.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30863.json index ad11d63f85a..eb3d3e40f16 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30863.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30863.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30863", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-01T16:15:48.983", - "lastModified": "2024-11-21T09:12:29.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:45:45.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netentsec:ns-asg_firmware:6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6B9BEF1C-D57F-4289-8AE8-D29A43C8F7E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netentsec:ns-asg:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7FC64EC-FBAF-42F3-B743-C4873014168C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-history.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-history.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30864.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30864.json index 825c23d40cd..a60f06818ca 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30864.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30864.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30864", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-01T15:15:50.033", - "lastModified": "2024-12-04T21:15:23.283", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:00:37.953", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netentsec:ns-asg_firmware:6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6B9BEF1C-D57F-4289-8AE8-D29A43C8F7E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netentsec:ns-asg:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7FC64EC-FBAF-42F3-B743-C4873014168C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-config_ISCGroupTimePolicy.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-config_ISCGroupTimePolicy.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30865.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30865.json index 001a6371e52..20f64653c06 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30865.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30865.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30865", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-01T15:15:55.440", - "lastModified": "2024-11-21T09:12:29.737", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:00:28.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netentsec:ns-asg_firmware:6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6B9BEF1C-D57F-4289-8AE8-D29A43C8F7E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netentsec:ns-asg:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7FC64EC-FBAF-42F3-B743-C4873014168C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-edit_user_login.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-edit_user_login.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30866.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30866.json index ccf2c97b3d1..11162ad0313 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30866.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30866.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30866", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-01T15:16:00.997", - "lastModified": "2024-11-21T09:12:29.950", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:00:11.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netentsec:ns-asg_firmware:6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6B9BEF1C-D57F-4289-8AE8-D29A43C8F7E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netentsec:ns-asg:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7FC64EC-FBAF-42F3-B743-C4873014168C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-menu.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-menu.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30867.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30867.json index 3f907fb0d37..cefb85ef013 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30867.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30867.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30867", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-01T16:15:54.380", - "lastModified": "2024-11-21T09:12:30.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:45:41.450", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netentsec:ns-asg_firmware:6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6B9BEF1C-D57F-4289-8AE8-D29A43C8F7E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netentsec:ns-asg:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7FC64EC-FBAF-42F3-B743-C4873014168C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-edit_virtual_site_info.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-edit_virtual_site_info.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30868.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30868.json index d023bb75a0d..c552e19ec51 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30868.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30868.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30868", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-01T13:17:17.327", - "lastModified": "2024-11-21T09:12:30.403", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:01:18.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netentsec:ns-asg_firmware:6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6B9BEF1C-D57F-4289-8AE8-D29A43C8F7E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netentsec:ns-asg:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7FC64EC-FBAF-42F3-B743-C4873014168C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-add_getlogin.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-add_getlogin.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30870.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30870.json index 73341b14857..c08338b7876 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30870.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30870.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30870", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-01T13:17:28.247", - "lastModified": "2024-11-21T09:12:30.617", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:01:12.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netentsec:ns-asg_firmware:6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6B9BEF1C-D57F-4289-8AE8-D29A43C8F7E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netentsec:ns-asg:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7FC64EC-FBAF-42F3-B743-C4873014168C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-address_interpret.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-address_interpret.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30871.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30871.json index 4fdf9a604e6..f31adb5017c 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30871.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30871.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30871", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-01T13:17:40.943", - "lastModified": "2024-11-21T09:12:30.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:01:05.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netentsec:ns-asg_firmware:6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6B9BEF1C-D57F-4289-8AE8-D29A43C8F7E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netentsec:ns-asg:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7FC64EC-FBAF-42F3-B743-C4873014168C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-applyhardware.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-applyhardware.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30872.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30872.json index a5605cf0753..f408e2e1319 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30872.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30872.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30872", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-01T13:17:49.043", - "lastModified": "2024-11-21T09:12:31.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:01:01.170", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netentsec:ns-asg_firmware:6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6B9BEF1C-D57F-4289-8AE8-D29A43C8F7E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netentsec:ns-asg:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7FC64EC-FBAF-42F3-B743-C4873014168C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-authrp.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-authrp.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31012.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31012.json index e7fbea6f0d0..02ebd126026 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31012.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31012.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31012", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T04:15:12.797", - "lastModified": "2024-11-21T09:12:43.630", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:50:24.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sem-cms:semcms:4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "BD382DC4-F472-49F5-AA7E-939EC76D4E8F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ss122-0ss/semcmsv4.8/blob/main/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/ss122-0ss/semcmsv4.8/blob/main/readme.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31610.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31610.json index f4295eecf59..69a3bc75afd 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31610.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31610.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31610", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-25T22:15:08.993", - "lastModified": "2024-11-21T09:13:45.137", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:39:00.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:simple_school_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D70D2A16-9686-4FBB-84B7-5E35E9CB6ADF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ss122-0ss/School/blob/main/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/ss122-0ss/School/blob/main/readme.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32349.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32349.json index bc08a1841e6..17f81f054df 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32349.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32349.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32349", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:02.243", - "lastModified": "2024-11-21T09:14:48.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:28:31.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,65 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0cu.2350_b20230313:*:*:*:*:*:*:*", + "matchCriteriaId": "AA390FB2-CCD9-4861-84D6-88CAA9DF57F3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/1s1and123/Vulnerabilities/blob/main/device/ToToLink/X5000R/TOTOLink_X5000R_RCE.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/1s1and123/Vulnerabilities/blob/main/device/ToToLink/X5000R/TOTOLink_X5000R_RCE.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32350.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32350.json index 13aa8206abd..83d4a8bd08c 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32350.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32350.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32350", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:02.543", - "lastModified": "2024-11-21T09:14:48.747", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:28:22.133", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,65 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0cu.2350_b20230313:*:*:*:*:*:*:*", + "matchCriteriaId": "AA390FB2-CCD9-4861-84D6-88CAA9DF57F3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/1s1and123/Vulnerabilities/blob/main/device/ToToLink/X5000R/TOTOLink_X5000R_RCE.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/1s1and123/Vulnerabilities/blob/main/device/ToToLink/X5000R/TOTOLink_X5000R_RCE.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32351.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32351.json index 959876609cc..4c5e6c51d9a 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32351.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32351.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32351", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:02.800", - "lastModified": "2024-11-21T09:14:48.970", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:28:12.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,65 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0cu.2350_b20230313:*:*:*:*:*:*:*", + "matchCriteriaId": "AA390FB2-CCD9-4861-84D6-88CAA9DF57F3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/1s1and123/Vulnerabilities/blob/main/device/ToToLink/X5000R/TOTOLink_X5000R_RCE.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/1s1and123/Vulnerabilities/blob/main/device/ToToLink/X5000R/TOTOLink_X5000R_RCE.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32352.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32352.json index 845bb0d8d92..7a18126ff7e 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32352.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32352.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32352", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:03.113", - "lastModified": "2024-11-21T09:14:49.197", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:28:01.343", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,65 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0cu.2350_b20230313:*:*:*:*:*:*:*", + "matchCriteriaId": "AA390FB2-CCD9-4861-84D6-88CAA9DF57F3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/1s1and123/Vulnerabilities/blob/main/device/ToToLink/X5000R/TOTOLink_X5000R_RCE.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/1s1and123/Vulnerabilities/blob/main/device/ToToLink/X5000R/TOTOLink_X5000R_RCE.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32353.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32353.json index 9ea299f5088..2c014394f66 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32353.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32353.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32353", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:03.320", - "lastModified": "2024-11-21T09:14:49.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:27:54.030", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,65 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0cu.2350_b20230313:*:*:*:*:*:*:*", + "matchCriteriaId": "AA390FB2-CCD9-4861-84D6-88CAA9DF57F3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/1s1and123/Vulnerabilities/blob/main/device/ToToLink/X5000R/TOTOLink_X5000R_RCE.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/1s1and123/Vulnerabilities/blob/main/device/ToToLink/X5000R/TOTOLink_X5000R_RCE.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32354.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32354.json index 5aaa828d7b0..b8fd00d393e 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32354.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32354.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32354", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:03.623", - "lastModified": "2024-11-21T09:14:49.650", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:27:44.107", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,65 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0cu.2350_b20230313:*:*:*:*:*:*:*", + "matchCriteriaId": "AA390FB2-CCD9-4861-84D6-88CAA9DF57F3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/1s1and123/Vulnerabilities/blob/main/device/ToToLink/X5000R/TOTOLink_X5000R_RCE.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/1s1and123/Vulnerabilities/blob/main/device/ToToLink/X5000R/TOTOLink_X5000R_RCE.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-323xx/CVE-2024-32355.json b/CVE-2024/CVE-2024-323xx/CVE-2024-32355.json index de90366b067..91865a52933 100644 --- a/CVE-2024/CVE-2024-323xx/CVE-2024-32355.json +++ b/CVE-2024/CVE-2024-323xx/CVE-2024-32355.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32355", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:03.927", - "lastModified": "2024-11-21T09:14:49.887", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:27:30.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,65 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0cu.2350_b20230313:*:*:*:*:*:*:*", + "matchCriteriaId": "AA390FB2-CCD9-4861-84D6-88CAA9DF57F3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/1s1and123/Vulnerabilities/blob/main/device/ToToLink/X5000R/TOTOLink_X5000R_RCE.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/1s1and123/Vulnerabilities/blob/main/device/ToToLink/X5000R/TOTOLink_X5000R_RCE.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.totolink.net/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34218.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34218.json index 2172e4ea573..2526afcbdf4 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34218.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34218.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34218", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:35.720", - "lastModified": "2024-11-21T09:18:18.677", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:47:14.