mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-06-19T14:00:19.951536+00:00
This commit is contained in:
parent
4c048c01e0
commit
c95081a347
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2022-48849",
|
"id": "CVE-2022-48849",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-07-16T13:15:12.103",
|
"published": "2024-07-16T13:15:12.103",
|
||||||
"lastModified": "2024-11-21T07:34:12.480",
|
"lastModified": "2025-06-19T13:15:21.690",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -91,13 +91,6 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/fcd1d79aa943fff4fbaa0cce1d576995a7960699",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/cb29021be49858059138f75d6311a7c35a9379b2",
|
"url": "https://git.kernel.org/stable/c/cb29021be49858059138f75d6311a7c35a9379b2",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-48935",
|
"id": "CVE-2022-48935",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-08-22T04:15:16.877",
|
"published": "2024-08-22T04:15:16.877",
|
||||||
"lastModified": "2024-08-23T01:45:31.280",
|
"lastModified": "2025-06-19T13:15:21.983",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -105,13 +105,6 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/88c795491bf45a8c08a0f94c9ca4f13722e51013",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/8ffb8ac3448845f65634889b051bd65e4dee484b",
|
"url": "https://git.kernel.org/stable/c/8ffb8ac3448845f65634889b051bd65e4dee484b",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
@ -119,13 +112,6 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/b05a24cc453e3cd51b0c79e3c583b5d495eba1d6",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/b4fcc081e527aa2ce12e956912fc47e251f6bd27",
|
"url": "https://git.kernel.org/stable/c/b4fcc081e527aa2ce12e956912fc47e251f6bd27",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-48941",
|
"id": "CVE-2022-48941",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-08-22T04:15:17.967",
|
"published": "2024-08-22T04:15:17.967",
|
||||||
"lastModified": "2024-08-22T18:41:37.090",
|
"lastModified": "2025-06-19T13:15:22.263",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -84,13 +84,6 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/05ae1f0fe9c6c5ead08b306e665763a352d20716",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/2a3e61de89bab6696aa28b70030eb119968c5586",
|
"url": "https://git.kernel.org/stable/c/2a3e61de89bab6696aa28b70030eb119968c5586",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-49152",
|
"id": "CVE-2022-49152",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-02-26T07:00:52.440",
|
"published": "2025-02-26T07:00:52.440",
|
||||||
"lastModified": "2025-03-13T21:58:23.127",
|
"lastModified": "2025-06-19T13:15:22.587",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -105,40 +105,12 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/1ac49c8fd49fdf53d3cd8b77eb8ffda08d7fbe22",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/29968329b926d238e3107ec071a250397555d264",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/3e2852eda19ee1a400cd809d7a9322680f34a262",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/3e3c658055c002900982513e289398a1aad4a488",
|
"url": "https://git.kernel.org/stable/c/3e3c658055c002900982513e289398a1aad4a488",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"tags": [
|
"tags": [
|
||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/7521a97b1929042604bef6859f62fa8b4bbc077b",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2022-49352",
|
"id": "CVE-2022-49352",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-02-26T07:01:11.920",
|
"published": "2025-02-26T07:01:11.920",
|
||||||
"lastModified": "2025-02-26T07:01:11.920",
|
"lastModified": "2025-06-19T13:15:23.173",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -17,10 +17,6 @@
|
|||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/0ab308d72af7548f21e4499d025c25887da0c26a",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/1bcce88da60eccc946c0f4ed942b0f08cd565778",
|
"url": "https://git.kernel.org/stable/c/1bcce88da60eccc946c0f4ed942b0f08cd565778",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2022-49412",
|
"id": "CVE-2022-49412",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-02-26T07:01:17.703",
|
"published": "2025-02-26T07:01:17.703",
|
||||||
"lastModified": "2025-03-24T19:52:31.537",
|
"lastModified": "2025-06-19T13:15:23.390",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -105,13 +105,6 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/7d172b9dc913e161d8ff88770eea01701ff553de",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/8abc8763b11c35e03cc91d59fd0cd28d39f88ca9",
|
"url": "https://git.kernel.org/stable/c/8abc8763b11c35e03cc91d59fd0cd28d39f88ca9",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
@ -119,13 +112,6 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/97be7d13fbd4001eeab49b1be6399f23a8c66160",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/a16c65cca7d2c7ff965fdd3adc8df2156529caf1",
|
"url": "https://git.kernel.org/stable/c/a16c65cca7d2c7ff965fdd3adc8df2156529caf1",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2022-49418",
|
"id": "CVE-2022-49418",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-02-26T07:01:18.260",
|
"published": "2025-02-26T07:01:18.260",
|
||||||
"lastModified": "2025-02-26T07:01:18.260",
|
"lastModified": "2025-06-19T13:15:23.660",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -24,10 +24,6 @@
|
|||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/c3ed222745d9ad7b69299b349a64ba533c64a34f",
|
"url": "https://git.kernel.org/stable/c/c3ed222745d9ad7b69299b349a64ba533c64a34f",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/eb1fe9600b86c24a789046bfc5c6851dda119280",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2022-49558",
|
"id": "CVE-2022-49558",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-02-26T07:01:31.597",
|
"published": "2025-02-26T07:01:31.597",
|
||||||
"lastModified": "2025-02-26T07:01:31.597",
|
"lastModified": "2025-06-19T13:15:23.990",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -37,10 +37,6 @@
|
|||||||
"url": "https://git.kernel.org/stable/c/b09e6ccf0d12f9356e8e3508d3e3dce126298538",
|
"url": "https://git.kernel.org/stable/c/b09e6ccf0d12f9356e8e3508d3e3dce126298538",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/c73955a09408e7374d9abfd0e78ce3de9cda0635",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/f9a43007d3f7ba76d5e7f9421094f00f2ef202f8",
|
"url": "https://git.kernel.org/stable/c/f9a43007d3f7ba76d5e7f9421094f00f2ef202f8",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-52569",
|
"id": "CVE-2023-52569",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-03-02T22:15:49.163",
|
"published": "2024-03-02T22:15:49.163",
|
||||||
"lastModified": "2025-01-16T17:08:05.613",
|
"lastModified": "2025-06-19T13:15:25.037",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -89,13 +89,6 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/39c4a9522db0072570d602e9b365119e17fb9f4f",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/d10fd53393cc5de4b9cf1a4b8f9984f0a037aa51",
|
"url": "https://git.kernel.org/stable/c/d10fd53393cc5de4b9cf1a4b8f9984f0a037aa51",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-52681",
|
"id": "CVE-2023-52681",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-05-17T15:15:19.360",
|
"published": "2024-05-17T15:15:19.360",
|
||||||
"lastModified": "2024-11-21T08:40:21.033",
|
"lastModified": "2025-06-19T13:15:25.340",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -17,10 +17,6 @@
|
|||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/48be1364dd387e375e1274b76af986cb8747be2c",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/547713d502f7b4b8efccd409cff84d731a23853b",
|
"url": "https://git.kernel.org/stable/c/547713d502f7b4b8efccd409cff84d731a23853b",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
@ -29,10 +25,6 @@
|
|||||||
"url": "https://git.kernel.org/stable/c/92be3095c6ca1cdc46237839c6087555be9160e3",
|
"url": "https://git.kernel.org/stable/c/92be3095c6ca1cdc46237839c6087555be9160e3",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/ea6b597fcaca99562fa56a473bcbbbd79b40af03",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/48be1364dd387e375e1274b76af986cb8747be2c",
|
"url": "https://git.kernel.org/stable/c/48be1364dd387e375e1274b76af986cb8747be2c",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||||
|
@ -2,194 +2,15 @@
|
|||||||
"id": "CVE-2023-52733",
|
"id": "CVE-2023-52733",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-05-21T16:15:13.380",
|
"published": "2024-05-21T16:15:13.380",
|
||||||
"lastModified": "2025-04-02T14:51:20.137",
|
"lastModified": "2025-06-19T13:15:25.540",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Rejected",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/decompressor: specify __decompress() buf len to avoid overflow\n\nHistorically calls to __decompress() didn't specify \"out_len\" parameter\non many architectures including s390, expecting that no writes beyond\nuncompressed kernel image are performed. This has changed since commit\n2aa14b1ab2c4 (\"zstd: import usptream v1.5.2\") which includes zstd library\ncommit 6a7ede3dfccb (\"Reduce size of dctx by reutilizing dst buffer\n(#2751)\"). Now zstd decompression code might store literal buffer in\nthe unwritten portion of the destination buffer. Since \"out_len\" is\nnot set, it is considered to be unlimited and hence free to use for\noptimization needs. On s390 this might corrupt initrd or ipl report\nwhich are often placed right after the decompressor buffer. Luckily the\nsize of uncompressed kernel image is already known to the decompressor,\nso to avoid the problem simply specify it in the \"out_len\" parameter."
|
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||||
},
|
|
||||||
{
|
|
||||||
"lang": "es",
|
|
||||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: s390/decompressor: especifique __decompress() buf len para evitar el desbordamiento. Hist\u00f3ricamente, las llamadas a __decompress() no especificaban el par\u00e1metro \"out_len\" en muchas arquitecturas, incluido s390, esperando que no se escribieran m\u00e1s all\u00e1 Se realizan im\u00e1genes del kernel sin comprimir. Esto ha cambiado desde la confirmaci\u00f3n 2aa14b1ab2c4 (\"zstd: import usptream v1.5.2\") que incluye la confirmaci\u00f3n de la biblioteca zstd 6a7ede3dfccb (\"Reducir el tama\u00f1o de dctx reutilizando el b\u00fafer dst (#2751)\"). Ahora el c\u00f3digo de descompresi\u00f3n zstd podr\u00eda almacenar un b\u00fafer literal en la parte no escrita del b\u00fafer de destino. Dado que \"out_len\" no est\u00e1 configurado, se considera ilimitado y, por lo tanto, de uso gratuito para las necesidades de optimizaci\u00f3n. En s390, esto podr\u00eda da\u00f1ar el informe initrd o ipl que a menudo se coloca justo despu\u00e9s del buffer del descompresor. Afortunadamente, el descompresor ya conoce el tama\u00f1o de la imagen del kernel sin comprimir, por lo que para evitar el problema simplemente especif\u00edquelo en el par\u00e1metro \"out_len\"."
|
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {},
|
||||||
"cvssMetricV31": [
|
"references": []
|
||||||
{
|
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
||||||
"type": "Secondary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
||||||
"baseScore": 7.8,
|
|
||||||
"baseSeverity": "HIGH",
|
|
||||||
"attackVector": "LOCAL",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "LOW",
|
|
||||||
"userInteraction": "NONE",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"confidentialityImpact": "HIGH",
|
|
||||||
"integrityImpact": "HIGH",
|
|
||||||
"availabilityImpact": "HIGH"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 1.8,
|
|
||||||
"impactScore": 5.9
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"weaknesses": [
|
|
||||||
{
|
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
||||||
"type": "Secondary",
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "CWE-120"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"configurations": [
|
|
||||||
{
|
|
||||||
"nodes": [
|
|
||||||
{
|
|
||||||
"operator": "OR",
|
|
||||||
"negate": false,
|
|
||||||
"cpeMatch": [
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
|
||||||
"versionEndExcluding": "5.4.232",
|
|
||||||
"matchCriteriaId": "B50AC354-4651-4CDE-8EA9-58A9A917F725"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
|
||||||
"versionStartIncluding": "5.5",
|
|
||||||
"versionEndExcluding": "5.10.169",
|
|
||||||
"matchCriteriaId": "D8E6784B-A00F-47F0-882B-7209E1F374B7"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
|
||||||
"versionStartIncluding": "5.11",
|
|
||||||
"versionEndExcluding": "5.15.95",
|
|
||||||
"matchCriteriaId": "8508F80E-8588-4976-A2BA-7A2D85018C4E"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
|
||||||
"versionStartIncluding": "5.16",
|
|
||||||
"versionEndExcluding": "6.1.13",
|
|
||||||
"matchCriteriaId": "CE354BE6-0C0F-47EB-AD8A-1433F041AC20"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "A127C155-689C-4F67-B146-44A57F4BFD85"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "D34127CC-68F5-4703-A5F6-5006F803E4AE"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc6:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "4AB8D555-648E-4F2F-98BD-3E7F45BD12A8"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"references": [
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/16409f7d9ca5bb8220e1049ea9aae0d3c94d2dfb",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/55dbd6f4ea954751340f4f73d5dcd7c8f12208b2",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/7ab41c2c08a32132ba8c14624910e2fe8ce4ba4b",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/9ed522143f959630f8b7782ddc212900d8f609a9",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/f1eb22d0ff064ad458b3b1a1eaa84ac3996206c2",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/16409f7d9ca5bb8220e1049ea9aae0d3c94d2dfb",
|
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/55dbd6f4ea954751340f4f73d5dcd7c8f12208b2",
|
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/7ab41c2c08a32132ba8c14624910e2fe8ce4ba4b",
|
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/9ed522143f959630f8b7782ddc212900d8f609a9",
|
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/f1eb22d0ff064ad458b3b1a1eaa84ac3996206c2",
|
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2023-52760",
|
"id": "CVE-2023-52760",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-05-21T16:15:15.410",
|
"published": "2024-05-21T16:15:15.410",
|
||||||
"lastModified": "2025-01-22T18:03:56.987",
|
"lastModified": "2025-06-19T13:15:30.487",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -84,13 +84,6 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/7ad4e0a4f61c57c3ca291ee010a9d677d0199fba",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/bdcb8aa434c6d36b5c215d02a9ef07551be25a37",
|
"url": "https://git.kernel.org/stable/c/bdcb8aa434c6d36b5c215d02a9ef07551be25a37",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-52921",
|
"id": "CVE-2023-52921",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-11-19T02:15:09.310",
|
"published": "2024-11-19T02:15:09.310",
|
||||||
"lastModified": "2024-12-11T15:15:07.307",
|
"lastModified": "2025-06-19T13:15:30.640",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -139,13 +139,6 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/9a2393af1f35d1975204fc00035c64a1c792b278",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/e08e9dd09809b16f8f8cee8c466841b33d24ed96",
|
"url": "https://git.kernel.org/stable/c/e08e9dd09809b16f8f8cee8c466841b33d24ed96",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-26710",
|
"id": "CVE-2024-26710",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-04-03T15:15:53.487",
|
"published": "2024-04-03T15:15:53.487",
|
||||||
"lastModified": "2025-03-17T15:36:11.620",
|
"lastModified": "2025-06-19T13:15:31.147",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -85,13 +85,6 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/4297217bcf1f0948a19c2bacc6b68d92e7778ad9",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/4cc31fa07445879a13750cb061bb8c2654975fcb",
|
"url": "https://git.kernel.org/stable/c/4cc31fa07445879a13750cb061bb8c2654975fcb",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-26774",
|
"id": "CVE-2024-26774",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-04-03T17:15:53.130",
|
"published": "2024-04-03T17:15:53.130",
|
||||||
"lastModified": "2025-02-27T14:37:32.300",
|
"lastModified": "2025-06-19T13:15:31.303",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -101,13 +101,6 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/687061cfaa2ac3095170e136dd9c29a4974f41d4",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/8b40eb2e716b503f7a4e1090815a17b1341b2150",
|
"url": "https://git.kernel.org/stable/c/8b40eb2e716b503f7a4e1090815a17b1341b2150",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,119 +2,15 @@
|
|||||||
"id": "CVE-2024-26794",
|
"id": "CVE-2024-26794",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-04-04T09:15:08.683",
|
"published": "2024-04-04T09:15:08.683",
|
||||||
"lastModified": "2025-04-04T14:28:38.927",
|
"lastModified": "2025-06-19T13:15:31.510",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Rejected",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix race between ordered extent completion and fiemap\n\nFor fiemap we recently stopped locking the target extent range for the\nwhole duration of the fiemap call, in order to avoid a deadlock in a\nscenario where the fiemap buffer happens to be a memory mapped range of\nthe same file. This use case is very unlikely to be useful in practice but\nit may be triggered by fuzz testing (syzbot, etc).\n\nHowever by not locking the target extent range for the whole duration of\nthe fiemap call we can race with an ordered extent. This happens like\nthis:\n\n1) The fiemap task finishes processing a file extent item that covers\n the file range [512K, 1M[, and that file extent item is the last item\n in the leaf currently being processed;\n\n2) And ordered extent for the file range [768K, 2M[, in COW mode,\n completes (btrfs_finish_one_ordered()) and the file extent item\n covering the range [512K, 1M[ is trimmed to cover the range\n [512K, 768K[ and then a new file extent item for the range [768K, 2M[\n is inserted in the inode's subvolume tree;\n\n3) The fiemap task calls fiemap_next_leaf_item(), which then calls\n btrfs_next_leaf() to find the next leaf / item. This finds that the\n the next key following the one we previously processed (its type is\n BTRFS_EXTENT_DATA_KEY and its offset is 512K), is the key corresponding\n to the new file extent item inserted by the ordered extent, which has\n a type of BTRFS_EXTENT_DATA_KEY and an offset of 768K;\n\n4) Later the fiemap code ends up at emit_fiemap_extent() and triggers\n the warning:\n\n if (cache->offset + cache->len > offset) {\n WARN_ON(1);\n return -EINVAL;\n }\n\n Since we get 1M > 768K, because the previously emitted entry for the\n old extent covering the file range [512K, 1M[ ends at an offset that\n is greater than the new extent's start offset (768K). This makes fiemap\n fail with -EINVAL besides triggering the warning that produces a stack\n trace like the following:\n\n [1621.677651] ------------[ cut here ]------------\n [1621.677656] WARNING: CPU: 1 PID: 204366 at fs/btrfs/extent_io.c:2492 emit_fiemap_extent+0x84/0x90 [btrfs]\n [1621.677899] Modules linked in: btrfs blake2b_generic (...)\n [1621.677951] CPU: 1 PID: 204366 Comm: pool Not tainted 6.8.0-rc5-btrfs-next-151+ #1\n [1621.677954] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-0-gea1b7a073390-prebuilt.qemu.org 04/01/2014\n [1621.677956] RIP: 0010:emit_fiemap_extent+0x84/0x90 [btrfs]\n [1621.678033] Code: 2b 4c 89 63 (...)\n [1621.678035] RSP: 0018:ffffab16089ffd20 EFLAGS: 00010206\n [1621.678037] RAX: 00000000004fa000 RBX: ffffab16089ffe08 RCX: 0000000000009000\n [1621.678039] RDX: 00000000004f9000 RSI: 00000000004f1000 RDI: ffffab16089ffe90\n [1621.678040] RBP: 00000000004f9000 R08: 0000000000001000 R09: 0000000000000000\n [1621.678041] R10: 0000000000000000 R11: 0000000000001000 R12: 0000000041d78000\n [1621.678043] R13: 0000000000001000 R14: 0000000000000000 R15: ffff9434f0b17850\n [1621.678044] FS: 00007fa6e20006c0(0000) GS:ffff943bdfa40000(0000) knlGS:0000000000000000\n [1621.678046] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [1621.678048] CR2: 00007fa6b0801000 CR3: 000000012d404002 CR4: 0000000000370ef0\n [1621.678053] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n [1621.678055] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n [1621.678056] Call Trace:\n [1621.678074] <TASK>\n [1621.678076] ? __warn+0x80/0x130\n [1621.678082] ? emit_fiemap_extent+0x84/0x90 [btrfs]\n [1621.678159] ? report_bug+0x1f4/0x200\n [1621.678164] ? handle_bug+0x42/0x70\n [1621.678167] ? exc_invalid_op+0x14/0x70\n [1621.678170] ? asm_exc_invalid_op+0x16/0x20\n [1621.678178] ? emit_fiemap_extent+0x84/0x90 [btrfs]\n [1621.678253] extent_fiemap+0x766\n---truncated---"
|
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||||
},
|
|
||||||
{
|
|
||||||
"lang": "es",
|
|
||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: corrige la ejecuci\u00f3n entre la finalizaci\u00f3n de extensi\u00f3n ordenada y fiemap Para fiemap recientemente dejamos de bloquear el rango de extensi\u00f3n objetivo durante toda la duraci\u00f3n de la llamada a fiemap, para evitar un punto muerto en un escenario donde el b\u00fafer fiemap resulta ser un rango mapeado en memoria del mismo archivo. Es muy poco probable que este caso de uso sea \u00fatil en la pr\u00e1ctica, pero puede activarse mediante pruebas difusas (syzbot, etc.). Sin embargo, al no bloquear el rango de extensi\u00f3n objetivo durante toda la duraci\u00f3n de la llamada a fiemap, podemos competir con una extensi\u00f3n ordenada. Esto sucede as\u00ed: 1) La tarea fiemap termina de procesar un elemento de extensi\u00f3n de archivo que cubre el rango de archivos [512K, 1M[, y ese elemento de extensi\u00f3n de archivo es el \u00faltimo elemento de la hoja que se est\u00e1 procesando actualmente; 2) Y la extensi\u00f3n ordenada para el rango de archivos [768K, 2M[, en modo COW, se completa (btrfs_finish_one_ordered()) y el elemento de extensi\u00f3n de archivo que cubre el rango [512K, 1M[ se recorta para cubrir el rango [512K, 768K[ y luego se inserta un nuevo elemento de extensi\u00f3n de archivo para el rango [768K, 2M[ en el \u00e1rbol de subvolumen del inodo; 3) La tarea fiemap llama a fiemap_next_leaf_item(), que luego llama a btrfs_next_leaf() para encontrar la siguiente hoja/elemento. Esto encuentra que la siguiente clave despu\u00e9s de la que procesamos anteriormente (su tipo es BTRFS_EXTENT_DATA_KEY y su desplazamiento es 512K), es la clave correspondiente al nuevo elemento de extensi\u00f3n de archivo insertado por la extensi\u00f3n ordenada, que tiene un tipo de BTRFS_EXTENT_DATA_KEY y un desplazamiento de 768K; 4) M\u00e1s tarde, el c\u00f3digo fiemap termina en emit_fiemap_extent() y activa la advertencia: if (cache->offset + cache->len > offset) { WARN_ON(1); devolver -EINVAL; } Dado que obtenemos 1M > 768K, porque la entrada emitida previamente para la extensi\u00f3n anterior que cubre el rango de archivos [512K, 1M[ termina en un desplazamiento que es mayor que el desplazamiento inicial de la nueva extensi\u00f3n (768K). Esto hace que fiemap falle con -EINVAL adem\u00e1s de activar la advertencia que produce un seguimiento de pila como el siguiente: [1621.677651] ------------[ cortar aqu\u00ed ]----------- - [1621.677656] ADVERTENCIA: CPU: 1 PID: 204366 en fs/btrfs/extent_io.c:2492 emit_fiemap_extent+0x84/0x90 [btrfs] [1621.677899] M\u00f3dulos vinculados en: btrfs blake2b_generic (...) [1621.677951] CPU: 1 PID: 204366 Comm: pool No contaminado 6.8.0-rc5-btrfs-next-151+ #1 [1621.677954] Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS rel-1.16.2-0-gea1b7a073390- prebuilt.qemu.org 01/04/2014 [1621.677956] RIP: 0010:emit_fiemap_extent+0x84/0x90 [btrfs] [1621.678033] C\u00f3digo: 2b 4c 89 63 (...) [1621.678035] RSP: 0018:ffffab160 89ffd20 EFLAGS: 00010206 [1621.678037] RAX: 00000000004fa000 RBX: ffffab16089ffe08 RCX: 0000000000009000 [1621.678039] RDX: 00000000004f9000 RSI: 00000000004f1000 RDI : ffffab16089ffe90 [1621.678040] RBP: 00000000004f9000 R08: 0000000000001000 R09: 00000000000000000 [1621.678041] R10: 0000000000000000 R11 : 0000000000001000 R12: 0000000041d78000 [1621.678043 ] R13: 0000000000001000 R14: 00000000000000000 R15: ffff9434f0b17850 [1621.678044] FS: 00007fa6e20006c0(0000) GS:ffff943bdfa40000(0000) kn lGS:0000000000000000 [1621.678046] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [1621.678048] CR2: 00007fa6b0801000 CR3 : 000000012d404002 CR4: 0000000000370ef0 [1621.678053] DR0: 0000000000000000 DR1: 00000000000000000 DR2: 0000000000000000 [1621.678055] DR 3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [1621.678056] Seguimiento de llamadas: [1621.678074] [1621.678076] ? __advertir+0x80/0x130 [1621.678082] ? emit_fiemap_extent+0x84/0x90 [btrfs] [1621.678159] ? report_bug+0x1f4/0x200 [1621.678164] ? ---truncado---"
