mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-06-19T14:00:19.951536+00:00
This commit is contained in:
parent
4c048c01e0
commit
c95081a347
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48849",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-07-16T13:15:12.103",
|
||||
"lastModified": "2024-11-21T07:34:12.480",
|
||||
"lastModified": "2025-06-19T13:15:21.690",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -91,13 +91,6 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fcd1d79aa943fff4fbaa0cce1d576995a7960699",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cb29021be49858059138f75d6311a7c35a9379b2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48935",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-22T04:15:16.877",
|
||||
"lastModified": "2024-08-23T01:45:31.280",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-19T13:15:21.983",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -105,13 +105,6 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/88c795491bf45a8c08a0f94c9ca4f13722e51013",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8ffb8ac3448845f65634889b051bd65e4dee484b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
@ -119,13 +112,6 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b05a24cc453e3cd51b0c79e3c583b5d495eba1d6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b4fcc081e527aa2ce12e956912fc47e251f6bd27",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48941",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-22T04:15:17.967",
|
||||
"lastModified": "2024-08-22T18:41:37.090",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-19T13:15:22.263",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -84,13 +84,6 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/05ae1f0fe9c6c5ead08b306e665763a352d20716",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2a3e61de89bab6696aa28b70030eb119968c5586",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-49152",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-26T07:00:52.440",
|
||||
"lastModified": "2025-03-13T21:58:23.127",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-19T13:15:22.587",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -105,40 +105,12 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1ac49c8fd49fdf53d3cd8b77eb8ffda08d7fbe22",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/29968329b926d238e3107ec071a250397555d264",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3e2852eda19ee1a400cd809d7a9322680f34a262",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3e3c658055c002900982513e289398a1aad4a488",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7521a97b1929042604bef6859f62fa8b4bbc077b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-49352",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-26T07:01:11.920",
|
||||
"lastModified": "2025-02-26T07:01:11.920",
|
||||
"lastModified": "2025-06-19T13:15:23.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -17,10 +17,6 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0ab308d72af7548f21e4499d025c25887da0c26a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1bcce88da60eccc946c0f4ed942b0f08cd565778",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-49412",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-26T07:01:17.703",
|
||||
"lastModified": "2025-03-24T19:52:31.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-19T13:15:23.390",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -105,13 +105,6 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7d172b9dc913e161d8ff88770eea01701ff553de",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8abc8763b11c35e03cc91d59fd0cd28d39f88ca9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
@ -119,13 +112,6 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/97be7d13fbd4001eeab49b1be6399f23a8c66160",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a16c65cca7d2c7ff965fdd3adc8df2156529caf1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-49418",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-26T07:01:18.260",
|
||||
"lastModified": "2025-02-26T07:01:18.260",
|
||||
"lastModified": "2025-06-19T13:15:23.660",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -24,10 +24,6 @@
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c3ed222745d9ad7b69299b349a64ba533c64a34f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/eb1fe9600b86c24a789046bfc5c6851dda119280",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-49558",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-02-26T07:01:31.597",
|
||||
"lastModified": "2025-02-26T07:01:31.597",
|
||||
"lastModified": "2025-06-19T13:15:23.990",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -37,10 +37,6 @@
|
||||
"url": "https://git.kernel.org/stable/c/b09e6ccf0d12f9356e8e3508d3e3dce126298538",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c73955a09408e7374d9abfd0e78ce3de9cda0635",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f9a43007d3f7ba76d5e7f9421094f00f2ef202f8",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52569",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-03-02T22:15:49.163",
|
||||
"lastModified": "2025-01-16T17:08:05.613",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-19T13:15:25.037",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -89,13 +89,6 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/39c4a9522db0072570d602e9b365119e17fb9f4f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d10fd53393cc5de4b9cf1a4b8f9984f0a037aa51",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52681",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-17T15:15:19.360",
|
||||
"lastModified": "2024-11-21T08:40:21.033",
|
||||
"lastModified": "2025-06-19T13:15:25.340",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -17,10 +17,6 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/48be1364dd387e375e1274b76af986cb8747be2c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/547713d502f7b4b8efccd409cff84d731a23853b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
@ -29,10 +25,6 @@
|
||||
"url": "https://git.kernel.org/stable/c/92be3095c6ca1cdc46237839c6087555be9160e3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ea6b597fcaca99562fa56a473bcbbbd79b40af03",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/48be1364dd387e375e1274b76af986cb8747be2c",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
|
@ -2,194 +2,15 @@
|
||||
"id": "CVE-2023-52733",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-21T16:15:13.380",
|
||||
"lastModified": "2025-04-02T14:51:20.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-19T13:15:25.540",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/decompressor: specify __decompress() buf len to avoid overflow\n\nHistorically calls to __decompress() didn't specify \"out_len\" parameter\non many architectures including s390, expecting that no writes beyond\nuncompressed kernel image are performed. This has changed since commit\n2aa14b1ab2c4 (\"zstd: import usptream v1.5.2\") which includes zstd library\ncommit 6a7ede3dfccb (\"Reduce size of dctx by reutilizing dst buffer\n(#2751)\"). Now zstd decompression code might store literal buffer in\nthe unwritten portion of the destination buffer. Since \"out_len\" is\nnot set, it is considered to be unlimited and hence free to use for\noptimization needs. On s390 this might corrupt initrd or ipl report\nwhich are often placed right after the decompressor buffer. Luckily the\nsize of uncompressed kernel image is already known to the decompressor,\nso to avoid the problem simply specify it in the \"out_len\" parameter."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: s390/decompressor: especifique __decompress() buf len para evitar el desbordamiento. Hist\u00f3ricamente, las llamadas a __decompress() no especificaban el par\u00e1metro \"out_len\" en muchas arquitecturas, incluido s390, esperando que no se escribieran m\u00e1s all\u00e1 Se realizan im\u00e1genes del kernel sin comprimir. Esto ha cambiado desde la confirmaci\u00f3n 2aa14b1ab2c4 (\"zstd: import usptream v1.5.2\") que incluye la confirmaci\u00f3n de la biblioteca zstd 6a7ede3dfccb (\"Reducir el tama\u00f1o de dctx reutilizando el b\u00fafer dst (#2751)\"). Ahora el c\u00f3digo de descompresi\u00f3n zstd podr\u00eda almacenar un b\u00fafer literal en la parte no escrita del b\u00fafer de destino. Dado que \"out_len\" no est\u00e1 configurado, se considera ilimitado y, por lo tanto, de uso gratuito para las necesidades de optimizaci\u00f3n. En s390, esto podr\u00eda da\u00f1ar el informe initrd o ipl que a menudo se coloca justo despu\u00e9s del buffer del descompresor. Afortunadamente, el descompresor ya conoce el tama\u00f1o de la imagen del kernel sin comprimir, por lo que para evitar el problema simplemente especif\u00edquelo en el par\u00e1metro \"out_len\"."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.4.232",
|
||||
"matchCriteriaId": "B50AC354-4651-4CDE-8EA9-58A9A917F725"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.169",
|
||||
"matchCriteriaId": "D8E6784B-A00F-47F0-882B-7209E1F374B7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.95",
|
||||
"matchCriteriaId": "8508F80E-8588-4976-A2BA-7A2D85018C4E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.13",
|
||||
"matchCriteriaId": "CE354BE6-0C0F-47EB-AD8A-1433F041AC20"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A127C155-689C-4F67-B146-44A57F4BFD85"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D34127CC-68F5-4703-A5F6-5006F803E4AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4AB8D555-648E-4F2F-98BD-3E7F45BD12A8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/16409f7d9ca5bb8220e1049ea9aae0d3c94d2dfb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/55dbd6f4ea954751340f4f73d5dcd7c8f12208b2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7ab41c2c08a32132ba8c14624910e2fe8ce4ba4b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9ed522143f959630f8b7782ddc212900d8f609a9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f1eb22d0ff064ad458b3b1a1eaa84ac3996206c2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/16409f7d9ca5bb8220e1049ea9aae0d3c94d2dfb",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/55dbd6f4ea954751340f4f73d5dcd7c8f12208b2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7ab41c2c08a32132ba8c14624910e2fe8ce4ba4b",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9ed522143f959630f8b7782ddc212900d8f609a9",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f1eb22d0ff064ad458b3b1a1eaa84ac3996206c2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52760",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-21T16:15:15.410",
|
||||
"lastModified": "2025-01-22T18:03:56.987",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-19T13:15:30.487",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -84,13 +84,6 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7ad4e0a4f61c57c3ca291ee010a9d677d0199fba",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bdcb8aa434c6d36b5c215d02a9ef07551be25a37",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-52921",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-11-19T02:15:09.310",
|
||||
"lastModified": "2024-12-11T15:15:07.307",
|
||||