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:cp450_firmware:4.1.0cu.747_b20191224:*:*:*:*:*:*:*", + "matchCriteriaId": "5A1BEDF3-0F30-4E52-8736-3047B590BA3B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:cp450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "690C181A-52B9-4550-8E75-0EFAF9212361" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/n0wstr/IOTVuln/tree/main/CP450/NTPSyncWithHost", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/n0wstr/IOTVuln/tree/main/CP450/NTPSyncWithHost", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34219.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34219.json index 18efbac060a..df13ce4079e 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34219.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34219.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34219", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:35.857", - "lastModified": "2024-11-21T09:18:18.893", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:47:06.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:cp450_firmware:4.1.0cu.747_b20191224:*:*:*:*:*:*:*", + "matchCriteriaId": "5A1BEDF3-0F30-4E52-8736-3047B590BA3B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:cp450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "690C181A-52B9-4550-8E75-0EFAF9212361" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/n0wstr/IOTVuln/tree/main/CP450/SetTelnetCfg", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/n0wstr/IOTVuln/tree/main/CP450/SetTelnetCfg", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34308.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34308.json index 34b887f5f65..86d83a9758d 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34308.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34308.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34308", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:38.800", - "lastModified": "2024-11-21T09:18:24.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:46:54.697", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:lr350_firmware:9.3.5u.6369_b20220309:*:*:*:*:*:*:*", + "matchCriteriaId": "6E7C618F-D415-4075-96A5-45E44B52FB62" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:lr350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CA0663B-3F55-44EF-AF32-F83AB0411748" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/totolink%20LR350/README.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34440.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34440.json index f43cde31240..712a63e0aeb 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34440.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34440.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34440", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-14T15:39:06.473", - "lastModified": "2024-11-21T09:18:40.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:46:40.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:meowapps:ai_engine:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.70", + "matchCriteriaId": "E937A8EF-B9CA-423E-91EF-0E68FFD64A75" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ai-engine/wordpress-ai-engine-plugin-2-2-63-arbitrary-file-upload-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/ai-engine/wordpress-ai-engine-plugin-2-2-63-arbitrary-file-upload-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34921.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34921.json index fa2cd550c7d..b009080a22f 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34921.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34921.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34921", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:39:37.937", - "lastModified": "2024-11-21T09:19:32.710", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:46:13.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0cu.2350_b20230313:*:*:*:*:*:*:*", + "matchCriteriaId": "AA390FB2-CCD9-4861-84D6-88CAA9DF57F3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/cainiao159357/x5000r_poc/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/cainiao159357/x5000r_poc/blob/main/README.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34942.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34942.json index fed86272f21..6a5ae06f7af 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34942.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34942.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34942", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:39:38.043", - "lastModified": "2024-11-21T09:19:35.313", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:46:04.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:fh1206_firmware:1.2.0.8\\(8155\\)_en:*:*:*:*:*:*:*", + "matchCriteriaId": "113E1616-FA42-4085-B3FB-83655BB1859A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:fh1206:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1412759D-05ED-4D6C-93C3-FE59F6A1490E" + } + ] + } + ] + } + ], "references": [ { "url": "https://palm-vertebra-fe9.notion.site/formexeCommand-200db77a90d34c708b903c935c7c65c0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://palm-vertebra-fe9.notion.site/formexeCommand-200db77a90d34c708b903c935c7c65c0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34943.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34943.json index 279638a56f1..52e5be8cd30 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34943.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34943.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34943", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:39:38.153", - "lastModified": "2024-11-21T09:19:35.537", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:45:54.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:fh1206_firmware:1.2.0.8\\(8155\\)_en:*:*:*:*:*:*:*", + "matchCriteriaId": "113E1616-FA42-4085-B3FB-83655BB1859A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:fh1206:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1412759D-05ED-4D6C-93C3-FE59F6A1490E" + } + ] + } + ] + } + ], "references": [ { "url": "https://palm-vertebra-fe9.notion.site/fromNatStaticSetting-fae26e1bfbe64b49a46230a629b6d198", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://palm-vertebra-fe9.notion.site/fromNatStaticSetting-fae26e1bfbe64b49a46230a629b6d198", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34944.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34944.json index fd235066aed..38b9771b757 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34944.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34944.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34944", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:39:38.467", - "lastModified": "2024-11-21T09:19:35.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:45:40.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,49 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:fh1206_firmware:1.2.0.8\\(8155\\)_en:*:*:*:*:*:*:*", + "matchCriteriaId": "113E1616-FA42-4085-B3FB-83655BB1859A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:fh1206:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1412759D-05ED-4D6C-93C3-FE59F6A1490E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.tendacn.com/hk/download/detail-2344.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.tendacn.com/hk/download/detail-2344.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34945.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34945.json index 57047c79bfa..312c3973f38 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34945.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34945.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34945", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:39:38.660", - "lastModified": "2024-11-21T09:19:35.970", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:29:20.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:fh1206_firmware:1.2.0.8\\(8155\\)_en:*:*:*:*:*:*:*", + "matchCriteriaId": "113E1616-FA42-4085-B3FB-83655BB1859A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:fh1206:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1412759D-05ED-4D6C-93C3-FE59F6A1490E" + } + ] + } + ] + } + ], "references": [ { "url": "https://palm-vertebra-fe9.notion.site/fromWizardHandle-98e188c072984620a907ea5df0d80ad5", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://palm-vertebra-fe9.notion.site/fromWizardHandle-98e188c072984620a907ea5df0d80ad5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34946.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34946.json index 6d4c7ae8547..900dc90791c 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34946.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34946.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34946", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:39:38.767", - "lastModified": "2024-11-21T09:19:36.183", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:29:08.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:fh1206_firmware:1.2.0.8\\(8155\\)_en:*:*:*:*:*:*:*", + "matchCriteriaId": "113E1616-FA42-4085-B3FB-83655BB1859A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:fh1206:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1412759D-05ED-4D6C-93C3-FE59F6A1490E" + } + ] + } + ] + } + ], "references": [ { "url": "https://palm-vertebra-fe9.notion.site/fromDhcpListClient_page-c9ee71f670534555a5ef2d99320da48e", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://palm-vertebra-fe9.notion.site/fromDhcpListClient_page-c9ee71f670534555a5ef2d99320da48e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34954.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34954.json index e2d436f1c1f..210a1aa4af8 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34954.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34954.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34954", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-15T15:15:08.193", - "lastModified": "2024-11-21T09:19:37.837", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:26:05.893", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:budget_management:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0F2FF1FF-1950-427C-A5EA-9C669FAE7C0D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ethicalhackerNL/CVEs/blob/main/Budget%20Management/XSS/XSS.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/ethicalhackerNL/CVEs/blob/main/Budget%20Management/XSS/XSS.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34955.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34955.json index e7eabc3d398..f780d1687d1 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34955.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34955.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34955", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-15T15:15:08.287", - "lastModified": "2024-11-21T09:19:38.043", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:25:53.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:budget_management:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0F2FF1FF-1950-427C-A5EA-9C669FAE7C0D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ethicalhackerNL/CVEs/blob/main/Budget%20Management/SQLi.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/ethicalhackerNL/CVEs/blob/main/Budget%20Management/SQLi.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35916.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35916.json index 9e345ee611a..53674888717 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35916.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35916.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35916", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T09:15:12.063", - "lastModified": "2024-11-21T09:21:11.900", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:24:30.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,38 +39,112 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1", + "versionEndExcluding": "6.1.85", + "matchCriteriaId": "C38D2C57-213F-4DA5-9086-107657F1A10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.26", + "matchCriteriaId": "C520696A-A594-4FFC-A32D-12DA535CE911" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.5", + "matchCriteriaId": "DBD6C99E-4250-4DFE-8447-FF2075939D10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0336995512cdab0c65e99e4cdd47c4606debe14e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/156c226cbbdcf5f3bce7b2408a33b59fab7fae2c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2295bd846765c766701e666ed2e4b35396be25e6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eabf131cba1db12005a68378305f13b9090a7a6b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0336995512cdab0c65e99e4cdd47c4606debe14e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/156c226cbbdcf5f3bce7b2408a33b59fab7fae2c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2295bd846765c766701e666ed2e4b35396be25e6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eabf131cba1db12005a68378305f13b9090a7a6b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35919.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35919.json index 41df365fbcf..e92d8bac3a1 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35919.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35919.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35919", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T11:15:48.303", - "lastModified": "2024-11-21T09:21:12.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:23:50.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,101 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.27", + "matchCriteriaId": "3301BF2B-8316-4F95-AE6D-3E81CA63F330" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.6", + "matchCriteriaId": "22CA5433-1303-41EF-AD4C-F4645DC01541" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", + "matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/41671f0c0182b2bae74ca7e3b0f155559e3e2fc5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/51c84a8aac6e3b59af2b0e92ba63cabe2e641a2d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/afaaf3a0f647a24a7bf6a2145d8ade37baaf75ad", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/41671f0c0182b2bae74ca7e3b0f155559e3e2fc5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/51c84a8aac6e3b59af2b0e92ba63cabe2e641a2d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/afaaf3a0f647a24a7bf6a2145d8ade37baaf75ad", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35940.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35940.json index c6446e12669..a7a597a3ebd 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35940.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35940.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35940", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T11:15:49.757", - "lastModified": "2024-11-21T09:21:15.043", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:23:41.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,58 +51,159 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.10.215", + "matchCriteriaId": "882BE7BA-C4A6-4167-8FA9-CBEDFBE98A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.155", + "matchCriteriaId": "F11B6314-A852-4FBD-AD84-ECE23F5C092B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.86", + "matchCriteriaId": "F5D13FF4-8931-475F-A397-FD0594589F56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.27", + "matchCriteriaId": "41504EFE-0C3F-4B7C-B855-EFE4FA9ACB84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.6", + "matchCriteriaId": "22CA5433-1303-41EF-AD4C-F4645DC01541" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0ff96ec22a84d80a18d7ae8ca7eb111c34ee33bb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/635594cca59f9d7a8e96187600c34facb8bc0682", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6f9f2e498eae7897ba5d3e33908917f68ff4abcc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/98bc7e26e14fbb26a6abf97603d59532475e97f8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/98e2b97acb875d65bdfc75fc408e67975cef3041", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ec7256887d072f98c42cdbef4dcc80ddf84c7a70", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0ff96ec22a84d80a18d7ae8ca7eb111c34ee33bb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/635594cca59f9d7a8e96187600c34facb8bc0682", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6f9f2e498eae7897ba5d3e33908917f68ff4abcc", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/98bc7e26e14fbb26a6abf97603d59532475e97f8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/98e2b97acb875d65bdfc75fc408e67975cef3041", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ec7256887d072f98c42cdbef4dcc80ddf84c7a70", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35947.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35947.json index 0c22a9bfbdf..263188f70e2 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35947.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35947.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35947", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T12:15:08.220", - "lastModified": "2024-11-21T09:21:15.