mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-04-10T14:00:20.548884+00:00
This commit is contained in:
parent
b7feae89de
commit
be904377a1
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-47489",
|
"id": "CVE-2021-47489",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-05-22T09:15:10.770",
|
"published": "2024-05-22T09:15:10.770",
|
||||||
"lastModified": "2025-01-06T19:53:35.453",
|
"lastModified": "2025-04-10T13:15:42.480",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -106,6 +106,10 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/1336b886b162fdc84708096ea152a61c0e1fc09c",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/3f4e54bd312d3dafb59daf2b97ffa08abebe60f5",
|
"url": "https://git.kernel.org/stable/c/3f4e54bd312d3dafb59daf2b97ffa08abebe60f5",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-49046",
|
"id": "CVE-2022-49046",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-02-26T07:00:41.890",
|
"published": "2025-02-26T07:00:41.890",
|
||||||
"lastModified": "2025-03-18T18:53:16.010",
|
"lastModified": "2025-04-10T13:15:43.390",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -123,6 +123,10 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/2e539b17d4cbe5fb8b5152dd9a6e4a8828f97db2",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/2f345bb14ad4744950499ff222e2899209297afa",
|
"url": "https://git.kernel.org/stable/c/2f345bb14ad4744950499ff222e2899209297afa",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-49546",
|
"id": "CVE-2022-49546",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-02-26T07:01:30.500",
|
"published": "2025-02-26T07:01:30.500",
|
||||||
"lastModified": "2025-03-10T21:13:19.010",
|
"lastModified": "2025-04-10T13:15:43.550",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -91,6 +91,10 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/23cf39dccf7653650701a6f39b119e9116a27f1a",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/8765a423a87d74ef24ea02b43b2728fe4039f248",
|
"url": "https://git.kernel.org/stable/c/8765a423a87d74ef24ea02b43b2728fe4039f248",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-49636",
|
"id": "CVE-2022-49636",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-02-26T07:01:38.827",
|
"published": "2025-02-26T07:01:38.827",
|
||||||
"lastModified": "2025-03-11T22:30:51.930",
|
"lastModified": "2025-04-10T13:15:43.703",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -115,12 +115,24 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/549de58dba4bf1b2adc72e9948b9c76fa88be9d2",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/72a0b329114b1caa8e69dfa7cdad1dd3c69b8602",
|
"url": "https://git.kernel.org/stable/c/72a0b329114b1caa8e69dfa7cdad1dd3c69b8602",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/df27729a4fe0002dfd80c96fe1c142829c672728",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/f5dc10b910bdac523e5947336445a77066c51bf9",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-49728",
|
"id": "CVE-2022-49728",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-02-26T07:01:48.433",
|
"published": "2025-02-26T07:01:48.433",
|
||||||
"lastModified": "2025-03-07T20:46:17.810",
|
"lastModified": "2025-04-10T13:15:43.850",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -75,6 +75,10 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/70549c80fe80ac4e2a22068c76ebebced24f7e74",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/84dc940890e91e42898e4443a093281702440abf",
|
"url": "https://git.kernel.org/stable/c/84dc940890e91e42898e4443a093281702440abf",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
@ -82,6 +86,10 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/f26422eabeb517629568edf8c2dd9c6cb9147584",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/f93431c86b631bbca5614c66f966bf3ddb3c2803",
|
"url": "https://git.kernel.org/stable/c/f93431c86b631bbca5614c66f966bf3ddb3c2803",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
60
CVE-2024/CVE-2024-111xx/CVE-2024-11129.json
Normal file
60
CVE-2024/CVE-2024-111xx/CVE-2024-11129.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2024-11129",
|
||||||
|
"sourceIdentifier": "cve@gitlab.com",
|
||||||
|
"published": "2025-04-10T13:15:43.993",
|
||||||
|
"lastModified": "2025-04-10T13:15:43.993",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An issue has been discovered in GitLab EE affecting all versions from 17.1 before 17.8.7, 17.9 before 17.9.6, and 17.10 before 17.10.4. This allows attackers to perform targeted searches with sensitive keywords to get the count of issues containing the searched term.\""
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cve@gitlab.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 4.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve@gitlab.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-209"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/503722",
|
||||||
|
"source": "cve@gitlab.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://hackerone.com/reports/2717400",
|
||||||
|
"source": "cve@gitlab.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-11218",
|
"id": "CVE-2024-11218",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2025-01-22T05:15:08.903",
|
"published": "2025-01-22T05:15:08.903",
|
||||||
"lastModified": "2025-03-20T08:15:11.387",
|
"lastModified": "2025-04-10T13:15:44.270",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -160,6 +160,10 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2025:2712",
|
"url": "https://access.redhat.com/errata/RHSA-2025:2712",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2025:3577",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2024-11218",
|
"url": "https://access.redhat.com/security/cve/CVE-2024-11218",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
|
@ -2,20 +2,24 @@
|
|||||||
"id": "CVE-2024-12278",
|
"id": "CVE-2024-12278",
|
||||||
"sourceIdentifier": "security@wordfence.com",
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
"published": "2025-04-01T07:15:38.507",
|
"published": "2025-04-01T07:15:38.507",
|
||||||
"lastModified": "2025-04-01T20:26:11.547",
|
"lastModified": "2025-04-10T13:19:57.677",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "The Booster for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via any location that typically sanitizes data using wp_kses, like comments, in all versions up to, and including, 7.2.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
"value": "The Booster for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via any location that typically sanitizes data using wp_kses, like comments, in all versions up to, and including, 7.2.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "El complemento Booster for WooCommerce para WordPress es vulnerable a cross-site scripting almacenado en cualquier ubicaci\u00f3n que normalmente depure datos usando wp_kses, como los comentarios, en todas las versiones hasta la 7.2.5 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente. Esto permite a atacantes no autenticados inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "security@wordfence.com",
|
"source": "security@wordfence.com",
|
||||||
"type": "Primary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||||
@ -32,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 3.9,
|
||||||
"impactScore": 2.7
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -47,18 +71,45 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "7.2.5",
|
||||||
|
"matchCriteriaId": "CA46802B-22FB-4739-B767-1563083D59F2"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/trunk/includes/functions/wcj-functions-general.php#L1015",
|
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/trunk/includes/functions/wcj-functions-general.php#L1015",
|
||||||
"source": "security@wordfence.com"
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/changeset/3262569/woocommerce-jetpack/trunk/includes/functions/wcj-functions-general.php",
|
"url": "https://plugins.trac.wordpress.org/changeset/3262569/woocommerce-jetpack/trunk/includes/functions/wcj-functions-general.php",
|
||||||
"source": "security@wordfence.com"
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/234789db-1440-40ac-83e7-b8afb0ba4b5f?source=cve",
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/234789db-1440-40ac-83e7-b8afb0ba4b5f?source=cve",
|
||||||
"source": "security@wordfence.com"
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-1894",
|
"id": "CVE-2024-1894",
|
||||||
"sourceIdentifier": "security@wordfence.com",
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
"published": "2024-03-13T16:15:28.067",
|
"published": "2024-03-13T16:15:28.067",
|
||||||
"lastModified": "2024-11-21T08:51:32.663",
|
"lastModified": "2025-04-10T13:09:48.177",
|
||||||
"vulnStatus": "Undergoing Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,41 +36,115 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.1,
|
"exploitabilityScore": 3.1,
|
||||||
"impactScore": 2.7
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 2.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:burst-statistics:burst_statistics:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "1.5.7",
|
||||||
|
"matchCriteriaId": "3A70B78B-0161-49F9-A218-D53913BC38EB"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/browser/burst-statistics/trunk/class-frontend.php#L67",
|
"url": "https://plugins.trac.wordpress.org/browser/burst-statistics/trunk/class-frontend.php#L67",
|
||||||
"source": "security@wordfence.com"
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/browser/burst-statistics/trunk/class-frontend.php#L74",
|
"url": "https://plugins.trac.wordpress.org/browser/burst-statistics/trunk/class-frontend.php#L74",
|
||||||
"source": "security@wordfence.com"
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/changeset?old_path=/burst-statistics/tags/1.5.6.1&old=3049793&new_path=/burst-statistics/tags/1.5.7&new=3049793&sfp_email=&sfph_mail=",
|
"url": "https://plugins.trac.wordpress.org/changeset?old_path=/burst-statistics/tags/1.5.6.1&old=3049793&new_path=/burst-statistics/tags/1.5.7&new=3049793&sfp_email=&sfph_mail=",
|
||||||
"source": "security@wordfence.com"
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fa587df5-9d96-4cac-ae5d-2a0485a3a789?source=cve",
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fa587df5-9d96-4cac-ae5d-2a0485a3a789?source=cve",
|
||||||
"source": "security@wordfence.com"
|
"source": "security@wordfence.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/browser/burst-statistics/trunk/class-frontend.php#L67",
|
"url": "https://plugins.trac.wordpress.org/browser/burst-statistics/trunk/class-frontend.php#L67",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/browser/burst-statistics/trunk/class-frontend.php#L74",
|
"url": "https://plugins.trac.wordpress.org/browser/burst-statistics/trunk/class-frontend.php#L74",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://plugins.trac.wordpress.org/changeset?old_path=/burst-statistics/tags/1.5.6.1&old=3049793&new_path=/burst-statistics/tags/1.5.7&new=3049793&sfp_email=&sfph_mail=",
|
"url": "https://plugins.trac.wordpress.org/changeset?old_path=/burst-statistics/tags/1.5.6.1&old=3049793&new_path=/burst-statistics/tags/1.5.7&new=3049793&sfp_email=&sfph_mail=",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fa587df5-9d96-4cac-ae5d-2a0485a3a789?source=cve",
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fa587df5-9d96-4cac-ae5d-2a0485a3a789?source=cve",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-24485",
|
"id": "CVE-2024-24485",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-15T19:15:09.740",
|
"published": "2024-04-15T19:15:09.740",
|
||||||
"lastModified": "2024-11-21T08:59:19.923",
|
"lastModified": "2025-04-10T13:39:04.063",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,49 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:silextechnology:ds-600_firmware:1.4.1:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "37E08132-D4D6-4E60-940F-C0247B1F7B01"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:silextechnology:ds-600:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "98EA6C22-046F-4D44-89B4-84EAD0D75C71"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/MostafaSoliman/Security-Advisories/blob/master/CVE-2024-24485",
|
"url": "https://github.com/MostafaSoliman/Security-Advisories/blob/master/CVE-2024-24485",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/MostafaSoliman/Security-Advisories/blob/master/CVE-2024-24485",
|
"url": "https://github.com/MostafaSoliman/Security-Advisories/blob/master/CVE-2024-24485",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-24486",
|
"id": "CVE-2024-24486",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-15T19:15:09.787",
|
"published": "2024-04-15T19:15:09.787",
|
||||||
"lastModified": "2024-11-21T08:59:20.127",
|
"lastModified": "2025-04-10T13:39:57.420",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,49 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:silextechnology:ds-600_firmware:1.4.1:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "37E08132-D4D6-4E60-940F-C0247B1F7B01"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:silextechnology:ds-600:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "98EA6C22-046F-4D44-89B4-84EAD0D75C71"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://raw.githubusercontent.com/MostafaSoliman/Security-Advisories/master/CVE-2024-24486",
|
"url": "https://raw.githubusercontent.com/MostafaSoliman/Security-Advisories/master/CVE-2024-24486",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://raw.githubusercontent.com/MostafaSoliman/Security-Advisories/master/CVE-2024-24486",
|
"url": "https://raw.githubusercontent.com/MostafaSoliman/Security-Advisories/master/CVE-2024-24486",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-24487",
|
"id": "CVE-2024-24487",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-15T19:15:09.830",
|
"published": "2024-04-15T19:15:09.830",
|
||||||
"lastModified": "2024-11-21T08:59:20.347",
|
"lastModified": "2025-04-10T13:39:33.260",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,49 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:silextechnology:ds-600_firmware:1.4.1:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "37E08132-D4D6-4E60-940F-C0247B1F7B01"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:silextechnology:ds-600:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "98EA6C22-046F-4D44-89B4-84EAD0D75C71"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://raw.githubusercontent.com/MostafaSoliman/Security-Advisories/master/CVE-2024-24487",
|
"url": "https://raw.githubusercontent.com/MostafaSoliman/Security-Advisories/master/CVE-2024-24487",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://raw.githubusercontent.com/MostafaSoliman/Security-Advisories/master/CVE-2024-24487",
|
"url": "https://raw.githubusercontent.com/MostafaSoliman/Security-Advisories/master/CVE-2024-24487",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-26928",
|
"id": "CVE-2024-26928",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-04-28T12:15:21.140",
|
"published": "2024-04-28T12:15:21.140",
|
||||||
"lastModified": "2025-01-07T16:44:17.763",
|
"lastModified": "2025-04-10T13:15:44.527",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -108,6 +108,10 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/a140224bcf87eb98a87b67ff4c6826c57e47b704",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/a65f2b56334ba4dc30bd5ee9ce5b2691b973344d",
|
"url": "https://git.kernel.org/stable/c/a65f2b56334ba4dc30bd5ee9ce5b2691b973344d",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-30985",
|
"id": "CVE-2024-30985",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-17T18:15:16.097",
|
"published": "2024-04-17T18:15:16.097",
|
||||||
"lastModified": "2024-11-21T09:12:40.320",
|
"lastModified": "2025-04-10T13:41:14.657",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:phpgurukul:client_management_system:1.1:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "28765F6A-D808-4E41-8D9E-FD246C3D0BD9"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://medium.com/%40shanunirwan/cve-2024-30985-sql-injection-vulnerability-in-client-management-system-using-php-mysql-1-1-c21fecbda062",
|
"url": "https://medium.com/%40shanunirwan/cve-2024-30985-sql-injection-vulnerability-in-client-management-system-using-php-mysql-1-1-c21fecbda062",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://medium.com/%40shanunirwan/cve-2024-30985-sql-injection-vulnerability-in-client-management-system-using-php-mysql-1-1-c21fecbda062",
|
"url": "https://medium.com/%40shanunirwan/cve-2024-30985-sql-injection-vulnerability-in-client-management-system-using-php-mysql-1-1-c21fecbda062",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-30986",
|
"id": "CVE-2024-30986",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-17T18:15:16.157",
|
"published": "2024-04-17T18:15:16.157",
|
||||||
"lastModified": "2024-11-21T09:12:40.523",
|
"lastModified": "2025-04-10T13:41:10.500",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:phpgurukul:client_management_system:1.1:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "28765F6A-D808-4E41-8D9E-FD246C3D0BD9"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://medium.com/%40shanunirwan/cve-2024-30986-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3fb702d9d510",
|
"url": "https://medium.com/%40shanunirwan/cve-2024-30986-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3fb702d9d510",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://medium.com/%40shanunirwan/cve-2024-30986-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3fb702d9d510",
|
"url": "https://medium.com/%40shanunirwan/cve-2024-30986-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3fb702d9d510",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-30987",
|
"id": "CVE-2024-30987",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-17T18:15:16.210",
|
"published": "2024-04-17T18:15:16.210",
|
||||||
"lastModified": "2024-11-21T09:12:40.740",
|
"lastModified": "2025-04-10T13:41:06.233",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:phpgurukul:client_management_system:1.1:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "28765F6A-D808-4E41-8D9E-FD246C3D0BD9"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://medium.com/%40shanunirwan/cve-2024-30987-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-b6a7a177d254",
|
"url": "https://medium.com/%40shanunirwan/cve-2024-30987-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-b6a7a177d254",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://medium.com/%40shanunirwan/cve-2024-30987-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-b6a7a177d254",
|
"url": "https://medium.com/%40shanunirwan/cve-2024-30987-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-b6a7a177d254",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-30988",
|
"id": "CVE-2024-30988",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-17T18:15:16.273",
|
"published": "2024-04-17T18:15:16.273",
|
||||||
"lastModified": "2024-11-21T09:12:40.960",
|
"lastModified": "2025-04-10T13:41:00.560",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:phpgurukul:client_management_system:1.1:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "28765F6A-D808-4E41-8D9E-FD246C3D0BD9"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://medium.com/%40shanunirwan/cve-2024-30988-cross-site-scripting-vulnerability-in-client-management-system-using-php-mysql-1-1-e7a677936c23",
|
"url": "https://medium.com/%40shanunirwan/cve-2024-30988-cross-site-scripting-vulnerability-in-client-management-system-using-php-mysql-1-1-e7a677936c23",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://medium.com/%40shanunirwan/cve-2024-30988-cross-site-scripting-vulnerability-in-client-management-system-using-php-mysql-1-1-e7a677936c23",
|
"url": "https://medium.com/%40shanunirwan/cve-2024-30988-cross-site-scripting-vulnerability-in-client-management-system-using-php-mysql-1-1-e7a677936c23",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-30989",
|
"id": "CVE-2024-30989",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-17T19:15:07.520",
|
"published": "2024-04-17T19:15:07.520",
|
||||||
"lastModified": "2025-03-14T17:15:44.497",
|
"lastModified": "2025-04-10T13:40:46.917",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:phpgurukul:client_management_system:1.1:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "28765F6A-D808-4E41-8D9E-FD246C3D0BD9"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://medium.com/%40shanunirwan/cve-2024-30989-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3cfa1c54e4a6",
|
"url": "https://medium.com/%40shanunirwan/cve-2024-30989-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3cfa1c54e4a6",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://medium.com/%40shanunirwan/cve-2024-30989-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3cfa1c54e4a6",
|
"url": "https://medium.com/%40shanunirwan/cve-2024-30989-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3cfa1c54e4a6",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-30990",
|
"id": "CVE-2024-30990",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-04-17T19:15:07.570",
|
"published": "2024-04-17T19:15:07.570",
|
||||||
"lastModified": "2024-11-21T09:12:41.300",
|
"lastModified": "2025-04-10T13:40:39.260",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:phpgurukul:client_management_system:1.1:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "28765F6A-D808-4E41-8D9E-FD246C3D0BD9"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://medium.com/%40shanunirwan/cve-2024-30990-sql-injection-vulnerability-in-invoices-page-of-client-management-system-using-php-58baa94a1761",
|
"url": "https://medium.com/%40shanunirwan/cve-2024-30990-sql-injection-vulnerability-in-invoices-page-of-client-management-system-using-php-58baa94a1761",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://medium.com/%40shanunirwan/cve-2024-30990-sql-injection-vulnerability-in-invoices-page-of-client-management-system-using-php-58baa94a1761",
|
"url": "https://medium.com/%40shanunirwan/cve-2024-30990-sql-injection-vulnerability-in-invoices-page-of-client-management-system-using-php-58baa94a1761",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-33835",
|
"id": "CVE-2024-33835",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-05-01T11:15:47.827",
|
"published": "2024-05-01T11:15:47.827",
|
||||||
"lastModified": "2024-11-21T09:17:34.033",
|
"lastModified": "2025-04-10T13:41:39.267",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -40,6 +40,16 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-787"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
@ -51,14 +61,51 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:tenda:ac18_firmware:15.03.05.05:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "4D5CB727-FC6B-4212-A61E-2888A0DADFB0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "CF9F8AF9-F921-4348-922B-EE5E6037E7AC"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/isBigChen/iot/blob/main/tenda/formSetSafeWanWebMan.md",
|
"url": "https://github.com/isBigChen/iot/blob/main/tenda/formSetSafeWanWebMan.md",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/isBigChen/iot/blob/main/tenda/formSetSafeWanWebMan.md",
|
"url": "https://github.com/isBigChen/iot/blob/main/tenda/formSetSafeWanWebMan.md",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-38611",
|
"id": "CVE-2024-38611",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-06-19T14:15:20.980",
|
"published": "2024-06-19T14:15:20.980",
|
||||||
"lastModified": "2024-11-21T09:26:28.820",
|
"lastModified": "2025-04-10T13:15:44.790",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -17,6 +17,10 @@
|
|||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/04d1086a62ac492ebb6bb0c94c1c8cb55f5d1f36",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/43fff07e4b1956d0e5cf23717507e438278ea3d9",
|
"url": "https://git.kernel.org/stable/c/43fff07e4b1956d0e5cf23717507e438278ea3d9",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
@ -29,10 +33,18 @@
|
|||||||
"url": "https://git.kernel.org/stable/c/904db2ba44ae60641b6378c5013254d09acf5e80",
|
"url": "https://git.kernel.org/stable/c/904db2ba44ae60641b6378c5013254d09acf5e80",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/963523600d9f1e36bc35ba774c2493d6baa4dd8f",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/c1a3803e5bb91c13e9ad582003e4288f67f06cd9",
|
"url": "https://git.kernel.org/stable/c/c1a3803e5bb91c13e9ad582003e4288f67f06cd9",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/ece3fc1c10197052044048bea4f13cfdcf25b416",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/43fff07e4b1956d0e5cf23717507e438278ea3d9",
|
"url": "https://git.kernel.org/stable/c/43fff07e4b1956d0e5cf23717507e438278ea3d9",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-39931",
|
"id": "CVE-2024-39931",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-07-04T16:15:02.503",
|
"published": "2024-07-04T16:15:02.503",
|
||||||
"lastModified": "2024-11-21T09:28:36.087",
|
"lastModified": "2025-04-10T13:43:51.257",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.1,
|
"exploitabilityScore": 3.1,
|
||||||
"impactScore": 6.0
|
"impactScore": 6.0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.9,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 6.0
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,22 +71,52 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "0.13.0",
|
||||||
|
"matchCriteriaId": "5634A605-49DE-459E-ADE6-2E65D89321BD"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/gogs/gogs/releases",
|
"url": "https://github.com/gogs/gogs/releases",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/",
|
"url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/gogs/gogs/releases",
|
"url": "https://github.com/gogs/gogs/releases",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/",
|
"url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-39932",
|
"id": "CVE-2024-39932",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-07-04T16:15:02.707",
|
"published": "2024-07-04T16:15:02.707",
|
||||||
"lastModified": "2024-11-21T09:28:36.240",
|
"lastModified": "2025-04-10T13:44:52.103",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.1,
|
"exploitabilityScore": 3.1,
|
||||||
"impactScore": 6.0
|
"impactScore": 6.0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.9,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 6.0
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,22 +71,56 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "0.13.0",
|
||||||
|
"matchCriteriaId": "5634A605-49DE-459E-ADE6-2E65D89321BD"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/gogs/gogs/releases",
|
"url": "https://github.com/gogs/gogs/releases",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/",
|
"url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit",
|
||||||
|
"Mitigation"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/gogs/gogs/releases",
|
"url": "https://github.com/gogs/gogs/releases",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/",
|
"url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit",
|
||||||
|
"Mitigation"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-39933",
|
"id": "CVE-2024-39933",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-07-04T16:15:02.900",
|
"published": "2024-07-04T16:15:02.900",
|
||||||
"lastModified": "2024-11-21T09:28:36.400",
|
"lastModified": "2025-04-10T13:45:38.273",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 3.1,
|
"exploitabilityScore": 3.1,
|
||||||
"impactScore": 4.0
|
"impactScore": 4.0
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||||||
|
"baseScore": 7.7,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.1,
|
||||||
|
"impactScore": 4.0
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -51,22 +71,56 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "0.13.0",
|
||||||
|
"matchCriteriaId": "5634A605-49DE-459E-ADE6-2E65D89321BD"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/gogs/gogs/releases",
|
"url": "https://github.com/gogs/gogs/releases",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/",
|
"url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit",
|
||||||
|
"Mitigation"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/gogs/gogs/releases",
|
"url": "https://github.com/gogs/gogs/releases",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/",
|
"url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"Exploit",
|
||||||
|
"Mitigation"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-41585",
|
"id": "CVE-2024-41585",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-10-03T19:15:04.197",
|
"published": "2024-10-03T19:15:04.197",
|
||||||
"lastModified": "2024-10-07T19:37:13.900",
|
"lastModified": "2025-04-10T13:41:39.553",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,50 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "4.3.2.6",
|
||||||
|
"matchCriteriaId": "B60D4383-24BF-4BBE-91FC-503EC3DB1A35"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.forescout.com/resources/draybreak-draytek-research/",
|
"url": "https://www.forescout.com/resources/draybreak-draytek-research/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities",
|
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-41586",
|
"id": "CVE-2024-41586",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-10-03T19:15:04.253",
|
"published": "2024-10-03T19:15:04.253",
|
||||||
"lastModified": "2024-10-04T13:50:43.727",
|
"lastModified": "2025-04-10T13:41:46.850",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,50 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "4.3.2.6",
|
||||||
|
"matchCriteriaId": "B60D4383-24BF-4BBE-91FC-503EC3DB1A35"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.forescout.com/resources/draybreak-draytek-research/",
|
"url": "https://www.forescout.com/resources/draybreak-draytek-research/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities",
|
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-41589",
|
"id": "CVE-2024-41589",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-10-03T19:15:04.423",
|
"published": "2024-10-03T19:15:04.423",
|
||||||
"lastModified": "2024-10-04T13:50:43.727",
|
"lastModified": "2025-04-10T13:43:37.377",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,50 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "4.3.2.6",
|
||||||
|
"matchCriteriaId": "B60D4383-24BF-4BBE-91FC-503EC3DB1A35"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.forescout.com/resources/draybreak-draytek-research/",
|
"url": "https://www.forescout.com/resources/draybreak-draytek-research/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities",
|
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-41592",
|
"id": "CVE-2024-41592",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2024-10-03T19:15:04.633",
|
"published": "2024-10-03T19:15:04.633",
|
||||||
"lastModified": "2024-10-04T13:50:43.727",
|
"lastModified": "2025-04-10T13:41:51.380",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,50 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndIncluding": "4.3.2.6",
|
||||||
|
"matchCriteriaId": "B60D4383-24BF-4BBE-91FC-503EC3DB1A35"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://www.forescout.com/resources/draybreak-draytek-research/",
|
"url": "https://www.forescout.com/resources/draybreak-draytek-research/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities",
|
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-46753",
|
"id": "CVE-2024-46753",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-18T08:15:04.107",
|
"published": "2024-09-18T08:15:04.107",
|
||||||
"lastModified": "2024-09-20T12:30:51.220",
|
"lastModified": "2025-04-10T13:15:45.023",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -17,10 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/0e4840ae09f375381167000ce47424818fcbcc7c",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/2c4fe45351e544da4b8f10c74b277117a4fa7869",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/5eb178f373b4f16f3b42d55ff88fc94dd95b93b1",
|
"url": "https://git.kernel.org/stable/c/5eb178f373b4f16f3b42d55ff88fc94dd95b93b1",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/67e4ca7ddc67ef949326b4dc404a9678bbe67d72",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/9c8237021b53d52357c0de07a768582fafb2791d",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/a7f16a7a709845855cb5a0e080a52bda5873f9de",
|
"url": "https://git.kernel.org/stable/c/a7f16a7a709845855cb5a0e080a52bda5873f9de",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-46812",
|
"id": "CVE-2024-46812",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-27T13:15:14.163",
|
"published": "2024-09-27T13:15:14.163",
|
||||||
"lastModified": "2024-11-20T20:48:48.663",
|
"lastModified": "2025-04-10T13:15:45.153",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -85,6 +85,10 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/2fd32a65f2e78eff0862c8fdf7815ca6bb44fb2e",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/3300a039caf850376bc3416c808cd8879da412bb",
|
"url": "https://git.kernel.org/stable/c/3300a039caf850376bc3416c808cd8879da412bb",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
@ -92,6 +96,10 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/4331ae2788e779b11f3aad40c04be6c64831f2a2",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/8406158a546441b73f0b216aedacbf9a1e5748fb",
|
"url": "https://git.kernel.org/stable/c/8406158a546441b73f0b216aedacbf9a1e5748fb",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-46813",
|
"id": "CVE-2024-46813",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-27T13:15:14.230",
|
"published": "2024-09-27T13:15:14.230",
|
||||||
"lastModified": "2024-10-04T17:38:17.740",
|
"lastModified": "2025-04-10T13:15:45.303",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -70,6 +70,10 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/032c5407a608ac3b2a98bf4fbda27d12c20c5887",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/8aa2864044b9d13e95fe224f32e808afbf79ecdf",
|
"url": "https://git.kernel.org/stable/c/8aa2864044b9d13e95fe224f32e808afbf79ecdf",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-46821",
|
"id": "CVE-2024-46821",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-27T13:15:14.767",
|
"published": "2024-09-27T13:15:14.767",
|
||||||
"lastModified": "2024-10-04T17:06:43.573",
|
"lastModified": "2025-04-10T13:15:45.433",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -105,12 +105,20 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/befd1dc693c98bad69a701ede3a298698f0f9436",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/c8c19ebf7c0b202a6a2d37a52ca112432723db5f",
|
"url": "https://git.kernel.org/stable/c/c8c19ebf7c0b202a6a2d37a52ca112432723db5f",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/e549cd6da1f21c34ba0f65adeca6a8aa9860b381",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-46823",
|
"id": "CVE-2024-46823",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-27T13:15:14.897",
|
"published": "2024-09-27T13:15:14.897",
|
||||||
"lastModified": "2024-11-20T13:59:52.723",
|
"lastModified": "2025-04-10T13:15:45.660",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -92,6 +92,14 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/99ddb9c58511f1b71e23d02a06082bf6d2dd2133",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/cacce7faa7c475cea55e82cc3a27794561fac157",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/d1207f07decc66546a7fa463d2f335a856c986ef",
|
"url": "https://git.kernel.org/stable/c/d1207f07decc66546a7fa463d2f335a856c986ef",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-47214",
|
"id": "CVE-2024-47214",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-04-03T21:15:38.760",
|
"published": "2025-04-03T21:15:38.760",
|
||||||
"lastModified": "2025-04-07T19:15:53.147",
|
"lastModified": "2025-04-10T13:51:22.130",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -39,10 +39,44 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:snowplow:iglu_server:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "0.13.1",
|
||||||
|
"matchCriteriaId": "17F959D6-182B-4438-9EC1-490A0758533F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.snowplow.io/hc/en-us/articles/26318139354909-Update-Critical-Snowplow-Security-Updates-Impact-on-Open-Source-Software-Users",
|
"url": "https://support.snowplow.io/hc/en-us/articles/26318139354909-Update-Critical-Snowplow-Security-Updates-Impact-on-Open-Source-Software-Users",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes",
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-53144",
|
"id": "CVE-2024-53144",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-12-17T16:15:25.797",
|
"published": "2024-12-17T16:15:25.797",
|
||||||
"lastModified": "2024-12-18T08:15:05.687",
|
"lastModified": "2025-04-10T13:15:45.907",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -17,6 +17,10 @@
|
|||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/22b49d6e4f399a390c70f3034f5fbacbb9413858",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/5291ff856d2c5177b4fe9c18828312be30213193",
|
"url": "https://git.kernel.org/stable/c/5291ff856d2c5177b4fe9c18828312be30213193",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
@ -33,6 +37,10 @@
|
|||||||
"url": "https://git.kernel.org/stable/c/b25e11f978b63cb7857890edb3a698599cddb10e",
|
"url": "https://git.kernel.org/stable/c/b25e11f978b63cb7857890edb3a698599cddb10e",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/baaa50c6f91ea5a9c7503af51f2bc50e6568b66b",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/d17c631ba04e960eb6f8728b10d585de20ac4f71",
|
"url": "https://git.kernel.org/stable/c/d17c631ba04e960eb6f8728b10d585de20ac4f71",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-56664",
|
"id": "CVE-2024-56664",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-12-27T15:15:26.297",
|
"published": "2024-12-27T15:15:26.297",
|
||||||
"lastModified": "2025-01-17T14:15:32.227",
|
"lastModified": "2025-04-10T13:15:46.037",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -92,6 +92,10 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/6deb9e85dc9a2ba4414b91c1b5b00b8415910890",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/b015f19fedd2e12283a8450dd0aefce49ec57015",
|
"url": "https://git.kernel.org/stable/c/b015f19fedd2e12283a8450dd0aefce49ec57015",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
@ -116,6 +120,10 @@
|
|||||||
"tags": [
|
"tags": [
|
||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/fdb2cd8957ac51f84c9e742ba866087944bb834b",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-5882",
|
"id": "CVE-2024-5882",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2024-07-29T06:15:02.547",
|
"published": "2024-07-29T06:15:02.547",
|
||||||
"lastModified": "2024-11-21T09:48:31.037",
|
"lastModified": "2025-04-10T13:52:09.533",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -39,14 +39,52 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-22"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:webcodingplace:ultimate_classified_listings:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "1.3",
|
||||||
|
"matchCriteriaId": "8A6CB3E1-2A15-4C4F-B0E3-5882B872EDEE"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://wpscan.com/vulnerability/5e8d7808-8f3e-4fc9-a1e7-e108da031ca7/",
|
"url": "https://wpscan.com/vulnerability/5e8d7808-8f3e-4fc9-a1e7-e108da031ca7/",
|
||||||
"source": "contact@wpscan.com"
|
"source": "contact@wpscan.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://wpscan.com/vulnerability/5e8d7808-8f3e-4fc9-a1e7-e108da031ca7/",
|
"url": "https://wpscan.com/vulnerability/5e8d7808-8f3e-4fc9-a1e7-e108da031ca7/",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-5883",
|
"id": "CVE-2024-5883",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2024-07-29T06:15:02.627",
|
"published": "2024-07-29T06:15:02.627",
|
||||||
"lastModified": "2024-11-21T09:48:31.193",
|
"lastModified": "2025-04-10T13:50:08.880",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -39,14 +39,52 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:webcodingplace:ultimate_classified_listings:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "1.3",
|
||||||
|
"matchCriteriaId": "8A6CB3E1-2A15-4C4F-B0E3-5882B872EDEE"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://wpscan.com/vulnerability/a1894884-c739-4ef4-8d9c-392171ab3d68/",
|
"url": "https://wpscan.com/vulnerability/a1894884-c739-4ef4-8d9c-392171ab3d68/",
|
||||||
"source": "contact@wpscan.com"
|
"source": "contact@wpscan.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://wpscan.com/vulnerability/a1894884-c739-4ef4-8d9c-392171ab3d68/",
|
"url": "https://wpscan.com/vulnerability/a1894884-c739-4ef4-8d9c-392171ab3d68/",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-6529",
|
"id": "CVE-2024-6529",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2024-08-01T06:15:02.737",
|
"published": "2024-08-01T06:15:02.737",
|
||||||
"lastModified": "2024-08-01T14:35:13.090",
|
"lastModified": "2025-04-10T13:49:49.100",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -39,10 +39,44 @@
|
|||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:webcodingplace:ultimate_classified_listings:*:*:*:*:*:wordpress:*:*",
|
||||||
|
"versionEndExcluding": "1.4",
|
||||||
|
"matchCriteriaId": "3CDE52A3-8F35-4D89-B317-3580FA20DE48"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://wpscan.com/vulnerability/1a346c9a-cc1a-46b1-b27a-a77a38449933/",
|
"url": "https://wpscan.com/vulnerability/1a346c9a-cc1a-46b1-b27a-a77a38449933/",
|
||||||
"source": "contact@wpscan.com"
|
"source": "contact@wpscan.com",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-0272",
|
"id": "CVE-2025-0272",
|
||||||
"sourceIdentifier": "psirt@hcl.com",
|
"sourceIdentifier": "psirt@hcl.com",
|
||||||
"published": "2025-04-03T15:15:47.560",
|
"published": "2025-04-03T15:15:47.560",
|
||||||
"lastModified": "2025-04-07T14:18:34.453",
|
"lastModified": "2025-04-10T13:27:02.210",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -36,6 +36,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.3,
|
"exploitabilityScore": 2.3,
|
||||||
"impactScore": 2.7
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N",
|
||||||
|
"baseScore": 7.6,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 4.7
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -49,12 +69,79 @@
|
|||||||
"value": "CWE-80"
|
"value": "CWE-80"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:hcltechsw:hcl_devops_deploy:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.0.0.0",
|
||||||
|
"versionEndExcluding": "8.0.1.5",
|
||||||
|
"matchCriteriaId": "42A4C3FF-3686-420F-894E-4D51AACEA84B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:hcltechsw:hcl_devops_deploy:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "8.1.0",
|
||||||
|
"versionEndExcluding": "8.1.0.1",
|
||||||
|
"matchCriteriaId": "335E9410-E48A-408A-99AB-17C352FECE14"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "7.0.0.0",
|
||||||
|
"versionEndIncluding": "7.0.5.26",
|
||||||
|
"matchCriteriaId": "3EA22CDE-24F0-4272-B8FD-F52E6BB813A3"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "7.1.0.0",
|
||||||
|
"versionEndExcluding": "7.1.2.22",
|
||||||
|
"matchCriteriaId": "38CF144B-AD62-4D88-BEF5-65CB622A041F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "7.2.0.0",
|
||||||
|
"versionEndExcluding": "7.2.3.15",
|
||||||
|
"matchCriteriaId": "B8BBA9A0-5AAA-49CD-B8B5-A4188B4697E1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "7.3.0.0",
|
||||||
|
"versionEndIncluding": "7.3.2.9",
|
||||||
|
"matchCriteriaId": "4A3836CE-993D-4B8A-B546-D9AD5FD14293"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120137",
|
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120137",
|
||||||
"source": "psirt@hcl.com"
|
"source": "psirt@hcl.com",
|
||||||
|
"tags": [
|
||||||
|
"Vendor Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2025-0624",
|
"id": "CVE-2025-0624",
|
||||||
"sourceIdentifier": "secalert@redhat.com",
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
"published": "2025-02-19T19:15:15.120",
|
"published": "2025-02-19T19:15:15.120",
|
||||||
"lastModified": "2025-04-03T10:15:19.267",
|
"lastModified": "2025-04-10T13:15:46.217",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -100,6 +100,10 @@
|
|||||||
"url": "https://access.redhat.com/errata/RHSA-2025:3396",
|
"url": "https://access.redhat.com/errata/RHSA-2025:3396",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/errata/RHSA-2025:3577",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://access.redhat.com/security/cve/CVE-2025-0624",
|
"url": "https://access.redhat.com/security/cve/CVE-2025-0624",
|
||||||
"source": "secalert@redhat.com"
|
"source": "secalert@redhat.com"
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-0995",
|
"id": "CVE-2025-0995",
|
||||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||||
"published": "2025-02-15T02:15:09.127",
|
"published": "2025-02-15T02:15:09.127",
|
||||||
"lastModified": "2025-02-19T15:15:16.073",
|
"lastModified": "2025-04-10T13:35:11.360",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -49,16 +49,51 @@
|
|||||||
"value": "CWE-416"
|
"value": "CWE-416"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-416"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "133.0.69943.98",
|
||||||
|
"matchCriteriaId": "E43CDBF0-985C-4C79-A266-AF271E78DA59"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_12.html",
|
"url": "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_12.html",
|
||||||
"source": "chrome-cve-admin@google.com"
|
"source": "chrome-cve-admin@google.com",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://issues.chromium.org/issues/391907159",
|
"url": "https://issues.chromium.org/issues/391907159",
|
||||||
"source": "chrome-cve-admin@google.com"
|
"source": "chrome-cve-admin@google.com",
|
||||||
|
"tags": [
|
||||||
|
"Issue Tracking",
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-0996",
|
"id": "CVE-2025-0996",
|
||||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||||
"published": "2025-02-15T02:15:09.260",
|
"published": "2025-02-15T02:15:09.260",
|
||||||
"lastModified": "2025-02-19T15:15:16.243",
|
"lastModified": "2025-04-10T13:35:47.997",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,14 +51,39 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "133.0.6943.98",
|
||||||
|
"matchCriteriaId": "CE0D6ABC-E25F-4A24-B528-981844E39520"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_12.html",
|
"url": "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_12.html",
|
||||||
"source": "chrome-cve-admin@google.com"
|
"source": "chrome-cve-admin@google.com",
|
||||||
|
"tags": [
|
||||||
|
"Release Notes"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://issues.chromium.org/issues/391788835",
|
"url": "https://issues.chromium.org/issues/391788835",
|
||||||
"source": "chrome-cve-admin@google.com"
|
"source": "chrome-cve-admin@google.com",
|
||||||
|
"tags": [
|
||||||
|
"Issue Tracking",
|
||||||
|
"Permissions Required"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
56
CVE-2025/CVE-2025-10xx/CVE-2025-1073.json
Normal file
56
CVE-2025/CVE-2025-10xx/CVE-2025-1073.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-1073",
|
||||||
|
"sourceIdentifier": "product-security@gg.jp.panasonic.com",
|
||||||
|
"published": "2025-04-10T12:15:15.097",
|
||||||
|
"lastModified": "2025-04-10T12:15:15.097",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Panasonic IR Control Hub (IR Blaster) versions 1.17 and earlier may allow an attacker with physical access to load unauthorized firmware onto the device."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "product-security@gg.jp.panasonic.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L",
|
||||||
|
"baseScore": 7.5,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "PHYSICAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 0.9,
|
||||||
|
"impactScore": 6.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "product-security@gg.jp.panasonic.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-1299"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://lsin.panasonic.com/release-notes",
|
||||||
|
"source": "product-security@gg.jp.panasonic.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
60
CVE-2025/CVE-2025-16xx/CVE-2025-1677.json
Normal file
60
CVE-2025/CVE-2025-16xx/CVE-2025-1677.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-1677",
|
||||||
|
"sourceIdentifier": "cve@gitlab.com",
|
||||||
|
"published": "2025-04-10T13:15:46.473",
|
||||||
|
"lastModified": "2025-04-10T13:15:46.473",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A Denial of Service (DoS) issue has been discovered in GitLab CE/EE affecting all up to 17.8.7, 17.9 prior to 17.9.6 and 17.10 prior to 17.10.4 A denial of service could occur upon injecting oversized payloads into CI pipeline exports."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cve@gitlab.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve@gitlab.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-770"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/521117",
|
||||||
|
"source": "cve@gitlab.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://hackerone.com/reports/3004008",
|
||||||
|
"source": "cve@gitlab.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-1851",
|
"id": "CVE-2025-1851",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2025-03-03T05:15:10.867",
|
"published": "2025-03-03T05:15:10.867",
|
||||||
"lastModified": "2025-03-03T18:15:37.277",
|
"lastModified": "2025-04-10T13:32:42.863",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -124,30 +124,81 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:tenda:ac7_firmware:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "15.03.06.44",
|
||||||
|
"matchCriteriaId": "3314DA98-9AA3-492C-9A65-C529585C4FC0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:tenda:ac7:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "A3BEE979-5BF3-48ED-AF42-0546D4F896E9"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Raining-101/IOT_cve/blob/main/ac7_V15.03.06.44_SetFirewallCfg.md",
|
"url": "https://github.com/Raining-101/IOT_cve/blob/main/ac7_V15.03.06.44_SetFirewallCfg.md",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?ctiid.298119",
|
"url": "https://vuldb.com/?ctiid.298119",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Permissions Required",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?id.298119",
|
"url": "https://vuldb.com/?id.298119",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://vuldb.com/?submit.505271",
|
"url": "https://vuldb.com/?submit.505271",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Third Party Advisory",
|
||||||
|
"VDB Entry"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.tenda.com.cn/",
|
"url": "https://www.tenda.com.cn/",
|
||||||
"source": "cna@vuldb.com"
|
"source": "cna@vuldb.com",
|
||||||
|
"tags": [
|
||||||
|
"Product"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/Raining-101/IOT_cve/blob/main/ac7_V15.03.06.44_SetFirewallCfg.md",
|
"url": "https://github.com/Raining-101/IOT_cve/blob/main/ac7_V15.03.06.44_SetFirewallCfg.md",
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-21638",
|
"id": "CVE-2025-21638",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-01-19T11:15:09.317",
|
"published": "2025-01-19T11:15:09.317",
|
||||||
"lastModified": "2025-02-27T22:01:34.240",
|
"lastModified": "2025-04-10T13:15:46.747",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -42,7 +42,7 @@
|
|||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -150,13 +150,6 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/10c869a52f266e40f548cc3c565d14930a5edafc",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/15649fd5415eda664ef35780c2013adeb5d9c695",
|
"url": "https://git.kernel.org/stable/c/15649fd5415eda664ef35780c2013adeb5d9c695",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
@ -192,6 +185,10 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/cf387cdebfaebae228dfba162f94c567a67610c3",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/dc583e7e5f8515ca489c0df28e4362a70eade382",
|
"url": "https://git.kernel.org/stable/c/dc583e7e5f8515ca489c0df28e4362a70eade382",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-21640",
|
"id": "CVE-2025-21640",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-01-19T11:15:09.537",
|
"published": "2025-01-19T11:15:09.537",
|
||||||
"lastModified": "2025-02-27T22:01:01.257",
|
"lastModified": "2025-04-10T13:15:46.927",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -42,7 +42,7 @@
|
|||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -123,18 +123,15 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/1031462a944ba0fa83c25ab1111465f8345b5589",
|
"url": "https://git.kernel.org/stable/c/3cd0659deb9c03535fd61839e91d4d4d3e51ac71",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/3cd0659deb9c03535fd61839e91d4d4d3e51ac71",
|
"url": "https://git.kernel.org/stable/c/5599b212d2f4466e1832a94e9932684aaa364587",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/86ddf8118123cb58a0fb8724cad6979c4069065b",
|
"url": "https://git.kernel.org/stable/c/86ddf8118123cb58a0fb8724cad6979c4069065b",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2025-21779",
|
"id": "CVE-2025-21779",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-02-27T03:15:18.690",
|
"published": "2025-02-27T03:15:18.690",
|
||||||
"lastModified": "2025-03-13T13:15:54.290",
|
"lastModified": "2025-04-10T13:15:47.123",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -42,7 +42,7 @@
|
|||||||
"weaknesses": [
|
"weaknesses": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
"description": [
|
"description": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -114,6 +114,10 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/61224533f2b61e252b03e214195d27d64b22989a",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/874ff13c73c45ecb38cb82191e8c1d523f0dc81b",
|
"url": "https://git.kernel.org/stable/c/874ff13c73c45ecb38cb82191e8c1d523f0dc81b",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,17 +2,25 @@
|
|||||||
"id": "CVE-2025-21941",
|
"id": "CVE-2025-21941",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-01T16:15:24.983",
|
"published": "2025-04-01T16:15:24.983",
|
||||||
"lastModified": "2025-04-01T20:26:01.990",
|
"lastModified": "2025-04-10T13:15:47.297",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params\n\nNull pointer dereference issue could occur when pipe_ctx->plane_state\nis null. The fix adds a check to ensure 'pipe_ctx->plane_state' is not\nnull before accessing. This prevents a null pointer dereference.\n\nFound by code review.\n\n(cherry picked from commit 63e6a77ccf239337baa9b1e7787cde9fa0462092)"
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params\n\nNull pointer dereference issue could occur when pipe_ctx->plane_state\nis null. The fix adds a check to ensure 'pipe_ctx->plane_state' is not\nnull before accessing. This prevents a null pointer dereference.\n\nFound by code review.\n\n(cherry picked from commit 63e6a77ccf239337baa9b1e7787cde9fa0462092)"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Se corrige la comprobaci\u00f3n nula de pipe_ctx->plane_state en resource_build_scaling_params. Un problema de desreferencia de puntero nulo pod\u00eda ocurrir cuando pipe_ctx->plane_state era nulo. Esta correcci\u00f3n a\u00f1ade una comprobaci\u00f3n para garantizar que 'pipe_ctx->plane_state' no fuera nulo antes de acceder. Esto evita una desreferencia de puntero nulo. Encontrado mediante revisi\u00f3n de c\u00f3digo. (Seleccionado de el commit 63e6a77ccf239337baa9b1e7787cde9fa0462092)"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/265422915416468ba91bffa56addbff45e18342a",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/3748fad09d89e9a5290e1738fd6872a79f794743",
|
"url": "https://git.kernel.org/stable/c/3748fad09d89e9a5290e1738fd6872a79f794743",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
@ -32,6 +40,10 @@
|
|||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/e0345c3478f185ca840daac7f08a1fcd4ebec3e9",
|
"url": "https://git.kernel.org/stable/c/e0345c3478f185ca840daac7f08a1fcd4ebec3e9",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/f435192e00bc4d5d4134356b93212670ec47fa8d",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,21 +2,33 @@
|
|||||||
"id": "CVE-2025-21956",
|
"id": "CVE-2025-21956",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-01T16:15:26.810",
|
"published": "2025-04-01T16:15:26.810",
|
||||||
"lastModified": "2025-04-01T20:26:01.990",
|
"lastModified": "2025-04-10T13:15:47.440",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Assign normalized_pix_clk when color depth = 14\n\n[WHY & HOW]\nA warning message \"WARNING: CPU: 4 PID: 459 at ... /dc_resource.c:3397\ncalculate_phy_pix_clks+0xef/0x100 [amdgpu]\" occurs because the\ndisplay_color_depth == COLOR_DEPTH_141414 is not handled. This is\nobserved in Radeon RX 6600 XT.\n\nIt is fixed by assigning pix_clk * (14 * 3) / 24 - same as the rests.\n\nAlso fixes the indentation in get_norm_pix_clk.\n\n(cherry picked from commit 274a87eb389f58eddcbc5659ab0b180b37e92775)"
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Assign normalized_pix_clk when color depth = 14\n\n[WHY & HOW]\nA warning message \"WARNING: CPU: 4 PID: 459 at ... /dc_resource.c:3397\ncalculate_phy_pix_clks+0xef/0x100 [amdgpu]\" occurs because the\ndisplay_color_depth == COLOR_DEPTH_141414 is not handled. This is\nobserved in Radeon RX 6600 XT.\n\nIt is fixed by assigning pix_clk * (14 * 3) / 24 - same as the rests.\n\nAlso fixes the indentation in get_norm_pix_clk.\n\n(cherry picked from commit 274a87eb389f58eddcbc5659ab0b180b37e92775)"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Asignar normalized_pix_clk cuando la profundidad de color es 14 [POR QU\u00c9 Y C\u00d3MO] Se produce un mensaje de advertencia \"ADVERTENCIA: CPU: 4 PID: 459 en ... /dc_resource.c:3397 calculate_phy_pix_clks+0xef/0x100 [amdgpu]\" porque no se gestiona la profundidad de color de la pantalla = COLOR_DEPTH_141414. Esto se observa en la Radeon RX 6600 XT. Se soluciona asignando pix_clk * (14 * 3) / 24, igual que el resto. Tambi\u00e9n se corrige la sangr\u00eda en get_norm_pix_clk. (Seleccionado de el commit 274a87eb389f58eddcbc5659ab0b180b37e92775)"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/0174a2e5770efee9dbd4b58963ed4d939298ff5e",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/04f90b505ad3a6eed474bbaa03167095fef5203a",
|
"url": "https://git.kernel.org/stable/c/04f90b505ad3a6eed474bbaa03167095fef5203a",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/0c0016712e5dc23ce4a7e673cbebc24a535d8c8a",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/27df30106690969f7d63604f0d49ed8e9bffa2cb",
|
"url": "https://git.kernel.org/stable/c/27df30106690969f7d63604f0d49ed8e9bffa2cb",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
@ -29,6 +41,10 @@
|
|||||||
"url": "https://git.kernel.org/stable/c/a8f77e1658d78e4a8bb227a83bcee67de97f7634",
|
"url": "https://git.kernel.org/stable/c/a8f77e1658d78e4a8bb227a83bcee67de97f7634",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/cca3ab74f90176099b6392e8e894b52b27b3d080",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/dc831b38680c47d07e425871a9852109183895cf",
|
"url": "https://git.kernel.org/stable/c/dc831b38680c47d07e425871a9852109183895cf",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
@ -2,17 +2,25 @@
|
|||||||
"id": "CVE-2025-21957",
|
"id": "CVE-2025-21957",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-01T16:15:26.910",
|
"published": "2025-04-01T16:15:26.910",
|
||||||
"lastModified": "2025-04-01T20:26:01.990",
|
"lastModified": "2025-04-10T13:15:47.577",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla1280: Fix kernel oops when debug level > 2\n\nA null dereference or oops exception will eventually occur when qla1280.c\ndriver is compiled with DEBUG_QLA1280 enabled and ql_debug_level > 2. I\nthink its clear from the code that the intention here is sg_dma_len(s) not\nlength of sg_next(s) when printing the debug info."
