Auto-Update: 2025-04-10T14:00:20.548884+00:00

This commit is contained in:
cad-safe-bot 2025-04-10 14:03:54 +00:00
parent b7feae89de
commit be904377a1
98 changed files with 4387 additions and 418 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47489",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-22T09:15:10.770",
"lastModified": "2025-01-06T19:53:35.453",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-10T13:15:42.480",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -106,6 +106,10 @@
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1336b886b162fdc84708096ea152a61c0e1fc09c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3f4e54bd312d3dafb59daf2b97ffa08abebe60f5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49046",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:00:41.890",
"lastModified": "2025-03-18T18:53:16.010",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-10T13:15:43.390",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -123,6 +123,10 @@
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2e539b17d4cbe5fb8b5152dd9a6e4a8828f97db2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/2f345bb14ad4744950499ff222e2899209297afa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49546",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:30.500",
"lastModified": "2025-03-10T21:13:19.010",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-10T13:15:43.550",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -91,6 +91,10 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/23cf39dccf7653650701a6f39b119e9116a27f1a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8765a423a87d74ef24ea02b43b2728fe4039f248",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49636",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:38.827",
"lastModified": "2025-03-11T22:30:51.930",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-10T13:15:43.703",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -115,12 +115,24 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/549de58dba4bf1b2adc72e9948b9c76fa88be9d2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/72a0b329114b1caa8e69dfa7cdad1dd3c69b8602",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/df27729a4fe0002dfd80c96fe1c142829c672728",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f5dc10b910bdac523e5947336445a77066c51bf9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-49728",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-26T07:01:48.433",
"lastModified": "2025-03-07T20:46:17.810",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-10T13:15:43.850",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -75,6 +75,10 @@
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/70549c80fe80ac4e2a22068c76ebebced24f7e74",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/84dc940890e91e42898e4443a093281702440abf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
@ -82,6 +86,10 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f26422eabeb517629568edf8c2dd9c6cb9147584",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f93431c86b631bbca5614c66f966bf3ddb3c2803",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-11129",
"sourceIdentifier": "cve@gitlab.com",
"published": "2025-04-10T13:15:43.993",
"lastModified": "2025-04-10T13:15:43.993",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue has been discovered in GitLab EE affecting all versions from 17.1 before 17.8.7, 17.9 before 17.9.6, and 17.10 before 17.10.4. This allows attackers to perform targeted searches with sensitive keywords to get the count of issues containing the searched term.\""
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "cve@gitlab.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-209"
}
]
}
],
"references": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/503722",
"source": "cve@gitlab.com"
},
{
"url": "https://hackerone.com/reports/2717400",
"source": "cve@gitlab.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-11218",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-01-22T05:15:08.903",
"lastModified": "2025-03-20T08:15:11.387",
"lastModified": "2025-04-10T13:15:44.270",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -160,6 +160,10 @@
"url": "https://access.redhat.com/errata/RHSA-2025:2712",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:3577",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-11218",
"source": "secalert@redhat.com"

View File

@ -2,20 +2,24 @@
"id": "CVE-2024-12278",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-04-01T07:15:38.507",
"lastModified": "2025-04-01T20:26:11.547",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:19:57.677",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Booster for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via any location that typically sanitizes data using wp_kses, like comments, in all versions up to, and including, 7.2.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Booster for WooCommerce para WordPress es vulnerable a cross-site scripting almacenado en cualquier ubicaci\u00f3n que normalmente depure datos usando wp_kses, como los comentarios, en todas las versiones hasta la 7.2.5 incluida, debido a una depuraci\u00f3n de entrada y al escape de salida insuficiente. Esto permite a atacantes no autenticados inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n al acceder un usuario a una p\u00e1gina inyectada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
@ -32,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -47,18 +71,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "7.2.5",
"matchCriteriaId": "CA46802B-22FB-4739-B767-1563083D59F2"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/trunk/includes/functions/wcj-functions-general.php#L1015",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3262569/woocommerce-jetpack/trunk/includes/functions/wcj-functions-general.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/234789db-1440-40ac-83e7-b8afb0ba4b5f?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1894",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:28.067",
"lastModified": "2024-11-21T08:51:32.663",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-04-10T13:09:48.177",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,41 +36,115 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:burst-statistics:burst_statistics:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.7",
"matchCriteriaId": "3A70B78B-0161-49F9-A218-D53913BC38EB"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/burst-statistics/trunk/class-frontend.php#L67",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/burst-statistics/trunk/class-frontend.php#L74",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?old_path=/burst-statistics/tags/1.5.6.1&old=3049793&new_path=/burst-statistics/tags/1.5.7&new=3049793&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fa587df5-9d96-4cac-ae5d-2a0485a3a789?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/burst-statistics/trunk/class-frontend.php#L67",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/burst-statistics/trunk/class-frontend.php#L74",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?old_path=/burst-statistics/tags/1.5.6.1&old=3049793&new_path=/burst-statistics/tags/1.5.7&new=3049793&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fa587df5-9d96-4cac-ae5d-2a0485a3a789?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24485",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-15T19:15:09.740",
"lastModified": "2024-11-21T08:59:19.923",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:39:04.063",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:silextechnology:ds-600_firmware:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "37E08132-D4D6-4E60-940F-C0247B1F7B01"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:silextechnology:ds-600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98EA6C22-046F-4D44-89B4-84EAD0D75C71"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/MostafaSoliman/Security-Advisories/blob/master/CVE-2024-24485",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/MostafaSoliman/Security-Advisories/blob/master/CVE-2024-24485",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24486",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-15T19:15:09.787",
"lastModified": "2024-11-21T08:59:20.127",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:39:57.420",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:silextechnology:ds-600_firmware:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "37E08132-D4D6-4E60-940F-C0247B1F7B01"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:silextechnology:ds-600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98EA6C22-046F-4D44-89B4-84EAD0D75C71"
}
]
}
]
}
],
"references": [
{
"url": "https://raw.githubusercontent.com/MostafaSoliman/Security-Advisories/master/CVE-2024-24486",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://raw.githubusercontent.com/MostafaSoliman/Security-Advisories/master/CVE-2024-24486",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24487",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-15T19:15:09.830",
"lastModified": "2024-11-21T08:59:20.347",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:39:33.260",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:silextechnology:ds-600_firmware:1.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "37E08132-D4D6-4E60-940F-C0247B1F7B01"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:silextechnology:ds-600:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98EA6C22-046F-4D44-89B4-84EAD0D75C71"
}
]
}
]
}
],
"references": [
{
"url": "https://raw.githubusercontent.com/MostafaSoliman/Security-Advisories/master/CVE-2024-24487",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://raw.githubusercontent.com/MostafaSoliman/Security-Advisories/master/CVE-2024-24487",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26928",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-28T12:15:21.140",
"lastModified": "2025-01-07T16:44:17.763",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-10T13:15:44.527",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -108,6 +108,10 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a140224bcf87eb98a87b67ff4c6826c57e47b704",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a65f2b56334ba4dc30bd5ee9ce5b2691b973344d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30985",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T18:15:16.097",
"lastModified": "2024-11-21T09:12:40.320",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:41:14.657",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:client_management_system:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "28765F6A-D808-4E41-8D9E-FD246C3D0BD9"
}
]
}
]
}
],
"references": [
{
"url": "https://medium.com/%40shanunirwan/cve-2024-30985-sql-injection-vulnerability-in-client-management-system-using-php-mysql-1-1-c21fecbda062",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://medium.com/%40shanunirwan/cve-2024-30985-sql-injection-vulnerability-in-client-management-system-using-php-mysql-1-1-c21fecbda062",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30986",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T18:15:16.157",
"lastModified": "2024-11-21T09:12:40.523",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:41:10.500",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:client_management_system:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "28765F6A-D808-4E41-8D9E-FD246C3D0BD9"
}
]
}
]
}
],
"references": [
{
"url": "https://medium.com/%40shanunirwan/cve-2024-30986-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3fb702d9d510",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://medium.com/%40shanunirwan/cve-2024-30986-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3fb702d9d510",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30987",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T18:15:16.210",
"lastModified": "2024-11-21T09:12:40.740",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:41:06.233",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:client_management_system:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "28765F6A-D808-4E41-8D9E-FD246C3D0BD9"
}
]
}
]
}
],
"references": [
{
"url": "https://medium.com/%40shanunirwan/cve-2024-30987-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-b6a7a177d254",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://medium.com/%40shanunirwan/cve-2024-30987-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-b6a7a177d254",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30988",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T18:15:16.273",
"lastModified": "2024-11-21T09:12:40.960",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:41:00.560",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:client_management_system:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "28765F6A-D808-4E41-8D9E-FD246C3D0BD9"
}
]
}
]
}
],
"references": [
{
"url": "https://medium.com/%40shanunirwan/cve-2024-30988-cross-site-scripting-vulnerability-in-client-management-system-using-php-mysql-1-1-e7a677936c23",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://medium.com/%40shanunirwan/cve-2024-30988-cross-site-scripting-vulnerability-in-client-management-system-using-php-mysql-1-1-e7a677936c23",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30989",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T19:15:07.520",
"lastModified": "2025-03-14T17:15:44.497",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:40:46.917",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:client_management_system:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "28765F6A-D808-4E41-8D9E-FD246C3D0BD9"
}
]
}
]
}
],
"references": [
{
"url": "https://medium.com/%40shanunirwan/cve-2024-30989-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3cfa1c54e4a6",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://medium.com/%40shanunirwan/cve-2024-30989-multiple-stored-cross-site-scripting-vulnerabilities-in-client-management-system-3cfa1c54e4a6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30990",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T19:15:07.570",
"lastModified": "2024-11-21T09:12:41.300",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:40:39.260",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:client_management_system:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "28765F6A-D808-4E41-8D9E-FD246C3D0BD9"
}
]
}
]
}
],
"references": [
{
"url": "https://medium.com/%40shanunirwan/cve-2024-30990-sql-injection-vulnerability-in-invoices-page-of-client-management-system-using-php-58baa94a1761",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://medium.com/%40shanunirwan/cve-2024-30990-sql-injection-vulnerability-in-invoices-page-of-client-management-system-using-php-58baa94a1761",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33835",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-01T11:15:47.827",
"lastModified": "2024-11-21T09:17:34.033",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:41:39.267",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +61,51 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac18_firmware:15.03.05.05:*:*:*:*:*:*:*",
"matchCriteriaId": "4D5CB727-FC6B-4212-A61E-2888A0DADFB0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF9F8AF9-F921-4348-922B-EE5E6037E7AC"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/isBigChen/iot/blob/main/tenda/formSetSafeWanWebMan.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/isBigChen/iot/blob/main/tenda/formSetSafeWanWebMan.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38611",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-19T14:15:20.980",
"lastModified": "2024-11-21T09:26:28.820",
"lastModified": "2025-04-10T13:15:44.790",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -17,6 +17,10 @@
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/04d1086a62ac492ebb6bb0c94c1c8cb55f5d1f36",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/43fff07e4b1956d0e5cf23717507e438278ea3d9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
@ -29,10 +33,18 @@
"url": "https://git.kernel.org/stable/c/904db2ba44ae60641b6378c5013254d09acf5e80",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/963523600d9f1e36bc35ba774c2493d6baa4dd8f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c1a3803e5bb91c13e9ad582003e4288f67f06cd9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ece3fc1c10197052044048bea4f13cfdcf25b416",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/43fff07e4b1956d0e5cf23717507e438278ea3d9",
"source": "af854a3a-2127-422b-91ae-364da2661108"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39931",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-04T16:15:02.503",
"lastModified": "2024-11-21T09:28:36.087",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:43:51.257",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
@ -51,22 +71,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.13.0",
"matchCriteriaId": "5634A605-49DE-459E-ADE6-2E65D89321BD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/gogs/gogs/releases",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/gogs/gogs/releases",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39932",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-04T16:15:02.707",
"lastModified": "2024-11-21T09:28:36.240",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:44:52.103",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
@ -51,22 +71,56 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.13.0",
"matchCriteriaId": "5634A605-49DE-459E-ADE6-2E65D89321BD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/gogs/gogs/releases",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit",
"Mitigation"
]
},
{
"url": "https://github.com/gogs/gogs/releases",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"Exploit",
"Mitigation"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39933",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-04T16:15:02.900",
"lastModified": "2024-11-21T09:28:36.400",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:45:38.273",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
@ -51,22 +71,56 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.13.0",
"matchCriteriaId": "5634A605-49DE-459E-ADE6-2E65D89321BD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/gogs/gogs/releases",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit",
"Mitigation"
]
},
{
"url": "https://github.com/gogs/gogs/releases",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.sonarsource.com/blog/securing-developer-tools-unpatched-code-vulnerabilities-in-gogs-1/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"Exploit",
"Mitigation"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41585",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-03T19:15:04.197",
"lastModified": "2024-10-07T19:37:13.900",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:41:39.553",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,50 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.3.2.6",
"matchCriteriaId": "B60D4383-24BF-4BBE-91FC-503EC3DB1A35"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*",
"matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347"
}
]
}
]
}
],
"references": [
{
"url": "https://www.forescout.com/resources/draybreak-draytek-research/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41586",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-03T19:15:04.253",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:41:46.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,50 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.3.2.6",
"matchCriteriaId": "B60D4383-24BF-4BBE-91FC-503EC3DB1A35"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*",
"matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347"
}
]
}
]
}
],
"references": [
{
"url": "https://www.forescout.com/resources/draybreak-draytek-research/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41589",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-03T19:15:04.423",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:43:37.377",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,50 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.3.2.6",
"matchCriteriaId": "B60D4383-24BF-4BBE-91FC-503EC3DB1A35"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*",
"matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347"
}
]
}
]
}
],
"references": [
{
"url": "https://www.forescout.com/resources/draybreak-draytek-research/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41592",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-03T19:15:04.633",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:41:51.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,50 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:draytek:vigor3910_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.3.2.6",
"matchCriteriaId": "B60D4383-24BF-4BBE-91FC-503EC3DB1A35"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:draytek:vigor3910:-:*:*:*:*:*:*:*",
"matchCriteriaId": "894E4DDA-D9BE-441D-B447-B1CE52959347"
}
]
}
]
}
],
"references": [
{
"url": "https://www.forescout.com/resources/draybreak-draytek-research/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.forescout.com/resources/draytek14-vulnerabilities",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-46753",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-18T08:15:04.107",
"lastModified": "2024-09-20T12:30:51.220",
"lastModified": "2025-04-10T13:15:45.023",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -17,10 +17,26 @@
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0e4840ae09f375381167000ce47424818fcbcc7c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/2c4fe45351e544da4b8f10c74b277117a4fa7869",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5eb178f373b4f16f3b42d55ff88fc94dd95b93b1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/67e4ca7ddc67ef949326b4dc404a9678bbe67d72",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9c8237021b53d52357c0de07a768582fafb2791d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a7f16a7a709845855cb5a0e080a52bda5873f9de",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46812",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.163",
"lastModified": "2024-11-20T20:48:48.663",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-10T13:15:45.153",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -85,6 +85,10 @@
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2fd32a65f2e78eff0862c8fdf7815ca6bb44fb2e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3300a039caf850376bc3416c808cd8879da412bb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
@ -92,6 +96,10 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4331ae2788e779b11f3aad40c04be6c64831f2a2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8406158a546441b73f0b216aedacbf9a1e5748fb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46813",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.230",
"lastModified": "2024-10-04T17:38:17.740",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-10T13:15:45.303",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -70,6 +70,10 @@
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/032c5407a608ac3b2a98bf4fbda27d12c20c5887",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8aa2864044b9d13e95fe224f32e808afbf79ecdf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46821",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.767",
"lastModified": "2024-10-04T17:06:43.573",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-10T13:15:45.433",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -105,12 +105,20 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/befd1dc693c98bad69a701ede3a298698f0f9436",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c8c19ebf7c0b202a6a2d37a52ca112432723db5f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e549cd6da1f21c34ba0f65adeca6a8aa9860b381",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46823",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.897",
"lastModified": "2024-11-20T13:59:52.723",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-10T13:15:45.660",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -92,6 +92,14 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/99ddb9c58511f1b71e23d02a06082bf6d2dd2133",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cacce7faa7c475cea55e82cc3a27794561fac157",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d1207f07decc66546a7fa463d2f335a856c986ef",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47214",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-03T21:15:38.760",
"lastModified": "2025-04-07T19:15:53.147",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:51:22.130",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:snowplow:iglu_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.13.1",
"matchCriteriaId": "17F959D6-182B-4438-9EC1-490A0758533F"
}
]
}
]
}
],
"references": [
{
"url": "https://support.snowplow.io/hc/en-us/articles/26318139354909-Update-Critical-Snowplow-Security-Updates-Impact-on-Open-Source-Software-Users",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-53144",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-17T16:15:25.797",
"lastModified": "2024-12-18T08:15:05.687",
"lastModified": "2025-04-10T13:15:45.907",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -17,6 +17,10 @@
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/22b49d6e4f399a390c70f3034f5fbacbb9413858",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5291ff856d2c5177b4fe9c18828312be30213193",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
@ -33,6 +37,10 @@
"url": "https://git.kernel.org/stable/c/b25e11f978b63cb7857890edb3a698599cddb10e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/baaa50c6f91ea5a9c7503af51f2bc50e6568b66b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d17c631ba04e960eb6f8728b10d585de20ac4f71",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-56664",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-27T15:15:26.297",
"lastModified": "2025-01-17T14:15:32.227",
"lastModified": "2025-04-10T13:15:46.037",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -92,6 +92,10 @@
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/6deb9e85dc9a2ba4414b91c1b5b00b8415910890",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b015f19fedd2e12283a8450dd0aefce49ec57015",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
@ -116,6 +120,10 @@
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fdb2cd8957ac51f84c9e742ba866087944bb834b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5882",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-29T06:15:02.547",
"lastModified": "2024-11-21T09:48:31.037",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:52:09.533",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webcodingplace:ultimate_classified_listings:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.3",
"matchCriteriaId": "8A6CB3E1-2A15-4C4F-B0E3-5882B872EDEE"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/5e8d7808-8f3e-4fc9-a1e7-e108da031ca7/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/5e8d7808-8f3e-4fc9-a1e7-e108da031ca7/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5883",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-07-29T06:15:02.627",
"lastModified": "2024-11-21T09:48:31.193",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:50:08.880",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,14 +39,52 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webcodingplace:ultimate_classified_listings:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.3",
"matchCriteriaId": "8A6CB3E1-2A15-4C4F-B0E3-5882B872EDEE"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/a1894884-c739-4ef4-8d9c-392171ab3d68/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/a1894884-c739-4ef4-8d9c-392171ab3d68/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6529",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-08-01T06:15:02.737",
"lastModified": "2024-08-01T14:35:13.090",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:49:49.100",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webcodingplace:ultimate_classified_listings:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.4",
"matchCriteriaId": "3CDE52A3-8F35-4D89-B317-3580FA20DE48"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/1a346c9a-cc1a-46b1-b27a-a77a38449933/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0272",
"sourceIdentifier": "psirt@hcl.com",
"published": "2025-04-03T15:15:47.560",
"lastModified": "2025-04-07T14:18:34.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:27:02.210",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 4.7
}
]
},
@ -49,12 +69,79 @@
"value": "CWE-80"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltechsw:hcl_devops_deploy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0.0",
"versionEndExcluding": "8.0.1.5",
"matchCriteriaId": "42A4C3FF-3686-420F-894E-4D51AACEA84B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltechsw:hcl_devops_deploy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.1.0",
"versionEndExcluding": "8.1.0.1",
"matchCriteriaId": "335E9410-E48A-408A-99AB-17C352FECE14"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0.0",
"versionEndIncluding": "7.0.5.26",
"matchCriteriaId": "3EA22CDE-24F0-4272-B8FD-F52E6BB813A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.1.0.0",
"versionEndExcluding": "7.1.2.22",
"matchCriteriaId": "38CF144B-AD62-4D88-BEF5-65CB622A041F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0.0",
"versionEndExcluding": "7.2.3.15",
"matchCriteriaId": "B8BBA9A0-5AAA-49CD-B8B5-A4188B4697E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.3.0.0",
"versionEndIncluding": "7.3.2.9",
"matchCriteriaId": "4A3836CE-993D-4B8A-B546-D9AD5FD14293"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120137",
"source": "psirt@hcl.com"
"source": "psirt@hcl.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-0624",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-02-19T19:15:15.120",
"lastModified": "2025-04-03T10:15:19.267",
"lastModified": "2025-04-10T13:15:46.217",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -100,6 +100,10 @@
"url": "https://access.redhat.com/errata/RHSA-2025:3396",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2025:3577",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2025-0624",
"source": "secalert@redhat.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0995",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-02-15T02:15:09.127",
"lastModified": "2025-02-19T15:15:16.073",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:35:11.360",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,16 +49,51 @@
"value": "CWE-416"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "133.0.69943.98",
"matchCriteriaId": "E43CDBF0-985C-4C79-A266-AF271E78DA59"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_12.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/391907159",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Issue Tracking",
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-0996",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2025-02-15T02:15:09.260",
"lastModified": "2025-02-19T15:15:16.243",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:35:47.997",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "133.0.6943.98",
"matchCriteriaId": "CE0D6ABC-E25F-4A24-B528-981844E39520"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_12.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/391788835",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Issue Tracking",
"Permissions Required"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-1073",
"sourceIdentifier": "product-security@gg.jp.panasonic.com",
"published": "2025-04-10T12:15:15.097",
"lastModified": "2025-04-10T12:15:15.097",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Panasonic IR Control Hub (IR Blaster) versions 1.17 and earlier may allow an attacker with physical access to load unauthorized firmware onto the device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@gg.jp.panasonic.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:L",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "product-security@gg.jp.panasonic.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1299"
}
]
}
],
"references": [
{
"url": "https://lsin.panasonic.com/release-notes",
"source": "product-security@gg.jp.panasonic.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-1677",
"sourceIdentifier": "cve@gitlab.com",
"published": "2025-04-10T13:15:46.473",
"lastModified": "2025-04-10T13:15:46.473",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Denial of Service (DoS) issue has been discovered in GitLab CE/EE affecting all up to 17.8.7, 17.9 prior to 17.9.6 and 17.10 prior to 17.10.4 A denial of service could occur upon injecting oversized payloads into CI pipeline exports."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cve@gitlab.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/521117",