"lastModified": "2025-06-19T13:15:30.640",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -139,13 +139,6 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9a2393af1f35d1975204fc00035c64a1c792b278",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e08e9dd09809b16f8f8cee8c466841b33d24ed96",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26710",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-03T15:15:53.487",
|
||||
"lastModified": "2025-03-17T15:36:11.620",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-19T13:15:31.147",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -85,13 +85,6 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4297217bcf1f0948a19c2bacc6b68d92e7778ad9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4cc31fa07445879a13750cb061bb8c2654975fcb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26774",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-03T17:15:53.130",
|
||||
"lastModified": "2025-02-27T14:37:32.300",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-19T13:15:31.303",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -101,13 +101,6 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/687061cfaa2ac3095170e136dd9c29a4974f41d4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8b40eb2e716b503f7a4e1090815a17b1341b2150",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,119 +2,15 @@
|
||||
"id": "CVE-2024-26794",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-04T09:15:08.683",
|
||||
"lastModified": "2025-04-04T14:28:38.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-19T13:15:31.510",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix race between ordered extent completion and fiemap\n\nFor fiemap we recently stopped locking the target extent range for the\nwhole duration of the fiemap call, in order to avoid a deadlock in a\nscenario where the fiemap buffer happens to be a memory mapped range of\nthe same file. This use case is very unlikely to be useful in practice but\nit may be triggered by fuzz testing (syzbot, etc).\n\nHowever by not locking the target extent range for the whole duration of\nthe fiemap call we can race with an ordered extent. This happens like\nthis:\n\n1) The fiemap task finishes processing a file extent item that covers\n the file range [512K, 1M[, and that file extent item is the last item\n in the leaf currently being processed;\n\n2) And ordered extent for the file range [768K, 2M[, in COW mode,\n completes (btrfs_finish_one_ordered()) and the file extent item\n covering the range [512K, 1M[ is trimmed to cover the range\n [512K, 768K[ and then a new file extent item for the range [768K, 2M[\n is inserted in the inode's subvolume tree;\n\n3) The fiemap task calls fiemap_next_leaf_item(), which then calls\n btrfs_next_leaf() to find the next leaf / item. This finds that the\n the next key following the one we previously processed (its type is\n BTRFS_EXTENT_DATA_KEY and its offset is 512K), is the key corresponding\n to the new file extent item inserted by the ordered extent, which has\n a type of BTRFS_EXTENT_DATA_KEY and an offset of 768K;\n\n4) Later the fiemap code ends up at emit_fiemap_extent() and triggers\n the warning:\n\n if (cache->offset + cache->len > offset) {\n WARN_ON(1);\n return -EINVAL;\n }\n\n Since we get 1M > 768K, because the previously emitted entry for the\n old extent covering the file range [512K, 1M[ ends at an offset that\n is greater than the new extent's start offset (768K). This makes fiemap\n fail with -EINVAL besides triggering the warning that produces a stack\n trace like the following:\n\n [1621.677651] ------------[ cut here ]------------\n [1621.677656] WARNING: CPU: 1 PID: 204366 at fs/btrfs/extent_io.c:2492 emit_fiemap_extent+0x84/0x90 [btrfs]\n [1621.677899] Modules linked in: btrfs blake2b_generic (...)\n [1621.677951] CPU: 1 PID: 204366 Comm: pool Not tainted 6.8.0-rc5-btrfs-next-151+ #1\n [1621.677954] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-0-gea1b7a073390-prebuilt.qemu.org 04/01/2014\n [1621.677956] RIP: 0010:emit_fiemap_extent+0x84/0x90 [btrfs]\n [1621.678033] Code: 2b 4c 89 63 (...)\n [1621.678035] RSP: 0018:ffffab16089ffd20 EFLAGS: 00010206\n [1621.678037] RAX: 00000000004fa000 RBX: ffffab16089ffe08 RCX: 0000000000009000\n [1621.678039] RDX: 00000000004f9000 RSI: 00000000004f1000 RDI: ffffab16089ffe90\n [1621.678040] RBP: 00000000004f9000 R08: 0000000000001000 R09: 0000000000000000\n [1621.678041] R10: 0000000000000000 R11: 0000000000001000 R12: 0000000041d78000\n [1621.678043] R13: 0000000000001000 R14: 0000000000000000 R15: ffff9434f0b17850\n [1621.678044] FS: 00007fa6e20006c0(0000) GS:ffff943bdfa40000(0000) knlGS:0000000000000000\n [1621.678046] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [1621.678048] CR2: 00007fa6b0801000 CR3: 000000012d404002 CR4: 0000000000370ef0\n [1621.678053] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n [1621.678055] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n [1621.678056] Call Trace:\n [1621.678074] <TASK>\n [1621.678076] ? __warn+0x80/0x130\n [1621.678082] ? emit_fiemap_extent+0x84/0x90 [btrfs]\n [1621.678159] ? report_bug+0x1f4/0x200\n [1621.678164] ? handle_bug+0x42/0x70\n [1621.678167] ? exc_invalid_op+0x14/0x70\n [1621.678170] ? asm_exc_invalid_op+0x16/0x20\n [1621.678178] ? emit_fiemap_extent+0x84/0x90 [btrfs]\n [1621.678253] extent_fiemap+0x766\n---truncated---"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: corrige la ejecuci\u00f3n entre la finalizaci\u00f3n de extensi\u00f3n ordenada y fiemap Para fiemap recientemente dejamos de bloquear el rango de extensi\u00f3n objetivo durante toda la duraci\u00f3n de la llamada a fiemap, para evitar un punto muerto en un escenario donde el b\u00fafer fiemap resulta ser un rango mapeado en memoria del mismo archivo. Es muy poco probable que este caso de uso sea \u00fatil en la pr\u00e1ctica, pero puede activarse mediante pruebas difusas (syzbot, etc.). Sin embargo, al no bloquear el rango de extensi\u00f3n objetivo durante toda la duraci\u00f3n de la llamada a fiemap, podemos competir con una extensi\u00f3n ordenada. Esto sucede as\u00ed: 1) La tarea fiemap termina de procesar un elemento de extensi\u00f3n de archivo que cubre el rango de archivos [512K, 1M[, y ese elemento de extensi\u00f3n de archivo es el \u00faltimo elemento de la hoja que se est\u00e1 procesando actualmente; 2) Y la extensi\u00f3n ordenada para el rango de archivos [768K, 2M[, en modo COW, se completa (btrfs_finish_one_ordered()) y el elemento de extensi\u00f3n de archivo que cubre el rango [512K, 1M[ se recorta para cubrir el rango [512K, 768K[ y luego se inserta un nuevo elemento de extensi\u00f3n de archivo para el rango [768K, 2M[ en el \u00e1rbol de subvolumen del inodo; 3) La tarea fiemap llama a fiemap_next_leaf_item(), que luego llama a btrfs_next_leaf() para encontrar la siguiente hoja/elemento. Esto encuentra que la siguiente clave despu\u00e9s de la que procesamos anteriormente (su tipo es BTRFS_EXTENT_DATA_KEY y su desplazamiento es 512K), es la clave correspondiente al nuevo elemento de extensi\u00f3n de archivo insertado por la extensi\u00f3n ordenada, que tiene un tipo de BTRFS_EXTENT_DATA_KEY y un desplazamiento de 768K; 4) M\u00e1s tarde, el c\u00f3digo fiemap termina en emit_fiemap_extent() y activa la advertencia: if (cache->offset + cache->len > offset) { WARN_ON(1); devolver -EINVAL; } Dado que obtenemos 1M > 768K, porque la entrada emitida previamente para la extensi\u00f3n anterior que cubre el rango de archivos [512K, 1M[ termina en un desplazamiento que es mayor que el desplazamiento inicial de la nueva extensi\u00f3n (768K). Esto hace que fiemap falle con -EINVAL adem\u00e1s de activar la advertencia que produce un seguimiento de pila como el siguiente: [1621.677651] ------------[ cortar aqu\u00ed ]----------- - [1621.677656] ADVERTENCIA: CPU: 1 PID: 204366 en fs/btrfs/extent_io.c:2492 emit_fiemap_extent+0x84/0x90 [btrfs] [1621.677899] M\u00f3dulos vinculados en: btrfs blake2b_generic (...) [1621.677951] CPU: 1 PID: 204366 Comm: pool No contaminado 6.8.0-rc5-btrfs-next-151+ #1 [1621.677954] Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS rel-1.16.2-0-gea1b7a073390- prebuilt.qemu.org 01/04/2014 [1621.677956] RIP: 0010:emit_fiemap_extent+0x84/0x90 [btrfs] [1621.678033] C\u00f3digo: 2b 4c 89 63 (...) [1621.678035] RSP: 0018:ffffab160 89ffd20 EFLAGS: 00010206 [1621.678037] RAX: 00000000004fa000 RBX: ffffab16089ffe08 RCX: 0000000000009000 [1621.678039] RDX: 00000000004f9000 RSI: 00000000004f1000 RDI : ffffab16089ffe90 [1621.678040] RBP: 00000000004f9000 R08: 0000000000001000 R09: 00000000000000000 [1621.678041] R10: 0000000000000000 R11 : 0000000000001000 R12: 0000000041d78000 [1621.678043 ] R13: 0000000000001000 R14: 00000000000000000 R15: ffff9434f0b17850 [1621.678044] FS: 00007fa6e20006c0(0000) GS:ffff943bdfa40000(0000) kn lGS:0000000000000000 [1621.678046] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [1621.678048] CR2: 00007fa6b0801000 CR3 : 000000012d404002 CR4: 0000000000370ef0 [1621.678053] DR0: 0000000000000000 DR1: 00000000000000000 DR2: 0000000000000000 [1621.678055] DR 3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [1621.678056] Seguimiento de llamadas: [1621.678074] [1621.678076] ? __advertir+0x80/0x130 [1621.678082] ? emit_fiemap_extent+0x84/0x90 [btrfs] [1621.678159] ? report_bug+0x1f4/0x200 [1621.678164] ? ---truncado---"
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.6.24:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6780E887-1EB4-4EE5-9542-B333E869A101"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.7.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8790AB97-4076-49F9-AEF1-60DFBD74D917"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/31d07a757c6d3430e03cc22799921569999b9a12",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a1a4a9ca77f143c00fce69c1239887ff8b813bec",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d43f8e58f10a44df8c08e7f7076f3288352cd168",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/31d07a757c6d3430e03cc22799921569999b9a12",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a1a4a9ca77f143c00fce69c1239887ff8b813bec",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d43f8e58f10a44df8c08e7f7076f3288352cd168",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26829",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-17T10:15:09.347",
|
||||
"lastModified": "2025-01-14T14:58:05.850",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-19T13:15:35.917",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -125,13 +125,6 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/486a4176bc783df798bce2903824801af8d2c3ae",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7219a692ffc00089015ada33b85b334d1a4b6e8e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-27410",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-17T12:15:11.690",
|
||||
"lastModified": "2024-11-21T09:04:33.790",
|
||||
"lastModified": "2025-06-19T13:15:36.097",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -17,14 +17,6 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/063715c33b4c37587aeca2c83cf08ead0c542995",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0cfbb26ee5e7b3d6483a73883f9f6157bca22ec9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/177d574be4b58f832354ab1ef5a297aa0c9aa2df",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