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla1280: Fix kernel oops when debug level > 2\n\nA null dereference or oops exception will eventually occur when qla1280.c\ndriver is compiled with DEBUG_QLA1280 enabled and ql_debug_level > 2. I\nthink its clear from the code that the intention here is sg_dma_len(s) not\nlength of sg_next(s) when printing the debug info."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: qla1280: Se corrige el error del kernel cuando el nivel de depuraci\u00f3n > 2. Eventualmente, se producir\u00e1 una desreferencia nula o una excepci\u00f3n de error cuando el controlador qla1280.c se compila con DEBUG_QLA1280 habilitado y ql_debug_level > 2. Creo que del c\u00f3digo se desprende claramente que la intenci\u00f3n aqu\u00ed es sg_dma_len(s), no la longitud de sg_next(s) al imprimir la informaci\u00f3n de depuraci\u00f3n."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/11a8dac1177a596648a020a7f3708257a2f95fee",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/24602e2664c515a4f2950d7b52c3d5997463418c",
|
"url": "https://git.kernel.org/stable/c/24602e2664c515a4f2950d7b52c3d5997463418c",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
@ -29,6 +37,14 @@
|
|||||||
"url": "https://git.kernel.org/stable/c/af71ba921d08c241a817010f96458dc5e5e26762",
|
"url": "https://git.kernel.org/stable/c/af71ba921d08c241a817010f96458dc5e5e26762",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/afa27b7c17a48e01546ccaad0ab017ad0496a522",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/c737e2a5fb7f90b96a96121da1b50a9c74ae9b8c",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/ea371d1cdefb0951c7127a33bcd7eb931cf44571",
|
"url": "https://git.kernel.org/stable/c/ea371d1cdefb0951c7127a33bcd7eb931cf44571",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
@ -2,17 +2,25 @@
|
|||||||
"id": "CVE-2025-21959",
|
"id": "CVE-2025-21959",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-01T16:15:27.120",
|
"published": "2025-04-01T16:15:27.120",
|
||||||
"lastModified": "2025-04-01T20:26:01.990",
|
"lastModified": "2025-04-10T13:15:47.717",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree()\n\nSince commit b36e4523d4d5 (\"netfilter: nf_conncount: fix garbage\ncollection confirm race\"), `cpu` and `jiffies32` were introduced to\nthe struct nf_conncount_tuple.\n\nThe commit made nf_conncount_add() initialize `conn->cpu` and\n`conn->jiffies32` when allocating the struct.\nIn contrast, count_tree() was not changed to initialize them.\n\nBy commit 34848d5c896e (\"netfilter: nf_conncount: Split insert and\ntraversal\"), count_tree() was split and the relevant allocation\ncode now resides in insert_tree().\nInitialize `conn->cpu` and `conn->jiffies32` in insert_tree().\n\nBUG: KMSAN: uninit-value in find_or_evict net/netfilter/nf_conncount.c:117 [inline]\nBUG: KMSAN: uninit-value in __nf_conncount_add+0xd9c/0x2850 net/netfilter/nf_conncount.c:143\n find_or_evict net/netfilter/nf_conncount.c:117 [inline]\n __nf_conncount_add+0xd9c/0x2850 net/netfilter/nf_conncount.c:143\n count_tree net/netfilter/nf_conncount.c:438 [inline]\n nf_conncount_count+0x82f/0x1e80 net/netfilter/nf_conncount.c:521\n connlimit_mt+0x7f6/0xbd0 net/netfilter/xt_connlimit.c:72\n __nft_match_eval net/netfilter/nft_compat.c:403 [inline]\n nft_match_eval+0x1a5/0x300 net/netfilter/nft_compat.c:433\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\n nft_do_chain+0x426/0x2290 net/netfilter/nf_tables_core.c:288\n nft_do_chain_ipv4+0x1a5/0x230 net/netfilter/nft_chain_filter.c:23\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\n nf_hook_slow_list+0x24d/0x860 net/netfilter/core.c:663\n NF_HOOK_LIST include/linux/netfilter.h:350 [inline]\n ip_sublist_rcv+0x17b7/0x17f0 net/ipv4/ip_input.c:633\n ip_list_rcv+0x9ef/0xa40 net/ipv4/ip_input.c:669\n __netif_receive_skb_list_ptype net/core/dev.c:5936 [inline]\n __netif_receive_skb_list_core+0x15c5/0x1670 net/core/dev.c:5983\n __netif_receive_skb_list net/core/dev.c:6035 [inline]\n netif_receive_skb_list_internal+0x1085/0x1700 net/core/dev.c:6126\n netif_receive_skb_list+0x5a/0x460 net/core/dev.c:6178\n xdp_recv_frames net/bpf/test_run.c:280 [inline]\n xdp_test_run_batch net/bpf/test_run.c:361 [inline]\n bpf_test_run_xdp_live+0x2e86/0x3480 net/bpf/test_run.c:390\n bpf_prog_test_run_xdp+0xf1d/0x1ae0 net/bpf/test_run.c:1316\n bpf_prog_test_run+0x5e5/0xa30 kernel/bpf/syscall.c:4407\n __sys_bpf+0x6aa/0xd90 kernel/bpf/syscall.c:5813\n __do_sys_bpf kernel/bpf/syscall.c:5902 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5900 [inline]\n __ia32_sys_bpf+0xa0/0xe0 kernel/bpf/syscall.c:5900\n ia32_sys_call+0x394d/0x4180 arch/x86/include/generated/asm/syscalls_32.h:358\n do_syscall_32_irqs_on arch/x86/entry/common.c:165 [inline]\n __do_fast_syscall_32+0xb0/0x110 arch/x86/entry/common.c:387\n do_fast_syscall_32+0x38/0x80 arch/x86/entry/common.c:412\n do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:450\n entry_SYSENTER_compat_after_hwframe+0x84/0x8e\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:4121 [inline]\n slab_alloc_node mm/slub.c:4164 [inline]\n kmem_cache_alloc_noprof+0x915/0xe10 mm/slub.c:4171\n insert_tree net/netfilter/nf_conncount.c:372 [inline]\n count_tree net/netfilter/nf_conncount.c:450 [inline]\n nf_conncount_count+0x1415/0x1e80 net/netfilter/nf_conncount.c:521\n connlimit_mt+0x7f6/0xbd0 net/netfilter/xt_connlimit.c:72\n __nft_match_eval net/netfilter/nft_compat.c:403 [inline]\n nft_match_eval+0x1a5/0x300 net/netfilter/nft_compat.c:433\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\n nft_do_chain+0x426/0x2290 net/netfilter/nf_tables_core.c:288\n nft_do_chain_ipv4+0x1a5/0x230 net/netfilter/nft_chain_filter.c:23\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\n nf_hook_slow_list+0x24d/0x860 net/netfilter/core.c:663\n NF_HOOK_LIST include/linux/netfilter.h:350 [inline]\n ip_sublist_rcv+0x17b7/0x17f0 net/ipv4/ip_input.c:633\n ip_list_rcv+0x9ef/0xa40 net/ip\n---truncated---"
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree()\n\nSince commit b36e4523d4d5 (\"netfilter: nf_conncount: fix garbage\ncollection confirm race\"), `cpu` and `jiffies32` were introduced to\nthe struct nf_conncount_tuple.\n\nThe commit made nf_conncount_add() initialize `conn->cpu` and\n`conn->jiffies32` when allocating the struct.\nIn contrast, count_tree() was not changed to initialize them.\n\nBy commit 34848d5c896e (\"netfilter: nf_conncount: Split insert and\ntraversal\"), count_tree() was split and the relevant allocation\ncode now resides in insert_tree().\nInitialize `conn->cpu` and `conn->jiffies32` in insert_tree().\n\nBUG: KMSAN: uninit-value in find_or_evict net/netfilter/nf_conncount.c:117 [inline]\nBUG: KMSAN: uninit-value in __nf_conncount_add+0xd9c/0x2850 net/netfilter/nf_conncount.c:143\n find_or_evict net/netfilter/nf_conncount.c:117 [inline]\n __nf_conncount_add+0xd9c/0x2850 net/netfilter/nf_conncount.c:143\n count_tree net/netfilter/nf_conncount.c:438 [inline]\n nf_conncount_count+0x82f/0x1e80 net/netfilter/nf_conncount.c:521\n connlimit_mt+0x7f6/0xbd0 net/netfilter/xt_connlimit.c:72\n __nft_match_eval net/netfilter/nft_compat.c:403 [inline]\n nft_match_eval+0x1a5/0x300 net/netfilter/nft_compat.c:433\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\n nft_do_chain+0x426/0x2290 net/netfilter/nf_tables_core.c:288\n nft_do_chain_ipv4+0x1a5/0x230 net/netfilter/nft_chain_filter.c:23\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\n nf_hook_slow_list+0x24d/0x860 net/netfilter/core.c:663\n NF_HOOK_LIST include/linux/netfilter.h:350 [inline]\n ip_sublist_rcv+0x17b7/0x17f0 net/ipv4/ip_input.c:633\n ip_list_rcv+0x9ef/0xa40 net/ipv4/ip_input.c:669\n __netif_receive_skb_list_ptype net/core/dev.c:5936 [inline]\n __netif_receive_skb_list_core+0x15c5/0x1670 net/core/dev.c:5983\n __netif_receive_skb_list net/core/dev.c:6035 [inline]\n netif_receive_skb_list_internal+0x1085/0x1700 net/core/dev.c:6126\n netif_receive_skb_list+0x5a/0x460 net/core/dev.c:6178\n xdp_recv_frames net/bpf/test_run.c:280 [inline]\n xdp_test_run_batch net/bpf/test_run.c:361 [inline]\n bpf_test_run_xdp_live+0x2e86/0x3480 net/bpf/test_run.c:390\n bpf_prog_test_run_xdp+0xf1d/0x1ae0 net/bpf/test_run.c:1316\n bpf_prog_test_run+0x5e5/0xa30 kernel/bpf/syscall.c:4407\n __sys_bpf+0x6aa/0xd90 kernel/bpf/syscall.c:5813\n __do_sys_bpf kernel/bpf/syscall.c:5902 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5900 [inline]\n __ia32_sys_bpf+0xa0/0xe0 kernel/bpf/syscall.c:5900\n ia32_sys_call+0x394d/0x4180 arch/x86/include/generated/asm/syscalls_32.h:358\n do_syscall_32_irqs_on arch/x86/entry/common.c:165 [inline]\n __do_fast_syscall_32+0xb0/0x110 arch/x86/entry/common.c:387\n do_fast_syscall_32+0x38/0x80 arch/x86/entry/common.c:412\n do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:450\n entry_SYSENTER_compat_after_hwframe+0x84/0x8e\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:4121 [inline]\n slab_alloc_node mm/slub.c:4164 [inline]\n kmem_cache_alloc_noprof+0x915/0xe10 mm/slub.c:4171\n insert_tree net/netfilter/nf_conncount.c:372 [inline]\n count_tree net/netfilter/nf_conncount.c:450 [inline]\n nf_conncount_count+0x1415/0x1e80 net/netfilter/nf_conncount.c:521\n connlimit_mt+0x7f6/0xbd0 net/netfilter/xt_connlimit.c:72\n __nft_match_eval net/netfilter/nft_compat.c:403 [inline]\n nft_match_eval+0x1a5/0x300 net/netfilter/nft_compat.c:433\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\n nft_do_chain+0x426/0x2290 net/netfilter/nf_tables_core.c:288\n nft_do_chain_ipv4+0x1a5/0x230 net/netfilter/nft_chain_filter.c:23\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\n nf_hook_slow_list+0x24d/0x860 net/netfilter/core.c:663\n NF_HOOK_LIST include/linux/netfilter.h:350 [inline]\n ip_sublist_rcv+0x17b7/0x17f0 net/ipv4/ip_input.c:633\n ip_list_rcv+0x9ef/0xa40 net/ip\n---truncated---"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nf_conncount: Inicializar completamente la estructura nf_conncount_tuple en insert_tree() Desde el commit b36e4523d4d5 (\"netfilter: nf_conncount: corregir la carrera de confirmaci\u00f3n de la recolecci\u00f3n de basura\"), se introdujeron `cpu` y `jiffies32` en la estructura nf_conncount_tuple. El commit hizo que nf_conncount_add() inicializara `conn->cpu` y `conn->jiffies32` al asignar la estructura. Por el contrario, count_tree() no se modific\u00f3 para inicializarlas. Mediante el commit 34848d5c896e (\"netfilter: nf_conncount: Dividir la inserci\u00f3n y el recorrido\"), count_tree() se dividi\u00f3 y el c\u00f3digo de asignaci\u00f3n relevante ahora reside en insert_tree(). Inicialice `conn->cpu` y `conn->jiffies32` en insert_tree(). ERROR: KMSAN: valor no inicializado en find_or_evict net/netfilter/nf_conncount.c:117 [en l\u00ednea] ERROR: KMSAN: valor no inicializado en __nf_conncount_add+0xd9c/0x2850 net/netfilter/nf_conncount.c:143 find_or_evict net/netfilter/nf_conncount.c:117 [en l\u00ednea] __nf_conncount_add+0xd9c/0x2850 net/netfilter/nf_conncount.c:143 count_tree net/netfilter/nf_conncount.c:438 [en l\u00ednea] nf_conncount_count+0x82f/0x1e80 net/netfilter/nf_conncount.c:521 connlimit_mt+0x7f6/0xbd0 net/netfilter/xt_connlimit.c:72 __nft_match_eval net/netfilter/nft_compat.c:403 [en l\u00ednea] nft_match_eval+0x1a5/0x300 net/netfilter/nft_compat.c:433 expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [en l\u00ednea] nft_do_chain+0x426/0x2290 net/netfilter/nf_tables_core.c:288 nft_do_chain_ipv4+0x1a5/0x230 net/netfilter/nft_chain_filter.c:23 nf_hook_entry_hookfn incluir/linux/netfilter.h:154 [en l\u00ednea] nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626 nf_hook_slow_list+0x24d/0x860 net/netfilter/core.c:663 NF_HOOK_LIST incluir/linux/netfilter.h:350 [en l\u00ednea] ip_sublist_rcv+0x17b7/0x17f0 net/ipv4/ip_input.c:633 ip_list_rcv+0x9ef/0xa40 net/ipv4/ip_input.c:669 __netif_receive_skb_list_ptype net/core/dev.c:5936 [en l\u00ednea] __netif_receive_skb_list_core+0x15c5/0x1670 net/core/dev.c:5983 __netif_receive_skb_list net/core/dev.c:6035 [en l\u00ednea] netif_receive_skb_list_internal+0x1085/0x1700 net/core/dev.c:6126 netif_receive_skb_list+0x5a/0x460 net/core/dev.c:6178 xdp_recv_frames net/bpf/test_run.c:280 [en l\u00ednea] xdp_test_run_batch net/bpf/test_run.c:361 [en l\u00ednea] bpf_test_run_xdp_live+0x2e86/0x3480 net/bpf/test_run.c:390 bpf_prog_test_run_xdp+0xf1d/0x1ae0 net/bpf/test_run.c:1316 bpf_prog_test_run+0x5e5/0xa30 kernel/bpf/syscall.c:4407 __sys_bpf+0x6aa/0xd90 kernel/bpf/syscall.c:5813 __do_sys_bpf kernel/bpf/syscall.c:5902 [en l\u00ednea] __se_sys_bpf kernel/bpf/syscall.c:5900 [en l\u00ednea] __ia32_sys_bpf+0xa0/0xe0 kernel/bpf/syscall.c:5900 ia32_sys_call+0x394d/0x4180 arch/x86/include/generated/asm/syscalls_32.h:358 do_syscall_32_irqs_on arch/x86/entry/common.c:165 [en l\u00ednea] __do_fast_syscall_32+0xb0/0x110 arch/x86/entry/common.c:387 do_fast_syscall_32+0x38/0x80 arch/x86/entry/common.c:412 do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:450 entry_SYSENTER_compat_after_hwframe+0x84/0x8e Uninit se cre\u00f3 en: slab_post_alloc_hook mm/slub.c:4121 [en l\u00ednea] slab_alloc_node mm/slub.c:4164 [en l\u00ednea] kmem_cache_alloc_noprof+0x915/0xe10 mm/slub.c:4171 \u00e1rbol_de_inserci\u00f3n net/netfilter/nf_conncount.c:372 [en l\u00ednea] \u00e1rbol_de_conteo net/netfilter/nf_conncount.c:450 [en l\u00ednea] nf_conncount_count+0x1415/0x1e80 net/netfilter/nf_conncount.c:521 connlimit_mt+0x7f6/0xbd0 net/netfilter/xt_connlimit.c:72 __nft_match_eval net/netfilter/nft_compat.c:403 [en l\u00ednea] nft_match_eval+0x1a5/0x300 net/netfilter/nft_compat.c:433 expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [en l\u00ednea] nft_do_chain+0x426/0x2290 net/netfilter/nf_tables_core.c:288 nft_do_chain_ipv4+0x1a5/0x230 net/netfilter/nft_chain_filter.c:23 nf_hook_entry_hookfn include/linux/netfilter.h:154 [en l\u00ednea] nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626 nf_hook_slow_list+0x24d/0x860 net/netfilter/core.c:663 NF_HOOK_LIST include/linux/netfilter.h:350 [en l\u00ednea] ip_sublist_rcv+0x17b7/0x17f0 ---truncado---"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/2a154ce766b995494e88d8d117fa82cc6b73dd87",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/2db5baaf047a7c8d6ed5e2cc657b7854e155b7fc",
|
"url": "https://git.kernel.org/stable/c/2db5baaf047a7c8d6ed5e2cc657b7854e155b7fc",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
@ -29,6 +37,14 @@
|
|||||||
"url": "https://git.kernel.org/stable/c/db1e0c0856821c59a32ea3af79476bf20a6beeb2",
|
"url": "https://git.kernel.org/stable/c/db1e0c0856821c59a32ea3af79476bf20a6beeb2",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/e8544a5a97bee3674e7cd6bf0f3a4af517fa9146",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/f522229c5563b59b4240261e406779bba6754159",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/fda50302a13701d47fbe01e1739c7a51114144fb",
|
"url": "https://git.kernel.org/stable/c/fda50302a13701d47fbe01e1739c7a51114144fb",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-21962",
|
"id": "CVE-2025-21962",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-01T16:15:27.447",
|
"published": "2025-04-01T16:15:27.447",
|
||||||
"lastModified": "2025-04-01T20:26:01.990",
|
"lastModified": "2025-04-10T13:15:47.857",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix integer overflow while processing closetimeo mount option\n\nUser-provided mount parameter closetimeo of type u32 is intended to have\nan upper limit, but before it is validated, the value is converted from\nseconds to jiffies which can lead to an integer overflow.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE."
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix integer overflow while processing closetimeo mount option\n\nUser-provided mount parameter closetimeo of type u32 is intended to have\nan upper limit, but before it is validated, the value is converted from\nseconds to jiffies which can lead to an integer overflow.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: Se corrige un desbordamiento de enteros al procesar la opci\u00f3n de montaje closetimeo. El par\u00e1metro de montaje proporcionado por el usuario, closetimeo, de tipo u32, est\u00e1 dise\u00f1ado para tener un l\u00edmite superior, pero antes de su validaci\u00f3n, el valor se convierte de segundos a jiffies, lo que puede provocar un desbordamiento de enteros. Encontrado por el Centro de Verificaci\u00f3n de Linux (linuxtesting.org) con SVACE."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
@ -17,6 +21,10 @@
|
|||||||
"url": "https://git.kernel.org/stable/c/1c46673be93dd2954f44fe370fb4f2b8e6214224",
|
"url": "https://git.kernel.org/stable/c/1c46673be93dd2954f44fe370fb4f2b8e6214224",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/513f6cf2e906a504b7ab0b62b2eea993a6f64558",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/6c13fcb7cf59ae65940da1dfea80144e42921e53",
|
"url": "https://git.kernel.org/stable/c/6c13fcb7cf59ae65940da1dfea80144e42921e53",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
@ -2,17 +2,25 @@
|
|||||||
"id": "CVE-2025-21963",
|
"id": "CVE-2025-21963",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-01T16:15:27.550",
|
"published": "2025-04-01T16:15:27.550",
|
||||||
"lastModified": "2025-04-01T20:26:01.990",
|
"lastModified": "2025-04-10T13:15:47.980",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix integer overflow while processing acdirmax mount option\n\nUser-provided mount parameter acdirmax of type u32 is intended to have\nan upper limit, but before it is validated, the value is converted from\nseconds to jiffies which can lead to an integer overflow.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE."
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix integer overflow while processing acdirmax mount option\n\nUser-provided mount parameter acdirmax of type u32 is intended to have\nan upper limit, but before it is validated, the value is converted from\nseconds to jiffies which can lead to an integer overflow.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: Se corrige el desbordamiento de enteros al procesar la opci\u00f3n de montaje acdirmax. El par\u00e1metro de montaje acdirmax, proporcionado por el usuario y de tipo u32, est\u00e1 dise\u00f1ado para tener un l\u00edmite superior, pero antes de su validaci\u00f3n, el valor se convierte de segundos a jiffies, lo que puede provocar un desbordamiento de enteros. Encontrado por el Centro de Verificaci\u00f3n de Linux (linuxtesting.org) con SVACE."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/0c26edf477e093cefc41637f5bccc102e1a77399",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/2809a79bc64964ce02e0c5f2d6bd39b9d09bdb3c",
|
"url": "https://git.kernel.org/stable/c/2809a79bc64964ce02e0c5f2d6bd39b9d09bdb3c",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-21964",
|
"id": "CVE-2025-21964",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-01T16:15:27.657",
|
"published": "2025-04-01T16:15:27.657",
|
||||||
"lastModified": "2025-04-01T20:26:01.990",
|
"lastModified": "2025-04-10T13:15:48.097",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix integer overflow while processing acregmax mount option\n\nUser-provided mount parameter acregmax of type u32 is intended to have\nan upper limit, but before it is validated, the value is converted from\nseconds to jiffies which can lead to an integer overflow.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE."
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix integer overflow while processing acregmax mount option\n\nUser-provided mount parameter acregmax of type u32 is intended to have\nan upper limit, but before it is validated, the value is converted from\nseconds to jiffies which can lead to an integer overflow.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: Se corrige un desbordamiento de enteros al procesar la opci\u00f3n de montaje acregmax. El par\u00e1metro de montaje acregmax, proporcionado por el usuario y de tipo u32, est\u00e1 dise\u00f1ado para tener un l\u00edmite superior, pero antes de su validaci\u00f3n, el valor se convierte de segundos a jiffies, lo que puede provocar un desbordamiento de enteros. Encontrado por el Centro de Verificaci\u00f3n de Linux (linuxtesting.org) con SVACE."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
@ -29,6 +33,10 @@
|
|||||||
"url": "https://git.kernel.org/stable/c/833f2903eb8b70faca7967319e580e9ce69729fc",
|
"url": "https://git.kernel.org/stable/c/833f2903eb8b70faca7967319e580e9ce69729fc",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/a13351624a6af8d91398860b8c9d4cf6c8e63de5",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/dd190168e60ac15408f074a1fe0ce36aff34027b",
|
"url": "https://git.kernel.org/stable/c/dd190168e60ac15408f074a1fe0ce36aff34027b",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
@ -2,17 +2,29 @@
|
|||||||
"id": "CVE-2025-21968",
|
"id": "CVE-2025-21968",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-01T16:15:28.090",
|
"published": "2025-04-01T16:15:28.090",
|
||||||
"lastModified": "2025-04-01T20:26:01.990",
|
"lastModified": "2025-04-10T13:15:48.210",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix slab-use-after-free on hdcp_work\n\n[Why]\nA slab-use-after-free is reported when HDCP is destroyed but the\nproperty_validate_dwork queue is still running.\n\n[How]\nCancel the delayed work when destroying workqueue.\n\n(cherry picked from commit 725a04ba5a95e89c89633d4322430cfbca7ce128)"
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix slab-use-after-free on hdcp_work\n\n[Why]\nA slab-use-after-free is reported when HDCP is destroyed but the\nproperty_validate_dwork queue is still running.\n\n[How]\nCancel the delayed work when destroying workqueue.\n\n(cherry picked from commit 725a04ba5a95e89c89633d4322430cfbca7ce128)"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Correcci\u00f3n de slab-use-after-free en hdcp_work [Por qu\u00e9] Se reporta un slab-use-after-free cuando se destruye HDCP, pero la cola property_validate_dwork sigue en ejecuci\u00f3n. [C\u00f3mo] Cancelar el trabajo retrasado al destruir la cola de trabajo. (Seleccionado de el commit 725a04ba5a95e89c89633d4322430cfbca7ce128)"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/06acfdef370ae018dad9592369e2d2fd9a40c09e",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/1397715b011bcdc6ad91b17df7acaee301e89db5",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/378b361e2e30e9729f9a7676f7926868d14f4326",
|
"url": "https://git.kernel.org/stable/c/378b361e2e30e9729f9a7676f7926868d14f4326",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-21970",
|
"id": "CVE-2025-21970",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-01T16:15:28.323",
|
"published": "2025-04-01T16:15:28.323",
|
||||||
"lastModified": "2025-04-01T20:26:01.990",
|
"lastModified": "2025-04-10T13:15:48.327",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Bridge, fix the crash caused by LAG state check\n\nWhen removing LAG device from bridge, NETDEV_CHANGEUPPER event is\ntriggered. Driver finds the lower devices (PFs) to flush all the\noffloaded entries. And mlx5_lag_is_shared_fdb is checked, it returns\nfalse if one of PF is unloaded. In such case,\nmlx5_esw_bridge_lag_rep_get() and its caller return NULL, instead of\nthe alive PF, and the flush is skipped.\n\nBesides, the bridge fdb entry's lastuse is updated in mlx5 bridge\nevent handler. But this SWITCHDEV_FDB_ADD_TO_BRIDGE event can be\nignored in this case because the upper interface for bond is deleted,\nand the entry will never be aged because lastuse is never updated.\n\nTo make things worse, as the entry is alive, mlx5 bridge workqueue\nkeeps sending that event, which is then handled by kernel bridge\nnotifier. It causes the following crash when accessing the passed bond\nnetdev which is already destroyed.\n\nTo fix this issue, remove such checks. LAG state is already checked in\ncommit 15f8f168952f (\"net/mlx5: Bridge, verify LAG state when adding\nbond to bridge\"), driver still need to skip offload if LAG becomes\ninvalid state after initialization.\n\n Oops: stack segment: 0000 [#1] SMP\n CPU: 3 UID: 0 PID: 23695 Comm: kworker/u40:3 Tainted: G OE 6.11.0_mlnx #1\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n Workqueue: mlx5_bridge_wq mlx5_esw_bridge_update_work [mlx5_core]\n RIP: 0010:br_switchdev_event+0x2c/0x110 [bridge]\n Code: 44 00 00 48 8b 02 48 f7 00 00 02 00 00 74 69 41 54 55 53 48 83 ec 08 48 8b a8 08 01 00 00 48 85 ed 74 4a 48 83 fe 02 48 89 d3 <4c> 8b 65 00 74 23 76 49 48 83 fe 05 74 7e 48 83 fe 06 75 2f 0f b7\n RSP: 0018:ffffc900092cfda0 EFLAGS: 00010297\n RAX: ffff888123bfe000 RBX: ffffc900092cfe08 RCX: 00000000ffffffff\n RDX: ffffc900092cfe08 RSI: 0000000000000001 RDI: ffffffffa0c585f0\n RBP: 6669746f6e690a30 R08: 0000000000000000 R09: ffff888123ae92c8\n R10: 0000000000000000 R11: fefefefefefefeff R12: ffff888123ae9c60\n R13: 0000000000000001 R14: ffffc900092cfe08 R15: 0000000000000000\n FS: 0000000000000000(0000) GS:ffff88852c980000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f15914c8734 CR3: 0000000002830005 CR4: 0000000000770ef0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n PKRU: 55555554\n Call Trace:\n <TASK>\n ? __die_body+0x1a/0x60\n ? die+0x38/0x60\n ? do_trap+0x10b/0x120\n ? do_error_trap+0x64/0xa0\n ? exc_stack_segment+0x33/0x50\n ? asm_exc_stack_segment+0x22/0x30\n ? br_switchdev_event+0x2c/0x110 [bridge]\n ? sched_balance_newidle.isra.149+0x248/0x390\n notifier_call_chain+0x4b/0xa0\n atomic_notifier_call_chain+0x16/0x20\n mlx5_esw_bridge_update+0xec/0x170 [mlx5_core]\n mlx5_esw_bridge_update_work+0x19/0x40 [mlx5_core]\n process_scheduled_works+0x81/0x390\n worker_thread+0x106/0x250\n ? bh_worker+0x110/0x110\n kthread+0xb7/0xe0\n ? kthread_park+0x80/0x80\n ret_from_fork+0x2d/0x50\n ? kthread_park+0x80/0x80\n ret_from_fork_asm+0x11/0x20\n </TASK>"
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Bridge, fix the crash caused by LAG state check\n\nWhen removing LAG device from bridge, NETDEV_CHANGEUPPER event is\ntriggered. Driver finds the lower devices (PFs) to flush all the\noffloaded entries. And mlx5_lag_is_shared_fdb is checked, it returns\nfalse if one of PF is unloaded. In such case,\nmlx5_esw_bridge_lag_rep_get() and its caller return NULL, instead of\nthe alive PF, and the flush is skipped.\n\nBesides, the bridge fdb entry's lastuse is updated in mlx5 bridge\nevent handler. But this SWITCHDEV_FDB_ADD_TO_BRIDGE event can be\nignored in this case because the upper interface for bond is deleted,\nand the entry will never be aged because lastuse is never updated.\n\nTo make things worse, as the entry is alive, mlx5 bridge workqueue\nkeeps sending that event, which is then handled by kernel bridge\nnotifier. It causes the following crash when accessing the passed bond\nnetdev which is already destroyed.\n\nTo fix this issue, remove such checks. LAG state is already checked in\ncommit 15f8f168952f (\"net/mlx5: Bridge, verify LAG state when adding\nbond to bridge\"), driver still need to skip offload if LAG becomes\ninvalid state after initialization.\n\n Oops: stack segment: 0000 [#1] SMP\n CPU: 3 UID: 0 PID: 23695 Comm: kworker/u40:3 Tainted: G OE 6.11.0_mlnx #1\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n Workqueue: mlx5_bridge_wq mlx5_esw_bridge_update_work [mlx5_core]\n RIP: 0010:br_switchdev_event+0x2c/0x110 [bridge]\n Code: 44 00 00 48 8b 02 48 f7 00 00 02 00 00 74 69 41 54 55 53 48 83 ec 08 48 8b a8 08 01 00 00 48 85 ed 74 4a 48 83 fe 02 48 89 d3 <4c> 8b 65 00 74 23 76 49 48 83 fe 05 74 7e 48 83 fe 06 75 2f 0f b7\n RSP: 0018:ffffc900092cfda0 EFLAGS: 00010297\n RAX: ffff888123bfe000 RBX: ffffc900092cfe08 RCX: 00000000ffffffff\n RDX: ffffc900092cfe08 RSI: 0000000000000001 RDI: ffffffffa0c585f0\n RBP: 6669746f6e690a30 R08: 0000000000000000 R09: ffff888123ae92c8\n R10: 0000000000000000 R11: fefefefefefefeff R12: ffff888123ae9c60\n R13: 0000000000000001 R14: ffffc900092cfe08 R15: 0000000000000000\n FS: 0000000000000000(0000) GS:ffff88852c980000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f15914c8734 CR3: 0000000002830005 CR4: 0000000000770ef0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n PKRU: 55555554\n Call Trace:\n <TASK>\n ? __die_body+0x1a/0x60\n ? die+0x38/0x60\n ? do_trap+0x10b/0x120\n ? do_error_trap+0x64/0xa0\n ? exc_stack_segment+0x33/0x50\n ? asm_exc_stack_segment+0x22/0x30\n ? br_switchdev_event+0x2c/0x110 [bridge]\n ? sched_balance_newidle.isra.149+0x248/0x390\n notifier_call_chain+0x4b/0xa0\n atomic_notifier_call_chain+0x16/0x20\n mlx5_esw_bridge_update+0xec/0x170 [mlx5_core]\n mlx5_esw_bridge_update_work+0x19/0x40 [mlx5_core]\n process_scheduled_works+0x81/0x390\n worker_thread+0x106/0x250\n ? bh_worker+0x110/0x110\n kthread+0xb7/0xe0\n ? kthread_park+0x80/0x80\n ret_from_fork+0x2d/0x50\n ? kthread_park+0x80/0x80\n ret_from_fork_asm+0x11/0x20\n </TASK>"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5: Puente, corrige el fallo causado por la comprobaci\u00f3n del estado de LAG Al retirar el dispositivo LAG del puente, se activa el evento NETDEV_CHANGEUPPER. El controlador encuentra los dispositivos inferiores (PF) para vaciar todas las entradas descargadas. Y mlx5_lag_is_shared_fdb est\u00e1 marcado, devuelve falso si uno de los PF est\u00e1 descargado. En tal caso, mlx5_esw_bridge_lag_rep_get() y su llamador devuelven NULL, en lugar del PF vivo, y se omite el vaciado. Adem\u00e1s, el lastuse de la entrada fdb del puente se actualiza en el controlador de eventos del puente mlx5. Pero este evento SWITCHDEV_FDB_ADD_TO_BRIDGE se puede ignorar en este caso porque se elimina la interfaz superior para el enlace y la entrada nunca se envejecer\u00e1 porque lastuse nunca se actualiza. Para empeorar las cosas, mientras la entrada est\u00e9 activa, la cola de trabajo del puente mlx5 sigue enviando ese evento, que luego gestiona el notificador del puente del n\u00facleo. Esto provoca el siguiente fallo al acceder al enlace transferido netdev, que ya est\u00e1 destruido. Para solucionar este problema, elimine estas comprobaciones. El estado de LAG ya se comprob\u00f3 en el commit 15f8f168952f (\"net/mlx5: Puente, verificar el estado de LAG al agregar el enlace al puente\"). El controlador a\u00fan debe omitir la descarga si el estado de LAG se vuelve inv\u00e1lido despu\u00e9s de la inicializaci\u00f3n. Ups: segmento de pila: 0000 [#1] CPU SMP: 3 UID: 0 PID: 23695 Comm: kworker/u40:3 Contaminado: G OE 6.11.0_mlnx #1 Contaminado: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE Nombre del hardware: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 Workqueue: mlx5_bridge_wq mlx5_esw_bridge_update_work [mlx5_core] RIP: 0010:br_switchdev_event+0x2c/0x110 [bridge] Code: 44 00 00 48 8b 02 48 f7 00 00 02 00 00 74 69 41 54 55 53 48 83 ec 08 48 8b a8 08 01 00 00 48 85 ed 74 4a 48 83 fe 02 48 89 d3 <4c> 8b 65 00 74 23 76 49 48 83 fe 05 74 7e 48 83 fe 06 75 2f 0f b7 RSP: 0018:ffffc900092cfda0 EFLAGS: 00010297 RAX: ffff888123bfe000 RBX: ffffc900092cfe08 RCX: 00000000ffffffff RDX: ffffc900092cfe08 RSI: 0000000000000001 RDI: ffffffffa0c585f0 RBP: 6669746f6e690a30 R08: 0000000000000000 R09: ffff888123ae92c8 R10: 0000000000000000 R11: fefefefefefefeff R12: ffff888123ae9c60 R13: 0000000000000001 R14: ffffc900092cfe08 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff88852c980000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f15914c8734 CR3: 0000000002830005 CR4: 0000000000770ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: ? __die_body+0x1a/0x60 ? die+0x38/0x60 ? do_trap+0x10b/0x120 ? do_error_trap+0x64/0xa0 ? exc_stack_segment+0x33/0x50 ? asm_exc_stack_segment+0x22/0x30 ? br_switchdev_event+0x2c/0x110 [bridge] ? sched_balance_newidle.isra.149+0x248/0x390 notifier_call_chain+0x4b/0xa0 atomic_notifier_call_chain+0x16/0x20 mlx5_esw_bridge_update+0xec/0x170 [mlx5_core] mlx5_esw_bridge_update_work+0x19/0x40 [mlx5_core] process_scheduled_works+0x81/0x390 worker_thread+0x106/0x250 ? bh_worker+0x110/0x110 kthread+0xb7/0xe0 ? kthread_park+0x80/0x80 ret_from_fork+0x2d/0x50 ? kthread_park+0x80/0x80 ret_from_fork_asm+0x11/0x20 "
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
@ -32,6 +36,10 @@
|
|||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/f7bf259a04271165ae667ad21cfc60c6413f25ca",
|
"url": "https://git.kernel.org/stable/c/f7bf259a04271165ae667ad21cfc60c6413f25ca",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/f90c4d6572488e2bad38cca00f1c59174a538a1a",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,17 +2,25 @@
|
|||||||
"id": "CVE-2025-21971",
|
"id": "CVE-2025-21971",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-01T16:15:28.440",
|
"published": "2025-04-01T16:15:28.440",
|
||||||
"lastModified": "2025-04-01T20:26:01.990",
|
"lastModified": "2025-04-10T13:15:48.453",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: Prevent creation of classes with TC_H_ROOT\n\nThe function qdisc_tree_reduce_backlog() uses TC_H_ROOT as a termination\ncondition when traversing up the qdisc tree to update parent backlog\ncounters. However, if a class is created with classid TC_H_ROOT, the\ntraversal terminates prematurely at this class instead of reaching the\nactual root qdisc, causing parent statistics to be incorrectly maintained.\nIn case of DRR, this could lead to a crash as reported by Mingi Cho.\n\nPrevent the creation of any Qdisc class with classid TC_H_ROOT\n(0xFFFFFFFF) across all qdisc types, as suggested by Jamal."