"source": "cve@gitlab.com"
},
{
"url": "https://hackerone.com/reports/3004008",
"source": "cve@gitlab.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1851",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-03T05:15:10.867",
"lastModified": "2025-03-03T18:15:37.277",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:32:42.863",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -124,30 +124,81 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac7_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.03.06.44",
"matchCriteriaId": "3314DA98-9AA3-492C-9A65-C529585C4FC0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac7:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3BEE979-5BF3-48ED-AF42-0546D4F896E9"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Raining-101/IOT_cve/blob/main/ac7_V15.03.06.44_SetFirewallCfg.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.298119",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.298119",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.505271",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tenda.com.cn/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Raining-101/IOT_cve/blob/main/ac7_V15.03.06.44_SetFirewallCfg.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21638",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T11:15:09.317",
"lastModified": "2025-02-27T22:01:34.240",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-10T13:15:46.747",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
@ -150,13 +150,6 @@
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/10c869a52f266e40f548cc3c565d14930a5edafc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/15649fd5415eda664ef35780c2013adeb5d9c695",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
@ -192,6 +185,10 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cf387cdebfaebae228dfba162f94c567a67610c3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/dc583e7e5f8515ca489c0df28e4362a70eade382",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21640",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T11:15:09.537",
"lastModified": "2025-02-27T22:01:01.257",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-10T13:15:46.927",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
@ -123,18 +123,15 @@
]
},
{
"url": "https://git.kernel.org/stable/c/1031462a944ba0fa83c25ab1111465f8345b5589",
"url": "https://git.kernel.org/stable/c/3cd0659deb9c03535fd61839e91d4d4d3e51ac71",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3cd0659deb9c03535fd61839e91d4d4d3e51ac71",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
"url": "https://git.kernel.org/stable/c/5599b212d2f4466e1832a94e9932684aaa364587",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/86ddf8118123cb58a0fb8724cad6979c4069065b",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-21779",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-02-27T03:15:18.690",
"lastModified": "2025-03-13T13:15:54.290",
"lastModified": "2025-04-10T13:15:47.123",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",
@ -114,6 +114,10 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/61224533f2b61e252b03e214195d27d64b22989a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/874ff13c73c45ecb38cb82191e8c1d523f0dc81b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",

View File

@ -2,17 +2,25 @@
"id": "CVE-2025-21941",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-01T16:15:24.983",
"lastModified": "2025-04-01T20:26:01.990",
"lastModified": "2025-04-10T13:15:47.297",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix null check for pipe_ctx->plane_state in resource_build_scaling_params\n\nNull pointer dereference issue could occur when pipe_ctx->plane_state\nis null. The fix adds a check to ensure 'pipe_ctx->plane_state' is not\nnull before accessing. This prevents a null pointer dereference.\n\nFound by code review.\n\n(cherry picked from commit 63e6a77ccf239337baa9b1e7787cde9fa0462092)"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Se corrige la comprobaci\u00f3n nula de pipe_ctx->plane_state en resource_build_scaling_params. Un problema de desreferencia de puntero nulo pod\u00eda ocurrir cuando pipe_ctx->plane_state era nulo. Esta correcci\u00f3n a\u00f1ade una comprobaci\u00f3n para garantizar que 'pipe_ctx->plane_state' no fuera nulo antes de acceder. Esto evita una desreferencia de puntero nulo. Encontrado mediante revisi\u00f3n de c\u00f3digo. (Seleccionado de el commit 63e6a77ccf239337baa9b1e7787cde9fa0462092)"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/265422915416468ba91bffa56addbff45e18342a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3748fad09d89e9a5290e1738fd6872a79f794743",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
@ -32,6 +40,10 @@
{
"url": "https://git.kernel.org/stable/c/e0345c3478f185ca840daac7f08a1fcd4ebec3e9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f435192e00bc4d5d4134356b93212670ec47fa8d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -2,21 +2,33 @@
"id": "CVE-2025-21956",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-01T16:15:26.810",
"lastModified": "2025-04-01T20:26:01.990",
"lastModified": "2025-04-10T13:15:47.440",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Assign normalized_pix_clk when color depth = 14\n\n[WHY & HOW]\nA warning message \"WARNING: CPU: 4 PID: 459 at ... /dc_resource.c:3397\ncalculate_phy_pix_clks+0xef/0x100 [amdgpu]\" occurs because the\ndisplay_color_depth == COLOR_DEPTH_141414 is not handled. This is\nobserved in Radeon RX 6600 XT.\n\nIt is fixed by assigning pix_clk * (14 * 3) / 24 - same as the rests.\n\nAlso fixes the indentation in get_norm_pix_clk.\n\n(cherry picked from commit 274a87eb389f58eddcbc5659ab0b180b37e92775)"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Asignar normalized_pix_clk cuando la profundidad de color es 14 [POR QU\u00c9 Y C\u00d3MO] Se produce un mensaje de advertencia \"ADVERTENCIA: CPU: 4 PID: 459 en ... /dc_resource.c:3397 calculate_phy_pix_clks+0xef/0x100 [amdgpu]\" porque no se gestiona la profundidad de color de la pantalla = COLOR_DEPTH_141414. Esto se observa en la Radeon RX 6600 XT. Se soluciona asignando pix_clk * (14 * 3) / 24, igual que el resto. Tambi\u00e9n se corrige la sangr\u00eda en get_norm_pix_clk. (Seleccionado de el commit 274a87eb389f58eddcbc5659ab0b180b37e92775)"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0174a2e5770efee9dbd4b58963ed4d939298ff5e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/04f90b505ad3a6eed474bbaa03167095fef5203a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/0c0016712e5dc23ce4a7e673cbebc24a535d8c8a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/27df30106690969f7d63604f0d49ed8e9bffa2cb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
@ -29,6 +41,10 @@
"url": "https://git.kernel.org/stable/c/a8f77e1658d78e4a8bb227a83bcee67de97f7634",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cca3ab74f90176099b6392e8e894b52b27b3d080",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/dc831b38680c47d07e425871a9852109183895cf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -2,17 +2,25 @@
"id": "CVE-2025-21957",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-01T16:15:26.910",
"lastModified": "2025-04-01T20:26:01.990",
"lastModified": "2025-04-10T13:15:47.577",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla1280: Fix kernel oops when debug level > 2\n\nA null dereference or oops exception will eventually occur when qla1280.c\ndriver is compiled with DEBUG_QLA1280 enabled and ql_debug_level > 2. I\nthink its clear from the code that the intention here is sg_dma_len(s) not\nlength of sg_next(s) when printing the debug info."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: qla1280: Se corrige el error del kernel cuando el nivel de depuraci\u00f3n > 2. Eventualmente, se producir\u00e1 una desreferencia nula o una excepci\u00f3n de error cuando el controlador qla1280.c se compila con DEBUG_QLA1280 habilitado y ql_debug_level > 2. Creo que del c\u00f3digo se desprende claramente que la intenci\u00f3n aqu\u00ed es sg_dma_len(s), no la longitud de sg_next(s) al imprimir la informaci\u00f3n de depuraci\u00f3n."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/11a8dac1177a596648a020a7f3708257a2f95fee",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/24602e2664c515a4f2950d7b52c3d5997463418c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
@ -29,6 +37,14 @@
"url": "https://git.kernel.org/stable/c/af71ba921d08c241a817010f96458dc5e5e26762",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/afa27b7c17a48e01546ccaad0ab017ad0496a522",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c737e2a5fb7f90b96a96121da1b50a9c74ae9b8c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ea371d1cdefb0951c7127a33bcd7eb931cf44571",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -2,17 +2,25 @@
"id": "CVE-2025-21959",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-01T16:15:27.120",
"lastModified": "2025-04-01T20:26:01.990",
"lastModified": "2025-04-10T13:15:47.717",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree()\n\nSince commit b36e4523d4d5 (\"netfilter: nf_conncount: fix garbage\ncollection confirm race\"), `cpu` and `jiffies32` were introduced to\nthe struct nf_conncount_tuple.\n\nThe commit made nf_conncount_add() initialize `conn->cpu` and\n`conn->jiffies32` when allocating the struct.\nIn contrast, count_tree() was not changed to initialize them.\n\nBy commit 34848d5c896e (\"netfilter: nf_conncount: Split insert and\ntraversal\"), count_tree() was split and the relevant allocation\ncode now resides in insert_tree().\nInitialize `conn->cpu` and `conn->jiffies32` in insert_tree().\n\nBUG: KMSAN: uninit-value in find_or_evict net/netfilter/nf_conncount.c:117 [inline]\nBUG: KMSAN: uninit-value in __nf_conncount_add+0xd9c/0x2850 net/netfilter/nf_conncount.c:143\n find_or_evict net/netfilter/nf_conncount.c:117 [inline]\n __nf_conncount_add+0xd9c/0x2850 net/netfilter/nf_conncount.c:143\n count_tree net/netfilter/nf_conncount.c:438 [inline]\n nf_conncount_count+0x82f/0x1e80 net/netfilter/nf_conncount.c:521\n connlimit_mt+0x7f6/0xbd0 net/netfilter/xt_connlimit.c:72\n __nft_match_eval net/netfilter/nft_compat.c:403 [inline]\n nft_match_eval+0x1a5/0x300 net/netfilter/nft_compat.c:433\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\n nft_do_chain+0x426/0x2290 net/netfilter/nf_tables_core.c:288\n nft_do_chain_ipv4+0x1a5/0x230 net/netfilter/nft_chain_filter.c:23\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\n nf_hook_slow_list+0x24d/0x860 net/netfilter/core.c:663\n NF_HOOK_LIST include/linux/netfilter.h:350 [inline]\n ip_sublist_rcv+0x17b7/0x17f0 net/ipv4/ip_input.c:633\n ip_list_rcv+0x9ef/0xa40 net/ipv4/ip_input.c:669\n __netif_receive_skb_list_ptype net/core/dev.c:5936 [inline]\n __netif_receive_skb_list_core+0x15c5/0x1670 net/core/dev.c:5983\n __netif_receive_skb_list net/core/dev.c:6035 [inline]\n netif_receive_skb_list_internal+0x1085/0x1700 net/core/dev.c:6126\n netif_receive_skb_list+0x5a/0x460 net/core/dev.c:6178\n xdp_recv_frames net/bpf/test_run.c:280 [inline]\n xdp_test_run_batch net/bpf/test_run.c:361 [inline]\n bpf_test_run_xdp_live+0x2e86/0x3480 net/bpf/test_run.c:390\n bpf_prog_test_run_xdp+0xf1d/0x1ae0 net/bpf/test_run.c:1316\n bpf_prog_test_run+0x5e5/0xa30 kernel/bpf/syscall.c:4407\n __sys_bpf+0x6aa/0xd90 kernel/bpf/syscall.c:5813\n __do_sys_bpf kernel/bpf/syscall.c:5902 [inline]\n __se_sys_bpf kernel/bpf/syscall.c:5900 [inline]\n __ia32_sys_bpf+0xa0/0xe0 kernel/bpf/syscall.c:5900\n ia32_sys_call+0x394d/0x4180 arch/x86/include/generated/asm/syscalls_32.h:358\n do_syscall_32_irqs_on arch/x86/entry/common.c:165 [inline]\n __do_fast_syscall_32+0xb0/0x110 arch/x86/entry/common.c:387\n do_fast_syscall_32+0x38/0x80 arch/x86/entry/common.c:412\n do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:450\n entry_SYSENTER_compat_after_hwframe+0x84/0x8e\n\nUninit was created at:\n slab_post_alloc_hook mm/slub.c:4121 [inline]\n slab_alloc_node mm/slub.c:4164 [inline]\n kmem_cache_alloc_noprof+0x915/0xe10 mm/slub.c:4171\n insert_tree net/netfilter/nf_conncount.c:372 [inline]\n count_tree net/netfilter/nf_conncount.c:450 [inline]\n nf_conncount_count+0x1415/0x1e80 net/netfilter/nf_conncount.c:521\n connlimit_mt+0x7f6/0xbd0 net/netfilter/xt_connlimit.c:72\n __nft_match_eval net/netfilter/nft_compat.c:403 [inline]\n nft_match_eval+0x1a5/0x300 net/netfilter/nft_compat.c:433\n expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]\n nft_do_chain+0x426/0x2290 net/netfilter/nf_tables_core.c:288\n nft_do_chain_ipv4+0x1a5/0x230 net/netfilter/nft_chain_filter.c:23\n nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626\n nf_hook_slow_list+0x24d/0x860 net/netfilter/core.c:663\n NF_HOOK_LIST include/linux/netfilter.h:350 [inline]\n ip_sublist_rcv+0x17b7/0x17f0 net/ipv4/ip_input.c:633\n ip_list_rcv+0x9ef/0xa40 net/ip\n---truncated---"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: nf_conncount: Inicializar completamente la estructura nf_conncount_tuple en insert_tree() Desde el commit b36e4523d4d5 (\"netfilter: nf_conncount: corregir la carrera de confirmaci\u00f3n de la recolecci\u00f3n de basura\"), se introdujeron `cpu` y `jiffies32` en la estructura nf_conncount_tuple. El commit hizo que nf_conncount_add() inicializara `conn->cpu` y `conn->jiffies32` al asignar la estructura. Por el contrario, count_tree() no se modific\u00f3 para inicializarlas. Mediante el commit 34848d5c896e (\"netfilter: nf_conncount: Dividir la inserci\u00f3n y el recorrido\"), count_tree() se dividi\u00f3 y el c\u00f3digo de asignaci\u00f3n relevante ahora reside en insert_tree(). Inicialice `conn->cpu` y `conn->jiffies32` en insert_tree(). ERROR: KMSAN: valor no inicializado en find_or_evict net/netfilter/nf_conncount.c:117 [en l\u00ednea] ERROR: KMSAN: valor no inicializado en __nf_conncount_add+0xd9c/0x2850 net/netfilter/nf_conncount.c:143 find_or_evict net/netfilter/nf_conncount.c:117 [en l\u00ednea] __nf_conncount_add+0xd9c/0x2850 net/netfilter/nf_conncount.c:143 count_tree net/netfilter/nf_conncount.c:438 [en l\u00ednea] nf_conncount_count+0x82f/0x1e80 net/netfilter/nf_conncount.c:521 connlimit_mt+0x7f6/0xbd0 net/netfilter/xt_connlimit.c:72 __nft_match_eval net/netfilter/nft_compat.c:403 [en l\u00ednea] nft_match_eval+0x1a5/0x300 net/netfilter/nft_compat.c:433 expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [en l\u00ednea] nft_do_chain+0x426/0x2290 net/netfilter/nf_tables_core.c:288 nft_do_chain_ipv4+0x1a5/0x230 net/netfilter/nft_chain_filter.c:23 nf_hook_entry_hookfn incluir/linux/netfilter.h:154 [en l\u00ednea] nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626 nf_hook_slow_list+0x24d/0x860 net/netfilter/core.c:663 NF_HOOK_LIST incluir/linux/netfilter.h:350 [en l\u00ednea] ip_sublist_rcv+0x17b7/0x17f0 net/ipv4/ip_input.c:633 ip_list_rcv+0x9ef/0xa40 net/ipv4/ip_input.c:669 __netif_receive_skb_list_ptype net/core/dev.c:5936 [en l\u00ednea] __netif_receive_skb_list_core+0x15c5/0x1670 net/core/dev.c:5983 __netif_receive_skb_list net/core/dev.c:6035 [en l\u00ednea] netif_receive_skb_list_internal+0x1085/0x1700 net/core/dev.c:6126 netif_receive_skb_list+0x5a/0x460 net/core/dev.c:6178 xdp_recv_frames net/bpf/test_run.c:280 [en l\u00ednea] xdp_test_run_batch net/bpf/test_run.c:361 [en l\u00ednea] bpf_test_run_xdp_live+0x2e86/0x3480 net/bpf/test_run.c:390 bpf_prog_test_run_xdp+0xf1d/0x1ae0 net/bpf/test_run.c:1316 bpf_prog_test_run+0x5e5/0xa30 kernel/bpf/syscall.c:4407 __sys_bpf+0x6aa/0xd90 kernel/bpf/syscall.c:5813 __do_sys_bpf kernel/bpf/syscall.c:5902 [en l\u00ednea] __se_sys_bpf kernel/bpf/syscall.c:5900 [en l\u00ednea] __ia32_sys_bpf+0xa0/0xe0 kernel/bpf/syscall.c:5900 ia32_sys_call+0x394d/0x4180 arch/x86/include/generated/asm/syscalls_32.h:358 do_syscall_32_irqs_on arch/x86/entry/common.c:165 [en l\u00ednea] __do_fast_syscall_32+0xb0/0x110 arch/x86/entry/common.c:387 do_fast_syscall_32+0x38/0x80 arch/x86/entry/common.c:412 do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:450 entry_SYSENTER_compat_after_hwframe+0x84/0x8e Uninit se cre\u00f3 en: slab_post_alloc_hook mm/slub.c:4121 [en l\u00ednea] slab_alloc_node mm/slub.c:4164 [en l\u00ednea] kmem_cache_alloc_noprof+0x915/0xe10 mm/slub.c:4171 \u00e1rbol_de_inserci\u00f3n net/netfilter/nf_conncount.c:372 [en l\u00ednea] \u00e1rbol_de_conteo net/netfilter/nf_conncount.c:450 [en l\u00ednea] nf_conncount_count+0x1415/0x1e80 net/netfilter/nf_conncount.c:521 connlimit_mt+0x7f6/0xbd0 net/netfilter/xt_connlimit.c:72 __nft_match_eval net/netfilter/nft_compat.c:403 [en l\u00ednea] nft_match_eval+0x1a5/0x300 net/netfilter/nft_compat.c:433 expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [en l\u00ednea] nft_do_chain+0x426/0x2290 net/netfilter/nf_tables_core.c:288 nft_do_chain_ipv4+0x1a5/0x230 net/netfilter/nft_chain_filter.c:23 nf_hook_entry_hookfn include/linux/netfilter.h:154 [en l\u00ednea] nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626 nf_hook_slow_list+0x24d/0x860 net/netfilter/core.c:663 NF_HOOK_LIST include/linux/netfilter.h:350 [en l\u00ednea] ip_sublist_rcv+0x17b7/0x17f0 ---truncado---"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/2a154ce766b995494e88d8d117fa82cc6b73dd87",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/2db5baaf047a7c8d6ed5e2cc657b7854e155b7fc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
@ -29,6 +37,14 @@
"url": "https://git.kernel.org/stable/c/db1e0c0856821c59a32ea3af79476bf20a6beeb2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e8544a5a97bee3674e7cd6bf0f3a4af517fa9146",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f522229c5563b59b4240261e406779bba6754159",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/fda50302a13701d47fbe01e1739c7a51114144fb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-21962",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-01T16:15:27.447",
"lastModified": "2025-04-01T20:26:01.990",
"lastModified": "2025-04-10T13:15:47.857",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix integer overflow while processing closetimeo mount option\n\nUser-provided mount parameter closetimeo of type u32 is intended to have\nan upper limit, but before it is validated, the value is converted from\nseconds to jiffies which can lead to an integer overflow.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: Se corrige un desbordamiento de enteros al procesar la opci\u00f3n de montaje closetimeo. El par\u00e1metro de montaje proporcionado por el usuario, closetimeo, de tipo u32, est\u00e1 dise\u00f1ado para tener un l\u00edmite superior, pero antes de su validaci\u00f3n, el valor se convierte de segundos a jiffies, lo que puede provocar un desbordamiento de enteros. Encontrado por el Centro de Verificaci\u00f3n de Linux (linuxtesting.org) con SVACE."
}
],
"metrics": {},
@ -17,6 +21,10 @@
"url": "https://git.kernel.org/stable/c/1c46673be93dd2954f44fe370fb4f2b8e6214224",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/513f6cf2e906a504b7ab0b62b2eea993a6f64558",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/6c13fcb7cf59ae65940da1dfea80144e42921e53",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -2,17 +2,25 @@
"id": "CVE-2025-21963",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-01T16:15:27.550",
"lastModified": "2025-04-01T20:26:01.990",
"lastModified": "2025-04-10T13:15:47.980",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix integer overflow while processing acdirmax mount option\n\nUser-provided mount parameter acdirmax of type u32 is intended to have\nan upper limit, but before it is validated, the value is converted from\nseconds to jiffies which can lead to an integer overflow.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: Se corrige el desbordamiento de enteros al procesar la opci\u00f3n de montaje acdirmax. El par\u00e1metro de montaje acdirmax, proporcionado por el usuario y de tipo u32, est\u00e1 dise\u00f1ado para tener un l\u00edmite superior, pero antes de su validaci\u00f3n, el valor se convierte de segundos a jiffies, lo que puede provocar un desbordamiento de enteros. Encontrado por el Centro de Verificaci\u00f3n de Linux (linuxtesting.org) con SVACE."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0c26edf477e093cefc41637f5bccc102e1a77399",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/2809a79bc64964ce02e0c5f2d6bd39b9d09bdb3c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-21964",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-01T16:15:27.657",
"lastModified": "2025-04-01T20:26:01.990",
"lastModified": "2025-04-10T13:15:48.097",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix integer overflow while processing acregmax mount option\n\nUser-provided mount parameter acregmax of type u32 is intended to have\nan upper limit, but before it is validated, the value is converted from\nseconds to jiffies which can lead to an integer overflow.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: Se corrige un desbordamiento de enteros al procesar la opci\u00f3n de montaje acregmax. El par\u00e1metro de montaje acregmax, proporcionado por el usuario y de tipo u32, est\u00e1 dise\u00f1ado para tener un l\u00edmite superior, pero antes de su validaci\u00f3n, el valor se convierte de segundos a jiffies, lo que puede provocar un desbordamiento de enteros. Encontrado por el Centro de Verificaci\u00f3n de Linux (linuxtesting.org) con SVACE."
}
],
"metrics": {},
@ -29,6 +33,10 @@
"url": "https://git.kernel.org/stable/c/833f2903eb8b70faca7967319e580e9ce69729fc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a13351624a6af8d91398860b8c9d4cf6c8e63de5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/dd190168e60ac15408f074a1fe0ce36aff34027b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -2,17 +2,29 @@
"id": "CVE-2025-21968",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-01T16:15:28.090",
"lastModified": "2025-04-01T20:26:01.990",
"lastModified": "2025-04-10T13:15:48.210",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix slab-use-after-free on hdcp_work\n\n[Why]\nA slab-use-after-free is reported when HDCP is destroyed but the\nproperty_validate_dwork queue is still running.\n\n[How]\nCancel the delayed work when destroying workqueue.\n\n(cherry picked from commit 725a04ba5a95e89c89633d4322430cfbca7ce128)"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Correcci\u00f3n de slab-use-after-free en hdcp_work [Por qu\u00e9] Se reporta un slab-use-after-free cuando se destruye HDCP, pero la cola property_validate_dwork sigue en ejecuci\u00f3n. [C\u00f3mo] Cancelar el trabajo retrasado al destruir la cola de trabajo. (Seleccionado de el commit 725a04ba5a95e89c89633d4322430cfbca7ce128)"
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/06acfdef370ae018dad9592369e2d2fd9a40c09e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/1397715b011bcdc6ad91b17df7acaee301e89db5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/378b361e2e30e9729f9a7676f7926868d14f4326",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-21970",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-01T16:15:28.323",
"lastModified": "2025-04-01T20:26:01.990",
"lastModified": "2025-04-10T13:15:48.327",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Bridge, fix the crash caused by LAG state check\n\nWhen removing LAG device from bridge, NETDEV_CHANGEUPPER event is\ntriggered. Driver finds the lower devices (PFs) to flush all the\noffloaded entries. And mlx5_lag_is_shared_fdb is checked, it returns\nfalse if one of PF is unloaded. In such case,\nmlx5_esw_bridge_lag_rep_get() and its caller return NULL, instead of\nthe alive PF, and the flush is skipped.\n\nBesides, the bridge fdb entry's lastuse is updated in mlx5 bridge\nevent handler. But this SWITCHDEV_FDB_ADD_TO_BRIDGE event can be\nignored in this case because the upper interface for bond is deleted,\nand the entry will never be aged because lastuse is never updated.\n\nTo make things worse, as the entry is alive, mlx5 bridge workqueue\nkeeps sending that event, which is then handled by kernel bridge\nnotifier. It causes the following crash when accessing the passed bond\nnetdev which is already destroyed.\n\nTo fix this issue, remove such checks. LAG state is already checked in\ncommit 15f8f168952f (\"net/mlx5: Bridge, verify LAG state when adding\nbond to bridge\"), driver still need to skip offload if LAG becomes\ninvalid state after initialization.\n\n Oops: stack segment: 0000 [#1] SMP\n CPU: 3 UID: 0 PID: 23695 Comm: kworker/u40:3 Tainted: G OE 6.11.0_mlnx #1\n Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n Workqueue: mlx5_bridge_wq mlx5_esw_bridge_update_work [mlx5_core]\n RIP: 0010:br_switchdev_event+0x2c/0x110 [bridge]\n Code: 44 00 00 48 8b 02 48 f7 00 00 02 00 00 74 69 41 54 55 53 48 83 ec 08 48 8b a8 08 01 00 00 48 85 ed 74 4a 48 83 fe 02 48 89 d3 <4c> 8b 65 00 74 23 76 49 48 83 fe 05 74 7e 48 83 fe 06 75 2f 0f b7\n RSP: 0018:ffffc900092cfda0 EFLAGS: 00010297\n RAX: ffff888123bfe000 RBX: ffffc900092cfe08 RCX: 00000000ffffffff\n RDX: ffffc900092cfe08 RSI: 0000000000000001 RDI: ffffffffa0c585f0\n RBP: 6669746f6e690a30 R08: 0000000000000000 R09: ffff888123ae92c8\n R10: 0000000000000000 R11: fefefefefefefeff R12: ffff888123ae9c60\n R13: 0000000000000001 R14: ffffc900092cfe08 R15: 0000000000000000\n FS: 0000000000000000(0000) GS:ffff88852c980000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f15914c8734 CR3: 0000000002830005 CR4: 0000000000770ef0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n PKRU: 55555554\n Call Trace:\n <TASK>\n ? __die_body+0x1a/0x60\n ? die+0x38/0x60\n ? do_trap+0x10b/0x120\n ? do_error_trap+0x64/0xa0\n ? exc_stack_segment+0x33/0x50\n ? asm_exc_stack_segment+0x22/0x30\n ? br_switchdev_event+0x2c/0x110 [bridge]\n ? sched_balance_newidle.isra.149+0x248/0x390\n notifier_call_chain+0x4b/0xa0\n atomic_notifier_call_chain+0x16/0x20\n mlx5_esw_bridge_update+0xec/0x170 [mlx5_core]\n mlx5_esw_bridge_update_work+0x19/0x40 [mlx5_core]\n process_scheduled_works+0x81/0x390\n worker_thread+0x106/0x250\n ? bh_worker+0x110/0x110\n kthread+0xb7/0xe0\n ? kthread_park+0x80/0x80\n ret_from_fork+0x2d/0x50\n ? kthread_park+0x80/0x80\n ret_from_fork_asm+0x11/0x20\n </TASK>"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5: Puente, corrige el fallo causado por la comprobaci\u00f3n del estado de LAG Al retirar el dispositivo LAG del puente, se activa el evento NETDEV_CHANGEUPPER. El controlador encuentra los dispositivos inferiores (PF) para vaciar todas las entradas descargadas. Y mlx5_lag_is_shared_fdb est\u00e1 marcado, devuelve falso si uno de los PF est\u00e1 descargado. En tal caso, mlx5_esw_bridge_lag_rep_get() y su llamador devuelven NULL, en lugar del PF vivo, y se omite el vaciado. Adem\u00e1s, el lastuse de la entrada fdb del puente se actualiza en el controlador de eventos del puente mlx5. Pero este evento SWITCHDEV_FDB_ADD_TO_BRIDGE se puede ignorar en este caso porque se elimina la interfaz superior para el enlace y la entrada nunca se envejecer\u00e1 porque lastuse nunca se actualiza. Para empeorar las cosas, mientras la entrada est\u00e9 activa, la cola de trabajo del puente mlx5 sigue enviando ese evento, que luego gestiona el notificador del puente del n\u00facleo. Esto provoca el siguiente fallo al acceder al enlace transferido netdev, que ya est\u00e1 destruido. Para solucionar este problema, elimine estas comprobaciones. El estado de LAG ya se comprob\u00f3 en el commit 15f8f168952f (\"net/mlx5: Puente, verificar el estado de LAG al agregar el enlace al puente\"). El controlador a\u00fan debe omitir la descarga si el estado de LAG se vuelve inv\u00e1lido despu\u00e9s de la inicializaci\u00f3n. Ups: segmento de pila: 0000 [#1] CPU SMP: 3 UID: 0 PID: 23695 Comm: kworker/u40:3 Contaminado: G OE 6.11.0_mlnx #1 Contaminado: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE Nombre del hardware: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 Workqueue: mlx5_bridge_wq mlx5_esw_bridge_update_work [mlx5_core] RIP: 0010:br_switchdev_event+0x2c/0x110 [bridge] Code: 44 00 00 48 8b 02 48 f7 00 00 02 00 00 74 69 41 54 55 53 48 83 ec 08 48 8b a8 08 01 00 00 48 85 ed 74 4a 48 83 fe 02 48 89 d3 &lt;4c&gt; 8b 65 00 74 23 76 49 48 83 fe 05 74 7e 48 83 fe 06 75 2f 0f b7 RSP: 0018:ffffc900092cfda0 EFLAGS: 00010297 RAX: ffff888123bfe000 RBX: ffffc900092cfe08 RCX: 00000000ffffffff RDX: ffffc900092cfe08 RSI: 0000000000000001 RDI: ffffffffa0c585f0 RBP: 6669746f6e690a30 R08: 0000000000000000 R09: ffff888123ae92c8 R10: 0000000000000000 R11: fefefefefefefeff R12: ffff888123ae9c60 R13: 0000000000000001 R14: ffffc900092cfe08 R15: 0000000000000000 FS: 0000000000000000(0000) GS:ffff88852c980000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f15914c8734 CR3: 0000000002830005 CR4: 0000000000770ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Call Trace: ? __die_body+0x1a/0x60 ? die+0x38/0x60 ? do_trap+0x10b/0x120 ? do_error_trap+0x64/0xa0 ? exc_stack_segment+0x33/0x50 ? asm_exc_stack_segment+0x22/0x30 ? br_switchdev_event+0x2c/0x110 [bridge] ? sched_balance_newidle.isra.149+0x248/0x390 notifier_call_chain+0x4b/0xa0 atomic_notifier_call_chain+0x16/0x20 mlx5_esw_bridge_update+0xec/0x170 [mlx5_core] mlx5_esw_bridge_update_work+0x19/0x40 [mlx5_core] process_scheduled_works+0x81/0x390 worker_thread+0x106/0x250 ? bh_worker+0x110/0x110 kthread+0xb7/0xe0 ? kthread_park+0x80/0x80 ret_from_fork+0x2d/0x50 ? kthread_park+0x80/0x80 ret_from_fork_asm+0x11/0x20 "
}
],
"metrics": {},
@ -32,6 +36,10 @@
{
"url": "https://git.kernel.org/stable/c/f7bf259a04271165ae667ad21cfc60c6413f25ca",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f90c4d6572488e2bad38cca00f1c59174a538a1a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -2,17 +2,25 @@
"id": "CVE-2025-21971",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-01T16:15:28.440",
"lastModified": "2025-04-01T20:26:01.990",
"lastModified": "2025-04-10T13:15:48.453",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: Prevent creation of classes with TC_H_ROOT\n\nThe function qdisc_tree_reduce_backlog() uses TC_H_ROOT as a termination\ncondition when traversing up the qdisc tree to update parent backlog\ncounters. However, if a class is created with classid TC_H_ROOT, the\ntraversal terminates prematurely at this class instead of reaching the\nactual root qdisc, causing parent statistics to be incorrectly maintained.\nIn case of DRR, this could lead to a crash as reported by Mingi Cho.\n\nPrevent the creation of any Qdisc class with classid TC_H_ROOT\n(0xFFFFFFFF) across all qdisc types, as suggested by Jamal."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net_sched: Impide la creaci\u00f3n de clases con TC_H_ROOT La funci\u00f3n qdisc_tree_reduce_backlog() usa TC_H_ROOT como condici\u00f3n de terminaci\u00f3n al recorrer el \u00e1rbol qdisc para actualizar los contadores de backlog primarios. Sin embargo, si se crea una clase con classid TC_H_ROOT, el recorrido termina prematuramente en esta clase en lugar de alcanzar la qdisc root real, lo que provoca que las estad\u00edsticas primarias se mantengan incorrectamente. En caso de DRR, esto podr\u00eda provocar un fallo como lo inform\u00f3 Mingi Cho. Impide la creaci\u00f3n de cualquier clase Qdisc con classid TC_H_ROOT (0xFFFFFFFF) en todos los tipos de qdisc, como sugiri\u00f3 Jamal."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/003d92c91cdb5a64b25a9a74cb8543aac9a8bb48",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/0c3057a5a04d07120b3d0ec9c79568fceb9c921e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
@ -25,10 +33,18 @@
"url": "https://git.kernel.org/stable/c/78533c4a29ac3aeddce4b481770beaaa4f3bfb67",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/7a82fe67a9f4d7123d8e5ba8f0f0806c28695006",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/94edfdfb9505ab608e86599d1d1e38c83816fc1c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e05d9938b1b0ac40b6054cc5fa0ccbd9afd5ed4c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e5ee00607bbfc97ef1526ea95b6b2458ac9e7cb7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-21975",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-01T16:15:28.853",
"lastModified": "2025-04-01T20:26:01.990",
"lastModified": "2025-04-10T13:15:48.573",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: handle errors in mlx5_chains_create_table()\n\nIn mlx5_chains_create_table(), the return value of\u00a0mlx5_get_fdb_sub_ns()\nand mlx5_get_flow_namespace() must be checked to prevent NULL pointer\ndereferences. If either function fails, the function should log error\nmessage with mlx5_core_warn() and return error pointer."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5: gesti\u00f3n de errores en mlx5_chains_create_table(). En mlx5_chains_create_table(), se debe comprobar el valor de retorno de mlx5_get_fdb_sub_ns() y mlx5_get_flow_namespace() para evitar desreferencias de punteros nulos. Si alguna de las funciones falla, debe registrar un mensaje de error con mlx5_core_warn() y devolver un puntero de error."