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:23:31.930", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,82 +39,274 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.19.314", + "matchCriteriaId": "1350A539-B5DC-4612-9B61-E5516FD777D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.276", + "matchCriteriaId": "126C6EEC-8874-4233-AE09-634924FCDDF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.217", + "matchCriteriaId": "AC67C71C-2044-40BA-B590-61E562F69F89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.159", + "matchCriteriaId": "F16678CD-F7C6-4BF6-ABA8-E7600857197B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.91", + "matchCriteriaId": "4F8C886C-75AA-469B-A6A9-12BF1A29C0D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.31", + "matchCriteriaId": "CDDB1F69-36AC-41C1-9192-E7CCEF5FFC00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8..10", + "matchCriteriaId": "30BC02BF-0FD8-4E1D-9BB7-5E7DF7CC8C80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", + "matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*", + "matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*", + "matchCriteriaId": "F850DCEC-E08B-4317-A33B-D2DCF39F601B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:*", + "matchCriteriaId": "91326417-E981-482E-A5A3-28BC1327521B" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/00e7d3bea2ce7dac7bee1cf501fb071fd0ea8f6c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/343081c21e56bd6690d342e2f5ae8c00183bf081", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3c718bddddca9cbef177ac475b94c5c91147fb38", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/41d8ac238ab1cab01a8c71798d61903304f4e79b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/529e1852785599160415e964ca322ee7add7aef0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a66c869b17c4c4dcf81d273b02cb0efe88e127ab", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a69e1bdd777ce51061111dc419801e8a2fd241cc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ba3c118cff7bcb0fe6aa84ae1f9080d50e31c561", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/00e7d3bea2ce7dac7bee1cf501fb071fd0ea8f6c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/343081c21e56bd6690d342e2f5ae8c00183bf081", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3c718bddddca9cbef177ac475b94c5c91147fb38", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/41d8ac238ab1cab01a8c71798d61903304f4e79b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/529e1852785599160415e964ca322ee7add7aef0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a66c869b17c4c4dcf81d273b02cb0efe88e127ab", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a69e1bdd777ce51061111dc419801e8a2fd241cc", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ba3c118cff7bcb0fe6aa84ae1f9080d50e31c561", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00019.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35948.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35948.json index e587cf3d202..25be41d194f 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35948.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35948.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35948", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:09.440", - "lastModified": "2024-11-21T09:21:16.157", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:23:17.593", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", + "matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*", + "matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*", + "matchCriteriaId": "F850DCEC-E08B-4317-A33B-D2DCF39F601B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/fcdbc1d7a4b638e5d5668de461f320386f3002aa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fcdbc1d7a4b638e5d5668de461f320386f3002aa", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35955.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35955.json index 9fe0bb41a59..3de1242a769 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35955.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35955.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35955", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:10.850", - "lastModified": "2024-11-21T09:21:17.163", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:23:00.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,78 +51,239 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.14.291", + "versionEndExcluding": "4.15", + "matchCriteriaId": "5A5EEFF9-94C9-4B98-B433-9D09A07C3668" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.256", + "versionEndExcluding": "4.19.313", + "matchCriteriaId": "5AC59981-14D3-408D-B5A4-D0A17DDB8A23" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.211", + "versionEndExcluding": "5.4.275", + "matchCriteriaId": "EA3335E7-9267-4C3D-93F8-626223FD0C44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.137", + "versionEndExcluding": "5.10.216", + "matchCriteriaId": "F7EFD3C1-FFE1-4E51-9321-E0C1C216D7E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.61", + "versionEndExcluding": "5.15.157", + "matchCriteriaId": "F7CED2BD-9C9A-489D-81FE-5E249A63D90F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18.18", + "versionEndExcluding": "5.19", + "matchCriteriaId": "B60CAFE2-08C3-461B-B5F8-25BEB0C9853E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.19.2", + "versionEndExcluding": "6.1.87", + "matchCriteriaId": "FC550D0F-01F1-44D5-B09C-D455B0C23990" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.28", + "matchCriteriaId": "8D6315B0-B3BA-406C-B0DB-51D9A63753F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.7", + "matchCriteriaId": "531BDFB5-EF6A-4707-902E-146368303499" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", + "matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2df2dd27066cdba8041e46a64362325626bdfb2e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/325f3fb551f8cd672dbbfc4cf58b14f9ee3fc9e8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/36b57c7d2f8b7de224980f1a284432846ad71ca0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5062d1f4f07facbdade0f402d9a04a788f52e26d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/62029bc9ff2c17a4e3a2478d83418ec575413808", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/93eb31e7c3399e326259f2caa17be1e821f5a412", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b5808d40093403334d939e2c3c417144d12a6f33", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d15023fb407337028a654237d8968fefdcf87c2f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2df2dd27066cdba8041e46a64362325626bdfb2e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/325f3fb551f8cd672dbbfc4cf58b14f9ee3fc9e8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/36b57c7d2f8b7de224980f1a284432846ad71ca0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5062d1f4f07facbdade0f402d9a04a788f52e26d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/62029bc9ff2c17a4e3a2478d83418ec575413808", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/93eb31e7c3399e326259f2caa17be1e821f5a412", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b5808d40093403334d939e2c3c417144d12a6f33", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d15023fb407337028a654237d8968fefdcf87c2f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35960.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35960.json index 7f750a2375f..541601c83e4 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35960.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35960.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35960", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:11.190", - "lastModified": "2024-11-21T09:21:18.037", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:22:45.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,78 +51,225 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.19.313", + "matchCriteriaId": "6803798D-A9EC-49A2-9F75-47B1BF43B655" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.275", + "matchCriteriaId": "5FF6D8DE-C559-4586-86C8-2C6B4420A2C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.216", + "matchCriteriaId": "A44ABF89-F1BD-4C9A-895D-7596650DCD27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.156", + "matchCriteriaId": "E80AFAB4-A9F3-415C-8D6C-52D1C13F1531" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.87", + "matchCriteriaId": "BDA59296-EDB8-44CD-98E4-C08C051569E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.28", + "matchCriteriaId": "8D6315B0-B3BA-406C-B0DB-51D9A63753F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.7", + "matchCriteriaId": "531BDFB5-EF6A-4707-902E-146368303499" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", + "matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1263b0b26077b1183c3c45a0a2479573a351d423", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2e8dc5cffc844dacfa79f056dea88002312f253f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3d90ca9145f6b97b38d0c2b6b30f6ca6af9c1801", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5cf5337ef701830f173b4eec00a4f984adeb57a0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7aaee12b804c5e0374e7b132b6ec2158ff33dd64", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7c6782ad4911cbee874e85630226ed389ff2e453", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/adf67a03af39095f05d82050f15813d6f700159d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/de0139719cdda82806a47580ca0df06fc85e0bd2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1263b0b26077b1183c3c45a0a2479573a351d423", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2e8dc5cffc844dacfa79f056dea88002312f253f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3d90ca9145f6b97b38d0c2b6b30f6ca6af9c1801", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5cf5337ef701830f173b4eec00a4f984adeb57a0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7aaee12b804c5e0374e7b132b6ec2158ff33dd64", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7c6782ad4911cbee874e85630226ed389ff2e453", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/adf67a03af39095f05d82050f15813d6f700159d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/de0139719cdda82806a47580ca0df06fc85e0bd2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35969.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35969.json index 087d3af07a2..7d2fa9b364d 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35969.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35969.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35969", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:11.780", - "lastModified": "2024-11-21T09:21:19.273", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:45:29.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,78 +51,225 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.35", + "versionEndExcluding": "4.19.313", + "matchCriteriaId": "A8DD9A34-5E30-4BAA-9BDA-43ABF581D1A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.275", + "matchCriteriaId": "5FF6D8DE-C559-4586-86C8-2C6B4420A2C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.216", + "matchCriteriaId": "A44ABF89-F1BD-4C9A-895D-7596650DCD27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.156", + "matchCriteriaId": "E80AFAB4-A9F3-415C-8D6C-52D1C13F1531" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.87", + "matchCriteriaId": "BDA59296-EDB8-44CD-98E4-C08C051569E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.28", + "matchCriteriaId": "8D6315B0-B3BA-406C-B0DB-51D9A63753F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.7", + "matchCriteriaId": "531BDFB5-EF6A-4707-902E-146368303499" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", + "matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/01b11a0566670612bd464a932e5ac2eae53d8652", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3fb02ec57ead2891a2306af8c51a306bc5945e70", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4b19e9507c275de0cfe61c24db69179dc52cf9fb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6cdb20c342cd0193d3e956e3d83981d0f438bb83", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7633c4da919ad51164acbf1aa322cc1a3ead6129", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b4b3b69a19016d4e7fbdbd1dbcc184915eb862e1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cca606e14264098cba65efa82790825dbf69e903", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/de76ae9ea1a6cf9e77fcec4f2df2904e26c23ceb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/01b11a0566670612bd464a932e5ac2eae53d8652", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3fb02ec57ead2891a2306af8c51a306bc5945e70", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4b19e9507c275de0cfe61c24db69179dc52cf9fb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6cdb20c342cd0193d3e956e3d83981d0f438bb83", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7633c4da919ad51164acbf1aa322cc1a3ead6129", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b4b3b69a19016d4e7fbdbd1dbcc184915eb862e1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cca606e14264098cba65efa82790825dbf69e903", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/de76ae9ea1a6cf9e77fcec4f2df2904e26c23ceb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35970.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35970.json index 46cc947a560..cddb7a4384b 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35970.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35970.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35970", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:11.860", - "lastModified": "2024-11-21T09:21:19.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:45:14.893", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,46 +39,143 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.156", + "matchCriteriaId": "0A40A9D8-C388-43D1-AA37-C61111EB1774" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.87", + "matchCriteriaId": "BDA59296-EDB8-44CD-98E4-C08C051569E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.28", + "matchCriteriaId": "8D6315B0-B3BA-406C-B0DB-51D9A63753F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.7", + "matchCriteriaId": "531BDFB5-EF6A-4707-902E-146368303499" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", + "matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/601a89ea24d05089debfa2dc896ea9f5937ac7a6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/698a95ade1a00e6494482046902b986dfffd1caf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/84a352b7eba1142a95441380058985ff19f25ec9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b46f4eaa4f0ec38909fb0072eea3aeddb32f954e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b4bc99d04c689b5652665394ae8d3e02fb754153", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/601a89ea24d05089debfa2dc896ea9f5937ac7a6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/698a95ade1a00e6494482046902b986dfffd1caf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/84a352b7eba1142a95441380058985ff19f25ec9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b46f4eaa4f0ec38909fb0072eea3aeddb32f954e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b4bc99d04c689b5652665394ae8d3e02fb754153", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35973.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35973.json index 34022662e87..eb24c71b495 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35973.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35973.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35973", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:12.077", - "lastModified": "2024-11-21T09:21:19.967", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:33:42.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,78 +39,244 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.191", + "versionEndExcluding": "4.19.313", + "matchCriteriaId": "8DE67B9E-F9D2-4FE3-A847-2EA2AC09F9FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.119", + "versionEndExcluding": "5.4.275", + "matchCriteriaId": "0951500F-5B0E-44FA-BD8D-C942D21B1F1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.37", + "versionEndExcluding": "5.10.216", + "matchCriteriaId": "3C6008FE-823E-46E6-9409-2900A14D2611" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11.21", + "versionEndExcluding": "5.12", + "matchCriteriaId": "5D4778B3-2521-408B-900C-9048E76A0D8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12.4", + "versionEndExcluding": "5.15.156", + "matchCriteriaId": "2C3529E0-954E-4B6E-AB01-04096743E8AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.87", + "matchCriteriaId": "BDA59296-EDB8-44CD-98E4-C08C051569E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.28", + "matchCriteriaId": "8D6315B0-B3BA-406C-B0DB-51D9A63753F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.7", + "matchCriteriaId": "531BDFB5-EF6A-4707-902E-146368303499" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", + "matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/10204df9beda4978bd1d0c2db0d8375bfb03b915", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/190d9efa5773f26d6f334b1b8be282c4fa13fd5e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/357163fff3a6e48fe74745425a32071ec9caf852", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3c1ae6de74e3d2d6333d29a2d3e13e6094596c79", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/43be590456e1f3566054ce78ae2dbb68cbe1a536", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4a1b65d1e55d53b397cb27014208be1e04172670", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d3adf11d7993518a39bd02b383cfe657ccc0023c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d8a6213d70accb403b82924a1c229e733433a5ef", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/10204df9beda4978bd1d0c2db0d8375bfb03b915", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/190d9efa5773f26d6f334b1b8be282c4fa13fd5e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/357163fff3a6e48fe74745425a32071ec9caf852", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3c1ae6de74e3d2d6333d29a2d3e13e6094596c79", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/43be590456e1f3566054ce78ae2dbb68cbe1a536", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4a1b65d1e55d53b397cb27014208be1e04172670", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d3adf11d7993518a39bd02b383cfe657ccc0023c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d8a6213d70accb403b82924a1c229e733433a5ef", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35976.