@ -33,18 +25,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/930e826962d9f01dcd2220176134427358d112f2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/99eb2159680af8786104dac80528acd5acd45980",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a2add961a5ed25cfd6a74f9ffb9e7ab6d6ded838",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d38d31bbbb9dc0d4d71a45431eafba03d0bc150d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f78c1375339a291cba492a70eaf12ec501d28a8e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,168 +2,15 @@
|
||||
"id": "CVE-2024-35788",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-17T13:15:58.640",
|
||||
"lastModified": "2025-03-05T17:33:07.867",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-19T13:15:36.360",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix bounds check for dcn35 DcfClocks\n\n[Why]\nNumFclkLevelsEnabled is used for DcfClocks bounds check\ninstead of designated NumDcfClkLevelsEnabled.\nThat can cause array index out-of-bounds access.\n\n[How]\nUse designated variable for dcn35 DcfClocks bounds check."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: Corrige la verificaci\u00f3n de l\u00edmites para dcn35 DcfClocks [Por qu\u00e9] NumFclkLevelsEnabled se usa para la verificaci\u00f3n de l\u00edmites de DcfClocks en lugar del designado NumDcfClkLevelsEnabled. Eso puede provocar un acceso fuera de los l\u00edmites al \u00edndice de matriz. [C\u00f3mo] Utilice la variable designada para comprobar los l\u00edmites de dcn35 DcfClocks."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-129"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.7.12",
|
||||
"matchCriteriaId": "D395D167-B806-45A5-9C34-38C8A1FE0F7B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.8",
|
||||
"versionEndExcluding": "6.8.3",
|
||||
"matchCriteriaId": "4C59BBC3-6495-4A77-9C82-55EC7CDF5E02"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3F2A4A3D-068A-4CF2-A09F-9C7937DDB0A5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DF73CB2A-DFFD-46FB-9BFE-AA394F27EA37"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52048DDA-FC5A-4363-95A0-A6357B4D7F8C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A06B2CCF-3F43-4FA9-8773-C83C3F5764B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F850DCEC-E08B-4317-A33B-D2DCF39F601B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "91326417-E981-482E-A5A3-28BC1327521B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DAECDCD8-F556-4606-8D7B-5C6D47A501F2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2f10d4a51bbcd938f1f02f16c304ad1d54717b96",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c373f233dab44a13752daec13788e2ad3bf86410",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f6e163e9c3d50cd167ab9d411ed01b7718177387",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2f10d4a51bbcd938f1f02f16c304ad1d54717b96",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c373f233dab44a13752daec13788e2ad3bf86410",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f6e163e9c3d50cd167ab9d411ed01b7718177387",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-35927",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-05-19T11:15:48.860",
|
||||
"lastModified": "2024-11-21T09:21:13.223",
|
||||
"lastModified": "2025-06-19T13:15:40.283",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -48,18 +48,10 @@
|
||||
"url": "https://git.kernel.org/stable/c/3d1b47e3a935abd4f258a945db87e7267ff4079c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4ad8d57d902fbc7c82507cfc1b031f3a07c3de6e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5abffb66d12bcac84bf7b66389c571b8bb6e82bd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/786c27982a39d79cc753f84229eb5977ac8ef1c1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/18451798f4a4e7418b9fad7e7dd313fe84b1f545",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-36288",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-06-21T12:15:10.967",
|
||||
"lastModified": "2024-11-21T09:21:59.667",
|
||||
"lastModified": "2025-06-19T13:15:40.433",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -131,14 +131,6 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f9977e4e0cd98a5f06f2492b4f3547db58deabf5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0a1cb0c6102bb4fd310243588d39461da49497ad",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43835",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-17T10:15:09.183",
|
||||
"lastModified": "2024-10-30T21:45:17.447",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-19T13:15:41.177",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -71,13 +71,6 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/19ac6f29bf64304ef04630c8ab56ecd2059d7aa1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/468a729b78895893d0e580ceea49bed8ada2a2bd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-43845",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-17T10:15:09.837",
|
||||
"lastModified": "2024-10-25T19:51:07.187",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-19T13:15:41.423",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -99,13 +99,6 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c996b570305e7a6910c2ce4cdcd4c22757ffe241",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fe2ead240c31e8d158713beca9d0681a6e6a53ab",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-43911",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-08-26T11:15:05.227",
|
||||
"lastModified": "2024-11-08T16:15:22.483",
|
||||
"lastModified": "2025-06-19T13:15:41.600",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -77,14 +77,6 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0acaf4a5025d6dafb7da787d2d4c47ed95e46ed6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a53c2d847627b790fb3bd8b00e02c247941b17e0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a5594c1e03b0df3908b1e1202a1ba34422eed0f6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45025",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-11T16:15:07.440",
|
||||
"lastModified": "2024-09-13T16:30:07.073",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-19T13:15:41.733",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -162,20 +162,6 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e807487a1d5fd5d941f26578ae826ca815dbfcd6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ee501f827f3db02d4e599afbbc1a7f8b792d05d7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fe5bf14881701119aeeda7cf685f3c226c7380df",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
|
@ -2,102 +2,15 @@
|
||||
"id": "CVE-2024-46700",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-13T06:15:14.720",
|
||||
"lastModified": "2024-09-13T16:53:25.383",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-19T13:15:42.090",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu/mes: fix mes ring buffer overflow\n\nwait memory room until enough before writing mes packets\nto avoid ring buffer overflow.\n\nv2: squash in sched_hw_submission fix\n\n(cherry picked from commit 34e087e8920e635c62e2ed6a758b0cd27f836d13)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu/mes: se corrige el desbordamiento del b\u00fafer de anillo de mes; esperar a que haya suficiente espacio en la memoria antes de escribir paquetes mes para evitar el desbordamiento del b\u00fafer de anillo. v2: se corrige el squash en sched_hw_submission (seleccionado del commit 34e087e8920e635c62e2ed6a758b0cd27f836d13)"
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.10.8",
|
||||
"matchCriteriaId": "04EAB214-6594-4DB7-86FA-A1EDE64FB9EE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/11752c013f562a1124088a35bd314aa0e9f0e88f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ed37550d7c516017c3b0324bdf144e2fa563ffb0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46852",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-09-27T13:15:16.917",
|
||||
"lastModified": "2024-10-17T14:15:07.887",
|
||||
"lastModified": "2025-06-19T13:15:46.410",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -120,10 +120,6 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/007180fcb6cc4a93211d4cc45fef3f5ccccd56ae",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/79cce5e81d20fa9ad553be439d665ac3302d3c95",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-56694",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-28T10:15:15.203",
|
||||
"lastModified": "2025-01-09T16:16:23.053",
|
||||
"lastModified": "2025-06-19T13:15:46.560",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -113,10 +113,6 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/078f7e1521442a55db4bed812a2fbaf02ac33819",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/221109ba2127eabd0aa64718543638b58b15df56",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
|
@ -2,131 +2,15 @@
|
||||
"id": "CVE-2024-56786",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-01-08T18:15:19.633",
|
||||
"lastModified": "2025-02-11T16:15:48.100",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-06-19T13:15:46.830",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: put bpf_link's program when link is safe to be deallocated\n\nIn general, BPF link's underlying BPF program should be considered to be\nreachable through attach hook -> link -> prog chain, and, pessimistically,\nwe have to assume that as long as link's memory is not safe to free,\nattach hook's code might hold a pointer to BPF program and use it.\n\nAs such, it's not (generally) correct to put link's program early before\nwaiting for RCU GPs to go through. More eager bpf_prog_put() that we\ncurrently do is mostly correct due to BPF program's release code doing\nsimilar RCU GP waiting, but as will be shown in the following patches,\nBPF program can be non-sleepable (and, thus, reliant on only \"classic\"\nRCU GP), while BPF link's attach hook can have sleepable semantics and\nneeds to be protected by RCU Tasks Trace, and for such cases BPF link\nhas to go through RCU Tasks Trace + \"classic\" RCU GPs before being\ndeallocated. And so, if we put BPF program early, we might free BPF\nprogram before we free BPF link, leading to use-after-free situation.\n\nSo, this patch defers bpf_prog_put() until we are ready to perform\nbpf_link's deallocation. At worst, this delays BPF program freeing by\none extra RCU GP, but that seems completely acceptable. Alternatively,\nwe'd need more elaborate ways to determine BPF hook, BPF link, and BPF\nprogram lifetimes, and how they relate to each other, which seems like\nan unnecessary complication.\n\nNote, for most BPF links we still will perform eager bpf_prog_put() and\nlink dealloc, so for those BPF links there are no observable changes\nwhatsoever. Only BPF links that use deferred dealloc might notice\nslightly delayed freeing of BPF programs.\n\nAlso, to reduce code and logic duplication, extract program put + link\ndealloc logic into bpf_link_dealloc() helper."