}
],
"metrics": {},
@ -21,10 +25,18 @@
"url": "https://git.kernel.org/stable/c/1598307c914ba3d2642a2b03d1ff11efbdb7c6c2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/15bdd93728369b2c8942a8e5d549d4b5dc04a2d9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/1d34296409a519b4027750e3e82d9e19553a7398",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/29c419c64e9b396baeda1d8713d2aa3ba7c0acf6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/637105ef0d46fe5beac15aceb431da3ec832bb00",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -2,36 +2,160 @@
"id": "CVE-2025-21979",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-01T16:15:29.287",
"lastModified": "2025-04-01T20:26:01.990",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:25:50.870",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: cfg80211: cancel wiphy_work before freeing wiphy\n\nA wiphy_work can be queued from the moment the wiphy is allocated and\ninitialized (i.e. wiphy_new_nm). When a wiphy_work is queued, the\nrdev::wiphy_work is getting queued.\n\nIf wiphy_free is called before the rdev::wiphy_work had a chance to run,\nthe wiphy memory will be freed, and then when it eventally gets to run\nit'll use invalid memory.\n\nFix this by canceling the work before freeing the wiphy."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: cfg80211: cancelar wiphy_work antes de liberar wiphy. Un wiphy_work puede ponerse en cola desde el momento en que se asigna e inicializa el wiphy (es decir, wiphy_new_nm). Cuando se pone en cola un wiphy_work, tambi\u00e9n se pone en cola rdev::wiphy_work. Si se llama a wiphy_free antes de que rdev::wiphy_work se ejecute, se liberar\u00e1 la memoria del wiphy y, cuando finalmente se ejecute, usar\u00e1 memoria no v\u00e1lida. Para solucionar esto, cancele el trabajo antes de liberar el wiphy."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.57",
"versionEndExcluding": "6.1.132",
"matchCriteriaId": "AFE31CAB-7E14-4AA4-9EEA-4901C71DFF5A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.5",
"versionEndExcluding": "6.6.84",
"matchCriteriaId": "49FD01BB-6E18-4796-A16D-F5E17FAC1E71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.20",
"matchCriteriaId": "60E9C5DF-D778-4572-848A-5D6CFFE022CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.13",
"versionEndExcluding": "6.13.8",
"matchCriteriaId": "0A20D4D7-B329-4C68-B662-76062EA7DCF0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0272d4af7f92997541d8bbf4c51918b93ded6ee2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/72d520476a2fab6f3489e8388ab524985d6c4b90",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/75d262ad3c36d52852d764588fcd887f0fcd9138",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a5158d67bff06cb6fea31be39aeb319fd908ed8e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dea22de162058216a90f2706f0d0b36f0ff309fd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,36 +2,160 @@
"id": "CVE-2025-21980",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-01T16:15:29.390",
"lastModified": "2025-04-01T20:26:01.990",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:25:42.490",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched: address a potential NULL pointer dereference in the GRED scheduler.\n\nIf kzalloc in gred_init returns a NULL pointer, the code follows the\nerror handling path, invoking gred_destroy. This, in turn, calls\ngred_offload, where memset could receive a NULL pointer as input,\npotentially leading to a kernel crash.\n\nWhen table->opt is NULL in gred_init(), gred_change_table_def()\nis not called yet, so it is not necessary to call ->ndo_setup_tc()\nin gred_offload()."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sched: soluciona una posible desreferencia de puntero nulo en el programador GRED. Si kzalloc en gred_init devuelve un puntero nulo, el c\u00f3digo sigue la ruta de gesti\u00f3n de errores, invocando gred_destroy. Esto, a su vez, llama a gred_offload, donde memset podr\u00eda recibir un puntero nulo como entrada, lo que podr\u00eda provocar un fallo del kernel. Cuando table-&gt;opt es nulo en gred_init(), gred_change_table_def() a\u00fan no se llama, por lo que no es necesario llamar a -&gt;ndo_setup_tc() en gred_offload()."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.132",
"matchCriteriaId": "91D1C2F6-55A1-4CF4-AC66-ADF758259C59"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.84",
"matchCriteriaId": "994E0F00-FAC4-40E4-9068-C7D4D8242EC8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.20",
"matchCriteriaId": "60E9C5DF-D778-4572-848A-5D6CFFE022CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.13",
"versionEndExcluding": "6.13.8",
"matchCriteriaId": "0A20D4D7-B329-4C68-B662-76062EA7DCF0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0f0a152957d64ce45b4c27c687e7d087e8f45079",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/115ef44a98220fddfab37a39a19370497cd718b9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5f996b4f80c2cef1f9c77275055e7fcba44c9199",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/68896dd50180b38ea552e49a6a00b685321e5769",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d02c9acd68950a444acda18d514e2b41f846cb7f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,36 +2,174 @@
"id": "CVE-2025-21981",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-01T16:15:29.503",
"lastModified": "2025-04-01T20:26:01.990",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:25:35.970",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: fix memory leak in aRFS after reset\n\nFix aRFS (accelerated Receive Flow Steering) structures memory leak by\nadding a checker to verify if aRFS memory is already allocated while\nconfiguring VSI. aRFS objects are allocated in two cases:\n- as part of VSI initialization (at probe), and\n- as part of reset handling\n\nHowever, VSI reconfiguration executed during reset involves memory\nallocation one more time, without prior releasing already allocated\nresources. This led to the memory leak with the following signature:\n\n[root@os-delivery ~]# cat /sys/kernel/debug/kmemleak\nunreferenced object 0xff3c1ca7252e6000 (size 8192):\n comm \"kworker/0:0\", pid 8, jiffies 4296833052\n hex dump (first 32 bytes):\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace (crc 0):\n [<ffffffff991ec485>] __kmalloc_cache_noprof+0x275/0x340\n [<ffffffffc0a6e06a>] ice_init_arfs+0x3a/0xe0 [ice]\n [<ffffffffc09f1027>] ice_vsi_cfg_def+0x607/0x850 [ice]\n [<ffffffffc09f244b>] ice_vsi_setup+0x5b/0x130 [ice]\n [<ffffffffc09c2131>] ice_init+0x1c1/0x460 [ice]\n [<ffffffffc09c64af>] ice_probe+0x2af/0x520 [ice]\n [<ffffffff994fbcd3>] local_pci_probe+0x43/0xa0\n [<ffffffff98f07103>] work_for_cpu_fn+0x13/0x20\n [<ffffffff98f0b6d9>] process_one_work+0x179/0x390\n [<ffffffff98f0c1e9>] worker_thread+0x239/0x340\n [<ffffffff98f14abc>] kthread+0xcc/0x100\n [<ffffffff98e45a6d>] ret_from_fork+0x2d/0x50\n [<ffffffff98e083ba>] ret_from_fork_asm+0x1a/0x30\n ..."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ice: corrige p\u00e9rdida de memoria en aRFS despu\u00e9s del reinicio Corrige la p\u00e9rdida de memoria de las estructuras aRFS (direcci\u00f3n de flujo de recepci\u00f3n acelerada) agregando un verificador para verificar si la memoria aRFS ya est\u00e1 asignada mientras se configura VSI. Los objetos aRFS se asignan en dos casos: - como parte de la inicializaci\u00f3n de VSI (en la sonda), y - como parte de la gesti\u00f3n del reinicio. Sin embargo, la reconfiguraci\u00f3n de VSI ejecutada durante el reinicio implica la asignaci\u00f3n de memoria una vez m\u00e1s, sin liberar previamente los recursos ya asignados. Esto provoc\u00f3 la fuga de memoria con la siguiente firma: [root@os-delivery ~]# cat /sys/kernel/debug/kmemleak unreferenced object 0xff3c1ca7252e6000 (size 8192): comm \"kworker/0:0\", pid 8, jiffies 4296833052 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace (crc 0): [] __kmalloc_cache_noprof+0x275/0x340 [] ice_init_arfs+0x3a/0xe0 [ice] [] ice_vsi_cfg_def+0x607/0x850 [ice] [] ice_vsi_setup+0x5b/0x130 [ice] [] ice_init+0x1c1/0x460 [ice] [] ice_probe+0x2af/0x520 [ice] [] local_pci_probe+0x43/0xa0 [] work_for_cpu_fn+0x13/0x20 [] process_one_work+0x179/0x390 [] worker_thread+0x239/0x340 [] kthread+0xcc/0x100 [] ret_from_fork+0x2d/0x50 [] ret_from_fork_asm+0x1a/0x30 ... "
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.8",
"versionEndExcluding": "6.1.132",
"matchCriteriaId": "433045BA-C201-4126-9F76-1749DFE6E101"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.84",
"matchCriteriaId": "994E0F00-FAC4-40E4-9068-C7D4D8242EC8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.20",
"matchCriteriaId": "60E9C5DF-D778-4572-848A-5D6CFFE022CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.13",
"versionEndExcluding": "6.13.8",
"matchCriteriaId": "0A20D4D7-B329-4C68-B662-76062EA7DCF0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/23d97f18901ef5e4e264e3b1777fe65c760186b5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3b27e6e10a32589fcd293b8933ab6de9387a460e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5d30d256661fc11b6e73fac6c3783a702e1006a3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/78f3d64b30210c0e521c59357431aca14024cb79",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e6902101f34f098af59b0d1d8cf90c4124c02c6a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ef2bc94059836a115430a6ad9d2838b0b34dc8f5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fcbacc47d16306c87ad1b820b7a575f6e9eae58b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,28 +2,132 @@
"id": "CVE-2025-21982",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-01T16:15:29.613",
"lastModified": "2025-04-01T20:26:01.990",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:25:23.140",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: nuvoton: npcm8xx: Add NULL check in npcm8xx_gpio_fw\n\ndevm_kasprintf() calls can return null pointers on failure.\nBut the return values were not checked in npcm8xx_gpio_fw().\nAdd NULL check in npcm8xx_gpio_fw(), to handle kernel NULL\npointer dereference error."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pinctrl: nuvoton: npcm8xx: Se ha a\u00f1adido una comprobaci\u00f3n de valores nulos en las llamadas a npcm8xx_gpio_fw devm_kasprintf(), que pueden devolver punteros nulos en caso de error. Sin embargo, los valores de retorno no se comprobaron en npcm8xx_gpio_fw(). Se ha a\u00f1adido una comprobaci\u00f3n de valores nulos en npcm8xx_gpio_fw() para gestionar el error de desreferencia de punteros nulos del kernel."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.20",
"matchCriteriaId": "60E9C5DF-D778-4572-848A-5D6CFFE022CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.13",
"versionEndExcluding": "6.13.8",
"matchCriteriaId": "0A20D4D7-B329-4C68-B662-76062EA7DCF0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/6a08a86e5aff8e65368ccd463348fdda26100821",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a585f6ea42ec259a9a57e3e2580fa527c92187d0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/acf40ab42799e4ae1397ee6f5c5941092d66f999",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,28 +2,127 @@
"id": "CVE-2025-21984",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-01T16:15:29.810",
"lastModified": "2025-04-01T20:26:01.990",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:25:15.120",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: fix kernel BUG when userfaultfd_move encounters swapcache\n\nuserfaultfd_move() checks whether the PTE entry is present or a\nswap entry.\n\n- If the PTE entry is present, move_present_pte() handles folio\n migration by setting:\n\n src_folio->index = linear_page_index(dst_vma, dst_addr);\n\n- If the PTE entry is a swap entry, move_swap_pte() simply copies\n the PTE to the new dst_addr.\n\nThis approach is incorrect because, even if the PTE is a swap entry,\nit can still reference a folio that remains in the swap cache.\n\nThis creates a race window between steps 2 and 4.\n 1. add_to_swap: The folio is added to the swapcache.\n 2. try_to_unmap: PTEs are converted to swap entries.\n 3. pageout: The folio is written back.\n 4. Swapcache is cleared.\nIf userfaultfd_move() occurs in the window between steps 2 and 4,\nafter the swap PTE has been moved to the destination, accessing the\ndestination triggers do_swap_page(), which may locate the folio in\nthe swapcache. However, since the folio's index has not been updated\nto match the destination VMA, do_swap_page() will detect a mismatch.\n\nThis can result in two critical issues depending on the system\nconfiguration.\n\nIf KSM is disabled, both small and large folios can trigger a BUG\nduring the add_rmap operation due to:\n\n page_pgoff(folio, page) != linear_page_index(vma, address)\n\n[ 13.336953] page: refcount:6 mapcount:1 mapping:00000000f43db19c index:0xffffaf150 pfn:0x4667c\n[ 13.337520] head: order:2 mapcount:1 entire_mapcount:0 nr_pages_mapped:1 pincount:0\n[ 13.337716] memcg:ffff00000405f000\n[ 13.337849] anon flags: 0x3fffc0000020459(locked|uptodate|dirty|owner_priv_1|head|swapbacked|node=0|zone=0|lastcpupid=0xffff)\n[ 13.338630] raw: 03fffc0000020459 ffff80008507b538 ffff80008507b538 ffff000006260361\n[ 13.338831] raw: 0000000ffffaf150 0000000000004000 0000000600000000 ffff00000405f000\n[ 13.339031] head: 03fffc0000020459 ffff80008507b538 ffff80008507b538 ffff000006260361\n[ 13.339204] head: 0000000ffffaf150 0000000000004000 0000000600000000 ffff00000405f000\n[ 13.339375] head: 03fffc0000000202 fffffdffc0199f01 ffffffff00000000 0000000000000001\n[ 13.339546] head: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000\n[ 13.339736] page dumped because: VM_BUG_ON_PAGE(page_pgoff(folio, page) != linear_page_index(vma, address))\n[ 13.340190] ------------[ cut here ]------------\n[ 13.340316] kernel BUG at mm/rmap.c:1380!\n[ 13.340683] Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP\n[ 13.340969] Modules linked in:\n[ 13.341257] CPU: 1 UID: 0 PID: 107 Comm: a.out Not tainted 6.14.0-rc3-gcf42737e247a-dirty #299\n[ 13.341470] Hardware name: linux,dummy-virt (DT)\n[ 13.341671] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 13.341815] pc : __page_check_anon_rmap+0xa0/0xb0\n[ 13.341920] lr : __page_check_anon_rmap+0xa0/0xb0\n[ 13.342018] sp : ffff80008752bb20\n[ 13.342093] x29: ffff80008752bb20 x28: fffffdffc0199f00 x27: 0000000000000001\n[ 13.342404] x26: 0000000000000000 x25: 0000000000000001 x24: 0000000000000001\n[ 13.342575] x23: 0000ffffaf0d0000 x22: 0000ffffaf0d0000 x21: fffffdffc0199f00\n[ 13.342731] x20: fffffdffc0199f00 x19: ffff000006210700 x18: 00000000ffffffff\n[ 13.342881] x17: 6c203d2120296567 x16: 6170202c6f696c6f x15: 662866666f67705f\n[ 13.343033] x14: 6567617028454741 x13: 2929737365726464 x12: ffff800083728ab0\n[ 13.343183] x11: ffff800082996bf8 x10: 0000000000000fd7 x9 : ffff80008011bc40\n[ 13.343351] x8 : 0000000000017fe8 x7 : 00000000fffff000 x6 : ffff8000829eebf8\n[ 13.343498] x5 : c0000000fffff000 x4 : 0000000000000000 x3 : 0000000000000000\n[ 13.343645] x2 : 0000000000000000 x1 : ffff0000062db980 x0 : 000000000000005f\n[ 13.343876] Call trace:\n[ 13.344045] __page_check_anon_rmap+0xa0/0xb0 (P)\n[ 13.344234] folio_add_anon_rmap_ptes+0x22c/0x320\n[ 13.344333] do_swap_page+0x1060/0x1400\n[ 13.344417] __handl\n---truncated---"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: se corrige el ERROR del kernel cuando userfaultfd_move encuentra swapcache userfaultfd_move() comprueba si la entrada PTE est\u00e1 presente o es una entrada de intercambio. - Si la entrada PTE est\u00e1 presente, move_present_pte() maneja la migraci\u00f3n de folio mediante la configuraci\u00f3n: src_folio-&gt;index = linear_page_index(dst_vma, dst_addr); - Si la entrada PTE es una entrada de intercambio, move_swap_pte() simplemente copia el PTE al nuevo dst_addr. Este enfoque es incorrecto porque, incluso si el PTE es una entrada de intercambio, a\u00fan puede hacer referencia a un folio que permanece en el cach\u00e9 de intercambio. Esto crea una ventana de ejecuci\u00f3n entre los pasos 2 y 4. 1. add_to_swap: el folio se agrega al cach\u00e9 de intercambio. 2. try_to_unmap: los PTE se convierten en entradas de intercambio. 3. pageout: el folio se vuelve a escribir. 4. Se borra la cach\u00e9 de intercambio. Si se produce userfaultfd_move() en la ventana entre los pasos 2 y 4, despu\u00e9s de mover el PTE de intercambio a su destino, al acceder a este se activa do_swap_page(), que puede localizar el folio en la cach\u00e9 de intercambio. Sin embargo, dado que el \u00edndice del folio no se ha actualizado para que coincida con el VMA de destino, do_swap_page() detectar\u00e1 una discrepancia. Esto puede provocar dos problemas cr\u00edticos seg\u00fan la configuraci\u00f3n del sistema. Si KSM est\u00e1 deshabilitado, tanto los folios peque\u00f1os como los grandes pueden generar un ERROR durante la operaci\u00f3n add_rmap debido a: page_pgoff(folio, page) != linear_page_index(vma, address) [ 13.336953] page: refcount:6 mapcount:1 mapping:00000000f43db19c index:0xffffaf150 pfn:0x4667c [ 13.337520] head: order:2 mapcount:1 entire_mapcount:0 nr_pages_mapped:1 pincount:0 [ 13.337716] memcg:ffff00000405f000 [ 13.337849] anon flags: 0x3fffc0000020459(bloqueado|actualizado|sucio|propietario_priv_1|cabezal|swapbacked|nodo=0|zona=0|lastcpupid=0xffff) [13.338630] sin procesar: 03fffc0000020459 ffff80008507b538 ffff80008507b538 ffff000006260361 [13.338831] sin procesar: 0000000ffffaf150 0000000000004000 0000000600000000 ffff00000405f000 [13.339031] cabezal: 03fffc0000020459 ffff80008507b538 ffff80008507b538 ffff000006260361 [ 13.339204] cabeza: 0000000ffffaf150 0000000000004000 0000000600000000 ffff00000405f000 [ 13.339375] cabeza: 03fffc0000000202 fffffdffc0199f01 ffffffff00000000 0000000000000001 [ 13.339546] cabeza: 000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 13.339736] p\u00e1gina volcada porque: VM_BUG_ON_PAGE(page_pgoff(folio, page) != linear_page_index(vma, address)) [ 13.340190] ------------[ cortar aqu\u00ed ]------------ [ 13.340316] \u00a1ERROR del kernel en mm/rmap.c:1380! [ 13.340683] Error interno: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP [ 13.340969] M\u00f3dulos vinculados: [ 13.341257] CPU: 1 UID: 0 PID: 107 Comm: a.out No contaminado 6.14.0-rc3-gcf42737e247a-dirty #299 [ 13.341470] Nombre del hardware: linux,dummy-virt (DT) [ 13.341671] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 13.341815] pc : __page_check_anon_rmap+0xa0/0xb0 [ 13.341920] lr : __page_check_anon_rmap+0xa0/0xb0 [ 13.342018] sp : ffff80008752bb20 [ 13.342093] x29: ffff80008752bb20 x28: fffffdffc0199f00 x27: 0000000000000001 [ 13.342404] x26: 0000000000000000 x25: 0000000000000001 x24: 0000000000000001 [ 13.342575] x23: 0000ffffaf0d0000 x22: 0000ffffaf0d0000 x21: fffffdffc0199f00 [ 13.342731] x20: fffffdffc0199f00 x19: ffff000006210700 x18: 00000000ffffffff [ 13.342881] x17: 6c203d2120296567 x16: 6170202c6f696c6f x15: 662866666f67705f [ 13.343033] x14: 6567617028454741 x13: 2929737365726464 x12: ffff800083728ab0 [ 13.343183] x11: ffff800082996bf8 x10: 0000000000000fd7 x9: ffff80008011bc40 [ 13.343351] x8: 0000000000017fe8 x7: 00000000fffff000 x6: ffff8000829eebf8 [ 13.343498] x5: c0000000fffff000 x4: 0000000000000000 x3: 0000000000000000 [ 13.343645] x2: 0000000000000000 x1 : ffff0000062db980 x0 : 000000000000005f [ 13.343876] Rastreo de llamadas: [ 13.344045] __page_check_anon_rmap+0xa0/0xb0 ---truncado---"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8",
"versionEndExcluding": "6.12.20",
"matchCriteriaId": "AD00A08B-A8BF-407B-95F5-DCADBFF79F01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.13",
"versionEndExcluding": "6.13.8",
"matchCriteriaId": "0A20D4D7-B329-4C68-B662-76062EA7DCF0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/4e9507246298fd6f1ca7bb42ef01a6e34fb93684",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b1e11bd86c0943bb7624efebdc384340a50ad683",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c50f8e6053b0503375c2975bf47f182445aebb4c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,28 +2,132 @@
"id": "CVE-2025-21989",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-02T13:15:43.427",
"lastModified": "2025-04-02T14:58:07.527",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:25:07.567",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: fix missing .is_two_pixels_per_container\n\nStarting from 6.11, AMDGPU driver, while being loaded with amdgpu.dc=1,\ndue to lack of .is_two_pixels_per_container function in dce60_tg_funcs,\ncauses a NULL pointer dereference on PCs with old GPUs, such as R9 280X.\n\nSo this fix adds missing .is_two_pixels_per_container to dce60_tg_funcs.\n\n(cherry picked from commit bd4b125eb949785c6f8a53b0494e32795421209d)"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: se corrige la falta de .is_two_pixels_per_container. A partir de la versi\u00f3n 6.11, el controlador AMDGPU, al cargarse con amdgpu.dc=1, debido a la falta de la funci\u00f3n .is_two_pixels_per_container en dce60_tg_funcs, provoca una desreferencia de puntero nulo en PC con GPU antiguas, como la R9 280X. Por lo tanto, esta correcci\u00f3n a\u00f1ade la falta de .is_two_pixels_per_container a dce60_tg_funcs. (Seleccionado de la confirmaci\u00f3n bd4b125eb949785c6f8a53b0494e32795421209d)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.12.20",
"matchCriteriaId": "A8E66DB4-C0CC-4C05-969A-26953A84F318"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.13",
"versionEndExcluding": "6.13.8",
"matchCriteriaId": "0A20D4D7-B329-4C68-B662-76062EA7DCF0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/36d04c9313d8d83ead92242f037099ac73e02120",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e204aab79e01bc8ff750645666993ed8b719de57",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fefa811e616b5d0b555ed65743e528a0a8a0b377",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,28 +2,132 @@
"id": "CVE-2025-21990",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-02T13:15:43.547",
"lastModified": "2025-04-02T14:58:07.527",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:25:01.577",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: NULL-check BO's backing store when determining GFX12 PTE flags\n\nPRT BOs may not have any backing store, so bo->tbo.resource will be\nNULL. Check for that before dereferencing.\n\n(cherry picked from commit 3e3fcd29b505cebed659311337ea03b7698767fc)"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: Se ha comprobado el almacenamiento de respaldo del BO al determinar los indicadores PTE de GFX12. Los BO de PRT podr\u00edan no tener almacenamiento de respaldo, por lo que bo-&gt;tbo.resource ser\u00e1 nulo. Compru\u00e9belo antes de desreferenciar. (Seleccionado de la confirmaci\u00f3n 3e3fcd29b505cebed659311337ea03b7698767fc)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.12.20",
"matchCriteriaId": "A8E66DB4-C0CC-4C05-969A-26953A84F318"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.13",
"versionEndExcluding": "6.13.8",
"matchCriteriaId": "0A20D4D7-B329-4C68-B662-76062EA7DCF0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/6cc30748e17ea2a64051ceaf83a8372484e597f1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/72235808eabea93055b459a63443bd9cd6b08aa4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/af23e39b9e9280b1f6299b6f2fa090a1694240ad",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,36 +2,216 @@
"id": "CVE-2025-21991",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-02T13:15:43.670",
"lastModified": "2025-04-02T14:58:07.527",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:24:35.230",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/microcode/AMD: Fix out-of-bounds on systems with CPU-less NUMA nodes\n\nCurrently, load_microcode_amd() iterates over all NUMA nodes, retrieves their\nCPU masks and unconditionally accesses per-CPU data for the first CPU of each\nmask.\n\nAccording to Documentation/admin-guide/mm/numaperf.rst:\n\n \"Some memory may share the same node as a CPU, and others are provided as\n memory only nodes.\"\n\nTherefore, some node CPU masks may be empty and wouldn't have a \"first CPU\".\n\nOn a machine with far memory (and therefore CPU-less NUMA nodes):\n- cpumask_of_node(nid) is 0\n- cpumask_first(0) is CONFIG_NR_CPUS\n- cpu_data(CONFIG_NR_CPUS) accesses the cpu_info per-CPU array at an\n index that is 1 out of bounds\n\nThis does not have any security implications since flashing microcode is\na privileged operation but I believe this has reliability implications by\npotentially corrupting memory while flashing a microcode update.\n\nWhen booting with CONFIG_UBSAN_BOUNDS=y on an AMD machine that flashes\na microcode update. I get the following splat:\n\n UBSAN: array-index-out-of-bounds in arch/x86/kernel/cpu/microcode/amd.c:X:Y\n index 512 is out of range for type 'unsigned long[512]'\n [...]\n Call Trace:\n dump_stack\n __ubsan_handle_out_of_bounds\n load_microcode_amd\n request_microcode_amd\n reload_store\n kernfs_fop_write_iter\n vfs_write\n ksys_write\n do_syscall_64\n entry_SYSCALL_64_after_hwframe\n\nChange the loop to go over only NUMA nodes which have CPUs before determining\nwhether the first CPU on the respective node needs microcode update.\n\n [ bp: Massage commit message, fix typo. ]"
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/microcode/AMD: Se corrigi\u00f3 un error fuera de los l\u00edmites en sistemas con nodos NUMA sin CPU. Actualmente, load_microcode_amd() itera sobre todos los nodos NUMA, recupera sus m\u00e1scaras de CPU y accede incondicionalmente a los datos por CPU para la primera CPU de cada m\u00e1scara. Seg\u00fan Documentation/admin-guide/mm/numaperf.rst: \"Algunas memorias pueden compartir el mismo nodo que una CPU, mientras que otras se proporcionan como nodos de solo memoria\". Por lo tanto, algunas m\u00e1scaras de CPU de nodo podr\u00edan estar vac\u00edas y no tendr\u00edan una \"primera CPU\". En una m\u00e1quina con memoria extensa (y, por lo tanto, nodos NUMA sin CPU): - cpumask_of_node(nid) es 0 - cpumask_first(0) es CONFIG_NR_CPUS - cpu_data(CONFIG_NR_CPUS) accede a la matriz por CPU cpu_info en un \u00edndice que es 1 fuera de los l\u00edmites. Esto no tiene implicaciones de seguridad, ya que la actualizaci\u00f3n de microc\u00f3digo es una operaci\u00f3n privilegiada, pero creo que tiene implicaciones de confiabilidad al potencialmente corromper la memoria durante la actualizaci\u00f3n de microc\u00f3digo. Al arrancar con CONFIG_UBSAN_BOUNDS=y en una m\u00e1quina AMD que actualiza microc\u00f3digo. Recibo el siguiente mensaje: UBSAN: array-index-out-of-bounds en arch/x86/kernel/cpu/microcode/amd.c:X:Y el \u00edndice 512 est\u00e1 fuera de rango para el tipo 'unsigned long[512]' [...] Seguimiento de llamadas: dump_stack __ubsan_handle_out_of_bounds load_microcode_amd request_microcode_amd reload_store kernfs_fop_write_iter vfs_write ksys_write do_syscall_64 entry_SYSCALL_64_after_hwframe Cambie el bucle para que solo recorra los nodos NUMA que tengan CPU antes de determinar si la primera CPU en el nodo respectivo necesita una actualizaci\u00f3n de microc\u00f3digo. [bp: Mensaje de confirmaci\u00f3n de Massage, correcci\u00f3n de error tipogr\u00e1fico.]"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-129"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.14.308",
"versionEndExcluding": "4.15",
"matchCriteriaId": "83683E88-BE16-4997-9FDC-102DF930322C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.19.276",
"versionEndExcluding": "4.20",
"matchCriteriaId": "5495F696-4F37-41A0-9020-F01C49FD103A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4.235",
"versionEndExcluding": "5.5",
"matchCriteriaId": "5B84C064-16CC-43FA-AE76-F62E41B8DCFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10.173",
"versionEndExcluding": "5.11",
"matchCriteriaId": "DF6A0A9F-CF01-4C06-A4AC-AC7810053C8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15.99",
"versionEndExcluding": "5.16",
"matchCriteriaId": "55A594E3-39FC-4F69-9614-C6FC3967986F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1.16",
"versionEndExcluding": "6.1.132",
"matchCriteriaId": "3A183DD1-F3ED-43BE-99D2-3EA122C43457"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.3",
"versionEndExcluding": "6.6.84",
"matchCriteriaId": "3405E1B5-835A-4D00-A7C5-AEA51D851B70"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.20",
"matchCriteriaId": "60E9C5DF-D778-4572-848A-5D6CFFE022CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.13",
"versionEndExcluding": "6.13.8",
"matchCriteriaId": "0A20D4D7-B329-4C68-B662-76062EA7DCF0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/18b5d857c6496b78ead2fd10001b81ae32d30cac",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/488ffc0cac38f203979f83634236ee53251ce593",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5ac295dfccb5b015493f86694fa13a0dde4d3665",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/985a536e04bbfffb1770df43c6470f635a6b1073",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d509c4731090ebd9bbdb72c70a2d70003ae81f4f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e3e89178a9f4a80092578af3ff3c8478f9187d59",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e686349cc19e800dac8971929089ba5ff59abfb0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ec52240622c4d218d0240079b7c1d3ec2328a9f4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,17 +2,25 @@
"id": "CVE-2025-21992",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-02T13:15:43.800",
"lastModified": "2025-04-02T14:58:07.527",
"lastModified": "2025-04-10T13:15:49.053",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: ignore non-functional sensor in HP 5MP Camera\n\nThe HP 5MP Camera (USB ID 0408:5473) reports a HID sensor interface that\nis not actually implemented. Attempting to access this non-functional\nsensor via iio_info causes system hangs as runtime PM tries to wake up\nan unresponsive sensor.\n\n [453] hid-sensor-hub 0003:0408:5473.0003: Report latency attributes: ffffffff:ffffffff\n [453] hid-sensor-hub 0003:0408:5473.0003: common attributes: 5:1, 2:1, 3:1 ffffffff:ffffffff\n\nAdd this device to the HID ignore list since the sensor interface is\nnon-functional by design and should not be exposed to userspace."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: HID: ignorar sensor no funcional en c\u00e1mara HP de 5 MP La c\u00e1mara HP de 5 MP (ID USB 0408:5473) informa sobre una interfaz de sensor HID que no est\u00e1 implementada. Intentar acceder a este sensor no funcional a trav\u00e9s de iio_info provoca que el sistema se cuelgue mientras el PM en tiempo de ejecuci\u00f3n intenta despertar un sensor que no responde. [453] hid-sensor-hub 0003:0408:5473.0003: Informar atributos de latencia: ffffffff:ffffffff [453] hid-sensor-hub 0003:0408:5473.0003: atributos comunes: 5:1, 2:1, 3:1 ffffffff:ffffffff Agregue este dispositivo a la lista de ignorados de HID ya que la interfaz del sensor no es funcional por dise\u00f1o y no debe exponerse al espacio de usuario."