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35976.json index 0eed420893d..4f7a0721c18 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35976.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35976.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35976", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:12.273", - "lastModified": "2024-11-21T09:21:20.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:33:21.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,70 +51,194 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.18", + "versionEndExcluding": "4.19.317", + "matchCriteriaId": "8199FAA4-7C5C-4F16-9452-571C053D3402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.278", + "matchCriteriaId": "7FDBF235-DA18-49A1-8690-6C7272FD0701" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.216", + "matchCriteriaId": "A44ABF89-F1BD-4C9A-895D-7596650DCD27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.156", + "matchCriteriaId": "E80AFAB4-A9F3-415C-8D6C-52D1C13F1531" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.87", + "matchCriteriaId": "BDA59296-EDB8-44CD-98E4-C08C051569E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.28", + "matchCriteriaId": "8D6315B0-B3BA-406C-B0DB-51D9A63753F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.7", + "matchCriteriaId": "531BDFB5-EF6A-4707-902E-146368303499" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", + "matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0b45c25d60e38f5c2cb6823f886773a34323306d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/237f3cf13b20db183d3706d997eedc3c49eacd44", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2a523f14a3f53b46ff0e1fafd215b0bc5f6783aa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2eb979fbb2479bcd7e049f2f9978b6590dd8a0e6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a82984b3c6a7e8c7937dba6e857ddf829d149417", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b143e19dc28c3211f050f7848d87d9b0a170e10c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/beb99266830520e15fbc6ca8cc5a5240d76851fd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f0a068de65d5b7358e9aff792716afa9333f3922", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0b45c25d60e38f5c2cb6823f886773a34323306d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/237f3cf13b20db183d3706d997eedc3c49eacd44", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2a523f14a3f53b46ff0e1fafd215b0bc5f6783aa", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2eb979fbb2479bcd7e049f2f9978b6590dd8a0e6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a82984b3c6a7e8c7937dba6e857ddf829d149417", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b143e19dc28c3211f050f7848d87d9b0a170e10c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/beb99266830520e15fbc6ca8cc5a5240d76851fd", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f0a068de65d5b7358e9aff792716afa9333f3922", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35986.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35986.json index 37e4ced72ab..6deb1aaafd1 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35986.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35986.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35986", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:12.990", - "lastModified": "2024-11-21T09:21:21.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:33:00.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,38 +39,132 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "6.1.90", + "matchCriteriaId": "E7EA63C6-6BB3-46BD-BB05-AD28AC270B01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.30", + "matchCriteriaId": "84046DAF-73CF-429D-9BA4-05B658B377B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.9", + "matchCriteriaId": "5F9041E5-8358-4EF7-8F98-B812EDE49612" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", + "matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*", + "matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*", + "matchCriteriaId": "F850DCEC-E08B-4317-A33B-D2DCF39F601B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/25b3498485ac281e5851700e33b97f12c9533fd8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/73224a5d2180066c7fe05b4656647601ba08d588", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9827caa5105fb16d1fae2e75c8d0e4662014b3ca", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bf6e4ee5c43690e4c5a8a057bbcd4ff986bed052", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/25b3498485ac281e5851700e33b97f12c9533fd8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/73224a5d2180066c7fe05b4656647601ba08d588", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9827caa5105fb16d1fae2e75c8d0e4662014b3ca", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bf6e4ee5c43690e4c5a8a057bbcd4ff986bed052", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35989.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35989.json index befb6b2ea93..5765d676a46 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35989.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35989.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35989", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:13.190", - "lastModified": "2024-11-21T09:21:22.467", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:32:40.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,46 +39,153 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.13", + "versionEndExcluding": "5.15.158", + "matchCriteriaId": "455B5CF7-CA2E-4D45-87B0-103A28996A45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.90", + "matchCriteriaId": "59CEDDCF-5C0D-4939-9CFE-2F4524892DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.30", + "matchCriteriaId": "84046DAF-73CF-429D-9BA4-05B658B377B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.9", + "matchCriteriaId": "5F9041E5-8358-4EF7-8F98-B812EDE49612" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", + "matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*", + "matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*", + "matchCriteriaId": "F850DCEC-E08B-4317-A33B-D2DCF39F601B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/023b6390a15a98f9c3aa5e7da78d485d5384a08e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/47533176fdcef17b114a6f688bc872901c1ec6bb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9edd3aa34d50f27b97be30b2ba4a6af0945ff56b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f221033f5c24659dc6ad7e5cf18fb1b075f4a8be", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f976eca36cdf94e32fa4f865db0e7c427c9aa33c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/023b6390a15a98f9c3aa5e7da78d485d5384a08e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/47533176fdcef17b114a6f688bc872901c1ec6bb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9edd3aa34d50f27b97be30b2ba4a6af0945ff56b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f221033f5c24659dc6ad7e5cf18fb1b075f4a8be", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f976eca36cdf94e32fa4f865db0e7c427c9aa33c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-359xx/CVE-2024-35999.json b/CVE-2024/CVE-2024-359xx/CVE-2024-35999.json index 096e47ee87a..a6fc09f763c 100644 --- a/CVE-2024/CVE-2024-359xx/CVE-2024-35999.json +++ b/CVE-2024/CVE-2024-359xx/CVE-2024-35999.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35999", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-20T10:15:14.100", - "lastModified": "2024-11-21T09:21:23.977", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:32:31.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,38 +39,131 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.1.91", + "matchCriteriaId": "C7F044DD-06F0-44B2-8185-DCA23913A970" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.30", + "matchCriteriaId": "84046DAF-73CF-429D-9BA4-05B658B377B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.9", + "matchCriteriaId": "5F9041E5-8358-4EF7-8F98-B812EDE49612" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", + "matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", + "matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*", + "matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*", + "matchCriteriaId": "F850DCEC-E08B-4317-A33B-D2DCF39F601B" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0fcf7e219448e937681216353c9a58abae6d3c2e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/60ab245292280905603bc0d3654f4cf8fceccb00", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8094a600245e9b28eb36a13036f202ad67c1f887", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/98c7ed29cd754ae7475dc7cb3f33399fda902729", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0fcf7e219448e937681216353c9a58abae6d3c2e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/60ab245292280905603bc0d3654f4cf8fceccb00", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8094a600245e9b28eb36a13036f202ad67c1f887", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/98c7ed29cd754ae7475dc7cb3f33399fda902729", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38587.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38587.json index 1ec4954e55f..372bceca91a 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38587.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38587.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38587", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:18.800", - "lastModified": "2024-11-21T09:26:25.100", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:44:28.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,78 +39,212 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.313", + "versionEndExcluding": "4.19.316", + "matchCriteriaId": "C3A3E00C-AF83-424B-8A6F-F779432C5C82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.275", + "versionEndExcluding": "5.4.278", + "matchCriteriaId": "466FC42E-75FE-4FDC-82C6-15C3FDE27AE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.216", + "versionEndExcluding": "5.10.219", + "matchCriteriaId": "148141E6-8BE1-411A-8827-03B1166336F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.157", + "versionEndExcluding": "5.15.161", + "matchCriteriaId": "B654D858-BF90-4D2D-AF2D-A2DD8EC29BA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.88", + "versionEndExcluding": "6.1.93", + "matchCriteriaId": "5EF60D2B-5C71-49D4-92A0-0B21749968AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.29", + "versionEndExcluding": "6.6.33", + "matchCriteriaId": "B20F2535-E6A9-4C11-B5CE-3CE990AD9C22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8.8", + "versionEndExcluding": "6.8.12", + "matchCriteriaId": "30D1CFCA-A043-4D33-9686-31B2A044DE2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.9.3", + "matchCriteriaId": "E07124C1-19E8-4D21-828D-9932A01D3011" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/008ab3c53bc4f0b2f20013c8f6c204a3203d0b8b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/07ef95cc7a579731198c93beed281e3a79a0e586", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3726f75a1ccc16cd335c0ccfad1d92ee08ecba5e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/42f0a3f67158ed6b2908d2b9ffbf7e96d23fd358", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/504178fb7d9f6cdb0496d5491efb05f45597e535", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c6e1650cf5df1bd6638eeee231a683ef30c7d4eb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cd7f3978c2ec741aedd1d860b2adb227314cf996", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d52c04474feac8e305814a5228e622afe481b2ef", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eb1ea64328d4cc7d7a912c563f8523d5259716ef", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/008ab3c53bc4f0b2f20013c8f6c204a3203d0b8b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/07ef95cc7a579731198c93beed281e3a79a0e586", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3726f75a1ccc16cd335c0ccfad1d92ee08ecba5e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/42f0a3f67158ed6b2908d2b9ffbf7e96d23fd358", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/504178fb7d9f6cdb0496d5491efb05f45597e535", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c6e1650cf5df1bd6638eeee231a683ef30c7d4eb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cd7f3978c2ec741aedd1d860b2adb227314cf996", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d52c04474feac8e305814a5228e622afe481b2ef", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eb1ea64328d4cc7d7a912c563f8523d5259716ef", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42736.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42736.json index c8de9f8e250..f87e04daf47 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42736.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42736.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42736", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-13T14:15:13.160", - "lastModified": "2024-08-13T17:11:53.553", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:35:31.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0cu.2350_b20230313:*:*:*:*:*:*:*", + "matchCriteriaId": "AA390FB2-CCD9-4861-84D6-88CAA9DF57F3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/addBlacklist/addBlacklist.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-427xx/CVE-2024-42740.json b/CVE-2024/CVE-2024-427xx/CVE-2024-42740.json index c436a424f3d..3595d1ab463 100644 --- a/CVE-2024/CVE-2024-427xx/CVE-2024-42740.json +++ b/CVE-2024/CVE-2024-427xx/CVE-2024-42740.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42740", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-13T14:15:14.203", - "lastModified": "2024-08-13T17:11:53.553", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:35:41.613", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0cu.2350_b20230313:*:*:*:*:*:*:*", + "matchCriteriaId": "AA390FB2-CCD9-4861-84D6-88CAA9DF57F3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/HouseFuzz/reports/blob/main/totolink/x5000r/setLedCfg/setLedCfg.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43283.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43283.json index fc12978a86e..862dd9d8571 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43283.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43283.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43283", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-26T16:15:09.413", - "lastModified": "2024-08-26T19:10:18.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:36:52.130", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,12 +69,43 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:contest-gallery:contest_gallery:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "23.1.3", + "matchCriteriaId": "0A248796-7D89-49A2-B269-A14CBED929FA" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/contest-gallery/wordpress-contest-gallery-plugin-23-1-2-unauthenticated-comment-userid-and-ip-address-disclosure-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44386.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44386.json index 31bcd66a47a..c0f5c1eecff 100644 --- a/CVE-2024/CVE-2024-443xx/CVE-2024-44386.json +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44386.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44386", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-23T16:15:07.120", - "lastModified": "2024-08-23T19:35:18.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:37:57.707", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:fh1206_firmware:1.2.0.8\\(8155\\)_en:*:*:*:*:*:*:*", + "matchCriteriaId": "113E1616-FA42-4085-B3FB-83655BB1859A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:fh1206:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1412759D-05ED-4D6C-93C3-FE59F6A1490E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/GroundCTL2MajorTom/pocs/blob/main/tenda_FH1206_buffer_overflow2.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-461xx/CVE-2024-46103.json b/CVE-2024/CVE-2024-461xx/CVE-2024-46103.json index 5eff1329b51..3716c11fcaa 100644 --- a/CVE-2024/CVE-2024-461xx/CVE-2024-46103.json +++ b/CVE-2024/CVE-2024-461xx/CVE-2024-46103.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46103", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-20T21:15:12.620", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:37:44.533", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sem-cms:semcms:4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "BD382DC4-F472-49F5-AA7E-939EC76D4E8F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/N0zoM1z0/MY-CVE/blob/main/CVE-2024-46103.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46531.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46531.json index fd3673875a7..7985254189f 100644 --- a/CVE-2024/CVE-2024-465xx/CVE-2024-46531.json +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46531.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46531", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T19:15:14.113", - "lastModified": "2024-11-01T12:57:03.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:35:57.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:vehicle_record_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4C526E65-D52A-44FC-9193-8544B55EB158" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/shouvikdutta1998/Vehicle_Record_Management_System", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47213.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47213.json index e8f3785abc3..e0932864791 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47213.