|
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {},
|
||||||
"cvssMetricV31": [
|
"references": []
|
||||||
{
|
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
||||||
"type": "Secondary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
|
||||||
"baseScore": 5.3,
|
|
||||||
"baseSeverity": "MEDIUM",
|
|
||||||
"attackVector": "NETWORK",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "NONE",
|
|
||||||
"userInteraction": "NONE",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"confidentialityImpact": "NONE",
|
|
||||||
"integrityImpact": "NONE",
|
|
||||||
"availabilityImpact": "LOW"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 3.9,
|
|
||||||
"impactScore": 1.4
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"weaknesses": [
|
|
||||||
{
|
|
||||||
"source": "nvd@nist.gov",
|
|
||||||
"type": "Primary",
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "CWE-362"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"configurations": [
|
|
||||||
{
|
|
||||||
"nodes": [
|
|
||||||
{
|
|
||||||
"operator": "OR",
|
|
||||||
"negate": false,
|
|
||||||
"cpeMatch": [
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6.24:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "6780E887-1EB4-4EE5-9542-B333E869A101"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.7.12:*:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "8790AB97-4076-49F9-AEF1-60DFBD74D917"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"references": [
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/31d07a757c6d3430e03cc22799921569999b9a12",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/a1a4a9ca77f143c00fce69c1239887ff8b813bec",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/d43f8e58f10a44df8c08e7f7076f3288352cd168",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/31d07a757c6d3430e03cc22799921569999b9a12",
|
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/a1a4a9ca77f143c00fce69c1239887ff8b813bec",
|
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/d43f8e58f10a44df8c08e7f7076f3288352cd168",
|
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
}
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-26829",
|
"id": "CVE-2024-26829",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-04-17T10:15:09.347",
|
"published": "2024-04-17T10:15:09.347",
|
||||||
"lastModified": "2025-01-14T14:58:05.850",
|
"lastModified": "2025-06-19T13:15:35.917",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -125,13 +125,6 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/486a4176bc783df798bce2903824801af8d2c3ae",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/7219a692ffc00089015ada33b85b334d1a4b6e8e",
|
"url": "https://git.kernel.org/stable/c/7219a692ffc00089015ada33b85b334d1a4b6e8e",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-27410",
|
"id": "CVE-2024-27410",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-05-17T12:15:11.690",
|
"published": "2024-05-17T12:15:11.690",
|
||||||
"lastModified": "2024-11-21T09:04:33.790",
|
"lastModified": "2025-06-19T13:15:36.097",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -17,14 +17,6 @@
|
|||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
"references": [
|
"references": [
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/063715c33b4c37587aeca2c83cf08ead0c542995",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/0cfbb26ee5e7b3d6483a73883f9f6157bca22ec9",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/177d574be4b58f832354ab1ef5a297aa0c9aa2df",
|
"url": "https://git.kernel.org/stable/c/177d574be4b58f832354ab1ef5a297aa0c9aa2df",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
@ -33,18 +25,10 @@
|
|||||||
"url": "https://git.kernel.org/stable/c/930e826962d9f01dcd2220176134427358d112f2",
|
"url": "https://git.kernel.org/stable/c/930e826962d9f01dcd2220176134427358d112f2",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/99eb2159680af8786104dac80528acd5acd45980",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/a2add961a5ed25cfd6a74f9ffb9e7ab6d6ded838",
|
"url": "https://git.kernel.org/stable/c/a2add961a5ed25cfd6a74f9ffb9e7ab6d6ded838",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/d38d31bbbb9dc0d4d71a45431eafba03d0bc150d",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/f78c1375339a291cba492a70eaf12ec501d28a8e",
|
"url": "https://git.kernel.org/stable/c/f78c1375339a291cba492a70eaf12ec501d28a8e",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
@ -2,168 +2,15 @@
|
|||||||
"id": "CVE-2024-35788",
|
"id": "CVE-2024-35788",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-05-17T13:15:58.640",
|
"published": "2024-05-17T13:15:58.640",
|
||||||
"lastModified": "2025-03-05T17:33:07.867",
|
"lastModified": "2025-06-19T13:15:36.360",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Rejected",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix bounds check for dcn35 DcfClocks\n\n[Why]\nNumFclkLevelsEnabled is used for DcfClocks bounds check\ninstead of designated NumDcfClkLevelsEnabled.\nThat can cause array index out-of-bounds access.\n\n[How]\nUse designated variable for dcn35 DcfClocks bounds check."
|
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||||
},
|
|
||||||
{
|
|
||||||
"lang": "es",
|
|
||||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: Corrige la verificaci\u00f3n de l\u00edmites para dcn35 DcfClocks [Por qu\u00e9] NumFclkLevelsEnabled se usa para la verificaci\u00f3n de l\u00edmites de DcfClocks en lugar del designado NumDcfClkLevelsEnabled. Eso puede provocar un acceso fuera de los l\u00edmites al \u00edndice de matriz. [C\u00f3mo] Utilice la variable designada para comprobar los l\u00edmites de dcn35 DcfClocks."
|
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {},
|
||||||
"cvssMetricV31": [
|
"references": []
|
||||||
{
|
|
||||||
"source": "nvd@nist.gov",
|
|
||||||
"type": "Primary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
||||||
"baseScore": 7.8,
|
|
||||||
"baseSeverity": "HIGH",
|
|
||||||
"attackVector": "LOCAL",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "LOW",
|
|
||||||
"userInteraction": "NONE",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"confidentialityImpact": "HIGH",
|
|
||||||
"integrityImpact": "HIGH",
|
|
||||||
"availabilityImpact": "HIGH"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 1.8,
|
|
||||||
"impactScore": 5.9
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"weaknesses": [
|
|
||||||
{
|
|
||||||
"source": "nvd@nist.gov",
|
|
||||||
"type": "Primary",
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "CWE-129"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"configurations": [
|
|
||||||
{
|
|
||||||
"nodes": [
|
|
||||||
{
|
|
||||||
"operator": "OR",
|
|
||||||
"negate": false,
|
|
||||||
"cpeMatch": [
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
|
||||||
"versionEndExcluding": "6.7.12",
|
|
||||||
"matchCriteriaId": "D395D167-B806-45A5-9C34-38C8A1FE0F7B"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
|
||||||
"versionStartIncluding": "6.8",
|
|
||||||
"versionEndExcluding": "6.8.3",
|
|
||||||
"matchCriteriaId": "4C59BBC3-6495-4A77-9C82-55EC7CDF5E02"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:-:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "3F2A4A3D-068A-4CF2-A09F-9C7937DDB0A5"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "F850DCEC-E08B-4317-A33B-D2DCF39F601B"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "91326417-E981-482E-A5A3-28BC1327521B"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc7:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "DAECDCD8-F556-4606-8D7B-5C6D47A501F2"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"references": [
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/2f10d4a51bbcd938f1f02f16c304ad1d54717b96",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Mailing List"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/c373f233dab44a13752daec13788e2ad3bf86410",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Mailing List"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/f6e163e9c3d50cd167ab9d411ed01b7718177387",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Mailing List"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/2f10d4a51bbcd938f1f02f16c304ad1d54717b96",
|
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Mailing List"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/c373f233dab44a13752daec13788e2ad3bf86410",
|
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Mailing List"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/f6e163e9c3d50cd167ab9d411ed01b7718177387",
|
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Mailing List"
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-35927",
|
"id": "CVE-2024-35927",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-05-19T11:15:48.860",
|
"published": "2024-05-19T11:15:48.860",
|
||||||
"lastModified": "2024-11-21T09:21:13.223",
|
"lastModified": "2025-06-19T13:15:40.283",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -48,18 +48,10 @@
|
|||||||
"url": "https://git.kernel.org/stable/c/3d1b47e3a935abd4f258a945db87e7267ff4079c",
|
"url": "https://git.kernel.org/stable/c/3d1b47e3a935abd4f258a945db87e7267ff4079c",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/4ad8d57d902fbc7c82507cfc1b031f3a07c3de6e",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/5abffb66d12bcac84bf7b66389c571b8bb6e82bd",
|
"url": "https://git.kernel.org/stable/c/5abffb66d12bcac84bf7b66389c571b8bb6e82bd",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/786c27982a39d79cc753f84229eb5977ac8ef1c1",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/18451798f4a4e7418b9fad7e7dd313fe84b1f545",
|
"url": "https://git.kernel.org/stable/c/18451798f4a4e7418b9fad7e7dd313fe84b1f545",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-36288",
|
"id": "CVE-2024-36288",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-06-21T12:15:10.967",
|
"published": "2024-06-21T12:15:10.967",
|
||||||
"lastModified": "2024-11-21T09:21:59.667",
|
"lastModified": "2025-06-19T13:15:40.433",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -131,14 +131,6 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/f9977e4e0cd98a5f06f2492b4f3547db58deabf5",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Mailing List",
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/0a1cb0c6102bb4fd310243588d39461da49497ad",
|
"url": "https://git.kernel.org/stable/c/0a1cb0c6102bb4fd310243588d39461da49497ad",
|
||||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-43835",
|
"id": "CVE-2024-43835",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-08-17T10:15:09.183",
|
"published": "2024-08-17T10:15:09.183",
|
||||||
"lastModified": "2024-10-30T21:45:17.447",
|
"lastModified": "2025-06-19T13:15:41.177",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -71,13 +71,6 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/19ac6f29bf64304ef04630c8ab56ecd2059d7aa1",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/468a729b78895893d0e580ceea49bed8ada2a2bd",
|
"url": "https://git.kernel.org/stable/c/468a729b78895893d0e580ceea49bed8ada2a2bd",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-43845",
|
"id": "CVE-2024-43845",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-08-17T10:15:09.837",
|
"published": "2024-08-17T10:15:09.837",
|
||||||
"lastModified": "2024-10-25T19:51:07.187",
|
"lastModified": "2025-06-19T13:15:41.423",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -99,13 +99,6 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/c996b570305e7a6910c2ce4cdcd4c22757ffe241",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/fe2ead240c31e8d158713beca9d0681a6e6a53ab",
|
"url": "https://git.kernel.org/stable/c/fe2ead240c31e8d158713beca9d0681a6e6a53ab",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-43911",
|
"id": "CVE-2024-43911",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-08-26T11:15:05.227",
|
"published": "2024-08-26T11:15:05.227",
|
||||||
"lastModified": "2024-11-08T16:15:22.483",
|
"lastModified": "2025-06-19T13:15:41.600",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -77,14 +77,6 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/0acaf4a5025d6dafb7da787d2d4c47ed95e46ed6",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/a53c2d847627b790fb3bd8b00e02c247941b17e0",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/a5594c1e03b0df3908b1e1202a1ba34422eed0f6",
|
"url": "https://git.kernel.org/stable/c/a5594c1e03b0df3908b1e1202a1ba34422eed0f6",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2024-45025",
|
"id": "CVE-2024-45025",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-11T16:15:07.440",
|
"published": "2024-09-11T16:15:07.440",
|
||||||
"lastModified": "2024-09-13T16:30:07.073",
|
"lastModified": "2025-06-19T13:15:41.733",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -162,20 +162,6 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/e807487a1d5fd5d941f26578ae826ca815dbfcd6",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/ee501f827f3db02d4e599afbbc1a7f8b792d05d7",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/fe5bf14881701119aeeda7cf685f3c226c7380df",
|
"url": "https://git.kernel.org/stable/c/fe5bf14881701119aeeda7cf685f3c226c7380df",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
|
@ -2,102 +2,15 @@
|
|||||||
"id": "CVE-2024-46700",
|
"id": "CVE-2024-46700",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-13T06:15:14.720",
|
"published": "2024-09-13T06:15:14.720",
|
||||||
"lastModified": "2024-09-13T16:53:25.383",
|
"lastModified": "2025-06-19T13:15:42.090",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Rejected",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu/mes: fix mes ring buffer overflow\n\nwait memory room until enough before writing mes packets\nto avoid ring buffer overflow.\n\nv2: squash in sched_hw_submission fix\n\n(cherry picked from commit 34e087e8920e635c62e2ed6a758b0cd27f836d13)"
|
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||||
},
|
|
||||||
{
|
|
||||||
"lang": "es",
|
|
||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu/mes: se corrige el desbordamiento del b\u00fafer de anillo de mes; esperar a que haya suficiente espacio en la memoria antes de escribir paquetes mes para evitar el desbordamiento del b\u00fafer de anillo. v2: se corrige el squash en sched_hw_submission (seleccionado del commit 34e087e8920e635c62e2ed6a758b0cd27f836d13)"
|
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {},
|
||||||
"cvssMetricV31": [
|
"references": []
|
||||||
{
|
|
||||||
"source": "nvd@nist.gov",
|
|
||||||
"type": "Primary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
||||||
"baseScore": 7.8,
|
|
||||||
"baseSeverity": "HIGH",
|
|
||||||
"attackVector": "LOCAL",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "LOW",
|
|
||||||
"userInteraction": "NONE",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"confidentialityImpact": "HIGH",
|
|
||||||
"integrityImpact": "HIGH",
|
|
||||||
"availabilityImpact": "HIGH"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 1.8,
|
|
||||||
"impactScore": 5.9
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"weaknesses": [
|
|
||||||
{
|
|
||||||
"source": "nvd@nist.gov",
|
|
||||||
"type": "Primary",
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "CWE-120"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"configurations": [
|
|
||||||
{
|
|
||||||
"nodes": [
|
|
||||||
{
|
|
||||||
"operator": "OR",
|
|
||||||
"negate": false,
|
|
||||||
"cpeMatch": [
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
|
||||||
"versionEndExcluding": "6.10.8",
|
|
||||||
"matchCriteriaId": "04EAB214-6594-4DB7-86FA-A1EDE64FB9EE"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
|
||||||
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"references": [
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/11752c013f562a1124088a35bd314aa0e9f0e88f",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/ed37550d7c516017c3b0324bdf144e2fa563ffb0",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-46852",
|
"id": "CVE-2024-46852",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-09-27T13:15:16.917",
|
"published": "2024-09-27T13:15:16.917",
|
||||||
"lastModified": "2024-10-17T14:15:07.887",
|
"lastModified": "2025-06-19T13:15:46.410",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -120,10 +120,6 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/007180fcb6cc4a93211d4cc45fef3f5ccccd56ae",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/79cce5e81d20fa9ad553be439d665ac3302d3c95",
|
"url": "https://git.kernel.org/stable/c/79cce5e81d20fa9ad553be439d665ac3302d3c95",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-56694",
|
"id": "CVE-2024-56694",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2024-12-28T10:15:15.203",
|
"published": "2024-12-28T10:15:15.203",
|
||||||
"lastModified": "2025-01-09T16:16:23.053",
|
"lastModified": "2025-06-19T13:15:46.560",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -113,10 +113,6 @@
|
|||||||
"Patch"
|
"Patch"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/078f7e1521442a55db4bed812a2fbaf02ac33819",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/221109ba2127eabd0aa64718543638b58b15df56",
|
"url": "https://git.kernel.org/stable/c/221109ba2127eabd0aa64718543638b58b15df56",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
|
@ -2,131 +2,15 @@
|
|||||||
"id": "CVE-2024-56786",
|
"id": "CVE-2024-56786",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-01-08T18:15:19.633",
|
"published": "2025-01-08T18:15:19.633",
|
||||||
"lastModified": "2025-02-11T16:15:48.100",
|
"lastModified": "2025-06-19T13:15:46.830",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Rejected",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: put bpf_link's program when link is safe to be deallocated\n\nIn general, BPF link's underlying BPF program should be considered to be\nreachable through attach hook -> link -> prog chain, and, pessimistically,\nwe have to assume that as long as link's memory is not safe to free,\nattach hook's code might hold a pointer to BPF program and use it.\n\nAs such, it's not (generally) correct to put link's program early before\nwaiting for RCU GPs to go through. More eager bpf_prog_put() that we\ncurrently do is mostly correct due to BPF program's release code doing\nsimilar RCU GP waiting, but as will be shown in the following patches,\nBPF program can be non-sleepable (and, thus, reliant on only \"classic\"\nRCU GP), while BPF link's attach hook can have sleepable semantics and\nneeds to be protected by RCU Tasks Trace, and for such cases BPF link\nhas to go through RCU Tasks Trace + \"classic\" RCU GPs before being\ndeallocated. And so, if we put BPF program early, we might free BPF\nprogram before we free BPF link, leading to use-after-free situation.\n\nSo, this patch defers bpf_prog_put() until we are ready to perform\nbpf_link's deallocation. At worst, this delays BPF program freeing by\none extra RCU GP, but that seems completely acceptable. Alternatively,\nwe'd need more elaborate ways to determine BPF hook, BPF link, and BPF\nprogram lifetimes, and how they relate to each other, which seems like\nan unnecessary complication.\n\nNote, for most BPF links we still will perform eager bpf_prog_put() and\nlink dealloc, so for those BPF links there are no observable changes\nwhatsoever. Only BPF links that use deferred dealloc might notice\nslightly delayed freeing of BPF programs.\n\nAlso, to reduce code and logic duplication, extract program put + link\ndealloc logic into bpf_link_dealloc() helper."
|
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||||
},
|
|
||||||
{
|
|
||||||
"lang": "es",
|
|
||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: poner el programa de bpf_link cuando es seguro desasignarlo En general, se debe considerar que el programa BPF subyacente del enlace BPF es accesible a trav\u00e9s de la cadena de gancho de conexi\u00f3n -> enlace -> programa y, de manera pesimista, tenemos que asumir que mientras no sea seguro liberar la memoria del enlace, el c\u00f3digo del gancho de conexi\u00f3n podr\u00eda contener un puntero al programa BPF y usarlo. Como tal, no es (generalmente) correcto poner el programa del enlace antes de esperar a que pasen los GP de RCU. El bpf_prog_put() m\u00e1s ansioso que hacemos actualmente es mayormente correcto debido a que el c\u00f3digo de lanzamiento del programa BPF hace una espera similar de GP RCU, pero como se mostrar\u00e1 en los parches siguientes, el programa BPF puede no ser inactivo (y, por lo tanto, depender solo del GP RCU \"cl\u00e1sico\"), mientras que el gancho de conexi\u00f3n del enlace BPF puede tener sem\u00e1ntica inactiva y necesita estar protegido por el Seguimiento de tareas RCU, y para tales casos el enlace BPF tiene que pasar por el Seguimiento de tareas RCU + GP RCU \"cl\u00e1sicos\" antes de ser desasignado. Y entonces, si ponemos el programa BPF temprano, podr\u00edamos liberar el programa BPF antes de liberar el enlace BPF, lo que lleva a una situaci\u00f3n de use-after-free. Entonces, este parche pospone bpf_prog_put() hasta que estemos listos para realizar la desasignaci\u00f3n de bpf_link. En el peor de los casos, esto retrasa la liberaci\u00f3n del programa BPF por un GP RCU adicional, pero eso parece completamente aceptable. Alternativamente, necesitar\u00edamos formas m\u00e1s elaboradas de determinar el gancho BPF, el enlace BPF y la duraci\u00f3n del programa BPF, y c\u00f3mo se relacionan entre s\u00ed, lo que parece una complicaci\u00f3n innecesaria. Tenga en cuenta que, para la mayor\u00eda de los enlaces BPF, seguiremos ejecutando bpf_prog_put() y link dealloc con avidez, por lo que para esos enlaces BPF no hay cambios observables en absoluto. Solo los enlaces BPF que usan dealloc diferido pueden notar una liberaci\u00f3n ligeramente retrasada de los programas BPF. Adem\u00e1s, para reducir la duplicaci\u00f3n de c\u00f3digo y l\u00f3gica, extraiga la l\u00f3gica de put del programa + link dealloc en el asistente bpf_link_dealloc()."