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/007a849126ef7907761af6a1379400558a72e703",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/363236d709e75610b628c2a4337ccbe42e454b6d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
@ -32,6 +40,14 @@
{
"url": "https://git.kernel.org/stable/c/9acdb0059fb6b82158e15adae91e629cb5974564",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9af297aea8f76a0ad21f2de5f2cd6401a748b9c3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b6c6c2d8ab4932e5d6d439f514276cb3d257b8fe",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]
}

View File

@ -2,36 +2,155 @@
"id": "CVE-2025-21993",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-02T13:15:43.940",
"lastModified": "2025-04-02T14:58:07.527",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:24:10.787",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\niscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()\n\nWhen performing an iSCSI boot using IPv6, iscsistart still reads the\n/sys/firmware/ibft/ethernetX/subnet-mask entry. Since the IPv6 prefix\nlength is 64, this causes the shift exponent to become negative,\ntriggering a UBSAN warning. As the concept of a subnet mask does not\napply to IPv6, the value is set to ~0 to suppress the warning message."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iscsi_ibft: Se corrige la advertencia de desplazamiento fuera de los l\u00edmites de UBSAN en ibft_attr_show_nic(). Al realizar un arranque iSCSI con IPv6, iscsistart sigue leyendo la entrada /sys/firmware/ibft/ethernetX/subnet-mask. Dado que la longitud del prefijo IPv6 es 64, esto hace que el exponente de desplazamiento sea negativo, lo que activa una advertencia de UBSAN. Dado que el concepto de m\u00e1scara de subred no se aplica a IPv6, el valor se establece en ~0 para suprimir el mensaje de advertencia."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.132",
"matchCriteriaId": "5F37CFA2-5A70-4204-9A20-1847146496C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.84",
"matchCriteriaId": "994E0F00-FAC4-40E4-9068-C7D4D8242EC8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.20",
"matchCriteriaId": "60E9C5DF-D778-4572-848A-5D6CFFE022CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.13",
"versionEndExcluding": "6.13.8",
"matchCriteriaId": "0A20D4D7-B329-4C68-B662-76062EA7DCF0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/07e0d99a2f701123ad3104c0f1a1e66bce74d6e5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2d1eef248107bdf3d5a69d0fde04c30a79a7bf5d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9bfa80c8aa4e06dff55a953c3fffbfc68a3a3b1c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a858cd58dea06cf85b142673deea8c5d87f11e70",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b253660fac5e0e9080d2c95e3a029e1898d49afb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b388e185bfad32bfed6a97a6817f74ca00a4318f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c1c6e527470e5eab0b2d57bd073530fbace39eab",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f763c82db8166e28f45b7cc4a5398a7859665940",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-21994",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-02T14:16:01.440",
"lastModified": "2025-04-02T14:58:07.527",
"lastModified": "2025-04-10T13:15:49.333",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix incorrect validation for num_aces field of smb_acl\n\nparse_dcal() validate num_aces to allocate posix_ace_state_array.\n\nif (num_aces > ULONG_MAX / sizeof(struct smb_ace *))\n\nIt is an incorrect validation that we can create an array of size ULONG_MAX.\nsmb_acl has ->size field to calculate actual number of aces in request buffer\nsize. Use this to check invalid num_aces."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ksmbd: Se corrige la validaci\u00f3n incorrecta del campo num_aces de smb_acl. La funci\u00f3n parse_dcal() valida num_aces para asignar posix_ace_state_array. Si (num_aces &gt; ULONG_MAX / sizeof(struct smb_ace *)), se considera una validaci\u00f3n incorrecta que permita crear una matriz de tama\u00f1o ULONG_MAX. smb_acl tiene el campo -&gt;size para calcular el n\u00famero real de ases en el tama\u00f1o del b\u00fafer de solicitud. \u00daselo para comprobar num_aces no v\u00e1lidos."
}
],
"metrics": {},
@ -25,6 +29,10 @@
"url": "https://git.kernel.org/stable/c/a4cb17797a5d241f1e509cb5b46ed95a80c2f5fd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/c3a3484d9d31b27a3db0fab91fcf191132d65236",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/d0f87370622a853b57e851f7d5a5452b72300f19",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21996",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-03T08:15:15.007",
"lastModified": "2025-04-07T14:18:34.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:15:49.453",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -17,14 +17,26 @@
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/0effb378ebce52b897f85cd7f828854b8c7cb636",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3ce08215cad55c10a6eeeb33d3583b6cfffe3ab8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/5b4d9d20fd455a97920cf158dd19163b879cf65d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/78b07dada3f02f77762d0755a96d35f53b02be69",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9b2da9c673a0da1359a2151f7ce773e2f77d71a9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/dd1801aa01bba1760357f2a641346ae149686713",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21999",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-03T08:15:15.360",
"lastModified": "2025-04-08T15:49:48.200",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-10T13:15:49.693",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -112,6 +112,10 @@
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/4b0b8445b6fd41e6f62ac90547a0ea9d348de3fa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/63b53198aff2e4e6c5866a4ff73c7891f958ffa4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
@ -140,6 +144,10 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/eda279586e571b05dff44d48e05f8977ad05855d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ede3e8ac90ae106f0b29cd759aadebc1568f1308",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22004",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-03T08:15:15.960",
"lastModified": "2025-04-08T15:48:27.060",
"vulnStatus": "Analyzed",
"lastModified": "2025-04-10T13:15:49.917",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -119,6 +119,10 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/50e288097c2c6e5f374ae079394436fc29d1e88e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/51e8be9578a2e74f9983d8fd8de8cafed191f30c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
@ -126,6 +130,14 @@
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/82d9084a97892de1ee4881eb5c17911fcd9be6f6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8cd90c7db08f32829bfa1b5b2b11fbc542afbab7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9566f6ee13b17a15d0a47667ad1b1893c539f730",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22005",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-03T08:15:16.087",
"lastModified": "2025-04-07T14:18:34.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:15:50.153",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -21,10 +21,22 @@
"url": "https://git.kernel.org/stable/c/119dcafe36795a15ae53351cbbd6177aaf94ffef",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/16267a5036173d0173377545b4b6021b081d0933",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/1bd12dfc058e1e68759d313d7727d68dbc1b8964",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/29d91820184d5cbc70f3246d4911d96eaeb930d6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/596a883c4ce2d2e9c175f25b98fed3a1f33fea38",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/77c41cdbe6bce476e08d3251c0d501feaf10a9f3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22007",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-03T08:15:16.347",
"lastModified": "2025-04-07T14:18:34.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:31:23.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,164 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: Correcci\u00f3n del c\u00f3digo de error en chan_alloc_skb_cb(). La funci\u00f3n chan_alloc_skb_cb() debe devolver indicadores de error en caso de error. Devolver NULL provocar\u00e1 una desreferencia a NULL."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.17",
"versionEndExcluding": "6.1.132",
"matchCriteriaId": "75945F99-E0BD-4883-BDBD-425B8D7E3BEF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.85",
"matchCriteriaId": "BCB56F36-C998-496A-A2E4-D9E0BB3A5BFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.21",
"matchCriteriaId": "3B63C450-D73B-4A53-9861-98E25C16E842"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.13",
"versionEndExcluding": "6.13.9",
"matchCriteriaId": "FAECBE4D-58CF-4836-BBAB-5E28B800A778"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc7:*:*:*:*:*:*",
"matchCriteriaId": "AD948719-8628-4421-A340-1066314BBD4A"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/72d061ee630d0dbb45c2920d8d19b3861c413e54",
"url": "https://git.kernel.org/stable/c/1bd68db7beb426ab5a45d81516ed9611284affc8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/72d061ee630d0dbb45c2920d8d19b3861c413e54",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/761b7c36addd22c7e6ceb05caaadc3b062d99faa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/76304cba8cba12bb10d89d016c28403a2dd89a29",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/788ae2ae4cf484e248b5bc29211c7ac6510e3e92",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a78692ec0d1e17a96b09f2349a028878f5b305e4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b3d607e36fef4bd05fb938a8a868ff70e9fedbe2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ecd06ad0823a90b4420c377ef8917e44e23ee841",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-22008",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-08T09:15:24.157",
"lastModified": "2025-04-08T18:13:53.347",
"lastModified": "2025-04-10T13:15:50.570",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -29,6 +29,14 @@
"url": "https://git.kernel.org/stable/c/2c7a50bec4958f1d1c84d19cde518d0e96a676fd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3a9c46af5654783f99015727ac65bc2a23e2735a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8e500180904aae63afdce95cb378aeabe119ecda",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/998b1aae22dca87da392ea35f089406cbef6032d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22009",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-08T09:15:24.460",
"lastModified": "2025-04-08T18:13:53.347",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:10:51.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,138 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: regulator: dummy: force synchronous sondeo a veces obtengo una desreferencia de puntero NULL en el momento del arranque en kobject_get() con la siguiente pila de llamadas: anatop_regulator_probe() devm_regulator_register() regulator_register() regulator_resolve_supply() kobject_get() Colocando algunas sentencias BUG_ON() adicionales pude verificar que esto se genera porque el sondeo del controlador del regulador 'dummy' no se completa ('dummy_regulator_rdev' sigue siendo NULL). En el depurador JTAG puedo ver que dummy_regulator_probe() y anatop_regulator_probe() pueden ser ejecutados por diferentes subprocesos del kernel (kworker/u4:*). No he investigado m\u00e1s si esto se puede cambiar o si hay otras posibilidades de forzar la sincronizaci\u00f3n entre estas dos rutinas de sondeo. Por otro lado, no espero mucha penalizaci\u00f3n en el tiempo de arranque al sondear el regulador 'dummy' sincr\u00f3nicamente."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4",
"versionEndExcluding": "6.6.85",
"matchCriteriaId": "713AEC20-B9F9-4756-851A-6C1BA3284678"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.21",
"matchCriteriaId": "3B63C450-D73B-4A53-9861-98E25C16E842"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.13",
"versionEndExcluding": "6.13.9",
"matchCriteriaId": "FAECBE4D-58CF-4836-BBAB-5E28B800A778"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc7:*:*:*:*:*:*",
"matchCriteriaId": "AD948719-8628-4421-A340-1066314BBD4A"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/5ade367b56c3947c990598df92395ce737bee872",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8619909b38eeebd3e60910158d7d68441fc954e9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d3b83a1442a09b145006eb4294b1a963c5345c9c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e26f24ca4fb940b15e092796c5993142a2558bd9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22010",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-08T09:15:24.777",
"lastModified": "2025-04-08T18:13:53.347",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:15:50.687",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -15,26 +15,159 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/hns: Se corrige el bloqueo suave durante el bucle de p\u00e1ginas bt. El controlador ejecuta un bucle for al asignar p\u00e1ginas bt y mapearlas con p\u00e1ginas de b\u00fafer. Al asignar un b\u00fafer grande (por ejemplo, un MR de m\u00e1s de 100 GB), puede requerirse un n\u00famero considerable de bucles. Esto provocar\u00e1 un bloqueo suave: watchdog: BUG: bloqueo suave - \u00a1CPU n.\u00ba 27 bloqueada durante 22 s! ... Rastreo de llamadas: hem_list_alloc_mid_bt+0x124/0x394 [hns_roce_hw_v2] hns_roce_hem_list_request+0xf8/0x160 [hns_roce_hw_v2] hns_roce_mtr_create+0x2e4/0x360 [hns_roce_hw_v2] alloc_mr_pbl+0xd4/0x17c [hns_roce_hw_v2] hns_roce_reg_user_mr+0xf8/0x190 [hns_roce_hw_v2] ib_uverbs_reg_mr+0x118/0x290 perro guardi\u00e1n: ERROR: bloqueo suave - \u00a1CPU n.\u00ba 35 bloqueada durante 23 s! ... Seguimiento de llamadas: hns_roce_hem_list_find_mtt+0x7c/0xb0 [hns_roce_hw_v2] mtr_map_bufs+0xc4/0x204 [hns_roce_hw_v2] hns_roce_mtr_create+0x31c/0x3c4 [hns_roce_hw_v2] alloc_mr_pbl+0xb0/0x160 [hns_roce_hw_v2] hns_roce_reg_user_mr+0x108/0x1c0 [hns_roce_hw_v2] ib_uverbs_reg_mr+0x120/0x2bc Agregue un cond_resched() para corregir el bloqueo suave durante estos bucles. Para no afectar el rendimiento de asignaci\u00f3n de un b\u00fafer de tama\u00f1o normal, establezca el recuento de bucles de un MR de 100 GB como el umbral para llamar a cond_resched()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.3",
"versionEndExcluding": "6.1.132",
"matchCriteriaId": "63D8EBD5-447E-46E5-A557-067E0CC053F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.85",
"matchCriteriaId": "BCB56F36-C998-496A-A2E4-D9E0BB3A5BFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.21",
"matchCriteriaId": "3B63C450-D73B-4A53-9861-98E25C16E842"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.13",
"versionEndExcluding": "6.13.9",
"matchCriteriaId": "FAECBE4D-58CF-4836-BBAB-5E28B800A778"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc7:*:*:*:*:*:*",
"matchCriteriaId": "AD948719-8628-4421-A340-1066314BBD4A"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/13a52f6c9ff99f7d88f81da535cb4e85eade662b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/25655580136de59ec89f09089dd28008ea440fc9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4104b0023ff66b5df900d23dbf38310893deca79",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/461eb4ddede266df8f181f578732bb01742c3fd6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/975355faba56c0751292ed15a90c3e2c7dc0aad6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9ab20fec7a1ce3057ad86afd27bfd08420b7cd11",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/efe544462fc0b499725364f90bd0f8bbf16f861a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22011",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-08T09:15:25.020",
"lastModified": "2025-04-08T18:13:53.347",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:10:41.140",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,124 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ARM: dts: bcm2711: Reparar xHCI power-domain Durante las pruebas s2idle en Raspberry CM4, el firmware de la VPU siempre falla en xHCI power-domain resume: root@raspberrypi:/sys/power# echo freeze &gt; state [ 70.724347] xhci_suspend finished [ 70.727730] xhci_plat_suspend finished [ 70.755624] bcm2835-power bcm2835-power: Apagar grafx [ 70.761127] USB: Establecer la energ\u00eda en 0 [ 74.653040] USB: No se pudo establecer la energ\u00eda en 1 (-110) Esto parece deberse al uso mixto de raspberrypi-power y bcm2835-power al mismo tiempo. Por lo tanto, evite el uso del controlador de dominio de energ\u00eda del firmware VPU, lo que evita el bloqueo de la VPU."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8",
"versionEndExcluding": "6.12.21",
"matchCriteriaId": "BF90340F-6FF6-4A1E-BAA7-7C640D39CCDD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.13",
"versionEndExcluding": "6.13.9",
"matchCriteriaId": "FAECBE4D-58CF-4836-BBAB-5E28B800A778"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc7:*:*:*:*:*:*",
"matchCriteriaId": "AD948719-8628-4421-A340-1066314BBD4A"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/393947e06867923d4c2be380d46efd03407a8ce2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b8a47aa0b3df701d0fc41b3caf78d00571776be0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f44fa354a0715577ca32b085f6f60bcf32c748dd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22012",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-08T09:15:25.420",
"lastModified": "2025-04-08T18:13:53.347",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:10:36.613",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,110 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Revertir \"arm64: dts: qcom: sdm845: Affirm IDR0.CCTW en apps_smmu\". Hay informes de que la coherencia de la cach\u00e9 del pagetable walker no es constante en todos los dispositivos SDM845/850, lo que provoca bloqueos y reinicios. Funciona correctamente en algunos dispositivos (como el Dragonboard 845c, pero no tanto en el Lenovo Yoga C630). Lamentablemente, esto parece ser un fallo en el desarrollo del firmware, ya que, probablemente en alg\u00fan lugar de la vasta pila de hipervisores, se introdujo un cambio para adaptarlo despu\u00e9s del lanzamiento inicial del software (que suele servir como base para los productos). Revertir el cambio para evitar conjeturas adicionales sobre fallos. Esto revierte el commit 6b31a9744b8726c69bb0af290f8475a368a4b805."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.13",
"versionEndExcluding": "6.13.9",
"matchCriteriaId": "FAECBE4D-58CF-4836-BBAB-5E28B800A778"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc7:*:*:*:*:*:*",
"matchCriteriaId": "AD948719-8628-4421-A340-1066314BBD4A"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/9e6e9fc90258a318d30b417bcccda908bb82ee9d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f00db31d235946853fb430de8c6aa1295efc8353",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22014",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-04-08T09:15:25.783",
"lastModified": "2025-04-08T18:13:53.347",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:15:50.823",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,160 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: soc: qcom: pdr: Corrige el posible bloqueo cuando alg\u00fan proceso de cliente A llama a pdr_add_lookup() para agregar la b\u00fasqueda para el servicio y realiza el trabajo del localizador de programaci\u00f3n, m\u00e1s tarde un proceso B obtiene un nuevo paquete de servidor que indica que el localizador est\u00e1 activo y llama a pdr_locator_new_server() que finalmente establece pdr-&gt;locator_init_complete en verdadero, lo que hace que el proceso A vea y tome el bloqueo de lista y consulte la lista de dominios, pero se agotar\u00e1 el tiempo de espera debido al bloqueo, ya que la respuesta se pondr\u00e1 en cola en el mismo qmi-&gt;wq y se ordenar\u00e1 workqueue y el proceso B no puede completar el nuevo trabajo de solicitud del servidor debido al bloqueo en el bloqueo de lista. Arr\u00e9glelo eliminando la iteraci\u00f3n de lista innecesaria, ya que la iteraci\u00f3n de lista ya se est\u00e1 realizando dentro del trabajo del localizador, as\u00ed que ev\u00edtelo aqu\u00ed y simplemente llame a schedule_work() aqu\u00ed. Proceso A Proceso B process_scheduled_works() pdr_add_lookup() qmi_data_ready_work() process_scheduled_works() pdr_locator_new_server() pdr-&gt;locator_init_complete=true; pdr_locator_work() mutex_lock(&amp;pdr-&gt;list_lock); pdr_locate_service() mutex_lock(&amp;pdr-&gt;list_lock); pdr_get_domain_list() pr_err(\"PDR: %s error en la espera de la transacci\u00f3n para obtener la lista de dominios: %d\\n\", req-&gt;service_name, ret); Registro de errores de tiempo de espera debido a un bloqueo: \"PDR: tms/servreg get domain list txn wait fallo: -110 PDR: service lookup for msm/adsp/sensor_pd:tms/servreg failed: -110\" Gracias a Bjorn y Johan por informarme que esta confirmaci\u00f3n tambi\u00e9n corrige una regresi\u00f3n de audio al usar el pd-mapper dentro del kernel, ya que eso hace que sea m\u00e1s f\u00e1cil alcanzar esta ejecuci\u00f3n. [1]"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.7",
"versionEndExcluding": "6.1.132",
"matchCriteriaId": "FC2AC519-3D9D-405E-B3B7-FFFCE9691EEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.85",
"matchCriteriaId": "BCB56F36-C998-496A-A2E4-D9E0BB3A5BFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.21",
"matchCriteriaId": "3B63C450-D73B-4A53-9861-98E25C16E842"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.13",
"versionEndExcluding": "6.13.9",
"matchCriteriaId": "FAECBE4D-58CF-4836-BBAB-5E28B800A778"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "186716B6-2B66-4BD0-852E-D48E71C0C85F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0D3E781C-403A-498F-9DA9-ECEE50F41E75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc3:*:*:*:*:*:*",
"matchCriteriaId": "66619FB8-0AAF-4166-B2CF-67B24143261D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc4:*:*:*:*:*:*",
"matchCriteriaId": "D3D6550E-6679-4560-902D-AF52DCFE905B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc5:*:*:*:*:*:*",
"matchCriteriaId": "45B90F6B-BEC7-4D4E-883A-9DBADE021750"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc6:*:*:*:*:*:*",
"matchCriteriaId": "1759FFB7-531C-41B1-9AE1-FD3D80E0D920"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.14:rc7:*:*:*:*:*:*",
"matchCriteriaId": "AD948719-8628-4421-A340-1066314BBD4A"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/02612f1e4c34d94d6c8ee75bf7d254ed697e22d4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0a566a79aca9851fae140536e0fc5b0853c90a90",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2eeb03ad9f42dfece63051be2400af487ddb96d2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/72a222b6af10c2a05a5fad0029246229ed8912c2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/daba84612236de3ab39083e62c9e326a654ebd20",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f2bbfd50e95bc117360f0f59e629aa03d821ebd6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f4489260f5713c94e1966e5f20445bff262876f4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-2408",
"sourceIdentifier": "cve@gitlab.com",
"published": "2025-04-10T13:15:51.760",
"lastModified": "2025-04-10T13:15:51.760",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue has been discovered in GitLab CE/EE affecting all versions from 13.12 before 17.8.7, 17.9 before 17.9.6, and 17.10 before 17.10.4. Under certain conditions users could bypass IP access restrictions and view sensitive information."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@gitlab.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1220"
}
]
}
],
"references": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/525323",
"source": "cve@gitlab.com"
},
{
"url": "https://hackerone.com/reports/3027775",
"source": "cve@gitlab.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-25197",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-04-10T13:15:51.017",
"lastModified": "2025-04-10T13:15:51.017",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Silverstripe Elemental extends a page type to swap the content area for a list of manageable elements to compose a page out of rather than a single text field. An elemental block can include an XSS payload, which can be executed when viewing the \"Content blocks in use\" report. The vulnerability is specific to that report and is a result of failure to cast input prior to including it in the grid field. This vulnerability is fixed in 5.3.12."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/silverstripe/silverstripe-elemental/commit/34ff4ed498ccab94cc5f55ef9a56c37f491eda1d",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/silverstripe/silverstripe-elemental/security/advisories/GHSA-x8xm-c7p8-2pj2",
"source": "security-advisories@github.com"
},
{
"url": "https://www.silverstripe.org/download/security-releases/CVE-2025-25197",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25505",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-21T17:15:14.333",
"lastModified": "2025-02-21T21:15:23.723",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:37:15.333",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac6_firmware:15.03.05.16_multi:*:*:*:*:*:*:*",
"matchCriteriaId": "D0E5BB82-F2E3-4BB9-AE3C-267D3462CA96"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00830EE1-D0BB-462E-9F15-4E59560C14B8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/tendaAC6_getRootStatus_callback_overflow/detail.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25507",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-21T17:15:14.453",
"lastModified": "2025-02-21T21:15:23.870",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:37:05.443",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac6_firmware:15.03.05.16_multi:*:*:*:*:*:*:*",
"matchCriteriaId": "D0E5BB82-F2E3-4BB9-AE3C-267D3462CA96"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00830EE1-D0BB-462E-9F15-4E59560C14B8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/tendaAC6_formexecommand_cmdinput_rce/detail.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25510",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-21T17:15:14.567",
"lastModified": "2025-02-21T21:15:24.023",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:36:28.503",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac8_firmware:16.03.34.06:*:*:*:*:*:*:*",
"matchCriteriaId": "9C1D64DC-1EDC-4F62-8D22-E1890B71843C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C81F1E48-0204-4478-A937-5D40CDD9E5E4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/tendaAC8_get_parentControl_list_Info_urls_overflow/detail.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25676",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T23:15:12.977",
"lastModified": "2025-02-21T18:16:04.577",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:37:42.663",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:i12_firmware:1.0.0.10\\(3805\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0E6E20A8-02F4-4FF2-8C88-54D27D50515D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:i12:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79D3B1CC-FB4E-40F3-B175-F70F5A44C447"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/i12V1/wifiSSIDget.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25678",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T23:15:13.077",
"lastModified": "2025-02-21T18:16:08.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:37:33.913",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:i12_firmware:1.0.0.10\\(3805\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0E6E20A8-02F4-4FF2-8C88-54D27D50515D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:i12:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79D3B1CC-FB4E-40F3-B175-F70F5A44C447"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/i12V1/setcfm.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25679",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-20T23:15:13.183",
"lastModified": "2025-02-24T18:15:19.213",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-04-10T13:37:24.763",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:i12_firmware:1.0.0.10\\(3805\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0E6E20A8-02F4-4FF2-8C88-54D27D50515D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:i12:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79D3B1CC-FB4E-40F3-B175-F70F5A44C447"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/jangfan/my-vuln/blob/main/Tenda/i12V1/WifiMacFilterSet.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27812",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-10T13:15:51.220",
"lastModified": "2025-04-10T13:15:51.220",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "MSI Center before 2.0.52.0 allows TOCTOU Local Privilege Escalation."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.4,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-367"
}
]
}
],
"references": [
{
"url": "https://csr.msi.com/global/product-security-advisories",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27813",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-10T13:15:51.577",
"lastModified": "2025-04-10T13:15:51.577",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "MSI Center before 2.0.52.0 has Missing PE Signature Validation."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.4,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
],
"references": [
{
"url": "https://csr.msi.com/global/product-security-advisories",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-30148",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-04-10T13:15:51.930",
"lastModified": "2025-04-10T13:15:51.930",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Silverstripe Framework is a PHP framework which powers the Silverstripe CMS. Prior to 5.3.23, bad actor with access to edit content in the CMS could send a specifically crafted encoded payload to the server, which could be used to inject a JavaScript payload on the front end of the site. The payload would be sanitized on the client-side, but server-side sanitization doesn't catch it. The server-side sanitization logic has been updated to sanitize against this attack. This vulnerability is fixed in 5.3.23."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/silverstripe/silverstripe-framework/commit/e99cfd62d160d145a76fcf9631e6b11226e42358",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/silverstripe/silverstripe-framework/security/advisories/GHSA-rhx4-hvx9-j387",
"source": "security-advisories@github.com"
},
{
"url": "https://www.silverstripe.org/download/security-releases/cve-2025-30148",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-30204",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-21T22:15:26.420",
"lastModified": "2025-04-04T23:15:42.443",
"lastModified": "2025-04-10T13:15:52.097",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "golang-jwt is a Go implementation of JSON Web Tokens. Prior to \n5.2.2 and 4.5.2, the function parse.ParseUnverified splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request whose Authorization header consists of Bearer followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This issue is fixed in 5.2.2 and 4.5.2."