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: Prevent creation of classes with TC_H_ROOT\n\nThe function qdisc_tree_reduce_backlog() uses TC_H_ROOT as a termination\ncondition when traversing up the qdisc tree to update parent backlog\ncounters. However, if a class is created with classid TC_H_ROOT, the\ntraversal terminates prematurely at this class instead of reaching the\nactual root qdisc, causing parent statistics to be incorrectly maintained.\nIn case of DRR, this could lead to a crash as reported by Mingi Cho.\n\nPrevent the creation of any Qdisc class with classid TC_H_ROOT\n(0xFFFFFFFF) across all qdisc types, as suggested by Jamal."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net_sched: Impide la creaci\u00f3n de clases con TC_H_ROOT La funci\u00f3n qdisc_tree_reduce_backlog() usa TC_H_ROOT como condici\u00f3n de terminaci\u00f3n al recorrer el \u00e1rbol qdisc para actualizar los contadores de backlog primarios. Sin embargo, si se crea una clase con classid TC_H_ROOT, el recorrido termina prematuramente en esta clase en lugar de alcanzar la qdisc root real, lo que provoca que las estad\u00edsticas primarias se mantengan incorrectamente. En caso de DRR, esto podr\u00eda provocar un fallo como lo inform\u00f3 Mingi Cho. Impide la creaci\u00f3n de cualquier clase Qdisc con classid TC_H_ROOT (0xFFFFFFFF) en todos los tipos de qdisc, como sugiri\u00f3 Jamal."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/003d92c91cdb5a64b25a9a74cb8543aac9a8bb48",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/0c3057a5a04d07120b3d0ec9c79568fceb9c921e",
|
"url": "https://git.kernel.org/stable/c/0c3057a5a04d07120b3d0ec9c79568fceb9c921e",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
@ -25,10 +33,18 @@
|
|||||||
"url": "https://git.kernel.org/stable/c/78533c4a29ac3aeddce4b481770beaaa4f3bfb67",
|
"url": "https://git.kernel.org/stable/c/78533c4a29ac3aeddce4b481770beaaa4f3bfb67",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/7a82fe67a9f4d7123d8e5ba8f0f0806c28695006",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/94edfdfb9505ab608e86599d1d1e38c83816fc1c",
|
"url": "https://git.kernel.org/stable/c/94edfdfb9505ab608e86599d1d1e38c83816fc1c",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/e05d9938b1b0ac40b6054cc5fa0ccbd9afd5ed4c",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/e5ee00607bbfc97ef1526ea95b6b2458ac9e7cb7",
|
"url": "https://git.kernel.org/stable/c/e5ee00607bbfc97ef1526ea95b6b2458ac9e7cb7",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-21975",
|
"id": "CVE-2025-21975",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-01T16:15:28.853",
|
"published": "2025-04-01T16:15:28.853",
|
||||||
"lastModified": "2025-04-01T20:26:01.990",
|
"lastModified": "2025-04-10T13:15:48.573",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: handle errors in mlx5_chains_create_table()\n\nIn mlx5_chains_create_table(), the return value of\u00a0mlx5_get_fdb_sub_ns()\nand mlx5_get_flow_namespace() must be checked to prevent NULL pointer\ndereferences. If either function fails, the function should log error\nmessage with mlx5_core_warn() and return error pointer."
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: handle errors in mlx5_chains_create_table()\n\nIn mlx5_chains_create_table(), the return value of\u00a0mlx5_get_fdb_sub_ns()\nand mlx5_get_flow_namespace() must be checked to prevent NULL pointer\ndereferences. If either function fails, the function should log error\nmessage with mlx5_core_warn() and return error pointer."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5: gesti\u00f3n de errores en mlx5_chains_create_table(). En mlx5_chains_create_table(), se debe comprobar el valor de retorno de mlx5_get_fdb_sub_ns() y mlx5_get_flow_namespace() para evitar desreferencias de punteros nulos. Si alguna de las funciones falla, debe registrar un mensaje de error con mlx5_core_warn() y devolver un puntero de error."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
@ -21,10 +25,18 @@
|
|||||||
"url": "https://git.kernel.org/stable/c/1598307c914ba3d2642a2b03d1ff11efbdb7c6c2",
|
"url": "https://git.kernel.org/stable/c/1598307c914ba3d2642a2b03d1ff11efbdb7c6c2",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/15bdd93728369b2c8942a8e5d549d4b5dc04a2d9",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/1d34296409a519b4027750e3e82d9e19553a7398",
|
"url": "https://git.kernel.org/stable/c/1d34296409a519b4027750e3e82d9e19553a7398",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/29c419c64e9b396baeda1d8713d2aa3ba7c0acf6",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/637105ef0d46fe5beac15aceb431da3ec832bb00",
|
"url": "https://git.kernel.org/stable/c/637105ef0d46fe5beac15aceb431da3ec832bb00",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
@ -2,36 +2,160 @@
|
|||||||
"id": "CVE-2025-21979",
|
"id": "CVE-2025-21979",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-01T16:15:29.287",
|
"published": "2025-04-01T16:15:29.287",
|
||||||
"lastModified": "2025-04-01T20:26:01.990",
|
"lastModified": "2025-04-10T13:25:50.870",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: cancel wiphy_work before freeing wiphy\n\nA wiphy_work can be queued from the moment the wiphy is allocated and\ninitialized (i.e. wiphy_new_nm). When a wiphy_work is queued, the\nrdev::wiphy_work is getting queued.\n\nIf wiphy_free is called before the rdev::wiphy_work had a chance to run,\nthe wiphy memory will be freed, and then when it eventally gets to run\nit'll use invalid memory.\n\nFix this by canceling the work before freeing the wiphy."
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: cancel wiphy_work before freeing wiphy\n\nA wiphy_work can be queued from the moment the wiphy is allocated and\ninitialized (i.e. wiphy_new_nm). When a wiphy_work is queued, the\nrdev::wiphy_work is getting queued.\n\nIf wiphy_free is called before the rdev::wiphy_work had a chance to run,\nthe wiphy memory will be freed, and then when it eventally gets to run\nit'll use invalid memory.\n\nFix this by canceling the work before freeing the wiphy."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: cfg80211: cancelar wiphy_work antes de liberar wiphy. Un wiphy_work puede ponerse en cola desde el momento en que se asigna e inicializa el wiphy (es decir, wiphy_new_nm). Cuando se pone en cola un wiphy_work, tambi\u00e9n se pone en cola rdev::wiphy_work. Si se llama a wiphy_free antes de que rdev::wiphy_work se ejecute, se liberar\u00e1 la memoria del wiphy y, cuando finalmente se ejecute, usar\u00e1 memoria no v\u00e1lida. Para solucionar esto, cancele el trabajo antes de liberar el wiphy."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-416"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.1.57",
|
||||||
|
"versionEndExcluding": "6.1.132",
|
||||||
|
"matchCriteriaId": "AFE31CAB-7E14-4AA4-9EEA-4901C71DFF5A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.5",
|
||||||
|
"versionEndExcluding": "6.6.84",
|
||||||
|
"matchCriteriaId": "49FD01BB-6E18-4796-A16D-F5E17FAC1E71"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.12.20",
|
||||||
|
"matchCriteriaId": "60E9C5DF-D778-4572-848A-5D6CFFE022CA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.13",
|
||||||
|
"versionEndExcluding": "6.13.8",
|
||||||
|
"matchCriteriaId": "0A20D4D7-B329-4C68-B662-76062EA7DCF0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/0272d4af7f92997541d8bbf4c51918b93ded6ee2",
|
"url": "https://git.kernel.org/stable/c/0272d4af7f92997541d8bbf4c51918b93ded6ee2",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/72d520476a2fab6f3489e8388ab524985d6c4b90",
|
"url": "https://git.kernel.org/stable/c/72d520476a2fab6f3489e8388ab524985d6c4b90",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/75d262ad3c36d52852d764588fcd887f0fcd9138",
|
"url": "https://git.kernel.org/stable/c/75d262ad3c36d52852d764588fcd887f0fcd9138",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/a5158d67bff06cb6fea31be39aeb319fd908ed8e",
|
"url": "https://git.kernel.org/stable/c/a5158d67bff06cb6fea31be39aeb319fd908ed8e",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/dea22de162058216a90f2706f0d0b36f0ff309fd",
|
"url": "https://git.kernel.org/stable/c/dea22de162058216a90f2706f0d0b36f0ff309fd",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,36 +2,160 @@
|
|||||||
"id": "CVE-2025-21980",
|
"id": "CVE-2025-21980",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-01T16:15:29.390",
|
"published": "2025-04-01T16:15:29.390",
|
||||||
"lastModified": "2025-04-01T20:26:01.990",
|
"lastModified": "2025-04-10T13:25:42.490",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched: address a potential NULL pointer dereference in the GRED scheduler.\n\nIf kzalloc in gred_init returns a NULL pointer, the code follows the\nerror handling path, invoking gred_destroy. This, in turn, calls\ngred_offload, where memset could receive a NULL pointer as input,\npotentially leading to a kernel crash.\n\nWhen table->opt is NULL in gred_init(), gred_change_table_def()\nis not called yet, so it is not necessary to call ->ndo_setup_tc()\nin gred_offload()."
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched: address a potential NULL pointer dereference in the GRED scheduler.\n\nIf kzalloc in gred_init returns a NULL pointer, the code follows the\nerror handling path, invoking gred_destroy. This, in turn, calls\ngred_offload, where memset could receive a NULL pointer as input,\npotentially leading to a kernel crash.\n\nWhen table->opt is NULL in gred_init(), gred_change_table_def()\nis not called yet, so it is not necessary to call ->ndo_setup_tc()\nin gred_offload()."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sched: soluciona una posible desreferencia de puntero nulo en el programador GRED. Si kzalloc en gred_init devuelve un puntero nulo, el c\u00f3digo sigue la ruta de gesti\u00f3n de errores, invocando gred_destroy. Esto, a su vez, llama a gred_offload, donde memset podr\u00eda recibir un puntero nulo como entrada, lo que podr\u00eda provocar un fallo del kernel. Cuando table->opt es nulo en gred_init(), gred_change_table_def() a\u00fan no se llama, por lo que no es necesario llamar a ->ndo_setup_tc() en gred_offload()."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.16",
|
||||||
|
"versionEndExcluding": "6.1.132",
|
||||||
|
"matchCriteriaId": "91D1C2F6-55A1-4CF4-AC66-ADF758259C59"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2",
|
||||||
|
"versionEndExcluding": "6.6.84",
|
||||||
|
"matchCriteriaId": "994E0F00-FAC4-40E4-9068-C7D4D8242EC8"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.12.20",
|
||||||
|
"matchCriteriaId": "60E9C5DF-D778-4572-848A-5D6CFFE022CA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.13",
|
||||||
|
"versionEndExcluding": "6.13.8",
|
||||||
|
"matchCriteriaId": "0A20D4D7-B329-4C68-B662-76062EA7DCF0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/0f0a152957d64ce45b4c27c687e7d087e8f45079",
|
"url": "https://git.kernel.org/stable/c/0f0a152957d64ce45b4c27c687e7d087e8f45079",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/115ef44a98220fddfab37a39a19370497cd718b9",
|
"url": "https://git.kernel.org/stable/c/115ef44a98220fddfab37a39a19370497cd718b9",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/5f996b4f80c2cef1f9c77275055e7fcba44c9199",
|
"url": "https://git.kernel.org/stable/c/5f996b4f80c2cef1f9c77275055e7fcba44c9199",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/68896dd50180b38ea552e49a6a00b685321e5769",
|
"url": "https://git.kernel.org/stable/c/68896dd50180b38ea552e49a6a00b685321e5769",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/d02c9acd68950a444acda18d514e2b41f846cb7f",
|
"url": "https://git.kernel.org/stable/c/d02c9acd68950a444acda18d514e2b41f846cb7f",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,36 +2,174 @@
|
|||||||
"id": "CVE-2025-21981",
|
"id": "CVE-2025-21981",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-01T16:15:29.503",
|
"published": "2025-04-01T16:15:29.503",
|
||||||
"lastModified": "2025-04-01T20:26:01.990",
|
"lastModified": "2025-04-10T13:25:35.970",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: fix memory leak in aRFS after reset\n\nFix aRFS (accelerated Receive Flow Steering) structures memory leak by\nadding a checker to verify if aRFS memory is already allocated while\nconfiguring VSI. aRFS objects are allocated in two cases:\n- as part of VSI initialization (at probe), and\n- as part of reset handling\n\nHowever, VSI reconfiguration executed during reset involves memory\nallocation one more time, without prior releasing already allocated\nresources. This led to the memory leak with the following signature:\n\n[root@os-delivery ~]# cat /sys/kernel/debug/kmemleak\nunreferenced object 0xff3c1ca7252e6000 (size 8192):\n comm \"kworker/0:0\", pid 8, jiffies 4296833052\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace (crc 0):\n [<ffffffff991ec485>] __kmalloc_cache_noprof+0x275/0x340\n [<ffffffffc0a6e06a>] ice_init_arfs+0x3a/0xe0 [ice]\n [<ffffffffc09f1027>] ice_vsi_cfg_def+0x607/0x850 [ice]\n [<ffffffffc09f244b>] ice_vsi_setup+0x5b/0x130 [ice]\n [<ffffffffc09c2131>] ice_init+0x1c1/0x460 [ice]\n [<ffffffffc09c64af>] ice_probe+0x2af/0x520 [ice]\n [<ffffffff994fbcd3>] local_pci_probe+0x43/0xa0\n [<ffffffff98f07103>] work_for_cpu_fn+0x13/0x20\n [<ffffffff98f0b6d9>] process_one_work+0x179/0x390\n [<ffffffff98f0c1e9>] worker_thread+0x239/0x340\n [<ffffffff98f14abc>] kthread+0xcc/0x100\n [<ffffffff98e45a6d>] ret_from_fork+0x2d/0x50\n [<ffffffff98e083ba>] ret_from_fork_asm+0x1a/0x30\n ..."
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: fix memory leak in aRFS after reset\n\nFix aRFS (accelerated Receive Flow Steering) structures memory leak by\nadding a checker to verify if aRFS memory is already allocated while\nconfiguring VSI. aRFS objects are allocated in two cases:\n- as part of VSI initialization (at probe), and\n- as part of reset handling\n\nHowever, VSI reconfiguration executed during reset involves memory\nallocation one more time, without prior releasing already allocated\nresources. This led to the memory leak with the following signature:\n\n[root@os-delivery ~]# cat /sys/kernel/debug/kmemleak\nunreferenced object 0xff3c1ca7252e6000 (size 8192):\n comm \"kworker/0:0\", pid 8, jiffies 4296833052\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace (crc 0):\n [<ffffffff991ec485>] __kmalloc_cache_noprof+0x275/0x340\n [<ffffffffc0a6e06a>] ice_init_arfs+0x3a/0xe0 [ice]\n [<ffffffffc09f1027>] ice_vsi_cfg_def+0x607/0x850 [ice]\n [<ffffffffc09f244b>] ice_vsi_setup+0x5b/0x130 [ice]\n [<ffffffffc09c2131>] ice_init+0x1c1/0x460 [ice]\n [<ffffffffc09c64af>] ice_probe+0x2af/0x520 [ice]\n [<ffffffff994fbcd3>] local_pci_probe+0x43/0xa0\n [<ffffffff98f07103>] work_for_cpu_fn+0x13/0x20\n [<ffffffff98f0b6d9>] process_one_work+0x179/0x390\n [<ffffffff98f0c1e9>] worker_thread+0x239/0x340\n [<ffffffff98f14abc>] kthread+0xcc/0x100\n [<ffffffff98e45a6d>] ret_from_fork+0x2d/0x50\n [<ffffffff98e083ba>] ret_from_fork_asm+0x1a/0x30\n ..."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ice: corrige p\u00e9rdida de memoria en aRFS despu\u00e9s del reinicio Corrige la p\u00e9rdida de memoria de las estructuras aRFS (direcci\u00f3n de flujo de recepci\u00f3n acelerada) agregando un verificador para verificar si la memoria aRFS ya est\u00e1 asignada mientras se configura VSI. Los objetos aRFS se asignan en dos casos: - como parte de la inicializaci\u00f3n de VSI (en la sonda), y - como parte de la gesti\u00f3n del reinicio. Sin embargo, la reconfiguraci\u00f3n de VSI ejecutada durante el reinicio implica la asignaci\u00f3n de memoria una vez m\u00e1s, sin liberar previamente los recursos ya asignados. Esto provoc\u00f3 la fuga de memoria con la siguiente firma: [root@os-delivery ~]# cat /sys/kernel/debug/kmemleak unreferenced object 0xff3c1ca7252e6000 (size 8192): comm \"kworker/0:0\", pid 8, jiffies 4296833052 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): [] __kmalloc_cache_noprof+0x275/0x340 [] ice_init_arfs+0x3a/0xe0 [ice] [] ice_vsi_cfg_def+0x607/0x850 [ice] [] ice_vsi_setup+0x5b/0x130 [ice] [] ice_init+0x1c1/0x460 [ice] [] ice_probe+0x2af/0x520 [ice] [] local_pci_probe+0x43/0xa0 [] work_for_cpu_fn+0x13/0x20 [] process_one_work+0x179/0x390 [] worker_thread+0x239/0x340 [] kthread+0xcc/0x100 [] ret_from_fork+0x2d/0x50 [] ret_from_fork_asm+0x1a/0x30 ... "
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-401"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.8",
|
||||||
|
"versionEndExcluding": "6.1.132",
|
||||||
|
"matchCriteriaId": "433045BA-C201-4126-9F76-1749DFE6E101"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2",
|
||||||
|
"versionEndExcluding": "6.6.84",
|
||||||
|
"matchCriteriaId": "994E0F00-FAC4-40E4-9068-C7D4D8242EC8"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.12.20",
|
||||||
|
"matchCriteriaId": "60E9C5DF-D778-4572-848A-5D6CFFE022CA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.13",
|
||||||
|
"versionEndExcluding": "6.13.8",
|
||||||
|
"matchCriteriaId": "0A20D4D7-B329-4C68-B662-76062EA7DCF0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/23d97f18901ef5e4e264e3b1777fe65c760186b5",
|
"url": "https://git.kernel.org/stable/c/23d97f18901ef5e4e264e3b1777fe65c760186b5",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/3b27e6e10a32589fcd293b8933ab6de9387a460e",
|
"url": "https://git.kernel.org/stable/c/3b27e6e10a32589fcd293b8933ab6de9387a460e",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/5d30d256661fc11b6e73fac6c3783a702e1006a3",
|
"url": "https://git.kernel.org/stable/c/5d30d256661fc11b6e73fac6c3783a702e1006a3",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/78f3d64b30210c0e521c59357431aca14024cb79",
|
"url": "https://git.kernel.org/stable/c/78f3d64b30210c0e521c59357431aca14024cb79",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/e6902101f34f098af59b0d1d8cf90c4124c02c6a",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/ef2bc94059836a115430a6ad9d2838b0b34dc8f5",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/fcbacc47d16306c87ad1b820b7a575f6e9eae58b",
|
"url": "https://git.kernel.org/stable/c/fcbacc47d16306c87ad1b820b7a575f6e9eae58b",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,28 +2,132 @@
|
|||||||
"id": "CVE-2025-21982",
|
"id": "CVE-2025-21982",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-01T16:15:29.613",
|
"published": "2025-04-01T16:15:29.613",
|
||||||
"lastModified": "2025-04-01T20:26:01.990",
|
"lastModified": "2025-04-10T13:25:23.140",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: nuvoton: npcm8xx: Add NULL check in npcm8xx_gpio_fw\n\ndevm_kasprintf() calls can return null pointers on failure.\nBut the return values were not checked in npcm8xx_gpio_fw().\nAdd NULL check in npcm8xx_gpio_fw(), to handle kernel NULL\npointer dereference error."
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: nuvoton: npcm8xx: Add NULL check in npcm8xx_gpio_fw\n\ndevm_kasprintf() calls can return null pointers on failure.\nBut the return values were not checked in npcm8xx_gpio_fw().\nAdd NULL check in npcm8xx_gpio_fw(), to handle kernel NULL\npointer dereference error."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pinctrl: nuvoton: npcm8xx: Se ha a\u00f1adido una comprobaci\u00f3n de valores nulos en las llamadas a npcm8xx_gpio_fw devm_kasprintf(), que pueden devolver punteros nulos en caso de error. Sin embargo, los valores de retorno no se comprobaron en npcm8xx_gpio_fw(). Se ha a\u00f1adido una comprobaci\u00f3n de valores nulos en npcm8xx_gpio_fw() para gestionar el error de desreferencia de punteros nulos del kernel."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.12.20",
|
||||||
|
"matchCriteriaId": "60E9C5DF-D778-4572-848A-5D6CFFE022CA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.13",
|
||||||
|
"versionEndExcluding": "6.13.8",
|
||||||
|
"matchCriteriaId": "0A20D4D7-B329-4C68-B662-76062EA7DCF0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/6a08a86e5aff8e65368ccd463348fdda26100821",
|
"url": "https://git.kernel.org/stable/c/6a08a86e5aff8e65368ccd463348fdda26100821",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/a585f6ea42ec259a9a57e3e2580fa527c92187d0",
|
"url": "https://git.kernel.org/stable/c/a585f6ea42ec259a9a57e3e2580fa527c92187d0",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/acf40ab42799e4ae1397ee6f5c5941092d66f999",
|
"url": "https://git.kernel.org/stable/c/acf40ab42799e4ae1397ee6f5c5941092d66f999",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,28 +2,127 @@
|
|||||||
"id": "CVE-2025-21984",
|
"id": "CVE-2025-21984",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-01T16:15:29.810",
|
"published": "2025-04-01T16:15:29.810",
|
||||||
"lastModified": "2025-04-01T20:26:01.990",
|
"lastModified": "2025-04-10T13:25:15.120",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: fix kernel BUG when userfaultfd_move encounters swapcache\n\nuserfaultfd_move() checks whether the PTE entry is present or a\nswap entry.\n\n- If the PTE entry is present, move_present_pte() handles folio\n migration by setting:\n\n src_folio->index = linear_page_index(dst_vma, dst_addr);\n\n- If the PTE entry is a swap entry, move_swap_pte() simply copies\n the PTE to the new dst_addr.\n\nThis approach is incorrect because, even if the PTE is a swap entry,\nit can still reference a folio that remains in the swap cache.\n\nThis creates a race window between steps 2 and 4.\n 1. add_to_swap: The folio is added to the swapcache.\n 2. try_to_unmap: PTEs are converted to swap entries.\n 3. pageout: The folio is written back.\n 4. Swapcache is cleared.\nIf userfaultfd_move() occurs in the window between steps 2 and 4,\nafter the swap PTE has been moved to the destination, accessing the\ndestination triggers do_swap_page(), which may locate the folio in\nthe swapcache. However, since the folio's index has not been updated\nto match the destination VMA, do_swap_page() will detect a mismatch.\n\nThis can result in two critical issues depending on the system\nconfiguration.\n\nIf KSM is disabled, both small and large folios can trigger a BUG\nduring the add_rmap operation due to:\n\n page_pgoff(folio, page) != linear_page_index(vma, address)\n\n[ 13.336953] page: refcount:6 mapcount:1 mapping:00000000f43db19c index:0xffffaf150 pfn:0x4667c\n[ 13.337520] head: order:2 mapcount:1 entire_mapcount:0 nr_pages_mapped:1 pincount:0\n[ 13.337716] memcg:ffff00000405f000\n[ 13.337849] anon flags: 0x3fffc0000020459(locked|uptodate|dirty|owner_priv_1|head|swapbacked|node=0|zone=0|lastcpupid=0xffff)\n[ 13.338630] raw: 03fffc0000020459 ffff80008507b538 ffff80008507b538 ffff000006260361\n[ 13.338831] raw: 0000000ffffaf150 0000000000004000 0000000600000000 ffff00000405f000\n[ 13.339031] head: 03fffc0000020459 ffff80008507b538 ffff80008507b538 ffff000006260361\n[ 13.339204] head: 0000000ffffaf150 0000000000004000 0000000600000000 ffff00000405f000\n[ 13.339375] head: 03fffc0000000202 fffffdffc0199f01 ffffffff00000000 0000000000000001\n[ 13.339546] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 13.339736] page dumped because: VM_BUG_ON_PAGE(page_pgoff(folio, page) != linear_page_index(vma, address))\n[ 13.340190] ------------[ cut here ]------------\n[ 13.340316] kernel BUG at mm/rmap.c:1380!\n[ 13.340683] Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP\n[ 13.340969] Modules linked in:\n[ 13.341257] CPU: 1 UID: 0 PID: 107 Comm: a.out Not tainted 6.14.0-rc3-gcf42737e247a-dirty #299\n[ 13.341470] Hardware name: linux,dummy-virt (DT)\n[ 13.341671] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 13.341815] pc : __page_check_anon_rmap+0xa0/0xb0\n[ 13.341920] lr : __page_check_anon_rmap+0xa0/0xb0\n[ 13.342018] sp : ffff80008752bb20\n[ 13.342093] x29: ffff80008752bb20 x28: fffffdffc0199f00 x27: 0000000000000001\n[ 13.342404] x26: 0000000000000000 x25: 0000000000000001 x24: 0000000000000001\n[ 13.342575] x23: 0000ffffaf0d0000 x22: 0000ffffaf0d0000 x21: fffffdffc0199f00\n[ 13.342731] x20: fffffdffc0199f00 x19: ffff000006210700 x18: 00000000ffffffff\n[ 13.342881] x17: 6c203d2120296567 x16: 6170202c6f696c6f x15: 662866666f67705f\n[ 13.343033] x14: 6567617028454741 x13: 2929737365726464 x12: ffff800083728ab0\n[ 13.343183] x11: ffff800082996bf8 x10: 0000000000000fd7 x9 : ffff80008011bc40\n[ 13.343351] x8 : 0000000000017fe8 x7 : 00000000fffff000 x6 : ffff8000829eebf8\n[ 13.343498] x5 : c0000000fffff000 x4 : 0000000000000000 x3 : 0000000000000000\n[ 13.343645] x2 : 0000000000000000 x1 : ffff0000062db980 x0 : 000000000000005f\n[ 13.343876] Call trace:\n[ 13.344045] __page_check_anon_rmap+0xa0/0xb0 (P)\n[ 13.344234] folio_add_anon_rmap_ptes+0x22c/0x320\n[ 13.344333] do_swap_page+0x1060/0x1400\n[ 13.344417] __handl\n---truncated---"
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: fix kernel BUG when userfaultfd_move encounters swapcache\n\nuserfaultfd_move() checks whether the PTE entry is present or a\nswap entry.\n\n- If the PTE entry is present, move_present_pte() handles folio\n migration by setting:\n\n src_folio->index = linear_page_index(dst_vma, dst_addr);\n\n- If the PTE entry is a swap entry, move_swap_pte() simply copies\n the PTE to the new dst_addr.\n\nThis approach is incorrect because, even if the PTE is a swap entry,\nit can still reference a folio that remains in the swap cache.\n\nThis creates a race window between steps 2 and 4.\n 1. add_to_swap: The folio is added to the swapcache.\n 2. try_to_unmap: PTEs are converted to swap entries.\n 3. pageout: The folio is written back.\n 4. Swapcache is cleared.\nIf userfaultfd_move() occurs in the window between steps 2 and 4,\nafter the swap PTE has been moved to the destination, accessing the\ndestination triggers do_swap_page(), which may locate the folio in\nthe swapcache. However, since the folio's index has not been updated\nto match the destination VMA, do_swap_page() will detect a mismatch.\n\nThis can result in two critical issues depending on the system\nconfiguration.\n\nIf KSM is disabled, both small and large folios can trigger a BUG\nduring the add_rmap operation due to:\n\n page_pgoff(folio, page) != linear_page_index(vma, address)\n\n[ 13.336953] page: refcount:6 mapcount:1 mapping:00000000f43db19c index:0xffffaf150 pfn:0x4667c\n[ 13.337520] head: order:2 mapcount:1 entire_mapcount:0 nr_pages_mapped:1 pincount:0\n[ 13.337716] memcg:ffff00000405f000\n[ 13.337849] anon flags: 0x3fffc0000020459(locked|uptodate|dirty|owner_priv_1|head|swapbacked|node=0|zone=0|lastcpupid=0xffff)\n[ 13.338630] raw: 03fffc0000020459 ffff80008507b538 ffff80008507b538 ffff000006260361\n[ 13.338831] raw: 0000000ffffaf150 0000000000004000 0000000600000000 ffff00000405f000\n[ 13.339031] head: 03fffc0000020459 ffff80008507b538 ffff80008507b538 ffff000006260361\n[ 13.339204] head: 0000000ffffaf150 0000000000004000 0000000600000000 ffff00000405f000\n[ 13.339375] head: 03fffc0000000202 fffffdffc0199f01 ffffffff00000000 0000000000000001\n[ 13.339546] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 13.339736] page dumped because: VM_BUG_ON_PAGE(page_pgoff(folio, page) != linear_page_index(vma, address))\n[ 13.340190] ------------[ cut here ]------------\n[ 13.340316] kernel BUG at mm/rmap.c:1380!\n[ 13.340683] Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP\n[ 13.340969] Modules linked in:\n[ 13.341257] CPU: 1 UID: 0 PID: 107 Comm: a.out Not tainted 6.14.0-rc3-gcf42737e247a-dirty #299\n[ 13.341470] Hardware name: linux,dummy-virt (DT)\n[ 13.341671] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 13.341815] pc : __page_check_anon_rmap+0xa0/0xb0\n[ 13.341920] lr : __page_check_anon_rmap+0xa0/0xb0\n[ 13.342018] sp : ffff80008752bb20\n[ 13.342093] x29: ffff80008752bb20 x28: fffffdffc0199f00 x27: 0000000000000001\n[ 13.342404] x26: 0000000000000000 x25: 0000000000000001 x24: 0000000000000001\n[ 13.342575] x23: 0000ffffaf0d0000 x22: 0000ffffaf0d0000 x21: fffffdffc0199f00\n[ 13.342731] x20: fffffdffc0199f00 x19: ffff000006210700 x18: 00000000ffffffff\n[ 13.342881] x17: 6c203d2120296567 x16: 6170202c6f696c6f x15: 662866666f67705f\n[ 13.343033] x14: 6567617028454741 x13: 2929737365726464 x12: ffff800083728ab0\n[ 13.343183] x11: ffff800082996bf8 x10: 0000000000000fd7 x9 : ffff80008011bc40\n[ 13.343351] x8 : 0000000000017fe8 x7 : 00000000fffff000 x6 : ffff8000829eebf8\n[ 13.343498] x5 : c0000000fffff000 x4 : 0000000000000000 x3 : 0000000000000000\n[ 13.343645] x2 : 0000000000000000 x1 : ffff0000062db980 x0 : 000000000000005f\n[ 13.343876] Call trace:\n[ 13.344045] __page_check_anon_rmap+0xa0/0xb0 (P)\n[ 13.344234] folio_add_anon_rmap_ptes+0x22c/0x320\n[ 13.344333] do_swap_page+0x1060/0x1400\n[ 13.344417] __handl\n---truncated---"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: se corrige el ERROR del kernel cuando userfaultfd_move encuentra swapcache userfaultfd_move() comprueba si la entrada PTE est\u00e1 presente o es una entrada de intercambio. - Si la entrada PTE est\u00e1 presente, move_present_pte() maneja la migraci\u00f3n de folio mediante la configuraci\u00f3n: src_folio->index = linear_page_index(dst_vma, dst_addr); - Si la entrada PTE es una entrada de intercambio, move_swap_pte() simplemente copia el PTE al nuevo dst_addr. Este enfoque es incorrecto porque, incluso si el PTE es una entrada de intercambio, a\u00fan puede hacer referencia a un folio que permanece en el cach\u00e9 de intercambio. Esto crea una ventana de ejecuci\u00f3n entre los pasos 2 y 4. 1. add_to_swap: el folio se agrega al cach\u00e9 de intercambio. 2. try_to_unmap: los PTE se convierten en entradas de intercambio. 3. pageout: el folio se vuelve a escribir. 4. Se borra la cach\u00e9 de intercambio. Si se produce userfaultfd_move() en la ventana entre los pasos 2 y 4, despu\u00e9s de mover el PTE de intercambio a su destino, al acceder a este se activa do_swap_page(), que puede localizar el folio en la cach\u00e9 de intercambio. Sin embargo, dado que el \u00edndice del folio no se ha actualizado para que coincida con el VMA de destino, do_swap_page() detectar\u00e1 una discrepancia. Esto puede provocar dos problemas cr\u00edticos seg\u00fan la configuraci\u00f3n del sistema. Si KSM est\u00e1 deshabilitado, tanto los folios peque\u00f1os como los grandes pueden generar un ERROR durante la operaci\u00f3n add_rmap debido a: page_pgoff(folio, page) != linear_page_index(vma, address) [ 13.336953] page: refcount:6 mapcount:1 mapping:00000000f43db19c index:0xffffaf150 pfn:0x4667c [ 13.337520] head: order:2 mapcount:1 entire_mapcount:0 nr_pages_mapped:1 pincount:0 [ 13.337716] memcg:ffff00000405f000 [ 13.337849] anon flags: 0x3fffc0000020459(bloqueado|actualizado|sucio|propietario_priv_1|cabezal|swapbacked|nodo=0|zona=0|lastcpupid=0xffff) [13.338630] sin procesar: 03fffc0000020459 ffff80008507b538 ffff80008507b538 ffff000006260361 [13.338831] sin procesar: 0000000ffffaf150 0000000000004000 0000000600000000 ffff00000405f000 [13.339031] cabezal: 03fffc0000020459 ffff80008507b538 ffff80008507b538 ffff000006260361 [ 13.339204] cabeza: 0000000ffffaf150 0000000000004000 0000000600000000 ffff00000405f000 [ 13.339375] cabeza: 03fffc0000000202 fffffdffc0199f01 ffffffff00000000 0000000000000001 [ 13.339546] cabeza: 000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 13.339736] p\u00e1gina volcada porque: VM_BUG_ON_PAGE(page_pgoff(folio, page) != linear_page_index(vma, address)) [ 13.340190] ------------[ cortar aqu\u00ed ]------------ [ 13.340316] \u00a1ERROR del kernel en mm/rmap.c:1380! [ 13.340683] Error interno: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP [ 13.340969] M\u00f3dulos vinculados: [ 13.341257] CPU: 1 UID: 0 PID: 107 Comm: a.out No contaminado 6.14.0-rc3-gcf42737e247a-dirty #299 [ 13.341470] Nombre del hardware: linux,dummy-virt (DT) [ 13.341671] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 13.341815] pc : __page_check_anon_rmap+0xa0/0xb0 [ 13.341920] lr : __page_check_anon_rmap+0xa0/0xb0 [ 13.342018] sp : ffff80008752bb20 [ 13.342093] x29: ffff80008752bb20 x28: fffffdffc0199f00 x27: 0000000000000001 [ 13.342404] x26: 0000000000000000 x25: 0000000000000001 x24: 0000000000000001 [ 13.342575] x23: 0000ffffaf0d0000 x22: 0000ffffaf0d0000 x21: fffffdffc0199f00 [ 13.342731] x20: fffffdffc0199f00 x19: ffff000006210700 x18: 00000000ffffffff [ 13.342881] x17: 6c203d2120296567 x16: 6170202c6f696c6f x15: 662866666f67705f [ 13.343033] x14: 6567617028454741 x13: 2929737365726464 x12: ffff800083728ab0 [ 13.343183] x11: ffff800082996bf8 x10: 0000000000000fd7 x9: ffff80008011bc40 [ 13.343351] x8: 0000000000017fe8 x7: 00000000fffff000 x6: ffff8000829eebf8 [ 13.343498] x5: c0000000fffff000 x4: 0000000000000000 x3: 0000000000000000 [ 13.343645] x2: 0000000000000000 x1 : ffff0000062db980 x0 : 000000000000005f [ 13.343876] Rastreo de llamadas: [ 13.344045] __page_check_anon_rmap+0xa0/0xb0 ---truncado---"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 4.7,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.0,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-362"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.8",
|
||||||
|
"versionEndExcluding": "6.12.20",
|
||||||
|
"matchCriteriaId": "AD00A08B-A8BF-407B-95F5-DCADBFF79F01"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.13",
|
||||||
|
"versionEndExcluding": "6.13.8",
|
||||||
|
"matchCriteriaId": "0A20D4D7-B329-4C68-B662-76062EA7DCF0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/4e9507246298fd6f1ca7bb42ef01a6e34fb93684",
|
"url": "https://git.kernel.org/stable/c/4e9507246298fd6f1ca7bb42ef01a6e34fb93684",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/b1e11bd86c0943bb7624efebdc384340a50ad683",
|
"url": "https://git.kernel.org/stable/c/b1e11bd86c0943bb7624efebdc384340a50ad683",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/c50f8e6053b0503375c2975bf47f182445aebb4c",
|
"url": "https://git.kernel.org/stable/c/c50f8e6053b0503375c2975bf47f182445aebb4c",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,28 +2,132 @@
|
|||||||
"id": "CVE-2025-21989",
|
"id": "CVE-2025-21989",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-02T13:15:43.427",
|
"published": "2025-04-02T13:15:43.427",
|
||||||
"lastModified": "2025-04-02T14:58:07.527",
|
"lastModified": "2025-04-10T13:25:07.567",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: fix missing .is_two_pixels_per_container\n\nStarting from 6.11, AMDGPU driver, while being loaded with amdgpu.dc=1,\ndue to lack of .is_two_pixels_per_container function in dce60_tg_funcs,\ncauses a NULL pointer dereference on PCs with old GPUs, such as R9 280X.\n\nSo this fix adds missing .is_two_pixels_per_container to dce60_tg_funcs.\n\n(cherry picked from commit bd4b125eb949785c6f8a53b0494e32795421209d)"
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: fix missing .is_two_pixels_per_container\n\nStarting from 6.11, AMDGPU driver, while being loaded with amdgpu.dc=1,\ndue to lack of .is_two_pixels_per_container function in dce60_tg_funcs,\ncauses a NULL pointer dereference on PCs with old GPUs, such as R9 280X.\n\nSo this fix adds missing .is_two_pixels_per_container to dce60_tg_funcs.\n\n(cherry picked from commit bd4b125eb949785c6f8a53b0494e32795421209d)"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: se corrige la falta de .is_two_pixels_per_container. A partir de la versi\u00f3n 6.11, el controlador AMDGPU, al cargarse con amdgpu.dc=1, debido a la falta de la funci\u00f3n .is_two_pixels_per_container en dce60_tg_funcs, provoca una desreferencia de puntero nulo en PC con GPU antiguas, como la R9 280X. Por lo tanto, esta correcci\u00f3n a\u00f1ade la falta de .is_two_pixels_per_container a dce60_tg_funcs. (Seleccionado de la confirmaci\u00f3n bd4b125eb949785c6f8a53b0494e32795421209d)"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.11",
|
||||||
|
"versionEndExcluding": "6.12.20",
|
||||||
|
"matchCriteriaId": "A8E66DB4-C0CC-4C05-969A-26953A84F318"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.13",
|
||||||
|
"versionEndExcluding": "6.13.8",
|
||||||
|
"matchCriteriaId": "0A20D4D7-B329-4C68-B662-76062EA7DCF0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/36d04c9313d8d83ead92242f037099ac73e02120",
|
"url": "https://git.kernel.org/stable/c/36d04c9313d8d83ead92242f037099ac73e02120",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/e204aab79e01bc8ff750645666993ed8b719de57",
|
"url": "https://git.kernel.org/stable/c/e204aab79e01bc8ff750645666993ed8b719de57",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/fefa811e616b5d0b555ed65743e528a0a8a0b377",
|
"url": "https://git.kernel.org/stable/c/fefa811e616b5d0b555ed65743e528a0a8a0b377",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,28 +2,132 @@
|
|||||||
"id": "CVE-2025-21990",
|
"id": "CVE-2025-21990",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-02T13:15:43.547",
|
"published": "2025-04-02T13:15:43.547",
|
||||||
"lastModified": "2025-04-02T14:58:07.527",
|
"lastModified": "2025-04-10T13:25:01.577",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: NULL-check BO's backing store when determining GFX12 PTE flags\n\nPRT BOs may not have any backing store, so bo->tbo.resource will be\nNULL. Check for that before dereferencing.\n\n(cherry picked from commit 3e3fcd29b505cebed659311337ea03b7698767fc)"
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: NULL-check BO's backing store when determining GFX12 PTE flags\n\nPRT BOs may not have any backing store, so bo->tbo.resource will be\nNULL. Check for that before dereferencing.\n\n(cherry picked from commit 3e3fcd29b505cebed659311337ea03b7698767fc)"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: Se ha comprobado el almacenamiento de respaldo del BO al determinar los indicadores PTE de GFX12. Los BO de PRT podr\u00edan no tener almacenamiento de respaldo, por lo que bo->tbo.resource ser\u00e1 nulo. Compru\u00e9belo antes de desreferenciar. (Seleccionado de la confirmaci\u00f3n 3e3fcd29b505cebed659311337ea03b7698767fc)"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.11",
|
||||||
|
"versionEndExcluding": "6.12.20",
|
||||||
|
"matchCriteriaId": "A8E66DB4-C0CC-4C05-969A-26953A84F318"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.13",
|
||||||
|
"versionEndExcluding": "6.13.8",
|
||||||
|
"matchCriteriaId": "0A20D4D7-B329-4C68-B662-76062EA7DCF0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/6cc30748e17ea2a64051ceaf83a8372484e597f1",
|
"url": "https://git.kernel.org/stable/c/6cc30748e17ea2a64051ceaf83a8372484e597f1",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/72235808eabea93055b459a63443bd9cd6b08aa4",
|
"url": "https://git.kernel.org/stable/c/72235808eabea93055b459a63443bd9cd6b08aa4",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/af23e39b9e9280b1f6299b6f2fa090a1694240ad",
|
"url": "https://git.kernel.org/stable/c/af23e39b9e9280b1f6299b6f2fa090a1694240ad",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,36 +2,216 @@
|
|||||||
"id": "CVE-2025-21991",
|
"id": "CVE-2025-21991",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-02T13:15:43.670",
|
"published": "2025-04-02T13:15:43.670",
|
||||||
"lastModified": "2025-04-02T14:58:07.527",
|
"lastModified": "2025-04-10T13:24:35.230",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes\n\nCurrently, load_microcode_amd() iterates over all NUMA nodes, retrieves their\nCPU masks and unconditionally accesses per-CPU data for the first CPU of each\nmask.\n\nAccording to Documentation/admin-guide/mm/numaperf.rst:\n\n \"Some memory may share the same node as a CPU, and others are provided as\n memory only nodes.\"\n\nTherefore, some node CPU masks may be empty and wouldn't have a \"first CPU\".\n\nOn a machine with far memory (and therefore CPU-less NUMA nodes):\n- cpumask_of_node(nid) is 0\n- cpumask_first(0) is CONFIG_NR_CPUS\n- cpu_data(CONFIG_NR_CPUS) accesses the cpu_info per-CPU array at an\n index that is 1 out of bounds\n\nThis does not have any security implications since flashing microcode is\na privileged operation but I believe this has reliability implications by\npotentially corrupting memory while flashing a microcode update.\n\nWhen booting with CONFIG_UBSAN_BOUNDS=y on an AMD machine that flashes\na microcode update. I get the following splat:\n\n UBSAN: array-index-out-of-bounds in arch/x86/kernel/cpu/microcode/amd.c:X:Y\n index 512 is out of range for type 'unsigned long[512]'\n [...]\n Call Trace:\n dump_stack\n __ubsan_handle_out_of_bounds\n load_microcode_amd\n request_microcode_amd\n reload_store\n kernfs_fop_write_iter\n vfs_write\n ksys_write\n do_syscall_64\n entry_SYSCALL_64_after_hwframe\n\nChange the loop to go over only NUMA nodes which have CPUs before determining\nwhether the first CPU on the respective node needs microcode update.\n\n [ bp: Massage commit message, fix typo. ]"
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes\n\nCurrently, load_microcode_amd() iterates over all NUMA nodes, retrieves their\nCPU masks and unconditionally accesses per-CPU data for the first CPU of each\nmask.\n\nAccording to Documentation/admin-guide/mm/numaperf.rst:\n\n \"Some memory may share the same node as a CPU, and others are provided as\n memory only nodes.\"\n\nTherefore, some node CPU masks may be empty and wouldn't have a \"first CPU\".\n\nOn a machine with far memory (and therefore CPU-less NUMA nodes):\n- cpumask_of_node(nid) is 0\n- cpumask_first(0) is CONFIG_NR_CPUS\n- cpu_data(CONFIG_NR_CPUS) accesses the cpu_info per-CPU array at an\n index that is 1 out of bounds\n\nThis does not have any security implications since flashing microcode is\na privileged operation but I believe this has reliability implications by\npotentially corrupting memory while flashing a microcode update.\n\nWhen booting with CONFIG_UBSAN_BOUNDS=y on an AMD machine that flashes\na microcode update. I get the following splat:\n\n UBSAN: array-index-out-of-bounds in arch/x86/kernel/cpu/microcode/amd.c:X:Y\n index 512 is out of range for type 'unsigned long[512]'\n [...]\n Call Trace:\n dump_stack\n __ubsan_handle_out_of_bounds\n load_microcode_amd\n request_microcode_amd\n reload_store\n kernfs_fop_write_iter\n vfs_write\n ksys_write\n do_syscall_64\n entry_SYSCALL_64_after_hwframe\n\nChange the loop to go over only NUMA nodes which have CPUs before determining\nwhether the first CPU on the respective node needs microcode update.\n\n [ bp: Massage commit message, fix typo. ]"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/microcode/AMD: Se corrigi\u00f3 un error fuera de los l\u00edmites en sistemas con nodos NUMA sin CPU. Actualmente, load_microcode_amd() itera sobre todos los nodos NUMA, recupera sus m\u00e1scaras de CPU y accede incondicionalmente a los datos por CPU para la primera CPU de cada m\u00e1scara. Seg\u00fan Documentation/admin-guide/mm/numaperf.rst: \"Algunas memorias pueden compartir el mismo nodo que una CPU, mientras que otras se proporcionan como nodos de solo memoria\". Por lo tanto, algunas m\u00e1scaras de CPU de nodo podr\u00edan estar vac\u00edas y no tendr\u00edan una \"primera CPU\". En una m\u00e1quina con memoria extensa (y, por lo tanto, nodos NUMA sin CPU): - cpumask_of_node(nid) es 0 - cpumask_first(0) es CONFIG_NR_CPUS - cpu_data(CONFIG_NR_CPUS) accede a la matriz por CPU cpu_info en un \u00edndice que es 1 fuera de los l\u00edmites. Esto no tiene implicaciones de seguridad, ya que la actualizaci\u00f3n de microc\u00f3digo es una operaci\u00f3n privilegiada, pero creo que tiene implicaciones de confiabilidad al potencialmente corromper la memoria durante la actualizaci\u00f3n de microc\u00f3digo. Al arrancar con CONFIG_UBSAN_BOUNDS=y en una m\u00e1quina AMD que actualiza microc\u00f3digo. Recibo el siguiente mensaje: UBSAN: array-index-out-of-bounds en arch/x86/kernel/cpu/microcode/amd.c:X:Y el \u00edndice 512 est\u00e1 fuera de rango para el tipo 'unsigned long[512]' [...] Seguimiento de llamadas: dump_stack __ubsan_handle_out_of_bounds load_microcode_amd request_microcode_amd reload_store kernfs_fop_write_iter vfs_write ksys_write do_syscall_64 entry_SYSCALL_64_after_hwframe Cambie el bucle para que solo recorra los nodos NUMA que tengan CPU antes de determinar si la primera CPU en el nodo respectivo necesita una actualizaci\u00f3n de microc\u00f3digo. [bp: Mensaje de confirmaci\u00f3n de Massage, correcci\u00f3n de error tipogr\u00e1fico.]"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.8,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-129"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.14.308",
|
||||||
|
"versionEndExcluding": "4.15",
|
||||||
|
"matchCriteriaId": "83683E88-BE16-4997-9FDC-102DF930322C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "4.19.276",
|
||||||
|
"versionEndExcluding": "4.20",
|
||||||
|
"matchCriteriaId": "5495F696-4F37-41A0-9020-F01C49FD103A"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.4.235",
|
||||||
|
"versionEndExcluding": "5.5",
|
||||||
|
"matchCriteriaId": "5B84C064-16CC-43FA-AE76-F62E41B8DCFA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.10.173",
|
||||||
|
"versionEndExcluding": "5.11",
|
||||||
|
"matchCriteriaId": "DF6A0A9F-CF01-4C06-A4AC-AC7810053C8C"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.15.99",
|
||||||
|
"versionEndExcluding": "5.16",
|
||||||
|
"matchCriteriaId": "55A594E3-39FC-4F69-9614-C6FC3967986F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.1.16",
|
||||||
|
"versionEndExcluding": "6.1.132",
|
||||||
|
"matchCriteriaId": "3A183DD1-F3ED-43BE-99D2-3EA122C43457"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2.3",
|
||||||
|
"versionEndExcluding": "6.6.84",
|
||||||
|
"matchCriteriaId": "3405E1B5-835A-4D00-A7C5-AEA51D851B70"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.12.20",
|
||||||
|
"matchCriteriaId": "60E9C5DF-D778-4572-848A-5D6CFFE022CA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.13",
|
||||||
|
"versionEndExcluding": "6.13.8",
|
||||||
|
"matchCriteriaId": "0A20D4D7-B329-4C68-B662-76062EA7DCF0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/18b5d857c6496b78ead2fd10001b81ae32d30cac",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/488ffc0cac38f203979f83634236ee53251ce593",
|
"url": "https://git.kernel.org/stable/c/488ffc0cac38f203979f83634236ee53251ce593",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/5ac295dfccb5b015493f86694fa13a0dde4d3665",
|
"url": "https://git.kernel.org/stable/c/5ac295dfccb5b015493f86694fa13a0dde4d3665",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/985a536e04bbfffb1770df43c6470f635a6b1073",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/d509c4731090ebd9bbdb72c70a2d70003ae81f4f",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/e3e89178a9f4a80092578af3ff3c8478f9187d59",
|
"url": "https://git.kernel.org/stable/c/e3e89178a9f4a80092578af3ff3c8478f9187d59",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/e686349cc19e800dac8971929089ba5ff59abfb0",
|
"url": "https://git.kernel.org/stable/c/e686349cc19e800dac8971929089ba5ff59abfb0",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/ec52240622c4d218d0240079b7c1d3ec2328a9f4",
|
"url": "https://git.kernel.org/stable/c/ec52240622c4d218d0240079b7c1d3ec2328a9f4",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,17 +2,25 @@
|
|||||||
"id": "CVE-2025-21992",
|
"id": "CVE-2025-21992",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-02T13:15:43.800",
|
"published": "2025-04-02T13:15:43.800",
|
||||||
"lastModified": "2025-04-02T14:58:07.527",
|
"lastModified": "2025-04-10T13:15:49.053",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: ignore non-functional sensor in HP 5MP Camera\n\nThe HP 5MP Camera (USB ID 0408:5473) reports a HID sensor interface that\nis not actually implemented. Attempting to access this non-functional\nsensor via iio_info causes system hangs as runtime PM tries to wake up\nan unresponsive sensor.\n\n [453] hid-sensor-hub 0003:0408:5473.0003: Report latency attributes: ffffffff:ffffffff\n [453] hid-sensor-hub 0003:0408:5473.0003: common attributes: 5:1, 2:1, 3:1 ffffffff:ffffffff\n\nAdd this device to the HID ignore list since the sensor interface is\nnon-functional by design and should not be exposed to userspace."