|
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {},
|
||||||
"cvssMetricV31": [
|
"references": []
|
||||||
{
|
|
||||||
"source": "nvd@nist.gov",
|
|
||||||
"type": "Primary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
||||||
"baseScore": 5.5,
|
|
||||||
"baseSeverity": "MEDIUM",
|
|
||||||
"attackVector": "LOCAL",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "LOW",
|
|
||||||
"userInteraction": "NONE",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"confidentialityImpact": "NONE",
|
|
||||||
"integrityImpact": "NONE",
|
|
||||||
"availabilityImpact": "HIGH"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 1.8,
|
|
||||||
"impactScore": 3.6
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
||||||
"type": "Secondary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
||||||
"baseScore": 7.8,
|
|
||||||
"baseSeverity": "HIGH",
|
|
||||||
"attackVector": "LOCAL",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "LOW",
|
|
||||||
"userInteraction": "NONE",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"confidentialityImpact": "HIGH",
|
|
||||||
"integrityImpact": "HIGH",
|
|
||||||
"availabilityImpact": "HIGH"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 1.8,
|
|
||||||
"impactScore": 5.9
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"weaknesses": [
|
|
||||||
{
|
|
||||||
"source": "nvd@nist.gov",
|
|
||||||
"type": "Primary",
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "NVD-CWE-noinfo"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
|
||||||
"type": "Secondary",
|
|
||||||
"description": [
|
|
||||||
{
|
|
||||||
"lang": "en",
|
|
||||||
"value": "CWE-416"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"configurations": [
|
|
||||||
{
|
|
||||||
"nodes": [
|
|
||||||
{
|
|
||||||
"operator": "OR",
|
|
||||||
"negate": false,
|
|
||||||
"cpeMatch": [
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
|
||||||
"versionEndExcluding": "6.6.66",
|
|
||||||
"matchCriteriaId": "90A079EF-8212-45DF-84FB-C525A64635B0"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"vulnerable": true,
|
|
||||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
|
||||||
"versionStartIncluding": "6.7",
|
|
||||||
"versionEndExcluding": "6.12.5",
|
|
||||||
"matchCriteriaId": "9501D045-7A94-42CA-8B03-821BE94A65B7"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"references": [
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/2fcb921c2799c49ac5e365cf4110f94a64ae4885",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/5fe23c57abadfd46a7a66e81f3536e4757252a0b",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/f44ec8733a8469143fde1984b5e6931b2e2f6f3f",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
|
||||||
"tags": [
|
|
||||||
"Patch"
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
}
|
@ -2,28 +2,15 @@
|
|||||||
"id": "CVE-2024-57920",
|
"id": "CVE-2024-57920",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-01-19T12:15:26.150",
|
"published": "2025-01-19T12:15:26.150",
|
||||||
"lastModified": "2025-01-19T12:15:26.150",
|
"lastModified": "2025-06-19T13:15:50.980",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Rejected",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdkfd: wq_release signals dma_fence only when available\n\nkfd_process_wq_release() signals eviction fence by\ndma_fence_signal() which wanrs if dma_fence\nis NULL.\n\nkfd_process->ef is initialized by kfd_process_device_init_vm()\nthrough ioctl. That means the fence is NULL for a new\ncreated kfd_process, and close a kfd_process right\nafter open it will trigger the warning.\n\nThis commit conditionally signals the eviction fence\nin kfd_process_wq_release() only when it is available.\n\n[ 503.660882] WARNING: CPU: 0 PID: 9 at drivers/dma-buf/dma-fence.c:467 dma_fence_signal+0x74/0xa0\n[ 503.782940] Workqueue: kfd_process_wq kfd_process_wq_release [amdgpu]\n[ 503.789640] RIP: 0010:dma_fence_signal+0x74/0xa0\n[ 503.877620] Call Trace:\n[ 503.880066] <TASK>\n[ 503.882168] ? __warn+0xcd/0x260\n[ 503.885407] ? dma_fence_signal+0x74/0xa0\n[ 503.889416] ? report_bug+0x288/0x2d0\n[ 503.893089] ? handle_bug+0x53/0xa0\n[ 503.896587] ? exc_invalid_op+0x14/0x50\n[ 503.900424] ? asm_exc_invalid_op+0x16/0x20\n[ 503.904616] ? dma_fence_signal+0x74/0xa0\n[ 503.908626] kfd_process_wq_release+0x6b/0x370 [amdgpu]\n[ 503.914081] process_one_work+0x654/0x10a0\n[ 503.918186] worker_thread+0x6c3/0xe70\n[ 503.921943] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 503.926735] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 503.931527] ? __kthread_parkme+0x82/0x140\n[ 503.935631] ? __pfx_worker_thread+0x10/0x10\n[ 503.939904] kthread+0x2a8/0x380\n[ 503.943132] ? __pfx_kthread+0x10/0x10\n[ 503.946882] ret_from_fork+0x2d/0x70\n[ 503.950458] ? __pfx_kthread+0x10/0x10\n[ 503.954210] ret_from_fork_asm+0x1a/0x30\n[ 503.958142] </TASK>\n[ 503.960328] ---[ end trace 0000000000000000 ]---\n\n(cherry picked from commit 2774ef7625adb5fb9e9265c26a59dca7b8fd171e)"
|
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||||
},
|
|
||||||
{
|
|
||||||
"lang": "es",
|
|
||||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdkfd: wq_release env\u00eda una se\u00f1al a dma_fence solo cuando est\u00e1 disponible kfd_process_wq_release() env\u00eda una se\u00f1al de desalojo a dma_fence_signal(), que se activa si dma_fence es NULL. kfd_process->ef se inicializa mediante kfd_process_device_init_vm() a trav\u00e9s de ioctl. Esto significa que el desalojo es NULL para un nuevo kfd_process creado, y cerrar un kfd_process justo despu\u00e9s de abrirlo activar\u00e1 la advertencia. Esta confirmaci\u00f3n env\u00eda una se\u00f1al condicional al desalojo en kfd_process_wq_release() solo cuando est\u00e1 disponible. [ 503.660882] ADVERTENCIA: CPU: 0 PID: 9 en drivers/dma-buf/dma-fence.c:467 dma_fence_signal+0x74/0xa0 [ 503.782940] Cola de trabajo: kfd_process_wq kfd_process_wq_release [amdgpu] [ 503.789640] RIP: 0010:dma_fence_signal+0x74/0xa0 [ 503.877620] Seguimiento de llamadas: [ 503.880066] [ 503.882168] ? __warn+0xcd/0x260 [ 503.885407] ? dma_fence_signal+0x74/0xa0 [ 503.889416] ? report_bug+0x288/0x2d0 [ 503.893089] ? handle_bug+0x53/0xa0 [ 503.896587] ? exc_invalid_op+0x14/0x50 [ 503.900424] ? asm_exc_invalid_op+0x16/0x20 [ 503.904616] ? __kthread_parkme+0x82/0x140 [503.935631] ? __pfx_worker_thread+0x10/0x10 [ 503.939904] kthread+0x2a8/0x380 [ 503.943132] ? __pfx_kthread+0x10/0x10 [ 503.954210] ret_from_fork_asm+0x1a/0x30 [ 503.958142] [ 503.960328] ---[ fin del seguimiento 000000000000000 ]--- (seleccionado de el commit 2774ef7625adb5fb9e9265c26a59dca7b8fd171e)"
|
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
"references": [
|
"references": []
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/a993d319aebb7cce8a10c6e685344b7c2ad5c4c2",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/c8243def299793ac6c85fdc1086089c800c1051a",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2024-58077",
|
"id": "CVE-2024-58077",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-03-06T17:15:21.123",
|
"published": "2025-03-06T17:15:21.123",
|
||||||
"lastModified": "2025-03-06T17:15:21.123",
|
"lastModified": "2025-06-19T13:15:51.193",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Awaiting Analysis",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
@ -32,10 +32,6 @@
|
|||||||
{
|
{
|
||||||
"url": "https://git.kernel.org/stable/c/90778f31efdf44622065ebbe8d228284104bd26f",
|
"url": "https://git.kernel.org/stable/c/90778f31efdf44622065ebbe8d228284104bd26f",
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/b65ba768302adc7ddc70811116cef80ca089af59",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,40 +2,15 @@
|
|||||||
"id": "CVE-2025-38030",
|
"id": "CVE-2025-38030",
|
||||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||||
"published": "2025-06-18T10:15:35.100",
|
"published": "2025-06-18T10:15:35.100",
|
||||||
"lastModified": "2025-06-18T13:46:52.973",
|
"lastModified": "2025-06-19T13:15:51.760",
|
||||||
"vulnStatus": "Awaiting Analysis",
|
"vulnStatus": "Rejected",
|
||||||
"cveTags": [],
|
"cveTags": [],
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"drm/amd: Keep display off while going into S4\"\n\ncommit 68bfdc8dc0a1a (\"drm/amd: Keep display off while going into S4\")\nattempted to keep displays off during the S4 sequence by not resuming\ndisplay IP. This however leads to hangs because DRM clients such as the\nconsole can try to access registers and cause a hang.\n\n(cherry picked from commit e485502c37b097b0bd773baa7e2741bf7bd2909a)"
|
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {},
|
"metrics": {},
|
||||||
"references": [
|
"references": []
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/7c220f89add8e7d6db63c9c4d9566917f8175a0b",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/7e7cb7a13c81073d38a10fa7b450d23712281ec4",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/9c40d1f7b75fc93d7ef02acc3a2a712cb057e576",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/ed7d24b0c375f74a1956e73d53549be78bf2774c",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/edfb7f9d27e2cd9aad55cfb5aaa6c67801613e6a",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://git.kernel.org/stable/c/ff887e77b777e806b5210eba229e0bd657e07b60",
|
|
||||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
}
|
56
CVE-2025/CVE-2025-47xx/CVE-2025-4738.json
Normal file
56
CVE-2025/CVE-2025-47xx/CVE-2025-4738.json
Normal file
@ -0,0 +1,56 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-4738",
|
||||||
|
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||||
|
"published": "2025-06-19T13:15:51.840",
|
||||||
|
"lastModified": "2025-06-19T13:15:51.840",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Yirmibes Software MY ERP allows SQL Injection.This issue affects MY ERP: before 1.170."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "iletisim@usom.gov.tr",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "iletisim@usom.gov.tr",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-89"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.usom.gov.tr/bildirim/tr-25-0132",
|
||||||
|
"source": "iletisim@usom.gov.tr"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
76
CVE-2025/CVE-2025-60xx/CVE-2025-6019.json
Normal file
76
CVE-2025/CVE-2025-60xx/CVE-2025-6019.json
Normal file
@ -0,0 +1,76 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-6019",
|
||||||
|
"sourceIdentifier": "secalert@redhat.com",
|
||||||
|
"published": "2025-06-19T12:15:19.727",
|
||||||
|
"lastModified": "2025-06-19T12:15:19.727",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the \"allow_active\" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an \"allow_active\" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "secalert@redhat.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"baseScore": 7.0,
|
||||||
|
"baseSeverity": "HIGH",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.0,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "secalert@redhat.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-250"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://access.redhat.com/security/cve/CVE-2025-6019",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370051",
|
||||||
|
"source": "secalert@redhat.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2025/06/17/5",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2025/06/17/6",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "http://www.openwall.com/lists/oss-security/2025/06/18/1",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://lists.debian.org/debian-lts-announce/2025/06/msg00018.html",
|
||||||
|
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
141
CVE-2025/CVE-2025-62xx/CVE-2025-6266.json
Normal file
141
CVE-2025/CVE-2025-62xx/CVE-2025-6266.json
Normal file
@ -0,0 +1,141 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2025-6266",
|
||||||
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
|
"published": "2025-06-19T12:15:20.537",
|
||||||
|
"lastModified": "2025-06-19T12:15:20.537",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"cveTags": [],
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A vulnerability was found in FLIR AX8 up to 1.46. It has been declared as critical. This vulnerability affects unknown code of the file /upload.php. The manipulation of the argument File leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV40": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "4.0",
|
||||||
|
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"attackRequirements": "NONE",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"vulnConfidentialityImpact": "LOW",
|
||||||
|
"vulnIntegrityImpact": "LOW",
|
||||||
|
"vulnAvailabilityImpact": "LOW",
|
||||||
|
"subConfidentialityImpact": "NONE",
|
||||||
|
"subIntegrityImpact": "NONE",
|
||||||
|
"subAvailabilityImpact": "NONE",
|
||||||
|
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||||
|
"confidentialityRequirement": "NOT_DEFINED",
|
||||||
|
"integrityRequirement": "NOT_DEFINED",
|
||||||
|
"availabilityRequirement": "NOT_DEFINED",
|
||||||
|
"modifiedAttackVector": "NOT_DEFINED",
|
||||||
|
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||||
|
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||||
|
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||||
|
"modifiedUserInteraction": "NOT_DEFINED",
|
||||||
|
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||||
|
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||||
|
"Safety": "NOT_DEFINED",
|
||||||
|
"Automatable": "NOT_DEFINED",
|
||||||
|
"Recovery": "NOT_DEFINED",
|
||||||
|
"valueDensity": "NOT_DEFINED",
|
||||||
|
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||||
|
"providerUrgency": "NOT_DEFINED"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"cvssMetricV2": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "2.0",
|
||||||
|
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"accessVector": "NETWORK",
|
||||||
|
"accessComplexity": "LOW",
|
||||||
|
"authentication": "SINGLE",
|
||||||
|
"confidentialityImpact": "PARTIAL",
|
||||||
|
"integrityImpact": "PARTIAL",
|
||||||
|
"availabilityImpact": "PARTIAL"
|
||||||
|
},
|
||||||
|
"baseSeverity": "MEDIUM",
|
||||||
|
"exploitabilityScore": 8.0,
|
||||||
|
"impactScore": 6.4,
|
||||||
|
"acInsufInfo": false,
|
||||||
|
"obtainAllPrivilege": false,
|
||||||
|
"obtainUserPrivilege": false,
|
||||||
|
"obtainOtherPrivilege": false,
|
||||||
|
"userInteractionRequired": false
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "cna@vuldb.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-284"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-434"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/YZS17/CVE/blob/main/FLIR-AX8/Unauthority_file_upload_vulnerabililty.md",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?ctiid.313270",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?id.313270",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://vuldb.com/?submit.586692",