"value": "golang-jwt is a Go implementation of JSON Web Tokens. Starting in version 3.2.0 and prior to versions 5.2.2 and 4.5.2, the function parse.ParseUnverified splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request whose Authorization header consists of Bearer followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This issue is fixed in 5.2.2 and 4.5.2."
},
{
"lang": "es",
@ -56,6 +56,10 @@
"url": "https://github.com/golang-jwt/jwt/commit/0951d184286dece21f73c85673fd308786ffe9c3",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/golang-jwt/jwt/commit/bf316c48137a1212f8d0af9288cc9ce8e59f1afb",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/golang-jwt/jwt/security/advisories/GHSA-mh63-6h87-95cp",
"source": "security-advisories@github.com"

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-32754",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2025-04-10T12:15:16.280",
"lastModified": "2025-04-10T12:15:16.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In jenkins/ssh-agent Docker images 6.11.1 and earlier, SSH host keys are generated on image creation for images based on Debian, causing all containers based on images of the same version use the same SSH host keys, allowing attackers able to insert themselves into the network path between the SSH client (typically the Jenkins controller) and SSH build agent to impersonate the latter."
}
],
"metrics": {},
"references": [
{
"url": "https://www.jenkins.io/security/advisory/2025-04-10/#SECURITY-3565",
"source": "jenkinsci-cert@googlegroups.com"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2025-32755",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2025-04-10T12:15:16.547",
"lastModified": "2025-04-10T12:15:16.547",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In jenkins/ssh-slave Docker images based on Debian, SSH host keys are generated on image creation for images based on Debian, causing all containers based on images of the same version use the same SSH host keys, allowing attackers able to insert themselves into the network path between the SSH client (typically the Jenkins controller) and SSH build agent to impersonate the latter."
}
],
"metrics": {},
"references": [
{
"url": "https://www.jenkins.io/security/advisory/2025-04-10/#SECURITY-3565",
"source": "jenkinsci-cert@googlegroups.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-04-10T12:00:22.947651+00:00
2025-04-10T14:00:20.548884+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-04-10T11:15:45.830000+00:00
2025-04-10T13:52:09.533000+00:00
```
### Last Data Feed Release
@ -33,26 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
289519
289529
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `10`
- [CVE-2025-22374](CVE-2025/CVE-2025-223xx/CVE-2025-22374.json) (`2025-04-10T11:15:44.587`)
- [CVE-2025-22375](CVE-2025/CVE-2025-223xx/CVE-2025-22375.json) (`2025-04-10T11:15:45.510`)
- [CVE-2025-23386](CVE-2025/CVE-2025-233xx/CVE-2025-23386.json) (`2025-04-10T10:15:14.697`)
- [CVE-2025-27350](CVE-2025/CVE-2025-273xx/CVE-2025-27350.json) (`2025-04-10T11:15:45.660`)
- [CVE-2025-31411](CVE-2025/CVE-2025-314xx/CVE-2025-31411.json) (`2025-04-10T11:15:45.830`)
- [CVE-2024-11129](CVE-2024/CVE-2024-111xx/CVE-2024-11129.json) (`2025-04-10T13:15:43.993`)
- [CVE-2025-1073](CVE-2025/CVE-2025-10xx/CVE-2025-1073.json) (`2025-04-10T12:15:15.097`)
- [CVE-2025-1677](CVE-2025/CVE-2025-16xx/CVE-2025-1677.json) (`2025-04-10T13:15:46.473`)
- [CVE-2025-2408](CVE-2025/CVE-2025-24xx/CVE-2025-2408.json) (`2025-04-10T13:15:51.760`)
- [CVE-2025-25197](CVE-2025/CVE-2025-251xx/CVE-2025-25197.json) (`2025-04-10T13:15:51.017`)
- [CVE-2025-27812](CVE-2025/CVE-2025-278xx/CVE-2025-27812.json) (`2025-04-10T13:15:51.220`)
- [CVE-2025-27813](CVE-2025/CVE-2025-278xx/CVE-2025-27813.json) (`2025-04-10T13:15:51.577`)
- [CVE-2025-30148](CVE-2025/CVE-2025-301xx/CVE-2025-30148.json) (`2025-04-10T13:15:51.930`)
- [CVE-2025-32754](CVE-2025/CVE-2025-327xx/CVE-2025-32754.json) (`2025-04-10T12:15:16.280`)
- [CVE-2025-32755](CVE-2025/CVE-2025-327xx/CVE-2025-32755.json) (`2025-04-10T12:15:16.547`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `86`
- [CVE-2024-28983](CVE-2024/CVE-2024-289xx/CVE-2024-28983.json) (`2025-04-10T10:40:31.943`)
- [CVE-2025-2196](CVE-2025/CVE-2025-21xx/CVE-2025-2196.json) (`2025-04-10T10:53:23.660`)
- [CVE-2025-21984](CVE-2025/CVE-2025-219xx/CVE-2025-21984.json) (`2025-04-10T13:25:15.120`)
- [CVE-2025-21989](CVE-2025/CVE-2025-219xx/CVE-2025-21989.json) (`2025-04-10T13:25:07.567`)
- [CVE-2025-21990](CVE-2025/CVE-2025-219xx/CVE-2025-21990.json) (`2025-04-10T13:25:01.577`)
- [CVE-2025-21991](CVE-2025/CVE-2025-219xx/CVE-2025-21991.json) (`2025-04-10T13:24:35.230`)
- [CVE-2025-21992](CVE-2025/CVE-2025-219xx/CVE-2025-21992.json) (`2025-04-10T13:15:49.053`)
- [CVE-2025-21993](CVE-2025/CVE-2025-219xx/CVE-2025-21993.json) (`2025-04-10T13:24:10.787`)
- [CVE-2025-21994](CVE-2025/CVE-2025-219xx/CVE-2025-21994.json) (`2025-04-10T13:15:49.333`)
- [CVE-2025-21996](CVE-2025/CVE-2025-219xx/CVE-2025-21996.json) (`2025-04-10T13:15:49.453`)
- [CVE-2025-21999](CVE-2025/CVE-2025-219xx/CVE-2025-21999.json) (`2025-04-10T13:15:49.693`)
- [CVE-2025-22004](CVE-2025/CVE-2025-220xx/CVE-2025-22004.json) (`2025-04-10T13:15:49.917`)
- [CVE-2025-22005](CVE-2025/CVE-2025-220xx/CVE-2025-22005.json) (`2025-04-10T13:15:50.153`)
- [CVE-2025-22007](CVE-2025/CVE-2025-220xx/CVE-2025-22007.json) (`2025-04-10T13:31:23.433`)
- [CVE-2025-22008](CVE-2025/CVE-2025-220xx/CVE-2025-22008.json) (`2025-04-10T13:15:50.570`)
- [CVE-2025-22009](CVE-2025/CVE-2025-220xx/CVE-2025-22009.json) (`2025-04-10T13:10:51.817`)
- [CVE-2025-22010](CVE-2025/CVE-2025-220xx/CVE-2025-22010.json) (`2025-04-10T13:15:50.687`)
- [CVE-2025-22011](CVE-2025/CVE-2025-220xx/CVE-2025-22011.json) (`2025-04-10T13:10:41.140`)
- [CVE-2025-22012](CVE-2025/CVE-2025-220xx/CVE-2025-22012.json) (`2025-04-10T13:10:36.613`)
- [CVE-2025-22014](CVE-2025/CVE-2025-220xx/CVE-2025-22014.json) (`2025-04-10T13:15:50.823`)
- [CVE-2025-25505](CVE-2025/CVE-2025-255xx/CVE-2025-25505.json) (`2025-04-10T13:37:15.333`)
- [CVE-2025-25507](CVE-2025/CVE-2025-255xx/CVE-2025-25507.json) (`2025-04-10T13:37:05.443`)
- [CVE-2025-25510](CVE-2025/CVE-2025-255xx/CVE-2025-25510.json) (`2025-04-10T13:36:28.503`)
- [CVE-2025-25676](CVE-2025/CVE-2025-256xx/CVE-2025-25676.json) (`2025-04-10T13:37:42.663`)
- [CVE-2025-25678](CVE-2025/CVE-2025-256xx/CVE-2025-25678.json) (`2025-04-10T13:37:33.913`)
- [CVE-2025-25679](CVE-2025/CVE-2025-256xx/CVE-2025-25679.json) (`2025-04-10T13:37:24.763`)
- [CVE-2025-30204](CVE-2025/CVE-2025-302xx/CVE-2025-30204.json) (`2025-04-10T13:15:52.097`)
## Download and Usage

View File

@ -187791,7 +187791,7 @@ CVE-2021-47485,0,0,c3b0e3c72dfce312116a02c117217dcd2204d4cc1ff6d84a7d0941be2c708
CVE-2021-47486,0,0,5fdbd5c225c12c40df3e77ebee31acb93d11be5e6abbb1e964ee7922a63cbad5,2025-04-01T18:40:11.830000
CVE-2021-47487,0,0,37fda3dbde69565646173f301baa99f70441700610bcbfc8402f3e27ab23c916,2024-05-28T19:15:08.983000
CVE-2021-47488,0,0,6bd518faf568ee263bd5be6b79978583251019752295859beb9e265d517b8683,2024-12-05T14:15:18.520000
CVE-2021-47489,0,0,7a56ba536c26f6b77795729fd8e0581a390a0f0ae03d489f7fb50e689f3ce146,2025-01-06T19:53:35.453000
CVE-2021-47489,0,1,e5e97ed77edaecabb122ac9d25079a20e27070fa9382ba2c97f9423bd9569ea7,2025-04-10T13:15:42.480000
CVE-2021-47490,0,0,151ef266838c7722eaa82f178f6718ea223752e3cd4c4dc0ef3927c3dea46501,2025-01-24T16:15:28.487000
CVE-2021-47491,0,0,a7ae681a6beb6f8d9fda8dae0b15459feddf1ede34bb94ccc2241694dd76ab3c,2024-11-21T06:36:19.300000
CVE-2021-47492,0,0,e82c8d015c8bb1bcf824fdaff87708e8950e6b9aad1aae2306eadf8a5f0445b9,2024-11-21T06:36:19.453000
@ -213237,7 +213237,7 @@ CVE-2022-49041,0,0,a98f649e96ac9b0759657a1878fe20db3a57b93d993dafffc5b04e911a2c6
CVE-2022-49043,0,0,7174066d58537267d7d2a315cb17b3519790e5764e973f2a3d77df9ee2584f26,2025-01-26T06:15:21
CVE-2022-49044,0,0,6ed32926adedba89f126484c75e18cfdf819ac2c1ea9dd886f1ccc61fd4776c5,2025-02-26T07:00:41.680000
CVE-2022-49045,0,0,22b344a7121cb72fa2f5cfafcc1e2e6a7a43841d65552a779c8562575cc2777e,2025-03-02T15:15:11.130000
CVE-2022-49046,0,0,e14bb62bb5c4ef922ca02ea14695ac830a3e2d90d9aecaae6883187fbe14dc14,2025-03-18T18:53:16.010000
CVE-2022-49046,0,1,04cb20eaf688343c98775dee68737012113a4d6c197bc78d0e1cc28d6706d03b,2025-04-10T13:15:43.390000
CVE-2022-49047,0,0,06a0675e3a2bb09c868545b6aeccb4a3aa9fd8b5540f9daa0a638499223814f0,2025-03-24T17:45:00.503000
CVE-2022-49048,0,0,6b0293b39167cefced476c56c5a719f8c6f3031bdc41a90b543af091df2cd564,2025-02-26T07:00:42.073000
CVE-2022-49049,0,0,a0e2a6e75b995dc29c6db9bafbfc88733666b9ff79fe3f9825a45d83ef498b65,2025-02-26T07:00:42.170000
@ -213785,7 +213785,7 @@ CVE-2022-49542,0,0,863a703007a9c0e9dbcb00e8e45a44701779a89376fd639be008eff59f404
CVE-2022-49543,0,0,a2ff81fe4ecfd6d2c99f742689972c0459a5cc013925198ed509c20be2719fe3,2025-02-26T07:01:30.220000
CVE-2022-49544,0,0,5988bb26e2e446b290393c3cc9bf778787200e992f2f045eed77ba96a746c13b,2025-03-10T21:14:07.310000
CVE-2022-49545,0,0,b15dc44bc69453ab505d9e12bbaa1084c25940152f37f845605fc32cd0bb5d2b,2025-02-26T07:01:30.410000
CVE-2022-49546,0,0,9db288b75a4bc37eda3f91457915a5f2cb19437085834c7170e6eb68d5a4aba6,2025-03-10T21:13:19.010000
CVE-2022-49546,0,1,1ea0bf89434f171a8bbad2fcf1f6cef52f12a4476f8586b7f1cec342930df40a,2025-04-10T13:15:43.550000
CVE-2022-49547,0,0,bf91592a6ea9d3297ec475e4b4e1884ec82cd0f6e9372bcf754c0fc99e0b8008,2025-03-10T21:31:42.100000
CVE-2022-49548,0,0,538a83d5bcbbf07561692d7896fba478b67ca68a4698427f780db7881bcef0ce,2025-03-10T21:32:17.530000
CVE-2022-49549,0,0,074710b7b679b559935feb1d1793c1c13989b69406fd0db1afcbdf3fe4448af3,2025-03-10T21:22:55.893000
@ -213884,7 +213884,7 @@ CVE-2022-49632,0,0,4b3ddbcd6e99112a14b1d0d15b4a55d6ffcf904e20543fc53bdd02d41a726
CVE-2022-49633,0,0,4ba30ca48b1edc5e0452ab8c92da1c2943d14fb49afbcda58ca859e3b3614030,2025-03-11T22:30:02.070000
CVE-2022-49634,0,0,ebab5f31cea1424a123b00edb8767e2f521abd2b8a08a8c1c408be7a6ea265b6,2025-03-11T22:30:25.060000
CVE-2022-49635,0,0,acb2b4ba624516c0ac8db97854d6e55fff9e0d10b1b963077ffc8057b1f5357d,2025-02-26T07:01:38.733000
CVE-2022-49636,0,0,e0926e6ab6c6e0f096d9d615b429e153828cdcd16e8b34a18aa9a897fa63ec4f,2025-03-11T22:30:51.930000
CVE-2022-49636,0,1,e97602dcbdba3ba2c4a2ee9444c4f1408607b7f940162fda9b91209e8cfb691a,2025-04-10T13:15:43.703000
CVE-2022-49637,0,0,9027b4f7d029a8c815ccead00969fde3d6f42c3593acff0f1358df06c4ae2135,2025-03-11T22:31:54.830000
CVE-2022-49638,0,0,aaccf2d0288ecb5d50a7db5e435435a85acc0e4b401c3faec5642be2fa0b81be,2025-03-11T22:32:25.430000
CVE-2022-49639,0,0,2872a61e50d5d2649c3b2cbc1c2340bd6630ae6c1e0401d7e89b3be31364e209,2025-03-11T22:32:47.653000
@ -213984,7 +213984,7 @@ CVE-2022-49724,0,0,efc0d3ca60fd176a13b507aa32cba7a06a89275a3635b3f298e22e254725d
CVE-2022-49725,0,0,dfc4d7c7244b5ce77d797ad8c2589087bf82a53692cdd826d90712ee09ecbe80,2025-02-26T07:01:48.167000
CVE-2022-49726,0,0,606c6295e0bb15f5d7656b6d044331f12ac39ea63b46e31eded08705796f7ad3,2025-02-26T07:01:48.257000
CVE-2022-49727,0,0,86d892eb2b4d5486fa753645163351daf0df98bfd43331ab51edaa2864709432,2025-03-07T20:46:49.640000
CVE-2022-49728,0,0,be8b36859c5df39e087e3c87f6af82c75fa13b4691014b4b45d967929d24790f,2025-03-07T20:46:17.810000
CVE-2022-49728,0,1,33354ce7c0db0b90e067d9932880f3957ff0c25e6f687e93a3af734a77c49a04,2025-04-10T13:15:43.850000
CVE-2022-49729,0,0,e48a3be5fb2cbf03e06d131b53a87c238c82a334d906fa5a52dc268a71346716,2025-03-07T20:46:08.627000
CVE-2022-4973,0,0,3f7bb8af7d8ad41d4b8c2b6df6303f0dad9415526c1ebfae5140748d302176bc,2024-10-30T15:58:30.907000
CVE-2022-49730,0,0,e4380c0e0399cfc6b375388279705da8be09a1a2fdffe485a89fe9faccc26dde,2025-03-24T19:32:33.903000
@ -245597,6 +245597,7 @@ CVE-2024-11125,0,0,5cdfc72ee0f7492b4e9628eeaf9152e6ef42160a0f2c4c0356b7c19730f5b
CVE-2024-11126,0,0,d3417195eb476ae6cb845b53d00a316d0079025df004bdf6318edd96e9a02f83,2024-11-12T15:48:59.103000
CVE-2024-11127,0,0,8ab8a7a02ec26c5b2661934596816ed78bd98367b1f4c52ffc4a58bf6fa51adf,2024-11-15T17:29:43.450000
CVE-2024-11128,0,0,3daf53c78cf58dd1f31203728c75baa1e7b77755676f9f011daf94fe4d0761b7,2025-02-11T21:38:28.860000
CVE-2024-11129,1,1,4e25a389c50250a115d2fc2e6207ce6f557424a3adcc2d65ada128493ed75179,2025-04-10T13:15:43.993000
CVE-2024-1113,0,0,90572d47b15d75a1b5b46414b43b02fcca134882a5755a9a69a3d4ba79038a2d,2024-11-21T08:49:49.557000
CVE-2024-11130,0,0,cf5ea4272974c91c76344000d998fe4730aaf36f216ea2c15de856330a45b0d3,2024-11-15T17:57:53.270000
CVE-2024-11131,0,0,2d746fe67354aead39f652aab9a1911afa4410d30fdc6cdddc0cd4f6d1bf1689,2025-03-19T03:15:12.850000
@ -245680,7 +245681,7 @@ CVE-2024-11214,0,0,ce293b49fa3792aed1bdef0278728de22346b7c8c6fd060fecdb1a211d7c2
CVE-2024-11215,0,0,649934bde3315408f935571e43aced9541face2e1cac41750a3378db1c35aaf3,2024-11-15T13:58:08.913000
CVE-2024-11216,0,0,1790dce4ed18369b069802903838bd872fdd72a0844adda5fdce5af19cc6cdfc,2025-03-05T13:15:11.493000
CVE-2024-11217,0,0,cb24a1bdb987ee2ebd888113abdd2cecfb9cb2fe9a3dca74044179030beb620c,2024-11-18T17:11:56.587000
CVE-2024-11218,0,0,a0e3b0e7dacab6fce6f750a083c630728558a86c9a67ee10ce93c4745ce16a69,2025-03-20T08:15:11.387000
CVE-2024-11218,0,1,3a88d46b656657a009c20616334af82c6a5c9f4a8d5f9447ad9e6da8e87c6919,2025-04-10T13:15:44.270000
CVE-2024-11219,0,0,e0425cf1f1ca40cc6d95ef04e03e17b5776d09d72a88fcf5abbcb2ac00f59570,2024-11-27T06:15:18.110000
CVE-2024-1122,0,0,4a647161edb6d6dbac08921722ee9f0f3f3f764af2a44d6cd56ac17a7d3d92e5,2024-11-21T08:49:50.943000
CVE-2024-11220,0,0,bea01215af1b0ab3953945bb3fe68c48439557338f0129d7423ffdb58e634441,2025-01-23T16:54:24.970000
@ -246752,7 +246753,7 @@ CVE-2024-12272,0,0,cbbb238a5fc49c4ada4f96dbd5ec3bf6a1bab33a6ad37ef5b0235e516631a
CVE-2024-12274,0,0,754c33d384166421b8530c0b6be4d1f50e294eb962f01142a13c10f72064a9a9,2025-01-13T15:15:07.727000
CVE-2024-12275,0,0,b6c89aad753f4288f4ee3eb48d039165a7e55489cd8f246e0432f82458e25832,2025-01-31T17:15:11.957000
CVE-2024-12276,0,0,e5bd927071e71d6948c4a1baa287eb37d95c029623029cf811ef1986567a19e1,2025-02-25T03:34:14.477000
CVE-2024-12278,0,0,e45bf47890a6d8cc4e719f9f41cde6d13c31f30dfd914d9900b33a305c2dde62,2025-04-01T20:26:11.547000
CVE-2024-12278,0,1,698802398108e48d2748839deab49eb5899a7cf37af29e7cb662cc650b72da8b,2025-04-10T13:19:57.677000
CVE-2024-12279,0,0,28f926ab6f57c2b10bee59d6914cc0152fa6a23fa0d172ad6d11e3d9d407b5c2,2025-01-04T12:15:24.453000
CVE-2024-1228,0,0,d9ad08a0c1348634a61421c1ad7147deaf6d1d0acee23e78628f7298f108b1d0,2024-11-21T08:50:06.280000
CVE-2024-12280,0,0,877a1ef9090370a5789c2e7362afe046232f3567d1b51a01b5cd894549fa6293,2025-01-28T21:15:16.317000
@ -248838,7 +248839,7 @@ CVE-2024-1890,0,0,d1bd71354155e1057cad63e8547d7592dd6f60af83171fbee879c3e6a6bee0
CVE-2024-1891,0,0,dcda7dbd0536cad9a123f74188eb37534068ccd38871f23683261bf2dbf9ff5c,2024-11-21T08:51:32.257000
CVE-2024-1892,0,0,4a1195240e748e8dae2a5af3f5833d450cffa01d5b35acc474269a2ba782070f,2025-01-10T14:49:33.690000
CVE-2024-1893,0,0,0ec8c49fd71ae75323e3eb052e6c32aa986dbf45b2fbc40f25b1de1b4b42a104,2025-02-05T15:47:12.477000
CVE-2024-1894,0,0,96e3f13e61fecb6effccd91c33ddd0a7615189cebcdd707b62da27767e0e825f,2024-11-21T08:51:32.663000
CVE-2024-1894,0,1,1807d21469e4d8fe1d83a9d3fd6ae7ab03d78c02a1c2cb789621e802bd7b9f9c,2025-04-10T13:09:48.177000
CVE-2024-1895,0,0,26e84ec6e5546710286d3b9f9721406f4ace26cc5a95ff4541082e7035836dba,2024-11-21T08:51:32.783000
CVE-2024-1896,0,0,8af444bce22399cef0b2866c9e5156b5e29038809da87baf205b4cbcccca1ea3,2024-11-21T08:51:32.917000
CVE-2024-1897,0,0,67d87c13c5ecef27a8c7d05c9fe60fa40e1af48fc634d9ba72f95351d0f4bc02,2024-11-21T08:51:33.080000
@ -252521,9 +252522,9 @@ CVE-2024-24478,0,0,2f2fdb5fa1337d22ac843f81ba1ce39141b97e9032b431f4b4d01123d3e2f
CVE-2024-24479,0,0,d23722f45724922e6375aa72c9e0a89b9ca4990974a83c5207bae0732f14756b,2024-11-21T08:59:19.487000
CVE-2024-2448,0,0,b72152a181016885656f49dc793056e8622b9a5f5c36acbb7ebb4ccedd62c703,2025-02-11T17:39:30.057000
CVE-2024-24482,0,0,12f9ca99fe14b8dda09119e5a9c90e05dba78cd2403be2772decceaf915ffd35,2024-11-21T08:59:19.703000
CVE-2024-24485,0,0,edb15103838b4290d82ef926a4b737308a8d5ae0e7a7d56a6d99e2a8fe1e2595,2024-11-21T08:59:19.923000
CVE-2024-24486,0,0,981c8b21084a9736390d8e21e024f0c6dc79e2589100b122227166b9aa39ccd4,2024-11-21T08:59:20.127000
CVE-2024-24487,0,0,c03a37b2d2e34877febbe733e8847f5c3b3338349c95e0c8342f422e87df8d14,2024-11-21T08:59:20.347000
CVE-2024-24485,0,1,8b3bc69501fdccb37483d3dad8b2008e6c17d56923656298965f794c72758f89,2025-04-10T13:39:04.063000
CVE-2024-24486,0,1,edf4c4082ecf075b163f0a734e3b03d9e81a9a3ce6788f50621186f7694f47d3,2025-04-10T13:39:57.420000
CVE-2024-24487,0,1,6336ce0210f6b19b06f24f3022017cb316f38b4c761c734f0dffcfce0a4fe08a,2025-04-10T13:39:33.260000
CVE-2024-24488,0,0,bf27efb75bde32f281cfc397e5872b525b860bf9883f0dd43f8ff534d29e927f,2024-11-21T08:59:20.560000
CVE-2024-2449,0,0,81d8209e3a4b4be2ff45b2d18df08ecaeeaf5bbb2c00601fbdbf659de2857374,2025-02-10T19:33:51.660000
CVE-2024-24494,0,0,e820126456d1359a29535bf199fa64cca1038460c8c9a0d8e536e796c70a1560,2024-11-21T08:59:20.727000
@ -254406,7 +254407,7 @@ CVE-2024-26924,0,0,886f6b821c546aee86fec9744bc96266ad9a19a26988a8248529bfd0a9714
CVE-2024-26925,0,0,20888a15d1cf5a1e8e5e70a7116e306e3a92356ef2a117e4a8c708c88ea6472e,2024-11-21T09:03:23.883000
CVE-2024-26926,0,0,1b156d894496658533a56f98b1f816c7f7a219acb93a64935886f571f23e2261,2024-11-21T09:03:24.013000