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: poner el programa de bpf_link cuando es seguro desasignarlo En general, se debe considerar que el programa BPF subyacente del enlace BPF es accesible a trav\u00e9s de la cadena de gancho de conexi\u00f3n -> enlace -> programa y, de manera pesimista, tenemos que asumir que mientras no sea seguro liberar la memoria del enlace, el c\u00f3digo del gancho de conexi\u00f3n podr\u00eda contener un puntero al programa BPF y usarlo. Como tal, no es (generalmente) correcto poner el programa del enlace antes de esperar a que pasen los GP de RCU. El bpf_prog_put() m\u00e1s ansioso que hacemos actualmente es mayormente correcto debido a que el c\u00f3digo de lanzamiento del programa BPF hace una espera similar de GP RCU, pero como se mostrar\u00e1 en los parches siguientes, el programa BPF puede no ser inactivo (y, por lo tanto, depender solo del GP RCU \"cl\u00e1sico\"), mientras que el gancho de conexi\u00f3n del enlace BPF puede tener sem\u00e1ntica inactiva y necesita estar protegido por el Seguimiento de tareas RCU, y para tales casos el enlace BPF tiene que pasar por el Seguimiento de tareas RCU + GP RCU \"cl\u00e1sicos\" antes de ser desasignado. Y entonces, si ponemos el programa BPF temprano, podr\u00edamos liberar el programa BPF antes de liberar el enlace BPF, lo que lleva a una situaci\u00f3n de use-after-free. Entonces, este parche pospone bpf_prog_put() hasta que estemos listos para realizar la desasignaci\u00f3n de bpf_link. En el peor de los casos, esto retrasa la liberaci\u00f3n del programa BPF por un GP RCU adicional, pero eso parece completamente aceptable. Alternativamente, necesitar\u00edamos formas m\u00e1s elaboradas de determinar el gancho BPF, el enlace BPF y la duraci\u00f3n del programa BPF, y c\u00f3mo se relacionan entre s\u00ed, lo que parece una complicaci\u00f3n innecesaria. Tenga en cuenta que, para la mayor\u00eda de los enlaces BPF, seguiremos ejecutando bpf_prog_put() y link dealloc con avidez, por lo que para esos enlaces BPF no hay cambios observables en absoluto. Solo los enlaces BPF que usan dealloc diferido pueden notar una liberaci\u00f3n ligeramente retrasada de los programas BPF. Adem\u00e1s, para reducir la duplicaci\u00f3n de c\u00f3digo y l\u00f3gica, extraiga la l\u00f3gica de put del programa + link dealloc en el asistente bpf_link_dealloc()."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.6.66",
|
||||
"matchCriteriaId": "90A079EF-8212-45DF-84FB-C525A64635B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.12.5",
|
||||
"matchCriteriaId": "9501D045-7A94-42CA-8B03-821BE94A65B7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2fcb921c2799c49ac5e365cf4110f94a64ae4885",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5fe23c57abadfd46a7a66e81f3536e4757252a0b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f44ec8733a8469143fde1984b5e6931b2e2f6f3f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,28 +2,15 @@
|
||||
"id": "CVE-2024-57920",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-01-19T12:15:26.150",
|
||||
"lastModified": "2025-01-19T12:15:26.150",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-19T13:15:50.980",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdkfd: wq_release signals dma_fence only when available\n\nkfd_process_wq_release() signals eviction fence by\ndma_fence_signal() which wanrs if dma_fence\nis NULL.\n\nkfd_process->ef is initialized by kfd_process_device_init_vm()\nthrough ioctl. That means the fence is NULL for a new\ncreated kfd_process, and close a kfd_process right\nafter open it will trigger the warning.\n\nThis commit conditionally signals the eviction fence\nin kfd_process_wq_release() only when it is available.\n\n[ 503.660882] WARNING: CPU: 0 PID: 9 at drivers/dma-buf/dma-fence.c:467 dma_fence_signal+0x74/0xa0\n[ 503.782940] Workqueue: kfd_process_wq kfd_process_wq_release [amdgpu]\n[ 503.789640] RIP: 0010:dma_fence_signal+0x74/0xa0\n[ 503.877620] Call Trace:\n[ 503.880066] <TASK>\n[ 503.882168] ? __warn+0xcd/0x260\n[ 503.885407] ? dma_fence_signal+0x74/0xa0\n[ 503.889416] ? report_bug+0x288/0x2d0\n[ 503.893089] ? handle_bug+0x53/0xa0\n[ 503.896587] ? exc_invalid_op+0x14/0x50\n[ 503.900424] ? asm_exc_invalid_op+0x16/0x20\n[ 503.904616] ? dma_fence_signal+0x74/0xa0\n[ 503.908626] kfd_process_wq_release+0x6b/0x370 [amdgpu]\n[ 503.914081] process_one_work+0x654/0x10a0\n[ 503.918186] worker_thread+0x6c3/0xe70\n[ 503.921943] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 503.926735] ? srso_alias_return_thunk+0x5/0xfbef5\n[ 503.931527] ? __kthread_parkme+0x82/0x140\n[ 503.935631] ? __pfx_worker_thread+0x10/0x10\n[ 503.939904] kthread+0x2a8/0x380\n[ 503.943132] ? __pfx_kthread+0x10/0x10\n[ 503.946882] ret_from_fork+0x2d/0x70\n[ 503.950458] ? __pfx_kthread+0x10/0x10\n[ 503.954210] ret_from_fork_asm+0x1a/0x30\n[ 503.958142] </TASK>\n[ 503.960328] ---[ end trace 0000000000000000 ]---\n\n(cherry picked from commit 2774ef7625adb5fb9e9265c26a59dca7b8fd171e)"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdkfd: wq_release env\u00eda una se\u00f1al a dma_fence solo cuando est\u00e1 disponible kfd_process_wq_release() env\u00eda una se\u00f1al de desalojo a dma_fence_signal(), que se activa si dma_fence es NULL. kfd_process->ef se inicializa mediante kfd_process_device_init_vm() a trav\u00e9s de ioctl. Esto significa que el desalojo es NULL para un nuevo kfd_process creado, y cerrar un kfd_process justo despu\u00e9s de abrirlo activar\u00e1 la advertencia. Esta confirmaci\u00f3n env\u00eda una se\u00f1al condicional al desalojo en kfd_process_wq_release() solo cuando est\u00e1 disponible. [ 503.660882] ADVERTENCIA: CPU: 0 PID: 9 en drivers/dma-buf/dma-fence.c:467 dma_fence_signal+0x74/0xa0 [ 503.782940] Cola de trabajo: kfd_process_wq kfd_process_wq_release [amdgpu] [ 503.789640] RIP: 0010:dma_fence_signal+0x74/0xa0 [ 503.877620] Seguimiento de llamadas: [ 503.880066] [ 503.882168] ? __warn+0xcd/0x260 [ 503.885407] ? dma_fence_signal+0x74/0xa0 [ 503.889416] ? report_bug+0x288/0x2d0 [ 503.893089] ? handle_bug+0x53/0xa0 [ 503.896587] ? exc_invalid_op+0x14/0x50 [ 503.900424] ? asm_exc_invalid_op+0x16/0x20 [ 503.904616] ? __kthread_parkme+0x82/0x140 [503.935631] ? __pfx_worker_thread+0x10/0x10 [ 503.939904] kthread+0x2a8/0x380 [ 503.943132] ? __pfx_kthread+0x10/0x10 [ 503.954210] ret_from_fork_asm+0x1a/0x30 [ 503.958142] [ 503.960328] ---[ fin del seguimiento 000000000000000 ]--- (seleccionado de el commit 2774ef7625adb5fb9e9265c26a59dca7b8fd171e)"
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a993d319aebb7cce8a10c6e685344b7c2ad5c4c2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c8243def299793ac6c85fdc1086089c800c1051a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-58077",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-03-06T17:15:21.123",
|
||||
"lastModified": "2025-03-06T17:15:21.123",
|
||||
"lastModified": "2025-06-19T13:15:51.193",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,10 +32,6 @@
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/90778f31efdf44622065ebbe8d228284104bd26f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b65ba768302adc7ddc70811116cef80ca089af59",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,40 +2,15 @@
|
||||
"id": "CVE-2025-38030",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-06-18T10:15:35.100",
|
||||
"lastModified": "2025-06-18T13:46:52.973",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-19T13:15:51.760",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"drm/amd: Keep display off while going into S4\"\n\ncommit 68bfdc8dc0a1a (\"drm/amd: Keep display off while going into S4\")\nattempted to keep displays off during the S4 sequence by not resuming\ndisplay IP. This however leads to hangs because DRM clients such as the\nconsole can try to access registers and cause a hang.\n\n(cherry picked from commit e485502c37b097b0bd773baa7e2741bf7bd2909a)"
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7c220f89add8e7d6db63c9c4d9566917f8175a0b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7e7cb7a13c81073d38a10fa7b450d23712281ec4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9c40d1f7b75fc93d7ef02acc3a2a712cb057e576",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ed7d24b0c375f74a1956e73d53549be78bf2774c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/edfb7f9d27e2cd9aad55cfb5aaa6c67801613e6a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ff887e77b777e806b5210eba229e0bd657e07b60",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
56
CVE-2025/CVE-2025-47xx/CVE-2025-4738.json
Normal file
56
CVE-2025/CVE-2025-47xx/CVE-2025-4738.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-4738",
|
||||
"sourceIdentifier": "iletisim@usom.gov.tr",
|
||||
"published": "2025-06-19T13:15:51.840",
|
||||
"lastModified": "2025-06-19T13:15:51.840",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Yirmibes Software MY ERP allows SQL Injection.This issue affects MY ERP: before 1.170."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "iletisim@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-25-0132",
|
||||
"source": "iletisim@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
76
CVE-2025/CVE-2025-60xx/CVE-2025-6019.json
Normal file
76
CVE-2025/CVE-2025-60xx/CVE-2025-6019.json
Normal file
@ -0,0 +1,76 @@
|
||||
{
|
||||
"id": "CVE-2025-6019",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-06-19T12:15:19.727",
|
||||
"lastModified": "2025-06-19T12:15:19.727",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Local Privilege Escalation (LPE) vulnerability was found in libblockdev. Generally, the \"allow_active\" setting in Polkit permits a physically present user to take certain actions based on the session type. Due to the way libblockdev interacts with the udisks daemon, an \"allow_active\" user on a system may be able escalate to full root privileges on the target host. Normally, udisks mounts user-provided filesystem images with security flags like nosuid and nodev to prevent privilege escalation. However, a local attacker can create a specially crafted XFS image containing a SUID-root shell, then trick udisks into resizing it. This mounts their malicious filesystem with root privileges, allowing them to execute their SUID-root shell and gain complete control of the system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-250"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-6019",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370051",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/06/17/5",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/06/17/6",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2025/06/18/1",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2025/06/msg00018.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-62xx/CVE-2025-6266.json
Normal file
141
CVE-2025/CVE-2025-62xx/CVE-2025-6266.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-6266",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-19T12:15:20.537",
|
||||
"lastModified": "2025-06-19T12:15:20.537",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in FLIR AX8 up to 1.46. It has been declared as critical. This vulnerability affects unknown code of the file /upload.php. The manipulation of the argument File leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/YZS17/CVE/blob/main/FLIR-AX8/Unauthority_file_upload_vulnerabililty.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313270",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313270",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.586692",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
44
README.md
44
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-19T12:00:19.928988+00:00
|
||||
2025-06-19T14:00:19.951536+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-19T11:15:24.190000+00:00
|
||||
2025-06-19T13:15:51.840000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,25 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