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47213.json @@ -2,16 +2,55 @@ "id": "CVE-2024-47213", "sourceIdentifier": "cve@mitre.org", "published": "2025-04-03T21:15:38.647", - "lastModified": "2025-04-03T21:15:38.647", + "lastModified": "2025-04-04T14:15:20.787", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered affecting Enrich 5.1.0 and below. It involves sending a maliciously crafted Snowplow event to the pipeline. Upon receiving this event and trying to validate it, Enrich crashes and attempts to restart indefinitely. As a result, event processing would be halted." + }, + { + "lang": "es", + "value": "Se detect\u00f3 un problema que afectaba a Enrich 5.1.0 y versiones anteriores. Este problema implicaba el env\u00edo de un evento Snowplow malintencionado a la canalizaci\u00f3n. Al recibir este evento e intentar validarlo, Enrich se bloqueaba e intentaba reiniciarse indefinidamente. Como resultado, se deten\u00eda el procesamiento del evento." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://support.snowplow.io/hc/en-us/articles/26318139354909-Update-Critical-Snowplow-Security-Updates-Impact-on-Open-Source-Software-Users", diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4765.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4765.json index 6cc35b04ea9..dcb24f20133 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4765.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4765.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4765", "sourceIdentifier": "security@mozilla.org", "published": "2024-05-14T18:15:13.133", - "lastModified": "2024-11-21T09:43:33.460", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:27:03.673", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "126.0", + "matchCriteriaId": "706B671C-BEF5-488D-BCEF-3A5342A4DD1C" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871109", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-21/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871109", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-21/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4766.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4766.json index 24d95d62fd6..6d45fea895c 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4766.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4766.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4766", "sourceIdentifier": "security@mozilla.org", "published": "2024-05-14T18:15:13.393", - "lastModified": "2024-11-26T14:15:21.113", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:26:43.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,90 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "126.0", + "matchCriteriaId": "706B671C-BEF5-488D-BCEF-3A5342A4DD1C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871214", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871217", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-21/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871214", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1871217", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-21/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4773.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4773.json index 7866b25fc5a..cf104267e3d 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4773.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4773.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4773", "sourceIdentifier": "security@mozilla.org", "published": "2024-05-14T18:15:15.330", - "lastModified": "2024-11-21T09:43:34.870", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:26:28.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "126.0", + "matchCriteriaId": "706B671C-BEF5-488D-BCEF-3A5342A4DD1C" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1875248", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-21/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1875248", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-21/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4778.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4778.json index 730a55ad595..43e4188fcdb 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4778.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4778.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4778", "sourceIdentifier": "security@mozilla.org", "published": "2024-05-14T18:15:16.720", - "lastModified": "2024-11-21T09:43:35.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:26:15.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "126.0", + "matchCriteriaId": "706B671C-BEF5-488D-BCEF-3A5342A4DD1C" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1838834%2C1889291%2C1889595%2C1890204%2C1891545", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-21/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1838834%2C1889291%2C1889595%2C1890204%2C1891545", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-21/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-47xx/CVE-2024-4790.json b/CVE-2024/CVE-2024-47xx/CVE-2024-4790.json index a7f861ccf3c..c68108feb5e 100644 --- a/CVE-2024/CVE-2024-47xx/CVE-2024-4790.json +++ b/CVE-2024/CVE-2024-47xx/CVE-2024-4790.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4790", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-14T15:44:44.600", - "lastModified": "2024-11-21T09:43:36.990", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:28:44.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -118,40 +138,97 @@ "value": "CWE-24" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedecms:dedecms:5.7.114:*:*:*:*:*:*:*", + "matchCriteriaId": "1090461D-7D36-4375-AA7E-2191609B3DBE" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/gatsby2003/DedeCms/blob/main/Directory_traversal_arbitrary_file_read.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.263889", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263889", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.329483", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/gatsby2003/DedeCms/blob/main/Directory_traversal_arbitrary_file_read.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.263889", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263889", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.329483", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48283.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48283.json index a08e9810a48..25e113d6385 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48283.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48283.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48283", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-15T13:15:11.283", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:36:27.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:user_registration_\\&_login_and_user_management_system:3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "48B4855A-8E96-4F34-8235-27971366F46E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/m14r41/Writeups/blob/main/CVE/phpGurukul/User%20Registration%20%26%20Login%20and%20User%20Management%20System%20With%20admin%20panel/SQL%20Injection%20-%20Search.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4877.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4877.json index e8f3fdd4890..f05c70e4d6e 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4877.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4877.json @@ -2,16 +2,43 @@ "id": "CVE-2024-4877", "sourceIdentifier": "security@openvpn.net", "published": "2025-04-03T16:15:32.840", - "lastModified": "2025-04-03T16:15:32.840", + "lastModified": "2025-04-04T14:15:20.973", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenVPN version 2.4.0 through 2.6.10 on Windows allows an external, lesser privileged process to create a named pipe which the OpenVPN GUI component would connect to allowing it to escalate its privileges" + }, + { + "lang": "es", + "value": "Las versiones 2.4.0 a 2.6.10 de OpenVPN en Windows permiten que un proceso externo con menos privilegios cree una tuber\u00eda con nombre a la que se conectar\u00eda el componente GUI de OpenVPN, lo que le permitir\u00eda escalar sus privilegios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@openvpn.net", diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5022.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5022.json index 3fb0756feca..3905c8824fa 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5022.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5022.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5022", "sourceIdentifier": "security@mozilla.org", "published": "2024-05-17T19:15:07.537", - "lastModified": "2024-11-21T09:46:47.990", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:25:28.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox_focus:*:*:*:*:*:iphone_os:*:*", + "versionEndExcluding": "126.0", + "matchCriteriaId": "4A474B93-4C7B-4010-9326-B0CD19E0963E" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1874560", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-24/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1874560", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-24/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51066.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51066.json index 5660bad6ee5..7a9e395bba1 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51066.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51066.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51066", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T19:15:13.860", - "lastModified": "2024-11-01T21:35:05.747", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:35:51.453", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:beauty_parlour_management_system:1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A0663F5C-7E50-4432-817D-518802751580" + } + ] + } + ] + } + ], "references": [ { "url": "http://phpgurukul.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/0x1c1ph3r/CVEs/tree/main/CVE-2024-51066", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-518xx/CVE-2024-51800.json b/CVE-2024/CVE-2024-518xx/CVE-2024-51800.json new file mode 100644 index 00000000000..631c52a0806 --- /dev/null +++ b/CVE-2024/CVE-2024-518xx/CVE-2024-51800.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51800", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T14:15:21.140", + "lastModified": "2025-04-04T14:15:21.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Privilege Assignment vulnerability in Favethemes Homey allows Privilege Escalation.This issue affects Homey: from n/a through 2.4.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/homey/vulnerability/wordpress-homey-theme-2-4-1-privilege-escalation-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-527xx/CVE-2024-52725.json b/CVE-2024/CVE-2024-527xx/CVE-2024-52725.json index dfeba584393..e44144d5a31 100644 --- a/CVE-2024/CVE-2024-527xx/CVE-2024-52725.json +++ b/CVE-2024/CVE-2024-527xx/CVE-2024-52725.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52725", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-20T17:15:18.867", - "lastModified": "2024-12-02T21:15:10.977", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:06:47.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sem-cms:semcms:4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "BD382DC4-F472-49F5-AA7E-939EC76D4E8F" + } + ] + } + ] + } + ], "references": [ { "url": "http://semcms.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/Megrez0423/Seecms", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53333.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53333.json index 84f32886476..6acf4f65674 100644 --- a/CVE-2024/CVE-2024-533xx/CVE-2024-53333.json +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53333.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53333", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-21T18:15:13.587", - "lastModified": "2024-11-25T22:15:18.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:40:24.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:ex200_firmware:4.0.3c.7646_b20201211:*:*:*:*:*:*:*", + "matchCriteriaId": "DFAA2333-6AF0-4F2C-8695-0DE2024C634E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:ex200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCFDF09E-D255-4F5B-A099-71EE37A56492" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/luckysmallbird/Totolink-EX200-Vulnerability-1/blob/main/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53334.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53334.json index d90c1c6f510..efa208922ba 100644 --- a/CVE-2024/CVE-2024-533xx/CVE-2024-53334.json +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53334.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53334", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-21T18:15:13.890", - "lastModified": "2024-11-21T21:15:24.810", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:40:03.633", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:a810r_firmware:4.1.2cu.5182_b20201026:*:*:*:*:*:*:*", + "matchCriteriaId": "8FFF9A60-5961-4F2F-9365-94C5DF7F8EDA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:a810r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34981911-5839-430B-8008-EACFDFCEA2A1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/luckysmallbird/Totolink-A810R-Vulnerability-1/blob/main/1.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53335.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53335.json index ae79fbb9163..4036e8da262 100644 --- a/CVE-2024/CVE-2024-533xx/CVE-2024-53335.json +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53335.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53335", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-21T18:15:14.153", - "lastModified": "2024-11-26T18:15:19.850", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:39:54.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:a810r_firmware:4.1.2cu.5182_b20201026:*:*:*:*:*:*:*", + "matchCriteriaId": "8FFF9A60-5961-4F2F-9365-94C5DF7F8EDA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:a810r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34981911-5839-430B-8008-EACFDFCEA2A1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/luckysmallbird/Totolink-A810R-Vulnerability-1/blob/main/2.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53502.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53502.json index 0c95f694efd..91c1982fe4d 100644 --- a/CVE-2024/CVE-2024-535xx/CVE-2024-53502.json +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53502.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53502", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-03T22:15:05.683", - "lastModified": "2024-12-04T18:15:15.623", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:06:43.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sem-cms:semcms:4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "BD382DC4-F472-49F5-AA7E-939EC76D4E8F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Megrez0423/sescms4.8/tree/main", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53635.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53635.json index 2838be596bf..c44e2b42541 100644 --- a/CVE-2024/CVE-2024-536xx/CVE-2024-53635.json +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53635.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53635", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-27T14:15:19.210", - "lastModified": "2024-11-27T18:15:18.130", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:39:01.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:covid19_testing_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7A51E5EA-ACD4-433E-BC64-23B570529CF9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/COVID19/Reflected%20Cross%20Site%20Scripting.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5700.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5700.json index 3c3bbeb47ef..b527e4fa4a2 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5700.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5700.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5700", "sourceIdentifier": "security@mozilla.org", "published": "2024-06-11T13:15:51.417", - "lastModified": "2024-11-21T09:48:11.903", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:41:15.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -55,54 +55,120 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.12", + "matchCriteriaId": "D355C34D-4006-4255-B767-0EC32BDD4409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "127.0", + "matchCriteriaId": "4CF5E7C8-8673-4B56-AF92-44C08B086E02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "115.12", + "matchCriteriaId": "96ED58CE-9E3C-4354-AB12-0F26C5906650" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1862809%2C1889355%2C1893388%2C1895123", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-25/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1862809%2C1889355%2C1893388%2C1895123", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-25/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5702.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5702.json index bbcf1a5abff..bac5d22a244 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5702.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5702.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5702", "sourceIdentifier": "security@mozilla.org", "published": "2024-06-11T13:15:51.573", - "lastModified": "2024-11-21T09:48:12.273", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:41:47.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,54 +51,120 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.12", + "matchCriteriaId": "D355C34D-4006-4255-B767-0EC32BDD4409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "125.0", + "matchCriteriaId": "7334A1C6-C6BF-4C70-ADF1-736BCE0EA227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "115.12", + "matchCriteriaId": "96ED58CE-9E3C-4354-AB12-0F26C5906650" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1193389", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-18/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1193389", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00000.