CVE-2024-26927,0,0,657f6ac07f07e979c4dc034152d7e370a0a0fb55f39411c529a1c929303181fb,2025-03-21T14:50:08.323000
CVE-2024-26928,0,0,12e429c2f9b4063e83fe9375ac72719500e95092853217831d1e8baf0db3cf10,2025-01-07T16:44:17.763000
CVE-2024-26928,0,1,1b9f62c296c5215726dce86600f9e4ed70592e4ce94e3c753cd5222f0e4cb986,2025-04-10T13:15:44.527000
CVE-2024-26929,0,0,022a77a2924a8c7f211d44200437bd4faa4bef4be671f225beb2a6c72269b938,2025-01-06T17:15:15.537000
CVE-2024-2693,0,0,452ca8cd515c59ca1cd15ca2894e9f69af6463e79c7e90d82b67b288f52c52bd,2024-11-21T09:10:18.520000
CVE-2024-26930,0,0,5c5e492cbbabf155f512e5ced37eff47855bb0f1c44103a53d05e3c1ca2fbb69,2025-03-07T20:28:49.953000
@ -255995,7 +255996,7 @@ CVE-2024-2898,0,0,4e3255cbb3d949cb224ace5d36c85a1998408ab17d3e02741e60cfdc4b4e67
CVE-2024-28980,0,0,b332b411a06b692726a898dc70ba347fa765408ba3744c575f760eb4ad7da2cc,2025-02-04T15:55:29.643000
CVE-2024-28981,0,0,692b15f24059cba73d7928530e872749524473b415389822d7c1810b6de68905,2024-09-12T12:35:54.013000
CVE-2024-28982,0,0,293d85a1eda8daf3f0e9e42b82681e8e9ccfbfdcf941f77ed8a2fd39fc8cc421,2024-11-21T09:07:19.063000
CVE-2024-28983,0,1,eb8e5b25f633cb1a3d5b5c92c2bd40adffb2a0b1c20e39836bb1dc9d893acfce,2025-04-10T10:40:31.943000
CVE-2024-28983,0,0,eb8e5b25f633cb1a3d5b5c92c2bd40adffb2a0b1c20e39836bb1dc9d893acfce,2025-04-10T10:40:31.943000
CVE-2024-28984,0,0,e221ea1e0ed5d84a917cf65a0a3924161f9f1b60c50e39e56b41be334f33064d,2024-11-21T09:07:19.380000
CVE-2024-28986,0,0,04047c53e92796f6c88df692b7a4dee29fbd1f79089034259bae8c2d933c1c88,2024-08-16T15:04:28.150000
CVE-2024-28987,0,0,eb1d6e8c195369e8160428cb16da1b0c3f28c82362eb42d58d03aebe865d58d1,2024-11-29T16:34:47.650000
@ -257493,13 +257494,13 @@ CVE-2024-30980,0,0,445b7442c0504da0cd120e15a1506c58995179046ed8aadcb7fb911051401
CVE-2024-30981,0,0,e82dbc1375cb06da94d8e738befede8152cb00373d101b74d631f0c8bfd118b2,2025-04-07T16:52:04.923000
CVE-2024-30982,0,0,429b39d0352421ce21535f6840c0e60389928948f8d6932f1fc4ce34c8fe3441,2025-04-07T16:51:50.190000
CVE-2024-30983,0,0,493424e898bfbc27a38d1bedad83fbf31ed3f18aed4a52038dcc451373d8c2a4,2025-04-07T16:51:56.873000
CVE-2024-30985,0,0,53b6d11d0b5229b5ef6a6404b100767907293ef3c8f06506c7d95daf0a979cff,2024-11-21T09:12:40.320000
CVE-2024-30986,0,0,56ebbe01089e1d40ff4141e3ec1bfe68fcc0ad13c447fab4911618b70cf8f128,2024-11-21T09:12:40.523000
CVE-2024-30987,0,0,a5ce4d2878d5a58f0882f951b58326d185c725b02a788ac452e1dd57c6400cdf,2024-11-21T09:12:40.740000
CVE-2024-30988,0,0,98fe79b5b4b40366d8bf44556cde94e9937c8a3eb3ee0de1c9c1a8dbcf73231d,2024-11-21T09:12:40.960000
CVE-2024-30989,0,0,5193014e1d857ee868fd656f536465155811fbb26dc5ad4dfe2d1c61b0f8454b,2025-03-14T17:15:44.497000
CVE-2024-30985,0,1,a202a47926f58da9fa6c1e80d5d79c5ffad430534d886db1b6eb761747dbb2a8,2025-04-10T13:41:14.657000
CVE-2024-30986,0,1,0d1b72cce7050b52a6cb60306f2bbbcfd9e0f75e16ea28770de2daf488609ec8,2025-04-10T13:41:10.500000
CVE-2024-30987,0,1,7e81600751d385c5689e3d408d345101be0e06558aee145076c12b6bf90573f2,2025-04-10T13:41:06.233000
CVE-2024-30988,0,1,0e9199a37fdc36b5bf24cc5286a904516208a6dc8c3fed21ce22a058ff1ea756,2025-04-10T13:41:00.560000
CVE-2024-30989,0,1,e807a9ddc313c5cd0c704c73a50c7741c5442afc91998124cfeb2d69a946e799,2025-04-10T13:40:46.917000
CVE-2024-3099,0,0,59d22247c570b34ac1d76d0f25cbd06d81f3cabd618a3d6d6de947af2738f741,2024-11-21T09:28:53.953000
CVE-2024-30990,0,0,cfab82707056b4296a40c38caae7406dc6f7ad2bafe5f6596c78a1f412f3e82d,2024-11-21T09:12:41.300000
CVE-2024-30990,0,1,f6a499c8794b6cbfdd38c0a5344f4ea692c7c0b5f064313de4e62b75e419eef1,2025-04-10T13:40:39.260000
CVE-2024-30998,0,0,ee14d4bbce0b6cee67c6c36f47dddf408b70af147e3b49b4056891b8b3933cf3,2025-04-08T15:43:57.400000
CVE-2024-3100,0,0,cdfcae3d66ab799d842695f2227f5d408503e80fef0c63776bbe5bbd6058f69a,2024-09-14T11:47:14.677000
CVE-2024-31002,0,0,0b751597f2635484358fb7771a6c157a811fbace97b874ec2f8f9f5018e0c2c4,2024-11-21T09:12:41.733000
@ -259638,7 +259639,7 @@ CVE-2024-3383,0,0,2fa83abdea40282e20ea0cdf839990a0c3e4b3915404b86d2e06d5f4bf5683
CVE-2024-33830,0,0,f1012ab730edcfd864a0644722071cb6ff41ee64e585601d191df590a20be372,2024-11-21T09:17:33.390000
CVE-2024-33831,0,0,f91f34cdd2bcb6e6adcab72045795af979a1b6ad2c28fa652db7625dedd4f35d,2024-11-21T09:17:33.660000
CVE-2024-33832,0,0,4a7de24f1ee6133b608740a244d388457220575de4659dfa0b317191ab265879,2024-11-21T09:17:33.847000
CVE-2024-33835,0,0,3e192c85c2f13a4a00101e791f822c9888ae665f140c80028c35765adbfb6897,2024-11-21T09:17:34.033000
CVE-2024-33835,0,1,5637bdb765c6661c1c6f2de49886f74ce4c715820ab9b7afd0803e31f5bd9a70,2025-04-10T13:41:39.267000
CVE-2024-33836,0,0,e9fdefa6cfdfda12401c899a902faeb54477882eb31bdafd3c99df2e5bfe597c,2024-11-21T09:17:34.227000
CVE-2024-3384,0,0,c4b2f8ab6758117062890bee73e21a93e57f567211e04646223f4e021cdfaa57,2025-01-24T15:54:56.557000
CVE-2024-33844,0,0,1e18a94f6c4ca0cb2f505b170cfbd921e492159831a4042d010782384e7dcff2,2025-03-13T21:15:39.590000
@ -263567,7 +263568,7 @@ CVE-2024-38608,0,0,9047d5fa6031e3edcce1a9b27f9a4f65f4b59fc23ac62e10259c6e642290f
CVE-2024-38609,0,0,1f5427b015e1032af6948292a48310f693450e7b841e694549a3d08bf031c00a,2025-01-31T15:32:13.697000
CVE-2024-3861,0,0,2f28d50fa2e8e40656f77c49fd4464624469455af1f9e188c9e615bd0e8a0305,2025-04-01T14:32:41.477000
CVE-2024-38610,0,0,135d89dfa1b0c5848284308cf8dd2a3e467ecb37142c52017a45f1c836419e6e,2024-11-21T09:26:28.660000
CVE-2024-38611,0,0,d2843e0f15e8d23b68ec75b98040560a85657fa4389da966395a527324235315,2024-11-21T09:26:28.820000
CVE-2024-38611,0,1,0040a4739cfe910bac5ddfc79a3bb3219590f6f501d203abefb3f3a27973f25c,2025-04-10T13:15:44.790000
CVE-2024-38612,0,0,b96e21aeeb9599f687050c96ad25385f93ce92a1bbc2a505df7a49a7e2510eda,2025-04-01T18:26:38.013000
CVE-2024-38613,0,0,f61121b36ccbdf9eef155a6a096739511c149b5e3308f0b671f34f8f5dca7281,2024-11-21T09:26:29.207000
CVE-2024-38614,0,0,404a9d3db3e67bff9dde5228edca917ffeadca74171046df971c422e5b04d26c,2024-11-21T09:26:29.347000
@ -264650,9 +264651,9 @@ CVE-2024-39928,0,0,36746816d5a179f8dacaec6e67ea9b447cd0145aa354104fbfbe630b6bc05
CVE-2024-39929,0,0,e05786a0bff8a717a9d0e29fd179f70720437e88c3451a4fe1017b9aa0163a85,2025-03-18T16:15:21.850000
CVE-2024-3993,0,0,dfe7a0553427868055b3e1c0cde0f364fe08fe913b7ecb5123deb206c4ea7338,2024-11-21T09:30:52.047000
CVE-2024-39930,0,0,5dc01b3c8e1fb8f73588615aae7b8a8178fdcfb54e8c7686725ce4a45e216e26,2024-11-21T09:28:35.910000
CVE-2024-39931,0,0,4d0fc49e820fd6e541780bd9d8d0eca181c5f5d1fcd9439a146d43237b57d2b7,2024-11-21T09:28:36.087000
CVE-2024-39932,0,0,282170ce1ca21b505d17ffc04e0e845c894faac94992866872f4152c73c277cc,2024-11-21T09:28:36.240000
CVE-2024-39933,0,0,0e9b13327bf4c22aeb807fab822dbb13b923cf669db95f9f5ad35237bc7b1fc9,2024-11-21T09:28:36.400000
CVE-2024-39931,0,1,7812805453d7f8921333ebcf634bcadda5befd1e13c58a4ce9979741cca7a002,2025-04-10T13:43:51.257000
CVE-2024-39932,0,1,9a4f5a8279117acb9b5c69ca769b00c9e67897d00214cd782689bac2a39d51e0,2025-04-10T13:44:52.103000
CVE-2024-39933,0,1,99da420be37037001e1bfeb8e5e3400494fc64eb4bd14376430e48fc3179c9ca,2025-04-10T13:45:38.273000
CVE-2024-39934,0,0,a040eeb58db8dc357074257c6548a542573771e14e58a5691af92614e3e7c903,2024-11-21T09:28:36.553000
CVE-2024-39935,0,0,20eb5709834fe3f6799e0bb92d1add201d649bc3b4e0f310eed715777bbe31c5,2024-11-21T09:28:36.707000
CVE-2024-39936,0,0,e821e5a3bdb05b6dde9222f704eae2d36ecf741fc03b3f00768268ab9a5c894f,2025-03-19T20:15:18.770000
@ -265602,15 +265603,15 @@ CVE-2024-41579,0,0,00401f5a27bbe5068511cb2e589592e7d13e313ad7b023bdea7b8a4482f81
CVE-2024-4158,0,0,6f5142212b7f11f746d09765245fdc596c1170b29be5ee204d7e191cb8d2cab0,2025-01-28T03:03:08.447000
CVE-2024-41583,0,0,1a2cf944ac0faaad65d0fa8a08d6745d58f6ed5d5ab422f4a8a1c3b961675df9,2024-10-04T13:50:43.727000
CVE-2024-41584,0,0,a756336a17820148688412fc36dbdf4cf1430daae27f7ae91b5ca9d658835775,2024-10-04T13:50:43.727000
CVE-2024-41585,0,0,5c7959b63fb8c6f9f663defb96a0fee4ade3ece14e0b9bc7262ce5ca4b357f56,2024-10-07T19:37:13.900000
CVE-2024-41586,0,0,1dfe0a57832209bcd6e050fea5d10d9e2cc77b9729ee84c61dfed10c208841e5,2024-10-04T13:50:43.727000
CVE-2024-41585,0,1,f603abcc7adc50c0f0418039db97e6157e5d644c828ff6d6a43a1148e2cbdcd7,2025-04-10T13:41:39.553000
CVE-2024-41586,0,1,2ca5c96a0d26f43109380a195dfb7e58cb016f80ea656e1dca0934dfc33fbe62,2025-04-10T13:41:46.850000
CVE-2024-41587,0,0,49423dacd1b4227d5ab73e5f650b6e45277b0abc6417b9dfb6a350665edb1b90,2025-03-18T16:15:22.733000
CVE-2024-41588,0,0,fd3ce7f7855398e35ab5f6ddf4c9ca224e9b39f193258ed7cd185f9bbcbce78f,2024-10-07T19:37:15.063000
CVE-2024-41589,0,0,933f60891b4d710c7b37c18705d8a2738d871d9d2c4ed1642f1e707d191ac66c,2024-10-04T13:50:43.727000
CVE-2024-41589,0,1,e9c30a32e1d5bd5f4b6364fc650d57d72e5e61f9fa07da023f0932b49a18787a,2025-04-10T13:43:37.377000
CVE-2024-4159,0,0,79fc1543f1260705e74b8deeae175c555b129f183a9014a6e4288a6f9681a384,2025-02-06T17:49:55.727000
CVE-2024-41590,0,0,1e2ec45258e7c07e175972d8811464c9173bad3d822ce356ae18fa7f32371b1c,2024-10-07T19:37:16.150000
CVE-2024-41591,0,0,fbe56be2c7d21e58694890c979fd5b2525d6606e74bcf44af4f4eb9ebfc7cb62,2025-03-14T16:15:34.730000
CVE-2024-41592,0,0,6cafebc6f0d6fbb4004a1dfb277a5338bfce167123047c3517ae584872bca55c,2024-10-04T13:50:43.727000
CVE-2024-41592,0,1,b26321fbe83256741debbe7f958bc02fe1d6cbb574226261d975a0289c32bfe0,2025-04-10T13:41:51.380000
CVE-2024-41593,0,0,4c655fb675e2e26beb224f3146b60f9a593776c70e4428cbb9b0d5eb10e9c063,2025-03-13T19:15:47.260000
CVE-2024-41594,0,0,0fa2ba762c2fbc09f3e5499bc08c98877b67fafe9367aa7a338ecace00d5bdc7,2025-03-19T16:15:26.387000
CVE-2024-41595,0,0,44455fcc40d68fa8f45347482b1d2168aab0c68de0853c639a8e56e911020245,2024-10-04T13:50:43.727000
@ -269462,7 +269463,7 @@ CVE-2024-4675,0,0,fb7e6fa9fc63f7b6a41c7770746ca4c45a9246471a1a98e3cba2ed2f8d6fcf
CVE-2024-46750,0,0,66feceef0345c19e660d67c9a1818aa8a16fe162028284331affcd8721d122e5,2024-09-30T13:27:45.787000
CVE-2024-46751,0,0,4457cda69cdc02848e881ec7b190254ddd4d1cb4716b4860d3a02eea1a7db91e,2024-09-30T12:45:56.957000
CVE-2024-46752,0,0,a6e483848fd846991fe052cf397d8e3748be44625f58093adb7b1755e086fa32,2024-09-20T12:30:51.220000
CVE-2024-46753,0,0,3d7493508cc733effcafdd7d2b06bc7d70b1185c0794738e42492fc29ea4f135,2024-09-20T12:30:51.220000
CVE-2024-46753,0,1,3f1682b59cb8d5756351d35a4e4458eb3e9b590f693c2e576da791ab5f36b981,2025-04-10T13:15:45.023000
CVE-2024-46754,0,0,d335bc48b5fc1eebe1a7eef0e7eae5f8d2c1b537f7a261d71a0e5ceb10c05e28,2024-09-20T12:30:51.220000
CVE-2024-46755,0,0,ff39e2d7270afa31e804d067bcf588e5bcd9fa15f72d201b0ea3c2f5600330d8,2024-09-26T13:25:54.593000
CVE-2024-46756,0,0,a89b5439fb318adbc366507eac3f81bb2badc1e135f1a0072eb73274f7c98f29,2025-01-09T16:15:38.913000
@ -269527,8 +269528,8 @@ CVE-2024-46809,0,0,2baa2c410a0e98ba49d63da68764d9afe11ed295d51f188ed8fe0d8fb7553
CVE-2024-4681,0,0,e2134a614dca3348c17b76fbcc70e710152fa214740bfd92fca1dc669b2966a0,2025-02-20T20:12:02.653000
CVE-2024-46810,0,0,db817a742c0b29650d6d800b706b002d42fe04ca631345970e15ff4c2906a30d,2024-10-04T17:43:04.277000
CVE-2024-46811,0,0,2dbc669ad5b50d6e5a17f236c9453b8d3f6062106fc1dc59ecc99e6afa1bcc9c,2024-10-07T14:24:56.860000
CVE-2024-46812,0,0,9698b075bfae622365158b354a9af2eb778beb464a568490adc28043db2e50b9,2024-11-20T20:48:48.663000
CVE-2024-46813,0,0,91935968017d76954b07c4f5fa76823cfefe62ab64416790b8fb06b7ee18ef92,2024-10-04T17:38:17.740000
CVE-2024-46812,0,1,27f6c4dd25aa09a7e159856242be9f35fcc3122270f1ffd285e46652bc96a85a,2025-04-10T13:15:45.153000
CVE-2024-46813,0,1,ea4d886f1e469214530c3dc96328c5a7e7a8e2952f8545005f2a3901833e8bad,2025-04-10T13:15:45.303000
CVE-2024-46814,0,0,2d733e7cbdb19a14fbb31b604fcdeab772c427714b4e97ba0aea10c564457763,2024-10-04T17:27:47.450000
CVE-2024-46815,0,0,0d1eb43c74ba7bba5cc3b81322d15c43ea9fab0c4d58caf610783efac6ba13ce,2024-11-20T18:22:12.017000
CVE-2024-46816,0,0,dd5e524ab4fec930aa00ef8b4474eb4dacf89f99175c6beaccdfb37c0c2cbe75,2024-11-20T18:02:52.437000
@ -269537,9 +269538,9 @@ CVE-2024-46818,0,0,3c0ad7e9cb76891d8ac9b71df08567941cf062277ff4b72f5c15f729dfb8c
CVE-2024-46819,0,0,fdca475d6dbaa09ef703a9cbcb418bdd925bbb20ca810eb936548c9b0d16f32a,2024-10-04T17:11:00.570000
CVE-2024-4682,0,0,968cfd7555d4806fe7ba270e70bdce3bfc3b7bd9d27199e46c73b1e64d5cf39e,2025-02-19T18:36:57.870000
CVE-2024-46820,0,0,7a3e082a14038bab91e3b9d19980fdaea55a5edc504958a642bdcec6cdbe724b,2024-11-20T17:34:05.143000
CVE-2024-46821,0,0,6fd031d1ff2bb7026a1d160354f5a9e1df2cf11abd2befef1747058e4e8a4ee3,2024-10-04T17:06:43.573000
CVE-2024-46821,0,1,8a960bbbf35c30219a3dcdfce99e110d3a616628efc68d07a97f3e817bd166a0,2025-04-10T13:15:45.433000
CVE-2024-46822,0,0,7656bbe7eee2c22a1e68e53f2dd71842bad00b6a05b26daa21e396f596ff167c,2024-10-02T14:24:01.757000
CVE-2024-46823,0,0,98bd20960f6a8e5fdc6302a68f4a475db63adcbecb9b94c943d73ab1eff4ca2d,2024-11-20T13:59:52.723000
CVE-2024-46823,0,1,1cd954c4a97be9628a72c6d20bd24e06ede029550d00781954fd2891bea72a13,2025-04-10T13:15:45.660000
CVE-2024-46824,0,0,35cf5a785a1668ad3fa5d2a62d8a8ff6a475112b80f5d7b8d9031824f8d0ca99,2024-10-02T14:29:08.417000
CVE-2024-46825,0,0,cd9fc8c7628a67f13eb1841a59036967c72ec8c1d8a74f9623d152fa723ce018,2024-11-20T17:24:04.660000
CVE-2024-46826,0,0,72df3d63fe342ce1e6089cfe73c9977c379d613a926721e46d5694fb2086e121,2024-11-20T17:19:00.183000
@ -269882,7 +269883,7 @@ CVE-2024-47210,0,0,7b078d282e49f2a1336ae546c0b723ff3d199712c9c99c4465d9098c519ca
CVE-2024-47211,0,0,7cfbe4caeb9c6d5ba2e34fa790cad31c3986781c114cbdc021a3c5c02b8899bf,2024-11-21T09:39:31.500000
CVE-2024-47212,0,0,3301d958588bd8d56cdd4439a0a32f1d49e101afc033519c8f5be640828b017f,2025-04-08T20:06:27.003000
CVE-2024-47213,0,0,04b30dd06b47bd624c0ea92317eb571bb18e7eda14f9a4173d1f19a4597595f5,2025-04-07T14:18:34.453000
CVE-2024-47214,0,0,42f25dfb8db8cae5df36e924bb85b979a09f2b5292e410e9fd0fe3f58fb972e9,2025-04-07T19:15:53.147000
CVE-2024-47214,0,1,fdf63583cb8c718454aba155a2144e7a411e8ffb79f3de417801c77469d8b72d,2025-04-10T13:51:22.130000
CVE-2024-47215,0,0,d058dd10bb1de131f6b594cf9eb61be90cf5dc89e729180c84d1d89902a748cd,2025-04-07T19:15:53.300000
CVE-2024-47217,0,0,959ea08e604f6076b0cfb3f0015c60a8376accca2a2e83fe707c21c8552b263c,2025-04-08T18:55:43.790000
CVE-2024-47218,0,0,db03414a0794c64478156435016e14cfdd9450c8bd09172385f11c2f30d16310,2024-09-26T13:32:55.343000
@ -274295,7 +274296,7 @@ CVE-2024-53140,0,0,278cbdb637af028f369abd9e56d14ef405930db6ac1e94694d5107009c64d
CVE-2024-53141,0,0,c4eea5c2fe51a3898acccfa414620e41964aab3e73f12af77b5d7bb35ff9fbc7,2024-12-14T21:15:38.550000
CVE-2024-53142,0,0,fc23c3e378fb46ab5615da6a919ab3136de551312d5d21e741724005200e92a7,2024-12-14T21:15:38.707000
CVE-2024-53143,0,0,fa84cb4cdc6e64e0bc94478c6ab027a585813512fbfd2326e9207568df82fe5d,2025-03-24T17:27:18.173000
CVE-2024-53144,0,0,9d107c35ff0dca61e5b14e7d0131ac8dad4f8c1aeabd45b2baa64b7fc7411808,2024-12-18T08:15:05.687000
CVE-2024-53144,0,1,b88688a506f15bf7360070e363b2df2a1a23a0dc78161b2bc382b60fe6800938,2025-04-10T13:15:45.907000
CVE-2024-53145,0,0,845c82eecd5000228acfbd771e22e0fcec976590e482e5c078720e730bd428d5,2025-01-07T16:14:57.543000
CVE-2024-53146,0,0,143a6857f7adc5fe799b8f016794e004afe724691ccaf56befb27f641c543479,2025-01-07T17:15:25.477000
CVE-2024-53147,0,0,a5545dbb75e1ea0355592ea9c5cbed6b78973df74296885178a65e66e3108898,2024-12-24T12:15:22.777000
@ -276460,7 +276461,7 @@ CVE-2024-56660,0,0,cfed4a787333c42a3454657a06f0d3b7a6226ccb05b4cc27e3c9f4d563a87
CVE-2024-56661,0,0,c6c9e404b12664e81d58b8990f331d53c7130ec908c72b71de88eceee8fff31e,2025-01-06T18:49:40.310000
CVE-2024-56662,0,0,2eb37c849d1c944c9ea82f37c67388f3c32521454fb617ad4e1f9a3fad26a35b,2025-01-06T18:51:31.593000
CVE-2024-56663,0,0,b24b5ff415051e92cf82550565ee0a00212026738720b005f89116c862f514b2,2025-01-06T18:52:41.737000
CVE-2024-56664,0,0,1d87198303193d03ffc5160221e756d18acd53179559f5fb8d05b49e019c082c,2025-01-17T14:15:32.227000
CVE-2024-56664,0,1,510234c87d7ebcf9cc6fd0c5a7bd6e82fdb9857b952048590afcfc56a3b9b610,2025-04-10T13:15:46.037000
CVE-2024-56665,0,0,b08ee739572f10c32d239f33de64977bec1256b54835c47ccb8efd3ec8866d26,2025-01-06T18:42:12.090000
CVE-2024-56666,0,0,21f26ce12addeba29595c53677883f3a92e9d33b51f0211bdc6b5982f3c5d0f1,2025-01-06T18:23:37.147000
CVE-2024-56667,0,0,1a9434d05c1117f8ebea126370a3323c87f5ea30d38cebd3e2ed4ea6d126e457,2025-01-06T18:21:07.280000
@ -277411,8 +277412,8 @@ CVE-2024-5877,0,0,80c9d096970c353d960baff3613e5714705d2472757521ca853917c42670fd
CVE-2024-5879,0,0,25d590c240497c40edd9974939e9cd1cb176442396e55f11847e771d41e50789,2024-09-03T14:59:58.410000
CVE-2024-5880,0,0,78f8c17ca2ad5fed28c3a337430fec0785ea8b668d98c2fb361597e109dcd3f6,2024-08-21T12:30:33.697000
CVE-2024-5881,0,0,21d92582eca7d96a4d513ea191ceb6e9c724b7a61d96b6d9d17dd755a85dcf77,2024-11-21T09:48:30.933000
CVE-2024-5882,0,0,afebdbf01c550aa00278a944a09d50f0e8c6b9e6ad806563155bf7a7e70ec7f7,2024-11-21T09:48:31.037000
CVE-2024-5883,0,0,f6a8f2c79bb16f467afdc91efaa0f848e6a8057a0d95700effca18332f89ea50,2024-11-21T09:48:31.193000
CVE-2024-5882,0,1,12cd8d0d55e5b010b75960654432736146f694e1e9e8fc73c990e8a578f764ef,2025-04-10T13:52:09.533000
CVE-2024-5883,0,1,69f0561d60972340eadaaae8787f6f869d72dcc3dda31e3280647f6eaa98b3df,2025-04-10T13:50:08.880000
CVE-2024-5884,0,0,24e1fe9ab75bc45d011f2c93b35363e43ca5195883e3393db1f5efead25de5f5,2024-09-26T20:13:40.557000
CVE-2024-5885,0,0,b65202b515cb4c17dcef9eccc68059bfcadafe010b595b3c7fd55558fc1eb55a,2024-11-21T09:48:31.420000
CVE-2024-5886,0,0,c6e7cb024adb68ffe24a326928e4d7c782b39c0023921bf84bad462101dad3b7,2024-06-20T11:15:56.580000
@ -278018,7 +278019,7 @@ CVE-2024-6525,0,0,f6480cd2a9a73dba65922bafbc051b6ad4232f151162c6be51b4b1969f84f3