298701
|
||||
298704
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2005-2347](CVE-2005/CVE-2005-23xx/CVE-2005-2347.json) (`2025-06-19T11:15:23.593`)
|
||||
- [CVE-2025-31698](CVE-2025/CVE-2025-316xx/CVE-2025-31698.json) (`2025-06-19T10:15:20.980`)
|
||||
- [CVE-2025-32896](CVE-2025/CVE-2025-328xx/CVE-2025-32896.json) (`2025-06-19T11:15:24.190`)
|
||||
- [CVE-2025-49763](CVE-2025/CVE-2025-497xx/CVE-2025-49763.json) (`2025-06-19T10:15:21.887`)
|
||||
- [CVE-2025-5071](CVE-2025/CVE-2025-50xx/CVE-2025-5071.json) (`2025-06-19T10:15:22.027`)
|
||||
- [CVE-2025-5234](CVE-2025/CVE-2025-52xx/CVE-2025-5234.json) (`2025-06-19T10:15:22.250`)
|
||||
- [CVE-2025-4738](CVE-2025/CVE-2025-47xx/CVE-2025-4738.json) (`2025-06-19T13:15:51.840`)
|
||||
- [CVE-2025-6019](CVE-2025/CVE-2025-60xx/CVE-2025-6019.json) (`2025-06-19T12:15:19.727`)
|
||||
- [CVE-2025-6266](CVE-2025/CVE-2025-62xx/CVE-2025-6266.json) (`2025-06-19T12:15:20.537`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `32`
|
||||
|
||||
- [CVE-2022-49558](CVE-2022/CVE-2022-495xx/CVE-2022-49558.json) (`2025-06-19T13:15:23.990`)
|
||||
- [CVE-2023-52569](CVE-2023/CVE-2023-525xx/CVE-2023-52569.json) (`2025-06-19T13:15:25.037`)
|
||||
- [CVE-2023-52681](CVE-2023/CVE-2023-526xx/CVE-2023-52681.json) (`2025-06-19T13:15:25.340`)
|
||||
- [CVE-2023-52733](CVE-2023/CVE-2023-527xx/CVE-2023-52733.json) (`2025-06-19T13:15:25.540`)
|
||||
- [CVE-2023-52760](CVE-2023/CVE-2023-527xx/CVE-2023-52760.json) (`2025-06-19T13:15:30.487`)
|
||||
- [CVE-2023-52921](CVE-2023/CVE-2023-529xx/CVE-2023-52921.json) (`2025-06-19T13:15:30.640`)
|
||||
- [CVE-2024-26710](CVE-2024/CVE-2024-267xx/CVE-2024-26710.json) (`2025-06-19T13:15:31.147`)
|
||||
- [CVE-2024-26774](CVE-2024/CVE-2024-267xx/CVE-2024-26774.json) (`2025-06-19T13:15:31.303`)
|
||||
- [CVE-2024-26794](CVE-2024/CVE-2024-267xx/CVE-2024-26794.json) (`2025-06-19T13:15:31.510`)
|
||||
- [CVE-2024-26829](CVE-2024/CVE-2024-268xx/CVE-2024-26829.json) (`2025-06-19T13:15:35.917`)
|
||||
- [CVE-2024-27410](CVE-2024/CVE-2024-274xx/CVE-2024-27410.json) (`2025-06-19T13:15:36.097`)
|
||||
- [CVE-2024-35788](CVE-2024/CVE-2024-357xx/CVE-2024-35788.json) (`2025-06-19T13:15:36.360`)
|
||||
- [CVE-2024-35927](CVE-2024/CVE-2024-359xx/CVE-2024-35927.json) (`2025-06-19T13:15:40.283`)
|
||||
- [CVE-2024-36288](CVE-2024/CVE-2024-362xx/CVE-2024-36288.json) (`2025-06-19T13:15:40.433`)
|
||||
- [CVE-2024-43835](CVE-2024/CVE-2024-438xx/CVE-2024-43835.json) (`2025-06-19T13:15:41.177`)
|
||||
- [CVE-2024-43845](CVE-2024/CVE-2024-438xx/CVE-2024-43845.json) (`2025-06-19T13:15:41.423`)
|
||||
- [CVE-2024-43911](CVE-2024/CVE-2024-439xx/CVE-2024-43911.json) (`2025-06-19T13:15:41.600`)
|
||||
- [CVE-2024-45025](CVE-2024/CVE-2024-450xx/CVE-2024-45025.json) (`2025-06-19T13:15:41.733`)
|
||||
- [CVE-2024-46700](CVE-2024/CVE-2024-467xx/CVE-2024-46700.json) (`2025-06-19T13:15:42.090`)
|
||||
- [CVE-2024-46852](CVE-2024/CVE-2024-468xx/CVE-2024-46852.json) (`2025-06-19T13:15:46.410`)
|
||||
- [CVE-2024-56694](CVE-2024/CVE-2024-566xx/CVE-2024-56694.json) (`2025-06-19T13:15:46.560`)
|
||||
- [CVE-2024-56786](CVE-2024/CVE-2024-567xx/CVE-2024-56786.json) (`2025-06-19T13:15:46.830`)
|
||||
- [CVE-2024-57920](CVE-2024/CVE-2024-579xx/CVE-2024-57920.json) (`2025-06-19T13:15:50.980`)
|
||||
- [CVE-2024-58077](CVE-2024/CVE-2024-580xx/CVE-2024-58077.json) (`2025-06-19T13:15:51.193`)
|
||||
- [CVE-2025-38030](CVE-2025/CVE-2025-380xx/CVE-2025-38030.json) (`2025-06-19T13:15:51.760`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
79
_state.csv
79
_state.csv
@ -13306,7 +13306,7 @@ CVE-2005-2343,0,0,73dc310170d13be4424d8eeb6ee614606550bd1d800d9a0663c8d07d79d636
|
||||
CVE-2005-2344,0,0,44282ae6f9064db58ec58cacb1251f93da1dabf092076eaeb8a2ab9b660b925c,2025-04-03T01:03:51.193000
|
||||
CVE-2005-2345,0,0,b27e6d6807328b3c6387b96a0da8e6930e932914582b2901d83a88205c700e40,2023-11-07T01:57:36.063000
|
||||
CVE-2005-2346,0,0,918fe655ea03014a25e47ac451e26cd34bb7a5c22e08d76bac29db32d54b3994,2025-04-03T01:03:51.193000
|
||||
CVE-2005-2347,1,1,01669b599b63be3fc28ca223e163cc52b2ddd2615dedfdfb1467c49a51ca06ee,2025-06-19T11:15:23.593000
|
||||
CVE-2005-2347,0,0,01669b599b63be3fc28ca223e163cc52b2ddd2615dedfdfb1467c49a51ca06ee,2025-06-19T11:15:23.593000
|
||||
CVE-2005-2348,0,0,501378e87d24dedfae8c0b4b68c8bf601a525c697b9afd5e277b4ddef737a1da,2023-11-07T01:57:36.280000
|
||||
CVE-2005-2349,0,0,171e3e2b71b6ef978485fd23602db9f356073938b1facf216771d9bda2300587,2024-11-20T23:59:21.517000
|
||||
CVE-2005-2350,0,0,6e00337b7c49c4fabd19eeb4fe846f77b817b69e4d1d708abef5545b3113d97f,2024-11-20T23:59:21.627000
|
||||
@ -213233,7 +213233,7 @@ CVE-2022-48845,0,0,94f22e9b9acbbb5c8519471c83937a2c7a9147a8e77f1ee3045c80f48a468
|
||||
CVE-2022-48846,0,0,7258287e68639fcdfd0b4f5144cd503eacb792f0f2fcee8ccf75e40bdfddba68,2024-11-21T07:34:12.050000
|
||||
CVE-2022-48847,0,0,3321217cd4af573aa5e073a85425079ad5809712d2d6c94889f79663c3d8a616,2024-11-21T07:34:12.187000
|
||||
CVE-2022-48848,0,0,1f1e31d119acbcb86505cd74e9774b42844323114bdc27c89f05c0211a90e033,2024-11-21T07:34:12.343000
|
||||
CVE-2022-48849,0,0,64ea7bf4cedf17d2584a73fb5c53116a5b9ca10047f251cd3a87db7b8fd2013c,2024-11-21T07:34:12.480000
|
||||
CVE-2022-48849,0,1,cf7d4bf1b125c37c3e1185047d0249e065abf93553d1111843b773ab48169c2d,2025-06-19T13:15:21.690000
|
||||
CVE-2022-4885,0,0,3ccdceef4b557bc79233cdb7b14f77a0f886bb4504e564212ba210d67b8e9258,2024-11-21T07:36:08.490000
|
||||
CVE-2022-48850,0,0,3b978e81aff8dc66cd596ad9489b1964b8388a9bdaa732c023a8dce60be7c237,2024-11-21T07:34:12.593000
|
||||
CVE-2022-48851,0,0,b5963e610a6b567ac27737bdbd152c9c020f59e3a839696883f7155074b9e929,2024-11-21T07:34:12.727000
|
||||
@ -213327,14 +213327,14 @@ CVE-2022-48931,0,0,1dbe2b8984115e6c4128eb39c49ee06011d1a2ee34417caca08b34d6a5e74
|
||||
CVE-2022-48932,0,0,5ee1a19583d0c4a9467a8feaaebf9dcf3b1db8ef04aca34fdc4cff7132f23fec,2024-08-23T01:48:35.663000
|
||||
CVE-2022-48933,0,0,1b4c1a1516a577d3b1652e29f5c3e786a949e8aaa7e38c23472c7d258c831a43,2024-08-23T01:50:09.313000
|
||||
CVE-2022-48934,0,0,aaf1356acfd8d3dd84aa39b3fd1fddb548a57947b1cb9a25af1e11990bb7dc62,2024-08-22T20:33:29.860000
|
||||
CVE-2022-48935,0,0,fe1e77d25b1ea38cd50fcda2171206f4e704fb5a521118af684054a53e8a8197,2024-08-23T01:45:31.280000
|
||||
CVE-2022-48935,0,1,2df4d407b80a4f230b41b7850bb9f18a2827a0aed7a40789730644be1330a313,2025-06-19T13:15:21.983000
|
||||
CVE-2022-48936,0,0,314cbb90d15468a6b1d7555d054a6b503128a9503d9ec5951ea48c3a9258d9c6,2024-08-31T06:15:06.460000
|
||||
CVE-2022-48937,0,0,6b478b1435d78a7ab05467250f2242aae473c24e90fe3a1aff6615918f5c8a52,2024-08-22T19:07:28.567000
|
||||
CVE-2022-48938,0,0,b6e9be5213f1247d08ffa614fc1a1459598f240582d9fb96da5e9999e511826e,2024-11-08T16:15:17.730000
|
||||
CVE-2022-48939,0,0,377615ee29b1087387ff6e3464436ee4fcda9ed9ec30aadbb16f8c0936d8933b,2024-08-22T19:02:08.770000
|
||||
CVE-2022-4894,0,0,22ed899d22580fa7ff41b74dfe422d716a5c9906a1ee5a472871f1ebbf4474fb,2024-11-21T07:36:09.560000
|
||||
CVE-2022-48940,0,0,38b69bd3209b0e7ac4d9cbe453d62a205ba4033bc58506aead5aeef18a85020c,2024-08-22T18:37:46.133000
|
||||
CVE-2022-48941,0,0,87b2ccf5f247d42dd9602932144fd795331784adcab5ea87e3cf67431b0195cf,2024-08-22T18:41:37.090000
|
||||
CVE-2022-48941,0,1,1448e6ff2637fd6ee187920793315d4f4a0b7bd5e5702c158741508f6e028283,2025-06-19T13:15:22.263000
|
||||
CVE-2022-48942,0,0,54372a0406f1cc0b6657cde2dcb6c662b4713c79f47b57e794248039c65b1eca,2024-08-22T18:25:14.867000
|
||||
CVE-2022-48943,0,0,0264fe83c8bd61ffaa8ed7a29a1240090d6282de98f79a1469d8e8bd5f420b46,2024-08-22T18:27:42.807000
|
||||
CVE-2022-48944,0,0,16d9e14c1e4833622d1d49b030ba3e3e9b9c0c99940a3d2a711a2b623c1bcade,2024-09-03T14:26:56.393000
|
||||
@ -213564,7 +213564,7 @@ CVE-2022-49149,0,0,8297fdf184d8a7e40f01ea0d5664b49cf40330e7583bc4ef95ce788771a41
|
||||
CVE-2022-4915,0,0,78e97bf5fafb2d4b7a3e2f6f595e7dd1ee238a60190a7a2d5d6415e7dc17ff0a,2024-11-21T07:36:14.217000
|
||||
CVE-2022-49150,0,0,89648067971d85640435933caa498e9b7904e2151ba4ff335e966223ae328796,2025-03-13T22:05:03.087000
|
||||
CVE-2022-49151,0,0,6f4fcc36b8e2ec9d432fdd24048034cbfd9b73238dda4b9dc33cc585a0b93ab8,2025-02-26T07:00:52.330000
|
||||
CVE-2022-49152,0,0,43c27d907bef1323c0c7b09e08b2937b8e29cf537937e3d8e7e21b9227eb2c45,2025-03-13T21:58:23.127000
|
||||
CVE-2022-49152,0,1,c4a44daa128a67ab28411df5611930eeb719858fd4f3058175c97a012867c1a3,2025-06-19T13:15:22.587000
|
||||
CVE-2022-49153,0,0,95eb9c7e8ee8ba4b1a97012606c13b8f5d719ee8b39c0fa9f873eb03c309eaff,2025-03-13T21:59:52.070000
|
||||
CVE-2022-49154,0,0,058332ad746480c433c095f859625c05c95d09d8148e0469d1b9f496b7c549cf,2025-02-26T07:00:52.627000
|
||||
CVE-2022-49155,0,0,ccc5982f599632c5a9bc700e79ff0e33f7c79bed37c3808f82465d1a36b59668,2025-03-13T22:06:01.560000
|
||||
@ -213784,7 +213784,7 @@ CVE-2022-49349,0,0,1aa0d1d0eb3b79e2c845a874dc5fe1db90a2fe64fbb452307be608b1f11ce
|
||||
CVE-2022-4935,0,0,c31e88e6073fd3a29bae4107f25ae33694ff5130dac188737279f3976c97e421,2024-11-21T07:36:17.127000
|
||||
CVE-2022-49350,0,0,5797ea7c9c6bbd566c497961eeb330f7e8cb153458b7d0b6af2daac2f567e551,2025-02-26T07:01:11.723000
|
||||
CVE-2022-49351,0,0,f762fc8508cc53a96f2d5ae2409376fdfff9e36e8f7b847da1a350ac1003a378,2025-04-14T19:46:06.033000
|
||||
CVE-2022-49352,0,0,9a85d620d7b8dd9928721b30c4d4e2b4685cf494c863d70f759767330dbda81d,2025-02-26T07:01:11.920000
|
||||
CVE-2022-49352,0,1,823244c735e96d1908eee00f54805dc289c4857d5af5fb9bda42577bca86b134,2025-06-19T13:15:23.173000
|
||||
CVE-2022-49353,0,0,be077bbcbe43beba9f58af70b6e1b75dd94baa91ee5c399b9024ca0ebceb7606,2025-04-14T19:45:00.240000
|
||||
CVE-2022-49354,0,0,d8fe12986c733c7dfe77ae298c313fe154cd9f45b9cf0b76657e1140b5aab642,2025-04-14T19:44:14.093000
|
||||
CVE-2022-49355,0,0,80fa4fd5e635de4f91692140e2c86158eee6f65edf7fc01373d8d1f58728fae1,2025-02-26T13:15:34.157000
|
||||
@ -213850,13 +213850,13 @@ CVE-2022-49409,0,0,3a950fbc64da2692edff68767b6c6abac72091f6e85997f1aa6e95042b2d7
|
||||
CVE-2022-4941,0,0,c9bd40e150e10c29b1c1e079ad1ffb2aea9c86536c13026eb988f154ee982f63,2024-11-21T07:36:17.807000
|
||||
CVE-2022-49410,0,0,84d3e0f7bc21d558aec3b4e0ae8dee5a83279109778732c277deb256b86bb2fc,2025-04-17T20:31:34.340000
|
||||
CVE-2022-49411,0,0,2b5ce5715259713da2a41ab77c5286503ef5377899a5c8c8887f3d26b2333df2,2025-03-25T13:42:10.430000
|
||||
CVE-2022-49412,0,0,afccb4edffaf71a111d69ecc331b520c3202dd241aaecb825e5679aa06f4e7e5,2025-03-24T19:52:31.537000
|
||||
CVE-2022-49412,0,1,4f46ff2d315d02f6f16a687dc1b5546d05e8cdd6687c045d7846d721ea0dd8f9,2025-06-19T13:15:23.390000
|
||||
CVE-2022-49413,0,0,b2779eac2a49f8913753d7cd747a23e073f48c0c2dc073ff2425a07a12ae4534,2025-03-24T19:52:50.113000
|
||||
CVE-2022-49414,0,0,78bee9ca007908a24f772b14094ada9ee18d2cc4a2d938908fbffbcb58ba4b45,2025-04-17T20:35:12.403000
|
||||
CVE-2022-49415,0,0,cc9039f44d53c55e84c3684b78f9440e4ff08d1e0f2a5666027ec595491fe980,2025-02-26T07:01:17.987000
|
||||
CVE-2022-49416,0,0,09c89d207391df88211f0618c2195524a326b2439f8e7dc7ec1d9f0561573089,2025-03-24T19:57:30.150000
|
||||
CVE-2022-49417,0,0,49961907fb61384541aef641811d488df153e40bcbca60f55f87b6d9cab4df46,2025-02-26T07:01:18.170000
|
||||
CVE-2022-49418,0,0,68702793689d60091827cf296631b3ac98a6cb9e3ad7a623caed68cda3bfc938,2025-02-26T07:01:18.260000
|
||||
CVE-2022-49418,0,1,d0aa489b7864f924c24aff27af838703a66915ae7446105b04bb73c1789e9f08,2025-06-19T13:15:23.660000
|
||||
CVE-2022-49419,0,0,5e829714eda436088a7d4e2a3f319dbfd17b45b8ecc959b900f607e63f922a81,2025-03-24T19:57:48.187000
|