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00010.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-18/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-26/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-28/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6600.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6600.json index a34e8af38e8..76ffc8e7bde 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6600.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6600.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6600", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.273", - "lastModified": "2024-11-21T09:49:57.790", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:43:43.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,46 +51,113 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.13", + "matchCriteriaId": "B174E5D8-7E32-4C31-804C-6BA0CF4B1BF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.0", + "matchCriteriaId": "540E6900-1ECF-4138-9ABB-C3CC81FCF47B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "115.13", + "matchCriteriaId": "1D1AFF4D-05F4-42C8-93AE-DF09583E4569" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "116.0", + "versionEndExcluding": "128.0", + "matchCriteriaId": "B54A357A-8350-41CE-AF08-F7BE6E33CC44" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1888340", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-30/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-31/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1888340", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-30/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-31/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6601.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6601.json index 83d474eb2db..9ccba963033 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6601.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6601.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6601", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.410", - "lastModified": "2024-12-06T18:15:27.460", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:43:32.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,46 +51,106 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.0", + "matchCriteriaId": "540E6900-1ECF-4138-9ABB-C3CC81FCF47B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "128.0", + "matchCriteriaId": "11AD771B-6469-4060-AF46-8CADA9E56535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.0", + "matchCriteriaId": "F38B1ACE-990E-429F-BFA5-07EE4475D0F6" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1890748", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-30/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-31/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1890748", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-30/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-31/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6602.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6602.json index 74871a0ddb5..d5aee31abfa 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6602.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6602.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6602", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.473", - "lastModified": "2025-03-14T19:15:48.317", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:43:23.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,46 +51,113 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.13", + "matchCriteriaId": "B174E5D8-7E32-4C31-804C-6BA0CF4B1BF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.0", + "matchCriteriaId": "540E6900-1ECF-4138-9ABB-C3CC81FCF47B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "115.13", + "matchCriteriaId": "1D1AFF4D-05F4-42C8-93AE-DF09583E4569" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "116.0", + "versionEndExcluding": "128.0", + "matchCriteriaId": "B54A357A-8350-41CE-AF08-F7BE6E33CC44" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895032", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-30/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-31/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895032", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-30/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-31/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6603.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6603.json index 4f1d77de017..8a2a6df259f 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6603.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6603.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6603", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.533", - "lastModified": "2024-11-21T09:49:58.333", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:43:16.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,46 +51,113 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.13", + "matchCriteriaId": "B174E5D8-7E32-4C31-804C-6BA0CF4B1BF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.0", + "matchCriteriaId": "540E6900-1ECF-4138-9ABB-C3CC81FCF47B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "115.13", + "matchCriteriaId": "1D1AFF4D-05F4-42C8-93AE-DF09583E4569" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "116.0", + "versionEndExcluding": "128.0", + "matchCriteriaId": "B54A357A-8350-41CE-AF08-F7BE6E33CC44" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895081", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-30/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-31/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1895081", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-30/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-31/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6604.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6604.json index f9c557f4a1f..bc7ca457281 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6604.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6604.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6604", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.597", - "lastModified": "2024-11-21T09:49:58.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:42:46.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,46 +51,113 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.13", + "matchCriteriaId": "B174E5D8-7E32-4C31-804C-6BA0CF4B1BF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "126.0", + "matchCriteriaId": "706B671C-BEF5-488D-BCEF-3A5342A4DD1C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "115.13", + "matchCriteriaId": "1D1AFF4D-05F4-42C8-93AE-DF09583E4569" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "116.0", + "versionEndExcluding": "128.0", + "matchCriteriaId": "B54A357A-8350-41CE-AF08-F7BE6E33CC44" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1748105%2C1837550%2C1884266", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-30/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-31/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1748105%2C1837550%2C1884266", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-30/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-31/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6605.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6605.json index 4dbd8feb4e3..38e99e8d719 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6605.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6605.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6605", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.660", - "lastModified": "2024-11-21T09:49:58.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:42:37.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.0", + "matchCriteriaId": "540E6900-1ECF-4138-9ABB-C3CC81FCF47B" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1836786", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1836786", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6606.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6606.json index 498a2e538cf..4ee89ab66ab 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6606.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6606.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6606", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.727", - "lastModified": "2025-03-25T14:15:26.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:42:31.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,72 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.0", + "matchCriteriaId": "540E6900-1ECF-4138-9ABB-C3CC81FCF47B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.0", + "matchCriteriaId": "F38B1ACE-990E-429F-BFA5-07EE4475D0F6" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1902305", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1902305", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6611.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6611.json index dd3905976f0..d4540a4511f 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6611.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6611.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6611", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:13.047", - "lastModified": "2025-03-13T15:15:51.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:42:22.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,72 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.0", + "matchCriteriaId": "540E6900-1ECF-4138-9ABB-C3CC81FCF47B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.0", + "matchCriteriaId": "F38B1ACE-990E-429F-BFA5-07EE4475D0F6" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1844827", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1844827", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6612.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6612.json index dd16a0f5506..728a557ddf3 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6612.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6612.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6612", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:13.107", - "lastModified": "2024-11-21T09:49:59.870", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:42:13.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,72 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.0", + "matchCriteriaId": "540E6900-1ECF-4138-9ABB-C3CC81FCF47B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.0", + "matchCriteriaId": "F38B1ACE-990E-429F-BFA5-07EE4475D0F6" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1880374", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1880374", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6613.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6613.json index ab74ceeabcb..68238d67f44 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6613.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6613.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6613", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:13.170", - "lastModified": "2025-03-13T18:15:45.920", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:42:07.590", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,72 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.0", + "matchCriteriaId": "540E6900-1ECF-4138-9ABB-C3CC81FCF47B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.0", + "matchCriteriaId": "F38B1ACE-990E-429F-BFA5-07EE4475D0F6" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1900523", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1900523", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6614.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6614.json index 42611f315c2..34534b6c304 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6614.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6614.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6614", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:13.237", - "lastModified": "2024-11-21T09:50:00.240", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:42:01.330", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,72 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.0", + "matchCriteriaId": "540E6900-1ECF-4138-9ABB-C3CC81FCF47B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.0", + "matchCriteriaId": "F38B1ACE-990E-429F-BFA5-07EE4475D0F6" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1902983", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1902983", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6615.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6615.json index 87e8b47f163..e05048908fb 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6615.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6615.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6615", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:13.307", - "lastModified": "2024-11-21T09:50:00.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:41:55.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,72 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.0", + "matchCriteriaId": "540E6900-1ECF-4138-9ABB-C3CC81FCF47B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.0", + "matchCriteriaId": "F38B1ACE-990E-429F-BFA5-07EE4475D0F6" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1892875%2C1894428%2C1898364", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1892875%2C1894428%2C1898364", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7652.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7652.json index efdda6938b7..d6a5e02bd3d 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7652.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7652.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7652", "sourceIdentifier": "security@mozilla.org", "published": "2024-09-06T19:15:12.710", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:38:20.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -55,30 +55,85 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.13.0", + "matchCriteriaId": "0046277A-0AFD-48CD-9B05-ED359505081C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.0", + "matchCriteriaId": "540E6900-1ECF-4138-9ABB-C3CC81FCF47B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "115.13.0", + "matchCriteriaId": "42A41946-0238-4E99-979E-BEF87B632598" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "116.0", + "versionEndExcluding": "128.0", + "matchCriteriaId": "B54A357A-8350-41CE-AF08-F7BE6E33CC44" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1901411", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/tc39/ecma262/security/advisories/GHSA-g38c-wh3c-5h9r", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-29/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-30/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-31/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-32/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9034.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9034.json index 985f8aceb42..a7cd8758d91 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9034.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9034.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9034", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-20T15:15:18.453", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:37:21.133", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -150,26 +150,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:patient_record_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3A18F6F3-1FDD-4D63-BFB1-6E520B4EAA45" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/keepgoing2077/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.278204", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.278204", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.411119", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9035.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9035.json index 7be52100597..463c8abce54 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9035.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9035.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9035", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-20T15:15:18.800", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:37:30.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -150,26 +150,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:blood_bank_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0E2D99E2-B236-4096-ACA2-8907C29756B6" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/Kinsomnia/cve/blob/main/sql/sql.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.278205", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.278205", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.411216", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9391.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9391.json index 3965dc5eda7..b20cb42b605 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9391.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9391.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9391", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-01T16:15:10.510", - "lastModified": "2024-11-22T19:15:07.653", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:39:26.573", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "131.0", + "matchCriteriaId": "DA47FFCA-3451-462C-8FFB-47143C65E65A" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1892407", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-46/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9392.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9392.json index 0ee9392bf1b..371d97fb1c1 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9392.