|
||||||
|
"source": "cna@vuldb.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
44
README.md
44
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2025-06-19T12:00:19.928988+00:00
|
2025-06-19T14:00:19.951536+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2025-06-19T11:15:24.190000+00:00
|
2025-06-19T13:15:51.840000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -33,25 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
298701
|
298704
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `6`
|
Recently added CVEs: `3`
|
||||||
|
|
||||||
- [CVE-2005-2347](CVE-2005/CVE-2005-23xx/CVE-2005-2347.json) (`2025-06-19T11:15:23.593`)
|
- [CVE-2025-4738](CVE-2025/CVE-2025-47xx/CVE-2025-4738.json) (`2025-06-19T13:15:51.840`)
|
||||||
- [CVE-2025-31698](CVE-2025/CVE-2025-316xx/CVE-2025-31698.json) (`2025-06-19T10:15:20.980`)
|
- [CVE-2025-6019](CVE-2025/CVE-2025-60xx/CVE-2025-6019.json) (`2025-06-19T12:15:19.727`)
|
||||||
- [CVE-2025-32896](CVE-2025/CVE-2025-328xx/CVE-2025-32896.json) (`2025-06-19T11:15:24.190`)
|
- [CVE-2025-6266](CVE-2025/CVE-2025-62xx/CVE-2025-6266.json) (`2025-06-19T12:15:20.537`)
|
||||||
- [CVE-2025-49763](CVE-2025/CVE-2025-497xx/CVE-2025-49763.json) (`2025-06-19T10:15:21.887`)
|
|
||||||
- [CVE-2025-5071](CVE-2025/CVE-2025-50xx/CVE-2025-5071.json) (`2025-06-19T10:15:22.027`)
|
|
||||||
- [CVE-2025-5234](CVE-2025/CVE-2025-52xx/CVE-2025-5234.json) (`2025-06-19T10:15:22.250`)
|
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `0`
|
Recently modified CVEs: `32`
|
||||||
|
|
||||||
|
- [CVE-2022-49558](CVE-2022/CVE-2022-495xx/CVE-2022-49558.json) (`2025-06-19T13:15:23.990`)
|
||||||
|
- [CVE-2023-52569](CVE-2023/CVE-2023-525xx/CVE-2023-52569.json) (`2025-06-19T13:15:25.037`)
|
||||||
|
- [CVE-2023-52681](CVE-2023/CVE-2023-526xx/CVE-2023-52681.json) (`2025-06-19T13:15:25.340`)
|
||||||
|
- [CVE-2023-52733](CVE-2023/CVE-2023-527xx/CVE-2023-52733.json) (`2025-06-19T13:15:25.540`)
|
||||||
|
- [CVE-2023-52760](CVE-2023/CVE-2023-527xx/CVE-2023-52760.json) (`2025-06-19T13:15:30.487`)
|
||||||
|
- [CVE-2023-52921](CVE-2023/CVE-2023-529xx/CVE-2023-52921.json) (`2025-06-19T13:15:30.640`)
|
||||||
|
- [CVE-2024-26710](CVE-2024/CVE-2024-267xx/CVE-2024-26710.json) (`2025-06-19T13:15:31.147`)
|
||||||
|
- [CVE-2024-26774](CVE-2024/CVE-2024-267xx/CVE-2024-26774.json) (`2025-06-19T13:15:31.303`)
|
||||||
|
- [CVE-2024-26794](CVE-2024/CVE-2024-267xx/CVE-2024-26794.json) (`2025-06-19T13:15:31.510`)
|
||||||
|
- [CVE-2024-26829](CVE-2024/CVE-2024-268xx/CVE-2024-26829.json) (`2025-06-19T13:15:35.917`)
|
||||||
|
- [CVE-2024-27410](CVE-2024/CVE-2024-274xx/CVE-2024-27410.json) (`2025-06-19T13:15:36.097`)
|
||||||
|
- [CVE-2024-35788](CVE-2024/CVE-2024-357xx/CVE-2024-35788.json) (`2025-06-19T13:15:36.360`)
|
||||||
|
- [CVE-2024-35927](CVE-2024/CVE-2024-359xx/CVE-2024-35927.json) (`2025-06-19T13:15:40.283`)
|
||||||
|
- [CVE-2024-36288](CVE-2024/CVE-2024-362xx/CVE-2024-36288.json) (`2025-06-19T13:15:40.433`)
|
||||||
|
- [CVE-2024-43835](CVE-2024/CVE-2024-438xx/CVE-2024-43835.json) (`2025-06-19T13:15:41.177`)
|
||||||
|
- [CVE-2024-43845](CVE-2024/CVE-2024-438xx/CVE-2024-43845.json) (`2025-06-19T13:15:41.423`)
|
||||||
|
- [CVE-2024-43911](CVE-2024/CVE-2024-439xx/CVE-2024-43911.json) (`2025-06-19T13:15:41.600`)
|
||||||
|
- [CVE-2024-45025](CVE-2024/CVE-2024-450xx/CVE-2024-45025.json) (`2025-06-19T13:15:41.733`)
|
||||||
|
- [CVE-2024-46700](CVE-2024/CVE-2024-467xx/CVE-2024-46700.json) (`2025-06-19T13:15:42.090`)
|
||||||
|
- [CVE-2024-46852](CVE-2024/CVE-2024-468xx/CVE-2024-46852.json) (`2025-06-19T13:15:46.410`)
|
||||||
|
- [CVE-2024-56694](CVE-2024/CVE-2024-566xx/CVE-2024-56694.json) (`2025-06-19T13:15:46.560`)
|
||||||
|
- [CVE-2024-56786](CVE-2024/CVE-2024-567xx/CVE-2024-56786.json) (`2025-06-19T13:15:46.830`)
|
||||||
|
- [CVE-2024-57920](CVE-2024/CVE-2024-579xx/CVE-2024-57920.json) (`2025-06-19T13:15:50.980`)
|
||||||
|
- [CVE-2024-58077](CVE-2024/CVE-2024-580xx/CVE-2024-58077.json) (`2025-06-19T13:15:51.193`)
|
||||||
|
- [CVE-2025-38030](CVE-2025/CVE-2025-380xx/CVE-2025-38030.json) (`2025-06-19T13:15:51.760`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
79
_state.csv
79
_state.csv
@ -13306,7 +13306,7 @@ CVE-2005-2343,0,0,73dc310170d13be4424d8eeb6ee614606550bd1d800d9a0663c8d07d79d636
|
|||||||
CVE-2005-2344,0,0,44282ae6f9064db58ec58cacb1251f93da1dabf092076eaeb8a2ab9b660b925c,2025-04-03T01:03:51.193000
|
CVE-2005-2344,0,0,44282ae6f9064db58ec58cacb1251f93da1dabf092076eaeb8a2ab9b660b925c,2025-04-03T01:03:51.193000
|
||||||
CVE-2005-2345,0,0,b27e6d6807328b3c6387b96a0da8e6930e932914582b2901d83a88205c700e40,2023-11-07T01:57:36.063000
|
CVE-2005-2345,0,0,b27e6d6807328b3c6387b96a0da8e6930e932914582b2901d83a88205c700e40,2023-11-07T01:57:36.063000
|
||||||
CVE-2005-2346,0,0,918fe655ea03014a25e47ac451e26cd34bb7a5c22e08d76bac29db32d54b3994,2025-04-03T01:03:51.193000
|
CVE-2005-2346,0,0,918fe655ea03014a25e47ac451e26cd34bb7a5c22e08d76bac29db32d54b3994,2025-04-03T01:03:51.193000
|
||||||
CVE-2005-2347,1,1,01669b599b63be3fc28ca223e163cc52b2ddd2615dedfdfb1467c49a51ca06ee,2025-06-19T11:15:23.593000
|
CVE-2005-2347,0,0,01669b599b63be3fc28ca223e163cc52b2ddd2615dedfdfb1467c49a51ca06ee,2025-06-19T11:15:23.593000
|
||||||
CVE-2005-2348,0,0,501378e87d24dedfae8c0b4b68c8bf601a525c697b9afd5e277b4ddef737a1da,2023-11-07T01:57:36.280000
|
CVE-2005-2348,0,0,501378e87d24dedfae8c0b4b68c8bf601a525c697b9afd5e277b4ddef737a1da,2023-11-07T01:57:36.280000
|
||||||
CVE-2005-2349,0,0,171e3e2b71b6ef978485fd23602db9f356073938b1facf216771d9bda2300587,2024-11-20T23:59:21.517000
|
CVE-2005-2349,0,0,171e3e2b71b6ef978485fd23602db9f356073938b1facf216771d9bda2300587,2024-11-20T23:59:21.517000
|
||||||
CVE-2005-2350,0,0,6e00337b7c49c4fabd19eeb4fe846f77b817b69e4d1d708abef5545b3113d97f,2024-11-20T23:59:21.627000
|
CVE-2005-2350,0,0,6e00337b7c49c4fabd19eeb4fe846f77b817b69e4d1d708abef5545b3113d97f,2024-11-20T23:59:21.627000
|
||||||
@ -213233,7 +213233,7 @@ CVE-2022-48845,0,0,94f22e9b9acbbb5c8519471c83937a2c7a9147a8e77f1ee3045c80f48a468
|
|||||||
CVE-2022-48846,0,0,7258287e68639fcdfd0b4f5144cd503eacb792f0f2fcee8ccf75e40bdfddba68,2024-11-21T07:34:12.050000
|
CVE-2022-48846,0,0,7258287e68639fcdfd0b4f5144cd503eacb792f0f2fcee8ccf75e40bdfddba68,2024-11-21T07:34:12.050000
|
||||||
CVE-2022-48847,0,0,3321217cd4af573aa5e073a85425079ad5809712d2d6c94889f79663c3d8a616,2024-11-21T07:34:12.187000
|
CVE-2022-48847,0,0,3321217cd4af573aa5e073a85425079ad5809712d2d6c94889f79663c3d8a616,2024-11-21T07:34:12.187000
|
||||||
CVE-2022-48848,0,0,1f1e31d119acbcb86505cd74e9774b42844323114bdc27c89f05c0211a90e033,2024-11-21T07:34:12.343000
|
CVE-2022-48848,0,0,1f1e31d119acbcb86505cd74e9774b42844323114bdc27c89f05c0211a90e033,2024-11-21T07:34:12.343000
|
||||||
CVE-2022-48849,0,0,64ea7bf4cedf17d2584a73fb5c53116a5b9ca10047f251cd3a87db7b8fd2013c,2024-11-21T07:34:12.480000
|
CVE-2022-48849,0,1,cf7d4bf1b125c37c3e1185047d0249e065abf93553d1111843b773ab48169c2d,2025-06-19T13:15:21.690000
|
||||||
CVE-2022-4885,0,0,3ccdceef4b557bc79233cdb7b14f77a0f886bb4504e564212ba210d67b8e9258,2024-11-21T07:36:08.490000
|
CVE-2022-4885,0,0,3ccdceef4b557bc79233cdb7b14f77a0f886bb4504e564212ba210d67b8e9258,2024-11-21T07:36:08.490000
|
||||||
CVE-2022-48850,0,0,3b978e81aff8dc66cd596ad9489b1964b8388a9bdaa732c023a8dce60be7c237,2024-11-21T07:34:12.593000
|
CVE-2022-48850,0,0,3b978e81aff8dc66cd596ad9489b1964b8388a9bdaa732c023a8dce60be7c237,2024-11-21T07:34:12.593000
|
||||||
CVE-2022-48851,0,0,b5963e610a6b567ac27737bdbd152c9c020f59e3a839696883f7155074b9e929,2024-11-21T07:34:12.727000
|
CVE-2022-48851,0,0,b5963e610a6b567ac27737bdbd152c9c020f59e3a839696883f7155074b9e929,2024-11-21T07:34:12.727000
|
||||||
@ -213327,14 +213327,14 @@ CVE-2022-48931,0,0,1dbe2b8984115e6c4128eb39c49ee06011d1a2ee34417caca08b34d6a5e74
|
|||||||
CVE-2022-48932,0,0,5ee1a19583d0c4a9467a8feaaebf9dcf3b1db8ef04aca34fdc4cff7132f23fec,2024-08-23T01:48:35.663000
|
CVE-2022-48932,0,0,5ee1a19583d0c4a9467a8feaaebf9dcf3b1db8ef04aca34fdc4cff7132f23fec,2024-08-23T01:48:35.663000
|
||||||
CVE-2022-48933,0,0,1b4c1a1516a577d3b1652e29f5c3e786a949e8aaa7e38c23472c7d258c831a43,2024-08-23T01:50:09.313000
|
CVE-2022-48933,0,0,1b4c1a1516a577d3b1652e29f5c3e786a949e8aaa7e38c23472c7d258c831a43,2024-08-23T01:50:09.313000
|
||||||
CVE-2022-48934,0,0,aaf1356acfd8d3dd84aa39b3fd1fddb548a57947b1cb9a25af1e11990bb7dc62,2024-08-22T20:33:29.860000
|
CVE-2022-48934,0,0,aaf1356acfd8d3dd84aa39b3fd1fddb548a57947b1cb9a25af1e11990bb7dc62,2024-08-22T20:33:29.860000
|
||||||
CVE-2022-48935,0,0,fe1e77d25b1ea38cd50fcda2171206f4e704fb5a521118af684054a53e8a8197,2024-08-23T01:45:31.280000
|
CVE-2022-48935,0,1,2df4d407b80a4f230b41b7850bb9f18a2827a0aed7a40789730644be1330a313,2025-06-19T13:15:21.983000
|
||||||
CVE-2022-48936,0,0,314cbb90d15468a6b1d7555d054a6b503128a9503d9ec5951ea48c3a9258d9c6,2024-08-31T06:15:06.460000
|
CVE-2022-48936,0,0,314cbb90d15468a6b1d7555d054a6b503128a9503d9ec5951ea48c3a9258d9c6,2024-08-31T06:15:06.460000
|
||||||
CVE-2022-48937,0,0,6b478b1435d78a7ab05467250f2242aae473c24e90fe3a1aff6615918f5c8a52,2024-08-22T19:07:28.567000
|
CVE-2022-48937,0,0,6b478b1435d78a7ab05467250f2242aae473c24e90fe3a1aff6615918f5c8a52,2024-08-22T19:07:28.567000
|
||||||
CVE-2022-48938,0,0,b6e9be5213f1247d08ffa614fc1a1459598f240582d9fb96da5e9999e511826e,2024-11-08T16:15:17.730000
|
CVE-2022-48938,0,0,b6e9be5213f1247d08ffa614fc1a1459598f240582d9fb96da5e9999e511826e,2024-11-08T16:15:17.730000
|
||||||
CVE-2022-48939,0,0,377615ee29b1087387ff6e3464436ee4fcda9ed9ec30aadbb16f8c0936d8933b,2024-08-22T19:02:08.770000
|
CVE-2022-48939,0,0,377615ee29b1087387ff6e3464436ee4fcda9ed9ec30aadbb16f8c0936d8933b,2024-08-22T19:02:08.770000
|
||||||
CVE-2022-4894,0,0,22ed899d22580fa7ff41b74dfe422d716a5c9906a1ee5a472871f1ebbf4474fb,2024-11-21T07:36:09.560000
|
CVE-2022-4894,0,0,22ed899d22580fa7ff41b74dfe422d716a5c9906a1ee5a472871f1ebbf4474fb,2024-11-21T07:36:09.560000
|
||||||
CVE-2022-48940,0,0,38b69bd3209b0e7ac4d9cbe453d62a205ba4033bc58506aead5aeef18a85020c,2024-08-22T18:37:46.133000
|
CVE-2022-48940,0,0,38b69bd3209b0e7ac4d9cbe453d62a205ba4033bc58506aead5aeef18a85020c,2024-08-22T18:37:46.133000
|
||||||
CVE-2022-48941,0,0,87b2ccf5f247d42dd9602932144fd795331784adcab5ea87e3cf67431b0195cf,2024-08-22T18:41:37.090000
|
CVE-2022-48941,0,1,1448e6ff2637fd6ee187920793315d4f4a0b7bd5e5702c158741508f6e028283,2025-06-19T13:15:22.263000
|
||||||
CVE-2022-48942,0,0,54372a0406f1cc0b6657cde2dcb6c662b4713c79f47b57e794248039c65b1eca,2024-08-22T18:25:14.867000
|
CVE-2022-48942,0,0,54372a0406f1cc0b6657cde2dcb6c662b4713c79f47b57e794248039c65b1eca,2024-08-22T18:25:14.867000
|
||||||
CVE-2022-48943,0,0,0264fe83c8bd61ffaa8ed7a29a1240090d6282de98f79a1469d8e8bd5f420b46,2024-08-22T18:27:42.807000
|
CVE-2022-48943,0,0,0264fe83c8bd61ffaa8ed7a29a1240090d6282de98f79a1469d8e8bd5f420b46,2024-08-22T18:27:42.807000
|
||||||
CVE-2022-48944,0,0,16d9e14c1e4833622d1d49b030ba3e3e9b9c0c99940a3d2a711a2b623c1bcade,2024-09-03T14:26:56.393000
|
CVE-2022-48944,0,0,16d9e14c1e4833622d1d49b030ba3e3e9b9c0c99940a3d2a711a2b623c1bcade,2024-09-03T14:26:56.393000
|
||||||
@ -213564,7 +213564,7 @@ CVE-2022-49149,0,0,8297fdf184d8a7e40f01ea0d5664b49cf40330e7583bc4ef95ce788771a41
|
|||||||
CVE-2022-4915,0,0,78e97bf5fafb2d4b7a3e2f6f595e7dd1ee238a60190a7a2d5d6415e7dc17ff0a,2024-11-21T07:36:14.217000
|
CVE-2022-4915,0,0,78e97bf5fafb2d4b7a3e2f6f595e7dd1ee238a60190a7a2d5d6415e7dc17ff0a,2024-11-21T07:36:14.217000
|
||||||
CVE-2022-49150,0,0,89648067971d85640435933caa498e9b7904e2151ba4ff335e966223ae328796,2025-03-13T22:05:03.087000
|
CVE-2022-49150,0,0,89648067971d85640435933caa498e9b7904e2151ba4ff335e966223ae328796,2025-03-13T22:05:03.087000
|
||||||
CVE-2022-49151,0,0,6f4fcc36b8e2ec9d432fdd24048034cbfd9b73238dda4b9dc33cc585a0b93ab8,2025-02-26T07:00:52.330000
|
CVE-2022-49151,0,0,6f4fcc36b8e2ec9d432fdd24048034cbfd9b73238dda4b9dc33cc585a0b93ab8,2025-02-26T07:00:52.330000
|
||||||
CVE-2022-49152,0,0,43c27d907bef1323c0c7b09e08b2937b8e29cf537937e3d8e7e21b9227eb2c45,2025-03-13T21:58:23.127000
|
CVE-2022-49152,0,1,c4a44daa128a67ab28411df5611930eeb719858fd4f3058175c97a012867c1a3,2025-06-19T13:15:22.587000
|
||||||
CVE-2022-49153,0,0,95eb9c7e8ee8ba4b1a97012606c13b8f5d719ee8b39c0fa9f873eb03c309eaff,2025-03-13T21:59:52.070000
|
CVE-2022-49153,0,0,95eb9c7e8ee8ba4b1a97012606c13b8f5d719ee8b39c0fa9f873eb03c309eaff,2025-03-13T21:59:52.070000
|
||||||
CVE-2022-49154,0,0,058332ad746480c433c095f859625c05c95d09d8148e0469d1b9f496b7c549cf,2025-02-26T07:00:52.627000
|
CVE-2022-49154,0,0,058332ad746480c433c095f859625c05c95d09d8148e0469d1b9f496b7c549cf,2025-02-26T07:00:52.627000
|
||||||
CVE-2022-49155,0,0,ccc5982f599632c5a9bc700e79ff0e33f7c79bed37c3808f82465d1a36b59668,2025-03-13T22:06:01.560000
|
CVE-2022-49155,0,0,ccc5982f599632c5a9bc700e79ff0e33f7c79bed37c3808f82465d1a36b59668,2025-03-13T22:06:01.560000
|
||||||
@ -213784,7 +213784,7 @@ CVE-2022-49349,0,0,1aa0d1d0eb3b79e2c845a874dc5fe1db90a2fe64fbb452307be608b1f11ce
|
|||||||
CVE-2022-4935,0,0,c31e88e6073fd3a29bae4107f25ae33694ff5130dac188737279f3976c97e421,2024-11-21T07:36:17.127000
|
CVE-2022-4935,0,0,c31e88e6073fd3a29bae4107f25ae33694ff5130dac188737279f3976c97e421,2024-11-21T07:36:17.127000
|
||||||
CVE-2022-49350,0,0,5797ea7c9c6bbd566c497961eeb330f7e8cb153458b7d0b6af2daac2f567e551,2025-02-26T07:01:11.723000
|
CVE-2022-49350,0,0,5797ea7c9c6bbd566c497961eeb330f7e8cb153458b7d0b6af2daac2f567e551,2025-02-26T07:01:11.723000
|
||||||
CVE-2022-49351,0,0,f762fc8508cc53a96f2d5ae2409376fdfff9e36e8f7b847da1a350ac1003a378,2025-04-14T19:46:06.033000
|
CVE-2022-49351,0,0,f762fc8508cc53a96f2d5ae2409376fdfff9e36e8f7b847da1a350ac1003a378,2025-04-14T19:46:06.033000
|
||||||
CVE-2022-49352,0,0,9a85d620d7b8dd9928721b30c4d4e2b4685cf494c863d70f759767330dbda81d,2025-02-26T07:01:11.920000
|
CVE-2022-49352,0,1,823244c735e96d1908eee00f54805dc289c4857d5af5fb9bda42577bca86b134,2025-06-19T13:15:23.173000
|
||||||
CVE-2022-49353,0,0,be077bbcbe43beba9f58af70b6e1b75dd94baa91ee5c399b9024ca0ebceb7606,2025-04-14T19:45:00.240000
|
CVE-2022-49353,0,0,be077bbcbe43beba9f58af70b6e1b75dd94baa91ee5c399b9024ca0ebceb7606,2025-04-14T19:45:00.240000
|
||||||
CVE-2022-49354,0,0,d8fe12986c733c7dfe77ae298c313fe154cd9f45b9cf0b76657e1140b5aab642,2025-04-14T19:44:14.093000
|
CVE-2022-49354,0,0,d8fe12986c733c7dfe77ae298c313fe154cd9f45b9cf0b76657e1140b5aab642,2025-04-14T19:44:14.093000
|
||||||
CVE-2022-49355,0,0,80fa4fd5e635de4f91692140e2c86158eee6f65edf7fc01373d8d1f58728fae1,2025-02-26T13:15:34.157000
|
CVE-2022-49355,0,0,80fa4fd5e635de4f91692140e2c86158eee6f65edf7fc01373d8d1f58728fae1,2025-02-26T13:15:34.157000
|
||||||
@ -213850,13 +213850,13 @@ CVE-2022-49409,0,0,3a950fbc64da2692edff68767b6c6abac72091f6e85997f1aa6e95042b2d7
|