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: ignore non-functional sensor in HP 5MP Camera\n\nThe HP 5MP Camera (USB ID 0408:5473) reports a HID sensor interface that\nis not actually implemented. Attempting to access this non-functional\nsensor via iio_info causes system hangs as runtime PM tries to wake up\nan unresponsive sensor.\n\n [453] hid-sensor-hub 0003:0408:5473.0003: Report latency attributes: ffffffff:ffffffff\n [453] hid-sensor-hub 0003:0408:5473.0003: common attributes: 5:1, 2:1, 3:1 ffffffff:ffffffff\n\nAdd this device to the HID ignore list since the sensor interface is\nnon-functional by design and should not be exposed to userspace."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: HID: ignorar sensor no funcional en c\u00e1mara HP de 5 MP La c\u00e1mara HP de 5 MP (ID USB 0408:5473) informa sobre una interfaz de sensor HID que no est\u00e1 implementada. Intentar acceder a este sensor no funcional a trav\u00e9s de iio_info provoca que el sistema se cuelgue mientras el PM en tiempo de ejecuci\u00f3n intenta despertar un sensor que no responde. [453] hid-sensor-hub 0003:0408:5473.0003: Informar atributos de latencia: ffffffff:ffffffff [453] hid-sensor-hub 0003:0408:5473.0003: atributos comunes: 5:1, 2:1, 3:1 ffffffff:ffffffff Agregue este dispositivo a la lista de ignorados de HID ya que la interfaz del sensor no es funcional por dise\u00f1o y no debe exponerse al espacio de usuario."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/007a849126ef7907761af6a1379400558a72e703",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/363236d709e75610b628c2a4337ccbe42e454b6d",
|
"url": "https://git.kernel.org/stable/c/363236d709e75610b628c2a4337ccbe42e454b6d",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
@ -32,6 +40,14 @@
|
|||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/9acdb0059fb6b82158e15adae91e629cb5974564",
|
"url": "https://git.kernel.org/stable/c/9acdb0059fb6b82158e15adae91e629cb5974564",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/9af297aea8f76a0ad21f2de5f2cd6401a748b9c3",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/b6c6c2d8ab4932e5d6d439f514276cb3d257b8fe",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,36 +2,155 @@
|
|||||||
"id": "CVE-2025-21993",
|
"id": "CVE-2025-21993",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-02T13:15:43.940",
|
"published": "2025-04-02T13:15:43.940",
|
||||||
"lastModified": "2025-04-02T14:58:07.527",
|
"lastModified": "2025-04-10T13:24:10.787",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\niscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()\n\nWhen performing an iSCSI boot using IPv6, iscsistart still reads the\n/sys/firmware/ibft/ethernetX/subnet-mask entry. Since the IPv6 prefix\nlength is 64, this causes the shift exponent to become negative,\ntriggering a UBSAN warning. As the concept of a subnet mask does not\napply to IPv6, the value is set to ~0 to suppress the warning message."
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\niscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()\n\nWhen performing an iSCSI boot using IPv6, iscsistart still reads the\n/sys/firmware/ibft/ethernetX/subnet-mask entry. Since the IPv6 prefix\nlength is 64, this causes the shift exponent to become negative,\ntriggering a UBSAN warning. As the concept of a subnet mask does not\napply to IPv6, the value is set to ~0 to suppress the warning message."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iscsi_ibft: Se corrige la advertencia de desplazamiento fuera de los l\u00edmites de UBSAN en ibft_attr_show_nic(). Al realizar un arranque iSCSI con IPv6, iscsistart sigue leyendo la entrada /sys/firmware/ibft/ethernetX/subnet-mask. Dado que la longitud del prefijo IPv6 es 64, esto hace que el exponente de desplazamiento sea negativo, lo que activa una advertencia de UBSAN. Dado que el concepto de m\u00e1scara de subred no se aplica a IPv6, el valor se establece en ~0 para suprimir el mensaje de advertencia."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-125"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionEndExcluding": "6.1.132",
|
||||||
|
"matchCriteriaId": "5F37CFA2-5A70-4204-9A20-1847146496C7"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2",
|
||||||
|
"versionEndExcluding": "6.6.84",
|
||||||
|
"matchCriteriaId": "994E0F00-FAC4-40E4-9068-C7D4D8242EC8"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.12.20",
|
||||||
|
"matchCriteriaId": "60E9C5DF-D778-4572-848A-5D6CFFE022CA"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.13",
|
||||||
|
"versionEndExcluding": "6.13.8",
|
||||||
|
"matchCriteriaId": "0A20D4D7-B329-4C68-B662-76062EA7DCF0"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/07e0d99a2f701123ad3104c0f1a1e66bce74d6e5",
|
"url": "https://git.kernel.org/stable/c/07e0d99a2f701123ad3104c0f1a1e66bce74d6e5",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/2d1eef248107bdf3d5a69d0fde04c30a79a7bf5d",
|
"url": "https://git.kernel.org/stable/c/2d1eef248107bdf3d5a69d0fde04c30a79a7bf5d",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/9bfa80c8aa4e06dff55a953c3fffbfc68a3a3b1c",
|
"url": "https://git.kernel.org/stable/c/9bfa80c8aa4e06dff55a953c3fffbfc68a3a3b1c",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/a858cd58dea06cf85b142673deea8c5d87f11e70",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/b253660fac5e0e9080d2c95e3a029e1898d49afb",
|
"url": "https://git.kernel.org/stable/c/b253660fac5e0e9080d2c95e3a029e1898d49afb",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/b388e185bfad32bfed6a97a6817f74ca00a4318f",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/c1c6e527470e5eab0b2d57bd073530fbace39eab",
|
"url": "https://git.kernel.org/stable/c/c1c6e527470e5eab0b2d57bd073530fbace39eab",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/f763c82db8166e28f45b7cc4a5398a7859665940",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,13 +2,17 @@
|
|||||||
"id": "CVE-2025-21994",
|
"id": "CVE-2025-21994",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-02T14:16:01.440",
|
"published": "2025-04-02T14:16:01.440",
|
||||||
"lastModified": "2025-04-02T14:58:07.527",
|
"lastModified": "2025-04-10T13:15:49.333",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix incorrect validation for num_aces field of smb_acl\n\nparse_dcal() validate num_aces to allocate posix_ace_state_array.\n\nif (num_aces > ULONG_MAX / sizeof(struct smb_ace *))\n\nIt is an incorrect validation that we can create an array of size ULONG_MAX.\nsmb_acl has ->size field to calculate actual number of aces in request buffer\nsize. Use this to check invalid num_aces."
|
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix incorrect validation for num_aces field of smb_acl\n\nparse_dcal() validate num_aces to allocate posix_ace_state_array.\n\nif (num_aces > ULONG_MAX / sizeof(struct smb_ace *))\n\nIt is an incorrect validation that we can create an array of size ULONG_MAX.\nsmb_acl has ->size field to calculate actual number of aces in request buffer\nsize. Use this to check invalid num_aces."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "es",
|
||||||
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ksmbd: Se corrige la validaci\u00f3n incorrecta del campo num_aces de smb_acl. La funci\u00f3n parse_dcal() valida num_aces para asignar posix_ace_state_array. Si (num_aces > ULONG_MAX / sizeof(struct smb_ace *)), se considera una validaci\u00f3n incorrecta que permita crear una matriz de tama\u00f1o ULONG_MAX. smb_acl tiene el campo ->size para calcular el n\u00famero real de ases en el tama\u00f1o del b\u00fafer de solicitud. \u00daselo para comprobar num_aces no v\u00e1lidos."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
@ -25,6 +29,10 @@
|
|||||||
"url": "https://git.kernel.org/stable/c/a4cb17797a5d241f1e509cb5b46ed95a80c2f5fd",
|
"url": "https://git.kernel.org/stable/c/a4cb17797a5d241f1e509cb5b46ed95a80c2f5fd",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/c3a3484d9d31b27a3db0fab91fcf191132d65236",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/d0f87370622a853b57e851f7d5a5452b72300f19",
|
"url": "https://git.kernel.org/stable/c/d0f87370622a853b57e851f7d5a5452b72300f19",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-21996",
|
"id": "CVE-2025-21996",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-03T08:15:15.007",
|
"published": "2025-04-03T08:15:15.007",
|
||||||
"lastModified": "2025-04-07T14:18:34.453",
|
"lastModified": "2025-04-10T13:15:49.453",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Undergoing Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -17,14 +17,26 @@
|
|||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/0effb378ebce52b897f85cd7f828854b8c7cb636",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/3ce08215cad55c10a6eeeb33d3583b6cfffe3ab8",
|
"url": "https://git.kernel.org/stable/c/3ce08215cad55c10a6eeeb33d3583b6cfffe3ab8",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/5b4d9d20fd455a97920cf158dd19163b879cf65d",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/78b07dada3f02f77762d0755a96d35f53b02be69",
|
"url": "https://git.kernel.org/stable/c/78b07dada3f02f77762d0755a96d35f53b02be69",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/9b2da9c673a0da1359a2151f7ce773e2f77d71a9",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/dd1801aa01bba1760357f2a641346ae149686713",
|
"url": "https://git.kernel.org/stable/c/dd1801aa01bba1760357f2a641346ae149686713",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-21999",
|
"id": "CVE-2025-21999",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-03T08:15:15.360",
|
"published": "2025-04-03T08:15:15.360",
|
||||||
"lastModified": "2025-04-08T15:49:48.200",
|
"lastModified": "2025-04-10T13:15:49.693",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -112,6 +112,10 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/4b0b8445b6fd41e6f62ac90547a0ea9d348de3fa",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/63b53198aff2e4e6c5866a4ff73c7891f958ffa4",
|
"url": "https://git.kernel.org/stable/c/63b53198aff2e4e6c5866a4ff73c7891f958ffa4",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
@ -140,6 +144,10 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/eda279586e571b05dff44d48e05f8977ad05855d",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/ede3e8ac90ae106f0b29cd759aadebc1568f1308",
|
"url": "https://git.kernel.org/stable/c/ede3e8ac90ae106f0b29cd759aadebc1568f1308",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-22004",
|
"id": "CVE-2025-22004",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-03T08:15:15.960",
|
"published": "2025-04-03T08:15:15.960",
|
||||||
"lastModified": "2025-04-08T15:48:27.060",
|
"lastModified": "2025-04-10T13:15:49.917",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -119,6 +119,10 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/50e288097c2c6e5f374ae079394436fc29d1e88e",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/51e8be9578a2e74f9983d8fd8de8cafed191f30c",
|
"url": "https://git.kernel.org/stable/c/51e8be9578a2e74f9983d8fd8de8cafed191f30c",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
@ -126,6 +130,14 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/82d9084a97892de1ee4881eb5c17911fcd9be6f6",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/8cd90c7db08f32829bfa1b5b2b11fbc542afbab7",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/9566f6ee13b17a15d0a47667ad1b1893c539f730",
|
"url": "https://git.kernel.org/stable/c/9566f6ee13b17a15d0a47667ad1b1893c539f730",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-22005",
|
"id": "CVE-2025-22005",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-03T08:15:16.087",
|
"published": "2025-04-03T08:15:16.087",
|
||||||
"lastModified": "2025-04-07T14:18:34.453",
|
"lastModified": "2025-04-10T13:15:50.153",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Undergoing Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -21,10 +21,22 @@
|
|||||||
"url": "https://git.kernel.org/stable/c/119dcafe36795a15ae53351cbbd6177aaf94ffef",
|
"url": "https://git.kernel.org/stable/c/119dcafe36795a15ae53351cbbd6177aaf94ffef",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/16267a5036173d0173377545b4b6021b081d0933",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/1bd12dfc058e1e68759d313d7727d68dbc1b8964",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/29d91820184d5cbc70f3246d4911d96eaeb930d6",
|
"url": "https://git.kernel.org/stable/c/29d91820184d5cbc70f3246d4911d96eaeb930d6",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/596a883c4ce2d2e9c175f25b98fed3a1f33fea38",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/77c41cdbe6bce476e08d3251c0d501feaf10a9f3",
|
"url": "https://git.kernel.org/stable/c/77c41cdbe6bce476e08d3251c0d501feaf10a9f3",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-22007",
|
"id": "CVE-2025-22007",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-03T08:15:16.347",
|
"published": "2025-04-03T08:15:16.347",
|
||||||
"lastModified": "2025-04-07T14:18:34.453",
|
"lastModified": "2025-04-10T13:31:23.433",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,27 +15,164 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: Correcci\u00f3n del c\u00f3digo de error en chan_alloc_skb_cb(). La funci\u00f3n chan_alloc_skb_cb() debe devolver indicadores de error en caso de error. Devolver NULL provocar\u00e1 una desreferencia a NULL."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: Correcci\u00f3n del c\u00f3digo de error en chan_alloc_skb_cb(). La funci\u00f3n chan_alloc_skb_cb() debe devolver indicadores de error en caso de error. Devolver NULL provocar\u00e1 una desreferencia a NULL."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "3.17",
|
||||||
|
"versionEndExcluding": "6.1.132",
|
||||||
|
"matchCriteriaId": "75945F99-E0BD-4883-BDBD-425B8D7E3BEF"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2",
|
||||||
|
"versionEndExcluding": "6.6.85",
|
||||||
|
"matchCriteriaId": "BCB56F36-C998-496A-A2E4-D9E0BB3A5BFC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.12.21",
|
||||||
|
"matchCriteriaId": "3B63C450-D73B-4A53-9861-98E25C16E842"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.13",
|
||||||
|
"versionEndExcluding": "6.13.9",
|
||||||
|
"matchCriteriaId": "FAECBE4D-58CF-4836-BBAB-5E28B800A778"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "AD948719-8628-4421-A340-1066314BBD4A"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/72d061ee630d0dbb45c2920d8d19b3861c413e54",
|
"url": "https://git.kernel.org/stable/c/1bd68db7beb426ab5a45d81516ed9611284affc8",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/72d061ee630d0dbb45c2920d8d19b3861c413e54",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/761b7c36addd22c7e6ceb05caaadc3b062d99faa",
|
"url": "https://git.kernel.org/stable/c/761b7c36addd22c7e6ceb05caaadc3b062d99faa",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/76304cba8cba12bb10d89d016c28403a2dd89a29",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/788ae2ae4cf484e248b5bc29211c7ac6510e3e92",
|
"url": "https://git.kernel.org/stable/c/788ae2ae4cf484e248b5bc29211c7ac6510e3e92",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/a78692ec0d1e17a96b09f2349a028878f5b305e4",
|
"url": "https://git.kernel.org/stable/c/a78692ec0d1e17a96b09f2349a028878f5b305e4",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/b3d607e36fef4bd05fb938a8a868ff70e9fedbe2",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/ecd06ad0823a90b4420c377ef8917e44e23ee841",
|
"url": "https://git.kernel.org/stable/c/ecd06ad0823a90b4420c377ef8917e44e23ee841",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2025-22008",
|
"id": "CVE-2025-22008",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-08T09:15:24.157",
|
"published": "2025-04-08T09:15:24.157",
|
||||||
"lastModified": "2025-04-08T18:13:53.347",
|
"lastModified": "2025-04-10T13:15:50.570",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -29,6 +29,14 @@
|
|||||||
"url": "https://git.kernel.org/stable/c/2c7a50bec4958f1d1c84d19cde518d0e96a676fd",
|
"url": "https://git.kernel.org/stable/c/2c7a50bec4958f1d1c84d19cde518d0e96a676fd",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/3a9c46af5654783f99015727ac65bc2a23e2735a",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/8e500180904aae63afdce95cb378aeabe119ecda",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/998b1aae22dca87da392ea35f089406cbef6032d",
|
"url": "https://git.kernel.org/stable/c/998b1aae22dca87da392ea35f089406cbef6032d",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-22009",
|
"id": "CVE-2025-22009",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-08T09:15:24.460",
|
"published": "2025-04-08T09:15:24.460",
|
||||||
"lastModified": "2025-04-08T18:13:53.347",
|
"lastModified": "2025-04-10T13:10:51.817",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,23 +15,138 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: regulator: dummy: force synchronous sondeo a veces obtengo una desreferencia de puntero NULL en el momento del arranque en kobject_get() con la siguiente pila de llamadas: anatop_regulator_probe() devm_regulator_register() regulator_register() regulator_resolve_supply() kobject_get() Colocando algunas sentencias BUG_ON() adicionales pude verificar que esto se genera porque el sondeo del controlador del regulador 'dummy' no se completa ('dummy_regulator_rdev' sigue siendo NULL). En el depurador JTAG puedo ver que dummy_regulator_probe() y anatop_regulator_probe() pueden ser ejecutados por diferentes subprocesos del kernel (kworker/u4:*). No he investigado m\u00e1s si esto se puede cambiar o si hay otras posibilidades de forzar la sincronizaci\u00f3n entre estas dos rutinas de sondeo. Por otro lado, no espero mucha penalizaci\u00f3n en el tiempo de arranque al sondear el regulador 'dummy' sincr\u00f3nicamente."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: regulator: dummy: force synchronous sondeo a veces obtengo una desreferencia de puntero NULL en el momento del arranque en kobject_get() con la siguiente pila de llamadas: anatop_regulator_probe() devm_regulator_register() regulator_register() regulator_resolve_supply() kobject_get() Colocando algunas sentencias BUG_ON() adicionales pude verificar que esto se genera porque el sondeo del controlador del regulador 'dummy' no se completa ('dummy_regulator_rdev' sigue siendo NULL). En el depurador JTAG puedo ver que dummy_regulator_probe() y anatop_regulator_probe() pueden ser ejecutados por diferentes subprocesos del kernel (kworker/u4:*). No he investigado m\u00e1s si esto se puede cambiar o si hay otras posibilidades de forzar la sincronizaci\u00f3n entre estas dos rutinas de sondeo. Por otro lado, no espero mucha penalizaci\u00f3n en el tiempo de arranque al sondear el regulador 'dummy' sincr\u00f3nicamente."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-476"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.4",
|
||||||
|
"versionEndExcluding": "6.6.85",
|
||||||
|
"matchCriteriaId": "713AEC20-B9F9-4756-851A-6C1BA3284678"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.12.21",
|
||||||
|
"matchCriteriaId": "3B63C450-D73B-4A53-9861-98E25C16E842"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.13",
|
||||||
|
"versionEndExcluding": "6.13.9",
|
||||||
|
"matchCriteriaId": "FAECBE4D-58CF-4836-BBAB-5E28B800A778"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "AD948719-8628-4421-A340-1066314BBD4A"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/5ade367b56c3947c990598df92395ce737bee872",
|
"url": "https://git.kernel.org/stable/c/5ade367b56c3947c990598df92395ce737bee872",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/8619909b38eeebd3e60910158d7d68441fc954e9",
|
"url": "https://git.kernel.org/stable/c/8619909b38eeebd3e60910158d7d68441fc954e9",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/d3b83a1442a09b145006eb4294b1a963c5345c9c",
|
"url": "https://git.kernel.org/stable/c/d3b83a1442a09b145006eb4294b1a963c5345c9c",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/e26f24ca4fb940b15e092796c5993142a2558bd9",
|
"url": "https://git.kernel.org/stable/c/e26f24ca4fb940b15e092796c5993142a2558bd9",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-22010",
|
"id": "CVE-2025-22010",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-08T09:15:24.777",
|
"published": "2025-04-08T09:15:24.777",
|
||||||
"lastModified": "2025-04-08T18:13:53.347",
|
"lastModified": "2025-04-10T13:15:50.687",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,26 +15,159 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/hns: Se corrige el bloqueo suave durante el bucle de p\u00e1ginas bt. El controlador ejecuta un bucle for al asignar p\u00e1ginas bt y mapearlas con p\u00e1ginas de b\u00fafer. Al asignar un b\u00fafer grande (por ejemplo, un MR de m\u00e1s de 100 GB), puede requerirse un n\u00famero considerable de bucles. Esto provocar\u00e1 un bloqueo suave: watchdog: BUG: bloqueo suave - \u00a1CPU n.\u00ba 27 bloqueada durante 22 s! ... Rastreo de llamadas: hem_list_alloc_mid_bt+0x124/0x394 [hns_roce_hw_v2] hns_roce_hem_list_request+0xf8/0x160 [hns_roce_hw_v2] hns_roce_mtr_create+0x2e4/0x360 [hns_roce_hw_v2] alloc_mr_pbl+0xd4/0x17c [hns_roce_hw_v2] hns_roce_reg_user_mr+0xf8/0x190 [hns_roce_hw_v2] ib_uverbs_reg_mr+0x118/0x290 perro guardi\u00e1n: ERROR: bloqueo suave - \u00a1CPU n.\u00ba 35 bloqueada durante 23 s! ... Seguimiento de llamadas: hns_roce_hem_list_find_mtt+0x7c/0xb0 [hns_roce_hw_v2] mtr_map_bufs+0xc4/0x204 [hns_roce_hw_v2] hns_roce_mtr_create+0x31c/0x3c4 [hns_roce_hw_v2] alloc_mr_pbl+0xb0/0x160 [hns_roce_hw_v2] hns_roce_reg_user_mr+0x108/0x1c0 [hns_roce_hw_v2] ib_uverbs_reg_mr+0x120/0x2bc Agregue un cond_resched() para corregir el bloqueo suave durante estos bucles. Para no afectar el rendimiento de asignaci\u00f3n de un b\u00fafer de tama\u00f1o normal, establezca el recuento de bucles de un MR de 100 GB como el umbral para llamar a cond_resched()."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/hns: Se corrige el bloqueo suave durante el bucle de p\u00e1ginas bt. El controlador ejecuta un bucle for al asignar p\u00e1ginas bt y mapearlas con p\u00e1ginas de b\u00fafer. Al asignar un b\u00fafer grande (por ejemplo, un MR de m\u00e1s de 100 GB), puede requerirse un n\u00famero considerable de bucles. Esto provocar\u00e1 un bloqueo suave: watchdog: BUG: bloqueo suave - \u00a1CPU n.\u00ba 27 bloqueada durante 22 s! ... Rastreo de llamadas: hem_list_alloc_mid_bt+0x124/0x394 [hns_roce_hw_v2] hns_roce_hem_list_request+0xf8/0x160 [hns_roce_hw_v2] hns_roce_mtr_create+0x2e4/0x360 [hns_roce_hw_v2] alloc_mr_pbl+0xd4/0x17c [hns_roce_hw_v2] hns_roce_reg_user_mr+0xf8/0x190 [hns_roce_hw_v2] ib_uverbs_reg_mr+0x118/0x290 perro guardi\u00e1n: ERROR: bloqueo suave - \u00a1CPU n.\u00ba 35 bloqueada durante 23 s! ... Seguimiento de llamadas: hns_roce_hem_list_find_mtt+0x7c/0xb0 [hns_roce_hw_v2] mtr_map_bufs+0xc4/0x204 [hns_roce_hw_v2] hns_roce_mtr_create+0x31c/0x3c4 [hns_roce_hw_v2] alloc_mr_pbl+0xb0/0x160 [hns_roce_hw_v2] hns_roce_reg_user_mr+0x108/0x1c0 [hns_roce_hw_v2] ib_uverbs_reg_mr+0x120/0x2bc Agregue un cond_resched() para corregir el bloqueo suave durante estos bucles. Para no afectar el rendimiento de asignaci\u00f3n de un b\u00fafer de tama\u00f1o normal, establezca el recuento de bucles de un MR de 100 GB como el umbral para llamar a cond_resched()."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-667"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.3",
|
||||||
|
"versionEndExcluding": "6.1.132",
|
||||||
|
"matchCriteriaId": "63D8EBD5-447E-46E5-A557-067E0CC053F1"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2",
|
||||||
|
"versionEndExcluding": "6.6.85",
|
||||||
|
"matchCriteriaId": "BCB56F36-C998-496A-A2E4-D9E0BB3A5BFC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.12.21",
|
||||||
|
"matchCriteriaId": "3B63C450-D73B-4A53-9861-98E25C16E842"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.13",
|
||||||
|
"versionEndExcluding": "6.13.9",
|
||||||
|
"matchCriteriaId": "FAECBE4D-58CF-4836-BBAB-5E28B800A778"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "AD948719-8628-4421-A340-1066314BBD4A"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/13a52f6c9ff99f7d88f81da535cb4e85eade662b",
|
"url": "https://git.kernel.org/stable/c/13a52f6c9ff99f7d88f81da535cb4e85eade662b",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/25655580136de59ec89f09089dd28008ea440fc9",
|
"url": "https://git.kernel.org/stable/c/25655580136de59ec89f09089dd28008ea440fc9",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/4104b0023ff66b5df900d23dbf38310893deca79",
|
"url": "https://git.kernel.org/stable/c/4104b0023ff66b5df900d23dbf38310893deca79",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/461eb4ddede266df8f181f578732bb01742c3fd6",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/975355faba56c0751292ed15a90c3e2c7dc0aad6",
|
"url": "https://git.kernel.org/stable/c/975355faba56c0751292ed15a90c3e2c7dc0aad6",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/9ab20fec7a1ce3057ad86afd27bfd08420b7cd11",
|
"url": "https://git.kernel.org/stable/c/9ab20fec7a1ce3057ad86afd27bfd08420b7cd11",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/efe544462fc0b499725364f90bd0f8bbf16f861a",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-22011",
|
"id": "CVE-2025-22011",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-08T09:15:25.020",
|
"published": "2025-04-08T09:15:25.020",
|
||||||
"lastModified": "2025-04-08T18:13:53.347",
|
"lastModified": "2025-04-10T13:10:41.140",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,19 +15,124 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ARM: dts: bcm2711: Reparar xHCI power-domain Durante las pruebas s2idle en Raspberry CM4, el firmware de la VPU siempre falla en xHCI power-domain resume: root@raspberrypi:/sys/power# echo freeze > state [ 70.724347] xhci_suspend finished [ 70.727730] xhci_plat_suspend finished [ 70.755624] bcm2835-power bcm2835-power: Apagar grafx [ 70.761127] USB: Establecer la energ\u00eda en 0 [ 74.653040] USB: No se pudo establecer la energ\u00eda en 1 (-110) Esto parece deberse al uso mixto de raspberrypi-power y bcm2835-power al mismo tiempo. Por lo tanto, evite el uso del controlador de dominio de energ\u00eda del firmware VPU, lo que evita el bloqueo de la VPU."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ARM: dts: bcm2711: Reparar xHCI power-domain Durante las pruebas s2idle en Raspberry CM4, el firmware de la VPU siempre falla en xHCI power-domain resume: root@raspberrypi:/sys/power# echo freeze > state [ 70.724347] xhci_suspend finished [ 70.727730] xhci_plat_suspend finished [ 70.755624] bcm2835-power bcm2835-power: Apagar grafx [ 70.761127] USB: Establecer la energ\u00eda en 0 [ 74.653040] USB: No se pudo establecer la energ\u00eda en 1 (-110) Esto parece deberse al uso mixto de raspberrypi-power y bcm2835-power al mismo tiempo. Por lo tanto, evite el uso del controlador de dominio de energ\u00eda del firmware VPU, lo que evita el bloqueo de la VPU."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "NVD-CWE-noinfo"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.8",
|
||||||
|
"versionEndExcluding": "6.12.21",
|
||||||
|
"matchCriteriaId": "BF90340F-6FF6-4A1E-BAA7-7C640D39CCDD"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.13",
|
||||||
|
"versionEndExcluding": "6.13.9",
|
||||||
|
"matchCriteriaId": "FAECBE4D-58CF-4836-BBAB-5E28B800A778"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "AD948719-8628-4421-A340-1066314BBD4A"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/393947e06867923d4c2be380d46efd03407a8ce2",
|
"url": "https://git.kernel.org/stable/c/393947e06867923d4c2be380d46efd03407a8ce2",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/b8a47aa0b3df701d0fc41b3caf78d00571776be0",
|
"url": "https://git.kernel.org/stable/c/b8a47aa0b3df701d0fc41b3caf78d00571776be0",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/f44fa354a0715577ca32b085f6f60bcf32c748dd",
|
"url": "https://git.kernel.org/stable/c/f44fa354a0715577ca32b085f6f60bcf32c748dd",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-22012",
|
"id": "CVE-2025-22012",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-08T09:15:25.420",
|
"published": "2025-04-08T09:15:25.420",
|
||||||
"lastModified": "2025-04-08T18:13:53.347",
|
"lastModified": "2025-04-10T13:10:36.613",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,15 +15,110 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Revertir \"arm64: dts: qcom: sdm845: Affirm IDR0.CCTW en apps_smmu\". Hay informes de que la coherencia de la cach\u00e9 del pagetable walker no es constante en todos los dispositivos SDM845/850, lo que provoca bloqueos y reinicios. Funciona correctamente en algunos dispositivos (como el Dragonboard 845c, pero no tanto en el Lenovo Yoga C630). Lamentablemente, esto parece ser un fallo en el desarrollo del firmware, ya que, probablemente en alg\u00fan lugar de la vasta pila de hipervisores, se introdujo un cambio para adaptarlo despu\u00e9s del lanzamiento inicial del software (que suele servir como base para los productos). Revertir el cambio para evitar conjeturas adicionales sobre fallos. Esto revierte el commit 6b31a9744b8726c69bb0af290f8475a368a4b805."
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Revertir \"arm64: dts: qcom: sdm845: Affirm IDR0.CCTW en apps_smmu\". Hay informes de que la coherencia de la cach\u00e9 del pagetable walker no es constante en todos los dispositivos SDM845/850, lo que provoca bloqueos y reinicios. Funciona correctamente en algunos dispositivos (como el Dragonboard 845c, pero no tanto en el Lenovo Yoga C630). Lamentablemente, esto parece ser un fallo en el desarrollo del firmware, ya que, probablemente en alg\u00fan lugar de la vasta pila de hipervisores, se introdujo un cambio para adaptarlo despu\u00e9s del lanzamiento inicial del software (que suele servir como base para los productos). Revertir el cambio para evitar conjeturas adicionales sobre fallos. Esto revierte el commit 6b31a9744b8726c69bb0af290f8475a368a4b805."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-667"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.13",
|
||||||
|
"versionEndExcluding": "6.13.9",
|
||||||
|
"matchCriteriaId": "FAECBE4D-58CF-4836-BBAB-5E28B800A778"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "AD948719-8628-4421-A340-1066314BBD4A"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/9e6e9fc90258a318d30b417bcccda908bb82ee9d",
|
"url": "https://git.kernel.org/stable/c/9e6e9fc90258a318d30b417bcccda908bb82ee9d",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/f00db31d235946853fb430de8c6aa1295efc8353",
|
"url": "https://git.kernel.org/stable/c/f00db31d235946853fb430de8c6aa1295efc8353",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-22014",
|
"id": "CVE-2025-22014",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-04-08T09:15:25.783",
|
"published": "2025-04-08T09:15:25.783",
|
||||||
"lastModified": "2025-04-08T18:13:53.347",
|
"lastModified": "2025-04-10T13:15:50.823",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -15,27 +15,160 @@
|
|||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: soc: qcom: pdr: Corrige el posible bloqueo cuando alg\u00fan proceso de cliente A llama a pdr_add_lookup() para agregar la b\u00fasqueda para el servicio y realiza el trabajo del localizador de programaci\u00f3n, m\u00e1s tarde un proceso B obtiene un nuevo paquete de servidor que indica que el localizador est\u00e1 activo y llama a pdr_locator_new_server() que finalmente establece pdr->locator_init_complete en verdadero, lo que hace que el proceso A vea y tome el bloqueo de lista y consulte la lista de dominios, pero se agotar\u00e1 el tiempo de espera debido al bloqueo, ya que la respuesta se pondr\u00e1 en cola en el mismo qmi->wq y se ordenar\u00e1 workqueue y el proceso B no puede completar el nuevo trabajo de solicitud del servidor debido al bloqueo en el bloqueo de lista. Arr\u00e9glelo eliminando la iteraci\u00f3n de lista innecesaria, ya que la iteraci\u00f3n de lista ya se est\u00e1 realizando dentro del trabajo del localizador, as\u00ed que ev\u00edtelo aqu\u00ed y simplemente llame a schedule_work() aqu\u00ed. Proceso A Proceso B process_scheduled_works() pdr_add_lookup() qmi_data_ready_work() process_scheduled_works() pdr_locator_new_server() pdr->locator_init_complete=true; pdr_locator_work() mutex_lock(&pdr->list_lock); pdr_locate_service() mutex_lock(&pdr->list_lock); pdr_get_domain_list() pr_err(\"PDR: %s error en la espera de la transacci\u00f3n para obtener la lista de dominios: %d\\n\", req->service_name, ret); Registro de errores de tiempo de espera debido a un bloqueo: \"PDR: tms/servreg get domain list txn wait fallo: -110 PDR: service lookup for msm/adsp/sensor_pd:tms/servreg failed: -110\" Gracias a Bjorn y Johan por informarme que esta confirmaci\u00f3n tambi\u00e9n corrige una regresi\u00f3n de audio al usar el pd-mapper dentro del kernel, ya que eso hace que sea m\u00e1s f\u00e1cil alcanzar esta ejecuci\u00f3n. [1]"
|
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: soc: qcom: pdr: Corrige el posible bloqueo cuando alg\u00fan proceso de cliente A llama a pdr_add_lookup() para agregar la b\u00fasqueda para el servicio y realiza el trabajo del localizador de programaci\u00f3n, m\u00e1s tarde un proceso B obtiene un nuevo paquete de servidor que indica que el localizador est\u00e1 activo y llama a pdr_locator_new_server() que finalmente establece pdr->locator_init_complete en verdadero, lo que hace que el proceso A vea y tome el bloqueo de lista y consulte la lista de dominios, pero se agotar\u00e1 el tiempo de espera debido al bloqueo, ya que la respuesta se pondr\u00e1 en cola en el mismo qmi->wq y se ordenar\u00e1 workqueue y el proceso B no puede completar el nuevo trabajo de solicitud del servidor debido al bloqueo en el bloqueo de lista. Arr\u00e9glelo eliminando la iteraci\u00f3n de lista innecesaria, ya que la iteraci\u00f3n de lista ya se est\u00e1 realizando dentro del trabajo del localizador, as\u00ed que ev\u00edtelo aqu\u00ed y simplemente llame a schedule_work() aqu\u00ed. Proceso A Proceso B process_scheduled_works() pdr_add_lookup() qmi_data_ready_work() process_scheduled_works() pdr_locator_new_server() pdr->locator_init_complete=true; pdr_locator_work() mutex_lock(&pdr->list_lock); pdr_locate_service() mutex_lock(&pdr->list_lock); pdr_get_domain_list() pr_err(\"PDR: %s error en la espera de la transacci\u00f3n para obtener la lista de dominios: %d\\n\", req->service_name, ret); Registro de errores de tiempo de espera debido a un bloqueo: \"PDR: tms/servreg get domain list txn wait fallo: -110 PDR: service lookup for msm/adsp/sensor_pd:tms/servreg failed: -110\" Gracias a Bjorn y Johan por informarme que esta confirmaci\u00f3n tambi\u00e9n corrige una regresi\u00f3n de audio al usar el pd-mapper dentro del kernel, ya que eso hace que sea m\u00e1s f\u00e1cil alcanzar esta ejecuci\u00f3n. [1]"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-667"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "5.7",
|
||||||
|
"versionEndExcluding": "6.1.132",
|
||||||
|
"matchCriteriaId": "FC2AC519-3D9D-405E-B3B7-FFFCE9691EEC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.2",
|
||||||
|
"versionEndExcluding": "6.6.85",
|
||||||
|
"matchCriteriaId": "BCB56F36-C998-496A-A2E4-D9E0BB3A5BFC"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.7",
|
||||||
|
"versionEndExcluding": "6.12.21",
|
||||||
|
"matchCriteriaId": "3B63C450-D73B-4A53-9861-98E25C16E842"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||||
|
"versionStartIncluding": "6.13",
|
||||||
|
"versionEndExcluding": "6.13.9",
|
||||||
|
"matchCriteriaId": "FAECBE4D-58CF-4836-BBAB-5E28B800A778"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc7:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "AD948719-8628-4421-A340-1066314BBD4A"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/02612f1e4c34d94d6c8ee75bf7d254ed697e22d4",
|
"url": "https://git.kernel.org/stable/c/02612f1e4c34d94d6c8ee75bf7d254ed697e22d4",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/0a566a79aca9851fae140536e0fc5b0853c90a90",
|
"url": "https://git.kernel.org/stable/c/0a566a79aca9851fae140536e0fc5b0853c90a90",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/2eeb03ad9f42dfece63051be2400af487ddb96d2",
|
"url": "https://git.kernel.org/stable/c/2eeb03ad9f42dfece63051be2400af487ddb96d2",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/72a222b6af10c2a05a5fad0029246229ed8912c2",
|
||||||
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://git.kernel.org/stable/c/daba84612236de3ab39083e62c9e326a654ebd20",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/f2bbfd50e95bc117360f0f59e629aa03d821ebd6",
|
"url": "https://git.kernel.org/stable/c/f2bbfd50e95bc117360f0f59e629aa03d821ebd6",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/f4489260f5713c94e1966e5f20445bff262876f4",
|
"url": "https://git.kernel.org/stable/c/f4489260f5713c94e1966e5f20445bff262876f4",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
"tags": [
|
||||||
|
"Patch"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
60
CVE-2025/CVE-2025-24xx/CVE-2025-2408.json
Normal file
60
CVE-2025/CVE-2025-24xx/CVE-2025-2408.json
Normal file
@ -0,0 +1,60 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-2408",
|
||||||
|
"sourceIdentifier": "cve@gitlab.com",
|
||||||
|
"published": "2025-04-10T13:15:51.760",
|
||||||
|
"lastModified": "2025-04-10T13:15:51.760",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "An issue has been discovered in GitLab CE/EE affecting all versions from 13.12 before 17.8.7, 17.9 before 17.9.6, and 17.10 before 17.10.4. Under certain conditions users could bypass IP access restrictions and view sensitive information."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cve@gitlab.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve@gitlab.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-1220"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/525323",
|
||||||
|
"source": "cve@gitlab.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://hackerone.com/reports/3027775",
|
||||||
|
"source": "cve@gitlab.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
64
CVE-2025/CVE-2025-251xx/CVE-2025-25197.json
Normal file
64
CVE-2025/CVE-2025-251xx/CVE-2025-25197.json
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-25197",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2025-04-10T13:15:51.017",
|
||||||
|
"lastModified": "2025-04-10T13:15:51.017",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Silverstripe Elemental extends a page type to swap the content area for a list of manageable elements to compose a page out of rather than a single text field. An elemental block can include an XSS payload, which can be executed when viewing the \"Content blocks in use\" report. The vulnerability is specific to that report and is a result of failure to cast input prior to including it in the grid field. This vulnerability is fixed in 5.3.12."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/silverstripe/silverstripe-elemental/commit/34ff4ed498ccab94cc5f55ef9a56c37f491eda1d",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/silverstripe/silverstripe-elemental/security/advisories/GHSA-x8xm-c7p8-2pj2",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.silverstripe.org/download/security-releases/CVE-2025-25197",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-25505",
|
"id": "CVE-2025-25505",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-02-21T17:15:14.333",
|
"published": "2025-02-21T17:15:14.333",
|
||||||
"lastModified": "2025-02-21T21:15:23.723",
|
"lastModified": "2025-04-10T13:37:15.333",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,10 +51,43 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:tenda:ac6_firmware:15.03.05.16_multi:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D0E5BB82-F2E3-4BB9-AE3C-267D3462CA96"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:tenda:ac6:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "00830EE1-D0BB-462E-9F15-4E59560C14B8"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/tendaAC6_getRootStatus_callback_overflow/detail.md",
|
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/tendaAC6_getRootStatus_callback_overflow/detail.md",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-25507",
|
"id": "CVE-2025-25507",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-02-21T17:15:14.453",
|
"published": "2025-02-21T17:15:14.453",
|
||||||
"lastModified": "2025-02-21T21:15:23.870",
|
"lastModified": "2025-04-10T13:37:05.443",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,10 +51,43 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:tenda:ac6_firmware:15.03.05.16_multi:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "D0E5BB82-F2E3-4BB9-AE3C-267D3462CA96"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:tenda:ac6:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "00830EE1-D0BB-462E-9F15-4E59560C14B8"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/tendaAC6_formexecommand_cmdinput_rce/detail.md",
|
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/tendaAC6_formexecommand_cmdinput_rce/detail.md",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-25510",
|
"id": "CVE-2025-25510",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-02-21T17:15:14.567",
|
"published": "2025-02-21T17:15:14.567",
|
||||||
"lastModified": "2025-02-21T21:15:24.023",
|
"lastModified": "2025-04-10T13:36:28.503",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,10 +51,43 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:tenda:ac8_firmware:16.03.34.06:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "9C1D64DC-1EDC-4F62-8D22-E1890B71843C"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:tenda:ac8:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "C81F1E48-0204-4478-A937-5D40CDD9E5E4"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/tendaAC8_get_parentControl_list_Info_urls_overflow/detail.md",
|
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/tendaAC8_get_parentControl_list_Info_urls_overflow/detail.md",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Exploit",
|
||||||
|
"Third Party Advisory"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-25676",
|
"id": "CVE-2025-25676",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-02-20T23:15:12.977",
|
"published": "2025-02-20T23:15:12.977",
|
||||||
"lastModified": "2025-02-21T18:16:04.577",
|
"lastModified": "2025-04-10T13:37:42.663",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,10 +51,42 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:tenda:i12_firmware:1.0.0.10\\(3805\\):*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0E6E20A8-02F4-4FF2-8C88-54D27D50515D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:tenda:i12:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "79D3B1CC-FB4E-40F3-B175-F70F5A44C447"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/i12V1/wifiSSIDget.md",
|
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/i12V1/wifiSSIDget.md",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-25678",
|
"id": "CVE-2025-25678",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-02-20T23:15:13.077",
|
"published": "2025-02-20T23:15:13.077",
|
||||||
"lastModified": "2025-02-21T18:16:08.493",
|
"lastModified": "2025-04-10T13:37:33.913",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,10 +51,42 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:tenda:i12_firmware:1.0.0.10\\(3805\\):*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0E6E20A8-02F4-4FF2-8C88-54D27D50515D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:tenda:i12:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "79D3B1CC-FB4E-40F3-B175-F70F5A44C447"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/i12V1/setcfm.md",
|
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/i12V1/setcfm.md",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2025-25679",
|
"id": "CVE-2025-25679",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2025-02-20T23:15:13.183",
|
"published": "2025-02-20T23:15:13.183",
|
||||||
"lastModified": "2025-02-24T18:15:19.213",
|
"lastModified": "2025-04-10T13:37:24.763",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Analyzed",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -51,10 +51,42 @@
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
|
"configurations": [
|
||||||
|
{
|
||||||
|
"operator": "AND",
|
||||||
|
"nodes": [
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": true,
|
||||||
|
"criteria": "cpe:2.3:o:tenda:i12_firmware:1.0.0.10\\(3805\\):*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "0E6E20A8-02F4-4FF2-8C88-54D27D50515D"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"operator": "OR",
|
||||||
|
"negate": false,
|
||||||
|
"cpeMatch": [
|
||||||
|
{
|
||||||
|
"vulnerable": false,
|
||||||
|
"criteria": "cpe:2.3:h:tenda:i12:-:*:*:*:*:*:*:*",
|
||||||
|
"matchCriteriaId": "79D3B1CC-FB4E-40F3-B175-F70F5A44C447"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/i12V1/WifiMacFilterSet.md",
|
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/i12V1/WifiMacFilterSet.md",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org",
|
||||||
|
"tags": [
|
||||||
|
"Broken Link"
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
56
CVE-2025/CVE-2025-278xx/CVE-2025-27812.json
Normal file
56
CVE-2025/CVE-2025-278xx/CVE-2025-27812.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-27812",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2025-04-10T13:15:51.220",
|
||||||
|
"lastModified": "2025-04-10T13:15:51.220",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "MSI Center before 2.0.52.0 allows TOCTOU Local Privilege Escalation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.1,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.4,
|
||||||
|
"impactScore": 6.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-367"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://csr.msi.com/global/product-security-advisories",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
56
CVE-2025/CVE-2025-278xx/CVE-2025-27813.json
Normal file
56
CVE-2025/CVE-2025-278xx/CVE-2025-27813.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-27813",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2025-04-10T13:15:51.577",
|
||||||
|
"lastModified": "2025-04-10T13:15:51.577",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "MSI Center before 2.0.52.0 has Missing PE Signature Validation."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||||
|
"baseScore": 8.1,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.4,
|
||||||
|
"impactScore": 6.0
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-347"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://csr.msi.com/global/product-security-advisories",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
64
CVE-2025/CVE-2025-301xx/CVE-2025-30148.json
Normal file
64
CVE-2025/CVE-2025-301xx/CVE-2025-30148.json
Normal file
@ -0,0 +1,64 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-30148",
|
||||||
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
|
"published": "2025-04-10T13:15:51.930",
|
||||||
|
"lastModified": "2025-04-10T13:15:51.930",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Silverstripe Framework is a PHP framework which powers the Silverstripe CMS. Prior to 5.3.23, bad actor with access to edit content in the CMS could send a specifically crafted encoded payload to the server, which could be used to inject a JavaScript payload on the front end of the site. The payload would be sanitized on the client-side, but server-side sanitization doesn't catch it. The server-side sanitization logic has been updated to sanitize against this attack. This vulnerability is fixed in 5.3.23."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||||
|
"baseScore": 5.4,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.5
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security-advisories@github.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/silverstripe/silverstripe-framework/commit/e99cfd62d160d145a76fcf9631e6b11226e42358",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/silverstripe/silverstripe-framework/security/advisories/GHSA-rhx4-hvx9-j387",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.silverstripe.org/download/security-releases/cve-2025-30148",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
@ -2,13 +2,13 @@
|
|||||||
"id": "CVE-2025-30204",
|
"id": "CVE-2025-30204",
|
||||||
"sourceIdentifier": "security-advisories@github.com",
|
"sourceIdentifier": "security-advisories@github.com",
|
||||||
"published": "2025-03-21T22:15:26.420",
|
"published": "2025-03-21T22:15:26.420",
|
||||||
"lastModified": "2025-04-04T23:15:42.443",
|
"lastModified": "2025-04-10T13:15:52.097",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "golang-jwt is a Go implementation of JSON Web Tokens. Prior to \n5.2.2 and 4.5.2, the function parse.ParseUnverified splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request whose Authorization header consists of Bearer followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This issue is fixed in 5.2.2 and 4.5.2."