||||
CVE-2022-4942,0,0,4bfd31c9d3683237fc0f66ee6838a8e9abe03973c1dc054d19973ecd2181f17a,2024-11-21T07:36:17.917000
|
||||
CVE-2022-49420,0,0,b46138299cef30db3771e236c2dee66f2ab59bca5d670ea9e8d5a786215d1752,2025-02-26T07:01:18.440000
|
||||
@ -214008,7 +214008,7 @@ CVE-2022-49554,0,0,0a34a3ac650254cb3dbd54b8422b1c5adcae22b4c4383ae36cc0c388c2f4c
|
||||
CVE-2022-49555,0,0,8de1c6fc16220f4772a30decf3ad5acfcd7fadbb1585a19ad12b3d6ad05c00cf,2025-02-26T07:01:31.313000
|
||||
CVE-2022-49556,0,0,de449809bae8cf397686a95281a178fe4b9ccf84aef2008424bda7593f787eb5,2025-02-26T07:01:31.407000
|
||||
CVE-2022-49557,0,0,38a9ef5191d44200c06c66c46ec6d0c2e3a8bb943adbda5a5d7d1696f2d7f29c,2025-02-26T07:01:31.503000
|
||||
CVE-2022-49558,0,0,daac90093d49c8372e444573abe119e8081a887b8d43470c5dabb6cb87a504ff,2025-02-26T07:01:31.597000
|
||||
CVE-2022-49558,0,1,4c402e69801d6bcff63fb791b8eccb9d40581cddc3ca92adb758dc7fe3a2ea1c,2025-06-19T13:15:23.990000
|
||||
CVE-2022-49559,0,0,2d14c0fbbdaee85fbd444788c794ab884da113af56925a6fd30e8cd880f6bc1d,2025-02-26T07:01:31.687000
|
||||
CVE-2022-4956,0,0,43d14a14df320488a03d84b995042cdf95aa3fb7ff65406b2df0e2b91a52a9a3,2024-11-21T07:36:19.420000
|
||||
CVE-2022-49560,0,0,f7c3028aafa421076b95e5c2bf3d153f3809af6aad83d1d0d1d9464b491c9c33,2025-03-10T21:25:29.677000
|
||||
@ -241994,7 +241994,7 @@ CVE-2023-52565,0,0,573eae026add44222db4dcfafdb299400ef2ab79702c7319794326b052947
|
||||
CVE-2023-52566,0,0,4a45e53e899c4c8e03aa80fb0793adc54a3cf1171b058b92566f227166dfee91,2025-04-08T15:08:55.437000
|
||||
CVE-2023-52567,0,0,18cd831f228d03b1e3290afd2f881bf52bd296c7921d05278f526558565ace57,2024-12-11T16:26:16.023000
|
||||
CVE-2023-52568,0,0,8d17d4f43096b1e8e2ac821253ed4d8309c3179fdcc64f1f4e718167b321b031,2024-12-11T16:23:49.080000
|
||||
CVE-2023-52569,0,0,acae99d79ce34dd4ff6e2aa23bdd3e8e5bfff8c20e53119da007b1ed6daf44c2,2025-01-16T17:08:05.613000
|
||||
CVE-2023-52569,0,1,df1275888ba06ca21a82881e8960dc896067a15bc45cfc453e437a3a74c9d6eb,2025-06-19T13:15:25.037000
|
||||
CVE-2023-5257,0,0,3ce640126c4032ba9918a5e5e037c470517d8bf27f41acbde20ca80717bf2d95,2024-11-21T08:41:23.437000
|
||||
CVE-2023-52570,0,0,c7a973afb4874bbc0a4a26ff210f16ddeefd555596f88f99c2b297604732223f,2024-12-11T15:21:44.063000
|
||||
CVE-2023-52571,0,0,0530f604f4af36e2992e1f7440b11a88707cbaea887a6a55bb83acc474872973,2025-04-08T15:05:00.363000
|
||||
@ -242118,7 +242118,7 @@ CVE-2023-52678,0,0,953cb4fa01ac6791b2584f95a5c8315c108ebc482f65f293fe1f239c11425
|
||||
CVE-2023-52679,0,0,c478e813ddd4b4ce1343e3f27409449fa8ed702ee1034440fed17cea99bc0916,2025-01-10T17:43:16.480000
|
||||
CVE-2023-5268,0,0,f9bebe86fa585dfcbe060b1fc00adb16b0d04aa3d4d18f7175ba3a6e3d9791b3,2024-11-21T08:41:24.927000
|
||||
CVE-2023-52680,0,0,ae64b074c35060884727ad53684f53cc03f000222f0fa8eecc3a6d877d9f2721,2024-11-21T08:40:20.917000
|
||||
CVE-2023-52681,0,0,95b2ac4df61f56d2f95a7ebeac7252765a55cc1647d79893431efd01a2086de4,2024-11-21T08:40:21.033000
|
||||
CVE-2023-52681,0,1,9979ebd32b3b744719f95c4518639ea57b75a7e784be8db9600f82ed62535911,2025-06-19T13:15:25.340000
|
||||
CVE-2023-52682,0,0,7173fbc8b142d32af92920f8c64d6a1bcd27bf572e831e7779e266c7cb9a253f,2024-11-21T08:40:21.140000
|
||||
CVE-2023-52683,0,0,9b2b7b84c8196b3a590a9ce5475ccf3a213512372aec3910ecd4dc19f9dd5698,2024-11-21T08:40:21.257000
|
||||
CVE-2023-52684,0,0,826a51fde3c297efd3fc5507da29c58f7b97d76cfc3216cf6472e94079a4d24f,2025-04-07T19:05:23.597000
|
||||
@ -242174,7 +242174,7 @@ CVE-2023-5273,0,0,6f26df3fc1e6203409f37349c999afab7055cfb5e89e02483db488eefca53f
|
||||
CVE-2023-52730,0,0,1ebdd041e2bc78bea11061473cc34d19a52a846428c3eec8b8c107820fac7c23,2024-11-21T08:40:27.883000
|
||||
CVE-2023-52731,0,0,f8ad5fad613ade1f6ee5f3c6074ef9d4461b8891819ac9a19a1d924438b4937a,2024-11-21T08:40:28.007000
|
||||
CVE-2023-52732,0,0,1eb76b8d97f2e3d09be2caf803604d47c4ef9e424628d8acb55510ffc20a29aa,2024-11-21T08:40:28.117000
|
||||
CVE-2023-52733,0,0,eab724cd83ed3fe528298f769c5c7d25e8d15ce5366636f88d1ccd7fc54ffb7b,2025-04-02T14:51:20.137000
|
||||
CVE-2023-52733,0,1,d8b36e38e3f34fa775025847fd118ed3ac106313dc762d2202b3a2ae3b5ec530,2025-06-19T13:15:25.540000
|
||||
CVE-2023-52734,0,0,2f76584608f90880dda5ed1cfe003cf8af38c50f85a7ba05f54382ff1ea93b84,2024-05-28T19:15:09.773000
|
||||
CVE-2023-52735,0,0,f478ba3b373cd433bb5aee25a220a182cbf53291e6340b29288cf9162f927cfd,2025-04-02T14:51:07.620000
|
||||
CVE-2023-52736,0,0,c35bcc1b2cba606129c818a936155ca214b02693b11b04934035f9ed16c416ef,2024-11-21T08:40:28.620000
|
||||
@ -242204,7 +242204,7 @@ CVE-2023-52757,0,0,59eb322f34bc12b8711c834c3ce346bda3ca5214ddbf962c381360374341e
|
||||
CVE-2023-52758,0,0,1dec77a3ad2d46363a8d440866791b91e3ba2419e4f6b349bb352575fcbf86ba,2024-05-24T16:15:09.010000
|
||||
CVE-2023-52759,0,0,d02de4f2e673632abe3697cddfe6669da6af361a999f03297379c860e218d9d0,2024-12-19T11:15:30.140000
|
||||
CVE-2023-5276,0,0,0b7db42a0b69ca7893c46dd3bcba89bcdb20b2edc3fa2c1057d10c47dc3e90db,2024-11-21T08:41:26
|
||||
CVE-2023-52760,0,0,e225beb74f176155c5de5fb84653dce76d2796c70c5432fc12736d42fc8f9cc8,2025-01-22T18:03:56.987000
|
||||
CVE-2023-52760,0,1,be4664371f00ed519eb214443ad69b213a779969946b87431fc93a9157c3c1fd,2025-06-19T13:15:30.487000
|
||||
CVE-2023-52761,0,0,2de2d44e86efe53326e55f7ec6f21c5145ed9df593be989838b4687490700a3c,2024-11-21T08:40:31.823000
|
||||
CVE-2023-52762,0,0,b1526cb45988cef620a220c45195944361e97b42679e23f18e92d83e3ddbd163,2024-11-21T08:40:31.957000
|
||||
CVE-2023-52763,0,0,51608820498fd55626f4c63260788d9dac36f63a4eb8157e60a3920e8ba1efdd,2024-11-21T08:40:32.093000
|
||||
@ -242381,7 +242381,7 @@ CVE-2023-52918,0,0,b756056ec028a3f8dbe95359b4e6a9ee9c3aee022710af984fbcd888a01bb
|
||||
CVE-2023-52919,0,0,428ae0b617ce1503b5cd1e233daf56322f531cad4cdc2d0ff04fec45c15d021d,2024-10-24T03:53:16.377000
|
||||
CVE-2023-5292,0,0,053cd6bdc838ec8e58310af23c6d4e5e608dfbec5f41437eefe04e4d3a1ca985,2024-11-21T08:41:27.907000
|
||||
CVE-2023-52920,0,0,d3f31fdc95b4a67b67ed332bc8577a6c103a6cc3b65bec1715fea71c281674f5,2025-01-09T16:15:35.587000
|
||||
CVE-2023-52921,0,0,db860eb263bc8c980e12e17429a087c45572e4c4d54038923230b290b9052477,2024-12-11T15:15:07.307000
|
||||
CVE-2023-52921,0,1,c9f9bd22855b8379a13799b1a815f41642b925730ab26056a1a11d5dc4d2992e,2025-06-19T13:15:30.640000
|
||||
CVE-2023-52922,0,0,4ae9be38bb6e6ca23829d038f55e60ad12898283b6085540928abd9ae32559e4,2025-06-13T20:15:22.450000
|
||||
CVE-2023-52923,0,0,d09409de037f5df89cd9d952de36693819046c41079eff92af40562f1bb761b3,2025-01-20T11:15:07.670000
|
||||
CVE-2023-52924,0,0,bd440ccf1a42892e419405c1c6a29cc2e2440c3f674ae48874e7009d8d7bdcee,2025-02-05T10:15:21.073000
|
||||
@ -255274,7 +255274,7 @@ CVE-2024-26707,0,0,1c758f00ff80d3ca5b813ab085c0f9ff555bb1b0aa5a49dbcb6e9068a2759
|
||||
CVE-2024-26708,0,0,bdc17ef7e58087066d3e85b0859e722e8ac059d7967114ad28115d9b3375b4ae,2025-04-08T15:31:23.777000
|
||||
CVE-2024-26709,0,0,84265dc256d943df4540d48ae1b11a8d0310b66ecceaef365d267322aba660bc,2025-01-13T20:03:28.797000
|
||||
CVE-2024-2671,0,0,bd5a320ab3401036156189ab4d3c6361e3a5116b660dfa0e919103b068f0300e,2025-02-21T15:22:57.597000
|
||||
CVE-2024-26710,0,0,b738c95ced70807b461356e09fa92db1949c85f5c05571b831087b4afd6fe717,2025-03-17T15:36:11.620000
|
||||
CVE-2024-26710,0,1,d91617f4ca4e9a9d1f5c2cca466d703e7087376b6a0b7ff97a78b84a1307d155,2025-06-19T13:15:31.147000
|
||||
CVE-2024-26711,0,0,1cb1621e17ab6fc4256a8b2cd44f93b4025c21bdd8d93a6a4ecbfd4ca633f9c6,2025-02-27T22:02:24.350000
|
||||
CVE-2024-26712,0,0,3eabb06e3f183090db18d9de2e74b41b5b40f04fc54674544de28e3b74739392,2025-04-08T15:30:20.373000
|
||||
CVE-2024-26713,0,0,e7e300ec5bbfa68ba83e0a47cb90f58abff0db2ab2dd369821dd312aa798bced,2024-12-19T12:15:06.330000
|
||||
@ -255344,7 +255344,7 @@ CVE-2024-26770,0,0,8d08eaa70a2e2e3d40574f2b704a77374cb9e6669a6ba5b5bad3773130c49
|
||||
CVE-2024-26771,0,0,5e3318a5219a1562a00396de2c61a0fa558f01729e9603c0306f834212e0432f,2025-01-27T14:59:26.887000
|
||||
CVE-2024-26772,0,0,c15abffc72b52c1a80253e130b87503f54d4bae2e6cddf19576aab0699a1611a,2025-04-04T14:16:47.867000
|
||||
CVE-2024-26773,0,0,1d4a42bde597efed855450dd0aa8a8e904f698a7797b2eeeaff9bc97aa6ee818,2025-03-18T16:47:14.460000
|
||||
CVE-2024-26774,0,0,1356b93fc761b0852a7c80176290616f9269a68e3fa4bb6d27677f517a92f70a,2025-02-27T14:37:32.300000
|
||||
CVE-2024-26774,0,1,b20f68ad798f47a3112a9583e723a0e9797df4899daeded36e85706ea3f97d2c,2025-06-19T13:15:31.303000
|
||||
CVE-2024-26775,0,0,285e0acd81a3ae287fc503b023988af78322228ca5a120edc7cd1b3b8dae3d03,2025-01-07T17:29:01.727000
|
||||
CVE-2024-26776,0,0,1bba81b8a8e72ec7c95ffb5d3e7b333d1413cd97a166084740a9af418cac677d,2025-02-27T14:37:18.470000
|
||||
CVE-2024-26777,0,0,daa8d9f58a531907703c73a4675a28b328f6bf2537032c88b428620832a46d69,2025-02-27T14:36:46.680000
|
||||
@ -255366,7 +255366,7 @@ CVE-2024-26790,0,0,da7993ff6ba918c2f5e13339b4c718269282ee965a1c6bb70f04c36e1ddd8
|
||||
CVE-2024-26791,0,0,c8ef10c6f04ed9c66fd762d6a0b3a45e0c79cbce1caed02d55dfa6a1faf6f0f6,2024-12-20T14:35:01.250000
|
||||
CVE-2024-26792,0,0,785771b4bfd2e03416e2a07ada6b7ec1391a403eee900f868d4d1d8145ef2354,2024-12-20T16:15:54.653000
|
||||
CVE-2024-26793,0,0,aa90abb3d1121ccaaf349ab01239e4c0a4a16759efda564be699ec746faed484,2024-12-20T15:56:00.320000
|
||||
CVE-2024-26794,0,0,9eb986e013bbdcdde88cd1768aa2e78889ba25afb64fca3198a883c6aab795c3,2025-04-04T14:28:38.927000
|
||||
CVE-2024-26794,0,1,a3da132eb916650492f3106d515b735dbe72602746c12f011cd20d711c76dfe9,2025-06-19T13:15:31.510000
|
||||
CVE-2024-26795,0,0,d43373becd1a2a0dc874625192219b12b2ce199f209c7afab1c87714eb89d672,2025-03-19T11:42:41.993000
|
||||
CVE-2024-26796,0,0,740b63b874106b1735e661fa59a152bb86da8899659de0c6c2baad5e3560a4e5,2025-02-27T14:42:59.307000
|
||||
CVE-2024-26797,0,0,7fcfec66278f984b39928c78bd306ae2d1a962abb25765fcb783613999da1ac4,2025-04-04T14:28:24.440000
|
||||
@ -255404,7 +255404,7 @@ CVE-2024-26825,0,0,5ce48738814319bfdc0872ba26b2b463e8d87f9b2edf67de8e88f9e8483cf
|
||||
CVE-2024-26826,0,0,ef7b75c128b5631f4acb91497bc6db3efb75b4e39a3d93ea904f63614f9960ae,2025-03-27T20:57:04.587000
|
||||
CVE-2024-26827,0,0,4cc514efbe22ca04935a47f409b758351113d51b04fbbf02df44e27fcf8c06d7,2024-04-18T15:15:28.957000
|
||||
CVE-2024-26828,0,0,84cc1261ddaa48629277944c8edcecccf8c15c1a0d5d26c02dc97eff20614da7,2025-04-08T19:16:26.800000
|
||||
CVE-2024-26829,0,0,33b858020b676d55d8dbfd0b8da63d045ba99285dcf6c6b1575c915b01f21130,2025-01-14T14:58:05.850000
|
||||
CVE-2024-26829,0,1,b0fb093ec36f7b8fab0c07d9ff5d8c115163457af7ad63571f29a99c79782f86,2025-06-19T13:15:35.917000
|
||||
CVE-2024-2683,0,0,d31db9b74162f34437448255d1f05adaf71bd3df21d7a1817f74540be30fbc76,2025-02-19T18:17:48.753000
|
||||
CVE-2024-26830,0,0,2e2d3d6269a8cd6a1cd47762591871dad624cc396e1ad5b9c684796d0e57ebe7,2025-04-02T13:19:07.453000
|
||||
CVE-2024-26831,0,0,f65b722d125da32d24604f127879b9206512a4f102e576e5645c679ad672606e,2025-04-02T13:19:02.103000
|
||||
@ -256014,7 +256014,7 @@ CVE-2024-27407,0,0,dc07c9bf4f777f0e957ab25dab31a13cbbf2678e72e3a590e12482cccd0be
|
||||
CVE-2024-27408,0,0,98c8b30837a43afd080646bbf037ed81aeb11ea466e7a3ed6819c36cd81c8836,2024-11-21T09:04:33.527000
|
||||
CVE-2024-27409,0,0,bc22652d032818f4fca14079fcd7842d612c3718de3699320e494dfa7ee8a5c1,2024-11-21T09:04:33.653000
|
||||
CVE-2024-2741,0,0,30b99159ddaffefc3023664c691b9ef3588e2d3200502b3b66f4719c657f05c7,2024-11-21T09:10:24.803000
|
||||
CVE-2024-27410,0,0,696573043fa09b9df264d696d78b1a95886a7ef42f45c10d6fc9f36d52d70758,2024-11-21T09:04:33.790000
|
||||