|||||||
CVE-2022-4941,0,0,c9bd40e150e10c29b1c1e079ad1ffb2aea9c86536c13026eb988f154ee982f63,2024-11-21T07:36:17.807000
|
CVE-2022-4941,0,0,c9bd40e150e10c29b1c1e079ad1ffb2aea9c86536c13026eb988f154ee982f63,2024-11-21T07:36:17.807000
|
||||||
CVE-2022-49410,0,0,84d3e0f7bc21d558aec3b4e0ae8dee5a83279109778732c277deb256b86bb2fc,2025-04-17T20:31:34.340000
|
CVE-2022-49410,0,0,84d3e0f7bc21d558aec3b4e0ae8dee5a83279109778732c277deb256b86bb2fc,2025-04-17T20:31:34.340000
|
||||||
CVE-2022-49411,0,0,2b5ce5715259713da2a41ab77c5286503ef5377899a5c8c8887f3d26b2333df2,2025-03-25T13:42:10.430000
|
CVE-2022-49411,0,0,2b5ce5715259713da2a41ab77c5286503ef5377899a5c8c8887f3d26b2333df2,2025-03-25T13:42:10.430000
|
||||||
CVE-2022-49412,0,0,afccb4edffaf71a111d69ecc331b520c3202dd241aaecb825e5679aa06f4e7e5,2025-03-24T19:52:31.537000
|
CVE-2022-49412,0,1,4f46ff2d315d02f6f16a687dc1b5546d05e8cdd6687c045d7846d721ea0dd8f9,2025-06-19T13:15:23.390000
|
||||||
CVE-2022-49413,0,0,b2779eac2a49f8913753d7cd747a23e073f48c0c2dc073ff2425a07a12ae4534,2025-03-24T19:52:50.113000
|
CVE-2022-49413,0,0,b2779eac2a49f8913753d7cd747a23e073f48c0c2dc073ff2425a07a12ae4534,2025-03-24T19:52:50.113000
|
||||||
CVE-2022-49414,0,0,78bee9ca007908a24f772b14094ada9ee18d2cc4a2d938908fbffbcb58ba4b45,2025-04-17T20:35:12.403000
|
CVE-2022-49414,0,0,78bee9ca007908a24f772b14094ada9ee18d2cc4a2d938908fbffbcb58ba4b45,2025-04-17T20:35:12.403000
|
||||||
CVE-2022-49415,0,0,cc9039f44d53c55e84c3684b78f9440e4ff08d1e0f2a5666027ec595491fe980,2025-02-26T07:01:17.987000
|
CVE-2022-49415,0,0,cc9039f44d53c55e84c3684b78f9440e4ff08d1e0f2a5666027ec595491fe980,2025-02-26T07:01:17.987000
|
||||||
CVE-2022-49416,0,0,09c89d207391df88211f0618c2195524a326b2439f8e7dc7ec1d9f0561573089,2025-03-24T19:57:30.150000
|
CVE-2022-49416,0,0,09c89d207391df88211f0618c2195524a326b2439f8e7dc7ec1d9f0561573089,2025-03-24T19:57:30.150000
|
||||||
CVE-2022-49417,0,0,49961907fb61384541aef641811d488df153e40bcbca60f55f87b6d9cab4df46,2025-02-26T07:01:18.170000
|
CVE-2022-49417,0,0,49961907fb61384541aef641811d488df153e40bcbca60f55f87b6d9cab4df46,2025-02-26T07:01:18.170000
|
||||||
CVE-2022-49418,0,0,68702793689d60091827cf296631b3ac98a6cb9e3ad7a623caed68cda3bfc938,2025-02-26T07:01:18.260000
|
CVE-2022-49418,0,1,d0aa489b7864f924c24aff27af838703a66915ae7446105b04bb73c1789e9f08,2025-06-19T13:15:23.660000
|
||||||
CVE-2022-49419,0,0,5e829714eda436088a7d4e2a3f319dbfd17b45b8ecc959b900f607e63f922a81,2025-03-24T19:57:48.187000
|
CVE-2022-49419,0,0,5e829714eda436088a7d4e2a3f319dbfd17b45b8ecc959b900f607e63f922a81,2025-03-24T19:57:48.187000
|
||||||
CVE-2022-4942,0,0,4bfd31c9d3683237fc0f66ee6838a8e9abe03973c1dc054d19973ecd2181f17a,2024-11-21T07:36:17.917000
|
CVE-2022-4942,0,0,4bfd31c9d3683237fc0f66ee6838a8e9abe03973c1dc054d19973ecd2181f17a,2024-11-21T07:36:17.917000
|
||||||
CVE-2022-49420,0,0,b46138299cef30db3771e236c2dee66f2ab59bca5d670ea9e8d5a786215d1752,2025-02-26T07:01:18.440000
|
CVE-2022-49420,0,0,b46138299cef30db3771e236c2dee66f2ab59bca5d670ea9e8d5a786215d1752,2025-02-26T07:01:18.440000
|
||||||
@ -214008,7 +214008,7 @@ CVE-2022-49554,0,0,0a34a3ac650254cb3dbd54b8422b1c5adcae22b4c4383ae36cc0c388c2f4c
|
|||||||
CVE-2022-49555,0,0,8de1c6fc16220f4772a30decf3ad5acfcd7fadbb1585a19ad12b3d6ad05c00cf,2025-02-26T07:01:31.313000
|
CVE-2022-49555,0,0,8de1c6fc16220f4772a30decf3ad5acfcd7fadbb1585a19ad12b3d6ad05c00cf,2025-02-26T07:01:31.313000
|
||||||
CVE-2022-49556,0,0,de449809bae8cf397686a95281a178fe4b9ccf84aef2008424bda7593f787eb5,2025-02-26T07:01:31.407000
|
CVE-2022-49556,0,0,de449809bae8cf397686a95281a178fe4b9ccf84aef2008424bda7593f787eb5,2025-02-26T07:01:31.407000
|
||||||
CVE-2022-49557,0,0,38a9ef5191d44200c06c66c46ec6d0c2e3a8bb943adbda5a5d7d1696f2d7f29c,2025-02-26T07:01:31.503000
|
CVE-2022-49557,0,0,38a9ef5191d44200c06c66c46ec6d0c2e3a8bb943adbda5a5d7d1696f2d7f29c,2025-02-26T07:01:31.503000
|
||||||
CVE-2022-49558,0,0,daac90093d49c8372e444573abe119e8081a887b8d43470c5dabb6cb87a504ff,2025-02-26T07:01:31.597000
|
CVE-2022-49558,0,1,4c402e69801d6bcff63fb791b8eccb9d40581cddc3ca92adb758dc7fe3a2ea1c,2025-06-19T13:15:23.990000
|
||||||
CVE-2022-49559,0,0,2d14c0fbbdaee85fbd444788c794ab884da113af56925a6fd30e8cd880f6bc1d,2025-02-26T07:01:31.687000
|
CVE-2022-49559,0,0,2d14c0fbbdaee85fbd444788c794ab884da113af56925a6fd30e8cd880f6bc1d,2025-02-26T07:01:31.687000
|
||||||
CVE-2022-4956,0,0,43d14a14df320488a03d84b995042cdf95aa3fb7ff65406b2df0e2b91a52a9a3,2024-11-21T07:36:19.420000
|
CVE-2022-4956,0,0,43d14a14df320488a03d84b995042cdf95aa3fb7ff65406b2df0e2b91a52a9a3,2024-11-21T07:36:19.420000
|
||||||
CVE-2022-49560,0,0,f7c3028aafa421076b95e5c2bf3d153f3809af6aad83d1d0d1d9464b491c9c33,2025-03-10T21:25:29.677000
|
CVE-2022-49560,0,0,f7c3028aafa421076b95e5c2bf3d153f3809af6aad83d1d0d1d9464b491c9c33,2025-03-10T21:25:29.677000
|
||||||
@ -241994,7 +241994,7 @@ CVE-2023-52565,0,0,573eae026add44222db4dcfafdb299400ef2ab79702c7319794326b052947
|
|||||||
CVE-2023-52566,0,0,4a45e53e899c4c8e03aa80fb0793adc54a3cf1171b058b92566f227166dfee91,2025-04-08T15:08:55.437000
|
CVE-2023-52566,0,0,4a45e53e899c4c8e03aa80fb0793adc54a3cf1171b058b92566f227166dfee91,2025-04-08T15:08:55.437000
|
||||||
CVE-2023-52567,0,0,18cd831f228d03b1e3290afd2f881bf52bd296c7921d05278f526558565ace57,2024-12-11T16:26:16.023000
|
CVE-2023-52567,0,0,18cd831f228d03b1e3290afd2f881bf52bd296c7921d05278f526558565ace57,2024-12-11T16:26:16.023000
|
||||||
CVE-2023-52568,0,0,8d17d4f43096b1e8e2ac821253ed4d8309c3179fdcc64f1f4e718167b321b031,2024-12-11T16:23:49.080000
|
CVE-2023-52568,0,0,8d17d4f43096b1e8e2ac821253ed4d8309c3179fdcc64f1f4e718167b321b031,2024-12-11T16:23:49.080000
|
||||||
CVE-2023-52569,0,0,acae99d79ce34dd4ff6e2aa23bdd3e8e5bfff8c20e53119da007b1ed6daf44c2,2025-01-16T17:08:05.613000
|
CVE-2023-52569,0,1,df1275888ba06ca21a82881e8960dc896067a15bc45cfc453e437a3a74c9d6eb,2025-06-19T13:15:25.037000
|
||||||
CVE-2023-5257,0,0,3ce640126c4032ba9918a5e5e037c470517d8bf27f41acbde20ca80717bf2d95,2024-11-21T08:41:23.437000
|
CVE-2023-5257,0,0,3ce640126c4032ba9918a5e5e037c470517d8bf27f41acbde20ca80717bf2d95,2024-11-21T08:41:23.437000
|
||||||
CVE-2023-52570,0,0,c7a973afb4874bbc0a4a26ff210f16ddeefd555596f88f99c2b297604732223f,2024-12-11T15:21:44.063000
|
CVE-2023-52570,0,0,c7a973afb4874bbc0a4a26ff210f16ddeefd555596f88f99c2b297604732223f,2024-12-11T15:21:44.063000
|
||||||
CVE-2023-52571,0,0,0530f604f4af36e2992e1f7440b11a88707cbaea887a6a55bb83acc474872973,2025-04-08T15:05:00.363000
|
CVE-2023-52571,0,0,0530f604f4af36e2992e1f7440b11a88707cbaea887a6a55bb83acc474872973,2025-04-08T15:05:00.363000
|
||||||
@ -242118,7 +242118,7 @@ CVE-2023-52678,0,0,953cb4fa01ac6791b2584f95a5c8315c108ebc482f65f293fe1f239c11425
|
|||||||
CVE-2023-52679,0,0,c478e813ddd4b4ce1343e3f27409449fa8ed702ee1034440fed17cea99bc0916,2025-01-10T17:43:16.480000
|
CVE-2023-52679,0,0,c478e813ddd4b4ce1343e3f27409449fa8ed702ee1034440fed17cea99bc0916,2025-01-10T17:43:16.480000
|
||||||
CVE-2023-5268,0,0,f9bebe86fa585dfcbe060b1fc00adb16b0d04aa3d4d18f7175ba3a6e3d9791b3,2024-11-21T08:41:24.927000
|
CVE-2023-5268,0,0,f9bebe86fa585dfcbe060b1fc00adb16b0d04aa3d4d18f7175ba3a6e3d9791b3,2024-11-21T08:41:24.927000
|
||||||
CVE-2023-52680,0,0,ae64b074c35060884727ad53684f53cc03f000222f0fa8eecc3a6d877d9f2721,2024-11-21T08:40:20.917000
|
CVE-2023-52680,0,0,ae64b074c35060884727ad53684f53cc03f000222f0fa8eecc3a6d877d9f2721,2024-11-21T08:40:20.917000
|
||||||
CVE-2023-52681,0,0,95b2ac4df61f56d2f95a7ebeac7252765a55cc1647d79893431efd01a2086de4,2024-11-21T08:40:21.033000
|
CVE-2023-52681,0,1,9979ebd32b3b744719f95c4518639ea57b75a7e784be8db9600f82ed62535911,2025-06-19T13:15:25.340000
|
||||||
CVE-2023-52682,0,0,7173fbc8b142d32af92920f8c64d6a1bcd27bf572e831e7779e266c7cb9a253f,2024-11-21T08:40:21.140000
|
CVE-2023-52682,0,0,7173fbc8b142d32af92920f8c64d6a1bcd27bf572e831e7779e266c7cb9a253f,2024-11-21T08:40:21.140000
|
||||||
CVE-2023-52683,0,0,9b2b7b84c8196b3a590a9ce5475ccf3a213512372aec3910ecd4dc19f9dd5698,2024-11-21T08:40:21.257000
|
CVE-2023-52683,0,0,9b2b7b84c8196b3a590a9ce5475ccf3a213512372aec3910ecd4dc19f9dd5698,2024-11-21T08:40:21.257000
|
||||||
CVE-2023-52684,0,0,826a51fde3c297efd3fc5507da29c58f7b97d76cfc3216cf6472e94079a4d24f,2025-04-07T19:05:23.597000
|
CVE-2023-52684,0,0,826a51fde3c297efd3fc5507da29c58f7b97d76cfc3216cf6472e94079a4d24f,2025-04-07T19:05:23.597000
|
||||||
@ -242174,7 +242174,7 @@ CVE-2023-5273,0,0,6f26df3fc1e6203409f37349c999afab7055cfb5e89e02483db488eefca53f
|
|||||||
CVE-2023-52730,0,0,1ebdd041e2bc78bea11061473cc34d19a52a846428c3eec8b8c107820fac7c23,2024-11-21T08:40:27.883000
|
CVE-2023-52730,0,0,1ebdd041e2bc78bea11061473cc34d19a52a846428c3eec8b8c107820fac7c23,2024-11-21T08:40:27.883000
|
||||||
CVE-2023-52731,0,0,f8ad5fad613ade1f6ee5f3c6074ef9d4461b8891819ac9a19a1d924438b4937a,2024-11-21T08:40:28.007000
|
CVE-2023-52731,0,0,f8ad5fad613ade1f6ee5f3c6074ef9d4461b8891819ac9a19a1d924438b4937a,2024-11-21T08:40:28.007000
|
||||||
CVE-2023-52732,0,0,1eb76b8d97f2e3d09be2caf803604d47c4ef9e424628d8acb55510ffc20a29aa,2024-11-21T08:40:28.117000
|
CVE-2023-52732,0,0,1eb76b8d97f2e3d09be2caf803604d47c4ef9e424628d8acb55510ffc20a29aa,2024-11-21T08:40:28.117000
|
||||||
CVE-2023-52733,0,0,eab724cd83ed3fe528298f769c5c7d25e8d15ce5366636f88d1ccd7fc54ffb7b,2025-04-02T14:51:20.137000
|
CVE-2023-52733,0,1,d8b36e38e3f34fa775025847fd118ed3ac106313dc762d2202b3a2ae3b5ec530,2025-06-19T13:15:25.540000
|
||||||
CVE-2023-52734,0,0,2f76584608f90880dda5ed1cfe003cf8af38c50f85a7ba05f54382ff1ea93b84,2024-05-28T19:15:09.773000
|
CVE-2023-52734,0,0,2f76584608f90880dda5ed1cfe003cf8af38c50f85a7ba05f54382ff1ea93b84,2024-05-28T19:15:09.773000
|
||||||
CVE-2023-52735,0,0,f478ba3b373cd433bb5aee25a220a182cbf53291e6340b29288cf9162f927cfd,2025-04-02T14:51:07.620000
|
CVE-2023-52735,0,0,f478ba3b373cd433bb5aee25a220a182cbf53291e6340b29288cf9162f927cfd,2025-04-02T14:51:07.620000
|
||||||
CVE-2023-52736,0,0,c35bcc1b2cba606129c818a936155ca214b02693b11b04934035f9ed16c416ef,2024-11-21T08:40:28.620000
|
CVE-2023-52736,0,0,c35bcc1b2cba606129c818a936155ca214b02693b11b04934035f9ed16c416ef,2024-11-21T08:40:28.620000
|
||||||
@ -242204,7 +242204,7 @@ CVE-2023-52757,0,0,59eb322f34bc12b8711c834c3ce346bda3ca5214ddbf962c381360374341e
|
|||||||
CVE-2023-52758,0,0,1dec77a3ad2d46363a8d440866791b91e3ba2419e4f6b349bb352575fcbf86ba,2024-05-24T16:15:09.010000
|
CVE-2023-52758,0,0,1dec77a3ad2d46363a8d440866791b91e3ba2419e4f6b349bb352575fcbf86ba,2024-05-24T16:15:09.010000
|
||||||
CVE-2023-52759,0,0,d02de4f2e673632abe3697cddfe6669da6af361a999f03297379c860e218d9d0,2024-12-19T11:15:30.140000
|
CVE-2023-52759,0,0,d02de4f2e673632abe3697cddfe6669da6af361a999f03297379c860e218d9d0,2024-12-19T11:15:30.140000
|
||||||
CVE-2023-5276,0,0,0b7db42a0b69ca7893c46dd3bcba89bcdb20b2edc3fa2c1057d10c47dc3e90db,2024-11-21T08:41:26
|
CVE-2023-5276,0,0,0b7db42a0b69ca7893c46dd3bcba89bcdb20b2edc3fa2c1057d10c47dc3e90db,2024-11-21T08:41:26
|
||||||
CVE-2023-52760,0,0,e225beb74f176155c5de5fb84653dce76d2796c70c5432fc12736d42fc8f9cc8,2025-01-22T18:03:56.987000
|
CVE-2023-52760,0,1,be4664371f00ed519eb214443ad69b213a779969946b87431fc93a9157c3c1fd,2025-06-19T13:15:30.487000
|
||||||
CVE-2023-52761,0,0,2de2d44e86efe53326e55f7ec6f21c5145ed9df593be989838b4687490700a3c,2024-11-21T08:40:31.823000
|
CVE-2023-52761,0,0,2de2d44e86efe53326e55f7ec6f21c5145ed9df593be989838b4687490700a3c,2024-11-21T08:40:31.823000
|
||||||
CVE-2023-52762,0,0,b1526cb45988cef620a220c45195944361e97b42679e23f18e92d83e3ddbd163,2024-11-21T08:40:31.957000
|
CVE-2023-52762,0,0,b1526cb45988cef620a220c45195944361e97b42679e23f18e92d83e3ddbd163,2024-11-21T08:40:31.957000
|
||||||
CVE-2023-52763,0,0,51608820498fd55626f4c63260788d9dac36f63a4eb8157e60a3920e8ba1efdd,2024-11-21T08:40:32.093000
|
CVE-2023-52763,0,0,51608820498fd55626f4c63260788d9dac36f63a4eb8157e60a3920e8ba1efdd,2024-11-21T08:40:32.093000
|
||||||
@ -242381,7 +242381,7 @@ CVE-2023-52918,0,0,b756056ec028a3f8dbe95359b4e6a9ee9c3aee022710af984fbcd888a01bb
|
|||||||
CVE-2023-52919,0,0,428ae0b617ce1503b5cd1e233daf56322f531cad4cdc2d0ff04fec45c15d021d,2024-10-24T03:53:16.377000
|
CVE-2023-52919,0,0,428ae0b617ce1503b5cd1e233daf56322f531cad4cdc2d0ff04fec45c15d021d,2024-10-24T03:53:16.377000
|
||||||
CVE-2023-5292,0,0,053cd6bdc838ec8e58310af23c6d4e5e608dfbec5f41437eefe04e4d3a1ca985,2024-11-21T08:41:27.907000
|
CVE-2023-5292,0,0,053cd6bdc838ec8e58310af23c6d4e5e608dfbec5f41437eefe04e4d3a1ca985,2024-11-21T08:41:27.907000
|
||||||
CVE-2023-52920,0,0,d3f31fdc95b4a67b67ed332bc8577a6c103a6cc3b65bec1715fea71c281674f5,2025-01-09T16:15:35.587000
|
CVE-2023-52920,0,0,d3f31fdc95b4a67b67ed332bc8577a6c103a6cc3b65bec1715fea71c281674f5,2025-01-09T16:15:35.587000
|
||||||
CVE-2023-52921,0,0,db860eb263bc8c980e12e17429a087c45572e4c4d54038923230b290b9052477,2024-12-11T15:15:07.307000
|
CVE-2023-52921,0,1,c9f9bd22855b8379a13799b1a815f41642b925730ab26056a1a11d5dc4d2992e,2025-06-19T13:15:30.640000
|
||||||
CVE-2023-52922,0,0,4ae9be38bb6e6ca23829d038f55e60ad12898283b6085540928abd9ae32559e4,2025-06-13T20:15:22.450000
|
CVE-2023-52922,0,0,4ae9be38bb6e6ca23829d038f55e60ad12898283b6085540928abd9ae32559e4,2025-06-13T20:15:22.450000
|
||||||
CVE-2023-52923,0,0,d09409de037f5df89cd9d952de36693819046c41079eff92af40562f1bb761b3,2025-01-20T11:15:07.670000
|
CVE-2023-52923,0,0,d09409de037f5df89cd9d952de36693819046c41079eff92af40562f1bb761b3,2025-01-20T11:15:07.670000
|
||||||
CVE-2023-52924,0,0,bd440ccf1a42892e419405c1c6a29cc2e2440c3f674ae48874e7009d8d7bdcee,2025-02-05T10:15:21.073000
|
CVE-2023-52924,0,0,bd440ccf1a42892e419405c1c6a29cc2e2440c3f674ae48874e7009d8d7bdcee,2025-02-05T10:15:21.073000
|
||||||
@ -255274,7 +255274,7 @@ CVE-2024-26707,0,0,1c758f00ff80d3ca5b813ab085c0f9ff555bb1b0aa5a49dbcb6e9068a2759
|
|||||||
CVE-2024-26708,0,0,bdc17ef7e58087066d3e85b0859e722e8ac059d7967114ad28115d9b3375b4ae,2025-04-08T15:31:23.777000
|
CVE-2024-26708,0,0,bdc17ef7e58087066d3e85b0859e722e8ac059d7967114ad28115d9b3375b4ae,2025-04-08T15:31:23.777000
|
||||||
CVE-2024-26709,0,0,84265dc256d943df4540d48ae1b11a8d0310b66ecceaef365d267322aba660bc,2025-01-13T20:03:28.797000
|
CVE-2024-26709,0,0,84265dc256d943df4540d48ae1b11a8d0310b66ecceaef365d267322aba660bc,2025-01-13T20:03:28.797000
|
||||||
CVE-2024-2671,0,0,bd5a320ab3401036156189ab4d3c6361e3a5116b660dfa0e919103b068f0300e,2025-02-21T15:22:57.597000
|
CVE-2024-2671,0,0,bd5a320ab3401036156189ab4d3c6361e3a5116b660dfa0e919103b068f0300e,2025-02-21T15:22:57.597000
|
||||||
CVE-2024-26710,0,0,b738c95ced70807b461356e09fa92db1949c85f5c05571b831087b4afd6fe717,2025-03-17T15:36:11.620000
|
CVE-2024-26710,0,1,d91617f4ca4e9a9d1f5c2cca466d703e7087376b6a0b7ff97a78b84a1307d155,2025-06-19T13:15:31.147000
|
||||||
CVE-2024-26711,0,0,1cb1621e17ab6fc4256a8b2cd44f93b4025c21bdd8d93a6a4ecbfd4ca633f9c6,2025-02-27T22:02:24.350000
|
CVE-2024-26711,0,0,1cb1621e17ab6fc4256a8b2cd44f93b4025c21bdd8d93a6a4ecbfd4ca633f9c6,2025-02-27T22:02:24.350000
|
||||||
CVE-2024-26712,0,0,3eabb06e3f183090db18d9de2e74b41b5b40f04fc54674544de28e3b74739392,2025-04-08T15:30:20.373000