|
"value": "golang-jwt is a Go implementation of JSON Web Tokens. Starting in version 3.2.0 and prior to versions 5.2.2 and 4.5.2, the function parse.ParseUnverified splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request whose Authorization header consists of Bearer followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This issue is fixed in 5.2.2 and 4.5.2."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -56,6 +56,10 @@
|
|||||||
"url": "https://github.com/golang-jwt/jwt/commit/0951d184286dece21f73c85673fd308786ffe9c3",
|
"url": "https://github.com/golang-jwt/jwt/commit/0951d184286dece21f73c85673fd308786ffe9c3",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/golang-jwt/jwt/commit/bf316c48137a1212f8d0af9288cc9ce8e59f1afb",
|
||||||
|
"source": "security-advisories@github.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://github.com/golang-jwt/jwt/security/advisories/GHSA-mh63-6h87-95cp",
|
"url": "https://github.com/golang-jwt/jwt/security/advisories/GHSA-mh63-6h87-95cp",
|
||||||
"source": "security-advisories@github.com"
|
"source": "security-advisories@github.com"
|
||||||
|
21
CVE-2025/CVE-2025-327xx/CVE-2025-32754.json
Normal file
21
CVE-2025/CVE-2025-327xx/CVE-2025-32754.json
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-32754",
|
||||||
|
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||||
|
"published": "2025-04-10T12:15:16.280",
|
||||||
|
"lastModified": "2025-04-10T12:15:16.280",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In jenkins/ssh-agent Docker images 6.11.1 and earlier, SSH host keys are generated on image creation for images based on Debian, causing all containers based on images of the same version use the same SSH host keys, allowing attackers able to insert themselves into the network path between the SSH client (typically the Jenkins controller) and SSH build agent to impersonate the latter."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.jenkins.io/security/advisory/2025-04-10/#SECURITY-3565",
|
||||||
|
"source": "jenkinsci-cert@googlegroups.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
28
CVE-2025/CVE-2025-327xx/CVE-2025-32755.json
Normal file
28
CVE-2025/CVE-2025-327xx/CVE-2025-32755.json
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-32755",
|
||||||
|
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||||
|
"published": "2025-04-10T12:15:16.547",
|
||||||
|
"lastModified": "2025-04-10T12:15:16.547",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [
|
||||||
|
{
|
||||||
|
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||||
|
"tags": [
|
||||||
|
"unsupported-when-assigned"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In jenkins/ssh-slave Docker images based on Debian, SSH host keys are generated on image creation for images based on Debian, causing all containers based on images of the same version use the same SSH host keys, allowing attackers able to insert themselves into the network path between the SSH client (typically the Jenkins controller) and SSH build agent to impersonate the latter."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.jenkins.io/security/advisory/2025-04-10/#SECURITY-3565",
|
||||||
|
"source": "jenkinsci-cert@googlegroups.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
52
README.md
52
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2025-04-10T12:00:22.947651+00:00
|
2025-04-10T14:00:20.548884+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2025-04-10T11:15:45.830000+00:00
|
2025-04-10T13:52:09.533000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,26 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
289519
|
289529
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `5`
|
Recently added CVEs: `10`
|
||||||
|
|
||||||
- [CVE-2025-22374](CVE-2025/CVE-2025-223xx/CVE-2025-22374.json) (`2025-04-10T11:15:44.587`)
|
- [CVE-2024-11129](CVE-2024/CVE-2024-111xx/CVE-2024-11129.json) (`2025-04-10T13:15:43.993`)
|
||||||
- [CVE-2025-22375](CVE-2025/CVE-2025-223xx/CVE-2025-22375.json) (`2025-04-10T11:15:45.510`)
|
- [CVE-2025-1073](CVE-2025/CVE-2025-10xx/CVE-2025-1073.json) (`2025-04-10T12:15:15.097`)
|
||||||
- [CVE-2025-23386](CVE-2025/CVE-2025-233xx/CVE-2025-23386.json) (`2025-04-10T10:15:14.697`)
|
- [CVE-2025-1677](CVE-2025/CVE-2025-16xx/CVE-2025-1677.json) (`2025-04-10T13:15:46.473`)
|
||||||
- [CVE-2025-27350](CVE-2025/CVE-2025-273xx/CVE-2025-27350.json) (`2025-04-10T11:15:45.660`)
|
- [CVE-2025-2408](CVE-2025/CVE-2025-24xx/CVE-2025-2408.json) (`2025-04-10T13:15:51.760`)
|
||||||
- [CVE-2025-31411](CVE-2025/CVE-2025-314xx/CVE-2025-31411.json) (`2025-04-10T11:15:45.830`)
|
- [CVE-2025-25197](CVE-2025/CVE-2025-251xx/CVE-2025-25197.json) (`2025-04-10T13:15:51.017`)
|
||||||
|
- [CVE-2025-27812](CVE-2025/CVE-2025-278xx/CVE-2025-27812.json) (`2025-04-10T13:15:51.220`)
|
||||||
|
- [CVE-2025-27813](CVE-2025/CVE-2025-278xx/CVE-2025-27813.json) (`2025-04-10T13:15:51.577`)
|
||||||
|
- [CVE-2025-30148](CVE-2025/CVE-2025-301xx/CVE-2025-30148.json) (`2025-04-10T13:15:51.930`)
|
||||||
|
- [CVE-2025-32754](CVE-2025/CVE-2025-327xx/CVE-2025-32754.json) (`2025-04-10T12:15:16.280`)
|
||||||
|
- [CVE-2025-32755](CVE-2025/CVE-2025-327xx/CVE-2025-32755.json) (`2025-04-10T12:15:16.547`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `2`
|
Recently modified CVEs: `86`
|
||||||
|
|
||||||
- [CVE-2024-28983](CVE-2024/CVE-2024-289xx/CVE-2024-28983.json) (`2025-04-10T10:40:31.943`)
|
- [CVE-2025-21984](CVE-2025/CVE-2025-219xx/CVE-2025-21984.json) (`2025-04-10T13:25:15.120`)
|
||||||
- [CVE-2025-2196](CVE-2025/CVE-2025-21xx/CVE-2025-2196.json) (`2025-04-10T10:53:23.660`)
|
- [CVE-2025-21989](CVE-2025/CVE-2025-219xx/CVE-2025-21989.json) (`2025-04-10T13:25:07.567`)
|
||||||
|
- [CVE-2025-21990](CVE-2025/CVE-2025-219xx/CVE-2025-21990.json) (`2025-04-10T13:25:01.577`)
|
||||||
|
- [CVE-2025-21991](CVE-2025/CVE-2025-219xx/CVE-2025-21991.json) (`2025-04-10T13:24:35.230`)
|
||||||
|
- [CVE-2025-21992](CVE-2025/CVE-2025-219xx/CVE-2025-21992.json) (`2025-04-10T13:15:49.053`)
|
||||||
|
- [CVE-2025-21993](CVE-2025/CVE-2025-219xx/CVE-2025-21993.json) (`2025-04-10T13:24:10.787`)
|
||||||
|
- [CVE-2025-21994](CVE-2025/CVE-2025-219xx/CVE-2025-21994.json) (`2025-04-10T13:15:49.333`)
|
||||||
|
- [CVE-2025-21996](CVE-2025/CVE-2025-219xx/CVE-2025-21996.json) (`2025-04-10T13:15:49.453`)
|
||||||
|
- [CVE-2025-21999](CVE-2025/CVE-2025-219xx/CVE-2025-21999.json) (`2025-04-10T13:15:49.693`)
|
||||||
|
- [CVE-2025-22004](CVE-2025/CVE-2025-220xx/CVE-2025-22004.json) (`2025-04-10T13:15:49.917`)
|
||||||
|
- [CVE-2025-22005](CVE-2025/CVE-2025-220xx/CVE-2025-22005.json) (`2025-04-10T13:15:50.153`)
|
||||||
|
- [CVE-2025-22007](CVE-2025/CVE-2025-220xx/CVE-2025-22007.json) (`2025-04-10T13:31:23.433`)
|
||||||
|
- [CVE-2025-22008](CVE-2025/CVE-2025-220xx/CVE-2025-22008.json) (`2025-04-10T13:15:50.570`)
|
||||||
|
- [CVE-2025-22009](CVE-2025/CVE-2025-220xx/CVE-2025-22009.json) (`2025-04-10T13:10:51.817`)
|
||||||
|
- [CVE-2025-22010](CVE-2025/CVE-2025-220xx/CVE-2025-22010.json) (`2025-04-10T13:15:50.687`)
|
||||||
|
- [CVE-2025-22011](CVE-2025/CVE-2025-220xx/CVE-2025-22011.json) (`2025-04-10T13:10:41.140`)
|
||||||
|
- [CVE-2025-22012](CVE-2025/CVE-2025-220xx/CVE-2025-22012.json) (`2025-04-10T13:10:36.613`)
|
||||||
|
- [CVE-2025-22014](CVE-2025/CVE-2025-220xx/CVE-2025-22014.json) (`2025-04-10T13:15:50.823`)
|
||||||
|
- [CVE-2025-25505](CVE-2025/CVE-2025-255xx/CVE-2025-25505.json) (`2025-04-10T13:37:15.333`)
|
||||||
|
- [CVE-2025-25507](CVE-2025/CVE-2025-255xx/CVE-2025-25507.json) (`2025-04-10T13:37:05.443`)
|
||||||
|
- [CVE-2025-25510](CVE-2025/CVE-2025-255xx/CVE-2025-25510.json) (`2025-04-10T13:36:28.503`)
|
||||||
|
- [CVE-2025-25676](CVE-2025/CVE-2025-256xx/CVE-2025-25676.json) (`2025-04-10T13:37:42.663`)
|
||||||
|
- [CVE-2025-25678](CVE-2025/CVE-2025-256xx/CVE-2025-25678.json) (`2025-04-10T13:37:33.913`)
|
||||||
|
- [CVE-2025-25679](CVE-2025/CVE-2025-256xx/CVE-2025-25679.json) (`2025-04-10T13:37:24.763`)
|
||||||
|
- [CVE-2025-30204](CVE-2025/CVE-2025-302xx/CVE-2025-30204.json) (`2025-04-10T13:15:52.097`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
196
_state.csv
196
_state.csv
@ -187791,7 +187791,7 @@ CVE-2021-47485,0,0,c3b0e3c72dfce312116a02c117217dcd2204d4cc1ff6d84a7d0941be2c708
|
|||||||
CVE-2021-47486,0,0,5fdbd5c225c12c40df3e77ebee31acb93d11be5e6abbb1e964ee7922a63cbad5,2025-04-01T18:40:11.830000
|
CVE-2021-47486,0,0,5fdbd5c225c12c40df3e77ebee31acb93d11be5e6abbb1e964ee7922a63cbad5,2025-04-01T18:40:11.830000
|
||||||
CVE-2021-47487,0,0,37fda3dbde69565646173f301baa99f70441700610bcbfc8402f3e27ab23c916,2024-05-28T19:15:08.983000
|
CVE-2021-47487,0,0,37fda3dbde69565646173f301baa99f70441700610bcbfc8402f3e27ab23c916,2024-05-28T19:15:08.983000
|
||||||
CVE-2021-47488,0,0,6bd518faf568ee263bd5be6b79978583251019752295859beb9e265d517b8683,2024-12-05T14:15:18.520000
|
CVE-2021-47488,0,0,6bd518faf568ee263bd5be6b79978583251019752295859beb9e265d517b8683,2024-12-05T14:15:18.520000
|
||||||
CVE-2021-47489,0,0,7a56ba536c26f6b77795729fd8e0581a390a0f0ae03d489f7fb50e689f3ce146,2025-01-06T19:53:35.453000
|
CVE-2021-47489,0,1,e5e97ed77edaecabb122ac9d25079a20e27070fa9382ba2c97f9423bd9569ea7,2025-04-10T13:15:42.480000
|
||||||
CVE-2021-47490,0,0,151ef266838c7722eaa82f178f6718ea223752e3cd4c4dc0ef3927c3dea46501,2025-01-24T16:15:28.487000
|
CVE-2021-47490,0,0,151ef266838c7722eaa82f178f6718ea223752e3cd4c4dc0ef3927c3dea46501,2025-01-24T16:15:28.487000
|
||||||
CVE-2021-47491,0,0,a7ae681a6beb6f8d9fda8dae0b15459feddf1ede34bb94ccc2241694dd76ab3c,2024-11-21T06:36:19.300000
|
CVE-2021-47491,0,0,a7ae681a6beb6f8d9fda8dae0b15459feddf1ede34bb94ccc2241694dd76ab3c,2024-11-21T06:36:19.300000
|
||||||
CVE-2021-47492,0,0,e82c8d015c8bb1bcf824fdaff87708e8950e6b9aad1aae2306eadf8a5f0445b9,2024-11-21T06:36:19.453000
|
CVE-2021-47492,0,0,e82c8d015c8bb1bcf824fdaff87708e8950e6b9aad1aae2306eadf8a5f0445b9,2024-11-21T06:36:19.453000
|
||||||
@ -213237,7 +213237,7 @@ CVE-2022-49041,0,0,a98f649e96ac9b0759657a1878fe20db3a57b93d993dafffc5b04e911a2c6
|
|||||||
CVE-2022-49043,0,0,7174066d58537267d7d2a315cb17b3519790e5764e973f2a3d77df9ee2584f26,2025-01-26T06:15:21
|
CVE-2022-49043,0,0,7174066d58537267d7d2a315cb17b3519790e5764e973f2a3d77df9ee2584f26,2025-01-26T06:15:21
|
||||||
CVE-2022-49044,0,0,6ed32926adedba89f126484c75e18cfdf819ac2c1ea9dd886f1ccc61fd4776c5,2025-02-26T07:00:41.680000
|
CVE-2022-49044,0,0,6ed32926adedba89f126484c75e18cfdf819ac2c1ea9dd886f1ccc61fd4776c5,2025-02-26T07:00:41.680000
|
||||||
CVE-2022-49045,0,0,22b344a7121cb72fa2f5cfafcc1e2e6a7a43841d65552a779c8562575cc2777e,2025-03-02T15:15:11.130000
|
CVE-2022-49045,0,0,22b344a7121cb72fa2f5cfafcc1e2e6a7a43841d65552a779c8562575cc2777e,2025-03-02T15:15:11.130000
|
||||||
CVE-2022-49046,0,0,e14bb62bb5c4ef922ca02ea14695ac830a3e2d90d9aecaae6883187fbe14dc14,2025-03-18T18:53:16.010000
|
CVE-2022-49046,0,1,04cb20eaf688343c98775dee68737012113a4d6c197bc78d0e1cc28d6706d03b,2025-04-10T13:15:43.390000
|
||||||
CVE-2022-49047,0,0,06a0675e3a2bb09c868545b6aeccb4a3aa9fd8b5540f9daa0a638499223814f0,2025-03-24T17:45:00.503000
|
CVE-2022-49047,0,0,06a0675e3a2bb09c868545b6aeccb4a3aa9fd8b5540f9daa0a638499223814f0,2025-03-24T17:45:00.503000
|
||||||
CVE-2022-49048,0,0,6b0293b39167cefced476c56c5a719f8c6f3031bdc41a90b543af091df2cd564,2025-02-26T07:00:42.073000
|
CVE-2022-49048,0,0,6b0293b39167cefced476c56c5a719f8c6f3031bdc41a90b543af091df2cd564,2025-02-26T07:00:42.073000
|
||||||
CVE-2022-49049,0,0,a0e2a6e75b995dc29c6db9bafbfc88733666b9ff79fe3f9825a45d83ef498b65,2025-02-26T07:00:42.170000
|
CVE-2022-49049,0,0,a0e2a6e75b995dc29c6db9bafbfc88733666b9ff79fe3f9825a45d83ef498b65,2025-02-26T07:00:42.170000
|
||||||
@ -213785,7 +213785,7 @@ CVE-2022-49542,0,0,863a703007a9c0e9dbcb00e8e45a44701779a89376fd639be008eff59f404
|
|||||||
CVE-2022-49543,0,0,a2ff81fe4ecfd6d2c99f742689972c0459a5cc013925198ed509c20be2719fe3,2025-02-26T07:01:30.220000
|
CVE-2022-49543,0,0,a2ff81fe4ecfd6d2c99f742689972c0459a5cc013925198ed509c20be2719fe3,2025-02-26T07:01:30.220000
|
||||||
CVE-2022-49544,0,0,5988bb26e2e446b290393c3cc9bf778787200e992f2f045eed77ba96a746c13b,2025-03-10T21:14:07.310000
|
CVE-2022-49544,0,0,5988bb26e2e446b290393c3cc9bf778787200e992f2f045eed77ba96a746c13b,2025-03-10T21:14:07.310000
|
||||||
CVE-2022-49545,0,0,b15dc44bc69453ab505d9e12bbaa1084c25940152f37f845605fc32cd0bb5d2b,2025-02-26T07:01:30.410000
|
CVE-2022-49545,0,0,b15dc44bc69453ab505d9e12bbaa1084c25940152f37f845605fc32cd0bb5d2b,2025-02-26T07:01:30.410000
|
||||||
CVE-2022-49546,0,0,9db288b75a4bc37eda3f91457915a5f2cb19437085834c7170e6eb68d5a4aba6,2025-03-10T21:13:19.010000
|
CVE-2022-49546,0,1,1ea0bf89434f171a8bbad2fcf1f6cef52f12a4476f8586b7f1cec342930df40a,2025-04-10T13:15:43.550000
|
||||||
CVE-2022-49547,0,0,bf91592a6ea9d3297ec475e4b4e1884ec82cd0f6e9372bcf754c0fc99e0b8008,2025-03-10T21:31:42.100000
|
CVE-2022-49547,0,0,bf91592a6ea9d3297ec475e4b4e1884ec82cd0f6e9372bcf754c0fc99e0b8008,2025-03-10T21:31:42.100000
|
||||||
CVE-2022-49548,0,0,538a83d5bcbbf07561692d7896fba478b67ca68a4698427f780db7881bcef0ce,2025-03-10T21:32:17.530000
|
CVE-2022-49548,0,0,538a83d5bcbbf07561692d7896fba478b67ca68a4698427f780db7881bcef0ce,2025-03-10T21:32:17.530000
|
||||||
CVE-2022-49549,0,0,074710b7b679b559935feb1d1793c1c13989b69406fd0db1afcbdf3fe4448af3,2025-03-10T21:22:55.893000
|
CVE-2022-49549,0,0,074710b7b679b559935feb1d1793c1c13989b69406fd0db1afcbdf3fe4448af3,2025-03-10T21:22:55.893000
|
||||||
@ -213884,7 +213884,7 @@ CVE-2022-49632,0,0,4b3ddbcd6e99112a14b1d0d15b4a55d6ffcf904e20543fc53bdd02d41a726
|
|||||||
CVE-2022-49633,0,0,4ba30ca48b1edc5e0452ab8c92da1c2943d14fb49afbcda58ca859e3b3614030,2025-03-11T22:30:02.070000
|
CVE-2022-49633,0,0,4ba30ca48b1edc5e0452ab8c92da1c2943d14fb49afbcda58ca859e3b3614030,2025-03-11T22:30:02.070000
|
||||||
CVE-2022-49634,0,0,ebab5f31cea1424a123b00edb8767e2f521abd2b8a08a8c1c408be7a6ea265b6,2025-03-11T22:30:25.060000
|
CVE-2022-49634,0,0,ebab5f31cea1424a123b00edb8767e2f521abd2b8a08a8c1c408be7a6ea265b6,2025-03-11T22:30:25.060000
|
||||||
CVE-2022-49635,0,0,acb2b4ba624516c0ac8db97854d6e55fff9e0d10b1b963077ffc8057b1f5357d,2025-02-26T07:01:38.733000
|
CVE-2022-49635,0,0,acb2b4ba624516c0ac8db97854d6e55fff9e0d10b1b963077ffc8057b1f5357d,2025-02-26T07:01:38.733000
|
||||||
CVE-2022-49636,0,0,e0926e6ab6c6e0f096d9d615b429e153828cdcd16e8b34a18aa9a897fa63ec4f,2025-03-11T22:30:51.930000
|
CVE-2022-49636,0,1,e97602dcbdba3ba2c4a2ee9444c4f1408607b7f940162fda9b91209e8cfb691a,2025-04-10T13:15:43.703000
|
||||||
CVE-2022-49637,0,0,9027b4f7d029a8c815ccead00969fde3d6f42c3593acff0f1358df06c4ae2135,2025-03-11T22:31:54.830000
|
CVE-2022-49637,0,0,9027b4f7d029a8c815ccead00969fde3d6f42c3593acff0f1358df06c4ae2135,2025-03-11T22:31:54.830000
|
||||||
CVE-2022-49638,0,0,aaccf2d0288ecb5d50a7db5e435435a85acc0e4b401c3faec5642be2fa0b81be,2025-03-11T22:32:25.430000
|
CVE-2022-49638,0,0,aaccf2d0288ecb5d50a7db5e435435a85acc0e4b401c3faec5642be2fa0b81be,2025-03-11T22:32:25.430000
|
||||||
CVE-2022-49639,0,0,2872a61e50d5d2649c3b2cbc1c2340bd6630ae6c1e0401d7e89b3be31364e209,2025-03-11T22:32:47.653000
|
CVE-2022-49639,0,0,2872a61e50d5d2649c3b2cbc1c2340bd6630ae6c1e0401d7e89b3be31364e209,2025-03-11T22:32:47.653000
|
||||||
@ -213984,7 +213984,7 @@ CVE-2022-49724,0,0,efc0d3ca60fd176a13b507aa32cba7a06a89275a3635b3f298e22e254725d
|
|||||||
CVE-2022-49725,0,0,dfc4d7c7244b5ce77d797ad8c2589087bf82a53692cdd826d90712ee09ecbe80,2025-02-26T07:01:48.167000
|
CVE-2022-49725,0,0,dfc4d7c7244b5ce77d797ad8c2589087bf82a53692cdd826d90712ee09ecbe80,2025-02-26T07:01:48.167000
|
||||||
CVE-2022-49726,0,0,606c6295e0bb15f5d7656b6d044331f12ac39ea63b46e31eded08705796f7ad3,2025-02-26T07:01:48.257000
|
CVE-2022-49726,0,0,606c6295e0bb15f5d7656b6d044331f12ac39ea63b46e31eded08705796f7ad3,2025-02-26T07:01:48.257000
|
||||||
CVE-2022-49727,0,0,86d892eb2b4d5486fa753645163351daf0df98bfd43331ab51edaa2864709432,2025-03-07T20:46:49.640000
|
CVE-2022-49727,0,0,86d892eb2b4d5486fa753645163351daf0df98bfd43331ab51edaa2864709432,2025-03-07T20:46:49.640000
|
||||||
CVE-2022-49728,0,0,be8b36859c5df39e087e3c87f6af82c75fa13b4691014b4b45d967929d24790f,2025-03-07T20:46:17.810000
|
CVE-2022-49728,0,1,33354ce7c0db0b90e067d9932880f3957ff0c25e6f687e93a3af734a77c49a04,2025-04-10T13:15:43.850000
|
||||||
CVE-2022-49729,0,0,e48a3be5fb2cbf03e06d131b53a87c238c82a334d906fa5a52dc268a71346716,2025-03-07T20:46:08.627000
|
CVE-2022-49729,0,0,e48a3be5fb2cbf03e06d131b53a87c238c82a334d906fa5a52dc268a71346716,2025-03-07T20:46:08.627000
|
||||||
CVE-2022-4973,0,0,3f7bb8af7d8ad41d4b8c2b6df6303f0dad9415526c1ebfae5140748d302176bc,2024-10-30T15:58:30.907000
|
CVE-2022-4973,0,0,3f7bb8af7d8ad41d4b8c2b6df6303f0dad9415526c1ebfae5140748d302176bc,2024-10-30T15:58:30.907000
|
||||||
CVE-2022-49730,0,0,e4380c0e0399cfc6b375388279705da8be09a1a2fdffe485a89fe9faccc26dde,2025-03-24T19:32:33.903000
|
CVE-2022-49730,0,0,e4380c0e0399cfc6b375388279705da8be09a1a2fdffe485a89fe9faccc26dde,2025-03-24T19:32:33.903000
|
||||||
@ -245597,6 +245597,7 @@ CVE-2024-11125,0,0,5cdfc72ee0f7492b4e9628eeaf9152e6ef42160a0f2c4c0356b7c19730f5b
|
|||||||
CVE-2024-11126,0,0,d3417195eb476ae6cb845b53d00a316d0079025df004bdf6318edd96e9a02f83,2024-11-12T15:48:59.103000
|
CVE-2024-11126,0,0,d3417195eb476ae6cb845b53d00a316d0079025df004bdf6318edd96e9a02f83,2024-11-12T15:48:59.103000
|
||||||
CVE-2024-11127,0,0,8ab8a7a02ec26c5b2661934596816ed78bd98367b1f4c52ffc4a58bf6fa51adf,2024-11-15T17:29:43.450000
|
CVE-2024-11127,0,0,8ab8a7a02ec26c5b2661934596816ed78bd98367b1f4c52ffc4a58bf6fa51adf,2024-11-15T17:29:43.450000
|
||||||
CVE-2024-11128,0,0,3daf53c78cf58dd1f31203728c75baa1e7b77755676f9f011daf94fe4d0761b7,2025-02-11T21:38:28.860000
|
CVE-2024-11128,0,0,3daf53c78cf58dd1f31203728c75baa1e7b77755676f9f011daf94fe4d0761b7,2025-02-11T21:38:28.860000
|
||||||
|
CVE-2024-11129,1,1,4e25a389c50250a115d2fc2e6207ce6f557424a3adcc2d65ada128493ed75179,2025-04-10T13:15:43.993000
|
||||||
CVE-2024-1113,0,0,90572d47b15d75a1b5b46414b43b02fcca134882a5755a9a69a3d4ba79038a2d,2024-11-21T08:49:49.557000
|
CVE-2024-1113,0,0,90572d47b15d75a1b5b46414b43b02fcca134882a5755a9a69a3d4ba79038a2d,2024-11-21T08:49:49.557000
|
||||||
CVE-2024-11130,0,0,cf5ea4272974c91c76344000d998fe4730aaf36f216ea2c15de856330a45b0d3,2024-11-15T17:57:53.270000
|
CVE-2024-11130,0,0,cf5ea4272974c91c76344000d998fe4730aaf36f216ea2c15de856330a45b0d3,2024-11-15T17:57:53.270000
|
||||||
CVE-2024-11131,0,0,2d746fe67354aead39f652aab9a1911afa4410d30fdc6cdddc0cd4f6d1bf1689,2025-03-19T03:15:12.850000
|
CVE-2024-11131,0,0,2d746fe67354aead39f652aab9a1911afa4410d30fdc6cdddc0cd4f6d1bf1689,2025-03-19T03:15:12.850000
|
||||||
@ -245680,7 +245681,7 @@ CVE-2024-11214,0,0,ce293b49fa3792aed1bdef0278728de22346b7c8c6fd060fecdb1a211d7c2
|
|||||||
CVE-2024-11215,0,0,649934bde3315408f935571e43aced9541face2e1cac41750a3378db1c35aaf3,2024-11-15T13:58:08.913000
|
CVE-2024-11215,0,0,649934bde3315408f935571e43aced9541face2e1cac41750a3378db1c35aaf3,2024-11-15T13:58:08.913000
|
||||||
CVE-2024-11216,0,0,1790dce4ed18369b069802903838bd872fdd72a0844adda5fdce5af19cc6cdfc,2025-03-05T13:15:11.493000
|
CVE-2024-11216,0,0,1790dce4ed18369b069802903838bd872fdd72a0844adda5fdce5af19cc6cdfc,2025-03-05T13:15:11.493000
|
||||||
CVE-2024-11217,0,0,cb24a1bdb987ee2ebd888113abdd2cecfb9cb2fe9a3dca74044179030beb620c,2024-11-18T17:11:56.587000
|
CVE-2024-11217,0,0,cb24a1bdb987ee2ebd888113abdd2cecfb9cb2fe9a3dca74044179030beb620c,2024-11-18T17:11:56.587000
|
||||||
CVE-2024-11218,0,0,a0e3b0e7dacab6fce6f750a083c630728558a86c9a67ee10ce93c4745ce16a69,2025-03-20T08:15:11.387000
|
CVE-2024-11218,0,1,3a88d46b656657a009c20616334af82c6a5c9f4a8d5f9447ad9e6da8e87c6919,2025-04-10T13:15:44.270000
|
||||||
CVE-2024-11219,0,0,e0425cf1f1ca40cc6d95ef04e03e17b5776d09d72a88fcf5abbcb2ac00f59570,2024-11-27T06:15:18.110000
|
CVE-2024-11219,0,0,e0425cf1f1ca40cc6d95ef04e03e17b5776d09d72a88fcf5abbcb2ac00f59570,2024-11-27T06:15:18.110000
|
||||||
CVE-2024-1122,0,0,4a647161edb6d6dbac08921722ee9f0f3f3f764af2a44d6cd56ac17a7d3d92e5,2024-11-21T08:49:50.943000
|
CVE-2024-1122,0,0,4a647161edb6d6dbac08921722ee9f0f3f3f764af2a44d6cd56ac17a7d3d92e5,2024-11-21T08:49:50.943000
|
||||||
CVE-2024-11220,0,0,bea01215af1b0ab3953945bb3fe68c48439557338f0129d7423ffdb58e634441,2025-01-23T16:54:24.970000
|
CVE-2024-11220,0,0,bea01215af1b0ab3953945bb3fe68c48439557338f0129d7423ffdb58e634441,2025-01-23T16:54:24.970000
|
||||||
@ -246752,7 +246753,7 @@ CVE-2024-12272,0,0,cbbb238a5fc49c4ada4f96dbd5ec3bf6a1bab33a6ad37ef5b0235e516631a
|
|||||||
CVE-2024-12274,0,0,754c33d384166421b8530c0b6be4d1f50e294eb962f01142a13c10f72064a9a9,2025-01-13T15:15:07.727000
|
CVE-2024-12274,0,0,754c33d384166421b8530c0b6be4d1f50e294eb962f01142a13c10f72064a9a9,2025-01-13T15:15:07.727000
|
||||||
CVE-2024-12275,0,0,b6c89aad753f4288f4ee3eb48d039165a7e55489cd8f246e0432f82458e25832,2025-01-31T17:15:11.957000
|
CVE-2024-12275,0,0,b6c89aad753f4288f4ee3eb48d039165a7e55489cd8f246e0432f82458e25832,2025-01-31T17:15:11.957000
|
||||||
CVE-2024-12276,0,0,e5bd927071e71d6948c4a1baa287eb37d95c029623029cf811ef1986567a19e1,2025-02-25T03:34:14.477000
|
CVE-2024-12276,0,0,e5bd927071e71d6948c4a1baa287eb37d95c029623029cf811ef1986567a19e1,2025-02-25T03:34:14.477000
|
||||||
CVE-2024-12278,0,0,e45bf47890a6d8cc4e719f9f41cde6d13c31f30dfd914d9900b33a305c2dde62,2025-04-01T20:26:11.547000
|
CVE-2024-12278,0,1,698802398108e48d2748839deab49eb5899a7cf37af29e7cb662cc650b72da8b,2025-04-10T13:19:57.677000
|
||||||
CVE-2024-12279,0,0,28f926ab6f57c2b10bee59d6914cc0152fa6a23fa0d172ad6d11e3d9d407b5c2,2025-01-04T12:15:24.453000
|
CVE-2024-12279,0,0,28f926ab6f57c2b10bee59d6914cc0152fa6a23fa0d172ad6d11e3d9d407b5c2,2025-01-04T12:15:24.453000
|
||||||
CVE-2024-1228,0,0,d9ad08a0c1348634a61421c1ad7147deaf6d1d0acee23e78628f7298f108b1d0,2024-11-21T08:50:06.280000
|
CVE-2024-1228,0,0,d9ad08a0c1348634a61421c1ad7147deaf6d1d0acee23e78628f7298f108b1d0,2024-11-21T08:50:06.280000
|
||||||
CVE-2024-12280,0,0,877a1ef9090370a5789c2e7362afe046232f3567d1b51a01b5cd894549fa6293,2025-01-28T21:15:16.317000
|
CVE-2024-12280,0,0,877a1ef9090370a5789c2e7362afe046232f3567d1b51a01b5cd894549fa6293,2025-01-28T21:15:16.317000
|
||||||
@ -248838,7 +248839,7 @@ CVE-2024-1890,0,0,d1bd71354155e1057cad63e8547d7592dd6f60af83171fbee879c3e6a6bee0
|
|||||||
CVE-2024-1891,0,0,dcda7dbd0536cad9a123f74188eb37534068ccd38871f23683261bf2dbf9ff5c,2024-11-21T08:51:32.257000
|
CVE-2024-1891,0,0,dcda7dbd0536cad9a123f74188eb37534068ccd38871f23683261bf2dbf9ff5c,2024-11-21T08:51:32.257000
|
||||||
CVE-2024-1892,0,0,4a1195240e748e8dae2a5af3f5833d450cffa01d5b35acc474269a2ba782070f,2025-01-10T14:49:33.690000
|
CVE-2024-1892,0,0,4a1195240e748e8dae2a5af3f5833d450cffa01d5b35acc474269a2ba782070f,2025-01-10T14:49:33.690000
|
||||||
CVE-2024-1893,0,0,0ec8c49fd71ae75323e3eb052e6c32aa986dbf45b2fbc40f25b1de1b4b42a104,2025-02-05T15:47:12.477000
|
CVE-2024-1893,0,0,0ec8c49fd71ae75323e3eb052e6c32aa986dbf45b2fbc40f25b1de1b4b42a104,2025-02-05T15:47:12.477000
|
||||||
CVE-2024-1894,0,0,96e3f13e61fecb6effccd91c33ddd0a7615189cebcdd707b62da27767e0e825f,2024-11-21T08:51:32.663000
|
CVE-2024-1894,0,1,1807d21469e4d8fe1d83a9d3fd6ae7ab03d78c02a1c2cb789621e802bd7b9f9c,2025-04-10T13:09:48.177000
|
||||||
CVE-2024-1895,0,0,26e84ec6e5546710286d3b9f9721406f4ace26cc5a95ff4541082e7035836dba,2024-11-21T08:51:32.783000
|
CVE-2024-1895,0,0,26e84ec6e5546710286d3b9f9721406f4ace26cc5a95ff4541082e7035836dba,2024-11-21T08:51:32.783000
|
||||||
CVE-2024-1896,0,0,8af444bce22399cef0b2866c9e5156b5e29038809da87baf205b4cbcccca1ea3,2024-11-21T08:51:32.917000
|
CVE-2024-1896,0,0,8af444bce22399cef0b2866c9e5156b5e29038809da87baf205b4cbcccca1ea3,2024-11-21T08:51:32.917000
|
||||||
CVE-2024-1897,0,0,67d87c13c5ecef27a8c7d05c9fe60fa40e1af48fc634d9ba72f95351d0f4bc02,2024-11-21T08:51:33.080000
|
CVE-2024-1897,0,0,67d87c13c5ecef27a8c7d05c9fe60fa40e1af48fc634d9ba72f95351d0f4bc02,2024-11-21T08:51:33.080000
|
||||||
@ -252521,9 +252522,9 @@ CVE-2024-24478,0,0,2f2fdb5fa1337d22ac843f81ba1ce39141b97e9032b431f4b4d01123d3e2f
|
|||||||
CVE-2024-24479,0,0,d23722f45724922e6375aa72c9e0a89b9ca4990974a83c5207bae0732f14756b,2024-11-21T08:59:19.487000
|
CVE-2024-24479,0,0,d23722f45724922e6375aa72c9e0a89b9ca4990974a83c5207bae0732f14756b,2024-11-21T08:59:19.487000
|
||||||
CVE-2024-2448,0,0,b72152a181016885656f49dc793056e8622b9a5f5c36acbb7ebb4ccedd62c703,2025-02-11T17:39:30.057000
|
CVE-2024-2448,0,0,b72152a181016885656f49dc793056e8622b9a5f5c36acbb7ebb4ccedd62c703,2025-02-11T17:39:30.057000
|
||||||
CVE-2024-24482,0,0,12f9ca99fe14b8dda09119e5a9c90e05dba78cd2403be2772decceaf915ffd35,2024-11-21T08:59:19.703000
|
CVE-2024-24482,0,0,12f9ca99fe14b8dda09119e5a9c90e05dba78cd2403be2772decceaf915ffd35,2024-11-21T08:59:19.703000
|
||||||
CVE-2024-24485,0,0,edb15103838b4290d82ef926a4b737308a8d5ae0e7a7d56a6d99e2a8fe1e2595,2024-11-21T08:59:19.923000
|
CVE-2024-24485,0,1,8b3bc69501fdccb37483d3dad8b2008e6c17d56923656298965f794c72758f89,2025-04-10T13:39:04.063000
|
||||||
CVE-2024-24486,0,0,981c8b21084a9736390d8e21e024f0c6dc79e2589100b122227166b9aa39ccd4,2024-11-21T08:59:20.127000
|
CVE-2024-24486,0,1,edf4c4082ecf075b163f0a734e3b03d9e81a9a3ce6788f50621186f7694f47d3,2025-04-10T13:39:57.420000
|
||||||
CVE-2024-24487,0,0,c03a37b2d2e34877febbe733e8847f5c3b3338349c95e0c8342f422e87df8d14,2024-11-21T08:59:20.347000
|
CVE-2024-24487,0,1,6336ce0210f6b19b06f24f3022017cb316f38b4c761c734f0dffcfce0a4fe08a,2025-04-10T13:39:33.260000
|
||||||
CVE-2024-24488,0,0,bf27efb75bde32f281cfc397e5872b525b860bf9883f0dd43f8ff534d29e927f,2024-11-21T08:59:20.560000
|
CVE-2024-24488,0,0,bf27efb75bde32f281cfc397e5872b525b860bf9883f0dd43f8ff534d29e927f,2024-11-21T08:59:20.560000
|
||||||
CVE-2024-2449,0,0,81d8209e3a4b4be2ff45b2d18df08ecaeeaf5bbb2c00601fbdbf659de2857374,2025-02-10T19:33:51.660000
|
CVE-2024-2449,0,0,81d8209e3a4b4be2ff45b2d18df08ecaeeaf5bbb2c00601fbdbf659de2857374,2025-02-10T19:33:51.660000
|
||||||
CVE-2024-24494,0,0,e820126456d1359a29535bf199fa64cca1038460c8c9a0d8e536e796c70a1560,2024-11-21T08:59:20.727000
|
CVE-2024-24494,0,0,e820126456d1359a29535bf199fa64cca1038460c8c9a0d8e536e796c70a1560,2024-11-21T08:59:20.727000
|
||||||
@ -254406,7 +254407,7 @@ CVE-2024-26924,0,0,886f6b821c546aee86fec9744bc96266ad9a19a26988a8248529bfd0a9714
|
|||||||
CVE-2024-26925,0,0,20888a15d1cf5a1e8e5e70a7116e306e3a92356ef2a117e4a8c708c88ea6472e,2024-11-21T09:03:23.883000
|
CVE-2024-26925,0,0,20888a15d1cf5a1e8e5e70a7116e306e3a92356ef2a117e4a8c708c88ea6472e,2024-11-21T09:03:23.883000
|
||||||
CVE-2024-26926,0,0,1b156d894496658533a56f98b1f816c7f7a219acb93a64935886f571f23e2261,2024-11-21T09:03:24.013000
|
CVE-2024-26926,0,0,1b156d894496658533a56f98b1f816c7f7a219acb93a64935886f571f23e2261,2024-11-21T09:03:24.013000
|
||||||
CVE-2024-26927,0,0,657f6ac07f07e979c4dc034152d7e370a0a0fb55f39411c529a1c929303181fb,2025-03-21T14:50:08.323000
|
CVE-2024-26927,0,0,657f6ac07f07e979c4dc034152d7e370a0a0fb55f39411c529a1c929303181fb,2025-03-21T14:50:08.323000
|
||||||
CVE-2024-26928,0,0,12e429c2f9b4063e83fe9375ac72719500e95092853217831d1e8baf0db3cf10,2025-01-07T16:44:17.763000
|
CVE-2024-26928,0,1,1b9f62c296c5215726dce86600f9e4ed70592e4ce94e3c753cd5222f0e4cb986,2025-04-10T13:15:44.527000
|
||||||
CVE-2024-26929,0,0,022a77a2924a8c7f211d44200437bd4faa4bef4be671f225beb2a6c72269b938,2025-01-06T17:15:15.537000
|
CVE-2024-26929,0,0,022a77a2924a8c7f211d44200437bd4faa4bef4be671f225beb2a6c72269b938,2025-01-06T17:15:15.537000
|
||||||
CVE-2024-2693,0,0,452ca8cd515c59ca1cd15ca2894e9f69af6463e79c7e90d82b67b288f52c52bd,2024-11-21T09:10:18.520000
|
CVE-2024-2693,0,0,452ca8cd515c59ca1cd15ca2894e9f69af6463e79c7e90d82b67b288f52c52bd,2024-11-21T09:10:18.520000
|
||||||
CVE-2024-26930,0,0,5c5e492cbbabf155f512e5ced37eff47855bb0f1c44103a53d05e3c1ca2fbb69,2025-03-07T20:28:49.953000
|
CVE-2024-26930,0,0,5c5e492cbbabf155f512e5ced37eff47855bb0f1c44103a53d05e3c1ca2fbb69,2025-03-07T20:28:49.953000
|
||||||
@ -255995,7 +255996,7 @@ CVE-2024-2898,0,0,4e3255cbb3d949cb224ace5d36c85a1998408ab17d3e02741e60cfdc4b4e67
|
|||||||
CVE-2024-28980,0,0,b332b411a06b692726a898dc70ba347fa765408ba3744c575f760eb4ad7da2cc,2025-02-04T15:55:29.643000