CVE-2024-6526,0,0,19076c3eb779d33994dd59c2f467231943c9a10aab5e1669ecf483d55e877999,2024-11-21T09:49:48.433000
CVE-2024-6527,0,0,1c902d3e69979da0072c97f0f6158ef63ac37ab276d356162e4237f6cd7f29a5,2024-11-21T09:49:48.593000
CVE-2024-6528,0,0,e9156787d27dd4fdfba6d50ea03aa667bd17ded1c421119f0c1fa761de458d59,2024-11-21T09:49:48.730000
CVE-2024-6529,0,0,ca47469bb446983b0d1f578f4da76d5e6890d73d0a77d6b0ce3cc30a5eba0e25,2024-08-01T14:35:13.090000
CVE-2024-6529,0,1,ed46f22dca2f91d6161013b687689db7749496f0bca222bee710b6a195277196,2025-04-10T13:49:49.100000
CVE-2024-6530,0,0,16bc13dd377f9278a655d2630ff198bda3220080ee66519b965bf3c0166dea1f,2024-10-16T16:53:08.487000
CVE-2024-6531,0,0,2fd0c0efbc709df0507b8ea0d3736df13ed826fa4b367cc71e4cea13a705b371,2024-11-21T09:49:49.090000
CVE-2024-6532,0,0,2407b42018f3da2cafc970b52c1c77bde3fd6e6365e373370fa37b28b396b346,2024-08-14T13:00:37.107000
@ -281326,7 +281327,7 @@ CVE-2025-0254,0,0,c0b515e46d918691acf880cf7e48dd1484bbbda9200e70d05e0bbba9fd762e
CVE-2025-0255,0,0,90e000215482e5d86d475fb05ccdd376d187c17524748e399eb015064435daf9,2025-03-27T16:45:46.410000
CVE-2025-0256,0,0,8d93191b3f6273482cd2e738a4c8458f1bcb7229ea685df9d486553726ab45e7,2025-03-27T16:45:46.410000
CVE-2025-0257,0,0,62a391a6404b2693582345a22025e97f9549cc8217eb41e1be8ea264d19ce35c,2025-04-07T14:18:34.453000
CVE-2025-0272,0,0,23a271cc085270a1bd3f05eb51065fbaf8201bd02d665961f76e1f2828195193,2025-04-07T14:18:34.453000
CVE-2025-0272,0,1,36136e2b4130154f0f080b93b2e615fc734b50e7760f0c247ac9f10a9faf26cc,2025-04-10T13:27:02.210000
CVE-2025-0273,0,0,3150c7718d39b3b9c8949458a965540861c1e233ba5c78d9d601688f1cc14f07,2025-03-27T16:45:27.850000
CVE-2025-0278,0,0,a39f4ef02ee7d6e87c2b8b8bd40297187f6857a15e9e0a61719090ae2ffadcc3,2025-04-07T14:18:34.453000
CVE-2025-0279,0,0,625c3dca6af48929b681d9a597d63d6a330455e7797f248dbc172a56deef7e52,2025-04-07T14:18:34.453000
@ -281602,7 +281603,7 @@ CVE-2025-0617,0,0,f628b1ad73170d04122e24ddb3e888ab06e1591d9b8c499515e522c90868af
CVE-2025-0619,0,0,d6798daeef3d7924598dddc8037e69d4ae3bc1784ffc6b426878fbbb52aa2ee9,2025-01-23T11:15:10.700000
CVE-2025-0622,0,0,e47fbbd3a3a716f89e6a5dc5e99d39a7414dccef8758c28db6b0464c5f5b2e87,2025-02-18T20:15:23.570000
CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000
CVE-2025-0624,0,0,498c3dd04f7c8817f159ff97f1fdf563db472658390d615fb66cd7173da94c40,2025-04-03T10:15:19.267000
CVE-2025-0624,0,1,7fd9fd8dbfed903b1450375656b461ac4e53cefdbf4d62e7cb935bdcfac7183a,2025-04-10T13:15:46.217000
CVE-2025-0625,0,0,328c89607f451b43b59c7441ff870515136d8dcd178527014c9e23beca2d6c94,2025-03-28T19:14:20.063000
CVE-2025-0626,0,0,16ee263c85f3aad6f9b7c5ed60390a064032d53adec3f9f8437b4c73151fb8c7,2025-03-01T18:15:34.140000
CVE-2025-0628,0,0,570695b374c4ed87e2ed44b4722d7e35e02627e97784a5b85708accd345030c2,2025-03-20T10:15:53.407000
@ -281854,8 +281855,8 @@ CVE-2025-0986,0,0,cf56af05caf6e1980300a02afd123c843ba27f74f88042c36ff0a4e635370b
CVE-2025-0989,0,0,346e8aea80123cafe9a430449f66c84d4597763274e13e564f95baea22982f1f,2025-02-11T21:15:12.823000
CVE-2025-0990,0,0,9b2eed3f7502ec84e40a9484b52b4383e088954c71b4d8a99cc5047d894e17c3,2025-03-05T09:15:09.947000
CVE-2025-0994,0,0,eda51bab1788ff49d0428b581e74a138c45a84d2ffb837b73d45b8cc098d090f,2025-02-12T19:29:30.383000
CVE-2025-0995,0,0,0a5529eb09e1f54f24a3e7e605d2f8400aae44234054dd248f74781d7e042133,2025-02-19T15:15:16.073000
CVE-2025-0996,0,0,f5bee85fd326d78b72ed64a9f49b28f7be5f9f9202e5d7fbf61706dd2200814c,2025-02-19T15:15:16.243000
CVE-2025-0995,0,1,dad0a056851feedc0b8d2b5cdb86ad535e29b96b9d8bdc2766b21c4918bc9e34,2025-04-10T13:35:11.360000
CVE-2025-0996,0,1,61dc4950816d8c0d04b00f936aa459046b15c240b3d37a7c085dc3d8cd03bb12,2025-04-10T13:35:47.997000
CVE-2025-0997,0,0,f250613d1f182ccf1575738db5199f92c19b7419ec251933ec6b859043eb1fc7,2025-04-07T19:08:04.843000
CVE-2025-0998,0,0,7bd42e251687d39d883712104c9eee494ec67b567b03623713d2e55ab05eccd4,2025-04-04T16:15:18.013000
CVE-2025-0999,0,0,603984de7512da140496f2860c5b0cc73c510ea40c341ebb00613187787e0649,2025-04-07T19:07:22.060000
@ -281908,6 +281909,7 @@ CVE-2025-1068,0,0,2ec63f15e0051ea62e1e391e2e6691164dfdc2b2f1fb68a52a3489296ba3d7
CVE-2025-1070,0,0,63c9f6366f7886d6af04d22c614f55b0f42e20f4e6634878d1102f0014dfbfa1,2025-02-13T06:15:22.463000
CVE-2025-1071,0,0,ec670b61a4cae3c6bd1b5d7c58db808e7643f8c91b0bf1aa44c5e336a078699f,2025-02-14T14:15:32.560000
CVE-2025-1072,0,0,bb0514ae35802411e3da1596896cb302b1b469b7b79e6814634b3c15db99cbed,2025-02-07T04:15:07.737000
CVE-2025-1073,1,1,480fa6357c269258710c765773bfb1dc7526f485db3598904427ab7105d43cb4,2025-04-10T12:15:15.097000
CVE-2025-1074,0,0,7a1fefb554f7f8eb325ca636b33300876ea9a573e796b76dce3855e390b1b974,2025-02-06T14:15:30.050000
CVE-2025-1075,0,0,797c9475355694050b39edcabe9ae24db6febfe58de9ae04f1e1ad1e92e5bacb,2025-02-19T10:15:09.043000
CVE-2025-1076,0,0,0fb5ade089952c20fae90954aaa2f08206a3bcb696af25bbf4ec969a8662af5f,2025-02-06T14:15:30.287000
@ -282324,6 +282326,7 @@ CVE-2025-1673,0,0,a769050644a46e7653413d9ced41c32af5a25e5678354b84138b22bca35ce1
CVE-2025-1674,0,0,34cc117a61014ee7cc1857d2d4bba3c83148703711d2214f109e23548c0b079d,2025-02-28T01:42:14.500000
CVE-2025-1675,0,0,617f4918bd81cc8aa7e8e3b746af2c056a2e621972157d45d3d4942aca8956aa,2025-03-03T16:51:56.620000
CVE-2025-1676,0,0,ffcca994630f7ace6a571d92659403689ac413c9afb10a75dc0095ea449331e9,2025-02-25T14:15:31.447000
CVE-2025-1677,1,1,2b6bbd58fbfe100b085b7230281638eaa3955d886dc077f09a53b9b07830bd5c,2025-04-10T13:15:46.473000
CVE-2025-1681,0,0,3ee297593e4a5818266094c9d5282266af1bf843390e9752b5023996a22e1071,2025-02-28T00:15:35.950000
CVE-2025-1682,0,0,cc794daa0dbacddc54b0e89e0bf9a4796b5672845d169d6dbf1869b7f592f754,2025-02-28T00:15:36.100000
CVE-2025-1683,0,0,bd65547481d5838793e5ad335f0bed73820ac4e81083a338100991ba4dbdb8f6,2025-03-13T10:15:19.687000
@ -282432,7 +282435,7 @@ CVE-2025-1847,0,0,ec0e6a8320e426514c9188308ee4e761c20c9a2d723bf22132b181d1278bf0
CVE-2025-1848,0,0,5ab5fd2d0b5fa78c5a97d7cfd5adf624e7bd356e62a20add19ac1bed4fd36c3c,2025-03-03T18:15:36.720000
CVE-2025-1849,0,0,6cbdc0c1a27398724a4a1e8bdcd861e48e0b12f2e0ceb284ec86f592081f9271,2025-03-03T18:15:36.893000
CVE-2025-1850,0,0,c5aabb4e7ad18759f40a74311fc84c935b8643d1545c186439667dee81bcaae2,2025-04-04T15:19:58.300000
CVE-2025-1851,0,0,21bb6ce5ae51442f18eb0cd84c8788b0eb252ebb94f0d62e136bbc46266f0de7,2025-03-03T18:15:37.277000
CVE-2025-1851,0,1,7be3d3041fab974a6d12398e9222b3df858aaee0178f37633d3da29636c0ad37,2025-04-10T13:32:42.863000
CVE-2025-1852,0,0,2b16d071c2b09c94cb51f2257b9169c6423888f4e9a8d14aea7b98b089086c3a,2025-04-03T15:33:51.953000
CVE-2025-1853,0,0,45de6ca124be386cb9fc9357f37516f9bc597196fcf8094e317ca6b001165da8,2025-03-05T21:28:00.130000
CVE-2025-1854,0,0,3fa7ed33d66eec62bd1a346c1e199dbe216908f1cd4f380289da002758300100,2025-03-03T07:15:35.030000
@ -283303,10 +283306,10 @@ CVE-2025-21634,0,0,c8b95aca08c2b45c9dba95d6155aefb765f07edea9819768e8b59b392e1ea
CVE-2025-21635,0,0,4cf3da6333d0e4084cbf1ebe82eeb13cfba8e51169f179976a5cbb111090b21f,2025-02-28T18:52:04.810000
CVE-2025-21636,0,0,3ae85a8633d6e4c7c4afc5f451961d9da40e543a763d571ae649ce9785a31060,2025-02-27T22:01:45.773000
CVE-2025-21637,0,0,05925b5efa9f02ac6aa5ea9a870677d070a2594d067656530286fdfa84ac33a2,2025-02-27T22:01:21.430000
CVE-2025-21638,0,0,2cf12756103fa057c758685520e5d32673cabca9788320ddb76ebc6dafda2566,2025-02-27T22:01:34.240000
CVE-2025-21638,0,1,9d86aa994135a768747d281875630b356945096fcb469d4f7c25e444b5635f12,2025-04-10T13:15:46.747000
CVE-2025-21639,0,0,6951f75342622895a60945bf95682a2b99fe500b47ade5ffb8d5307929bbefd5,2025-02-27T22:01:10.337000
CVE-2025-2164,0,0,d129d9f55d497cb5ee956a685ad5a71b65aaa7cdf73250ad0c7ad1c2f1b56f93,2025-03-28T16:07:07.700000
CVE-2025-21640,0,0,543f40a49c92fa803e05fd285cd1c9581d6fecdba4ff3a54d984f97f6ee95e4a,2025-02-27T22:01:01.257000
CVE-2025-21640,0,1,953f71ba357e60ac226bad23a14e2ffa823449a710acdd82904145531c90bad0,2025-04-10T13:15:46.927000
CVE-2025-21641,0,0,e146fe147f4fa7c09deeed8b7b710dae78c5022fd48636d72f67d9a8f95f9998,2025-02-27T15:15:08.843000
CVE-2025-21642,0,0,db386d9b7ed30d3f5c13d931cfd57fded14502dce954776abee9b860bf0b293e,2025-02-28T18:54:58.420000
CVE-2025-21643,0,0,cabaf0da35f1a3435ec7869964661b97a8bf2d764f2f1be480a70dfedc80edc2,2025-01-19T11:15:09.870000
@ -283454,7 +283457,7 @@ CVE-2025-21775,0,0,a3e6accf8a13f1c0dc8faeee5da155ed90ff8a998ef86e3c699c286fd93eb
CVE-2025-21776,0,0,b551fdcc84038793f88508aea01daceb7b07a8bca390c5c31b6373a5cebfaf88,2025-03-13T13:15:54.157000
CVE-2025-21777,0,0,7b78680346abf8713ba33d8ac2e09aa65789813ca4da1d487df84ad030b784f2,2025-02-27T03:15:18.377000
CVE-2025-21778,0,0,0c802a465cafec7b0cf75bd3642bc281bc51b491d7eaffcb0778a0688d330462,2025-02-27T03:15:18.533000
CVE-2025-21779,0,0,30a977641ed306e00b1cffacc789f3ca010c4671feb3c8cc318ae1dbdf403a35,2025-03-13T13:15:54.290000
CVE-2025-21779,0,1,c0338c9da9cdbbe996ebb3f4a4c98ef74717beb271bf0d37e258e536b6501eb2,2025-04-10T13:15:47.123000
CVE-2025-21780,0,0,01f0434a3d257b8ba9515a26126762d812e0204abab33ef12dae6fc660254fd6,2025-03-05T18:46:37.527000
CVE-2025-21781,0,0,a06889eaf8443274f189b81f6ebfd0500246541870dc146b227773bbea061b5c,2025-03-13T13:15:54.427000
CVE-2025-21782,0,0,e0238cc0199ff7923b4d03a2573d1238b28faae69b93a5bfd79f77b3817b2eb3,2025-03-13T13:15:54.550000
@ -283623,7 +283626,7 @@ CVE-2025-21938,0,0,80d07c88b53688ec96ee15d798b6b40def2206c228ea9a90ddb2eed49fe24
CVE-2025-21939,0,0,a787a16fdbfa658370f13a489dbbff6f008ee32954c421885701e640121c746b,2025-04-01T20:26:01.990000
CVE-2025-2194,0,0,3fdb717b1bc330f1d470bef99df31cb06c8ddc496778912df85edf14f5ac3b49,2025-04-09T20:46:03.463000
CVE-2025-21940,0,0,a5ed3b073b59bf54842a5e01cf185f802b8d87deeca9ead0edcc9f04d14f4435,2025-04-01T20:26:01.990000
CVE-2025-21941,0,0,a5a3fd325d5ea41466358fb97eb527aeffbcb909864bf683e7600bdb07ea8650,2025-04-01T20:26:01.990000
CVE-2025-21941,0,1,555bf15feb7dab3b6681c726ec097cc97b89b4d474a43c9c422a62c172bca542,2025-04-10T13:15:47.297000
CVE-2025-21942,0,0,349a2a434b71a6775457f2fe25f968468bbbe7edcf978d4717310c6f5742fede,2025-04-01T20:26:01.990000
CVE-2025-21943,0,0,8e84c2a39a7410c215634fe98f5bb1431a2b5d3a84c0e6a872ee9f7a5d63fd73,2025-04-01T20:26:01.990000
CVE-2025-21944,0,0,330601e4a6f25dfe681cd754bfb47e5d6a193264e47845a475179f3ff9267f23,2025-04-01T20:26:01.990000
@ -283639,70 +283642,70 @@ CVE-2025-21952,0,0,3539418067a9eb47905c6a725aa1c4cf337f9ab2151a716be076ad0ece485
CVE-2025-21953,0,0,f9d96ca8222dc73d65f00bdbc4774528561e71267eae572d97f93a964f4f693c,2025-04-01T20:26:01.990000
CVE-2025-21954,0,0,6157820ebf2ef0bae5efccb0d3cbe882c266edd1111db3a78fa24a8edbe9ffbe,2025-04-01T20:26:01.990000
CVE-2025-21955,0,0,94bbe6ce28ea752a2dcef8b94e13df7fcface3c096a02e5a66b9f0e050fc7c4d,2025-04-01T20:26:01.990000
CVE-2025-21956,0,0,3a3ba59bd054f127a646944dc64d5f0c948f5f2b95a27da2809d5dcc7815ca29,2025-04-01T20:26:01.990000
CVE-2025-21957,0,0,009330a6bceda57b40e54381ce2c9a46a3b647b1c4e380b0a51696e0e52910ba,2025-04-01T20:26:01.990000
CVE-2025-21956,0,1,4a8984510eb112b1f831009e6931bd3dda5a155c9ec28311bbb8cc79350dd185,2025-04-10T13:15:47.440000
CVE-2025-21957,0,1,4fb08a384d68bd800f8449a84dc6bc77a12651f3dbd297ac51b1fcee80d30c8d,2025-04-10T13:15:47.577000
CVE-2025-21958,0,0,bb332d2c65fb62395d4a6a1470bdfb59200d05d98aa0097eb1832f7ac11306c8,2025-04-01T20:26:01.990000
CVE-2025-21959,0,0,e4335ca84d4f0908491088a0371eca4bf728a9bf400720ea4aab251b07406901,2025-04-01T20:26:01.990000
CVE-2025-2196,0,1,74397881653af38c2f17ff3ea9a4961f6591ef6907c5859d1077d95e19f6679f,2025-04-10T10:53:23.660000
CVE-2025-21959,0,1,c1a027ba45f4c865aad7e919c98e728a14de7871e684e1165d615bbb2f3b17ea,2025-04-10T13:15:47.717000
CVE-2025-2196,0,0,74397881653af38c2f17ff3ea9a4961f6591ef6907c5859d1077d95e19f6679f,2025-04-10T10:53:23.660000
CVE-2025-21960,0,0,deefcf69ed458179f3443ceaf1f7a13e8ad6c7428510fe7449fde80547547f6c,2025-04-01T20:26:01.990000
CVE-2025-21961,0,0,08d35fb06287d1ce6f0793f2b539daf4e1b7125cfa39134cd2d4ac956f254f23,2025-04-01T20:26:01.990000
CVE-2025-21962,0,0,31b8959c404e495e57ffebfc27eab946759064551f1a0031b8d508713834db6d,2025-04-01T20:26:01.990000
CVE-2025-21963,0,0,017bf9188f032113dc93c9e98e6a3e6a77826f936b1e39bde647f10f043fe4e0,2025-04-01T20:26:01.990000
CVE-2025-21964,0,0,8cb79705526fd804fe7e30fca56ab7c2aef9456d8b0cb5a0b53a406ff0cb601c,2025-04-01T20:26:01.990000
CVE-2025-21962,0,1,e1439aec39e66ff23aa6755f528208f67db8deaeb399e400eda5a087486ea719,2025-04-10T13:15:47.857000
CVE-2025-21963,0,1,57a26a39938094a374fd29a2faa07f4ce7af572308884954c965b1a1d0e34451,2025-04-10T13:15:47.980000
CVE-2025-21964,0,1,1c9615f107a06e1393a03618a66344bf1f949e217847d92673a3f28bfaab2b7a,2025-04-10T13:15:48.097000
CVE-2025-21965,0,0,eabf1c9694ffab817b7b209e6b04ddf30e4240614d21b4272eca11f622330a04,2025-04-01T20:26:01.990000
CVE-2025-21966,0,0,959df35733bcc8f9896148954a5380423ba1dacb9707e4827b0642a0e6ff4498,2025-04-01T20:26:01.990000
CVE-2025-21967,0,0,5b2d318e39931102a9797730efbf4938cc2d0ca33323422cadcaa62a5ec89980,2025-04-01T20:26:01.990000
CVE-2025-21968,0,0,1584937740d70c1435024b006ed8132c6a7a2cf9ea99b7fb513b25e0530bf229,2025-04-01T20:26:01.990000
CVE-2025-21968,0,1,567d954a11efd2f8b070060afdf576450ed491d7a4f5fad07eec57e50b1fb766,2025-04-10T13:15:48.210000
CVE-2025-21969,0,0,33d9acd579432a4be1bf96f6e04ef982cf048ceb11706d15d31d4bb5c0092880,2025-04-01T20:26:01.990000
CVE-2025-21970,0,0,728d9a7863d6e1d9089b619e8338c0199bdc049fd98d782e6dc0dcce2ecd057b,2025-04-01T20:26:01.990000
CVE-2025-21971,0,0,e0001a7030fcc4789f76612c6e174314fa7891bfae77fb84878dd35dd591f004,2025-04-01T20:26:01.990000
CVE-2025-21970,0,1,ba7445dc61bccd37c0f7ca1a141461c1c02ebd565257c235441700d71cfad345,2025-04-10T13:15:48.327000
CVE-2025-21971,0,1,b9d234e567e462d15ed318b3bf4dc7551c45c9f6c61850ac7f7a28311b584baf,2025-04-10T13:15:48.453000
CVE-2025-21972,0,0,aadee25ba27bbefcb750b4416d7e86bd4cd8a8e375154227f8660bc60f1521cb,2025-04-01T20:26:01.990000
CVE-2025-21973,0,0,68cd8d4feed32b30f36da235adc524f78160f7e336f5e042493f8bb8318631dd,2025-04-01T20:26:01.990000
CVE-2025-21974,0,0,2c7ff97e9a5d39a305fd3ff61bed7371427903de1151ab3fc323f2d8e887809d,2025-04-01T20:26:01.990000
CVE-2025-21975,0,0,6696e69b380fdeb0f95f8798628e6cf8de35a2799254753580e733e49d964cda,2025-04-01T20:26:01.990000
CVE-2025-21975,0,1,d8705123227ae80536c9a24928bc70b1fe5bed745ad1dc2a429e1c756a090724,2025-04-10T13:15:48.573000
CVE-2025-21976,0,0,4941ad863aa3198fd7fada061f8668895e63748c2d5e55237b30372ca7146866,2025-04-01T20:26:01.990000
CVE-2025-21977,0,0,f91bf235f4cca74d524b98373c6c9eef911841e5d265a74f3307666dbcc13d66,2025-04-01T20:26:01.990000
CVE-2025-21978,0,0,c017c875b6d5debfb5fe65bd022dbefeb7183095407442c8640d9394d9c7b54f,2025-04-01T20:26:01.990000
CVE-2025-21979,0,0,77de5b5a61f14dbc79a206f8e2676a45850cf09a8a4a2daccc8cf777b04311f8,2025-04-01T20:26:01.990000
CVE-2025-21979,0,1,d82cd2d0f5c320c8e76f28a33969e6c3a1a898db839234291d6e1c0f5c28d988,2025-04-10T13:25:50.870000
CVE-2025-2198,0,0,f4e4d1c774196cd95c8a84e5b73cf7bc3b77b51ced927b7f810f100bb8c512c6,2025-03-20T23:15:12.520000
CVE-2025-21980,0,0,97f40034ec8adb1b03461aff15ffe5b7bd36fc24b48e093b496769d6faf83735,2025-04-01T20:26:01.990000
CVE-2025-21981,0,0,207c8c6d7d8dd879cc674056b98f061294e52ebb03df0c3edc75e4512f9b8fdb,2025-04-01T20:26:01.990000
CVE-2025-21982,0,0,2a65cabb734820f26d65bf7f80af0842938a0671c7d2e353994a00c9c40e3ae7,2025-04-01T20:26:01.990000
CVE-2025-21980,0,1,ca3a23fe5612f79d1db215d56912aa585e47d27ebb0fcdf9127bdaa53db612ba,2025-04-10T13:25:42.490000
CVE-2025-21981,0,1,56cf7520d86490869f5449abbe30bb11f8dbb71b85d42b392133a285522dc26f,2025-04-10T13:25:35.970000
CVE-2025-21982,0,1,c7384c1191fa97112f9c98b3a394c1935d6aecfdd8da49bf04580e705393600d,2025-04-10T13:25:23.140000
CVE-2025-21983,0,0,c5b65bbeb7f0ac57718e0fb77aaa5b43a1c6911111f940b0290d414a7af83c27,2025-04-01T20:26:01.990000
CVE-2025-21984,0,0,af6734935c96723cccaa805fa7caae73832dd79384dec719bda0519a1130aaf1,2025-04-01T20:26:01.990000
CVE-2025-21984,0,1,0c582767f8e0808eaeddbb9bddc83b93eb9f25072d3cc940f4578109471f8778,2025-04-10T13:25:15.120000
CVE-2025-21985,0,0,280ec0d6f7baa6e0d8ae7a6e5d0f668c0199c4f77ce90ac583ca778e8966c114,2025-04-01T20:26:01.990000
CVE-2025-21986,0,0,fb287982c4b7a869a7bc98ba0c625cbaa01e8337a3b47a086619e81f4fe4fa1a,2025-04-01T20:26:01.990000
CVE-2025-21987,0,0,aa90643ad5e8c3d9497e088fec5ef4f2255cf9e4d776e894a3aee4abf4fdf4dc,2025-04-02T14:58:07.527000
CVE-2025-21988,0,0,5b07386bd61dacc7caa284694350b61fd7f7a7af482dca8f5fd89ec747f667e6,2025-04-02T14:58:07.527000
CVE-2025-21989,0,0,b7afe7f2c983cb0d2198d1d40a35442828956e8d010bb06f3023244e5a0ddbd9,2025-04-02T14:58:07.527000
CVE-2025-21989,0,1,154e034c6e299a2a9b3600f5e682a41ee35277312b832c388d52baa36fe5f262,2025-04-10T13:25:07.567000
CVE-2025-2199,0,0,6cca999d1fd02ccdc948cc3c785871dcf520469b36ed9558917218ebe5cdd745,2025-03-17T10:15:16.243000
CVE-2025-21990,0,0,6e7d730f2b398f8af7e09d4eddca6db3c14ac024bf5d762d691509a97c138fed,2025-04-02T14:58:07.527000
CVE-2025-21991,0,0,02a1ee3c0b5ed31d617a64306e4a4e4a44fbfb21931824943dfde432016a3319,2025-04-02T14:58:07.527000
CVE-2025-21992,0,0,f394de4b7b4e1dc06b3dc04122e673c48edf00a1776cc7b23ce99fbd1e97e4c6,2025-04-02T14:58:07.527000
CVE-2025-21993,0,0,66c2148a71e83b9b62847cb22c2c78dd4860fbbad85f37a981afcca17e78c13f,2025-04-02T14:58:07.527000
CVE-2025-21994,0,0,28d149d17b3dcc629354afa3c0b3e205cf97d7f575b2cfe4fea3449fae8a2fd2,2025-04-02T14:58:07.527000
CVE-2025-21990,0,1,c6f830c7a6f95cb12721fb767d6ec640320b1f9276d5551b2ede2366ad6d31f3,2025-04-10T13:25:01.577000