|
CVE-2024-26712,0,0,3eabb06e3f183090db18d9de2e74b41b5b40f04fc54674544de28e3b74739392,2025-04-08T15:30:20.373000
|
||||||
CVE-2024-26713,0,0,e7e300ec5bbfa68ba83e0a47cb90f58abff0db2ab2dd369821dd312aa798bced,2024-12-19T12:15:06.330000
|
CVE-2024-26713,0,0,e7e300ec5bbfa68ba83e0a47cb90f58abff0db2ab2dd369821dd312aa798bced,2024-12-19T12:15:06.330000
|
||||||
@ -255344,7 +255344,7 @@ CVE-2024-26770,0,0,8d08eaa70a2e2e3d40574f2b704a77374cb9e6669a6ba5b5bad3773130c49
|
|||||||
CVE-2024-26771,0,0,5e3318a5219a1562a00396de2c61a0fa558f01729e9603c0306f834212e0432f,2025-01-27T14:59:26.887000
|
CVE-2024-26771,0,0,5e3318a5219a1562a00396de2c61a0fa558f01729e9603c0306f834212e0432f,2025-01-27T14:59:26.887000
|
||||||
CVE-2024-26772,0,0,c15abffc72b52c1a80253e130b87503f54d4bae2e6cddf19576aab0699a1611a,2025-04-04T14:16:47.867000
|
CVE-2024-26772,0,0,c15abffc72b52c1a80253e130b87503f54d4bae2e6cddf19576aab0699a1611a,2025-04-04T14:16:47.867000
|
||||||
CVE-2024-26773,0,0,1d4a42bde597efed855450dd0aa8a8e904f698a7797b2eeeaff9bc97aa6ee818,2025-03-18T16:47:14.460000
|
CVE-2024-26773,0,0,1d4a42bde597efed855450dd0aa8a8e904f698a7797b2eeeaff9bc97aa6ee818,2025-03-18T16:47:14.460000
|
||||||
CVE-2024-26774,0,0,1356b93fc761b0852a7c80176290616f9269a68e3fa4bb6d27677f517a92f70a,2025-02-27T14:37:32.300000
|
CVE-2024-26774,0,1,b20f68ad798f47a3112a9583e723a0e9797df4899daeded36e85706ea3f97d2c,2025-06-19T13:15:31.303000
|
||||||
CVE-2024-26775,0,0,285e0acd81a3ae287fc503b023988af78322228ca5a120edc7cd1b3b8dae3d03,2025-01-07T17:29:01.727000
|
CVE-2024-26775,0,0,285e0acd81a3ae287fc503b023988af78322228ca5a120edc7cd1b3b8dae3d03,2025-01-07T17:29:01.727000
|
||||||
CVE-2024-26776,0,0,1bba81b8a8e72ec7c95ffb5d3e7b333d1413cd97a166084740a9af418cac677d,2025-02-27T14:37:18.470000
|
CVE-2024-26776,0,0,1bba81b8a8e72ec7c95ffb5d3e7b333d1413cd97a166084740a9af418cac677d,2025-02-27T14:37:18.470000
|
||||||
CVE-2024-26777,0,0,daa8d9f58a531907703c73a4675a28b328f6bf2537032c88b428620832a46d69,2025-02-27T14:36:46.680000
|
CVE-2024-26777,0,0,daa8d9f58a531907703c73a4675a28b328f6bf2537032c88b428620832a46d69,2025-02-27T14:36:46.680000
|
||||||
@ -255366,7 +255366,7 @@ CVE-2024-26790,0,0,da7993ff6ba918c2f5e13339b4c718269282ee965a1c6bb70f04c36e1ddd8
|
|||||||
CVE-2024-26791,0,0,c8ef10c6f04ed9c66fd762d6a0b3a45e0c79cbce1caed02d55dfa6a1faf6f0f6,2024-12-20T14:35:01.250000
|
CVE-2024-26791,0,0,c8ef10c6f04ed9c66fd762d6a0b3a45e0c79cbce1caed02d55dfa6a1faf6f0f6,2024-12-20T14:35:01.250000
|
||||||
CVE-2024-26792,0,0,785771b4bfd2e03416e2a07ada6b7ec1391a403eee900f868d4d1d8145ef2354,2024-12-20T16:15:54.653000
|
CVE-2024-26792,0,0,785771b4bfd2e03416e2a07ada6b7ec1391a403eee900f868d4d1d8145ef2354,2024-12-20T16:15:54.653000
|
||||||
CVE-2024-26793,0,0,aa90abb3d1121ccaaf349ab01239e4c0a4a16759efda564be699ec746faed484,2024-12-20T15:56:00.320000
|
CVE-2024-26793,0,0,aa90abb3d1121ccaaf349ab01239e4c0a4a16759efda564be699ec746faed484,2024-12-20T15:56:00.320000
|
||||||
CVE-2024-26794,0,0,9eb986e013bbdcdde88cd1768aa2e78889ba25afb64fca3198a883c6aab795c3,2025-04-04T14:28:38.927000
|
CVE-2024-26794,0,1,a3da132eb916650492f3106d515b735dbe72602746c12f011cd20d711c76dfe9,2025-06-19T13:15:31.510000
|
||||||
CVE-2024-26795,0,0,d43373becd1a2a0dc874625192219b12b2ce199f209c7afab1c87714eb89d672,2025-03-19T11:42:41.993000
|
CVE-2024-26795,0,0,d43373becd1a2a0dc874625192219b12b2ce199f209c7afab1c87714eb89d672,2025-03-19T11:42:41.993000
|
||||||
CVE-2024-26796,0,0,740b63b874106b1735e661fa59a152bb86da8899659de0c6c2baad5e3560a4e5,2025-02-27T14:42:59.307000
|
CVE-2024-26796,0,0,740b63b874106b1735e661fa59a152bb86da8899659de0c6c2baad5e3560a4e5,2025-02-27T14:42:59.307000
|
||||||
CVE-2024-26797,0,0,7fcfec66278f984b39928c78bd306ae2d1a962abb25765fcb783613999da1ac4,2025-04-04T14:28:24.440000
|
CVE-2024-26797,0,0,7fcfec66278f984b39928c78bd306ae2d1a962abb25765fcb783613999da1ac4,2025-04-04T14:28:24.440000
|
||||||
@ -255404,7 +255404,7 @@ CVE-2024-26825,0,0,5ce48738814319bfdc0872ba26b2b463e8d87f9b2edf67de8e88f9e8483cf
|
|||||||
CVE-2024-26826,0,0,ef7b75c128b5631f4acb91497bc6db3efb75b4e39a3d93ea904f63614f9960ae,2025-03-27T20:57:04.587000
|
CVE-2024-26826,0,0,ef7b75c128b5631f4acb91497bc6db3efb75b4e39a3d93ea904f63614f9960ae,2025-03-27T20:57:04.587000
|
||||||
CVE-2024-26827,0,0,4cc514efbe22ca04935a47f409b758351113d51b04fbbf02df44e27fcf8c06d7,2024-04-18T15:15:28.957000
|
CVE-2024-26827,0,0,4cc514efbe22ca04935a47f409b758351113d51b04fbbf02df44e27fcf8c06d7,2024-04-18T15:15:28.957000
|
||||||
CVE-2024-26828,0,0,84cc1261ddaa48629277944c8edcecccf8c15c1a0d5d26c02dc97eff20614da7,2025-04-08T19:16:26.800000
|
CVE-2024-26828,0,0,84cc1261ddaa48629277944c8edcecccf8c15c1a0d5d26c02dc97eff20614da7,2025-04-08T19:16:26.800000
|
||||||
CVE-2024-26829,0,0,33b858020b676d55d8dbfd0b8da63d045ba99285dcf6c6b1575c915b01f21130,2025-01-14T14:58:05.850000
|
CVE-2024-26829,0,1,b0fb093ec36f7b8fab0c07d9ff5d8c115163457af7ad63571f29a99c79782f86,2025-06-19T13:15:35.917000
|
||||||
CVE-2024-2683,0,0,d31db9b74162f34437448255d1f05adaf71bd3df21d7a1817f74540be30fbc76,2025-02-19T18:17:48.753000
|
CVE-2024-2683,0,0,d31db9b74162f34437448255d1f05adaf71bd3df21d7a1817f74540be30fbc76,2025-02-19T18:17:48.753000
|
||||||
CVE-2024-26830,0,0,2e2d3d6269a8cd6a1cd47762591871dad624cc396e1ad5b9c684796d0e57ebe7,2025-04-02T13:19:07.453000
|
CVE-2024-26830,0,0,2e2d3d6269a8cd6a1cd47762591871dad624cc396e1ad5b9c684796d0e57ebe7,2025-04-02T13:19:07.453000
|
||||||
CVE-2024-26831,0,0,f65b722d125da32d24604f127879b9206512a4f102e576e5645c679ad672606e,2025-04-02T13:19:02.103000
|
CVE-2024-26831,0,0,f65b722d125da32d24604f127879b9206512a4f102e576e5645c679ad672606e,2025-04-02T13:19:02.103000
|
||||||
@ -256014,7 +256014,7 @@ CVE-2024-27407,0,0,dc07c9bf4f777f0e957ab25dab31a13cbbf2678e72e3a590e12482cccd0be
|
|||||||
CVE-2024-27408,0,0,98c8b30837a43afd080646bbf037ed81aeb11ea466e7a3ed6819c36cd81c8836,2024-11-21T09:04:33.527000
|
CVE-2024-27408,0,0,98c8b30837a43afd080646bbf037ed81aeb11ea466e7a3ed6819c36cd81c8836,2024-11-21T09:04:33.527000
|
||||||
CVE-2024-27409,0,0,bc22652d032818f4fca14079fcd7842d612c3718de3699320e494dfa7ee8a5c1,2024-11-21T09:04:33.653000
|
CVE-2024-27409,0,0,bc22652d032818f4fca14079fcd7842d612c3718de3699320e494dfa7ee8a5c1,2024-11-21T09:04:33.653000
|
||||||
CVE-2024-2741,0,0,30b99159ddaffefc3023664c691b9ef3588e2d3200502b3b66f4719c657f05c7,2024-11-21T09:10:24.803000
|
CVE-2024-2741,0,0,30b99159ddaffefc3023664c691b9ef3588e2d3200502b3b66f4719c657f05c7,2024-11-21T09:10:24.803000
|
||||||
CVE-2024-27410,0,0,696573043fa09b9df264d696d78b1a95886a7ef42f45c10d6fc9f36d52d70758,2024-11-21T09:04:33.790000
|
CVE-2024-27410,0,1,e2b99fbfacc2e17073c8f281de201fc889439fe117d814d6701704ee8054a9fd,2025-06-19T13:15:36.097000
|
||||||
CVE-2024-27411,0,0,f33ed05b1af79c8798dce10b734b807cfd3c3c0280cda3312cace7d33a168919,2024-11-21T09:04:33.923000
|
CVE-2024-27411,0,0,f33ed05b1af79c8798dce10b734b807cfd3c3c0280cda3312cace7d33a168919,2024-11-21T09:04:33.923000
|
||||||
CVE-2024-27412,0,0,a702c5879aeed78b48b36d8ae6b313b965796547c99b174c28ae0bc5c2f82542,2024-11-21T09:04:34.063000
|
CVE-2024-27412,0,0,a702c5879aeed78b48b36d8ae6b313b965796547c99b174c28ae0bc5c2f82542,2024-11-21T09:04:34.063000
|
||||||
CVE-2024-27413,0,0,bd327b327f16ab52d01828f6d316a044860ba7af430fc81075dcfbe2d6b40958,2024-11-21T09:04:34.300000
|
CVE-2024-27413,0,0,bd327b327f16ab52d01828f6d316a044860ba7af430fc81075dcfbe2d6b40958,2024-11-21T09:04:34.300000
|
||||||
@ -262266,7 +262266,7 @@ CVE-2024-35784,0,0,6a36ecbf216ecaf3512a6c5b2ee3703a250b459b4a7ecfacf4fe0e8fda312
|
|||||||
CVE-2024-35785,0,0,77c21670bce798ec6fb6e30378d55b3c958574746063148d56c3b95ce96a48ea,2024-11-21T09:20:53.437000
|
CVE-2024-35785,0,0,77c21670bce798ec6fb6e30378d55b3c958574746063148d56c3b95ce96a48ea,2024-11-21T09:20:53.437000
|
||||||
CVE-2024-35786,0,0,77f89bb040cf765f6d9234d420731b7c23c63247ead02a0f8c0b8e4af33e99a9,2025-01-10T18:10:34.873000
|
CVE-2024-35786,0,0,77f89bb040cf765f6d9234d420731b7c23c63247ead02a0f8c0b8e4af33e99a9,2025-01-10T18:10:34.873000
|
||||||
CVE-2024-35787,0,0,4661ac4ee6981aead7188ecd1296951853916d0577763ef27ab740e5af313cc2,2024-11-21T09:20:53.720000
|
CVE-2024-35787,0,0,4661ac4ee6981aead7188ecd1296951853916d0577763ef27ab740e5af313cc2,2024-11-21T09:20:53.720000
|
||||||
CVE-2024-35788,0,0,cfbbcb5b1c7b5aed82e1a1721f9174e455396f89b648614529f26e4a443d5e44,2025-03-05T17:33:07.867000
|
CVE-2024-35788,0,1,f5404129956ea562d37064ccb92719605cd6913b7eeae8729cb7360c707b9b93,2025-06-19T13:15:36.360000
|
||||||
CVE-2024-35789,0,0,9b8c98c47e91f31c7211ff1dcdc3ce85d2adc838fbdea552f5a97604371b7ddd,2024-11-21T09:20:53.967000
|
CVE-2024-35789,0,0,9b8c98c47e91f31c7211ff1dcdc3ce85d2adc838fbdea552f5a97604371b7ddd,2024-11-21T09:20:53.967000
|
||||||
CVE-2024-3579,0,0,7bb6876499ebd3266b422abae1569406fd610b0a85fc736905cfc9d045e4620e,2024-11-21T09:29:54.917000
|
CVE-2024-3579,0,0,7bb6876499ebd3266b422abae1569406fd610b0a85fc736905cfc9d045e4620e,2024-11-21T09:29:54.917000
|
||||||
CVE-2024-35790,0,0,914a42206bcf167074dd60111e4c8cecf43541d1e237ed2dfbd858b2449c7b9b,2025-06-04T13:15:24.587000
|
CVE-2024-35790,0,0,914a42206bcf167074dd60111e4c8cecf43541d1e237ed2dfbd858b2449c7b9b,2025-06-04T13:15:24.587000
|
||||||
@ -262417,7 +262417,7 @@ CVE-2024-35923,0,0,e200bbefa4260a7322c5705e6c101e370170f714b6cca2259ba31c94a243a
|
|||||||
CVE-2024-35924,0,0,51a8e81a5087f6b00f86aef3df30b13903521527bd7c24804424b3f4f88b017b,2024-11-21T09:21:12.833000
|
CVE-2024-35924,0,0,51a8e81a5087f6b00f86aef3df30b13903521527bd7c24804424b3f4f88b017b,2024-11-21T09:21:12.833000
|
||||||
CVE-2024-35925,0,0,c69da8bf3be050c34947dfbb2cbe6b517f550618f4e390b45d64a13e545dc166,2024-12-31T18:51:18.303000
|
CVE-2024-35925,0,0,c69da8bf3be050c34947dfbb2cbe6b517f550618f4e390b45d64a13e545dc166,2024-12-31T18:51:18.303000
|
||||||
CVE-2024-35926,0,0,c1b13d208fac57fe78f6933a263aa2f330043107ad1ad5de4da551ecec504628,2024-11-21T09:21:13.097000
|
CVE-2024-35926,0,0,c1b13d208fac57fe78f6933a263aa2f330043107ad1ad5de4da551ecec504628,2024-11-21T09:21:13.097000
|
||||||
CVE-2024-35927,0,0,278ce2f015c27adcc7ff8c3c6be22b3e8c5bb291856afb164b072d0d8d61b636,2024-11-21T09:21:13.223000
|
CVE-2024-35927,0,1,6b5953bf852146d119c1b41379a677c7ee4ae45bdf6f0faad14652712d972b65,2025-06-19T13:15:40.283000
|
||||||
CVE-2024-35928,0,0,1c31dc8c665b8952880067e761bee324da2eee6fa320ed892680e88b3dd7b63e,2024-12-19T12:15:06.590000
|
CVE-2024-35928,0,0,1c31dc8c665b8952880067e761bee324da2eee6fa320ed892680e88b3dd7b63e,2024-12-19T12:15:06.590000
|
||||||
CVE-2024-35929,0,0,7da540c66ffc823238b17395ecbf47d1012e0cd64e229ac26e5cc7bd9ae7f5a8,2024-12-30T19:56:30.927000
|
CVE-2024-35929,0,0,7da540c66ffc823238b17395ecbf47d1012e0cd64e229ac26e5cc7bd9ae7f5a8,2024-12-30T19:56:30.927000
|
||||||
CVE-2024-3593,0,0,7dfe1a06ca99b709e0966f80e5fa7243762a8725a5825da6ebc20a944f2ce167,2024-11-21T09:29:56.757000
|
CVE-2024-3593,0,0,7dfe1a06ca99b709e0966f80e5fa7243762a8725a5825da6ebc20a944f2ce167,2024-11-21T09:29:56.757000
|
||||||
@ -262772,7 +262772,7 @@ CVE-2024-36284,0,0,5dd896a891af07144a56a3845fc97f090935104348eba8ca7b12ce82fc1d0
|
|||||||
CVE-2024-36285,0,0,0c7823d3ace3df8d9b320bdafb5965f47e49d2f414a435615a3b8f24fcb2140d,2025-02-12T22:15:34.737000
|
CVE-2024-36285,0,0,0c7823d3ace3df8d9b320bdafb5965f47e49d2f414a435615a3b8f24fcb2140d,2025-02-12T22:15:34.737000
|
||||||
CVE-2024-36286,0,0,bac102403e45fda8132277c6a8c936743611fe7ec3db2c756aa2121a9f9c29ed,2025-01-07T17:08:25.580000
|
CVE-2024-36286,0,0,bac102403e45fda8132277c6a8c936743611fe7ec3db2c756aa2121a9f9c29ed,2025-01-07T17:08:25.580000
|
||||||
CVE-2024-36287,0,0,454ffb39c6631203600464ecb505365d9728982dd5fbfd6048bea7e40482bfdb,2024-11-21T09:21:59.527000
|
CVE-2024-36287,0,0,454ffb39c6631203600464ecb505365d9728982dd5fbfd6048bea7e40482bfdb,2024-11-21T09:21:59.527000
|
||||||
CVE-2024-36288,0,0,541c28d0151ea2628599b96895a2d3701ce11da4847adc16a1712449dea92513,2024-11-21T09:21:59.667000
|
CVE-2024-36288,0,1,a0ee5542c758804cbffdc4002529af43c77173dfd3e792ed953d25f7e566e12b,2025-06-19T13:15:40.433000
|
||||||
CVE-2024-36289,0,0,9a4e2e8c22c877a7229e5ef67cd4e3937f178f5664cb9107f76a5fa80df78b1a,2024-11-21T09:21:59.813000
|
CVE-2024-36289,0,0,9a4e2e8c22c877a7229e5ef67cd4e3937f178f5664cb9107f76a5fa80df78b1a,2024-11-21T09:21:59.813000
|
||||||
CVE-2024-3629,0,0,95cbbd26104b7fd2dcbc50917364d61467d72e4899fadcb6f1fb0df19afa4d01,2025-05-15T14:16:37.597000
|
CVE-2024-3629,0,0,95cbbd26104b7fd2dcbc50917364d61467d72e4899fadcb6f1fb0df19afa4d01,2025-05-15T14:16:37.597000
|
||||||
CVE-2024-36290,0,0,8298f0d1642987ec9c63c5254514e0267d57f00f7a058acac2c0e8b01a55797a,2025-01-14T16:15:29.473000
|
CVE-2024-36290,0,0,8298f0d1642987ec9c63c5254514e0267d57f00f7a058acac2c0e8b01a55797a,2025-01-14T16:15:29.473000
|
||||||
@ -268736,7 +268736,7 @@ CVE-2024-43831,0,0,a9268ace7dacd553d87b45d213b555879d8348eca66f21b44f2f371c23948
|
|||||||
CVE-2024-43832,0,0,15442ca051ab0155fadf84dac6604a0024bcf8cf7f43b8779d15dbd2c77cba17,2024-08-19T12:59:59.177000
|
CVE-2024-43832,0,0,15442ca051ab0155fadf84dac6604a0024bcf8cf7f43b8779d15dbd2c77cba17,2024-08-19T12:59:59.177000
|
||||||
CVE-2024-43833,0,0,5b7f17e91a1832d7c0ad5164e31831087a6aefdb4e7b61c82a3de3880edd76b6,2024-08-22T15:42:46.827000
|
CVE-2024-43833,0,0,5b7f17e91a1832d7c0ad5164e31831087a6aefdb4e7b61c82a3de3880edd76b6,2024-08-22T15:42:46.827000
|
||||||
CVE-2024-43834,0,0,d5ef14ae2ffbc2e7669580090c9ce16cedbf19f89cc0924be7d59abe1e2c67e4,2024-10-30T21:44:22.570000
|
CVE-2024-43834,0,0,d5ef14ae2ffbc2e7669580090c9ce16cedbf19f89cc0924be7d59abe1e2c67e4,2024-10-30T21:44:22.570000
|
||||||
CVE-2024-43835,0,0,17d4ad438e6c0e07f367b83ab4f112b8b31ecaf65e811c3d1f0396f55c988acd,2024-10-30T21:45:17.447000
|
CVE-2024-43835,0,1,a3ab222d1a491144a0334a9ba805b7c1b4da5dc6c44257c2955c0e7c78fa171d,2025-06-19T13:15:41.177000
|
||||||
CVE-2024-43836,0,0,f4c655bb2f56247f5d81fd742c3fcdd23416972e391d432e6e172ae5a57cc892,2024-08-22T15:43:26.303000
|
CVE-2024-43836,0,0,f4c655bb2f56247f5d81fd742c3fcdd23416972e391d432e6e172ae5a57cc892,2024-08-22T15:43:26.303000
|
||||||
CVE-2024-43837,0,0,1226778b7252461769175d745fa085c5a9c87889904d99a3bba5d59789b343af,2024-08-22T15:44:03.417000
|
CVE-2024-43837,0,0,1226778b7252461769175d745fa085c5a9c87889904d99a3bba5d59789b343af,2024-08-22T15:44:03.417000
|
||||||
CVE-2024-43838,0,0,a5d4b7b522d8e67215b6ea2369694b147dcc49e3947e9b76857a7ed426025c6a,2024-10-29T16:24:43.273000
|
CVE-2024-43838,0,0,a5d4b7b522d8e67215b6ea2369694b147dcc49e3947e9b76857a7ed426025c6a,2024-10-29T16:24:43.273000
|
||||||
@ -268747,7 +268747,7 @@ CVE-2024-43841,0,0,38746749d86e4f534fafdf8b478fa91ff1f5e1f65eb119200a1d6855c1feb
|
|||||||
CVE-2024-43842,0,0,15812ad8d85131679f82ea4663681c7db021618aa78b78cc9c9aed3923db1d1f,2024-09-30T13:55:17.007000
|
CVE-2024-43842,0,0,15812ad8d85131679f82ea4663681c7db021618aa78b78cc9c9aed3923db1d1f,2024-09-30T13:55:17.007000
|
||||||
CVE-2024-43843,0,0,7e3bdccf9d6054cb61c364d96f8741fe73ef63f682003f6ac63ebd930248bda3,2024-10-29T16:29:16.960000
|