|
CVE-2024-28980,0,0,b332b411a06b692726a898dc70ba347fa765408ba3744c575f760eb4ad7da2cc,2025-02-04T15:55:29.643000
|
||||||
CVE-2024-28981,0,0,692b15f24059cba73d7928530e872749524473b415389822d7c1810b6de68905,2024-09-12T12:35:54.013000
|
CVE-2024-28981,0,0,692b15f24059cba73d7928530e872749524473b415389822d7c1810b6de68905,2024-09-12T12:35:54.013000
|
||||||
CVE-2024-28982,0,0,293d85a1eda8daf3f0e9e42b82681e8e9ccfbfdcf941f77ed8a2fd39fc8cc421,2024-11-21T09:07:19.063000
|
CVE-2024-28982,0,0,293d85a1eda8daf3f0e9e42b82681e8e9ccfbfdcf941f77ed8a2fd39fc8cc421,2024-11-21T09:07:19.063000
|
||||||
CVE-2024-28983,0,1,eb8e5b25f633cb1a3d5b5c92c2bd40adffb2a0b1c20e39836bb1dc9d893acfce,2025-04-10T10:40:31.943000
|
CVE-2024-28983,0,0,eb8e5b25f633cb1a3d5b5c92c2bd40adffb2a0b1c20e39836bb1dc9d893acfce,2025-04-10T10:40:31.943000
|
||||||
CVE-2024-28984,0,0,e221ea1e0ed5d84a917cf65a0a3924161f9f1b60c50e39e56b41be334f33064d,2024-11-21T09:07:19.380000
|
CVE-2024-28984,0,0,e221ea1e0ed5d84a917cf65a0a3924161f9f1b60c50e39e56b41be334f33064d,2024-11-21T09:07:19.380000
|
||||||
CVE-2024-28986,0,0,04047c53e92796f6c88df692b7a4dee29fbd1f79089034259bae8c2d933c1c88,2024-08-16T15:04:28.150000
|
CVE-2024-28986,0,0,04047c53e92796f6c88df692b7a4dee29fbd1f79089034259bae8c2d933c1c88,2024-08-16T15:04:28.150000
|
||||||
CVE-2024-28987,0,0,eb1d6e8c195369e8160428cb16da1b0c3f28c82362eb42d58d03aebe865d58d1,2024-11-29T16:34:47.650000
|
CVE-2024-28987,0,0,eb1d6e8c195369e8160428cb16da1b0c3f28c82362eb42d58d03aebe865d58d1,2024-11-29T16:34:47.650000
|
||||||
@ -257493,13 +257494,13 @@ CVE-2024-30980,0,0,445b7442c0504da0cd120e15a1506c58995179046ed8aadcb7fb911051401
|
|||||||
CVE-2024-30981,0,0,e82dbc1375cb06da94d8e738befede8152cb00373d101b74d631f0c8bfd118b2,2025-04-07T16:52:04.923000
|
CVE-2024-30981,0,0,e82dbc1375cb06da94d8e738befede8152cb00373d101b74d631f0c8bfd118b2,2025-04-07T16:52:04.923000
|
||||||
CVE-2024-30982,0,0,429b39d0352421ce21535f6840c0e60389928948f8d6932f1fc4ce34c8fe3441,2025-04-07T16:51:50.190000
|
CVE-2024-30982,0,0,429b39d0352421ce21535f6840c0e60389928948f8d6932f1fc4ce34c8fe3441,2025-04-07T16:51:50.190000
|
||||||
CVE-2024-30983,0,0,493424e898bfbc27a38d1bedad83fbf31ed3f18aed4a52038dcc451373d8c2a4,2025-04-07T16:51:56.873000
|
CVE-2024-30983,0,0,493424e898bfbc27a38d1bedad83fbf31ed3f18aed4a52038dcc451373d8c2a4,2025-04-07T16:51:56.873000
|
||||||
CVE-2024-30985,0,0,53b6d11d0b5229b5ef6a6404b100767907293ef3c8f06506c7d95daf0a979cff,2024-11-21T09:12:40.320000
|
CVE-2024-30985,0,1,a202a47926f58da9fa6c1e80d5d79c5ffad430534d886db1b6eb761747dbb2a8,2025-04-10T13:41:14.657000
|
||||||
CVE-2024-30986,0,0,56ebbe01089e1d40ff4141e3ec1bfe68fcc0ad13c447fab4911618b70cf8f128,2024-11-21T09:12:40.523000
|
CVE-2024-30986,0,1,0d1b72cce7050b52a6cb60306f2bbbcfd9e0f75e16ea28770de2daf488609ec8,2025-04-10T13:41:10.500000
|
||||||
CVE-2024-30987,0,0,a5ce4d2878d5a58f0882f951b58326d185c725b02a788ac452e1dd57c6400cdf,2024-11-21T09:12:40.740000
|
CVE-2024-30987,0,1,7e81600751d385c5689e3d408d345101be0e06558aee145076c12b6bf90573f2,2025-04-10T13:41:06.233000
|
||||||
CVE-2024-30988,0,0,98fe79b5b4b40366d8bf44556cde94e9937c8a3eb3ee0de1c9c1a8dbcf73231d,2024-11-21T09:12:40.960000
|
CVE-2024-30988,0,1,0e9199a37fdc36b5bf24cc5286a904516208a6dc8c3fed21ce22a058ff1ea756,2025-04-10T13:41:00.560000
|
||||||
CVE-2024-30989,0,0,5193014e1d857ee868fd656f536465155811fbb26dc5ad4dfe2d1c61b0f8454b,2025-03-14T17:15:44.497000
|
CVE-2024-30989,0,1,e807a9ddc313c5cd0c704c73a50c7741c5442afc91998124cfeb2d69a946e799,2025-04-10T13:40:46.917000
|
||||||
CVE-2024-3099,0,0,59d22247c570b34ac1d76d0f25cbd06d81f3cabd618a3d6d6de947af2738f741,2024-11-21T09:28:53.953000
|
CVE-2024-3099,0,0,59d22247c570b34ac1d76d0f25cbd06d81f3cabd618a3d6d6de947af2738f741,2024-11-21T09:28:53.953000
|
||||||
CVE-2024-30990,0,0,cfab82707056b4296a40c38caae7406dc6f7ad2bafe5f6596c78a1f412f3e82d,2024-11-21T09:12:41.300000
|
CVE-2024-30990,0,1,f6a499c8794b6cbfdd38c0a5344f4ea692c7c0b5f064313de4e62b75e419eef1,2025-04-10T13:40:39.260000
|
||||||
CVE-2024-30998,0,0,ee14d4bbce0b6cee67c6c36f47dddf408b70af147e3b49b4056891b8b3933cf3,2025-04-08T15:43:57.400000
|
CVE-2024-30998,0,0,ee14d4bbce0b6cee67c6c36f47dddf408b70af147e3b49b4056891b8b3933cf3,2025-04-08T15:43:57.400000
|
||||||
CVE-2024-3100,0,0,cdfcae3d66ab799d842695f2227f5d408503e80fef0c63776bbe5bbd6058f69a,2024-09-14T11:47:14.677000
|
CVE-2024-3100,0,0,cdfcae3d66ab799d842695f2227f5d408503e80fef0c63776bbe5bbd6058f69a,2024-09-14T11:47:14.677000
|
||||||
CVE-2024-31002,0,0,0b751597f2635484358fb7771a6c157a811fbace97b874ec2f8f9f5018e0c2c4,2024-11-21T09:12:41.733000
|
CVE-2024-31002,0,0,0b751597f2635484358fb7771a6c157a811fbace97b874ec2f8f9f5018e0c2c4,2024-11-21T09:12:41.733000
|
||||||
@ -259638,7 +259639,7 @@ CVE-2024-3383,0,0,2fa83abdea40282e20ea0cdf839990a0c3e4b3915404b86d2e06d5f4bf5683
|
|||||||
CVE-2024-33830,0,0,f1012ab730edcfd864a0644722071cb6ff41ee64e585601d191df590a20be372,2024-11-21T09:17:33.390000
|
CVE-2024-33830,0,0,f1012ab730edcfd864a0644722071cb6ff41ee64e585601d191df590a20be372,2024-11-21T09:17:33.390000
|
||||||
CVE-2024-33831,0,0,f91f34cdd2bcb6e6adcab72045795af979a1b6ad2c28fa652db7625dedd4f35d,2024-11-21T09:17:33.660000
|
CVE-2024-33831,0,0,f91f34cdd2bcb6e6adcab72045795af979a1b6ad2c28fa652db7625dedd4f35d,2024-11-21T09:17:33.660000
|
||||||
CVE-2024-33832,0,0,4a7de24f1ee6133b608740a244d388457220575de4659dfa0b317191ab265879,2024-11-21T09:17:33.847000
|
CVE-2024-33832,0,0,4a7de24f1ee6133b608740a244d388457220575de4659dfa0b317191ab265879,2024-11-21T09:17:33.847000
|
||||||
CVE-2024-33835,0,0,3e192c85c2f13a4a00101e791f822c9888ae665f140c80028c35765adbfb6897,2024-11-21T09:17:34.033000
|
CVE-2024-33835,0,1,5637bdb765c6661c1c6f2de49886f74ce4c715820ab9b7afd0803e31f5bd9a70,2025-04-10T13:41:39.267000
|
||||||
CVE-2024-33836,0,0,e9fdefa6cfdfda12401c899a902faeb54477882eb31bdafd3c99df2e5bfe597c,2024-11-21T09:17:34.227000
|
CVE-2024-33836,0,0,e9fdefa6cfdfda12401c899a902faeb54477882eb31bdafd3c99df2e5bfe597c,2024-11-21T09:17:34.227000
|
||||||
CVE-2024-3384,0,0,c4b2f8ab6758117062890bee73e21a93e57f567211e04646223f4e021cdfaa57,2025-01-24T15:54:56.557000
|
CVE-2024-3384,0,0,c4b2f8ab6758117062890bee73e21a93e57f567211e04646223f4e021cdfaa57,2025-01-24T15:54:56.557000
|
||||||
CVE-2024-33844,0,0,1e18a94f6c4ca0cb2f505b170cfbd921e492159831a4042d010782384e7dcff2,2025-03-13T21:15:39.590000
|
CVE-2024-33844,0,0,1e18a94f6c4ca0cb2f505b170cfbd921e492159831a4042d010782384e7dcff2,2025-03-13T21:15:39.590000
|
||||||
@ -263567,7 +263568,7 @@ CVE-2024-38608,0,0,9047d5fa6031e3edcce1a9b27f9a4f65f4b59fc23ac62e10259c6e642290f
|
|||||||
CVE-2024-38609,0,0,1f5427b015e1032af6948292a48310f693450e7b841e694549a3d08bf031c00a,2025-01-31T15:32:13.697000
|
CVE-2024-38609,0,0,1f5427b015e1032af6948292a48310f693450e7b841e694549a3d08bf031c00a,2025-01-31T15:32:13.697000
|
||||||
CVE-2024-3861,0,0,2f28d50fa2e8e40656f77c49fd4464624469455af1f9e188c9e615bd0e8a0305,2025-04-01T14:32:41.477000
|
CVE-2024-3861,0,0,2f28d50fa2e8e40656f77c49fd4464624469455af1f9e188c9e615bd0e8a0305,2025-04-01T14:32:41.477000
|
||||||
CVE-2024-38610,0,0,135d89dfa1b0c5848284308cf8dd2a3e467ecb37142c52017a45f1c836419e6e,2024-11-21T09:26:28.660000
|
CVE-2024-38610,0,0,135d89dfa1b0c5848284308cf8dd2a3e467ecb37142c52017a45f1c836419e6e,2024-11-21T09:26:28.660000
|
||||||
CVE-2024-38611,0,0,d2843e0f15e8d23b68ec75b98040560a85657fa4389da966395a527324235315,2024-11-21T09:26:28.820000
|
CVE-2024-38611,0,1,0040a4739cfe910bac5ddfc79a3bb3219590f6f501d203abefb3f3a27973f25c,2025-04-10T13:15:44.790000
|
||||||
CVE-2024-38612,0,0,b96e21aeeb9599f687050c96ad25385f93ce92a1bbc2a505df7a49a7e2510eda,2025-04-01T18:26:38.013000
|
CVE-2024-38612,0,0,b96e21aeeb9599f687050c96ad25385f93ce92a1bbc2a505df7a49a7e2510eda,2025-04-01T18:26:38.013000
|
||||||
CVE-2024-38613,0,0,f61121b36ccbdf9eef155a6a096739511c149b5e3308f0b671f34f8f5dca7281,2024-11-21T09:26:29.207000
|
CVE-2024-38613,0,0,f61121b36ccbdf9eef155a6a096739511c149b5e3308f0b671f34f8f5dca7281,2024-11-21T09:26:29.207000
|
||||||
CVE-2024-38614,0,0,404a9d3db3e67bff9dde5228edca917ffeadca74171046df971c422e5b04d26c,2024-11-21T09:26:29.347000
|
CVE-2024-38614,0,0,404a9d3db3e67bff9dde5228edca917ffeadca74171046df971c422e5b04d26c,2024-11-21T09:26:29.347000
|
||||||
@ -264650,9 +264651,9 @@ CVE-2024-39928,0,0,36746816d5a179f8dacaec6e67ea9b447cd0145aa354104fbfbe630b6bc05
|
|||||||
CVE-2024-39929,0,0,e05786a0bff8a717a9d0e29fd179f70720437e88c3451a4fe1017b9aa0163a85,2025-03-18T16:15:21.850000
|
CVE-2024-39929,0,0,e05786a0bff8a717a9d0e29fd179f70720437e88c3451a4fe1017b9aa0163a85,2025-03-18T16:15:21.850000
|
||||||
CVE-2024-3993,0,0,dfe7a0553427868055b3e1c0cde0f364fe08fe913b7ecb5123deb206c4ea7338,2024-11-21T09:30:52.047000
|
CVE-2024-3993,0,0,dfe7a0553427868055b3e1c0cde0f364fe08fe913b7ecb5123deb206c4ea7338,2024-11-21T09:30:52.047000
|
||||||
CVE-2024-39930,0,0,5dc01b3c8e1fb8f73588615aae7b8a8178fdcfb54e8c7686725ce4a45e216e26,2024-11-21T09:28:35.910000
|
CVE-2024-39930,0,0,5dc01b3c8e1fb8f73588615aae7b8a8178fdcfb54e8c7686725ce4a45e216e26,2024-11-21T09:28:35.910000
|
||||||
CVE-2024-39931,0,0,4d0fc49e820fd6e541780bd9d8d0eca181c5f5d1fcd9439a146d43237b57d2b7,2024-11-21T09:28:36.087000
|
CVE-2024-39931,0,1,7812805453d7f8921333ebcf634bcadda5befd1e13c58a4ce9979741cca7a002,2025-04-10T13:43:51.257000
|
||||||
CVE-2024-39932,0,0,282170ce1ca21b505d17ffc04e0e845c894faac94992866872f4152c73c277cc,2024-11-21T09:28:36.240000
|
CVE-2024-39932,0,1,9a4f5a8279117acb9b5c69ca769b00c9e67897d00214cd782689bac2a39d51e0,2025-04-10T13:44:52.103000
|
||||||
CVE-2024-39933,0,0,0e9b13327bf4c22aeb807fab822dbb13b923cf669db95f9f5ad35237bc7b1fc9,2024-11-21T09:28:36.400000
|
CVE-2024-39933,0,1,99da420be37037001e1bfeb8e5e3400494fc64eb4bd14376430e48fc3179c9ca,2025-04-10T13:45:38.273000
|
||||||
CVE-2024-39934,0,0,a040eeb58db8dc357074257c6548a542573771e14e58a5691af92614e3e7c903,2024-11-21T09:28:36.553000
|
CVE-2024-39934,0,0,a040eeb58db8dc357074257c6548a542573771e14e58a5691af92614e3e7c903,2024-11-21T09:28:36.553000
|
||||||
CVE-2024-39935,0,0,20eb5709834fe3f6799e0bb92d1add201d649bc3b4e0f310eed715777bbe31c5,2024-11-21T09:28:36.707000
|
CVE-2024-39935,0,0,20eb5709834fe3f6799e0bb92d1add201d649bc3b4e0f310eed715777bbe31c5,2024-11-21T09:28:36.707000
|
||||||
CVE-2024-39936,0,0,e821e5a3bdb05b6dde9222f704eae2d36ecf741fc03b3f00768268ab9a5c894f,2025-03-19T20:15:18.770000
|
CVE-2024-39936,0,0,e821e5a3bdb05b6dde9222f704eae2d36ecf741fc03b3f00768268ab9a5c894f,2025-03-19T20:15:18.770000
|
||||||
@ -265602,15 +265603,15 @@ CVE-2024-41579,0,0,00401f5a27bbe5068511cb2e589592e7d13e313ad7b023bdea7b8a4482f81
|
|||||||
CVE-2024-4158,0,0,6f5142212b7f11f746d09765245fdc596c1170b29be5ee204d7e191cb8d2cab0,2025-01-28T03:03:08.447000
|
CVE-2024-4158,0,0,6f5142212b7f11f746d09765245fdc596c1170b29be5ee204d7e191cb8d2cab0,2025-01-28T03:03:08.447000
|
||||||
CVE-2024-41583,0,0,1a2cf944ac0faaad65d0fa8a08d6745d58f6ed5d5ab422f4a8a1c3b961675df9,2024-10-04T13:50:43.727000
|
CVE-2024-41583,0,0,1a2cf944ac0faaad65d0fa8a08d6745d58f6ed5d5ab422f4a8a1c3b961675df9,2024-10-04T13:50:43.727000
|
||||||
CVE-2024-41584,0,0,a756336a17820148688412fc36dbdf4cf1430daae27f7ae91b5ca9d658835775,2024-10-04T13:50:43.727000
|
CVE-2024-41584,0,0,a756336a17820148688412fc36dbdf4cf1430daae27f7ae91b5ca9d658835775,2024-10-04T13:50:43.727000
|
||||||
CVE-2024-41585,0,0,5c7959b63fb8c6f9f663defb96a0fee4ade3ece14e0b9bc7262ce5ca4b357f56,2024-10-07T19:37:13.900000
|
CVE-2024-41585,0,1,f603abcc7adc50c0f0418039db97e6157e5d644c828ff6d6a43a1148e2cbdcd7,2025-04-10T13:41:39.553000
|
||||||
CVE-2024-41586,0,0,1dfe0a57832209bcd6e050fea5d10d9e2cc77b9729ee84c61dfed10c208841e5,2024-10-04T13:50:43.727000
|
CVE-2024-41586,0,1,2ca5c96a0d26f43109380a195dfb7e58cb016f80ea656e1dca0934dfc33fbe62,2025-04-10T13:41:46.850000
|
||||||
CVE-2024-41587,0,0,49423dacd1b4227d5ab73e5f650b6e45277b0abc6417b9dfb6a350665edb1b90,2025-03-18T16:15:22.733000
|
CVE-2024-41587,0,0,49423dacd1b4227d5ab73e5f650b6e45277b0abc6417b9dfb6a350665edb1b90,2025-03-18T16:15:22.733000
|
||||||
CVE-2024-41588,0,0,fd3ce7f7855398e35ab5f6ddf4c9ca224e9b39f193258ed7cd185f9bbcbce78f,2024-10-07T19:37:15.063000
|
CVE-2024-41588,0,0,fd3ce7f7855398e35ab5f6ddf4c9ca224e9b39f193258ed7cd185f9bbcbce78f,2024-10-07T19:37:15.063000
|
||||||
CVE-2024-41589,0,0,933f60891b4d710c7b37c18705d8a2738d871d9d2c4ed1642f1e707d191ac66c,2024-10-04T13:50:43.727000
|
CVE-2024-41589,0,1,e9c30a32e1d5bd5f4b6364fc650d57d72e5e61f9fa07da023f0932b49a18787a,2025-04-10T13:43:37.377000
|
||||||
CVE-2024-4159,0,0,79fc1543f1260705e74b8deeae175c555b129f183a9014a6e4288a6f9681a384,2025-02-06T17:49:55.727000
|
CVE-2024-4159,0,0,79fc1543f1260705e74b8deeae175c555b129f183a9014a6e4288a6f9681a384,2025-02-06T17:49:55.727000
|
||||||
CVE-2024-41590,0,0,1e2ec45258e7c07e175972d8811464c9173bad3d822ce356ae18fa7f32371b1c,2024-10-07T19:37:16.150000
|
CVE-2024-41590,0,0,1e2ec45258e7c07e175972d8811464c9173bad3d822ce356ae18fa7f32371b1c,2024-10-07T19:37:16.150000
|
||||||
CVE-2024-41591,0,0,fbe56be2c7d21e58694890c979fd5b2525d6606e74bcf44af4f4eb9ebfc7cb62,2025-03-14T16:15:34.730000
|
CVE-2024-41591,0,0,fbe56be2c7d21e58694890c979fd5b2525d6606e74bcf44af4f4eb9ebfc7cb62,2025-03-14T16:15:34.730000
|
||||||
CVE-2024-41592,0,0,6cafebc6f0d6fbb4004a1dfb277a5338bfce167123047c3517ae584872bca55c,2024-10-04T13:50:43.727000
|
CVE-2024-41592,0,1,b26321fbe83256741debbe7f958bc02fe1d6cbb574226261d975a0289c32bfe0,2025-04-10T13:41:51.380000
|
||||||
CVE-2024-41593,0,0,4c655fb675e2e26beb224f3146b60f9a593776c70e4428cbb9b0d5eb10e9c063,2025-03-13T19:15:47.260000
|
CVE-2024-41593,0,0,4c655fb675e2e26beb224f3146b60f9a593776c70e4428cbb9b0d5eb10e9c063,2025-03-13T19:15:47.260000
|
||||||
CVE-2024-41594,0,0,0fa2ba762c2fbc09f3e5499bc08c98877b67fafe9367aa7a338ecace00d5bdc7,2025-03-19T16:15:26.387000
|
CVE-2024-41594,0,0,0fa2ba762c2fbc09f3e5499bc08c98877b67fafe9367aa7a338ecace00d5bdc7,2025-03-19T16:15:26.387000
|
||||||
CVE-2024-41595,0,0,44455fcc40d68fa8f45347482b1d2168aab0c68de0853c639a8e56e911020245,2024-10-04T13:50:43.727000
|
CVE-2024-41595,0,0,44455fcc40d68fa8f45347482b1d2168aab0c68de0853c639a8e56e911020245,2024-10-04T13:50:43.727000
|
||||||
@ -269462,7 +269463,7 @@ CVE-2024-4675,0,0,fb7e6fa9fc63f7b6a41c7770746ca4c45a9246471a1a98e3cba2ed2f8d6fcf
|
|||||||
CVE-2024-46750,0,0,66feceef0345c19e660d67c9a1818aa8a16fe162028284331affcd8721d122e5,2024-09-30T13:27:45.787000
|
CVE-2024-46750,0,0,66feceef0345c19e660d67c9a1818aa8a16fe162028284331affcd8721d122e5,2024-09-30T13:27:45.787000
|
||||||
CVE-2024-46751,0,0,4457cda69cdc02848e881ec7b190254ddd4d1cb4716b4860d3a02eea1a7db91e,2024-09-30T12:45:56.957000
|
CVE-2024-46751,0,0,4457cda69cdc02848e881ec7b190254ddd4d1cb4716b4860d3a02eea1a7db91e,2024-09-30T12:45:56.957000
|
||||||
CVE-2024-46752,0,0,a6e483848fd846991fe052cf397d8e3748be44625f58093adb7b1755e086fa32,2024-09-20T12:30:51.220000
|
CVE-2024-46752,0,0,a6e483848fd846991fe052cf397d8e3748be44625f58093adb7b1755e086fa32,2024-09-20T12:30:51.220000
|
||||||
CVE-2024-46753,0,0,3d7493508cc733effcafdd7d2b06bc7d70b1185c0794738e42492fc29ea4f135,2024-09-20T12:30:51.220000
|
CVE-2024-46753,0,1,3f1682b59cb8d5756351d35a4e4458eb3e9b590f693c2e576da791ab5f36b981,2025-04-10T13:15:45.023000
|
||||||
CVE-2024-46754,0,0,d335bc48b5fc1eebe1a7eef0e7eae5f8d2c1b537f7a261d71a0e5ceb10c05e28,2024-09-20T12:30:51.220000
|
CVE-2024-46754,0,0,d335bc48b5fc1eebe1a7eef0e7eae5f8d2c1b537f7a261d71a0e5ceb10c05e28,2024-09-20T12:30:51.220000
|
||||||
CVE-2024-46755,0,0,ff39e2d7270afa31e804d067bcf588e5bcd9fa15f72d201b0ea3c2f5600330d8,2024-09-26T13:25:54.593000
|
CVE-2024-46755,0,0,ff39e2d7270afa31e804d067bcf588e5bcd9fa15f72d201b0ea3c2f5600330d8,2024-09-26T13:25:54.593000
|
||||||
CVE-2024-46756,0,0,a89b5439fb318adbc366507eac3f81bb2badc1e135f1a0072eb73274f7c98f29,2025-01-09T16:15:38.913000
|
CVE-2024-46756,0,0,a89b5439fb318adbc366507eac3f81bb2badc1e135f1a0072eb73274f7c98f29,2025-01-09T16:15:38.913000
|
||||||
@ -269527,8 +269528,8 @@ CVE-2024-46809,0,0,2baa2c410a0e98ba49d63da68764d9afe11ed295d51f188ed8fe0d8fb7553
|
|||||||
CVE-2024-4681,0,0,e2134a614dca3348c17b76fbcc70e710152fa214740bfd92fca1dc669b2966a0,2025-02-20T20:12:02.653000
|
CVE-2024-4681,0,0,e2134a614dca3348c17b76fbcc70e710152fa214740bfd92fca1dc669b2966a0,2025-02-20T20:12:02.653000
|
||||||
CVE-2024-46810,0,0,db817a742c0b29650d6d800b706b002d42fe04ca631345970e15ff4c2906a30d,2024-10-04T17:43:04.277000
|
CVE-2024-46810,0,0,db817a742c0b29650d6d800b706b002d42fe04ca631345970e15ff4c2906a30d,2024-10-04T17:43:04.277000
|
||||||
CVE-2024-46811,0,0,2dbc669ad5b50d6e5a17f236c9453b8d3f6062106fc1dc59ecc99e6afa1bcc9c,2024-10-07T14:24:56.860000
|
CVE-2024-46811,0,0,2dbc669ad5b50d6e5a17f236c9453b8d3f6062106fc1dc59ecc99e6afa1bcc9c,2024-10-07T14:24:56.860000
|
||||||
CVE-2024-46812,0,0,9698b075bfae622365158b354a9af2eb778beb464a568490adc28043db2e50b9,2024-11-20T20:48:48.663000
|
CVE-2024-46812,0,1,27f6c4dd25aa09a7e159856242be9f35fcc3122270f1ffd285e46652bc96a85a,2025-04-10T13:15:45.153000
|
||||||
CVE-2024-46813,0,0,91935968017d76954b07c4f5fa76823cfefe62ab64416790b8fb06b7ee18ef92,2024-10-04T17:38:17.740000
|
CVE-2024-46813,0,1,ea4d886f1e469214530c3dc96328c5a7e7a8e2952f8545005f2a3901833e8bad,2025-04-10T13:15:45.303000
|
||||||
CVE-2024-46814,0,0,2d733e7cbdb19a14fbb31b604fcdeab772c427714b4e97ba0aea10c564457763,2024-10-04T17:27:47.450000
|
CVE-2024-46814,0,0,2d733e7cbdb19a14fbb31b604fcdeab772c427714b4e97ba0aea10c564457763,2024-10-04T17:27:47.450000
|
||||||
CVE-2024-46815,0,0,0d1eb43c74ba7bba5cc3b81322d15c43ea9fab0c4d58caf610783efac6ba13ce,2024-11-20T18:22:12.017000
|
CVE-2024-46815,0,0,0d1eb43c74ba7bba5cc3b81322d15c43ea9fab0c4d58caf610783efac6ba13ce,2024-11-20T18:22:12.017000
|
||||||
CVE-2024-46816,0,0,dd5e524ab4fec930aa00ef8b4474eb4dacf89f99175c6beaccdfb37c0c2cbe75,2024-11-20T18:02:52.437000
|
CVE-2024-46816,0,0,dd5e524ab4fec930aa00ef8b4474eb4dacf89f99175c6beaccdfb37c0c2cbe75,2024-11-20T18:02:52.437000
|
||||||
@ -269537,9 +269538,9 @@ CVE-2024-46818,0,0,3c0ad7e9cb76891d8ac9b71df08567941cf062277ff4b72f5c15f729dfb8c
|
|||||||
CVE-2024-46819,0,0,fdca475d6dbaa09ef703a9cbcb418bdd925bbb20ca810eb936548c9b0d16f32a,2024-10-04T17:11:00.570000
|
CVE-2024-46819,0,0,fdca475d6dbaa09ef703a9cbcb418bdd925bbb20ca810eb936548c9b0d16f32a,2024-10-04T17:11:00.570000
|
||||||
CVE-2024-4682,0,0,968cfd7555d4806fe7ba270e70bdce3bfc3b7bd9d27199e46c73b1e64d5cf39e,2025-02-19T18:36:57.870000
|
CVE-2024-4682,0,0,968cfd7555d4806fe7ba270e70bdce3bfc3b7bd9d27199e46c73b1e64d5cf39e,2025-02-19T18:36:57.870000
|
||||||
CVE-2024-46820,0,0,7a3e082a14038bab91e3b9d19980fdaea55a5edc504958a642bdcec6cdbe724b,2024-11-20T17:34:05.143000
|
CVE-2024-46820,0,0,7a3e082a14038bab91e3b9d19980fdaea55a5edc504958a642bdcec6cdbe724b,2024-11-20T17:34:05.143000
|
||||||
CVE-2024-46821,0,0,6fd031d1ff2bb7026a1d160354f5a9e1df2cf11abd2befef1747058e4e8a4ee3,2024-10-04T17:06:43.573000
|
CVE-2024-46821,0,1,8a960bbbf35c30219a3dcdfce99e110d3a616628efc68d07a97f3e817bd166a0,2025-04-10T13:15:45.433000
|
||||||
CVE-2024-46822,0,0,7656bbe7eee2c22a1e68e53f2dd71842bad00b6a05b26daa21e396f596ff167c,2024-10-02T14:24:01.757000
|
CVE-2024-46822,0,0,7656bbe7eee2c22a1e68e53f2dd71842bad00b6a05b26daa21e396f596ff167c,2024-10-02T14:24:01.757000
|
||||||
CVE-2024-46823,0,0,98bd20960f6a8e5fdc6302a68f4a475db63adcbecb9b94c943d73ab1eff4ca2d,2024-11-20T13:59:52.723000
|
CVE-2024-46823,0,1,1cd954c4a97be9628a72c6d20bd24e06ede029550d00781954fd2891bea72a13,2025-04-10T13:15:45.660000
|
||||||
CVE-2024-46824,0,0,35cf5a785a1668ad3fa5d2a62d8a8ff6a475112b80f5d7b8d9031824f8d0ca99,2024-10-02T14:29:08.417000
|
CVE-2024-46824,0,0,35cf5a785a1668ad3fa5d2a62d8a8ff6a475112b80f5d7b8d9031824f8d0ca99,2024-10-02T14:29:08.417000
|
||||||
CVE-2024-46825,0,0,cd9fc8c7628a67f13eb1841a59036967c72ec8c1d8a74f9623d152fa723ce018,2024-11-20T17:24:04.660000
|
CVE-2024-46825,0,0,cd9fc8c7628a67f13eb1841a59036967c72ec8c1d8a74f9623d152fa723ce018,2024-11-20T17:24:04.660000
|
||||||
CVE-2024-46826,0,0,72df3d63fe342ce1e6089cfe73c9977c379d613a926721e46d5694fb2086e121,2024-11-20T17:19:00.183000
|
CVE-2024-46826,0,0,72df3d63fe342ce1e6089cfe73c9977c379d613a926721e46d5694fb2086e121,2024-11-20T17:19:00.183000
|
||||||
@ -269882,7 +269883,7 @@ CVE-2024-47210,0,0,7b078d282e49f2a1336ae546c0b723ff3d199712c9c99c4465d9098c519ca
|
|||||||
CVE-2024-47211,0,0,7cfbe4caeb9c6d5ba2e34fa790cad31c3986781c114cbdc021a3c5c02b8899bf,2024-11-21T09:39:31.500000
|
CVE-2024-47211,0,0,7cfbe4caeb9c6d5ba2e34fa790cad31c3986781c114cbdc021a3c5c02b8899bf,2024-11-21T09:39:31.500000
|
||||||
CVE-2024-47212,0,0,3301d958588bd8d56cdd4439a0a32f1d49e101afc033519c8f5be640828b017f,2025-04-08T20:06:27.003000
|
CVE-2024-47212,0,0,3301d958588bd8d56cdd4439a0a32f1d49e101afc033519c8f5be640828b017f,2025-04-08T20:06:27.003000
|
||||||
CVE-2024-47213,0,0,04b30dd06b47bd624c0ea92317eb571bb18e7eda14f9a4173d1f19a4597595f5,2025-04-07T14:18:34.453000
|
CVE-2024-47213,0,0,04b30dd06b47bd624c0ea92317eb571bb18e7eda14f9a4173d1f19a4597595f5,2025-04-07T14:18:34.453000
|
||||||
CVE-2024-47214,0,0,42f25dfb8db8cae5df36e924bb85b979a09f2b5292e410e9fd0fe3f58fb972e9,2025-04-07T19:15:53.147000
|
CVE-2024-47214,0,1,fdf63583cb8c718454aba155a2144e7a411e8ffb79f3de417801c77469d8b72d,2025-04-10T13:51:22.130000
|
||||||
CVE-2024-47215,0,0,d058dd10bb1de131f6b594cf9eb61be90cf5dc89e729180c84d1d89902a748cd,2025-04-07T19:15:53.300000
|
CVE-2024-47215,0,0,d058dd10bb1de131f6b594cf9eb61be90cf5dc89e729180c84d1d89902a748cd,2025-04-07T19:15:53.300000
|
||||||
CVE-2024-47217,0,0,959ea08e604f6076b0cfb3f0015c60a8376accca2a2e83fe707c21c8552b263c,2025-04-08T18:55:43.790000
|
CVE-2024-47217,0,0,959ea08e604f6076b0cfb3f0015c60a8376accca2a2e83fe707c21c8552b263c,2025-04-08T18:55:43.790000
|
||||||
CVE-2024-47218,0,0,db03414a0794c64478156435016e14cfdd9450c8bd09172385f11c2f30d16310,2024-09-26T13:32:55.343000
|
CVE-2024-47218,0,0,db03414a0794c64478156435016e14cfdd9450c8bd09172385f11c2f30d16310,2024-09-26T13:32:55.343000
|
||||||
@ -274295,7 +274296,7 @@ CVE-2024-53140,0,0,278cbdb637af028f369abd9e56d14ef405930db6ac1e94694d5107009c64d
|
|||||||
CVE-2024-53141,0,0,c4eea5c2fe51a3898acccfa414620e41964aab3e73f12af77b5d7bb35ff9fbc7,2024-12-14T21:15:38.550000
|
CVE-2024-53141,0,0,c4eea5c2fe51a3898acccfa414620e41964aab3e73f12af77b5d7bb35ff9fbc7,2024-12-14T21:15:38.550000
|
||||||
CVE-2024-53142,0,0,fc23c3e378fb46ab5615da6a919ab3136de551312d5d21e741724005200e92a7,2024-12-14T21:15:38.707000
|
CVE-2024-53142,0,0,fc23c3e378fb46ab5615da6a919ab3136de551312d5d21e741724005200e92a7,2024-12-14T21:15:38.707000
|
||||||
CVE-2024-53143,0,0,fa84cb4cdc6e64e0bc94478c6ab027a585813512fbfd2326e9207568df82fe5d,2025-03-24T17:27:18.173000
|
CVE-2024-53143,0,0,fa84cb4cdc6e64e0bc94478c6ab027a585813512fbfd2326e9207568df82fe5d,2025-03-24T17:27:18.173000
|
||||||
CVE-2024-53144,0,0,9d107c35ff0dca61e5b14e7d0131ac8dad4f8c1aeabd45b2baa64b7fc7411808,2024-12-18T08:15:05.687000
|
CVE-2024-53144,0,1,b88688a506f15bf7360070e363b2df2a1a23a0dc78161b2bc382b60fe6800938,2025-04-10T13:15:45.907000
|
||||||
CVE-2024-53145,0,0,845c82eecd5000228acfbd771e22e0fcec976590e482e5c078720e730bd428d5,2025-01-07T16:14:57.543000
|
CVE-2024-53145,0,0,845c82eecd5000228acfbd771e22e0fcec976590e482e5c078720e730bd428d5,2025-01-07T16:14:57.543000
|
||||||
CVE-2024-53146,0,0,143a6857f7adc5fe799b8f016794e004afe724691ccaf56befb27f641c543479,2025-01-07T17:15:25.477000
|
CVE-2024-53146,0,0,143a6857f7adc5fe799b8f016794e004afe724691ccaf56befb27f641c543479,2025-01-07T17:15:25.477000
|
||||||
CVE-2024-53147,0,0,a5545dbb75e1ea0355592ea9c5cbed6b78973df74296885178a65e66e3108898,2024-12-24T12:15:22.777000
|
CVE-2024-53147,0,0,a5545dbb75e1ea0355592ea9c5cbed6b78973df74296885178a65e66e3108898,2024-12-24T12:15:22.777000
|
||||||
@ -276460,7 +276461,7 @@ CVE-2024-56660,0,0,cfed4a787333c42a3454657a06f0d3b7a6226ccb05b4cc27e3c9f4d563a87
|
|||||||
CVE-2024-56661,0,0,c6c9e404b12664e81d58b8990f331d53c7130ec908c72b71de88eceee8fff31e,2025-01-06T18:49:40.310000
|
CVE-2024-56661,0,0,c6c9e404b12664e81d58b8990f331d53c7130ec908c72b71de88eceee8fff31e,2025-01-06T18:49:40.310000
|
||||||
CVE-2024-56662,0,0,2eb37c849d1c944c9ea82f37c67388f3c32521454fb617ad4e1f9a3fad26a35b,2025-01-06T18:51:31.593000
|
CVE-2024-56662,0,0,2eb37c849d1c944c9ea82f37c67388f3c32521454fb617ad4e1f9a3fad26a35b,2025-01-06T18:51:31.593000
|
||||||
CVE-2024-56663,0,0,b24b5ff415051e92cf82550565ee0a00212026738720b005f89116c862f514b2,2025-01-06T18:52:41.737000
|
CVE-2024-56663,0,0,b24b5ff415051e92cf82550565ee0a00212026738720b005f89116c862f514b2,2025-01-06T18:52:41.737000
|
||||||
CVE-2024-56664,0,0,1d87198303193d03ffc5160221e756d18acd53179559f5fb8d05b49e019c082c,2025-01-17T14:15:32.227000
|
CVE-2024-56664,0,1,510234c87d7ebcf9cc6fd0c5a7bd6e82fdb9857b952048590afcfc56a3b9b610,2025-04-10T13:15:46.037000
|
||||||
CVE-2024-56665,0,0,b08ee739572f10c32d239f33de64977bec1256b54835c47ccb8efd3ec8866d26,2025-01-06T18:42:12.090000
|
CVE-2024-56665,0,0,b08ee739572f10c32d239f33de64977bec1256b54835c47ccb8efd3ec8866d26,2025-01-06T18:42:12.090000
|
||||||
CVE-2024-56666,0,0,21f26ce12addeba29595c53677883f3a92e9d33b51f0211bdc6b5982f3c5d0f1,2025-01-06T18:23:37.147000
|
CVE-2024-56666,0,0,21f26ce12addeba29595c53677883f3a92e9d33b51f0211bdc6b5982f3c5d0f1,2025-01-06T18:23:37.147000
|
||||||
CVE-2024-56667,0,0,1a9434d05c1117f8ebea126370a3323c87f5ea30d38cebd3e2ed4ea6d126e457,2025-01-06T18:21:07.280000
|
CVE-2024-56667,0,0,1a9434d05c1117f8ebea126370a3323c87f5ea30d38cebd3e2ed4ea6d126e457,2025-01-06T18:21:07.280000
|
||||||
@ -277411,8 +277412,8 @@ CVE-2024-5877,0,0,80c9d096970c353d960baff3613e5714705d2472757521ca853917c42670fd
|
|||||||
CVE-2024-5879,0,0,25d590c240497c40edd9974939e9cd1cb176442396e55f11847e771d41e50789,2024-09-03T14:59:58.410000
|
CVE-2024-5879,0,0,25d590c240497c40edd9974939e9cd1cb176442396e55f11847e771d41e50789,2024-09-03T14:59:58.410000
|
||||||
CVE-2024-5880,0,0,78f8c17ca2ad5fed28c3a337430fec0785ea8b668d98c2fb361597e109dcd3f6,2024-08-21T12:30:33.697000
|
CVE-2024-5880,0,0,78f8c17ca2ad5fed28c3a337430fec0785ea8b668d98c2fb361597e109dcd3f6,2024-08-21T12:30:33.697000
|
||||||
CVE-2024-5881,0,0,21d92582eca7d96a4d513ea191ceb6e9c724b7a61d96b6d9d17dd755a85dcf77,2024-11-21T09:48:30.933000
|
CVE-2024-5881,0,0,21d92582eca7d96a4d513ea191ceb6e9c724b7a61d96b6d9d17dd755a85dcf77,2024-11-21T09:48:30.933000
|
||||||
CVE-2024-5882,0,0,afebdbf01c550aa00278a944a09d50f0e8c6b9e6ad806563155bf7a7e70ec7f7,2024-11-21T09:48:31.037000
|
CVE-2024-5882,0,1,12cd8d0d55e5b010b75960654432736146f694e1e9e8fc73c990e8a578f764ef,2025-04-10T13:52:09.533000
|
||||||
CVE-2024-5883,0,0,f6a8f2c79bb16f467afdc91efaa0f848e6a8057a0d95700effca18332f89ea50,2024-11-21T09:48:31.193000
|
CVE-2024-5883,0,1,69f0561d60972340eadaaae8787f6f869d72dcc3dda31e3280647f6eaa98b3df,2025-04-10T13:50:08.880000
|
||||||
CVE-2024-5884,0,0,24e1fe9ab75bc45d011f2c93b35363e43ca5195883e3393db1f5efead25de5f5,2024-09-26T20:13:40.557000
|
CVE-2024-5884,0,0,24e1fe9ab75bc45d011f2c93b35363e43ca5195883e3393db1f5efead25de5f5,2024-09-26T20:13:40.557000
|
||||||
CVE-2024-5885,0,0,b65202b515cb4c17dcef9eccc68059bfcadafe010b595b3c7fd55558fc1eb55a,2024-11-21T09:48:31.420000
|
CVE-2024-5885,0,0,b65202b515cb4c17dcef9eccc68059bfcadafe010b595b3c7fd55558fc1eb55a,2024-11-21T09:48:31.420000
|
||||||
CVE-2024-5886,0,0,c6e7cb024adb68ffe24a326928e4d7c782b39c0023921bf84bad462101dad3b7,2024-06-20T11:15:56.580000
|
CVE-2024-5886,0,0,c6e7cb024adb68ffe24a326928e4d7c782b39c0023921bf84bad462101dad3b7,2024-06-20T11:15:56.580000
|
||||||
@ -278018,7 +278019,7 @@ CVE-2024-6525,0,0,f6480cd2a9a73dba65922bafbc051b6ad4232f151162c6be51b4b1969f84f3
|
|||||||
CVE-2024-6526,0,0,19076c3eb779d33994dd59c2f467231943c9a10aab5e1669ecf483d55e877999,2024-11-21T09:49:48.433000
|
CVE-2024-6526,0,0,19076c3eb779d33994dd59c2f467231943c9a10aab5e1669ecf483d55e877999,2024-11-21T09:49:48.433000
|
||||||
CVE-2024-6527,0,0,1c902d3e69979da0072c97f0f6158ef63ac37ab276d356162e4237f6cd7f29a5,2024-11-21T09:49:48.593000
|
CVE-2024-6527,0,0,1c902d3e69979da0072c97f0f6158ef63ac37ab276d356162e4237f6cd7f29a5,2024-11-21T09:49:48.593000
|
||||||
CVE-2024-6528,0,0,e9156787d27dd4fdfba6d50ea03aa667bd17ded1c421119f0c1fa761de458d59,2024-11-21T09:49:48.730000
|
CVE-2024-6528,0,0,e9156787d27dd4fdfba6d50ea03aa667bd17ded1c421119f0c1fa761de458d59,2024-11-21T09:49:48.730000