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9392.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9392", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-01T16:15:10.570", - "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:39:18.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,34 +51,92 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.6.0", + "matchCriteriaId": "277BD1BE-3F67-42D7-8B95-735FF00D95FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "131.0", + "matchCriteriaId": "DA47FFCA-3451-462C-8FFB-47143C65E65A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.3.0", + "matchCriteriaId": "162E998D-FC05-4428-A848-3073BC879D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "129.0", + "versionEndExcluding": "131.0", + "matchCriteriaId": "9556B29A-F934-4F99-9C7F-6506CA829DB3" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1899154", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1905843", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-46/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-47/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-48/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-49/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-50/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9395.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9395.json index 3702197a85f..1ee45741c8d 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9395.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9395.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9395", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-01T16:15:10.740", - "lastModified": "2024-11-09T08:35:08.270", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:39:09.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "131.0", + "matchCriteriaId": "DA47FFCA-3451-462C-8FFB-47143C65E65A" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1906024", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-46/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9396.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9396.json index 89b0e5e95a8..bda7aed2bfe 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9396.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9396.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9396", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-01T16:15:10.790", - "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:39:01.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,26 +51,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "128.3.0", + "matchCriteriaId": "BA7BC46B-62B5-40E4-A4D9-E05B01AA3030" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "131.0", + "matchCriteriaId": "DA47FFCA-3451-462C-8FFB-47143C65E65A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.3.0", + "matchCriteriaId": "162E998D-FC05-4428-A848-3073BC879D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "129.0", + "versionEndExcluding": "131.0", + "matchCriteriaId": "9556B29A-F934-4F99-9C7F-6506CA829DB3" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1912471", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-46/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-47/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-49/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-50/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9400.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9400.json index c511c9667fe..309df98db6c 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9400.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9400.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9400", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-01T16:15:11.040", - "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:38:55.730", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,26 +51,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "128.3.0", + "matchCriteriaId": "BA7BC46B-62B5-40E4-A4D9-E05B01AA3030" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "131.0", + "matchCriteriaId": "DA47FFCA-3451-462C-8FFB-47143C65E65A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.3.0", + "matchCriteriaId": "162E998D-FC05-4428-A848-3073BC879D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "129.0", + "versionEndExcluding": "131.0", + "matchCriteriaId": "9556B29A-F934-4F99-9C7F-6506CA829DB3" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1915249", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-46/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-47/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-49/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-50/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9401.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9401.json index 3728c0160fe..77f64d18f86 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9401.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9401.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9401", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-01T16:15:11.100", - "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:38:37.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,92 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.16.0", + "matchCriteriaId": "587491DB-EFC8-44DE-A08C-C667C36FE126" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "131.0", + "matchCriteriaId": "DA47FFCA-3451-462C-8FFB-47143C65E65A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionStartIncluding": "116.0", + "versionEndExcluding": "128.3.0", + "matchCriteriaId": "9B18FEAE-4D23-4C7D-883E-2846F9A2CDE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.3.0", + "matchCriteriaId": "162E998D-FC05-4428-A848-3073BC879D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "129.0", + "versionEndExcluding": "131.0", + "matchCriteriaId": "9556B29A-F934-4F99-9C7F-6506CA829DB3" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1916476", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-46/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-47/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-48/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-49/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-50/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9402.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9402.json index a3441c3bbeb..ac3e8a72330 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9402.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9402.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9402", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-01T16:15:11.167", - "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:38:30.770", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,26 +51,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "128.3.0", + "matchCriteriaId": "BA7BC46B-62B5-40E4-A4D9-E05B01AA3030" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "131.0", + "matchCriteriaId": "DA47FFCA-3451-462C-8FFB-47143C65E65A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.3.0", + "matchCriteriaId": "162E998D-FC05-4428-A848-3073BC879D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "129.0", + "versionEndExcluding": "131.0", + "matchCriteriaId": "9556B29A-F934-4F99-9C7F-6506CA829DB3" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1872744%2C1897792%2C1911317%2C1913445%2C1914106%2C1914475%2C1914963%2C1915008%2C1916476", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-46/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-47/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-49/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-50/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9997.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9997.json index 783ef6d0861..dcf4d9149dc 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9997.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9997.json @@ -2,13 +2,13 @@ "id": "CVE-2024-9997", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-10-29T22:15:09.490", - "lastModified": "2024-11-01T16:27:34.960", - "vulnStatus": "Analyzed", + "lastModified": "2025-04-04T15:15:46.203", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A maliciously crafted DWG file when parsed in acdb25.dll through Autodesk AutoCAD can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." + "value": "A maliciously crafted DWG file when parsed in acdb25.dll through Autodesk AutoCAD can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process." }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1428.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1428.json index c7b1e72cc0a..276d23576e9 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1428.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1428.json @@ -2,13 +2,13 @@ "id": "CVE-2025-1428", "sourceIdentifier": "psirt@autodesk.com", "published": "2025-03-13T17:15:34.900", - "lastModified": "2025-04-04T13:15:45.193", + "lastModified": "2025-04-04T15:15:46.457", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A maliciously crafted CATPART file, when parsed through Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + "value": "A maliciously crafted CATPART file, when parsed through Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1430.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1430.json index ce4fec13772..860ab7550fd 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1430.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1430.json @@ -2,13 +2,13 @@ "id": "CVE-2025-1430", "sourceIdentifier": "psirt@autodesk.com", "published": "2025-03-13T17:15:35.217", - "lastModified": "2025-04-04T13:15:45.440", + "lastModified": "2025-04-04T15:15:46.697", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A maliciously crafted SLDPRT file, when parsed through Autodesk AutoCAD, can force a Memory Corruption vulnerability.A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process." + "value": "A maliciously crafted SLDPRT file, when parsed through Autodesk AutoCAD, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process." }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1431.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1431.json index 1f82f4a27f9..a8567df823a 100644 --- a/CVE-2025/CVE-2025-14xx/CVE-2025-1431.json +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1431.json @@ -2,13 +2,13 @@ "id": "CVE-2025-1431", "sourceIdentifier": "psirt@autodesk.com", "published": "2025-03-13T17:15:35.377", - "lastModified": "2025-03-13T17:15:35.377", + "lastModified": "2025-04-04T15:15:46.800", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A maliciously crafted SLDPRT file, when parsed through Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." + "value": "A maliciously crafted SLDPRT file, when parsed through Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." }, { "lang": "es", diff --git a/CVE-2025/CVE-2025-18xx/CVE-2025-1850.json b/CVE-2025/CVE-2025-18xx/CVE-2025-1850.json index 550872bad6e..6d2307ae39e 100644 --- a/CVE-2025/CVE-2025-18xx/CVE-2025-1850.json +++ b/CVE-2025/CVE-2025-18xx/CVE-2025-1850.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1850", "sourceIdentifier": "cna@vuldb.com", "published": "2025-03-03T05:15:10.587", - "lastModified": "2025-03-03T18:15:37.077", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:19:58.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -124,26 +144,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codezips:college_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6D66318F-CC0E-4EE3-BEEF-CE8C888F9B3D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/WHOAMI-xiaoyu/CVE/blob/main/CVE_2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.298118", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.298118", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.511626", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/WHOAMI-xiaoyu/CVE/blob/main/CVE_2.md", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-19xx/CVE-2025-1930.json b/CVE-2025/CVE-2025-19xx/CVE-2025-1930.json index bfd9534a906..0771226af2b 100644 --- a/CVE-2025/CVE-2025-19xx/CVE-2025-1930.json +++ b/CVE-2025/CVE-2025-19xx/CVE-2025-1930.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1930", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:37.850", - "lastModified": "2025-03-05T17:15:13.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:16:09.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,92 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.21.0", + "matchCriteriaId": "68BC8333-E840-48AF-A5A1-44D7D74F244A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "136.0", + "matchCriteriaId": "7DB4CDD0-EC54-43D0-ACB2-F159ABA53D2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionStartIncluding": "116.0", + "versionEndExcluding": "128.8.0", + "matchCriteriaId": "4F666780-2794-46E3-86C5-3C0406FB2B34" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*", + "versionEndExcluding": "128.8", + "matchCriteriaId": "C6A9A47A-A666-43B6-8816-69AF92B19A00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*", + "versionStartExcluding": "1.28.8", + "versionEndExcluding": "136.0", + "matchCriteriaId": "7651BA82-6007-4432-BF12-25A9987FB816" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1902309", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-15/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-16/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-17/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-18/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22281.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22281.json new file mode 100644 index 00000000000..0d7224ecadd --- /dev/null +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22281.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22281", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T14:15:21.297", + "lastModified": "2025-04-04T14:15:21.297", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in joshix Simplish allows Stored XSS.This issue affects Simplish: from n/a through 2.6.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/simplish/vulnerability/wordpress-simplish-theme-2-6-4-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22285.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22285.json new file mode 100644 index 00000000000..e0cf71b35da --- /dev/null +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22285.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22285", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T14:15:21.460", + "lastModified": "2025-04-04T14:15:21.460", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Eniture Technology Pallet Packaging for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Pallet Packaging for WooCommerce: from n/a through 1.1.15." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/pallet-packaging-for-woocommerce/vulnerability/wordpress-pallet-packaging-for-woocommerce-plugin-1-1-15-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2279.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2279.json index b5788a33006..d487c32ba10 100644 --- a/CVE-2025/CVE-2025-22xx/CVE-2025-2279.json +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2279.json @@ -2,16 +2,43 @@ "id": "CVE-2025-2279", "sourceIdentifier": "contact@wpscan.com", "published": "2025-04-04T06:15:40.757", - "lastModified": "2025-04-04T06:15:40.757", + "lastModified": "2025-04-04T14:15:21.837", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Maps WordPress plugin through 1.0.6 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks." + }, + { + "lang": "es", + "value": "El complemento Maps de WordPress hasta la versi\u00f3n 1.0.6 no valida ni escapa algunos de los atributos de su c\u00f3digo corto antes de mostrarlos nuevamente en una p\u00e1gina o publicaci\u00f3n donde est\u00e1 incrustado el c\u00f3digo corto, lo que podr\u00eda permitir a los usuarios con rol de colaborador y superior realizar ataques de cross site scripting almacenado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/cd87d7ba-86e9-45b6-a3cd-11f6486f0bd0/", diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24654.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24654.json index 15244038db9..f082e3a8a7b 100644 --- a/CVE-2025/CVE-2025-246xx/CVE-2025-24654.json +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24654.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24654", "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-03T09:15:39.660", - "lastModified": "2025-03-03T09:15:39.660", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T14:48:15.770", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:squirrly:seo_plugin_by_squirrly_seo:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "12.4.08", + "matchCriteriaId": "813F909B-5DC0-4BAF-B33D-6D910ABF9C87" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/squirrly-seo/vulnerability/wordpress-squirrly-seo-plugin-12-4-05-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25604.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25604.json index d33ae862746..fa30e521080 100644 --- a/CVE-2025/CVE-2025-256xx/CVE-2025-25604.json +++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25604.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25604", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-21T19:15:14.027", - "lastModified": "2025-02-21T21:15:24.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:30:47.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6369_b20230113:*:*:*:*:*:*:*", + "matchCriteriaId": "FAA27C60-0FFD-45E3-91B1-0C2F8EBF2442" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/sezangel/IOT-vul/tree/main/Totolink/X5000R/5", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-256xx/CVE-2025-25605.json b/CVE-2025/CVE-2025-256xx/CVE-2025-25605.json index 808f93674d9..06042951368 100644 --- a/CVE-2025/CVE-2025-256xx/CVE-2025-25605.json +++ b/CVE-2025/CVE-2025-256xx/CVE-2025-25605.