CVE-2024-27410,0,1,e2b99fbfacc2e17073c8f281de201fc889439fe117d814d6701704ee8054a9fd,2025-06-19T13:15:36.097000
|
||||
CVE-2024-27411,0,0,f33ed05b1af79c8798dce10b734b807cfd3c3c0280cda3312cace7d33a168919,2024-11-21T09:04:33.923000
|
||||
CVE-2024-27412,0,0,a702c5879aeed78b48b36d8ae6b313b965796547c99b174c28ae0bc5c2f82542,2024-11-21T09:04:34.063000
|
||||
CVE-2024-27413,0,0,bd327b327f16ab52d01828f6d316a044860ba7af430fc81075dcfbe2d6b40958,2024-11-21T09:04:34.300000
|
||||
@ -262266,7 +262266,7 @@ CVE-2024-35784,0,0,6a36ecbf216ecaf3512a6c5b2ee3703a250b459b4a7ecfacf4fe0e8fda312
|
||||
CVE-2024-35785,0,0,77c21670bce798ec6fb6e30378d55b3c958574746063148d56c3b95ce96a48ea,2024-11-21T09:20:53.437000
|
||||
CVE-2024-35786,0,0,77f89bb040cf765f6d9234d420731b7c23c63247ead02a0f8c0b8e4af33e99a9,2025-01-10T18:10:34.873000
|
||||
CVE-2024-35787,0,0,4661ac4ee6981aead7188ecd1296951853916d0577763ef27ab740e5af313cc2,2024-11-21T09:20:53.720000
|
||||
CVE-2024-35788,0,0,cfbbcb5b1c7b5aed82e1a1721f9174e455396f89b648614529f26e4a443d5e44,2025-03-05T17:33:07.867000
|
||||
CVE-2024-35788,0,1,f5404129956ea562d37064ccb92719605cd6913b7eeae8729cb7360c707b9b93,2025-06-19T13:15:36.360000
|
||||
CVE-2024-35789,0,0,9b8c98c47e91f31c7211ff1dcdc3ce85d2adc838fbdea552f5a97604371b7ddd,2024-11-21T09:20:53.967000
|
||||
CVE-2024-3579,0,0,7bb6876499ebd3266b422abae1569406fd610b0a85fc736905cfc9d045e4620e,2024-11-21T09:29:54.917000
|
||||
CVE-2024-35790,0,0,914a42206bcf167074dd60111e4c8cecf43541d1e237ed2dfbd858b2449c7b9b,2025-06-04T13:15:24.587000
|
||||
@ -262417,7 +262417,7 @@ CVE-2024-35923,0,0,e200bbefa4260a7322c5705e6c101e370170f714b6cca2259ba31c94a243a
|
||||
CVE-2024-35924,0,0,51a8e81a5087f6b00f86aef3df30b13903521527bd7c24804424b3f4f88b017b,2024-11-21T09:21:12.833000
|
||||
CVE-2024-35925,0,0,c69da8bf3be050c34947dfbb2cbe6b517f550618f4e390b45d64a13e545dc166,2024-12-31T18:51:18.303000
|
||||
CVE-2024-35926,0,0,c1b13d208fac57fe78f6933a263aa2f330043107ad1ad5de4da551ecec504628,2024-11-21T09:21:13.097000
|
||||
CVE-2024-35927,0,0,278ce2f015c27adcc7ff8c3c6be22b3e8c5bb291856afb164b072d0d8d61b636,2024-11-21T09:21:13.223000
|
||||
CVE-2024-35927,0,1,6b5953bf852146d119c1b41379a677c7ee4ae45bdf6f0faad14652712d972b65,2025-06-19T13:15:40.283000
|
||||
CVE-2024-35928,0,0,1c31dc8c665b8952880067e761bee324da2eee6fa320ed892680e88b3dd7b63e,2024-12-19T12:15:06.590000
|
||||
CVE-2024-35929,0,0,7da540c66ffc823238b17395ecbf47d1012e0cd64e229ac26e5cc7bd9ae7f5a8,2024-12-30T19:56:30.927000
|
||||
CVE-2024-3593,0,0,7dfe1a06ca99b709e0966f80e5fa7243762a8725a5825da6ebc20a944f2ce167,2024-11-21T09:29:56.757000
|
||||
@ -262772,7 +262772,7 @@ CVE-2024-36284,0,0,5dd896a891af07144a56a3845fc97f090935104348eba8ca7b12ce82fc1d0
|
||||
CVE-2024-36285,0,0,0c7823d3ace3df8d9b320bdafb5965f47e49d2f414a435615a3b8f24fcb2140d,2025-02-12T22:15:34.737000
|
||||
CVE-2024-36286,0,0,bac102403e45fda8132277c6a8c936743611fe7ec3db2c756aa2121a9f9c29ed,2025-01-07T17:08:25.580000
|
||||
CVE-2024-36287,0,0,454ffb39c6631203600464ecb505365d9728982dd5fbfd6048bea7e40482bfdb,2024-11-21T09:21:59.527000
|
||||
CVE-2024-36288,0,0,541c28d0151ea2628599b96895a2d3701ce11da4847adc16a1712449dea92513,2024-11-21T09:21:59.667000
|
||||
CVE-2024-36288,0,1,a0ee5542c758804cbffdc4002529af43c77173dfd3e792ed953d25f7e566e12b,2025-06-19T13:15:40.433000
|
||||
CVE-2024-36289,0,0,9a4e2e8c22c877a7229e5ef67cd4e3937f178f5664cb9107f76a5fa80df78b1a,2024-11-21T09:21:59.813000
|
||||
CVE-2024-3629,0,0,95cbbd26104b7fd2dcbc50917364d61467d72e4899fadcb6f1fb0df19afa4d01,2025-05-15T14:16:37.597000
|
||||
CVE-2024-36290,0,0,8298f0d1642987ec9c63c5254514e0267d57f00f7a058acac2c0e8b01a55797a,2025-01-14T16:15:29.473000
|
||||
@ -268736,7 +268736,7 @@ CVE-2024-43831,0,0,a9268ace7dacd553d87b45d213b555879d8348eca66f21b44f2f371c23948
|
||||
CVE-2024-43832,0,0,15442ca051ab0155fadf84dac6604a0024bcf8cf7f43b8779d15dbd2c77cba17,2024-08-19T12:59:59.177000
|
||||
CVE-2024-43833,0,0,5b7f17e91a1832d7c0ad5164e31831087a6aefdb4e7b61c82a3de3880edd76b6,2024-08-22T15:42:46.827000
|
||||
CVE-2024-43834,0,0,d5ef14ae2ffbc2e7669580090c9ce16cedbf19f89cc0924be7d59abe1e2c67e4,2024-10-30T21:44:22.570000
|
||||
CVE-2024-43835,0,0,17d4ad438e6c0e07f367b83ab4f112b8b31ecaf65e811c3d1f0396f55c988acd,2024-10-30T21:45:17.447000
|
||||
CVE-2024-43835,0,1,a3ab222d1a491144a0334a9ba805b7c1b4da5dc6c44257c2955c0e7c78fa171d,2025-06-19T13:15:41.177000
|
||||
CVE-2024-43836,0,0,f4c655bb2f56247f5d81fd742c3fcdd23416972e391d432e6e172ae5a57cc892,2024-08-22T15:43:26.303000
|
||||
CVE-2024-43837,0,0,1226778b7252461769175d745fa085c5a9c87889904d99a3bba5d59789b343af,2024-08-22T15:44:03.417000
|
||||
CVE-2024-43838,0,0,a5d4b7b522d8e67215b6ea2369694b147dcc49e3947e9b76857a7ed426025c6a,2024-10-29T16:24:43.273000
|
||||
@ -268747,7 +268747,7 @@ CVE-2024-43841,0,0,38746749d86e4f534fafdf8b478fa91ff1f5e1f65eb119200a1d6855c1feb
|
||||
CVE-2024-43842,0,0,15812ad8d85131679f82ea4663681c7db021618aa78b78cc9c9aed3923db1d1f,2024-09-30T13:55:17.007000
|
||||
CVE-2024-43843,0,0,7e3bdccf9d6054cb61c364d96f8741fe73ef63f682003f6ac63ebd930248bda3,2024-10-29T16:29:16.960000
|
||||
CVE-2024-43844,0,0,892289f8fc772f3f240038fccb3ec1dc83964292e0a1f838b372b21b4d76a86c,2024-10-25T19:49:05.987000
|
||||
CVE-2024-43845,0,0,810795145e82eb68ffbc0419ad50aca3821f0f6e9fb71f2860dedbc9b07a06e2,2024-10-25T19:51:07.187000
|
||||
CVE-2024-43845,0,1,941ae2382b20e0b42cbe2b8c7f4cf75ea6c953719811a855165bdbb72eafa916,2025-06-19T13:15:41.423000
|
||||
CVE-2024-43846,0,0,00546e8b7d32618825c1193130d999ce23114d449f5814665fe713817c3f3225,2024-10-25T19:52:01.380000
|
||||
CVE-2024-43847,0,0,40ae3f5c22580f8696b31462f52ae00e272df092f77c73d18c35f4e6f355f13a,2024-10-25T19:55:53.963000
|
||||
CVE-2024-43848,0,0,afa9f7a71028fa60eedc9a3a10bbe895ac3ef406bc4b18f0f8a8865a6f95d3fd,2024-10-25T13:57:51.800000
|
||||
@ -268820,7 +268820,7 @@ CVE-2024-43908,0,0,53a4829da8a8a1ad7fa0dc717c980975a2bb5c37e29b8800bdfbda1733423
|
||||
CVE-2024-43909,0,0,ad74e5431cfb800574a2dd7e0ced34f90848e63e0bbff2558cec0eed3e55119c,2024-08-27T13:41:48.467000
|
||||
CVE-2024-4391,0,0,4aa68eb768a7600ba1d511ef94f64977ab4a9f3debf9ac676e99a8182061a2de,2025-01-07T18:09:14.470000
|
||||
CVE-2024-43910,0,0,f09792e52923a702137c77836c509e81bd123178796b2db869e8028c46dbd737,2024-09-05T18:30:23.437000
|
||||
CVE-2024-43911,0,0,20c6e5eef3dcc934fa499bebf9dc436656bf40bb76e7e9eefe4334ad2b410795,2024-11-08T16:15:22.483000
|
||||
CVE-2024-43911,0,1,4eb7a4e6677e826bd73aded02e92c831525c000672ce55845ac938b5cd7b66e1,2025-06-19T13:15:41.600000
|
||||
CVE-2024-43912,0,0,b045133d294e4fa9817b7cc6e1963575a481178f8d5aa121f3202846d1b4ef09,2024-09-05T18:19:17.067000
|
||||
CVE-2024-43913,0,0,c1c655bf98a245b739b6bae86ffd25e2929e2c6be651f6c884a5a07e5e42c724,2024-12-09T13:10:03.003000
|
||||
CVE-2024-43914,0,0,2295c4b85c720f6aa521d0d441f8fa3541ee5bbad0e5cc835a8e46f08f8be0dd,2024-09-05T18:03:49.997000
|
||||
@ -269525,7 +269525,7 @@ CVE-2024-45021,0,0,b5c8b3592be5699bf0881de00fd5b0362eb80914279b4a5a7d96fef6a9675
|
||||
CVE-2024-45022,0,0,2cea89592199656ec921a3999b1ae285f1db04da7aaf687ce93a2d7242a86506,2024-09-13T16:36:39.043000
|
||||
CVE-2024-45023,0,0,f8e0a62a83abee054b0294c32d7a5d15b03d0cc79f4e4a9ba7f0506ba34b6cb4,2024-09-13T16:30:30.427000
|
||||
CVE-2024-45024,0,0,4feaf532db5af8cbee0e911fe09f5676ea54d7e53f7e82578a612b5e947edf46,2024-09-13T16:30:17.277000
|
||||
CVE-2024-45025,0,0,82bf2dd1a34d026e724fa95c00010b27da8e9db54efc3c612f5fd522e3fbb6ee,2024-09-13T16:30:07.073000
|
||||
CVE-2024-45025,0,1,11a7bef58ec6b5de820b57899e3f37f7b83c47bf237cd7afdb64fcb34cb11053,2025-06-19T13:15:41.733000
|
||||
CVE-2024-45026,0,0,89a8af0ac58952e722e5a53de5f494d1f681def0babb2de65d80753f6e55d193,2024-09-13T16:29:55.927000
|
||||
CVE-2024-45027,0,0,906b9ad56781558d74178ff20f312e7339b089bddb5d18b11ef9c6d75d05a75a,2025-05-09T08:15:18.677000
|
||||
CVE-2024-45028,0,0,af25595a666e3b491983ae69084787c84baeb2d3f88bb766b24cec6d0cfb83a7,2024-09-13T16:29:35.877000
|
||||
@ -270653,7 +270653,7 @@ CVE-2024-46697,0,0,9943cf76deb7cd05c4635bc9d12865f4ae0e9cc1d23e6f8d61c4587524e0e
|
||||
CVE-2024-46698,0,0,be3a5928ad47004b2d560db3d5df5b16cf4a67d11c1a9ecc79fc9d1af2a3eb53,2024-09-13T16:53:03
|
||||
CVE-2024-46699,0,0,b9f4243f64b3f749473025d5fece9ff74365febeb983013139a1c61713f6b89a,2024-09-13T16:53:10.620000
|
||||
CVE-2024-4670,0,0,20450840160cca1402ceff3ad240b158e7c98a105624c4f901b79d8d80b04786,2024-11-21T09:43:20.563000
|
||||
CVE-2024-46700,0,0,e84a19e373bea6f4b5f480dbabfb831a1a103804c7338e48fa857b09d105f966,2024-09-13T16:53:25.383000
|
||||
CVE-2024-46700,0,1,5cd93665de0e92a00c1210698436ce01c25104437e47fddb0ff4efc3fce44c0b,2025-06-19T13:15:42.090000
|
||||
CVE-2024-46701,0,0,e529b0621330ae5ac1d4b33df08f71883ab0b3900295daf37d0dfe30c681ef31,2024-09-19T13:40:27.817000
|
||||
CVE-2024-46702,0,0,f5b7fc9bcaeb54226afdebb2f9f120b5650bb150fd7460409201dbd777ad9b41,2024-09-19T13:35:58.637000
|
||||
CVE-2024-46703,0,0,d926face52ba1a18b356030e2a43e186ee85e58145f49e8ade11cb932899dc19,2024-09-19T13:33:57.563000
|
||||
@ -270820,7 +270820,7 @@ CVE-2024-46849,0,0,55f5b24a78843dcc8538314aaf7fc9612b26c57281c0bbf2f4b0fed08fece
|
||||
CVE-2024-4685,0,0,dcc1995af2e9fd1e34a2f9668e5bc3a683e3cfc7906d3660a8b9bcf75f88030b,2025-02-19T18:38:59.740000
|
||||
CVE-2024-46850,0,0,41be926e86dd8c952ae96807dd33a02f26b5880c97e6286fb0ffb5c599a187f6,2024-10-04T15:30:32.110000
|
||||
CVE-2024-46851,0,0,b0993c3439c6fdf7de7e13034429b55167ffbe1f88b2ed8118656fa5260e8c01,2024-10-04T16:00:43.913000
|
||||
CVE-2024-46852,0,0,003d8c5018acc2552d5923c9de7e22b4a29a76d4fa35d602e9c8fec3066d1da3,2024-10-17T14:15:07.887000
|
||||
CVE-2024-46852,0,1,1e4dd009dbc248ae2fc9217a7cec4442d7b40b3f6c50166be19bd07dd05305a9,2025-06-19T13:15:46.410000
|
||||
CVE-2024-46853,0,0,7013163bb0b0de8fcc4deccdec036fc108843e6740181da643a0cc828a7da7b8,2024-11-08T16:15:23.727000
|
||||
CVE-2024-46854,0,0,d2b8ace374763a38df18b61a469d196e1746b4597f0027e5c9c667cf2f8fd171,2024-11-08T16:15:23.857000
|
||||
CVE-2024-46855,0,0,46b0faa9ce85540614181cf4962008995b9781bd009434c91e4d733a9654cd2a,2024-10-17T14:15:12.790000
|
||||
@ -277898,7 +277898,7 @@ CVE-2024-56690,0,0,2a72c8e6571a5a1d0298311d84636f71e3ae4d29693e80187270d779ac92c
|
||||
CVE-2024-56691,0,0,62c59d5d1a3d371802a9cee1fb0752a9e914735965be638d034aafb90a06960b,2024-12-28T10:15:14.027000
|
||||
CVE-2024-56692,0,0,ace0c927c4a341e1aaf5f28ce5750c7447fae74ffcb794dd6309f417fa7701eb,2025-01-16T16:20:06.443000
|
||||
CVE-2024-56693,0,0,7478b55a09e156ef8c901ca8f31c798307144b33b79f35a2ee3a5c9550234da1,2025-03-24T17:31:47.693000
|
||||
CVE-2024-56694,0,0,e02696a2af0f8832f551be07eb9f65e5e2b65973a286b33cb8ac8725e89835c5,2025-01-09T16:16:23.053000
|
||||
CVE-2024-56694,0,1,764a1446a74f39b10c094959361057a2a30bd4f79d97f5a2db26ea7e59ebbb24,2025-06-19T13:15:46.560000
|
||||
CVE-2024-56695,0,0,8a4eb8360428ebf490447f80ec720c69eb5c05aa8c8254981044c72c87974385,2025-03-05T18:53:08.307000
|
||||
CVE-2024-56696,0,0,e7ff58f277f582521235fb4a39dccc778e70841711b02192c9e97fdaa9f8f3ce,2025-01-08T16:45:40.197000
|
||||
CVE-2024-56697,0,0,415312cd2de09e121d8f6863f3f85137f2ef58c344d43a9b863b32cfd98dbc09,2025-01-08T16:45:54.327000
|
||||
@ -277997,7 +277997,7 @@ CVE-2024-56782,0,0,8ea8c1c6076121ccd6387cd73e62b29831bb97f162a193d72c4089bf509d6
|
||||
CVE-2024-56783,0,0,ce83b6478d153aecb85bd2ed51b7393f53075c8b501633f17784c3734829a62e,2025-01-09T21:24:41.370000
|
||||
CVE-2024-56784,0,0,246e46b18d01297182b84d0eeedb7f89be5b067468d07e5fbcd2a4701c7c5b7f,2025-01-09T21:25:55.693000
|
||||
CVE-2024-56785,0,0,8f5cb98439d0416d3248c986cf648022357f0a09f9da0115702bc78871254399,2025-01-09T21:27:27.500000