CVE-2024-43843,0,0,7e3bdccf9d6054cb61c364d96f8741fe73ef63f682003f6ac63ebd930248bda3,2024-10-29T16:29:16.960000
|
||||||
CVE-2024-43844,0,0,892289f8fc772f3f240038fccb3ec1dc83964292e0a1f838b372b21b4d76a86c,2024-10-25T19:49:05.987000
|
CVE-2024-43844,0,0,892289f8fc772f3f240038fccb3ec1dc83964292e0a1f838b372b21b4d76a86c,2024-10-25T19:49:05.987000
|
||||||
CVE-2024-43845,0,0,810795145e82eb68ffbc0419ad50aca3821f0f6e9fb71f2860dedbc9b07a06e2,2024-10-25T19:51:07.187000
|
CVE-2024-43845,0,1,941ae2382b20e0b42cbe2b8c7f4cf75ea6c953719811a855165bdbb72eafa916,2025-06-19T13:15:41.423000
|
||||||
CVE-2024-43846,0,0,00546e8b7d32618825c1193130d999ce23114d449f5814665fe713817c3f3225,2024-10-25T19:52:01.380000
|
CVE-2024-43846,0,0,00546e8b7d32618825c1193130d999ce23114d449f5814665fe713817c3f3225,2024-10-25T19:52:01.380000
|
||||||
CVE-2024-43847,0,0,40ae3f5c22580f8696b31462f52ae00e272df092f77c73d18c35f4e6f355f13a,2024-10-25T19:55:53.963000
|
CVE-2024-43847,0,0,40ae3f5c22580f8696b31462f52ae00e272df092f77c73d18c35f4e6f355f13a,2024-10-25T19:55:53.963000
|
||||||
CVE-2024-43848,0,0,afa9f7a71028fa60eedc9a3a10bbe895ac3ef406bc4b18f0f8a8865a6f95d3fd,2024-10-25T13:57:51.800000
|
CVE-2024-43848,0,0,afa9f7a71028fa60eedc9a3a10bbe895ac3ef406bc4b18f0f8a8865a6f95d3fd,2024-10-25T13:57:51.800000
|
||||||
@ -268820,7 +268820,7 @@ CVE-2024-43908,0,0,53a4829da8a8a1ad7fa0dc717c980975a2bb5c37e29b8800bdfbda1733423
|
|||||||
CVE-2024-43909,0,0,ad74e5431cfb800574a2dd7e0ced34f90848e63e0bbff2558cec0eed3e55119c,2024-08-27T13:41:48.467000
|
CVE-2024-43909,0,0,ad74e5431cfb800574a2dd7e0ced34f90848e63e0bbff2558cec0eed3e55119c,2024-08-27T13:41:48.467000
|
||||||
CVE-2024-4391,0,0,4aa68eb768a7600ba1d511ef94f64977ab4a9f3debf9ac676e99a8182061a2de,2025-01-07T18:09:14.470000
|
CVE-2024-4391,0,0,4aa68eb768a7600ba1d511ef94f64977ab4a9f3debf9ac676e99a8182061a2de,2025-01-07T18:09:14.470000
|
||||||
CVE-2024-43910,0,0,f09792e52923a702137c77836c509e81bd123178796b2db869e8028c46dbd737,2024-09-05T18:30:23.437000
|
CVE-2024-43910,0,0,f09792e52923a702137c77836c509e81bd123178796b2db869e8028c46dbd737,2024-09-05T18:30:23.437000
|
||||||
CVE-2024-43911,0,0,20c6e5eef3dcc934fa499bebf9dc436656bf40bb76e7e9eefe4334ad2b410795,2024-11-08T16:15:22.483000
|
CVE-2024-43911,0,1,4eb7a4e6677e826bd73aded02e92c831525c000672ce55845ac938b5cd7b66e1,2025-06-19T13:15:41.600000
|
||||||
CVE-2024-43912,0,0,b045133d294e4fa9817b7cc6e1963575a481178f8d5aa121f3202846d1b4ef09,2024-09-05T18:19:17.067000
|
CVE-2024-43912,0,0,b045133d294e4fa9817b7cc6e1963575a481178f8d5aa121f3202846d1b4ef09,2024-09-05T18:19:17.067000
|
||||||
CVE-2024-43913,0,0,c1c655bf98a245b739b6bae86ffd25e2929e2c6be651f6c884a5a07e5e42c724,2024-12-09T13:10:03.003000
|
CVE-2024-43913,0,0,c1c655bf98a245b739b6bae86ffd25e2929e2c6be651f6c884a5a07e5e42c724,2024-12-09T13:10:03.003000
|
||||||
CVE-2024-43914,0,0,2295c4b85c720f6aa521d0d441f8fa3541ee5bbad0e5cc835a8e46f08f8be0dd,2024-09-05T18:03:49.997000
|
CVE-2024-43914,0,0,2295c4b85c720f6aa521d0d441f8fa3541ee5bbad0e5cc835a8e46f08f8be0dd,2024-09-05T18:03:49.997000
|
||||||
@ -269525,7 +269525,7 @@ CVE-2024-45021,0,0,b5c8b3592be5699bf0881de00fd5b0362eb80914279b4a5a7d96fef6a9675
|
|||||||
CVE-2024-45022,0,0,2cea89592199656ec921a3999b1ae285f1db04da7aaf687ce93a2d7242a86506,2024-09-13T16:36:39.043000
|
CVE-2024-45022,0,0,2cea89592199656ec921a3999b1ae285f1db04da7aaf687ce93a2d7242a86506,2024-09-13T16:36:39.043000
|
||||||
CVE-2024-45023,0,0,f8e0a62a83abee054b0294c32d7a5d15b03d0cc79f4e4a9ba7f0506ba34b6cb4,2024-09-13T16:30:30.427000
|
CVE-2024-45023,0,0,f8e0a62a83abee054b0294c32d7a5d15b03d0cc79f4e4a9ba7f0506ba34b6cb4,2024-09-13T16:30:30.427000
|
||||||
CVE-2024-45024,0,0,4feaf532db5af8cbee0e911fe09f5676ea54d7e53f7e82578a612b5e947edf46,2024-09-13T16:30:17.277000
|
CVE-2024-45024,0,0,4feaf532db5af8cbee0e911fe09f5676ea54d7e53f7e82578a612b5e947edf46,2024-09-13T16:30:17.277000
|
||||||
CVE-2024-45025,0,0,82bf2dd1a34d026e724fa95c00010b27da8e9db54efc3c612f5fd522e3fbb6ee,2024-09-13T16:30:07.073000
|
CVE-2024-45025,0,1,11a7bef58ec6b5de820b57899e3f37f7b83c47bf237cd7afdb64fcb34cb11053,2025-06-19T13:15:41.733000
|
||||||
CVE-2024-45026,0,0,89a8af0ac58952e722e5a53de5f494d1f681def0babb2de65d80753f6e55d193,2024-09-13T16:29:55.927000
|
CVE-2024-45026,0,0,89a8af0ac58952e722e5a53de5f494d1f681def0babb2de65d80753f6e55d193,2024-09-13T16:29:55.927000
|
||||||
CVE-2024-45027,0,0,906b9ad56781558d74178ff20f312e7339b089bddb5d18b11ef9c6d75d05a75a,2025-05-09T08:15:18.677000
|
CVE-2024-45027,0,0,906b9ad56781558d74178ff20f312e7339b089bddb5d18b11ef9c6d75d05a75a,2025-05-09T08:15:18.677000
|
||||||
CVE-2024-45028,0,0,af25595a666e3b491983ae69084787c84baeb2d3f88bb766b24cec6d0cfb83a7,2024-09-13T16:29:35.877000
|
CVE-2024-45028,0,0,af25595a666e3b491983ae69084787c84baeb2d3f88bb766b24cec6d0cfb83a7,2024-09-13T16:29:35.877000
|
||||||
@ -270653,7 +270653,7 @@ CVE-2024-46697,0,0,9943cf76deb7cd05c4635bc9d12865f4ae0e9cc1d23e6f8d61c4587524e0e
|
|||||||
CVE-2024-46698,0,0,be3a5928ad47004b2d560db3d5df5b16cf4a67d11c1a9ecc79fc9d1af2a3eb53,2024-09-13T16:53:03
|
CVE-2024-46698,0,0,be3a5928ad47004b2d560db3d5df5b16cf4a67d11c1a9ecc79fc9d1af2a3eb53,2024-09-13T16:53:03
|
||||||
CVE-2024-46699,0,0,b9f4243f64b3f749473025d5fece9ff74365febeb983013139a1c61713f6b89a,2024-09-13T16:53:10.620000
|
CVE-2024-46699,0,0,b9f4243f64b3f749473025d5fece9ff74365febeb983013139a1c61713f6b89a,2024-09-13T16:53:10.620000
|
||||||
CVE-2024-4670,0,0,20450840160cca1402ceff3ad240b158e7c98a105624c4f901b79d8d80b04786,2024-11-21T09:43:20.563000
|
CVE-2024-4670,0,0,20450840160cca1402ceff3ad240b158e7c98a105624c4f901b79d8d80b04786,2024-11-21T09:43:20.563000
|
||||||
CVE-2024-46700,0,0,e84a19e373bea6f4b5f480dbabfb831a1a103804c7338e48fa857b09d105f966,2024-09-13T16:53:25.383000
|
CVE-2024-46700,0,1,5cd93665de0e92a00c1210698436ce01c25104437e47fddb0ff4efc3fce44c0b,2025-06-19T13:15:42.090000
|
||||||
CVE-2024-46701,0,0,e529b0621330ae5ac1d4b33df08f71883ab0b3900295daf37d0dfe30c681ef31,2024-09-19T13:40:27.817000
|
CVE-2024-46701,0,0,e529b0621330ae5ac1d4b33df08f71883ab0b3900295daf37d0dfe30c681ef31,2024-09-19T13:40:27.817000
|
||||||
CVE-2024-46702,0,0,f5b7fc9bcaeb54226afdebb2f9f120b5650bb150fd7460409201dbd777ad9b41,2024-09-19T13:35:58.637000
|
CVE-2024-46702,0,0,f5b7fc9bcaeb54226afdebb2f9f120b5650bb150fd7460409201dbd777ad9b41,2024-09-19T13:35:58.637000
|
||||||
CVE-2024-46703,0,0,d926face52ba1a18b356030e2a43e186ee85e58145f49e8ade11cb932899dc19,2024-09-19T13:33:57.563000
|
CVE-2024-46703,0,0,d926face52ba1a18b356030e2a43e186ee85e58145f49e8ade11cb932899dc19,2024-09-19T13:33:57.563000
|
||||||
@ -270820,7 +270820,7 @@ CVE-2024-46849,0,0,55f5b24a78843dcc8538314aaf7fc9612b26c57281c0bbf2f4b0fed08fece
|
|||||||
CVE-2024-4685,0,0,dcc1995af2e9fd1e34a2f9668e5bc3a683e3cfc7906d3660a8b9bcf75f88030b,2025-02-19T18:38:59.740000
|
CVE-2024-4685,0,0,dcc1995af2e9fd1e34a2f9668e5bc3a683e3cfc7906d3660a8b9bcf75f88030b,2025-02-19T18:38:59.740000
|
||||||
CVE-2024-46850,0,0,41be926e86dd8c952ae96807dd33a02f26b5880c97e6286fb0ffb5c599a187f6,2024-10-04T15:30:32.110000
|
CVE-2024-46850,0,0,41be926e86dd8c952ae96807dd33a02f26b5880c97e6286fb0ffb5c599a187f6,2024-10-04T15:30:32.110000
|
||||||
CVE-2024-46851,0,0,b0993c3439c6fdf7de7e13034429b55167ffbe1f88b2ed8118656fa5260e8c01,2024-10-04T16:00:43.913000
|
CVE-2024-46851,0,0,b0993c3439c6fdf7de7e13034429b55167ffbe1f88b2ed8118656fa5260e8c01,2024-10-04T16:00:43.913000
|
||||||
CVE-2024-46852,0,0,003d8c5018acc2552d5923c9de7e22b4a29a76d4fa35d602e9c8fec3066d1da3,2024-10-17T14:15:07.887000
|
CVE-2024-46852,0,1,1e4dd009dbc248ae2fc9217a7cec4442d7b40b3f6c50166be19bd07dd05305a9,2025-06-19T13:15:46.410000
|
||||||
CVE-2024-46853,0,0,7013163bb0b0de8fcc4deccdec036fc108843e6740181da643a0cc828a7da7b8,2024-11-08T16:15:23.727000
|
CVE-2024-46853,0,0,7013163bb0b0de8fcc4deccdec036fc108843e6740181da643a0cc828a7da7b8,2024-11-08T16:15:23.727000
|
||||||
CVE-2024-46854,0,0,d2b8ace374763a38df18b61a469d196e1746b4597f0027e5c9c667cf2f8fd171,2024-11-08T16:15:23.857000
|
CVE-2024-46854,0,0,d2b8ace374763a38df18b61a469d196e1746b4597f0027e5c9c667cf2f8fd171,2024-11-08T16:15:23.857000
|
||||||
CVE-2024-46855,0,0,46b0faa9ce85540614181cf4962008995b9781bd009434c91e4d733a9654cd2a,2024-10-17T14:15:12.790000
|
CVE-2024-46855,0,0,46b0faa9ce85540614181cf4962008995b9781bd009434c91e4d733a9654cd2a,2024-10-17T14:15:12.790000
|
||||||
@ -277898,7 +277898,7 @@ CVE-2024-56690,0,0,2a72c8e6571a5a1d0298311d84636f71e3ae4d29693e80187270d779ac92c
|
|||||||
CVE-2024-56691,0,0,62c59d5d1a3d371802a9cee1fb0752a9e914735965be638d034aafb90a06960b,2024-12-28T10:15:14.027000
|
CVE-2024-56691,0,0,62c59d5d1a3d371802a9cee1fb0752a9e914735965be638d034aafb90a06960b,2024-12-28T10:15:14.027000
|
||||||
CVE-2024-56692,0,0,ace0c927c4a341e1aaf5f28ce5750c7447fae74ffcb794dd6309f417fa7701eb,2025-01-16T16:20:06.443000
|
CVE-2024-56692,0,0,ace0c927c4a341e1aaf5f28ce5750c7447fae74ffcb794dd6309f417fa7701eb,2025-01-16T16:20:06.443000
|
||||||
CVE-2024-56693,0,0,7478b55a09e156ef8c901ca8f31c798307144b33b79f35a2ee3a5c9550234da1,2025-03-24T17:31:47.693000
|
CVE-2024-56693,0,0,7478b55a09e156ef8c901ca8f31c798307144b33b79f35a2ee3a5c9550234da1,2025-03-24T17:31:47.693000
|
||||||
CVE-2024-56694,0,0,e02696a2af0f8832f551be07eb9f65e5e2b65973a286b33cb8ac8725e89835c5,2025-01-09T16:16:23.053000
|
CVE-2024-56694,0,1,764a1446a74f39b10c094959361057a2a30bd4f79d97f5a2db26ea7e59ebbb24,2025-06-19T13:15:46.560000
|
||||||
CVE-2024-56695,0,0,8a4eb8360428ebf490447f80ec720c69eb5c05aa8c8254981044c72c87974385,2025-03-05T18:53:08.307000
|
CVE-2024-56695,0,0,8a4eb8360428ebf490447f80ec720c69eb5c05aa8c8254981044c72c87974385,2025-03-05T18:53:08.307000
|
||||||
CVE-2024-56696,0,0,e7ff58f277f582521235fb4a39dccc778e70841711b02192c9e97fdaa9f8f3ce,2025-01-08T16:45:40.197000
|
CVE-2024-56696,0,0,e7ff58f277f582521235fb4a39dccc778e70841711b02192c9e97fdaa9f8f3ce,2025-01-08T16:45:40.197000
|
||||||
CVE-2024-56697,0,0,415312cd2de09e121d8f6863f3f85137f2ef58c344d43a9b863b32cfd98dbc09,2025-01-08T16:45:54.327000
|
CVE-2024-56697,0,0,415312cd2de09e121d8f6863f3f85137f2ef58c344d43a9b863b32cfd98dbc09,2025-01-08T16:45:54.327000
|
||||||
@ -277997,7 +277997,7 @@ CVE-2024-56782,0,0,8ea8c1c6076121ccd6387cd73e62b29831bb97f162a193d72c4089bf509d6
|
|||||||
CVE-2024-56783,0,0,ce83b6478d153aecb85bd2ed51b7393f53075c8b501633f17784c3734829a62e,2025-01-09T21:24:41.370000
|
CVE-2024-56783,0,0,ce83b6478d153aecb85bd2ed51b7393f53075c8b501633f17784c3734829a62e,2025-01-09T21:24:41.370000
|
||||||
CVE-2024-56784,0,0,246e46b18d01297182b84d0eeedb7f89be5b067468d07e5fbcd2a4701c7c5b7f,2025-01-09T21:25:55.693000
|
CVE-2024-56784,0,0,246e46b18d01297182b84d0eeedb7f89be5b067468d07e5fbcd2a4701c7c5b7f,2025-01-09T21:25:55.693000
|
||||||
CVE-2024-56785,0,0,8f5cb98439d0416d3248c986cf648022357f0a09f9da0115702bc78871254399,2025-01-09T21:27:27.500000
|
CVE-2024-56785,0,0,8f5cb98439d0416d3248c986cf648022357f0a09f9da0115702bc78871254399,2025-01-09T21:27:27.500000
|
||||||
CVE-2024-56786,0,0,d15fb5f18546ad84fcc90f2cc5c493347ea3340e9c8d85864a525b65944a02bb,2025-02-11T16:15:48.100000
|
CVE-2024-56786,0,1,c21d19ad26e7ba1031a72a0771e370f32d3d1c09901f144809bfb60669526b81,2025-06-19T13:15:46.830000
|
||||||
CVE-2024-56787,0,0,77f49900ebe1e38ab8e44c5b5372eb9d15671b545bb90d2215966dec4b8fe2e1,2025-01-09T21:28:12.873000
|
CVE-2024-56787,0,0,77f49900ebe1e38ab8e44c5b5372eb9d15671b545bb90d2215966dec4b8fe2e1,2025-01-09T21:28:12.873000
|
||||||
CVE-2024-56788,0,0,51dd43caa6c390f7c49e9d88b01231376fef9ee874b8f580ebd095d6eb630ba3,2025-01-11T13:15:29.090000
|
CVE-2024-56788,0,0,51dd43caa6c390f7c49e9d88b01231376fef9ee874b8f580ebd095d6eb630ba3,2025-01-11T13:15:29.090000
|
||||||
CVE-2024-5679,0,0,dc654eef86d673e662acc6dfc1ecb27b2f541880d76227d1d93861f825adc641,2024-11-21T09:48:08.710000
|
CVE-2024-5679,0,0,dc654eef86d673e662acc6dfc1ecb27b2f541880d76227d1d93861f825adc641,2024-11-21T09:48:08.710000
|
||||||
@ -278575,7 +278575,7 @@ CVE-2024-57917,0,0,b1167e5c425222d1e86557f7fbfade37e2c05b542cac17d0614dacc0faf5f
|
|||||||
CVE-2024-57918,0,0,51a0ae7790d69294b939f21a09ba710f5e4fba529bc7fb169229a8b80c38f093,2025-01-19T12:15:25.960000
|
CVE-2024-57918,0,0,51a0ae7790d69294b939f21a09ba710f5e4fba529bc7fb169229a8b80c38f093,2025-01-19T12:15:25.960000
|
||||||
CVE-2024-57919,0,0,e1738bf3dfca2fdef7365aa48f1ce4c0aa5de667cd9d2a7db2f45a4ee2b8b3c7,2025-02-18T13:38:22.377000
|
CVE-2024-57919,0,0,e1738bf3dfca2fdef7365aa48f1ce4c0aa5de667cd9d2a7db2f45a4ee2b8b3c7,2025-02-18T13:38:22.377000
|
||||||
CVE-2024-5792,0,0,50e11f463088247110774be144fbfaca02cb5ac823192aaf13a748fe05bdb47b,2024-11-21T09:48:20.570000
|
CVE-2024-5792,0,0,50e11f463088247110774be144fbfaca02cb5ac823192aaf13a748fe05bdb47b,2024-11-21T09:48:20.570000
|
||||||
CVE-2024-57920,0,0,05c144fc213deb035ca56e5f20c83d1cd18bb751206c0c2a6034a93879334dc6,2025-01-19T12:15:26.150000
|
CVE-2024-57920,0,1,e886d01100cb89cc10688a55d9ec23c065bd36f5b0221320d880948827c50067,2025-06-19T13:15:50.980000
|
||||||
CVE-2024-57921,0,0,c7302d486dbfb4c3bec63ccb147bf84370f9dbf24a7b88cf2b3ffd88950eddd1,2025-01-19T12:15:26.247000
|
CVE-2024-57921,0,0,c7302d486dbfb4c3bec63ccb147bf84370f9dbf24a7b88cf2b3ffd88950eddd1,2025-01-19T12:15:26.247000
|
||||||
CVE-2024-57922,0,0,bf2dd1432a9e3e667536a17647221b1e6b2f7d234607dcec972738ef61d4c750,2025-02-27T21:59:28.277000
|
CVE-2024-57922,0,0,bf2dd1432a9e3e667536a17647221b1e6b2f7d234607dcec972738ef61d4c750,2025-02-27T21:59:28.277000
|
||||||
CVE-2024-57923,0,0,8d53fe837f5375f53275d78002c8e62a8004542cf9a9d70aff773f09fd6c7f44,2025-01-19T12:15:26.433000
|
CVE-2024-57923,0,0,8d53fe837f5375f53275d78002c8e62a8004542cf9a9d70aff773f09fd6c7f44,2025-01-19T12:15:26.433000
|
||||||
@ -278728,7 +278728,7 @@ CVE-2024-58073,0,0,eb683fa11db3d5ae68d3f6675819692177d4c529e62bda8352837736a5636
|
|||||||
CVE-2024-58074,0,0,c2882c9b1642af94a6966e94b4db4f1dbe7d1e9afcf383c98c1b880460b03666,2025-03-06T16:15:53.943000
|
CVE-2024-58074,0,0,c2882c9b1642af94a6966e94b4db4f1dbe7d1e9afcf383c98c1b880460b03666,2025-03-06T16:15:53.943000
|
||||||
CVE-2024-58075,0,0,02ccfba812ec5be3736e2c44edd77c2858713f9c995acf80239dbfbabb0b0926,2025-03-06T16:15:54.040000
|
CVE-2024-58075,0,0,02ccfba812ec5be3736e2c44edd77c2858713f9c995acf80239dbfbabb0b0926,2025-03-06T16:15:54.040000
|
||||||
CVE-2024-58076,0,0,cf8e0406b76ea78c0bb3d3987fee0579e4d2ec1271af278be4a1756c465a16d3,2025-03-25T14:26:52.030000
|
CVE-2024-58076,0,0,cf8e0406b76ea78c0bb3d3987fee0579e4d2ec1271af278be4a1756c465a16d3,2025-03-25T14:26:52.030000
|
||||||
CVE-2024-58077,0,0,f3ec17f492afe830e4bdffec9ee6935e46e28e5e78af48de044da0a78231897b,2025-03-06T17:15:21.123000
|
CVE-2024-58077,0,1,634b774378af6bfd507980cd75c7187075e4d23fb39461364c64277eca54e758,2025-06-19T13:15:51.193000
|
||||||
CVE-2024-58078,0,0,e508ee0d2ac67ad04e2896e307afebb7f13e51e73a51a69c9294be9999e510ad,2025-03-06T17:15:21.250000
|
CVE-2024-58078,0,0,e508ee0d2ac67ad04e2896e307afebb7f13e51e73a51a69c9294be9999e510ad,2025-03-06T17:15:21.250000
|
||||||
CVE-2024-58079,0,0,7fd5cc7589f5af5f8bbeac5e0840eb8db1d8a12c0b4e2caca3cc52286bddc2f2,2025-03-13T13:15:46.133000
|