|
||||||
CVE-2024-6529,0,0,ca47469bb446983b0d1f578f4da76d5e6890d73d0a77d6b0ce3cc30a5eba0e25,2024-08-01T14:35:13.090000
|
CVE-2024-6529,0,1,ed46f22dca2f91d6161013b687689db7749496f0bca222bee710b6a195277196,2025-04-10T13:49:49.100000
|
||||||
CVE-2024-6530,0,0,16bc13dd377f9278a655d2630ff198bda3220080ee66519b965bf3c0166dea1f,2024-10-16T16:53:08.487000
|
CVE-2024-6530,0,0,16bc13dd377f9278a655d2630ff198bda3220080ee66519b965bf3c0166dea1f,2024-10-16T16:53:08.487000
|
||||||
CVE-2024-6531,0,0,2fd0c0efbc709df0507b8ea0d3736df13ed826fa4b367cc71e4cea13a705b371,2024-11-21T09:49:49.090000
|
CVE-2024-6531,0,0,2fd0c0efbc709df0507b8ea0d3736df13ed826fa4b367cc71e4cea13a705b371,2024-11-21T09:49:49.090000
|
||||||
CVE-2024-6532,0,0,2407b42018f3da2cafc970b52c1c77bde3fd6e6365e373370fa37b28b396b346,2024-08-14T13:00:37.107000
|
CVE-2024-6532,0,0,2407b42018f3da2cafc970b52c1c77bde3fd6e6365e373370fa37b28b396b346,2024-08-14T13:00:37.107000
|
||||||
@ -281326,7 +281327,7 @@ CVE-2025-0254,0,0,c0b515e46d918691acf880cf7e48dd1484bbbda9200e70d05e0bbba9fd762e
|
|||||||
CVE-2025-0255,0,0,90e000215482e5d86d475fb05ccdd376d187c17524748e399eb015064435daf9,2025-03-27T16:45:46.410000
|
CVE-2025-0255,0,0,90e000215482e5d86d475fb05ccdd376d187c17524748e399eb015064435daf9,2025-03-27T16:45:46.410000
|
||||||
CVE-2025-0256,0,0,8d93191b3f6273482cd2e738a4c8458f1bcb7229ea685df9d486553726ab45e7,2025-03-27T16:45:46.410000
|
CVE-2025-0256,0,0,8d93191b3f6273482cd2e738a4c8458f1bcb7229ea685df9d486553726ab45e7,2025-03-27T16:45:46.410000
|
||||||
CVE-2025-0257,0,0,62a391a6404b2693582345a22025e97f9549cc8217eb41e1be8ea264d19ce35c,2025-04-07T14:18:34.453000
|
CVE-2025-0257,0,0,62a391a6404b2693582345a22025e97f9549cc8217eb41e1be8ea264d19ce35c,2025-04-07T14:18:34.453000
|
||||||
CVE-2025-0272,0,0,23a271cc085270a1bd3f05eb51065fbaf8201bd02d665961f76e1f2828195193,2025-04-07T14:18:34.453000
|
CVE-2025-0272,0,1,36136e2b4130154f0f080b93b2e615fc734b50e7760f0c247ac9f10a9faf26cc,2025-04-10T13:27:02.210000
|
||||||
CVE-2025-0273,0,0,3150c7718d39b3b9c8949458a965540861c1e233ba5c78d9d601688f1cc14f07,2025-03-27T16:45:27.850000
|
CVE-2025-0273,0,0,3150c7718d39b3b9c8949458a965540861c1e233ba5c78d9d601688f1cc14f07,2025-03-27T16:45:27.850000
|
||||||
CVE-2025-0278,0,0,a39f4ef02ee7d6e87c2b8b8bd40297187f6857a15e9e0a61719090ae2ffadcc3,2025-04-07T14:18:34.453000
|
CVE-2025-0278,0,0,a39f4ef02ee7d6e87c2b8b8bd40297187f6857a15e9e0a61719090ae2ffadcc3,2025-04-07T14:18:34.453000
|
||||||
CVE-2025-0279,0,0,625c3dca6af48929b681d9a597d63d6a330455e7797f248dbc172a56deef7e52,2025-04-07T14:18:34.453000
|
CVE-2025-0279,0,0,625c3dca6af48929b681d9a597d63d6a330455e7797f248dbc172a56deef7e52,2025-04-07T14:18:34.453000
|
||||||
@ -281602,7 +281603,7 @@ CVE-2025-0617,0,0,f628b1ad73170d04122e24ddb3e888ab06e1591d9b8c499515e522c90868af
|
|||||||
CVE-2025-0619,0,0,d6798daeef3d7924598dddc8037e69d4ae3bc1784ffc6b426878fbbb52aa2ee9,2025-01-23T11:15:10.700000
|
CVE-2025-0619,0,0,d6798daeef3d7924598dddc8037e69d4ae3bc1784ffc6b426878fbbb52aa2ee9,2025-01-23T11:15:10.700000
|
||||||
CVE-2025-0622,0,0,e47fbbd3a3a716f89e6a5dc5e99d39a7414dccef8758c28db6b0464c5f5b2e87,2025-02-18T20:15:23.570000
|
CVE-2025-0622,0,0,e47fbbd3a3a716f89e6a5dc5e99d39a7414dccef8758c28db6b0464c5f5b2e87,2025-02-18T20:15:23.570000
|
||||||
CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000
|
CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000
|
||||||
CVE-2025-0624,0,0,498c3dd04f7c8817f159ff97f1fdf563db472658390d615fb66cd7173da94c40,2025-04-03T10:15:19.267000
|
CVE-2025-0624,0,1,7fd9fd8dbfed903b1450375656b461ac4e53cefdbf4d62e7cb935bdcfac7183a,2025-04-10T13:15:46.217000
|
||||||
CVE-2025-0625,0,0,328c89607f451b43b59c7441ff870515136d8dcd178527014c9e23beca2d6c94,2025-03-28T19:14:20.063000
|
CVE-2025-0625,0,0,328c89607f451b43b59c7441ff870515136d8dcd178527014c9e23beca2d6c94,2025-03-28T19:14:20.063000
|
||||||
CVE-2025-0626,0,0,16ee263c85f3aad6f9b7c5ed60390a064032d53adec3f9f8437b4c73151fb8c7,2025-03-01T18:15:34.140000
|
CVE-2025-0626,0,0,16ee263c85f3aad6f9b7c5ed60390a064032d53adec3f9f8437b4c73151fb8c7,2025-03-01T18:15:34.140000
|
||||||
CVE-2025-0628,0,0,570695b374c4ed87e2ed44b4722d7e35e02627e97784a5b85708accd345030c2,2025-03-20T10:15:53.407000
|
CVE-2025-0628,0,0,570695b374c4ed87e2ed44b4722d7e35e02627e97784a5b85708accd345030c2,2025-03-20T10:15:53.407000
|
||||||
@ -281854,8 +281855,8 @@ CVE-2025-0986,0,0,cf56af05caf6e1980300a02afd123c843ba27f74f88042c36ff0a4e635370b
|
|||||||
CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000
|
CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000
|
||||||
CVE-2025-0990,0,0,9b2eed3f7502ec84e40a9484b52b4383e088954c71b4d8a99cc5047d894e17c3,2025-03-05T09:15:09.947000
|
CVE-2025-0990,0,0,9b2eed3f7502ec84e40a9484b52b4383e088954c71b4d8a99cc5047d894e17c3,2025-03-05T09:15:09.947000
|
||||||
CVE-2025-0994,0,0,eda51bab1788ff49d0428b581e74a138c45a84d2ffb837b73d45b8cc098d090f,2025-02-12T19:29:30.383000
|
CVE-2025-0994,0,0,eda51bab1788ff49d0428b581e74a138c45a84d2ffb837b73d45b8cc098d090f,2025-02-12T19:29:30.383000
|
||||||
CVE-2025-0995,0,0,0a5529eb09e1f54f24a3e7e605d2f8400aae44234054dd248f74781d7e042133,2025-02-19T15:15:16.073000
|
CVE-2025-0995,0,1,dad0a056851feedc0b8d2b5cdb86ad535e29b96b9d8bdc2766b21c4918bc9e34,2025-04-10T13:35:11.360000
|
||||||
CVE-2025-0996,0,0,f5bee85fd326d78b72ed64a9f49b28f7be5f9f9202e5d7fbf61706dd2200814c,2025-02-19T15:15:16.243000
|
CVE-2025-0996,0,1,61dc4950816d8c0d04b00f936aa459046b15c240b3d37a7c085dc3d8cd03bb12,2025-04-10T13:35:47.997000
|
||||||
CVE-2025-0997,0,0,f250613d1f182ccf1575738db5199f92c19b7419ec251933ec6b859043eb1fc7,2025-04-07T19:08:04.843000
|
CVE-2025-0997,0,0,f250613d1f182ccf1575738db5199f92c19b7419ec251933ec6b859043eb1fc7,2025-04-07T19:08:04.843000
|
||||||
CVE-2025-0998,0,0,7bd42e251687d39d883712104c9eee494ec67b567b03623713d2e55ab05eccd4,2025-04-04T16:15:18.013000
|
CVE-2025-0998,0,0,7bd42e251687d39d883712104c9eee494ec67b567b03623713d2e55ab05eccd4,2025-04-04T16:15:18.013000
|
||||||
CVE-2025-0999,0,0,603984de7512da140496f2860c5b0cc73c510ea40c341ebb00613187787e0649,2025-04-07T19:07:22.060000
|
CVE-2025-0999,0,0,603984de7512da140496f2860c5b0cc73c510ea40c341ebb00613187787e0649,2025-04-07T19:07:22.060000
|
||||||
@ -281908,6 +281909,7 @@ CVE-2025-1068,0,0,2ec63f15e0051ea62e1e391e2e6691164dfdc2b2f1fb68a52a3489296ba3d7
|
|||||||
CVE-2025-1070,0,0,63c9f6366f7886d6af04d22c614f55b0f42e20f4e6634878d1102f0014dfbfa1,2025-02-13T06:15:22.463000
|
CVE-2025-1070,0,0,63c9f6366f7886d6af04d22c614f55b0f42e20f4e6634878d1102f0014dfbfa1,2025-02-13T06:15:22.463000
|
||||||
CVE-2025-1071,0,0,ec670b61a4cae3c6bd1b5d7c58db808e7643f8c91b0bf1aa44c5e336a078699f,2025-02-14T14:15:32.560000
|
CVE-2025-1071,0,0,ec670b61a4cae3c6bd1b5d7c58db808e7643f8c91b0bf1aa44c5e336a078699f,2025-02-14T14:15:32.560000
|
||||||
CVE-2025-1072,0,0,bb0514ae35802411e3da1596896cb302b1b469b7b79e6814634b3c15db99cbed,2025-02-07T04:15:07.737000
|
CVE-2025-1072,0,0,bb0514ae35802411e3da1596896cb302b1b469b7b79e6814634b3c15db99cbed,2025-02-07T04:15:07.737000
|
||||||
|
CVE-2025-1073,1,1,480fa6357c269258710c765773bfb1dc7526f485db3598904427ab7105d43cb4,2025-04-10T12:15:15.097000
|
||||||
CVE-2025-1074,0,0,7a1fefb554f7f8eb325ca636b33300876ea9a573e796b76dce3855e390b1b974,2025-02-06T14:15:30.050000
|
CVE-2025-1074,0,0,7a1fefb554f7f8eb325ca636b33300876ea9a573e796b76dce3855e390b1b974,2025-02-06T14:15:30.050000
|
||||||
CVE-2025-1075,0,0,797c9475355694050b39edcabe9ae24db6febfe58de9ae04f1e1ad1e92e5bacb,2025-02-19T10:15:09.043000
|
CVE-2025-1075,0,0,797c9475355694050b39edcabe9ae24db6febfe58de9ae04f1e1ad1e92e5bacb,2025-02-19T10:15:09.043000
|
||||||
CVE-2025-1076,0,0,0fb5ade089952c20fae90954aaa2f08206a3bcb696af25bbf4ec969a8662af5f,2025-02-06T14:15:30.287000
|
CVE-2025-1076,0,0,0fb5ade089952c20fae90954aaa2f08206a3bcb696af25bbf4ec969a8662af5f,2025-02-06T14:15:30.287000
|
||||||
@ -282324,6 +282326,7 @@ CVE-2025-1673,0,0,a769050644a46e7653413d9ced41c32af5a25e5678354b84138b22bca35ce1
|
|||||||
CVE-2025-1674,0,0,34cc117a61014ee7cc1857d2d4bba3c83148703711d2214f109e23548c0b079d,2025-02-28T01:42:14.500000
|
CVE-2025-1674,0,0,34cc117a61014ee7cc1857d2d4bba3c83148703711d2214f109e23548c0b079d,2025-02-28T01:42:14.500000
|
||||||
CVE-2025-1675,0,0,617f4918bd81cc8aa7e8e3b746af2c056a2e621972157d45d3d4942aca8956aa,2025-03-03T16:51:56.620000
|
CVE-2025-1675,0,0,617f4918bd81cc8aa7e8e3b746af2c056a2e621972157d45d3d4942aca8956aa,2025-03-03T16:51:56.620000
|
||||||
CVE-2025-1676,0,0,ffcca994630f7ace6a571d92659403689ac413c9afb10a75dc0095ea449331e9,2025-02-25T14:15:31.447000
|
CVE-2025-1676,0,0,ffcca994630f7ace6a571d92659403689ac413c9afb10a75dc0095ea449331e9,2025-02-25T14:15:31.447000
|
||||||
|
CVE-2025-1677,1,1,2b6bbd58fbfe100b085b7230281638eaa3955d886dc077f09a53b9b07830bd5c,2025-04-10T13:15:46.473000
|
||||||
CVE-2025-1681,0,0,3ee297593e4a5818266094c9d5282266af1bf843390e9752b5023996a22e1071,2025-02-28T00:15:35.950000
|
CVE-2025-1681,0,0,3ee297593e4a5818266094c9d5282266af1bf843390e9752b5023996a22e1071,2025-02-28T00:15:35.950000
|
||||||
CVE-2025-1682,0,0,cc794daa0dbacddc54b0e89e0bf9a4796b5672845d169d6dbf1869b7f592f754,2025-02-28T00:15:36.100000
|
CVE-2025-1682,0,0,cc794daa0dbacddc54b0e89e0bf9a4796b5672845d169d6dbf1869b7f592f754,2025-02-28T00:15:36.100000
|
||||||
CVE-2025-1683,0,0,bd65547481d5838793e5ad335f0bed73820ac4e81083a338100991ba4dbdb8f6,2025-03-13T10:15:19.687000
|
CVE-2025-1683,0,0,bd65547481d5838793e5ad335f0bed73820ac4e81083a338100991ba4dbdb8f6,2025-03-13T10:15:19.687000
|
||||||
@ -282432,7 +282435,7 @@ CVE-2025-1847,0,0,ec0e6a8320e426514c9188308ee4e761c20c9a2d723bf22132b181d1278bf0
|
|||||||
CVE-2025-1848,0,0,5ab5fd2d0b5fa78c5a97d7cfd5adf624e7bd356e62a20add19ac1bed4fd36c3c,2025-03-03T18:15:36.720000
|
CVE-2025-1848,0,0,5ab5fd2d0b5fa78c5a97d7cfd5adf624e7bd356e62a20add19ac1bed4fd36c3c,2025-03-03T18:15:36.720000
|
||||||
CVE-2025-1849,0,0,6cbdc0c1a27398724a4a1e8bdcd861e48e0b12f2e0ceb284ec86f592081f9271,2025-03-03T18:15:36.893000
|
CVE-2025-1849,0,0,6cbdc0c1a27398724a4a1e8bdcd861e48e0b12f2e0ceb284ec86f592081f9271,2025-03-03T18:15:36.893000
|
||||||
CVE-2025-1850,0,0,c5aabb4e7ad18759f40a74311fc84c935b8643d1545c186439667dee81bcaae2,2025-04-04T15:19:58.300000
|
CVE-2025-1850,0,0,c5aabb4e7ad18759f40a74311fc84c935b8643d1545c186439667dee81bcaae2,2025-04-04T15:19:58.300000
|
||||||
CVE-2025-1851,0,0,21bb6ce5ae51442f18eb0cd84c8788b0eb252ebb94f0d62e136bbc46266f0de7,2025-03-03T18:15:37.277000
|
CVE-2025-1851,0,1,7be3d3041fab974a6d12398e9222b3df858aaee0178f37633d3da29636c0ad37,2025-04-10T13:32:42.863000
|
||||||
CVE-2025-1852,0,0,2b16d071c2b09c94cb51f2257b9169c6423888f4e9a8d14aea7b98b089086c3a,2025-04-03T15:33:51.953000
|
CVE-2025-1852,0,0,2b16d071c2b09c94cb51f2257b9169c6423888f4e9a8d14aea7b98b089086c3a,2025-04-03T15:33:51.953000
|
||||||
CVE-2025-1853,0,0,45de6ca124be386cb9fc9357f37516f9bc597196fcf8094e317ca6b001165da8,2025-03-05T21:28:00.130000
|
CVE-2025-1853,0,0,45de6ca124be386cb9fc9357f37516f9bc597196fcf8094e317ca6b001165da8,2025-03-05T21:28:00.130000
|
||||||
CVE-2025-1854,0,0,3fa7ed33d66eec62bd1a346c1e199dbe216908f1cd4f380289da002758300100,2025-03-03T07:15:35.030000
|
CVE-2025-1854,0,0,3fa7ed33d66eec62bd1a346c1e199dbe216908f1cd4f380289da002758300100,2025-03-03T07:15:35.030000
|
||||||
@ -283303,10 +283306,10 @@ CVE-2025-21634,0,0,c8b95aca08c2b45c9dba95d6155aefb765f07edea9819768e8b59b392e1ea
|
|||||||
CVE-2025-21635,0,0,4cf3da6333d0e4084cbf1ebe82eeb13cfba8e51169f179976a5cbb111090b21f,2025-02-28T18:52:04.810000
|
CVE-2025-21635,0,0,4cf3da6333d0e4084cbf1ebe82eeb13cfba8e51169f179976a5cbb111090b21f,2025-02-28T18:52:04.810000
|
||||||
CVE-2025-21636,0,0,3ae85a8633d6e4c7c4afc5f451961d9da40e543a763d571ae649ce9785a31060,2025-02-27T22:01:45.773000
|
CVE-2025-21636,0,0,3ae85a8633d6e4c7c4afc5f451961d9da40e543a763d571ae649ce9785a31060,2025-02-27T22:01:45.773000
|
||||||
CVE-2025-21637,0,0,05925b5efa9f02ac6aa5ea9a870677d070a2594d067656530286fdfa84ac33a2,2025-02-27T22:01:21.430000
|
CVE-2025-21637,0,0,05925b5efa9f02ac6aa5ea9a870677d070a2594d067656530286fdfa84ac33a2,2025-02-27T22:01:21.430000
|
||||||
CVE-2025-21638,0,0,2cf12756103fa057c758685520e5d32673cabca9788320ddb76ebc6dafda2566,2025-02-27T22:01:34.240000
|
CVE-2025-21638,0,1,9d86aa994135a768747d281875630b356945096fcb469d4f7c25e444b5635f12,2025-04-10T13:15:46.747000
|
||||||
CVE-2025-21639,0,0,6951f75342622895a60945bf95682a2b99fe500b47ade5ffb8d5307929bbefd5,2025-02-27T22:01:10.337000
|
CVE-2025-21639,0,0,6951f75342622895a60945bf95682a2b99fe500b47ade5ffb8d5307929bbefd5,2025-02-27T22:01:10.337000
|
||||||
CVE-2025-2164,0,0,d129d9f55d497cb5ee956a685ad5a71b65aaa7cdf73250ad0c7ad1c2f1b56f93,2025-03-28T16:07:07.700000
|
CVE-2025-2164,0,0,d129d9f55d497cb5ee956a685ad5a71b65aaa7cdf73250ad0c7ad1c2f1b56f93,2025-03-28T16:07:07.700000
|
||||||
CVE-2025-21640,0,0,543f40a49c92fa803e05fd285cd1c9581d6fecdba4ff3a54d984f97f6ee95e4a,2025-02-27T22:01:01.257000
|
CVE-2025-21640,0,1,953f71ba357e60ac226bad23a14e2ffa823449a710acdd82904145531c90bad0,2025-04-10T13:15:46.927000
|
||||||
CVE-2025-21641,0,0,e146fe147f4fa7c09deeed8b7b710dae78c5022fd48636d72f67d9a8f95f9998,2025-02-27T15:15:08.843000
|
CVE-2025-21641,0,0,e146fe147f4fa7c09deeed8b7b710dae78c5022fd48636d72f67d9a8f95f9998,2025-02-27T15:15:08.843000
|
||||||
CVE-2025-21642,0,0,db386d9b7ed30d3f5c13d931cfd57fded14502dce954776abee9b860bf0b293e,2025-02-28T18:54:58.420000
|
CVE-2025-21642,0,0,db386d9b7ed30d3f5c13d931cfd57fded14502dce954776abee9b860bf0b293e,2025-02-28T18:54:58.420000
|
||||||
CVE-2025-21643,0,0,cabaf0da35f1a3435ec7869964661b97a8bf2d764f2f1be480a70dfedc80edc2,2025-01-19T11:15:09.870000
|
CVE-2025-21643,0,0,cabaf0da35f1a3435ec7869964661b97a8bf2d764f2f1be480a70dfedc80edc2,2025-01-19T11:15:09.870000
|
||||||
@ -283454,7 +283457,7 @@ CVE-2025-21775,0,0,a3e6accf8a13f1c0dc8faeee5da155ed90ff8a998ef86e3c699c286fd93eb
|
|||||||
CVE-2025-21776,0,0,b551fdcc84038793f88508aea01daceb7b07a8bca390c5c31b6373a5cebfaf88,2025-03-13T13:15:54.157000
|
CVE-2025-21776,0,0,b551fdcc84038793f88508aea01daceb7b07a8bca390c5c31b6373a5cebfaf88,2025-03-13T13:15:54.157000
|
||||||
CVE-2025-21777,0,0,7b78680346abf8713ba33d8ac2e09aa65789813ca4da1d487df84ad030b784f2,2025-02-27T03:15:18.377000
|
CVE-2025-21777,0,0,7b78680346abf8713ba33d8ac2e09aa65789813ca4da1d487df84ad030b784f2,2025-02-27T03:15:18.377000
|
||||||
CVE-2025-21778,0,0,0c802a465cafec7b0cf75bd3642bc281bc51b491d7eaffcb0778a0688d330462,2025-02-27T03:15:18.533000
|
CVE-2025-21778,0,0,0c802a465cafec7b0cf75bd3642bc281bc51b491d7eaffcb0778a0688d330462,2025-02-27T03:15:18.533000
|
||||||
CVE-2025-21779,0,0,30a977641ed306e00b1cffacc789f3ca010c4671feb3c8cc318ae1dbdf403a35,2025-03-13T13:15:54.290000
|
CVE-2025-21779,0,1,c0338c9da9cdbbe996ebb3f4a4c98ef74717beb271bf0d37e258e536b6501eb2,2025-04-10T13:15:47.123000
|
||||||
CVE-2025-21780,0,0,01f0434a3d257b8ba9515a26126762d812e0204abab33ef12dae6fc660254fd6,2025-03-05T18:46:37.527000
|
CVE-2025-21780,0,0,01f0434a3d257b8ba9515a26126762d812e0204abab33ef12dae6fc660254fd6,2025-03-05T18:46:37.527000
|
||||||
CVE-2025-21781,0,0,a06889eaf8443274f189b81f6ebfd0500246541870dc146b227773bbea061b5c,2025-03-13T13:15:54.427000
|
CVE-2025-21781,0,0,a06889eaf8443274f189b81f6ebfd0500246541870dc146b227773bbea061b5c,2025-03-13T13:15:54.427000
|
||||||
CVE-2025-21782,0,0,e0238cc0199ff7923b4d03a2573d1238b28faae69b93a5bfd79f77b3817b2eb3,2025-03-13T13:15:54.550000
|
CVE-2025-21782,0,0,e0238cc0199ff7923b4d03a2573d1238b28faae69b93a5bfd79f77b3817b2eb3,2025-03-13T13:15:54.550000
|
||||||
@ -283623,7 +283626,7 @@ CVE-2025-21938,0,0,80d07c88b53688ec96ee15d798b6b40def2206c228ea9a90ddb2eed49fe24
|
|||||||
CVE-2025-21939,0,0,a787a16fdbfa658370f13a489dbbff6f008ee32954c421885701e640121c746b,2025-04-01T20:26:01.990000
|
CVE-2025-21939,0,0,a787a16fdbfa658370f13a489dbbff6f008ee32954c421885701e640121c746b,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-2194,0,0,3fdb717b1bc330f1d470bef99df31cb06c8ddc496778912df85edf14f5ac3b49,2025-04-09T20:46:03.463000
|
CVE-2025-2194,0,0,3fdb717b1bc330f1d470bef99df31cb06c8ddc496778912df85edf14f5ac3b49,2025-04-09T20:46:03.463000
|
||||||
CVE-2025-21940,0,0,a5ed3b073b59bf54842a5e01cf185f802b8d87deeca9ead0edcc9f04d14f4435,2025-04-01T20:26:01.990000
|
CVE-2025-21940,0,0,a5ed3b073b59bf54842a5e01cf185f802b8d87deeca9ead0edcc9f04d14f4435,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-21941,0,0,a5a3fd325d5ea41466358fb97eb527aeffbcb909864bf683e7600bdb07ea8650,2025-04-01T20:26:01.990000
|
CVE-2025-21941,0,1,555bf15feb7dab3b6681c726ec097cc97b89b4d474a43c9c422a62c172bca542,2025-04-10T13:15:47.297000
|
||||||
CVE-2025-21942,0,0,349a2a434b71a6775457f2fe25f968468bbbe7edcf978d4717310c6f5742fede,2025-04-01T20:26:01.990000
|
CVE-2025-21942,0,0,349a2a434b71a6775457f2fe25f968468bbbe7edcf978d4717310c6f5742fede,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-21943,0,0,8e84c2a39a7410c215634fe98f5bb1431a2b5d3a84c0e6a872ee9f7a5d63fd73,2025-04-01T20:26:01.990000
|
CVE-2025-21943,0,0,8e84c2a39a7410c215634fe98f5bb1431a2b5d3a84c0e6a872ee9f7a5d63fd73,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-21944,0,0,330601e4a6f25dfe681cd754bfb47e5d6a193264e47845a475179f3ff9267f23,2025-04-01T20:26:01.990000
|
CVE-2025-21944,0,0,330601e4a6f25dfe681cd754bfb47e5d6a193264e47845a475179f3ff9267f23,2025-04-01T20:26:01.990000
|
||||||
@ -283639,70 +283642,70 @@ CVE-2025-21952,0,0,3539418067a9eb47905c6a725aa1c4cf337f9ab2151a716be076ad0ece485
|
|||||||
CVE-2025-21953,0,0,f9d96ca8222dc73d65f00bdbc4774528561e71267eae572d97f93a964f4f693c,2025-04-01T20:26:01.990000
|
CVE-2025-21953,0,0,f9d96ca8222dc73d65f00bdbc4774528561e71267eae572d97f93a964f4f693c,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-21954,0,0,6157820ebf2ef0bae5efccb0d3cbe882c266edd1111db3a78fa24a8edbe9ffbe,2025-04-01T20:26:01.990000
|
CVE-2025-21954,0,0,6157820ebf2ef0bae5efccb0d3cbe882c266edd1111db3a78fa24a8edbe9ffbe,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-21955,0,0,94bbe6ce28ea752a2dcef8b94e13df7fcface3c096a02e5a66b9f0e050fc7c4d,2025-04-01T20:26:01.990000
|
CVE-2025-21955,0,0,94bbe6ce28ea752a2dcef8b94e13df7fcface3c096a02e5a66b9f0e050fc7c4d,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-21956,0,0,3a3ba59bd054f127a646944dc64d5f0c948f5f2b95a27da2809d5dcc7815ca29,2025-04-01T20:26:01.990000
|
CVE-2025-21956,0,1,4a8984510eb112b1f831009e6931bd3dda5a155c9ec28311bbb8cc79350dd185,2025-04-10T13:15:47.440000
|
||||||
CVE-2025-21957,0,0,009330a6bceda57b40e54381ce2c9a46a3b647b1c4e380b0a51696e0e52910ba,2025-04-01T20:26:01.990000
|
CVE-2025-21957,0,1,4fb08a384d68bd800f8449a84dc6bc77a12651f3dbd297ac51b1fcee80d30c8d,2025-04-10T13:15:47.577000
|
||||||
CVE-2025-21958,0,0,bb332d2c65fb62395d4a6a1470bdfb59200d05d98aa0097eb1832f7ac11306c8,2025-04-01T20:26:01.990000
|
CVE-2025-21958,0,0,bb332d2c65fb62395d4a6a1470bdfb59200d05d98aa0097eb1832f7ac11306c8,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-21959,0,0,e4335ca84d4f0908491088a0371eca4bf728a9bf400720ea4aab251b07406901,2025-04-01T20:26:01.990000
|
CVE-2025-21959,0,1,c1a027ba45f4c865aad7e919c98e728a14de7871e684e1165d615bbb2f3b17ea,2025-04-10T13:15:47.717000
|
||||||
CVE-2025-2196,0,1,74397881653af38c2f17ff3ea9a4961f6591ef6907c5859d1077d95e19f6679f,2025-04-10T10:53:23.660000
|
CVE-2025-2196,0,0,74397881653af38c2f17ff3ea9a4961f6591ef6907c5859d1077d95e19f6679f,2025-04-10T10:53:23.660000
|
||||||
CVE-2025-21960,0,0,deefcf69ed458179f3443ceaf1f7a13e8ad6c7428510fe7449fde80547547f6c,2025-04-01T20:26:01.990000
|
CVE-2025-21960,0,0,deefcf69ed458179f3443ceaf1f7a13e8ad6c7428510fe7449fde80547547f6c,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-21961,0,0,08d35fb06287d1ce6f0793f2b539daf4e1b7125cfa39134cd2d4ac956f254f23,2025-04-01T20:26:01.990000
|
CVE-2025-21961,0,0,08d35fb06287d1ce6f0793f2b539daf4e1b7125cfa39134cd2d4ac956f254f23,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-21962,0,0,31b8959c404e495e57ffebfc27eab946759064551f1a0031b8d508713834db6d,2025-04-01T20:26:01.990000
|
CVE-2025-21962,0,1,e1439aec39e66ff23aa6755f528208f67db8deaeb399e400eda5a087486ea719,2025-04-10T13:15:47.857000
|
||||||
CVE-2025-21963,0,0,017bf9188f032113dc93c9e98e6a3e6a77826f936b1e39bde647f10f043fe4e0,2025-04-01T20:26:01.990000
|
CVE-2025-21963,0,1,57a26a39938094a374fd29a2faa07f4ce7af572308884954c965b1a1d0e34451,2025-04-10T13:15:47.980000
|
||||||
CVE-2025-21964,0,0,8cb79705526fd804fe7e30fca56ab7c2aef9456d8b0cb5a0b53a406ff0cb601c,2025-04-01T20:26:01.990000
|
CVE-2025-21964,0,1,1c9615f107a06e1393a03618a66344bf1f949e217847d92673a3f28bfaab2b7a,2025-04-10T13:15:48.097000
|
||||||
CVE-2025-21965,0,0,eabf1c9694ffab817b7b209e6b04ddf30e4240614d21b4272eca11f622330a04,2025-04-01T20:26:01.990000
|
CVE-2025-21965,0,0,eabf1c9694ffab817b7b209e6b04ddf30e4240614d21b4272eca11f622330a04,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-21966,0,0,959df35733bcc8f9896148954a5380423ba1dacb9707e4827b0642a0e6ff4498,2025-04-01T20:26:01.990000
|
CVE-2025-21966,0,0,959df35733bcc8f9896148954a5380423ba1dacb9707e4827b0642a0e6ff4498,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-21967,0,0,5b2d318e39931102a9797730efbf4938cc2d0ca33323422cadcaa62a5ec89980,2025-04-01T20:26:01.990000
|
CVE-2025-21967,0,0,5b2d318e39931102a9797730efbf4938cc2d0ca33323422cadcaa62a5ec89980,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-21968,0,0,1584937740d70c1435024b006ed8132c6a7a2cf9ea99b7fb513b25e0530bf229,2025-04-01T20:26:01.990000
|
CVE-2025-21968,0,1,567d954a11efd2f8b070060afdf576450ed491d7a4f5fad07eec57e50b1fb766,2025-04-10T13:15:48.210000
|
||||||
CVE-2025-21969,0,0,33d9acd579432a4be1bf96f6e04ef982cf048ceb11706d15d31d4bb5c0092880,2025-04-01T20:26:01.990000
|
CVE-2025-21969,0,0,33d9acd579432a4be1bf96f6e04ef982cf048ceb11706d15d31d4bb5c0092880,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-21970,0,0,728d9a7863d6e1d9089b619e8338c0199bdc049fd98d782e6dc0dcce2ecd057b,2025-04-01T20:26:01.990000
|
CVE-2025-21970,0,1,ba7445dc61bccd37c0f7ca1a141461c1c02ebd565257c235441700d71cfad345,2025-04-10T13:15:48.327000
|
||||||
CVE-2025-21971,0,0,e0001a7030fcc4789f76612c6e174314fa7891bfae77fb84878dd35dd591f004,2025-04-01T20:26:01.990000
|
CVE-2025-21971,0,1,b9d234e567e462d15ed318b3bf4dc7551c45c9f6c61850ac7f7a28311b584baf,2025-04-10T13:15:48.453000
|
||||||
CVE-2025-21972,0,0,aadee25ba27bbefcb750b4416d7e86bd4cd8a8e375154227f8660bc60f1521cb,2025-04-01T20:26:01.990000
|
CVE-2025-21972,0,0,aadee25ba27bbefcb750b4416d7e86bd4cd8a8e375154227f8660bc60f1521cb,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-21973,0,0,68cd8d4feed32b30f36da235adc524f78160f7e336f5e042493f8bb8318631dd,2025-04-01T20:26:01.990000
|
CVE-2025-21973,0,0,68cd8d4feed32b30f36da235adc524f78160f7e336f5e042493f8bb8318631dd,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-21974,0,0,2c7ff97e9a5d39a305fd3ff61bed7371427903de1151ab3fc323f2d8e887809d,2025-04-01T20:26:01.990000
|
CVE-2025-21974,0,0,2c7ff97e9a5d39a305fd3ff61bed7371427903de1151ab3fc323f2d8e887809d,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-21975,0,0,6696e69b380fdeb0f95f8798628e6cf8de35a2799254753580e733e49d964cda,2025-04-01T20:26:01.990000
|
CVE-2025-21975,0,1,d8705123227ae80536c9a24928bc70b1fe5bed745ad1dc2a429e1c756a090724,2025-04-10T13:15:48.573000
|
||||||
CVE-2025-21976,0,0,4941ad863aa3198fd7fada061f8668895e63748c2d5e55237b30372ca7146866,2025-04-01T20:26:01.990000
|
CVE-2025-21976,0,0,4941ad863aa3198fd7fada061f8668895e63748c2d5e55237b30372ca7146866,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-21977,0,0,f91bf235f4cca74d524b98373c6c9eef911841e5d265a74f3307666dbcc13d66,2025-04-01T20:26:01.990000
|
CVE-2025-21977,0,0,f91bf235f4cca74d524b98373c6c9eef911841e5d265a74f3307666dbcc13d66,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-21978,0,0,c017c875b6d5debfb5fe65bd022dbefeb7183095407442c8640d9394d9c7b54f,2025-04-01T20:26:01.990000
|
CVE-2025-21978,0,0,c017c875b6d5debfb5fe65bd022dbefeb7183095407442c8640d9394d9c7b54f,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-21979,0,0,77de5b5a61f14dbc79a206f8e2676a45850cf09a8a4a2daccc8cf777b04311f8,2025-04-01T20:26:01.990000
|
CVE-2025-21979,0,1,d82cd2d0f5c320c8e76f28a33969e6c3a1a898db839234291d6e1c0f5c28d988,2025-04-10T13:25:50.870000
|
||||||
CVE-2025-2198,0,0,f4e4d1c774196cd95c8a84e5b73cf7bc3b77b51ced927b7f810f100bb8c512c6,2025-03-20T23:15:12.520000
|
CVE-2025-2198,0,0,f4e4d1c774196cd95c8a84e5b73cf7bc3b77b51ced927b7f810f100bb8c512c6,2025-03-20T23:15:12.520000
|
||||||
CVE-2025-21980,0,0,97f40034ec8adb1b03461aff15ffe5b7bd36fc24b48e093b496769d6faf83735,2025-04-01T20:26:01.990000
|
CVE-2025-21980,0,1,ca3a23fe5612f79d1db215d56912aa585e47d27ebb0fcdf9127bdaa53db612ba,2025-04-10T13:25:42.490000
|
||||||
CVE-2025-21981,0,0,207c8c6d7d8dd879cc674056b98f061294e52ebb03df0c3edc75e4512f9b8fdb,2025-04-01T20:26:01.990000
|
CVE-2025-21981,0,1,56cf7520d86490869f5449abbe30bb11f8dbb71b85d42b392133a285522dc26f,2025-04-10T13:25:35.970000
|
||||||
CVE-2025-21982,0,0,2a65cabb734820f26d65bf7f80af0842938a0671c7d2e353994a00c9c40e3ae7,2025-04-01T20:26:01.990000
|
CVE-2025-21982,0,1,c7384c1191fa97112f9c98b3a394c1935d6aecfdd8da49bf04580e705393600d,2025-04-10T13:25:23.140000
|
||||||
CVE-2025-21983,0,0,c5b65bbeb7f0ac57718e0fb77aaa5b43a1c6911111f940b0290d414a7af83c27,2025-04-01T20:26:01.990000
|
CVE-2025-21983,0,0,c5b65bbeb7f0ac57718e0fb77aaa5b43a1c6911111f940b0290d414a7af83c27,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-21984,0,0,af6734935c96723cccaa805fa7caae73832dd79384dec719bda0519a1130aaf1,2025-04-01T20:26:01.990000
|
CVE-2025-21984,0,1,0c582767f8e0808eaeddbb9bddc83b93eb9f25072d3cc940f4578109471f8778,2025-04-10T13:25:15.120000
|
||||||
CVE-2025-21985,0,0,280ec0d6f7baa6e0d8ae7a6e5d0f668c0199c4f77ce90ac583ca778e8966c114,2025-04-01T20:26:01.990000
|
CVE-2025-21985,0,0,280ec0d6f7baa6e0d8ae7a6e5d0f668c0199c4f77ce90ac583ca778e8966c114,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-21986,0,0,fb287982c4b7a869a7bc98ba0c625cbaa01e8337a3b47a086619e81f4fe4fa1a,2025-04-01T20:26:01.990000
|
CVE-2025-21986,0,0,fb287982c4b7a869a7bc98ba0c625cbaa01e8337a3b47a086619e81f4fe4fa1a,2025-04-01T20:26:01.990000
|
||||||
CVE-2025-21987,0,0,aa90643ad5e8c3d9497e088fec5ef4f2255cf9e4d776e894a3aee4abf4fdf4dc,2025-04-02T14:58:07.527000
|
CVE-2025-21987,0,0,aa90643ad5e8c3d9497e088fec5ef4f2255cf9e4d776e894a3aee4abf4fdf4dc,2025-04-02T14:58:07.527000
|
||||||
CVE-2025-21988,0,0,5b07386bd61dacc7caa284694350b61fd7f7a7af482dca8f5fd89ec747f667e6,2025-04-02T14:58:07.527000
|
CVE-2025-21988,0,0,5b07386bd61dacc7caa284694350b61fd7f7a7af482dca8f5fd89ec747f667e6,2025-04-02T14:58:07.527000
|
||||||
CVE-2025-21989,0,0,b7afe7f2c983cb0d2198d1d40a35442828956e8d010bb06f3023244e5a0ddbd9,2025-04-02T14:58:07.527000
|
CVE-2025-21989,0,1,154e034c6e299a2a9b3600f5e682a41ee35277312b832c388d52baa36fe5f262,2025-04-10T13:25:07.567000
|
||||||
CVE-2025-2199,0,0,6cca999d1fd02ccdc948cc3c785871dcf520469b36ed9558917218ebe5cdd745,2025-03-17T10:15:16.243000
|
CVE-2025-2199,0,0,6cca999d1fd02ccdc948cc3c785871dcf520469b36ed9558917218ebe5cdd745,2025-03-17T10:15:16.243000
|
||||||
CVE-2025-21990,0,0,6e7d730f2b398f8af7e09d4eddca6db3c14ac024bf5d762d691509a97c138fed,2025-04-02T14:58:07.527000
|
CVE-2025-21990,0,1,c6f830c7a6f95cb12721fb767d6ec640320b1f9276d5551b2ede2366ad6d31f3,2025-04-10T13:25:01.577000
|
||||||
CVE-2025-21991,0,0,02a1ee3c0b5ed31d617a64306e4a4e4a44fbfb21931824943dfde432016a3319,2025-04-02T14:58:07.527000
|
CVE-2025-21991,0,1,63b49f43cf2133ca43a412e23175e72c099a14957aef6c2061b912b62304895c,2025-04-10T13:24:35.230000
|
||||||
CVE-2025-21992,0,0,f394de4b7b4e1dc06b3dc04122e673c48edf00a1776cc7b23ce99fbd1e97e4c6,2025-04-02T14:58:07.527000
|
CVE-2025-21992,0,1,15562f59303a19ec99d0304ad06949423b421a45c8bc31ef39284adf4b1d9575,2025-04-10T13:15:49.053000
|
||||||
CVE-2025-21993,0,0,66c2148a71e83b9b62847cb22c2c78dd4860fbbad85f37a981afcca17e78c13f,2025-04-02T14:58:07.527000
|
CVE-2025-21993,0,1,c7d7a240f7e952f7bb94c66a07e027bda01efc77ec36981187d03cb58fdf6d20,2025-04-10T13:24:10.787000
|
||||||
CVE-2025-21994,0,0,28d149d17b3dcc629354afa3c0b3e205cf97d7f575b2cfe4fea3449fae8a2fd2,2025-04-02T14:58:07.527000
|
CVE-2025-21994,0,1,fb9048208441dce66026c77200fbc30f31fbf21a4c08fe3e825028547f121380,2025-04-10T13:15:49.333000
|