|
||||
CVE-2024-56786,0,0,d15fb5f18546ad84fcc90f2cc5c493347ea3340e9c8d85864a525b65944a02bb,2025-02-11T16:15:48.100000
|
||||
CVE-2024-56786,0,1,c21d19ad26e7ba1031a72a0771e370f32d3d1c09901f144809bfb60669526b81,2025-06-19T13:15:46.830000
|
||||
CVE-2024-56787,0,0,77f49900ebe1e38ab8e44c5b5372eb9d15671b545bb90d2215966dec4b8fe2e1,2025-01-09T21:28:12.873000
|
||||
CVE-2024-56788,0,0,51dd43caa6c390f7c49e9d88b01231376fef9ee874b8f580ebd095d6eb630ba3,2025-01-11T13:15:29.090000
|
||||
CVE-2024-5679,0,0,dc654eef86d673e662acc6dfc1ecb27b2f541880d76227d1d93861f825adc641,2024-11-21T09:48:08.710000
|
||||
@ -278575,7 +278575,7 @@ CVE-2024-57917,0,0,b1167e5c425222d1e86557f7fbfade37e2c05b542cac17d0614dacc0faf5f
|
||||
CVE-2024-57918,0,0,51a0ae7790d69294b939f21a09ba710f5e4fba529bc7fb169229a8b80c38f093,2025-01-19T12:15:25.960000
|
||||
CVE-2024-57919,0,0,e1738bf3dfca2fdef7365aa48f1ce4c0aa5de667cd9d2a7db2f45a4ee2b8b3c7,2025-02-18T13:38:22.377000
|
||||
CVE-2024-5792,0,0,50e11f463088247110774be144fbfaca02cb5ac823192aaf13a748fe05bdb47b,2024-11-21T09:48:20.570000
|
||||
CVE-2024-57920,0,0,05c144fc213deb035ca56e5f20c83d1cd18bb751206c0c2a6034a93879334dc6,2025-01-19T12:15:26.150000
|
||||
CVE-2024-57920,0,1,e886d01100cb89cc10688a55d9ec23c065bd36f5b0221320d880948827c50067,2025-06-19T13:15:50.980000
|
||||
CVE-2024-57921,0,0,c7302d486dbfb4c3bec63ccb147bf84370f9dbf24a7b88cf2b3ffd88950eddd1,2025-01-19T12:15:26.247000
|
||||
CVE-2024-57922,0,0,bf2dd1432a9e3e667536a17647221b1e6b2f7d234607dcec972738ef61d4c750,2025-02-27T21:59:28.277000
|
||||
CVE-2024-57923,0,0,8d53fe837f5375f53275d78002c8e62a8004542cf9a9d70aff773f09fd6c7f44,2025-01-19T12:15:26.433000
|
||||
@ -278728,7 +278728,7 @@ CVE-2024-58073,0,0,eb683fa11db3d5ae68d3f6675819692177d4c529e62bda8352837736a5636
|
||||
CVE-2024-58074,0,0,c2882c9b1642af94a6966e94b4db4f1dbe7d1e9afcf383c98c1b880460b03666,2025-03-06T16:15:53.943000
|
||||
CVE-2024-58075,0,0,02ccfba812ec5be3736e2c44edd77c2858713f9c995acf80239dbfbabb0b0926,2025-03-06T16:15:54.040000
|
||||
CVE-2024-58076,0,0,cf8e0406b76ea78c0bb3d3987fee0579e4d2ec1271af278be4a1756c465a16d3,2025-03-25T14:26:52.030000
|
||||
CVE-2024-58077,0,0,f3ec17f492afe830e4bdffec9ee6935e46e28e5e78af48de044da0a78231897b,2025-03-06T17:15:21.123000
|
||||
CVE-2024-58077,0,1,634b774378af6bfd507980cd75c7187075e4d23fb39461364c64277eca54e758,2025-06-19T13:15:51.193000
|
||||
CVE-2024-58078,0,0,e508ee0d2ac67ad04e2896e307afebb7f13e51e73a51a69c9294be9999e510ad,2025-03-06T17:15:21.250000
|
||||
CVE-2024-58079,0,0,7fd5cc7589f5af5f8bbeac5e0840eb8db1d8a12c0b4e2caca3cc52286bddc2f2,2025-03-13T13:15:46.133000
|
||||
CVE-2024-5808,0,0,1d3ef99a05770383f75119606dd44066da1dce0bb204c0f99ad9e2a7f5bac72e,2025-05-28T00:49:06.347000
|
||||
@ -292370,7 +292370,7 @@ CVE-2025-31694,0,0,ca7b6a12f88250e41157726afe1e54fba9ef36ba52e8894f4db4aa7871bd1
|
||||
CVE-2025-31695,0,0,044b0f435e7672f738ea051c11db83a00ebaff63dbdb68e706b7dcc13acb90b6,2025-04-29T16:15:34.097000
|
||||
CVE-2025-31696,0,0,7181c70430e7f11f94551e571b933443a77c74627eab2d3af9d5a2722d8bbb8e,2025-04-29T16:15:34.243000
|
||||
CVE-2025-31697,0,0,d2f6e5dae8beddd7adbc933b42660d8199d000a2c4970c75b74c3c6a7e4fd487,2025-04-29T16:15:34.633000
|
||||
CVE-2025-31698,1,1,f718ce4b428d85a20357121dcf37ee9eeb16674413188ebde70d08c4880a8c67,2025-06-19T10:15:20.980000
|
||||
CVE-2025-31698,0,0,f718ce4b428d85a20357121dcf37ee9eeb16674413188ebde70d08c4880a8c67,2025-06-19T10:15:20.980000
|
||||
CVE-2025-3170,0,0,afb2bda5dd4e3285c33c62d49a05a12fd30d05e815744685a436b70b7583067d,2025-04-08T20:52:02.413000
|
||||
CVE-2025-3171,0,0,facd85de14a5feadcffd67276b1dd3aaa07eb8c0a878fc188d12f11d57d8217c,2025-04-08T20:43:42.857000
|
||||
CVE-2025-31710,0,0,66b943a0cc10a097358c13445d1f5df7386c2942496f3871e72b75f2365fb784,2025-06-10T15:15:23.847000
|
||||
@ -293389,7 +293389,7 @@ CVE-2025-32888,0,0,851f5838ac3b9022b83107af55b659a3aafc0e2822e0c3d7c62be76cdae08
|
||||
CVE-2025-32889,0,0,c5001261168b52d1fcafa5e758115761d50fb6c85872f50dce10dea30446578f,2025-05-02T13:52:51.693000
|
||||
CVE-2025-3289,0,0,2dce3ef8eb88e8d6d3c6bdcdd7b6d448658ce48e819de5faca8e16dde3fc5df6,2025-04-08T18:13:53.347000
|
||||
CVE-2025-32890,0,0,14fe3680ce0a694763f118a1c4280330bb31bbe10888a63507689bf1688fafee,2025-05-02T13:52:51.693000
|
||||
CVE-2025-32896,1,1,123bfaa38d77f885beca14c3b532a15df50c8b0d4512516bf991c8228fea2dd7,2025-06-19T11:15:24.190000
|
||||
CVE-2025-32896,0,0,123bfaa38d77f885beca14c3b532a15df50c8b0d4512516bf991c8228fea2dd7,2025-06-19T11:15:24.190000
|
||||
CVE-2025-32906,0,0,ed269622d928bd2aa475c3656dbb221e908c6bab45b25018cc828ee7bd119edc,2025-06-17T12:15:24.950000
|
||||
CVE-2025-32907,0,0,213f7e42abba53cbe091599b6e08ac02e165cca9f4b70fa3a4b5acdea9942c00,2025-05-29T07:15:24.333000
|
||||
CVE-2025-32908,0,0,d04d5cbb3961125d5a394946a9211c5953b759f1c35584196afe4caf2db9d0fd,2025-05-13T21:16:14.597000
|
||||
@ -294291,7 +294291,7 @@ CVE-2025-38027,0,0,471ef0d7ca5d24c18ccb08a9eddf5cbddd30470e775a52cb01bc90f38e1ce
|
||||
CVE-2025-38028,0,0,0a7639190a1937774dbcb851869664e12bc334f75a4870acae02cc8069cfea0a,2025-06-18T13:46:52.973000
|
||||
CVE-2025-38029,0,0,92d383e3593af7bcce9265075a2e2f877017899966aa410dfe02a30304d4b909,2025-06-18T13:46:52.973000
|
||||
CVE-2025-3803,0,0,01cac43cb81122f40562a95ea00e02849827ad730598145fa3ede5a68597810d,2025-04-21T14:23:45.950000
|
||||
CVE-2025-38030,0,0,b5c6734bf3184f8a087122a6320a8532fcbec5b22a14991ec096831ca4d5207c,2025-06-18T13:46:52.973000
|
||||
CVE-2025-38030,0,1,da7acce03f957af6d724acad28c4a34123763b145ebfe015d98d4b36466d234c,2025-06-19T13:15:51.760000
|
||||
CVE-2025-38031,0,0,486b5cbb4cd98022b686c86aee16cd270c1eb4dd11847090fa684f4f14929793,2025-06-18T13:46:52.973000
|
||||
CVE-2025-38032,0,0,e6efe23d93f2ffe49e4bc29b5d8bd527975896df0c10a6b76bd704bff3a8d41f,2025-06-18T13:46:52.973000
|
||||
CVE-2025-38033,0,0,22e8c97a0b2b90d6c86a7604c284682b993460d61d5c6c03c971671c669696d0,2025-06-18T13:46:52.973000
|
||||
@ -296586,6 +296586,7 @@ CVE-2025-4734,0,0,99bf1e4024c1482ea99fe0fd5315f4fee30ed05717e4831cdd0b865abb118a
|
||||
CVE-2025-4735,0,0,f96e4d2d2fb70e0f1c88cd9e2e0e0d4de95ba2f9e43dcc187f8debac18edd909,2025-05-28T14:26:46.997000
|
||||
CVE-2025-4736,0,0,1dca037a7f0cbc80e91cfd83149841017fcad28a58750ed26439191bb836bb26,2025-05-27T19:50:59.997000
|
||||
CVE-2025-4737,0,0,f9f82f092173f94badf92602e6f8f404f3e0568cce6afc358521e7171b0637d3,2025-05-16T14:43:26.160000
|
||||
CVE-2025-4738,1,1,70bd8280163617c773ed1ba89ddd6b9864d828db42f4acaa431997cd5a5b43d1,2025-06-19T13:15:51.840000
|
||||
CVE-2025-4739,0,0,cc2e318d2f840424b36b046688f8220e8357f337cbe30ff9f4e8c26b1723a285,2025-05-28T14:26:55.127000
|
||||
CVE-2025-4740,0,0,6c6357004a26b75a6edf5c8b51b4eebaf151da15d33a0ac49a5219d302fb606d,2025-05-16T14:42:18.700000
|
||||
CVE-2025-4741,0,0,ef8421e0cde45e475879357ff0c51cc359c029c130dc5d6beb431eec100b6596,2025-05-28T14:27:04.720000
|
||||
@ -297773,7 +297774,7 @@ CVE-2025-4971,0,0,ec01b010a198b670732c969d73dfa53bbd76f2e075f866245cc573c6149820
|
||||
CVE-2025-49710,0,0,fdef6b70e5300806b4a42e9567df3fa6452819f84b853bd1194cd77188110e32,2025-06-16T16:40:48.453000
|
||||
CVE-2025-4973,0,0,a09baa9620620eb012f5ddd6b5ca6dd7efd75fb0c8b55678f3f3e6206d444643,2025-06-12T16:06:20.180000
|
||||
CVE-2025-4975,0,0,e6592341c2d044f9e5e990b69dac44d61e569344ba65d2de38b936ca41ba415e,2025-05-23T15:54:42.643000
|
||||
CVE-2025-49763,1,1,f2ccd03af066720719d6adaf3d9ebe904f6737d1d40001bdb18c48fb16111c52,2025-06-19T10:15:21.887000
|
||||
CVE-2025-49763,0,0,f2ccd03af066720719d6adaf3d9ebe904f6737d1d40001bdb18c48fb16111c52,2025-06-19T10:15:21.887000
|
||||
CVE-2025-4977,0,0,935be558c641a049de0d5b17bd3afe70e433fc81aba4e94570f5c7e91d239ae4,2025-06-12T16:22:28.493000
|
||||
CVE-2025-4978,0,0,d687371ad5129a9bb5f335e51aa4bb2d4a1326e0f7b71156d03d5b7e69122f96,2025-06-12T16:22:12.217000
|
||||
CVE-2025-49785,0,0,fd0fa622bbf29f7044dd85605545512ef46620979dc70d00d503421325e1d0a3,2025-06-11T03:15:22.123000
|
||||
@ -297901,7 +297902,7 @@ CVE-2025-5065,0,0,8fc53b66fe42da4959811ef54b22b91af2bd35c9f4f954731cade0848a818f
|
||||
CVE-2025-5066,0,0,c2e1df9fe6cae5990ac135a3976d91b02429d110b23d2797a3b2dababf03dd2d,2025-05-29T15:50:51.310000
|
||||
CVE-2025-5067,0,0,cf2723dbc4b2f797991ebafc1c2cb069497cee2d74a6a84ebec9dcde1e0dd29e,2025-05-29T15:50:43.240000
|
||||
CVE-2025-5068,0,0,743f6f8e9f7972849bbf135b58a69c40f5a6f921a1bb6da952423dea4534ee5a,2025-06-05T14:11:10.430000
|
||||
CVE-2025-5071,1,1,3b2deef9236f3c759cda3ca3d7c218b19b13648226fc3eecf9f17094b26eaf9e,2025-06-19T10:15:22.027000
|
||||
CVE-2025-5071,0,0,3b2deef9236f3c759cda3ca3d7c218b19b13648226fc3eecf9f17094b26eaf9e,2025-06-19T10:15:22.027000
|
||||
CVE-2025-5073,0,0,a1230535d583b5f466b5fe2615cca31afcba55333f600b324f190ec047a41d18,2025-06-05T20:13:49.707000
|
||||
CVE-2025-5074,0,0,b32e6a163eb96eec8f69e51ca7a85c7da766b8b9d224e7b4f2f300a52a5b9bc3,2025-06-05T20:14:07.020000
|
||||
CVE-2025-5075,0,0,e2d063c837a04b124fb91d6969390128004202435ff9c54fbec941e95c405ada,2025-05-23T15:55:02.040000
|
||||
@ -298035,7 +298036,7 @@ CVE-2025-5230,0,0,9fadea541076e74f479fb5b5289a700110bb92230bc9a76add28f6c782b2ab
|
||||
CVE-2025-5231,0,0,933bca2cb9baedec07e689266f247371c054ab08b67bfc89de515eda8b6db129,2025-06-10T15:11:56.957000
|
||||
CVE-2025-5232,0,0,1b45026e75247a7322427bb058f27ed5717a2e44e9ed2a15532ca07a8f6c71a6,2025-06-10T15:12:09.197000
|
||||
CVE-2025-5233,0,0,6ecf1c2c649b0793b0fa703353d52d82c83e36cf0edf8150a0b10fa91cf5098a,2025-06-16T12:32:18.840000
|
||||
CVE-2025-5234,1,1,a5f38e2a75e738bb7b3ede233cac90ad6712ee44816591b20f46ec0889585028,2025-06-19T10:15:22.250000
|
||||
CVE-2025-5234,0,0,a5f38e2a75e738bb7b3ede233cac90ad6712ee44816591b20f46ec0889585028,2025-06-19T10:15:22.250000
|
||||
CVE-2025-5235,0,0,9f99135aac66ddf72cbc0dbdd83c4db7648e86e689f203314291273a812d09e8,2025-06-04T18:29:21.090000
|
||||
CVE-2025-5236,0,0,21b3f9a42248749cfd7dac46ffac19b1b1d972c6879013b8f47a703a60b1c09a,2025-06-04T18:30:22.220000
|
||||
CVE-2025-5237,0,0,9b708dfb250572e0ef36b1ce4d11e9c0580aaf815c8ffd6bf6c2ee5f802ff777,2025-06-18T13:46:52.973000
|
||||
@ -298587,6 +298588,7 @@ CVE-2025-6007,0,0,ad7217a46edf88f3122f03c09e2fdcfd31382468cbe1002c4a5de402899399
|
||||
CVE-2025-6008,0,0,cf45d1b8877307f98a5e962959db4dd8b70df84c99522375a10c3d04cde0826f,2025-06-19T01:26:01.867000
|
||||
CVE-2025-6009,0,0,78abb2d4f36e6029b865859c44e8b3b2ae426316eb8bf2e15ca3e33565c4ca16,2025-06-19T01:25:17.743000
|
||||
CVE-2025-6012,0,0,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b45,2025-06-16T12:32:18.840000
|
||||
CVE-2025-6019,1,1,04254b9397dd11cd6c3c371a0a809a11e95d3435e7861389ea1ee8b10ff74261,2025-06-19T12:15:19.727000
|
||||
CVE-2025-6020,0,0,439a2d09f05868a64a6818f204c8af8c3741a1aa91da69dac7da1c6864b5ef72,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439c4,2025-06-12T16:06:20.180000
|
||||
CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000
|
||||
@ -298700,3 +298702,4 @@ CVE-2025-6199,0,0,8b74f0ab0d170aa7cc558f1e79481a7093394c0368bbc35b907707db4c26f5
|
||||
CVE-2025-6201,0,0,fae5d9a8c9dcb541916adb0b451bda886e1fe3141eb6c37705d42f0b95790d08,2025-06-19T03:15:26.017000
|
||||
CVE-2025-6220,0,0,5f7d83b19f9a74deb42015750f7b5335a45a31dba8653fadb3cf8eaf78a671be,2025-06-18T13:47:40.833000
|
||||
CVE-2025-6240,0,0,afdbdd4423b9b6d85b5822d8414b4fba12d402c8710eb5b02e519fcba3d4ca1c,2025-06-18T15:15:28.187000
|
||||
CVE-2025-6266,1,1,f88678c0ca6c6b4793348c364f2d4b51fa863b9a2b4f605e9b4cf59a8ae65084,2025-06-19T12:15:20.537000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user