CVE-2025-21991,0,1,63b49f43cf2133ca43a412e23175e72c099a14957aef6c2061b912b62304895c,2025-04-10T13:24:35.230000
CVE-2025-21992,0,1,15562f59303a19ec99d0304ad06949423b421a45c8bc31ef39284adf4b1d9575,2025-04-10T13:15:49.053000
CVE-2025-21993,0,1,c7d7a240f7e952f7bb94c66a07e027bda01efc77ec36981187d03cb58fdf6d20,2025-04-10T13:24:10.787000
CVE-2025-21994,0,1,fb9048208441dce66026c77200fbc30f31fbf21a4c08fe3e825028547f121380,2025-04-10T13:15:49.333000
CVE-2025-21995,0,0,39cd5a3684b1268074ce5543ed4e1145926df1a1efe6a4230d26e4ca94fe5d6d,2025-04-07T14:18:34.453000
CVE-2025-21996,0,0,87f534beee0d8dd0fa3dadba16f120da9abd9632919fbc7de7ab0cf56a50fdde,2025-04-07T14:18:34.453000
CVE-2025-21996,0,1,588f0fd0b54d9addc949f3c824af6a9ae5f47eb17c59b79156a90266569b6ab7,2025-04-10T13:15:49.453000
CVE-2025-21997,0,0,eee4a513ef8e5dfb7b07fdbef713dcabb27c25039ea5704a9aaa15bda20acf31,2025-04-07T14:18:34.453000
CVE-2025-21998,0,0,159795d3cd482f4893b30d42942b4b57a39974cf5007492bbf74917b5664adf3,2025-04-07T14:18:34.453000
CVE-2025-21999,0,0,eb3945e0a8581d3f11d329c04183989c747e3c4252a55283c2078b023f017786,2025-04-08T15:49:48.200000
CVE-2025-21999,0,1,6fcd1eb7455ff16437852a0724a81ccfe881c35e5e1b791d3216d65a7ece8d19,2025-04-10T13:15:49.693000
CVE-2025-2200,0,0,21deda7203fc92111d87559693dc915b258e0e0cc7d6dd852915de5a18e9eb3e,2025-03-18T16:15:28.347000
CVE-2025-22000,0,0,3f2ee99f8e22de85bca39cb4e485228ea9cc9ee4417028533c7dc6982b1cde5a,2025-04-07T14:18:34.453000
CVE-2025-22001,0,0,cbc3bb1c89f6487fbe056c082bd296ca39d25ba5532d66090467e74cd62e6335,2025-04-07T14:18:34.453000
CVE-2025-22002,0,0,c319a343d94f6b1787154174a9e452b0184e5505963c349d50abf5cf4a1d5d24,2025-04-07T14:18:34.453000
CVE-2025-22003,0,0,1e3ec526103cc2ecaeca5a0d8aa1ee3f71ef85fae629633a5c2e4d1d2941233f,2025-04-07T14:18:34.453000
CVE-2025-22004,0,0,ec7d83042ff612f0c21b4758b3cd2e0f14c38a7a425cc15b58893f0b86b05f1a,2025-04-08T15:48:27.060000
CVE-2025-22005,0,0,4cd51e496a9f3454848e95f5f6a05c13a69bece8dea5c169e93cded54562bc5f,2025-04-07T14:18:34.453000
CVE-2025-22004,0,1,db13fec2a01410c78bea8ecc95c052479e55452fee80a7f7ef15af13236ddfa4,2025-04-10T13:15:49.917000
CVE-2025-22005,0,1,cbba06e1618ebbbf3c91887c854cea713235220bff1567c0f92219efe5ce73fd,2025-04-10T13:15:50.153000
CVE-2025-22006,0,0,3ae2f25725b261486943b919fae821476183fa3ab460047898f00af25ca11479,2025-04-07T14:18:34.453000
CVE-2025-22007,0,0,3d5542812aeb3ea12efdc811fa913b4e1456a9295a5ddae09e69426d5bbac28c,2025-04-07T14:18:34.453000
CVE-2025-22008,0,0,f1861e066c7602d0fb6be4b0e3e4ab42df21d9c93bd3421e979d394ceaee60b0,2025-04-08T18:13:53.347000
CVE-2025-22009,0,0,39876f5b10aaf24703bef4be97ee51d2a32b27c9d6bcd2271e62edc553dfa3a8,2025-04-08T18:13:53.347000
CVE-2025-22007,0,1,3525b0da626694906ad9620e5fc8d537c3c6b35d5483e1e24772a26274abb661,2025-04-10T13:31:23.433000
CVE-2025-22008,0,1,449f5eef7dd2bb75a7e41bddd73a59d3b022e061262f9ca3223183621379a233,2025-04-10T13:15:50.570000
CVE-2025-22009,0,1,40e41200cab42c2b65efecfdae5d6e49b4b0deef0dfc3aa15b9532a333b1d348,2025-04-10T13:10:51.817000
CVE-2025-2201,0,0,2371e9549039387486019592f5bf6cd7cee4f08ab86a19044d07c960855c7b24,2025-03-17T10:15:16.543000
CVE-2025-22010,0,0,f88acf652cb3d6da73b75657d813960324ce38f35b32abd1ebc70acccdb79268,2025-04-08T18:13:53.347000
CVE-2025-22011,0,0,efb46b9ea4b0237914ab8f947027203e9afbc34d005fee733a6bb917923e3820,2025-04-08T18:13:53.347000
CVE-2025-22012,0,0,058b088ed350d800349354071fee4357ddaf82fd018990d6314f0a294c2cc0eb,2025-04-08T18:13:53.347000
CVE-2025-22010,0,1,bdac999142019e0464835ba2c58bc0993611c3b3716f57cce8448da038080674,2025-04-10T13:15:50.687000
CVE-2025-22011,0,1,d6f0b86ea4fcae9c437f3df761e6c6f1254719a130d7c775b001ee5d7ce8ebed,2025-04-10T13:10:41.140000
CVE-2025-22012,0,1,2a1ef2918aee65275f9f773f0505976a03f119761b851bcaee2754c36f3fb91c,2025-04-10T13:10:36.613000
CVE-2025-22013,0,0,e1d841daf76fcef71b69c4e5a22ad4f97350e5378a8b689ae54366b50174eeff,2025-04-08T18:13:53.347000
CVE-2025-22014,0,0,bc9b8387298f375e0da958063c23e6de2378a06711d407a941fe1cd939452f5e,2025-04-08T18:13:53.347000
CVE-2025-22014,0,1,d0677bce9b40bf2440f1e3f05d26248d0f1a8e04e3af5766ae8663607da1e5dd,2025-04-10T13:15:50.823000
CVE-2025-22015,0,0,76ef40b09e4f1cb899d4a2ab31f22c4f6d8c6e60d75140b0b3e5777f401c7fbf,2025-04-08T18:13:53.347000
CVE-2025-22016,0,0,147b90da5e7863ebd9aa554a0d14ec0b4cb2770bdef3a66630422d63719c334c,2025-04-08T18:13:53.347000
CVE-2025-22017,0,0,47242ca22d32729ade7b3f671002250e206d140a0d8f74e89394f4529c76da51,2025-04-08T18:13:53.347000
@ -283886,8 +283889,8 @@ CVE-2025-22368,0,0,15868b6e5746df64ac40f74359090d3c138a5fc4277e3491f8b4d3153bda9
CVE-2025-22369,0,0,914da155da04583b64bbcd7efb69cdb65cf9b4fa1a7a93f57111b5e36bed452e,2025-03-11T14:15:24.767000
CVE-2025-2237,0,0,5abe8aae0fc2ed4e21d30009a4a645b5354722e78a6daf854fe7aa80a45532a0,2025-04-01T20:26:11.547000
CVE-2025-22370,0,0,e3b9834ee83fce05ff2df07009571f711e0033889d2c52add2c8f53db29092f5,2025-03-11T14:15:24.917000
CVE-2025-22374,1,1,efbab832033d0e85fbde5079a94f646b16422ad949be0fab3d024c1b5d5af261,2025-04-10T11:15:44.587000
CVE-2025-22375,1,1,17ce67db472c2d64f8e0a7353752a413b26b2cad61e3ef283b1cfaeb01def9de,2025-04-10T11:15:45.510000
CVE-2025-22374,0,0,efbab832033d0e85fbde5079a94f646b16422ad949be0fab3d024c1b5d5af261,2025-04-10T11:15:44.587000
CVE-2025-22375,0,0,17ce67db472c2d64f8e0a7353752a413b26b2cad61e3ef283b1cfaeb01def9de,2025-04-10T11:15:45.510000
CVE-2025-22376,0,0,0b599d4fbe0b053f67328db02ad6a56c3b1af5acbc775b8d4fa33614fa96b0bf,2025-01-21T18:15:15.473000
CVE-2025-22383,0,0,971c2012aab2f3f792cbdd2c68df4004dd1217088db2d92a7bb003d39ddd9443,2025-01-06T15:15:16.103000
CVE-2025-22384,0,0,cce93b0fc1a45d09b2ac82e610ea925820e4793a4749701feb605ea07db42a77,2025-01-06T17:15:47.820000
@ -284517,7 +284520,7 @@ CVE-2025-23382,0,0,607dd91845211bbafd299e41a03d19f4efc365f4aee35f49c34ca976065bd
CVE-2025-23383,0,0,05837481956a127d4906ec34da8ec9db5e9ce66a3b24e855c1d9d4962621e69f,2025-03-28T18:11:40.180000
CVE-2025-23384,0,0,d7685224b7a10743fe5eae6a1ebefcafcac773ad88bd00cac8b6407ed3adf454,2025-03-11T10:15:16.330000
CVE-2025-23385,0,0,44f68c3210fdb2f588e2b733b3276d4f924d74ac5df4660c1e28e1d2bd89eca2,2025-01-28T16:15:41.377000
CVE-2025-23386,1,1,2e997653b431df4a288a080e620d0de8d54c51e4c0be4278d3e5e3f46ab45492,2025-04-10T10:15:14.697000
CVE-2025-23386,0,0,2e997653b431df4a288a080e620d0de8d54c51e4c0be4278d3e5e3f46ab45492,2025-04-10T10:15:14.697000
CVE-2025-2339,0,0,fb243958e2daa877ca1a322ef09207ff301ba4f92634dddb833183fd13861e60,2025-03-17T15:15:45.253000
CVE-2025-23396,0,0,db4e35f65814d6895af1ea2102cd85328d5b692a5d5376b0f0f76fda3c3d1fa0,2025-03-11T10:15:16.670000
CVE-2025-23397,0,0,b39331b70d2d90745cf1ffdc79eae13a67bdd2a5914d5254d36092c6bef82b6d,2025-03-11T10:15:16.840000
@ -285203,6 +285206,7 @@ CVE-2025-24076,0,0,5f6e02a1a3c83b4dfc5002327031bc10d5e45c77892b582ec81598e32b3df
CVE-2025-24077,0,0,2a13c5b7197d53f42fa25d514f59fcecca291e66c5abfd6d7e0aa9d7adb7e383,2025-03-11T17:16:30.657000
CVE-2025-24078,0,0,f86c01bad613458e358ed275a6cf12339ea1819bf15cc23dd81aa87da5b465da,2025-03-11T17:16:30.863000
CVE-2025-24079,0,0,355e13da896e08010e4cb220d212dd80142b1ba2bd9fe202d6daec3e0edb1bdf,2025-03-11T17:16:31.100000
CVE-2025-2408,1,1,a7a980e54b984203c1d60f4de1e855e08adbc3cb39d1d7f65a9aad0715e447f6,2025-04-10T13:15:51.760000
CVE-2025-24080,0,0,1ef3f4ecbe359efc92dc8beafd20dbed23890d2418a2d17387260c9e0871d082,2025-03-11T17:16:31.323000
CVE-2025-24081,0,0,d8b8605bf5b2bb395fcf32de829b06d46aca047556de4026f94bdf2196d18cd4,2025-03-11T17:16:32.533000
CVE-2025-24082,0,0,4fe96689ea1ca456e34bbc986aff0006e237547e0e207187774380b9c7d05d9d,2025-03-11T17:16:33.087000
@ -286014,6 +286018,7 @@ CVE-2025-25193,0,0,613e1ea926b6fdda40afee3d113741ca12354927f3daa951434c4e6e69010
CVE-2025-25194,0,0,278bc98c8a0ffe0e8a7e96acea34ed9bc50825c485f6cab1eaf41889a2da8034,2025-02-10T23:15:16.067000
CVE-2025-25195,0,0,6422ab465e1e4500e1fe77efd7e4b259d61944cface94edb31eac51bdeddd22d,2025-02-13T22:15:13.100000
CVE-2025-25196,0,0,5196aba0be3d543377128b43ddee4b3fe123287a21ab5155a82a956ba8a5209f,2025-02-19T21:15:15.577000
CVE-2025-25197,1,1,9da87a54ea6ffde7c9d443056e3031e6167aebb5556c2d7e6926e4b6c2b68ac1,2025-04-10T13:15:51.017000
CVE-2025-25198,0,0,dba1938f205829e248418b009d8da17ce793befa8842802d286cefa151f40ef8,2025-02-12T18:15:27.757000
CVE-2025-25199,0,0,cef47ad8035ccc7763ac731a7bbc3b7e25e483ba8b3abe7752d565785afdd38f,2025-02-12T18:15:27.933000
CVE-2025-25200,0,0,c0cb0fce70dbf3c916b9237ccd8132fc95e67d71a22f8450c0a6447fbdfe329c,2025-02-12T18:15:28.110000
@ -286141,10 +286146,10 @@ CVE-2025-2549,0,0,81bc1419bc2ca032b7d3a3129fa4aec6b83ee02f25c21613bfc61816baf003
CVE-2025-25497,0,0,342cc8c3073c7b4fb963ce6919474125872366956f79f35d55abc4517740c1dc,2025-03-07T20:15:38.013000
CVE-2025-2550,0,0,4a61e93674e502a8c0bed02381936602716218efa1f9f7373841b1b6041298c4,2025-03-20T17:15:38.903000
CVE-2025-25500,0,0,95e8030caa1744993dcffd587771b6fc47c54882af19cac8227239517d6e0133,2025-03-21T17:15:39.243000
CVE-2025-25505,0,0,11c4c75af440f82d715defaf6782907c0744a464a1a91c9d9aeef14ada87484d,2025-02-21T21:15:23.723000
CVE-2025-25507,0,0,aaa8b5a00bc14c6200ce4ada5e546d091bf3632fba77c66b3ac71c873b2a184e,2025-02-21T21:15:23.870000
CVE-2025-25505,0,1,e9c1c4e7fd17d69fb175176fd0aebef11f3e6fa5ba62e87e57c2aa8b17ea4735,2025-04-10T13:37:15.333000
CVE-2025-25507,0,1,99fcc628e72eaef3ab2758be4c7c5d9b6fb666ee1ec31a8fdfbf52e5a6e3d4f3,2025-04-10T13:37:05.443000
CVE-2025-2551,0,0,70be67e63aae83c04048736ff89759931da9700ea07f97a5f0016d4208b5a4fc,2025-03-20T17:15:39.090000
CVE-2025-25510,0,0,80b49d96f8cfea96d2e40e1145bf347e93013db39579b2b941514912fbfd558e,2025-02-21T21:15:24.023000
CVE-2025-25510,0,1,1977ea1f74ae151f68e2cd5d5c817544df43313e743c312ceaf6b9963fd719e6,2025-04-10T13:36:28.503000
CVE-2025-25513,0,0,8162e2be684a72798c0754d951e189663ee35bc02f8b0275a49b748fc819db60,2025-03-14T17:15:51.350000
CVE-2025-25514,0,0,ce9f2216655696e40479cab3ce833f2e565b44df3540e5448dfb69cae33e2cc2,2025-03-28T17:02:40.640000
CVE-2025-25515,0,0,00cd90884849ea5ae232a994a6e17b920afed76812b1fbdebc6641ebc5b70ef0,2025-03-28T17:02:36.703000
@ -286209,9 +286214,9 @@ CVE-2025-25667,0,0,d0a445cc31a702833da7b419bfb916db019325d0a01c653b1aff0acf6f057
CVE-2025-25668,0,0,3a390720dec3e2d486dc54a6361f2f35ae4d39f099b715395f225090d62ea40f,2025-03-17T16:59:59.693000
CVE-2025-25674,0,0,8ce40ba3c5a2d332ca848bf332b28ce5e1ea817c4e5b7751e0bf1c1f0eeb7a9f,2025-03-17T14:23:02.403000
CVE-2025-25675,0,0,c72dca8ea86886a3af81f324f3cf1b0ae0870a19e6aae0e2e014084eb2e1c680,2025-03-17T14:26:22.483000
CVE-2025-25676,0,0,daf85732e597f1793e01b57a88af2ab73ae5e7b139e5e84dbb4cacf83744c130,2025-02-21T18:16:04.577000
CVE-2025-25678,0,0,64aaf58170ee4d79f4247ea2c0b96da46219dfaa04983aca5741969381b237f2,2025-02-21T18:16:08.493000
CVE-2025-25679,0,0,3cebd49dfacc441892528658235bae2847665b7e89bb57bdaf15bcd2a8d49f09,2025-02-24T18:15:19.213000
CVE-2025-25676,0,1,2caeac199d92898771cb61a1f50bc4e997a82341fb0b8426f50c92948f273cc4,2025-04-10T13:37:42.663000
CVE-2025-25678,0,1,85648d779984c5744ca9f1df5048118dd1e49b98a4ab2d697b06bfdee7ecda30,2025-04-10T13:37:33.913000
CVE-2025-25679,0,1,e5998fa821177dc2d0587e60d5b4d9ad2f548fdc771316a73f33198e8c181ee0,2025-04-10T13:37:24.763000
CVE-2025-2568,0,0,022c86ea4873b7192b1f44a6eb946050d85be07ef6e58bb492571e06c8bb2724,2025-04-08T18:13:53.347000
CVE-2025-25680,0,0,8919bd2c5780d2fa1291e3679750e4e12f0c9d491f8dd8781fc99e5d4e2ec16e,2025-03-21T21:15:36.390000
CVE-2025-25683,0,0,3255bc8ab1d20b4d3f7b9e4f7d5ecc3209c23b4404d764181c9a91c6bf864bb3,2025-03-12T19:15:39.490000
@ -287086,7 +287091,7 @@ CVE-2025-27347,0,0,3fdbce57cbd7cf9b851b9749f5fd4da47fb732dc78c83a918bad725aaa5a9
CVE-2025-27348,0,0,3686c4d4f42e07032d88980aee28e858de101bf7a08266196762e9d8b82190d3,2025-02-24T15:15:20.230000
CVE-2025-27349,0,0,e565e2e7ab823e8ce368b7ce159ee5c9e5e2d4b6fffbb00c33c3f2c793cedd78,2025-02-24T15:15:20.363000
CVE-2025-2735,0,0,18a277d50971a1778478f133aa8e2a2c8b054fff12a17d2f69fa62d8b49ad997,2025-03-27T16:45:46.410000
CVE-2025-27350,1,1,e09ed599c58975692f8848fc4a5e296e42393973756e0f917451bec3022c87a3,2025-04-10T11:15:45.660000
CVE-2025-27350,0,0,e09ed599c58975692f8848fc4a5e296e42393973756e0f917451bec3022c87a3,2025-04-10T11:15:45.660000
CVE-2025-27351,0,0,9657ca223cec84786da24feeeaeda53aea8b5d50584170f4a11add562ce066bc,2025-02-24T15:15:20.503000
CVE-2025-27352,0,0,9ab0d9fa36fc0dcad2f4106dc12e198c4472bb7fe0be465b550fb73236bf2fbf,2025-02-24T15:15:20.643000
CVE-2025-27353,0,0,24ac6ebce3848378b1344a6468f91efd03d707d9d99a1f55a994a6db165def0e,2025-02-24T15:15:20.780000
@ -287380,6 +287385,8 @@ CVE-2025-2780,0,0,8ce61193bdd5d01c360c9dde19d31cb5df8ec0c3ce67c7effda6feb1168c24
CVE-2025-27809,0,0,acf17088263ac0454f3c19e9b5b69eee2adc10f0e02e48930b8a575ccd37ca6c,2025-03-27T16:45:46.410000
CVE-2025-2781,0,0,f71242cf9553514cc2ec12a96aa1195882b54360169109a0233e1040d7956dda,2025-04-01T20:26:30.593000
CVE-2025-27810,0,0,d1482541c832943462d5d5141f3260f826675da05c4de1d17a8d8000d1e76d18,2025-03-27T16:45:46.410000
CVE-2025-27812,1,1,16fa60b0b651a1b1ffbb1b9ece13f09baa56c4961f7aebbfee2c91b65cf30fed,2025-04-10T13:15:51.220000
CVE-2025-27813,1,1,d8132789391dea873ba6a9c236c1025ad83b8f5f8bce5954bb932cf4ea9e0231,2025-04-10T13:15:51.577000
CVE-2025-27816,0,0,9ab27d50becb6f1925043133c65bc558001d86f2d9081231a272e11d17cb2516,2025-03-07T20:15:38.900000
CVE-2025-2782,0,0,f7b2edc498b938674db351470dcc82477b82d7a96a3f89a710e19cd683cf7f7a,2025-04-01T20:26:30.593000
CVE-2025-27822,0,0,8db44093401926706a840ce0e19328855573d2443e1e01b57e17b296b11ec387,2025-03-07T22:15:37.927000
@ -287920,6 +287927,7 @@ CVE-2025-30141,0,0,4828215ddc551f721f9119cc66fd0b6301157a9edecaa8b1bbaf43bada37f
CVE-2025-30142,0,0,e6345e1b8b1602cf6baee1bb466c15695f398722ed692cc5b3b87414578f99b0,2025-03-25T16:15:27.130000
CVE-2025-30143,0,0,c72031c589e36c3d2604bcb120ba9a6dd94ff4f6eee14259c749d5630ebbfba8,2025-03-17T16:15:28.643000
CVE-2025-30144,0,0,15bf5f8218ba2223682697484bbc86f902d5a148eb49e6248d7c2412b7737d74,2025-03-19T16:15:33.080000
CVE-2025-30148,1,1,176a5bd42789860cf1c54522cbe3b2d0d209c874ee2902ce19ea7d27b17efbac,2025-04-10T13:15:51.930000
CVE-2025-30149,0,0,9d45b14f7ce1c383888c38736f5cf3ea63c5e434e58881699105d1fe3c5316e1,2025-04-01T20:26:22.890000
CVE-2025-3015,0,0,099717fc51ac180e71d1a26e8b38cd7df3f75ab75884b374ba09343d9b7ef833,2025-04-01T20:26:22.890000
CVE-2025-30150,0,0,78c0a67cc85c67ebae2202ed81d36fba73d24dbd816d4eab529fd509b9c71b6c,2025-04-08T18:13:53.347000
@ -287946,7 +287954,7 @@ CVE-2025-30195,0,0,8f3f1b1a07ca04bd893228f3549f8ce9aa13eb155049bf09e210b92648e3a
CVE-2025-30196,0,0,fe87e1ebefbcfeb53c0f502cc8d045248065acd7de3485e4d3812fc7fa420ce6,2025-03-19T19:15:50.980000
CVE-2025-30197,0,0,2d4109cd57eb04a1dbf5d412cbfee8b568c6ea58cd4671c7483e548e96f39bba,2025-03-21T14:15:17.837000
CVE-2025-30203,0,0,e800abc36567cdb1aba654be30422b80d90780ac94d6ea5cf2b8a4bf6a4b6384,2025-04-01T20:26:22.890000
CVE-2025-30204,0,0,7bd4031e29493ef25dd2042a5f778e7f2ac78e134a5c8efc8e92df9ba66c9513,2025-04-04T23:15:42.443000
CVE-2025-30204,0,1,a62a2febc5dc48c687f751c501a508130f5fcc004bb8b764581a0a0be25b0f0a,2025-04-10T13:15:52.097000
CVE-2025-30205,0,0,5a6e6a15e27f16257c15600ed612a889ee89ec4cb07cdade70362275ccba48b8,2025-03-27T16:45:46.410000
CVE-2025-30208,0,0,8d10db1183f79516c18383e3ab326bcd260d9a2a6e5e9bbda5d21358e669589c,2025-03-27T16:45:46.410000
CVE-2025-30209,0,0,ca85555ac6409e2cc639554bb6f23475b46a539ab4ead27cd69c29cc29e86660,2025-04-01T20:26:22.890000
@ -288599,7 +288607,7 @@ CVE-2025-31408,0,0,4bce0889fff07e9d2af0109421fe58b7234ee5ebf9fa6560ab95ff15e16d9
CVE-2025-31409,0,0,82dbb111649d8cf9e26a4c460fca8cf167c66dfbe7749d633be5ad71c1f22147,2025-04-01T20:26:11.547000
CVE-2025-3141,0,0,8360183ec4fba0da13c3410bb9d4443e65e196b85f2b1133d2249c2215248c03,2025-04-09T20:08:13.613000
CVE-2025-31410,0,0,d2744125929669a0550251c0ca1a9221dc78cee85634e7974f1b02dfdfbfe3ca,2025-04-01T20:26:30.593000
CVE-2025-31411,1,1,73a3d23ce4fe495cefb3d2af3ca3ac953465d4665e10225fbabd6a5ada831e80,2025-04-10T11:15:45.830000
CVE-2025-31411,0,0,73a3d23ce4fe495cefb3d2af3ca3ac953465d4665e10225fbabd6a5ada831e80,2025-04-10T11:15:45.830000
CVE-2025-31412,0,0,f2a3a75101b5fbb687e484fbb151373c9b65c031636af9fa6343c10e46f352fd,2025-04-01T20:26:30.593000
CVE-2025-31414,0,0,c7c8b152028249fcda3808d41ed059a882fd165da9cc6176d922213c7f3b4129,2025-04-01T20:26:30.593000
CVE-2025-31415,0,0,414e63d224a09cd075a83b960b86b86bc2238dd067741c725e74f347156214de,2025-04-01T20:26:11.547000
@ -289397,6 +289405,8 @@ CVE-2025-32693,0,0,8b4c3ca6e5f78d8e905f61115dad2c0f8bfcead7073e277a4dfe0246c8f18
CVE-2025-32694,0,0,c5323b32f99e8c9fc8ccc9989da14785a02c4cec59717fdc95787034e559d1d1,2025-04-09T20:02:41.860000
CVE-2025-32695,0,0,d37a7a3802052ba2b179b04e772474f69fbfbf6cedd0f20f3383706ffa54c144,2025-04-09T20:02:41.860000
CVE-2025-32728,0,0,9923765068f28ee8d641fe9ebffdc724554e8390950f0688a8c20af34af4f682,2025-04-10T02:15:30.873000
CVE-2025-32754,1,1,7293d82a535d6ac43092b29832df966e066de807c3840e239e9cd8213c00e842,2025-04-10T12:15:16.280000
CVE-2025-32755,1,1,0b97214606920637fa044142c84f00c908d62692058452699e85b59deeb66426,2025-04-10T12:15:16.547000
CVE-2025-3285,0,0,e28a4e88da7ffb77ad01de08bcfd2b4a71d41180820a080f587b6350c35f9e48,2025-04-08T18:13:53.347000
CVE-2025-3286,0,0,c247e4e94cc04e66afe391d63c6254a128435a66f18dde665fe78a6cdb0ab317,2025-04-08T18:13:53.347000
CVE-2025-3287,0,0,bff258a343cd08a61757791ae0246a98daa5f12cd52be7d2e4f1314c24254af2,2025-04-08T18:13:53.347000

Can't render this file because it is too large.