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25605", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-21T19:15:14.147", - "lastModified": "2025-02-21T21:15:24.317", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:29:44.367", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:x5000r_firmware:9.1.0u.6369_b20230113:*:*:*:*:*:*:*", + "matchCriteriaId": "FAA27C60-0FFD-45E3-91B1-0C2F8EBF2442" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:x5000r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC45BFB0-0CF0-4F9E-B19D-D274B17F1591" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/sezangel/IOT-vul/tree/main/Totolink/X5000R/4", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-257xx/CVE-2025-25768.json b/CVE-2025/CVE-2025-257xx/CVE-2025-25768.json index abd5a022040..d1722e34389 100644 --- a/CVE-2025/CVE-2025-257xx/CVE-2025-25768.json +++ b/CVE-2025/CVE-2025-257xx/CVE-2025-25768.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25768", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-21T19:15:14.363", - "lastModified": "2025-03-03T20:15:46.940", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-04-04T15:26:56.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mrcms:mrcms:3.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "254B64CD-32D5-4E91-8A4C-54C155EA7E0B" + } + ] + } + ] + } + ], "references": [ { "url": "https://flowus.cn/share/8838861d-0b32-4314-a13d-edb22b72cebc", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-275xx/CVE-2025-27520.json b/CVE-2025/CVE-2025-275xx/CVE-2025-27520.json new file mode 100644 index 00000000000..3e6d5510ee5 --- /dev/null +++ b/CVE-2025/CVE-2025-275xx/CVE-2025-27520.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-27520", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-04T15:15:47.927", + "lastModified": "2025-04-04T15:15:47.927", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "BentoML is a Python library for building online serving systems optimized for AI apps and model inference. A Remote Code Execution (RCE) vulnerability caused by insecure deserialization has been identified in the latest version (v1.4.2) of BentoML. It allows any unauthenticated user to execute arbitrary code on the server. It exists an unsafe code segment in serde.py. This vulnerability is fixed in 1.4.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/bentoml/BentoML/commit/b35f4f4fcc53a8c3fe8ed9c18a013fe0a728e194", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/bentoml/BentoML/security/advisories/GHSA-33xw-247w-6hmc", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/bentoml/BentoML/security/advisories/GHSA-33xw-247w-6hmc", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2786.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2786.json index c4d842de05d..2bf7cd284b8 100644 --- a/CVE-2025/CVE-2025-27xx/CVE-2025-2786.json +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2786.json @@ -2,20 +2,24 @@ "id": "CVE-2025-2786", "sourceIdentifier": "secalert@redhat.com", "published": "2025-04-02T11:15:39.300", - "lastModified": "2025-04-02T14:58:07.527", + "lastModified": "2025-04-04T14:15:22.113", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in Tempo Operator, where it creates a ServiceAccount, ClusterRole, and ClusterRoleBinding when a user deploys a TempoStack or TempoMonolithic instance. This flaw allows a user with full access to their namespace to extract the ServiceAccount token and use it to submit TokenReview and SubjectAccessReview requests, potentially revealing information about other users' permissions. While this does not allow privilege escalation or impersonation, it exposes information that could aid in gathering information for further attacks." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una falla en Tempo Operator, que crea una cuenta de servicio, un rol de cl\u00faster y un enlace de rol de cl\u00faster cuando un usuario implementa una instancia de TempoStack o TempoMonolithic. Esta falla permite a un usuario con acceso completo a su espacio de nombres extraer el token de la cuenta de servicio y usarlo para enviar solicitudes TokenReview y SubjectAccessReview, lo que podr\u00eda revelar informaci\u00f3n sobre los permisos de otros usuarios. Si bien esto no permite la escalada de privilegios ni la suplantaci\u00f3n de identidad, expone informaci\u00f3n que podr\u00eda facilitar la recopilaci\u00f3n de informaci\u00f3n para futuros ataques." } ], "metrics": { "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -48,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2025:3607", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-2786", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-27xx/CVE-2025-2798.json b/CVE-2025/CVE-2025-27xx/CVE-2025-2798.json new file mode 100644 index 00000000000..0feb057b370 --- /dev/null +++ b/CVE-2025/CVE-2025-27xx/CVE-2025-2798.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-2798", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-04-04T14:15:22.293", + "lastModified": "2025-04-04T14:15:22.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Woffice CRM theme for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 5.4.21. This is due to a misconfiguration of excluded roles during registration. This makes it possible for unauthenticated attackers to register with an Administrator role if a custom login form is being used. This can be combined with CVE-2025-2797 to bypass the user approval process if an Administrator can be tricked into taking an action such as clicking a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "http://localhost/wp-content/themes/woffice/inc/classes/Woffice_Register.php#L405", + "source": "security@wordfence.com" + }, + { + "url": "https://hub.woffice.io/woffice/changelog#april-1st-2025-version-5422", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6dd6169b-bc94-4642-8975-2e96bc01576f?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-281xx/CVE-2025-28146.json b/CVE-2025/CVE-2025-281xx/CVE-2025-28146.json new file mode 100644 index 00000000000..ceade32725b --- /dev/null +++ b/CVE-2025/CVE-2025-281xx/CVE-2025-28146.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-28146", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-04-04T14:15:21.603", + "lastModified": "2025-04-04T14:15:21.603", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Edimax AC1200 Wave 2 Dual-Band Gigabit Router BR-6478AC V3 1.0.15 was discovered to contain a command injection vulnerability via fota_url in /boafrm/formLtefotaUpgradeQuectel" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/regainer27/edimax-br-6478ac_v3-br-6478ac_v3_1.0.15/tree/main/3", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-28xx/CVE-2025-2842.json b/CVE-2025/CVE-2025-28xx/CVE-2025-2842.json index 295c164113e..31ef2106f0a 100644 --- a/CVE-2025/CVE-2025-28xx/CVE-2025-2842.json +++ b/CVE-2025/CVE-2025-28xx/CVE-2025-2842.json @@ -2,20 +2,24 @@ "id": "CVE-2025-2842", "sourceIdentifier": "secalert@redhat.com", "published": "2025-04-02T12:15:14.677", - "lastModified": "2025-04-02T14:58:07.527", + "lastModified": "2025-04-04T14:15:22.517", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A flaw was found in the Tempo Operator. When the Jaeger UI Monitor Tab functionality is enabled in a Tempo instance managed by the Tempo Operator, the Operator creates a ClusterRoleBinding for the Service Account of the Tempo instance to grant the cluster-monitoring-view ClusterRole.\nThis can be exploited if a user has 'create' permissions on TempoStack and 'get' permissions on Secret in a namespace (for example, a user has ClusterAdmin permissions for a specific namespace), as the user can read the token of the Tempo service account and therefore has access to see all cluster metrics." + }, + { + "lang": "es", + "value": "Se detect\u00f3 una falla en Tempo Operator. Al habilitar la pesta\u00f1a Monitor de la interfaz de usuario de Jaeger en una instancia de Tempo administrada por el operador Tempo, este crea un ClusterRoleBinding para la cuenta de servicio de la instancia de Tempo para otorgar el ClusterRole de vista de monitorizaci\u00f3n de cl\u00faster. Esto puede explotarse si un usuario tiene permisos de creaci\u00f3n en TempoStack y permisos de obtenci\u00f3n en Secret en un espacio de nombres (por ejemplo, un usuario tiene permisos de administrador de cl\u00faster para un espacio de nombres espec\u00edfico), ya que el usuario puede leer el token de la cuenta de servicio de Tempo y, por lo tanto, tiene acceso para ver todas las m\u00e9tricas del cl\u00faster." } ], "metrics": { "cvssMetricV31": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -48,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2025:3607", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-2842", "source": "secalert@redhat.com" diff --git a/CVE-2025/CVE-2025-311xx/CVE-2025-31130.json b/CVE-2025/CVE-2025-311xx/CVE-2025-31130.json new file mode 100644 index 00000000000..d77310ec16f --- /dev/null +++ b/CVE-2025/CVE-2025-311xx/CVE-2025-31130.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-31130", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-04T15:15:48.320", + "lastModified": "2025-04-04T15:15:48.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "gitoxide is an implementation of git written in Rust. Before 0.42.0, gitoxide uses SHA-1 hash implementations without any collision detection, leaving it vulnerable to hash collision attacks. gitoxide uses the sha1_smol or sha1 crate, both of which implement standard SHA-1 without any mitigations for collision attacks. This means that two distinct Git objects with colliding SHA-1 hashes would break the Git object model and integrity checks when used with gitoxide. This vulnerability is fixed in 0.42.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-328" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/GitoxideLabs/gitoxide/commit/4660f7a6f71873311f68f170b0f1f6659a02829d", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/GitoxideLabs/gitoxide/security/advisories/GHSA-2frx-2596-x5r6", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/GitoxideLabs/gitoxide/security/advisories/GHSA-2frx-2596-x5r6", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31381.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31381.json new file mode 100644 index 00000000000..c4f45c87cf2 --- /dev/null +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31381.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-31381", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T14:15:22.630", + "lastModified": "2025-04-04T14:15:22.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in shiptrack Booking Calendar and Notification allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Booking Calendar and Notification: from n/a through 4.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/booking-calendar-and-notification/vulnerability/wordpress-booking-calendar-and-notification-plugin-4-0-3-broken-authentication-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31384.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31384.json new file mode 100644 index 00000000000..34eb357507e --- /dev/null +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31384.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-31384", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T14:15:22.780", + "lastModified": "2025-04-04T14:15:22.780", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Aviplugins Videos allows Reflected XSS.This issue affects Videos: from n/a through 1.0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/videos/vulnerability/wordpress-videos-plugin-1-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-313xx/CVE-2025-31389.json b/CVE-2025/CVE-2025-313xx/CVE-2025-31389.json new file mode 100644 index 00000000000..1a35d264dac --- /dev/null +++ b/CVE-2025/CVE-2025-313xx/CVE-2025-31389.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-31389", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T14:15:22.940", + "lastModified": "2025-04-04T14:15:22.940", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sequel.Io Sequel allows Reflected XSS.This issue affects Sequel: from n/a through 1.0.11." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/sequel/vulnerability/wordpress-sequel-plugin-1-0-11-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31403.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31403.json new file mode 100644 index 00000000000..41979ae28d2 --- /dev/null +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31403.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-31403", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T14:15:23.090", + "lastModified": "2025-04-04T14:15:23.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in shiptrack Booking Calendar and Notification allows Blind SQL Injection.This issue affects Booking Calendar and Notification: from n/a through 4.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/booking-calendar-and-notification/vulnerability/wordpress-booking-calendar-and-notification-plugin-4-0-3-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31405.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31405.json new file mode 100644 index 00000000000..a13dc9bef5d --- /dev/null +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31405.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-31405", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T14:15:23.253", + "lastModified": "2025-04-04T14:15:23.253", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in zankover Fami WooCommerce Compare allows PHP Local File Inclusion.This issue affects Fami WooCommerce Compare: from n/a through 1.0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/fami-woocommerce-compare/vulnerability/wordpress-fami-woocommerce-compare-plugin-1-0-5-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31407.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31407.json new file mode 100644 index 00000000000..96288ada9d4 --- /dev/null +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31407.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-31407", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T14:15:23.427", + "lastModified": "2025-04-04T14:15:23.427", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hutsixdigital Tiger allows Stored XSS.This issue affects Tiger: from n/a through 2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/tiger/vulnerability/wordpress-tiger-theme-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31416.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31416.json new file mode 100644 index 00000000000..98f0dba7d1c --- /dev/null +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31416.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-31416", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T14:15:23.887", + "lastModified": "2025-04-04T14:15:23.887", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AwesomeTOGI Awesome Event Booking allows Reflected XSS.This issue affects Awesome Event Booking: from n/a through 2.8.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/awesome-event-booking/vulnerability/wordpress-awesome-event-booking-plugin-2-8-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31418.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31418.json new file mode 100644 index 00000000000..2a167e12025 --- /dev/null +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31418.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-31418", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-04-04T14:15:24.053", + "lastModified": "2025-04-04T14:15:24.053", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in noonnoo Gravel allows Reflected XSS.This issue affects Gravel: from n/a through 1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/theme/gravel/vulnerability/wordpress-gravel-theme-1-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-314xx/CVE-2025-31480.json b/CVE-2025/CVE-2025-314xx/CVE-2025-31480.json new file mode 100644 index 00000000000..e1426243bec --- /dev/null +++ b/CVE-2025/CVE-2025-314xx/CVE-2025-31480.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-31480", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-04-04T15:15:48.820", + "lastModified": "2025-04-04T15:15:48.820", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "aiven-extras is a PostgreSQL extension. This is a privilege escalation vulnerability, allowing elevation to superuser inside PostgreSQL databases that use the aiven-extras package. The vulnerability leverages the format function not being schema-prefixed. Affected users should install 1.1.16 and ensure they run the latest version issuing ALTER EXTENSION aiven_extras UPDATE TO '1.1.16' after installing it. This needs to happen in each database aiven_extras has been installed in." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/aiven/aiven-extras/commit/77b5f19a0c1d196bc741ff5c774f85fe7ca3063b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aiven/aiven-extras/security/advisories/GHSA-33xh-jqgf-6627", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-31xx/CVE-2025-3191.json b/CVE-2025/CVE-2025-31xx/CVE-2025-3191.json index e5965685b84..f4d8a8dfa43 100644 --- a/CVE-2025/CVE-2025-31xx/CVE-2025-3191.json +++ b/CVE-2025/CVE-2025-31xx/CVE-2025-3191.json @@ -2,13 +2,17 @@ "id": "CVE-2025-3191", "sourceIdentifier": "report@snyk.io", "published": "2025-04-04T05:15:45.577", - "lastModified": "2025-04-04T05:15:45.577", + "lastModified": "2025-04-04T15:15:49.177", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "All versions of the package react-draft-wysiwyg are vulnerable to Cross-site Scripting (XSS) via the Embedded button which will then result in saving the payload in the