||||||
CVE-2025-21995,0,0,39cd5a3684b1268074ce5543ed4e1145926df1a1efe6a4230d26e4ca94fe5d6d,2025-04-07T14:18:34.453000
|
CVE-2025-21995,0,0,39cd5a3684b1268074ce5543ed4e1145926df1a1efe6a4230d26e4ca94fe5d6d,2025-04-07T14:18:34.453000
|
||||||
CVE-2025-21996,0,0,87f534beee0d8dd0fa3dadba16f120da9abd9632919fbc7de7ab0cf56a50fdde,2025-04-07T14:18:34.453000
|
CVE-2025-21996,0,1,588f0fd0b54d9addc949f3c824af6a9ae5f47eb17c59b79156a90266569b6ab7,2025-04-10T13:15:49.453000
|
||||||
CVE-2025-21997,0,0,eee4a513ef8e5dfb7b07fdbef713dcabb27c25039ea5704a9aaa15bda20acf31,2025-04-07T14:18:34.453000
|
CVE-2025-21997,0,0,eee4a513ef8e5dfb7b07fdbef713dcabb27c25039ea5704a9aaa15bda20acf31,2025-04-07T14:18:34.453000
|
||||||
CVE-2025-21998,0,0,159795d3cd482f4893b30d42942b4b57a39974cf5007492bbf74917b5664adf3,2025-04-07T14:18:34.453000
|
CVE-2025-21998,0,0,159795d3cd482f4893b30d42942b4b57a39974cf5007492bbf74917b5664adf3,2025-04-07T14:18:34.453000
|
||||||
CVE-2025-21999,0,0,eb3945e0a8581d3f11d329c04183989c747e3c4252a55283c2078b023f017786,2025-04-08T15:49:48.200000
|
CVE-2025-21999,0,1,6fcd1eb7455ff16437852a0724a81ccfe881c35e5e1b791d3216d65a7ece8d19,2025-04-10T13:15:49.693000
|
||||||
CVE-2025-2200,0,0,21deda7203fc92111d87559693dc915b258e0e0cc7d6dd852915de5a18e9eb3e,2025-03-18T16:15:28.347000
|
CVE-2025-2200,0,0,21deda7203fc92111d87559693dc915b258e0e0cc7d6dd852915de5a18e9eb3e,2025-03-18T16:15:28.347000
|
||||||
CVE-2025-22000,0,0,3f2ee99f8e22de85bca39cb4e485228ea9cc9ee4417028533c7dc6982b1cde5a,2025-04-07T14:18:34.453000
|
CVE-2025-22000,0,0,3f2ee99f8e22de85bca39cb4e485228ea9cc9ee4417028533c7dc6982b1cde5a,2025-04-07T14:18:34.453000
|
||||||
CVE-2025-22001,0,0,cbc3bb1c89f6487fbe056c082bd296ca39d25ba5532d66090467e74cd62e6335,2025-04-07T14:18:34.453000
|
CVE-2025-22001,0,0,cbc3bb1c89f6487fbe056c082bd296ca39d25ba5532d66090467e74cd62e6335,2025-04-07T14:18:34.453000
|
||||||
CVE-2025-22002,0,0,c319a343d94f6b1787154174a9e452b0184e5505963c349d50abf5cf4a1d5d24,2025-04-07T14:18:34.453000
|
CVE-2025-22002,0,0,c319a343d94f6b1787154174a9e452b0184e5505963c349d50abf5cf4a1d5d24,2025-04-07T14:18:34.453000
|
||||||
CVE-2025-22003,0,0,1e3ec526103cc2ecaeca5a0d8aa1ee3f71ef85fae629633a5c2e4d1d2941233f,2025-04-07T14:18:34.453000
|
CVE-2025-22003,0,0,1e3ec526103cc2ecaeca5a0d8aa1ee3f71ef85fae629633a5c2e4d1d2941233f,2025-04-07T14:18:34.453000
|
||||||
CVE-2025-22004,0,0,ec7d83042ff612f0c21b4758b3cd2e0f14c38a7a425cc15b58893f0b86b05f1a,2025-04-08T15:48:27.060000
|
CVE-2025-22004,0,1,db13fec2a01410c78bea8ecc95c052479e55452fee80a7f7ef15af13236ddfa4,2025-04-10T13:15:49.917000
|
||||||
CVE-2025-22005,0,0,4cd51e496a9f3454848e95f5f6a05c13a69bece8dea5c169e93cded54562bc5f,2025-04-07T14:18:34.453000
|
CVE-2025-22005,0,1,cbba06e1618ebbbf3c91887c854cea713235220bff1567c0f92219efe5ce73fd,2025-04-10T13:15:50.153000
|
||||||
CVE-2025-22006,0,0,3ae2f25725b261486943b919fae821476183fa3ab460047898f00af25ca11479,2025-04-07T14:18:34.453000
|
CVE-2025-22006,0,0,3ae2f25725b261486943b919fae821476183fa3ab460047898f00af25ca11479,2025-04-07T14:18:34.453000
|
||||||
CVE-2025-22007,0,0,3d5542812aeb3ea12efdc811fa913b4e1456a9295a5ddae09e69426d5bbac28c,2025-04-07T14:18:34.453000
|
CVE-2025-22007,0,1,3525b0da626694906ad9620e5fc8d537c3c6b35d5483e1e24772a26274abb661,2025-04-10T13:31:23.433000
|
||||||
CVE-2025-22008,0,0,f1861e066c7602d0fb6be4b0e3e4ab42df21d9c93bd3421e979d394ceaee60b0,2025-04-08T18:13:53.347000
|
CVE-2025-22008,0,1,449f5eef7dd2bb75a7e41bddd73a59d3b022e061262f9ca3223183621379a233,2025-04-10T13:15:50.570000
|
||||||
CVE-2025-22009,0,0,39876f5b10aaf24703bef4be97ee51d2a32b27c9d6bcd2271e62edc553dfa3a8,2025-04-08T18:13:53.347000
|
CVE-2025-22009,0,1,40e41200cab42c2b65efecfdae5d6e49b4b0deef0dfc3aa15b9532a333b1d348,2025-04-10T13:10:51.817000
|
||||||
CVE-2025-2201,0,0,2371e9549039387486019592f5bf6cd7cee4f08ab86a19044d07c960855c7b24,2025-03-17T10:15:16.543000
|
CVE-2025-2201,0,0,2371e9549039387486019592f5bf6cd7cee4f08ab86a19044d07c960855c7b24,2025-03-17T10:15:16.543000
|
||||||
CVE-2025-22010,0,0,f88acf652cb3d6da73b75657d813960324ce38f35b32abd1ebc70acccdb79268,2025-04-08T18:13:53.347000
|
CVE-2025-22010,0,1,bdac999142019e0464835ba2c58bc0993611c3b3716f57cce8448da038080674,2025-04-10T13:15:50.687000
|
||||||
CVE-2025-22011,0,0,efb46b9ea4b0237914ab8f947027203e9afbc34d005fee733a6bb917923e3820,2025-04-08T18:13:53.347000
|
CVE-2025-22011,0,1,d6f0b86ea4fcae9c437f3df761e6c6f1254719a130d7c775b001ee5d7ce8ebed,2025-04-10T13:10:41.140000
|
||||||
CVE-2025-22012,0,0,058b088ed350d800349354071fee4357ddaf82fd018990d6314f0a294c2cc0eb,2025-04-08T18:13:53.347000
|
CVE-2025-22012,0,1,2a1ef2918aee65275f9f773f0505976a03f119761b851bcaee2754c36f3fb91c,2025-04-10T13:10:36.613000
|
||||||
CVE-2025-22013,0,0,e1d841daf76fcef71b69c4e5a22ad4f97350e5378a8b689ae54366b50174eeff,2025-04-08T18:13:53.347000
|
CVE-2025-22013,0,0,e1d841daf76fcef71b69c4e5a22ad4f97350e5378a8b689ae54366b50174eeff,2025-04-08T18:13:53.347000
|
||||||
CVE-2025-22014,0,0,bc9b8387298f375e0da958063c23e6de2378a06711d407a941fe1cd939452f5e,2025-04-08T18:13:53.347000
|
CVE-2025-22014,0,1,d0677bce9b40bf2440f1e3f05d26248d0f1a8e04e3af5766ae8663607da1e5dd,2025-04-10T13:15:50.823000
|
||||||
CVE-2025-22015,0,0,76ef40b09e4f1cb899d4a2ab31f22c4f6d8c6e60d75140b0b3e5777f401c7fbf,2025-04-08T18:13:53.347000
|
CVE-2025-22015,0,0,76ef40b09e4f1cb899d4a2ab31f22c4f6d8c6e60d75140b0b3e5777f401c7fbf,2025-04-08T18:13:53.347000
|
||||||
CVE-2025-22016,0,0,147b90da5e7863ebd9aa554a0d14ec0b4cb2770bdef3a66630422d63719c334c,2025-04-08T18:13:53.347000
|
CVE-2025-22016,0,0,147b90da5e7863ebd9aa554a0d14ec0b4cb2770bdef3a66630422d63719c334c,2025-04-08T18:13:53.347000
|
||||||
CVE-2025-22017,0,0,47242ca22d32729ade7b3f671002250e206d140a0d8f74e89394f4529c76da51,2025-04-08T18:13:53.347000
|
CVE-2025-22017,0,0,47242ca22d32729ade7b3f671002250e206d140a0d8f74e89394f4529c76da51,2025-04-08T18:13:53.347000
|
||||||
@ -283886,8 +283889,8 @@ CVE-2025-22368,0,0,15868b6e5746df64ac40f74359090d3c138a5fc4277e3491f8b4d3153bda9
|
|||||||
CVE-2025-22369,0,0,914da155da04583b64bbcd7efb69cdb65cf9b4fa1a7a93f57111b5e36bed452e,2025-03-11T14:15:24.767000
|
CVE-2025-22369,0,0,914da155da04583b64bbcd7efb69cdb65cf9b4fa1a7a93f57111b5e36bed452e,2025-03-11T14:15:24.767000
|
||||||
CVE-2025-2237,0,0,5abe8aae0fc2ed4e21d30009a4a645b5354722e78a6daf854fe7aa80a45532a0,2025-04-01T20:26:11.547000
|
CVE-2025-2237,0,0,5abe8aae0fc2ed4e21d30009a4a645b5354722e78a6daf854fe7aa80a45532a0,2025-04-01T20:26:11.547000
|
||||||
CVE-2025-22370,0,0,e3b9834ee83fce05ff2df07009571f711e0033889d2c52add2c8f53db29092f5,2025-03-11T14:15:24.917000
|
CVE-2025-22370,0,0,e3b9834ee83fce05ff2df07009571f711e0033889d2c52add2c8f53db29092f5,2025-03-11T14:15:24.917000
|
||||||
CVE-2025-22374,1,1,efbab832033d0e85fbde5079a94f646b16422ad949be0fab3d024c1b5d5af261,2025-04-10T11:15:44.587000
|
CVE-2025-22374,0,0,efbab832033d0e85fbde5079a94f646b16422ad949be0fab3d024c1b5d5af261,2025-04-10T11:15:44.587000
|
||||||
CVE-2025-22375,1,1,17ce67db472c2d64f8e0a7353752a413b26b2cad61e3ef283b1cfaeb01def9de,2025-04-10T11:15:45.510000
|
CVE-2025-22375,0,0,17ce67db472c2d64f8e0a7353752a413b26b2cad61e3ef283b1cfaeb01def9de,2025-04-10T11:15:45.510000
|
||||||
CVE-2025-22376,0,0,0b599d4fbe0b053f67328db02ad6a56c3b1af5acbc775b8d4fa33614fa96b0bf,2025-01-21T18:15:15.473000
|
CVE-2025-22376,0,0,0b599d4fbe0b053f67328db02ad6a56c3b1af5acbc775b8d4fa33614fa96b0bf,2025-01-21T18:15:15.473000
|
||||||
CVE-2025-22383,0,0,971c2012aab2f3f792cbdd2c68df4004dd1217088db2d92a7bb003d39ddd9443,2025-01-06T15:15:16.103000
|
CVE-2025-22383,0,0,971c2012aab2f3f792cbdd2c68df4004dd1217088db2d92a7bb003d39ddd9443,2025-01-06T15:15:16.103000
|
||||||
CVE-2025-22384,0,0,cce93b0fc1a45d09b2ac82e610ea925820e4793a4749701feb605ea07db42a77,2025-01-06T17:15:47.820000
|
CVE-2025-22384,0,0,cce93b0fc1a45d09b2ac82e610ea925820e4793a4749701feb605ea07db42a77,2025-01-06T17:15:47.820000
|
||||||
@ -284517,7 +284520,7 @@ CVE-2025-23382,0,0,607dd91845211bbafd299e41a03d19f4efc365f4aee35f49c34ca976065bd
|
|||||||
CVE-2025-23383,0,0,05837481956a127d4906ec34da8ec9db5e9ce66a3b24e855c1d9d4962621e69f,2025-03-28T18:11:40.180000
|
CVE-2025-23383,0,0,05837481956a127d4906ec34da8ec9db5e9ce66a3b24e855c1d9d4962621e69f,2025-03-28T18:11:40.180000
|
||||||
CVE-2025-23384,0,0,d7685224b7a10743fe5eae6a1ebefcafcac773ad88bd00cac8b6407ed3adf454,2025-03-11T10:15:16.330000
|
CVE-2025-23384,0,0,d7685224b7a10743fe5eae6a1ebefcafcac773ad88bd00cac8b6407ed3adf454,2025-03-11T10:15:16.330000
|
||||||
CVE-2025-23385,0,0,44f68c3210fdb2f588e2b733b3276d4f924d74ac5df4660c1e28e1d2bd89eca2,2025-01-28T16:15:41.377000
|
CVE-2025-23385,0,0,44f68c3210fdb2f588e2b733b3276d4f924d74ac5df4660c1e28e1d2bd89eca2,2025-01-28T16:15:41.377000
|
||||||
CVE-2025-23386,1,1,2e997653b431df4a288a080e620d0de8d54c51e4c0be4278d3e5e3f46ab45492,2025-04-10T10:15:14.697000
|
CVE-2025-23386,0,0,2e997653b431df4a288a080e620d0de8d54c51e4c0be4278d3e5e3f46ab45492,2025-04-10T10:15:14.697000
|
||||||
CVE-2025-2339,0,0,fb243958e2daa877ca1a322ef09207ff301ba4f92634dddb833183fd13861e60,2025-03-17T15:15:45.253000
|
CVE-2025-2339,0,0,fb243958e2daa877ca1a322ef09207ff301ba4f92634dddb833183fd13861e60,2025-03-17T15:15:45.253000
|
||||||
CVE-2025-23396,0,0,db4e35f65814d6895af1ea2102cd85328d5b692a5d5376b0f0f76fda3c3d1fa0,2025-03-11T10:15:16.670000
|
CVE-2025-23396,0,0,db4e35f65814d6895af1ea2102cd85328d5b692a5d5376b0f0f76fda3c3d1fa0,2025-03-11T10:15:16.670000
|
||||||
CVE-2025-23397,0,0,b39331b70d2d90745cf1ffdc79eae13a67bdd2a5914d5254d36092c6bef82b6d,2025-03-11T10:15:16.840000
|
CVE-2025-23397,0,0,b39331b70d2d90745cf1ffdc79eae13a67bdd2a5914d5254d36092c6bef82b6d,2025-03-11T10:15:16.840000
|
||||||
@ -285203,6 +285206,7 @@ CVE-2025-24076,0,0,5f6e02a1a3c83b4dfc5002327031bc10d5e45c77892b582ec81598e32b3df
|
|||||||
CVE-2025-24077,0,0,2a13c5b7197d53f42fa25d514f59fcecca291e66c5abfd6d7e0aa9d7adb7e383,2025-03-11T17:16:30.657000
|
CVE-2025-24077,0,0,2a13c5b7197d53f42fa25d514f59fcecca291e66c5abfd6d7e0aa9d7adb7e383,2025-03-11T17:16:30.657000
|
||||||
CVE-2025-24078,0,0,f86c01bad613458e358ed275a6cf12339ea1819bf15cc23dd81aa87da5b465da,2025-03-11T17:16:30.863000
|
CVE-2025-24078,0,0,f86c01bad613458e358ed275a6cf12339ea1819bf15cc23dd81aa87da5b465da,2025-03-11T17:16:30.863000
|
||||||
CVE-2025-24079,0,0,355e13da896e08010e4cb220d212dd80142b1ba2bd9fe202d6daec3e0edb1bdf,2025-03-11T17:16:31.100000
|
CVE-2025-24079,0,0,355e13da896e08010e4cb220d212dd80142b1ba2bd9fe202d6daec3e0edb1bdf,2025-03-11T17:16:31.100000
|
||||||
|
CVE-2025-2408,1,1,a7a980e54b984203c1d60f4de1e855e08adbc3cb39d1d7f65a9aad0715e447f6,2025-04-10T13:15:51.760000
|
||||||
CVE-2025-24080,0,0,1ef3f4ecbe359efc92dc8beafd20dbed23890d2418a2d17387260c9e0871d082,2025-03-11T17:16:31.323000
|
CVE-2025-24080,0,0,1ef3f4ecbe359efc92dc8beafd20dbed23890d2418a2d17387260c9e0871d082,2025-03-11T17:16:31.323000
|
||||||
CVE-2025-24081,0,0,d8b8605bf5b2bb395fcf32de829b06d46aca047556de4026f94bdf2196d18cd4,2025-03-11T17:16:32.533000
|
CVE-2025-24081,0,0,d8b8605bf5b2bb395fcf32de829b06d46aca047556de4026f94bdf2196d18cd4,2025-03-11T17:16:32.533000
|
||||||
CVE-2025-24082,0,0,4fe96689ea1ca456e34bbc986aff0006e237547e0e207187774380b9c7d05d9d,2025-03-11T17:16:33.087000
|
CVE-2025-24082,0,0,4fe96689ea1ca456e34bbc986aff0006e237547e0e207187774380b9c7d05d9d,2025-03-11T17:16:33.087000
|
||||||
@ -286014,6 +286018,7 @@ CVE-2025-25193,0,0,613e1ea926b6fdda40afee3d113741ca12354927f3daa951434c4e6e69010
|
|||||||
CVE-2025-25194,0,0,278bc98c8a0ffe0e8a7e96acea34ed9bc50825c485f6cab1eaf41889a2da8034,2025-02-10T23:15:16.067000
|
CVE-2025-25194,0,0,278bc98c8a0ffe0e8a7e96acea34ed9bc50825c485f6cab1eaf41889a2da8034,2025-02-10T23:15:16.067000
|
||||||
CVE-2025-25195,0,0,6422ab465e1e4500e1fe77efd7e4b259d61944cface94edb31eac51bdeddd22d,2025-02-13T22:15:13.100000
|
CVE-2025-25195,0,0,6422ab465e1e4500e1fe77efd7e4b259d61944cface94edb31eac51bdeddd22d,2025-02-13T22:15:13.100000
|
||||||
CVE-2025-25196,0,0,5196aba0be3d543377128b43ddee4b3fe123287a21ab5155a82a956ba8a5209f,2025-02-19T21:15:15.577000
|
CVE-2025-25196,0,0,5196aba0be3d543377128b43ddee4b3fe123287a21ab5155a82a956ba8a5209f,2025-02-19T21:15:15.577000
|
||||||
|
CVE-2025-25197,1,1,9da87a54ea6ffde7c9d443056e3031e6167aebb5556c2d7e6926e4b6c2b68ac1,2025-04-10T13:15:51.017000
|
||||||
CVE-2025-25198,0,0,dba1938f205829e248418b009d8da17ce793befa8842802d286cefa151f40ef8,2025-02-12T18:15:27.757000
|
CVE-2025-25198,0,0,dba1938f205829e248418b009d8da17ce793befa8842802d286cefa151f40ef8,2025-02-12T18:15:27.757000
|
||||||
CVE-2025-25199,0,0,cef47ad8035ccc7763ac731a7bbc3b7e25e483ba8b3abe7752d565785afdd38f,2025-02-12T18:15:27.933000
|
CVE-2025-25199,0,0,cef47ad8035ccc7763ac731a7bbc3b7e25e483ba8b3abe7752d565785afdd38f,2025-02-12T18:15:27.933000
|
||||||
CVE-2025-25200,0,0,c0cb0fce70dbf3c916b9237ccd8132fc95e67d71a22f8450c0a6447fbdfe329c,2025-02-12T18:15:28.110000
|
CVE-2025-25200,0,0,c0cb0fce70dbf3c916b9237ccd8132fc95e67d71a22f8450c0a6447fbdfe329c,2025-02-12T18:15:28.110000
|
||||||
@ -286141,10 +286146,10 @@ CVE-2025-2549,0,0,81bc1419bc2ca032b7d3a3129fa4aec6b83ee02f25c21613bfc61816baf003
|
|||||||
CVE-2025-25497,0,0,342cc8c3073c7b4fb963ce6919474125872366956f79f35d55abc4517740c1dc,2025-03-07T20:15:38.013000
|
CVE-2025-25497,0,0,342cc8c3073c7b4fb963ce6919474125872366956f79f35d55abc4517740c1dc,2025-03-07T20:15:38.013000
|
||||||
CVE-2025-2550,0,0,4a61e93674e502a8c0bed02381936602716218efa1f9f7373841b1b6041298c4,2025-03-20T17:15:38.903000
|
CVE-2025-2550,0,0,4a61e93674e502a8c0bed02381936602716218efa1f9f7373841b1b6041298c4,2025-03-20T17:15:38.903000
|
||||||
CVE-2025-25500,0,0,95e8030caa1744993dcffd587771b6fc47c54882af19cac8227239517d6e0133,2025-03-21T17:15:39.243000
|
CVE-2025-25500,0,0,95e8030caa1744993dcffd587771b6fc47c54882af19cac8227239517d6e0133,2025-03-21T17:15:39.243000
|
||||||
CVE-2025-25505,0,0,11c4c75af440f82d715defaf6782907c0744a464a1a91c9d9aeef14ada87484d,2025-02-21T21:15:23.723000
|
CVE-2025-25505,0,1,e9c1c4e7fd17d69fb175176fd0aebef11f3e6fa5ba62e87e57c2aa8b17ea4735,2025-04-10T13:37:15.333000
|
||||||
CVE-2025-25507,0,0,aaa8b5a00bc14c6200ce4ada5e546d091bf3632fba77c66b3ac71c873b2a184e,2025-02-21T21:15:23.870000
|
CVE-2025-25507,0,1,99fcc628e72eaef3ab2758be4c7c5d9b6fb666ee1ec31a8fdfbf52e5a6e3d4f3,2025-04-10T13:37:05.443000
|
||||||
CVE-2025-2551,0,0,70be67e63aae83c04048736ff89759931da9700ea07f97a5f0016d4208b5a4fc,2025-03-20T17:15:39.090000
|
CVE-2025-2551,0,0,70be67e63aae83c04048736ff89759931da9700ea07f97a5f0016d4208b5a4fc,2025-03-20T17:15:39.090000
|
||||||
CVE-2025-25510,0,0,80b49d96f8cfea96d2e40e1145bf347e93013db39579b2b941514912fbfd558e,2025-02-21T21:15:24.023000
|
CVE-2025-25510,0,1,1977ea1f74ae151f68e2cd5d5c817544df43313e743c312ceaf6b9963fd719e6,2025-04-10T13:36:28.503000
|
||||||
CVE-2025-25513,0,0,8162e2be684a72798c0754d951e189663ee35bc02f8b0275a49b748fc819db60,2025-03-14T17:15:51.350000
|
CVE-2025-25513,0,0,8162e2be684a72798c0754d951e189663ee35bc02f8b0275a49b748fc819db60,2025-03-14T17:15:51.350000
|
||||||
CVE-2025-25514,0,0,ce9f2216655696e40479cab3ce833f2e565b44df3540e5448dfb69cae33e2cc2,2025-03-28T17:02:40.640000
|
CVE-2025-25514,0,0,ce9f2216655696e40479cab3ce833f2e565b44df3540e5448dfb69cae33e2cc2,2025-03-28T17:02:40.640000
|
||||||
CVE-2025-25515,0,0,00cd90884849ea5ae232a994a6e17b920afed76812b1fbdebc6641ebc5b70ef0,2025-03-28T17:02:36.703000
|
CVE-2025-25515,0,0,00cd90884849ea5ae232a994a6e17b920afed76812b1fbdebc6641ebc5b70ef0,2025-03-28T17:02:36.703000
|
||||||
@ -286209,9 +286214,9 @@ CVE-2025-25667,0,0,d0a445cc31a702833da7b419bfb916db019325d0a01c653b1aff0acf6f057
|
|||||||
CVE-2025-25668,0,0,3a390720dec3e2d486dc54a6361f2f35ae4d39f099b715395f225090d62ea40f,2025-03-17T16:59:59.693000
|
CVE-2025-25668,0,0,3a390720dec3e2d486dc54a6361f2f35ae4d39f099b715395f225090d62ea40f,2025-03-17T16:59:59.693000
|
||||||
CVE-2025-25674,0,0,8ce40ba3c5a2d332ca848bf332b28ce5e1ea817c4e5b7751e0bf1c1f0eeb7a9f,2025-03-17T14:23:02.403000
|
CVE-2025-25674,0,0,8ce40ba3c5a2d332ca848bf332b28ce5e1ea817c4e5b7751e0bf1c1f0eeb7a9f,2025-03-17T14:23:02.403000
|
||||||
CVE-2025-25675,0,0,c72dca8ea86886a3af81f324f3cf1b0ae0870a19e6aae0e2e014084eb2e1c680,2025-03-17T14:26:22.483000
|
CVE-2025-25675,0,0,c72dca8ea86886a3af81f324f3cf1b0ae0870a19e6aae0e2e014084eb2e1c680,2025-03-17T14:26:22.483000
|
||||||
CVE-2025-25676,0,0,daf85732e597f1793e01b57a88af2ab73ae5e7b139e5e84dbb4cacf83744c130,2025-02-21T18:16:04.577000
|
CVE-2025-25676,0,1,2caeac199d92898771cb61a1f50bc4e997a82341fb0b8426f50c92948f273cc4,2025-04-10T13:37:42.663000
|
||||||
CVE-2025-25678,0,0,64aaf58170ee4d79f4247ea2c0b96da46219dfaa04983aca5741969381b237f2,2025-02-21T18:16:08.493000
|
CVE-2025-25678,0,1,85648d779984c5744ca9f1df5048118dd1e49b98a4ab2d697b06bfdee7ecda30,2025-04-10T13:37:33.913000
|
||||||
CVE-2025-25679,0,0,3cebd49dfacc441892528658235bae2847665b7e89bb57bdaf15bcd2a8d49f09,2025-02-24T18:15:19.213000
|
CVE-2025-25679,0,1,e5998fa821177dc2d0587e60d5b4d9ad2f548fdc771316a73f33198e8c181ee0,2025-04-10T13:37:24.763000
|
||||||
CVE-2025-2568,0,0,022c86ea4873b7192b1f44a6eb946050d85be07ef6e58bb492571e06c8bb2724,2025-04-08T18:13:53.347000
|
CVE-2025-2568,0,0,022c86ea4873b7192b1f44a6eb946050d85be07ef6e58bb492571e06c8bb2724,2025-04-08T18:13:53.347000
|
||||||
CVE-2025-25680,0,0,8919bd2c5780d2fa1291e3679750e4e12f0c9d491f8dd8781fc99e5d4e2ec16e,2025-03-21T21:15:36.390000
|
CVE-2025-25680,0,0,8919bd2c5780d2fa1291e3679750e4e12f0c9d491f8dd8781fc99e5d4e2ec16e,2025-03-21T21:15:36.390000
|
||||||
CVE-2025-25683,0,0,3255bc8ab1d20b4d3f7b9e4f7d5ecc3209c23b4404d764181c9a91c6bf864bb3,2025-03-12T19:15:39.490000
|
CVE-2025-25683,0,0,3255bc8ab1d20b4d3f7b9e4f7d5ecc3209c23b4404d764181c9a91c6bf864bb3,2025-03-12T19:15:39.490000
|
||||||
@ -287086,7 +287091,7 @@ CVE-2025-27347,0,0,3fdbce57cbd7cf9b851b9749f5fd4da47fb732dc78c83a918bad725aaa5a9
|
|||||||
CVE-2025-27348,0,0,3686c4d4f42e07032d88980aee28e858de101bf7a08266196762e9d8b82190d3,2025-02-24T15:15:20.230000
|
CVE-2025-27348,0,0,3686c4d4f42e07032d88980aee28e858de101bf7a08266196762e9d8b82190d3,2025-02-24T15:15:20.230000
|
||||||
CVE-2025-27349,0,0,e565e2e7ab823e8ce368b7ce159ee5c9e5e2d4b6fffbb00c33c3f2c793cedd78,2025-02-24T15:15:20.363000
|
CVE-2025-27349,0,0,e565e2e7ab823e8ce368b7ce159ee5c9e5e2d4b6fffbb00c33c3f2c793cedd78,2025-02-24T15:15:20.363000
|
||||||
CVE-2025-2735,0,0,18a277d50971a1778478f133aa8e2a2c8b054fff12a17d2f69fa62d8b49ad997,2025-03-27T16:45:46.410000
|
CVE-2025-2735,0,0,18a277d50971a1778478f133aa8e2a2c8b054fff12a17d2f69fa62d8b49ad997,2025-03-27T16:45:46.410000
|
||||||
CVE-2025-27350,1,1,e09ed599c58975692f8848fc4a5e296e42393973756e0f917451bec3022c87a3,2025-04-10T11:15:45.660000
|
CVE-2025-27350,0,0,e09ed599c58975692f8848fc4a5e296e42393973756e0f917451bec3022c87a3,2025-04-10T11:15:45.660000
|
||||||
CVE-2025-27351,0,0,9657ca223cec84786da24feeeaeda53aea8b5d50584170f4a11add562ce066bc,2025-02-24T15:15:20.503000
|
CVE-2025-27351,0,0,9657ca223cec84786da24feeeaeda53aea8b5d50584170f4a11add562ce066bc,2025-02-24T15:15:20.503000
|
||||||
CVE-2025-27352,0,0,9ab0d9fa36fc0dcad2f4106dc12e198c4472bb7fe0be465b550fb73236bf2fbf,2025-02-24T15:15:20.643000
|
CVE-2025-27352,0,0,9ab0d9fa36fc0dcad2f4106dc12e198c4472bb7fe0be465b550fb73236bf2fbf,2025-02-24T15:15:20.643000
|
||||||
CVE-2025-27353,0,0,24ac6ebce3848378b1344a6468f91efd03d707d9d99a1f55a994a6db165def0e,2025-02-24T15:15:20.780000
|
CVE-2025-27353,0,0,24ac6ebce3848378b1344a6468f91efd03d707d9d99a1f55a994a6db165def0e,2025-02-24T15:15:20.780000
|
||||||
@ -287380,6 +287385,8 @@ CVE-2025-2780,0,0,8ce61193bdd5d01c360c9dde19d31cb5df8ec0c3ce67c7effda6feb1168c24
|
|||||||
CVE-2025-27809,0,0,acf17088263ac0454f3c19e9b5b69eee2adc10f0e02e48930b8a575ccd37ca6c,2025-03-27T16:45:46.410000
|
CVE-2025-27809,0,0,acf17088263ac0454f3c19e9b5b69eee2adc10f0e02e48930b8a575ccd37ca6c,2025-03-27T16:45:46.410000
|
||||||
CVE-2025-2781,0,0,f71242cf9553514cc2ec12a96aa1195882b54360169109a0233e1040d7956dda,2025-04-01T20:26:30.593000
|
CVE-2025-2781,0,0,f71242cf9553514cc2ec12a96aa1195882b54360169109a0233e1040d7956dda,2025-04-01T20:26:30.593000
|
||||||
CVE-2025-27810,0,0,d1482541c832943462d5d5141f3260f826675da05c4de1d17a8d8000d1e76d18,2025-03-27T16:45:46.410000
|
CVE-2025-27810,0,0,d1482541c832943462d5d5141f3260f826675da05c4de1d17a8d8000d1e76d18,2025-03-27T16:45:46.410000
|
||||||
|
CVE-2025-27812,1,1,16fa60b0b651a1b1ffbb1b9ece13f09baa56c4961f7aebbfee2c91b65cf30fed,2025-04-10T13:15:51.220000
|
||||||
|
CVE-2025-27813,1,1,d8132789391dea873ba6a9c236c1025ad83b8f5f8bce5954bb932cf4ea9e0231,2025-04-10T13:15:51.577000
|
||||||
CVE-2025-27816,0,0,9ab27d50becb6f1925043133c65bc558001d86f2d9081231a272e11d17cb2516,2025-03-07T20:15:38.900000
|
CVE-2025-27816,0,0,9ab27d50becb6f1925043133c65bc558001d86f2d9081231a272e11d17cb2516,2025-03-07T20:15:38.900000
|
||||||
CVE-2025-2782,0,0,f7b2edc498b938674db351470dcc82477b82d7a96a3f89a710e19cd683cf7f7a,2025-04-01T20:26:30.593000
|
CVE-2025-2782,0,0,f7b2edc498b938674db351470dcc82477b82d7a96a3f89a710e19cd683cf7f7a,2025-04-01T20:26:30.593000
|
||||||
CVE-2025-27822,0,0,8db44093401926706a840ce0e19328855573d2443e1e01b57e17b296b11ec387,2025-03-07T22:15:37.927000
|
CVE-2025-27822,0,0,8db44093401926706a840ce0e19328855573d2443e1e01b57e17b296b11ec387,2025-03-07T22:15:37.927000
|
||||||
@ -287920,6 +287927,7 @@ CVE-2025-30141,0,0,4828215ddc551f721f9119cc66fd0b6301157a9edecaa8b1bbaf43bada37f
|
|||||||
CVE-2025-30142,0,0,e6345e1b8b1602cf6baee1bb466c15695f398722ed692cc5b3b87414578f99b0,2025-03-25T16:15:27.130000
|
CVE-2025-30142,0,0,e6345e1b8b1602cf6baee1bb466c15695f398722ed692cc5b3b87414578f99b0,2025-03-25T16:15:27.130000
|
||||||
CVE-2025-30143,0,0,c72031c589e36c3d2604bcb120ba9a6dd94ff4f6eee14259c749d5630ebbfba8,2025-03-17T16:15:28.643000
|
CVE-2025-30143,0,0,c72031c589e36c3d2604bcb120ba9a6dd94ff4f6eee14259c749d5630ebbfba8,2025-03-17T16:15:28.643000
|
||||||
CVE-2025-30144,0,0,15bf5f8218ba2223682697484bbc86f902d5a148eb49e6248d7c2412b7737d74,2025-03-19T16:15:33.080000
|
CVE-2025-30144,0,0,15bf5f8218ba2223682697484bbc86f902d5a148eb49e6248d7c2412b7737d74,2025-03-19T16:15:33.080000
|
||||||
|
CVE-2025-30148,1,1,176a5bd42789860cf1c54522cbe3b2d0d209c874ee2902ce19ea7d27b17efbac,2025-04-10T13:15:51.930000
|
||||||
CVE-2025-30149,0,0,9d45b14f7ce1c383888c38736f5cf3ea63c5e434e58881699105d1fe3c5316e1,2025-04-01T20:26:22.890000
|
CVE-2025-30149,0,0,9d45b14f7ce1c383888c38736f5cf3ea63c5e434e58881699105d1fe3c5316e1,2025-04-01T20:26:22.890000
|
||||||
CVE-2025-3015,0,0,099717fc51ac180e71d1a26e8b38cd7df3f75ab75884b374ba09343d9b7ef833,2025-04-01T20:26:22.890000
|
CVE-2025-3015,0,0,099717fc51ac180e71d1a26e8b38cd7df3f75ab75884b374ba09343d9b7ef833,2025-04-01T20:26:22.890000
|
||||||
CVE-2025-30150,0,0,78c0a67cc85c67ebae2202ed81d36fba73d24dbd816d4eab529fd509b9c71b6c,2025-04-08T18:13:53.347000
|
CVE-2025-30150,0,0,78c0a67cc85c67ebae2202ed81d36fba73d24dbd816d4eab529fd509b9c71b6c,2025-04-08T18:13:53.347000
|
||||||
@ -287946,7 +287954,7 @@ CVE-2025-30195,0,0,8f3f1b1a07ca04bd893228f3549f8ce9aa13eb155049bf09e210b92648e3a
|
|||||||
CVE-2025-30196,0,0,fe87e1ebefbcfeb53c0f502cc8d045248065acd7de3485e4d3812fc7fa420ce6,2025-03-19T19:15:50.980000
|
CVE-2025-30196,0,0,fe87e1ebefbcfeb53c0f502cc8d045248065acd7de3485e4d3812fc7fa420ce6,2025-03-19T19:15:50.980000
|
||||||
CVE-2025-30197,0,0,2d4109cd57eb04a1dbf5d412cbfee8b568c6ea58cd4671c7483e548e96f39bba,2025-03-21T14:15:17.837000
|
CVE-2025-30197,0,0,2d4109cd57eb04a1dbf5d412cbfee8b568c6ea58cd4671c7483e548e96f39bba,2025-03-21T14:15:17.837000
|
||||||
CVE-2025-30203,0,0,e800abc36567cdb1aba654be30422b80d90780ac94d6ea5cf2b8a4bf6a4b6384,2025-04-01T20:26:22.890000
|
CVE-2025-30203,0,0,e800abc36567cdb1aba654be30422b80d90780ac94d6ea5cf2b8a4bf6a4b6384,2025-04-01T20:26:22.890000
|
||||||
CVE-2025-30204,0,0,7bd4031e29493ef25dd2042a5f778e7f2ac78e134a5c8efc8e92df9ba66c9513,2025-04-04T23:15:42.443000
|
CVE-2025-30204,0,1,a62a2febc5dc48c687f751c501a508130f5fcc004bb8b764581a0a0be25b0f0a,2025-04-10T13:15:52.097000
|
||||||
CVE-2025-30205,0,0,5a6e6a15e27f16257c15600ed612a889ee89ec4cb07cdade70362275ccba48b8,2025-03-27T16:45:46.410000
|
CVE-2025-30205,0,0,5a6e6a15e27f16257c15600ed612a889ee89ec4cb07cdade70362275ccba48b8,2025-03-27T16:45:46.410000
|
||||||
CVE-2025-30208,0,0,8d10db1183f79516c18383e3ab326bcd260d9a2a6e5e9bbda5d21358e669589c,2025-03-27T16:45:46.410000
|
CVE-2025-30208,0,0,8d10db1183f79516c18383e3ab326bcd260d9a2a6e5e9bbda5d21358e669589c,2025-03-27T16:45:46.410000
|
||||||
CVE-2025-30209,0,0,ca85555ac6409e2cc639554bb6f23475b46a539ab4ead27cd69c29cc29e86660,2025-04-01T20:26:22.890000
|
CVE-2025-30209,0,0,ca85555ac6409e2cc639554bb6f23475b46a539ab4ead27cd69c29cc29e86660,2025-04-01T20:26:22.890000
|
||||||
@ -288599,7 +288607,7 @@ CVE-2025-31408,0,0,4bce0889fff07e9d2af0109421fe58b7234ee5ebf9fa6560ab95ff15e16d9
|
|||||||
CVE-2025-31409,0,0,82dbb111649d8cf9e26a4c460fca8cf167c66dfbe7749d633be5ad71c1f22147,2025-04-01T20:26:11.547000
|
CVE-2025-31409,0,0,82dbb111649d8cf9e26a4c460fca8cf167c66dfbe7749d633be5ad71c1f22147,2025-04-01T20:26:11.547000
|
||||||
CVE-2025-3141,0,0,8360183ec4fba0da13c3410bb9d4443e65e196b85f2b1133d2249c2215248c03,2025-04-09T20:08:13.613000
|
CVE-2025-3141,0,0,8360183ec4fba0da13c3410bb9d4443e65e196b85f2b1133d2249c2215248c03,2025-04-09T20:08:13.613000
|
||||||
CVE-2025-31410,0,0,d2744125929669a0550251c0ca1a9221dc78cee85634e7974f1b02dfdfbfe3ca,2025-04-01T20:26:30.593000
|
CVE-2025-31410,0,0,d2744125929669a0550251c0ca1a9221dc78cee85634e7974f1b02dfdfbfe3ca,2025-04-01T20:26:30.593000
|
||||||
CVE-2025-31411,1,1,73a3d23ce4fe495cefb3d2af3ca3ac953465d4665e10225fbabd6a5ada831e80,2025-04-10T11:15:45.830000
|
CVE-2025-31411,0,0,73a3d23ce4fe495cefb3d2af3ca3ac953465d4665e10225fbabd6a5ada831e80,2025-04-10T11:15:45.830000
|
||||||
CVE-2025-31412,0,0,f2a3a75101b5fbb687e484fbb151373c9b65c031636af9fa6343c10e46f352fd,2025-04-01T20:26:30.593000
|
CVE-2025-31412,0,0,f2a3a75101b5fbb687e484fbb151373c9b65c031636af9fa6343c10e46f352fd,2025-04-01T20:26:30.593000
|
||||||
CVE-2025-31414,0,0,c7c8b152028249fcda3808d41ed059a882fd165da9cc6176d922213c7f3b4129,2025-04-01T20:26:30.593000
|
CVE-2025-31414,0,0,c7c8b152028249fcda3808d41ed059a882fd165da9cc6176d922213c7f3b4129,2025-04-01T20:26:30.593000
|
||||||
CVE-2025-31415,0,0,414e63d224a09cd075a83b960b86b86bc2238dd067741c725e74f347156214de,2025-04-01T20:26:11.547000
|
CVE-2025-31415,0,0,414e63d224a09cd075a83b960b86b86bc2238dd067741c725e74f347156214de,2025-04-01T20:26:11.547000
|
||||||
@ -289397,6 +289405,8 @@ CVE-2025-32693,0,0,8b4c3ca6e5f78d8e905f61115dad2c0f8bfcead7073e277a4dfe0246c8f18
|
|||||||
CVE-2025-32694,0,0,c5323b32f99e8c9fc8ccc9989da14785a02c4cec59717fdc95787034e559d1d1,2025-04-09T20:02:41.860000
|
CVE-2025-32694,0,0,c5323b32f99e8c9fc8ccc9989da14785a02c4cec59717fdc95787034e559d1d1,2025-04-09T20:02:41.860000
|
||||||
CVE-2025-32695,0,0,d37a7a3802052ba2b179b04e772474f69fbfbf6cedd0f20f3383706ffa54c144,2025-04-09T20:02:41.860000
|
CVE-2025-32695,0,0,d37a7a3802052ba2b179b04e772474f69fbfbf6cedd0f20f3383706ffa54c144,2025-04-09T20:02:41.860000
|
||||||
CVE-2025-32728,0,0,9923765068f28ee8d641fe9ebffdc724554e8390950f0688a8c20af34af4f682,2025-04-10T02:15:30.873000
|
CVE-2025-32728,0,0,9923765068f28ee8d641fe9ebffdc724554e8390950f0688a8c20af34af4f682,2025-04-10T02:15:30.873000
|
||||||
|
CVE-2025-32754,1,1,7293d82a535d6ac43092b29832df966e066de807c3840e239e9cd8213c00e842,2025-04-10T12:15:16.280000
|
||||||
|
CVE-2025-32755,1,1,0b97214606920637fa044142c84f00c908d62692058452699e85b59deeb66426,2025-04-10T12:15:16.547000
|
||||||
CVE-2025-3285,0,0,e28a4e88da7ffb77ad01de08bcfd2b4a71d41180820a080f587b6350c35f9e48,2025-04-08T18:13:53.347000
|
CVE-2025-3285,0,0,e28a4e88da7ffb77ad01de08bcfd2b4a71d41180820a080f587b6350c35f9e48,2025-04-08T18:13:53.347000
|
||||||
CVE-2025-3286,0,0,c247e4e94cc04e66afe391d63c6254a128435a66f18dde665fe78a6cdb0ab317,2025-04-08T18:13:53.347000
|
CVE-2025-3286,0,0,c247e4e94cc04e66afe391d63c6254a128435a66f18dde665fe78a6cdb0ab317,2025-04-08T18:13:53.347000
|
||||||
CVE-2025-3287,0,0,bff258a343cd08a61757791ae0246a98daa5f12cd52be7d2e4f1314c24254af2,2025-04-08T18:13:53.347000
|
CVE-2025-3287,0,0,bff258a343cd08a61757791ae0246a98daa5f12cd52be7d2e4f1314c24254af2,2025-04-08T18:13:53.347000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user