CVE-2024-58079,0,0,7fd5cc7589f5af5f8bbeac5e0840eb8db1d8a12c0b4e2caca3cc52286bddc2f2,2025-03-13T13:15:46.133000
|
||||||
CVE-2024-5808,0,0,1d3ef99a05770383f75119606dd44066da1dce0bb204c0f99ad9e2a7f5bac72e,2025-05-28T00:49:06.347000
|
CVE-2024-5808,0,0,1d3ef99a05770383f75119606dd44066da1dce0bb204c0f99ad9e2a7f5bac72e,2025-05-28T00:49:06.347000
|
||||||
@ -292370,7 +292370,7 @@ CVE-2025-31694,0,0,ca7b6a12f88250e41157726afe1e54fba9ef36ba52e8894f4db4aa7871bd1
|
|||||||
CVE-2025-31695,0,0,044b0f435e7672f738ea051c11db83a00ebaff63dbdb68e706b7dcc13acb90b6,2025-04-29T16:15:34.097000
|
CVE-2025-31695,0,0,044b0f435e7672f738ea051c11db83a00ebaff63dbdb68e706b7dcc13acb90b6,2025-04-29T16:15:34.097000
|
||||||
CVE-2025-31696,0,0,7181c70430e7f11f94551e571b933443a77c74627eab2d3af9d5a2722d8bbb8e,2025-04-29T16:15:34.243000
|
CVE-2025-31696,0,0,7181c70430e7f11f94551e571b933443a77c74627eab2d3af9d5a2722d8bbb8e,2025-04-29T16:15:34.243000
|
||||||
CVE-2025-31697,0,0,d2f6e5dae8beddd7adbc933b42660d8199d000a2c4970c75b74c3c6a7e4fd487,2025-04-29T16:15:34.633000
|
CVE-2025-31697,0,0,d2f6e5dae8beddd7adbc933b42660d8199d000a2c4970c75b74c3c6a7e4fd487,2025-04-29T16:15:34.633000
|
||||||
CVE-2025-31698,1,1,f718ce4b428d85a20357121dcf37ee9eeb16674413188ebde70d08c4880a8c67,2025-06-19T10:15:20.980000
|
CVE-2025-31698,0,0,f718ce4b428d85a20357121dcf37ee9eeb16674413188ebde70d08c4880a8c67,2025-06-19T10:15:20.980000
|
||||||
CVE-2025-3170,0,0,afb2bda5dd4e3285c33c62d49a05a12fd30d05e815744685a436b70b7583067d,2025-04-08T20:52:02.413000
|
CVE-2025-3170,0,0,afb2bda5dd4e3285c33c62d49a05a12fd30d05e815744685a436b70b7583067d,2025-04-08T20:52:02.413000
|
||||||
CVE-2025-3171,0,0,facd85de14a5feadcffd67276b1dd3aaa07eb8c0a878fc188d12f11d57d8217c,2025-04-08T20:43:42.857000
|
CVE-2025-3171,0,0,facd85de14a5feadcffd67276b1dd3aaa07eb8c0a878fc188d12f11d57d8217c,2025-04-08T20:43:42.857000
|
||||||
CVE-2025-31710,0,0,66b943a0cc10a097358c13445d1f5df7386c2942496f3871e72b75f2365fb784,2025-06-10T15:15:23.847000
|
CVE-2025-31710,0,0,66b943a0cc10a097358c13445d1f5df7386c2942496f3871e72b75f2365fb784,2025-06-10T15:15:23.847000
|
||||||
@ -293389,7 +293389,7 @@ CVE-2025-32888,0,0,851f5838ac3b9022b83107af55b659a3aafc0e2822e0c3d7c62be76cdae08
|
|||||||
CVE-2025-32889,0,0,c5001261168b52d1fcafa5e758115761d50fb6c85872f50dce10dea30446578f,2025-05-02T13:52:51.693000
|
CVE-2025-32889,0,0,c5001261168b52d1fcafa5e758115761d50fb6c85872f50dce10dea30446578f,2025-05-02T13:52:51.693000
|
||||||
CVE-2025-3289,0,0,2dce3ef8eb88e8d6d3c6bdcdd7b6d448658ce48e819de5faca8e16dde3fc5df6,2025-04-08T18:13:53.347000
|
CVE-2025-3289,0,0,2dce3ef8eb88e8d6d3c6bdcdd7b6d448658ce48e819de5faca8e16dde3fc5df6,2025-04-08T18:13:53.347000
|
||||||
CVE-2025-32890,0,0,14fe3680ce0a694763f118a1c4280330bb31bbe10888a63507689bf1688fafee,2025-05-02T13:52:51.693000
|
CVE-2025-32890,0,0,14fe3680ce0a694763f118a1c4280330bb31bbe10888a63507689bf1688fafee,2025-05-02T13:52:51.693000
|
||||||
CVE-2025-32896,1,1,123bfaa38d77f885beca14c3b532a15df50c8b0d4512516bf991c8228fea2dd7,2025-06-19T11:15:24.190000
|
CVE-2025-32896,0,0,123bfaa38d77f885beca14c3b532a15df50c8b0d4512516bf991c8228fea2dd7,2025-06-19T11:15:24.190000
|
||||||
CVE-2025-32906,0,0,ed269622d928bd2aa475c3656dbb221e908c6bab45b25018cc828ee7bd119edc,2025-06-17T12:15:24.950000
|
CVE-2025-32906,0,0,ed269622d928bd2aa475c3656dbb221e908c6bab45b25018cc828ee7bd119edc,2025-06-17T12:15:24.950000
|
||||||
CVE-2025-32907,0,0,213f7e42abba53cbe091599b6e08ac02e165cca9f4b70fa3a4b5acdea9942c00,2025-05-29T07:15:24.333000
|
CVE-2025-32907,0,0,213f7e42abba53cbe091599b6e08ac02e165cca9f4b70fa3a4b5acdea9942c00,2025-05-29T07:15:24.333000
|
||||||
CVE-2025-32908,0,0,d04d5cbb3961125d5a394946a9211c5953b759f1c35584196afe4caf2db9d0fd,2025-05-13T21:16:14.597000
|
CVE-2025-32908,0,0,d04d5cbb3961125d5a394946a9211c5953b759f1c35584196afe4caf2db9d0fd,2025-05-13T21:16:14.597000
|
||||||
@ -294291,7 +294291,7 @@ CVE-2025-38027,0,0,471ef0d7ca5d24c18ccb08a9eddf5cbddd30470e775a52cb01bc90f38e1ce
|
|||||||
CVE-2025-38028,0,0,0a7639190a1937774dbcb851869664e12bc334f75a4870acae02cc8069cfea0a,2025-06-18T13:46:52.973000
|
CVE-2025-38028,0,0,0a7639190a1937774dbcb851869664e12bc334f75a4870acae02cc8069cfea0a,2025-06-18T13:46:52.973000
|
||||||
CVE-2025-38029,0,0,92d383e3593af7bcce9265075a2e2f877017899966aa410dfe02a30304d4b909,2025-06-18T13:46:52.973000
|
CVE-2025-38029,0,0,92d383e3593af7bcce9265075a2e2f877017899966aa410dfe02a30304d4b909,2025-06-18T13:46:52.973000
|
||||||
CVE-2025-3803,0,0,01cac43cb81122f40562a95ea00e02849827ad730598145fa3ede5a68597810d,2025-04-21T14:23:45.950000
|
CVE-2025-3803,0,0,01cac43cb81122f40562a95ea00e02849827ad730598145fa3ede5a68597810d,2025-04-21T14:23:45.950000
|
||||||
CVE-2025-38030,0,0,b5c6734bf3184f8a087122a6320a8532fcbec5b22a14991ec096831ca4d5207c,2025-06-18T13:46:52.973000
|
CVE-2025-38030,0,1,da7acce03f957af6d724acad28c4a34123763b145ebfe015d98d4b36466d234c,2025-06-19T13:15:51.760000
|
||||||
CVE-2025-38031,0,0,486b5cbb4cd98022b686c86aee16cd270c1eb4dd11847090fa684f4f14929793,2025-06-18T13:46:52.973000
|
CVE-2025-38031,0,0,486b5cbb4cd98022b686c86aee16cd270c1eb4dd11847090fa684f4f14929793,2025-06-18T13:46:52.973000
|
||||||
CVE-2025-38032,0,0,e6efe23d93f2ffe49e4bc29b5d8bd527975896df0c10a6b76bd704bff3a8d41f,2025-06-18T13:46:52.973000
|
CVE-2025-38032,0,0,e6efe23d93f2ffe49e4bc29b5d8bd527975896df0c10a6b76bd704bff3a8d41f,2025-06-18T13:46:52.973000
|
||||||
CVE-2025-38033,0,0,22e8c97a0b2b90d6c86a7604c284682b993460d61d5c6c03c971671c669696d0,2025-06-18T13:46:52.973000
|
CVE-2025-38033,0,0,22e8c97a0b2b90d6c86a7604c284682b993460d61d5c6c03c971671c669696d0,2025-06-18T13:46:52.973000
|
||||||
@ -296586,6 +296586,7 @@ CVE-2025-4734,0,0,99bf1e4024c1482ea99fe0fd5315f4fee30ed05717e4831cdd0b865abb118a
|
|||||||
CVE-2025-4735,0,0,f96e4d2d2fb70e0f1c88cd9e2e0e0d4de95ba2f9e43dcc187f8debac18edd909,2025-05-28T14:26:46.997000
|
CVE-2025-4735,0,0,f96e4d2d2fb70e0f1c88cd9e2e0e0d4de95ba2f9e43dcc187f8debac18edd909,2025-05-28T14:26:46.997000
|
||||||
CVE-2025-4736,0,0,1dca037a7f0cbc80e91cfd83149841017fcad28a58750ed26439191bb836bb26,2025-05-27T19:50:59.997000
|
CVE-2025-4736,0,0,1dca037a7f0cbc80e91cfd83149841017fcad28a58750ed26439191bb836bb26,2025-05-27T19:50:59.997000
|
||||||
CVE-2025-4737,0,0,f9f82f092173f94badf92602e6f8f404f3e0568cce6afc358521e7171b0637d3,2025-05-16T14:43:26.160000
|
CVE-2025-4737,0,0,f9f82f092173f94badf92602e6f8f404f3e0568cce6afc358521e7171b0637d3,2025-05-16T14:43:26.160000
|
||||||
|
CVE-2025-4738,1,1,70bd8280163617c773ed1ba89ddd6b9864d828db42f4acaa431997cd5a5b43d1,2025-06-19T13:15:51.840000
|
||||||
CVE-2025-4739,0,0,cc2e318d2f840424b36b046688f8220e8357f337cbe30ff9f4e8c26b1723a285,2025-05-28T14:26:55.127000
|
CVE-2025-4739,0,0,cc2e318d2f840424b36b046688f8220e8357f337cbe30ff9f4e8c26b1723a285,2025-05-28T14:26:55.127000
|
||||||
CVE-2025-4740,0,0,6c6357004a26b75a6edf5c8b51b4eebaf151da15d33a0ac49a5219d302fb606d,2025-05-16T14:42:18.700000
|
CVE-2025-4740,0,0,6c6357004a26b75a6edf5c8b51b4eebaf151da15d33a0ac49a5219d302fb606d,2025-05-16T14:42:18.700000
|
||||||
CVE-2025-4741,0,0,ef8421e0cde45e475879357ff0c51cc359c029c130dc5d6beb431eec100b6596,2025-05-28T14:27:04.720000
|
CVE-2025-4741,0,0,ef8421e0cde45e475879357ff0c51cc359c029c130dc5d6beb431eec100b6596,2025-05-28T14:27:04.720000
|
||||||
@ -297773,7 +297774,7 @@ CVE-2025-4971,0,0,ec01b010a198b670732c969d73dfa53bbd76f2e075f866245cc573c6149820
|
|||||||
CVE-2025-49710,0,0,fdef6b70e5300806b4a42e9567df3fa6452819f84b853bd1194cd77188110e32,2025-06-16T16:40:48.453000
|
CVE-2025-49710,0,0,fdef6b70e5300806b4a42e9567df3fa6452819f84b853bd1194cd77188110e32,2025-06-16T16:40:48.453000
|
||||||
CVE-2025-4973,0,0,a09baa9620620eb012f5ddd6b5ca6dd7efd75fb0c8b55678f3f3e6206d444643,2025-06-12T16:06:20.180000
|
CVE-2025-4973,0,0,a09baa9620620eb012f5ddd6b5ca6dd7efd75fb0c8b55678f3f3e6206d444643,2025-06-12T16:06:20.180000
|
||||||
CVE-2025-4975,0,0,e6592341c2d044f9e5e990b69dac44d61e569344ba65d2de38b936ca41ba415e,2025-05-23T15:54:42.643000
|
CVE-2025-4975,0,0,e6592341c2d044f9e5e990b69dac44d61e569344ba65d2de38b936ca41ba415e,2025-05-23T15:54:42.643000
|
||||||
CVE-2025-49763,1,1,f2ccd03af066720719d6adaf3d9ebe904f6737d1d40001bdb18c48fb16111c52,2025-06-19T10:15:21.887000
|
CVE-2025-49763,0,0,f2ccd03af066720719d6adaf3d9ebe904f6737d1d40001bdb18c48fb16111c52,2025-06-19T10:15:21.887000
|
||||||
CVE-2025-4977,0,0,935be558c641a049de0d5b17bd3afe70e433fc81aba4e94570f5c7e91d239ae4,2025-06-12T16:22:28.493000
|
CVE-2025-4977,0,0,935be558c641a049de0d5b17bd3afe70e433fc81aba4e94570f5c7e91d239ae4,2025-06-12T16:22:28.493000
|
||||||
CVE-2025-4978,0,0,d687371ad5129a9bb5f335e51aa4bb2d4a1326e0f7b71156d03d5b7e69122f96,2025-06-12T16:22:12.217000
|
CVE-2025-4978,0,0,d687371ad5129a9bb5f335e51aa4bb2d4a1326e0f7b71156d03d5b7e69122f96,2025-06-12T16:22:12.217000
|
||||||
CVE-2025-49785,0,0,fd0fa622bbf29f7044dd85605545512ef46620979dc70d00d503421325e1d0a3,2025-06-11T03:15:22.123000
|
CVE-2025-49785,0,0,fd0fa622bbf29f7044dd85605545512ef46620979dc70d00d503421325e1d0a3,2025-06-11T03:15:22.123000
|
||||||
@ -297901,7 +297902,7 @@ CVE-2025-5065,0,0,8fc53b66fe42da4959811ef54b22b91af2bd35c9f4f954731cade0848a818f
|
|||||||
CVE-2025-5066,0,0,c2e1df9fe6cae5990ac135a3976d91b02429d110b23d2797a3b2dababf03dd2d,2025-05-29T15:50:51.310000
|
CVE-2025-5066,0,0,c2e1df9fe6cae5990ac135a3976d91b02429d110b23d2797a3b2dababf03dd2d,2025-05-29T15:50:51.310000
|
||||||
CVE-2025-5067,0,0,cf2723dbc4b2f797991ebafc1c2cb069497cee2d74a6a84ebec9dcde1e0dd29e,2025-05-29T15:50:43.240000
|
CVE-2025-5067,0,0,cf2723dbc4b2f797991ebafc1c2cb069497cee2d74a6a84ebec9dcde1e0dd29e,2025-05-29T15:50:43.240000
|
||||||
CVE-2025-5068,0,0,743f6f8e9f7972849bbf135b58a69c40f5a6f921a1bb6da952423dea4534ee5a,2025-06-05T14:11:10.430000
|
CVE-2025-5068,0,0,743f6f8e9f7972849bbf135b58a69c40f5a6f921a1bb6da952423dea4534ee5a,2025-06-05T14:11:10.430000
|
||||||
CVE-2025-5071,1,1,3b2deef9236f3c759cda3ca3d7c218b19b13648226fc3eecf9f17094b26eaf9e,2025-06-19T10:15:22.027000
|
CVE-2025-5071,0,0,3b2deef9236f3c759cda3ca3d7c218b19b13648226fc3eecf9f17094b26eaf9e,2025-06-19T10:15:22.027000
|
||||||
CVE-2025-5073,0,0,a1230535d583b5f466b5fe2615cca31afcba55333f600b324f190ec047a41d18,2025-06-05T20:13:49.707000
|
CVE-2025-5073,0,0,a1230535d583b5f466b5fe2615cca31afcba55333f600b324f190ec047a41d18,2025-06-05T20:13:49.707000
|
||||||
CVE-2025-5074,0,0,b32e6a163eb96eec8f69e51ca7a85c7da766b8b9d224e7b4f2f300a52a5b9bc3,2025-06-05T20:14:07.020000
|
CVE-2025-5074,0,0,b32e6a163eb96eec8f69e51ca7a85c7da766b8b9d224e7b4f2f300a52a5b9bc3,2025-06-05T20:14:07.020000
|
||||||
CVE-2025-5075,0,0,e2d063c837a04b124fb91d6969390128004202435ff9c54fbec941e95c405ada,2025-05-23T15:55:02.040000
|
CVE-2025-5075,0,0,e2d063c837a04b124fb91d6969390128004202435ff9c54fbec941e95c405ada,2025-05-23T15:55:02.040000
|
||||||
@ -298035,7 +298036,7 @@ CVE-2025-5230,0,0,9fadea541076e74f479fb5b5289a700110bb92230bc9a76add28f6c782b2ab
|
|||||||
CVE-2025-5231,0,0,933bca2cb9baedec07e689266f247371c054ab08b67bfc89de515eda8b6db129,2025-06-10T15:11:56.957000
|
CVE-2025-5231,0,0,933bca2cb9baedec07e689266f247371c054ab08b67bfc89de515eda8b6db129,2025-06-10T15:11:56.957000
|
||||||
CVE-2025-5232,0,0,1b45026e75247a7322427bb058f27ed5717a2e44e9ed2a15532ca07a8f6c71a6,2025-06-10T15:12:09.197000
|
CVE-2025-5232,0,0,1b45026e75247a7322427bb058f27ed5717a2e44e9ed2a15532ca07a8f6c71a6,2025-06-10T15:12:09.197000
|
||||||
CVE-2025-5233,0,0,6ecf1c2c649b0793b0fa703353d52d82c83e36cf0edf8150a0b10fa91cf5098a,2025-06-16T12:32:18.840000
|
CVE-2025-5233,0,0,6ecf1c2c649b0793b0fa703353d52d82c83e36cf0edf8150a0b10fa91cf5098a,2025-06-16T12:32:18.840000
|
||||||
CVE-2025-5234,1,1,a5f38e2a75e738bb7b3ede233cac90ad6712ee44816591b20f46ec0889585028,2025-06-19T10:15:22.250000
|
CVE-2025-5234,0,0,a5f38e2a75e738bb7b3ede233cac90ad6712ee44816591b20f46ec0889585028,2025-06-19T10:15:22.250000
|
||||||
CVE-2025-5235,0,0,9f99135aac66ddf72cbc0dbdd83c4db7648e86e689f203314291273a812d09e8,2025-06-04T18:29:21.090000
|
CVE-2025-5235,0,0,9f99135aac66ddf72cbc0dbdd83c4db7648e86e689f203314291273a812d09e8,2025-06-04T18:29:21.090000
|
||||||
CVE-2025-5236,0,0,21b3f9a42248749cfd7dac46ffac19b1b1d972c6879013b8f47a703a60b1c09a,2025-06-04T18:30:22.220000
|
CVE-2025-5236,0,0,21b3f9a42248749cfd7dac46ffac19b1b1d972c6879013b8f47a703a60b1c09a,2025-06-04T18:30:22.220000
|
||||||
CVE-2025-5237,0,0,9b708dfb250572e0ef36b1ce4d11e9c0580aaf815c8ffd6bf6c2ee5f802ff777,2025-06-18T13:46:52.973000
|
CVE-2025-5237,0,0,9b708dfb250572e0ef36b1ce4d11e9c0580aaf815c8ffd6bf6c2ee5f802ff777,2025-06-18T13:46:52.973000
|
||||||
@ -298587,6 +298588,7 @@ CVE-2025-6007,0,0,ad7217a46edf88f3122f03c09e2fdcfd31382468cbe1002c4a5de402899399
|
|||||||
CVE-2025-6008,0,0,cf45d1b8877307f98a5e962959db4dd8b70df84c99522375a10c3d04cde0826f,2025-06-19T01:26:01.867000
|
CVE-2025-6008,0,0,cf45d1b8877307f98a5e962959db4dd8b70df84c99522375a10c3d04cde0826f,2025-06-19T01:26:01.867000
|
||||||
CVE-2025-6009,0,0,78abb2d4f36e6029b865859c44e8b3b2ae426316eb8bf2e15ca3e33565c4ca16,2025-06-19T01:25:17.743000
|
CVE-2025-6009,0,0,78abb2d4f36e6029b865859c44e8b3b2ae426316eb8bf2e15ca3e33565c4ca16,2025-06-19T01:25:17.743000
|
||||||
CVE-2025-6012,0,0,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b45,2025-06-16T12:32:18.840000
|
CVE-2025-6012,0,0,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b45,2025-06-16T12:32:18.840000
|
||||||
|
CVE-2025-6019,1,1,04254b9397dd11cd6c3c371a0a809a11e95d3435e7861389ea1ee8b10ff74261,2025-06-19T12:15:19.727000
|
||||||
CVE-2025-6020,0,0,439a2d09f05868a64a6818f204c8af8c3741a1aa91da69dac7da1c6864b5ef72,2025-06-17T20:50:23.507000
|
CVE-2025-6020,0,0,439a2d09f05868a64a6818f204c8af8c3741a1aa91da69dac7da1c6864b5ef72,2025-06-17T20:50:23.507000
|
||||||
CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439c4,2025-06-12T16:06:20.180000
|
CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439c4,2025-06-12T16:06:20.180000
|
||||||
CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000
|
CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000
|
||||||
@ -298700,3 +298702,4 @@ CVE-2025-6199,0,0,8b74f0ab0d170aa7cc558f1e79481a7093394c0368bbc35b907707db4c26f5
|
|||||||
CVE-2025-6201,0,0,fae5d9a8c9dcb541916adb0b451bda886e1fe3141eb6c37705d42f0b95790d08,2025-06-19T03:15:26.017000
|
CVE-2025-6201,0,0,fae5d9a8c9dcb541916adb0b451bda886e1fe3141eb6c37705d42f0b95790d08,2025-06-19T03:15:26.017000
|
||||||
CVE-2025-6220,0,0,5f7d83b19f9a74deb42015750f7b5335a45a31dba8653fadb3cf8eaf78a671be,2025-06-18T13:47:40.833000
|
CVE-2025-6220,0,0,5f7d83b19f9a74deb42015750f7b5335a45a31dba8653fadb3cf8eaf78a671be,2025-06-18T13:47:40.833000
|
||||||
CVE-2025-6240,0,0,afdbdd4423b9b6d85b5822d8414b4fba12d402c8710eb5b02e519fcba3d4ca1c,2025-06-18T15:15:28.187000
|
CVE-2025-6240,0,0,afdbdd4423b9b6d85b5822d8414b4fba12d402c8710eb5b02e519fcba3d4ca1c,2025-06-18T15:15:28.187000
|
||||||
|
CVE-2025-6266,1,1,f88678c0ca6c6b4793348c364f2d4b51fa863b9a2b4f605e9b4cf59a8ae65084,2025-06-19T12:15:20.537000
|
||||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user