mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 03:02:20 +00:00
Auto-Update: 2025-01-07T23:00:22.280308+00:00
This commit is contained in:
parent
13248fc7e3
commit
c9bd4169da
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48390",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-06-06T06:15:48.860",
|
||||
"lastModified": "2024-11-21T07:33:18.660",
|
||||
"lastModified": "2025-01-07T21:15:07.953",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48438",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-06-06T06:15:49.810",
|
||||
"lastModified": "2024-11-21T07:33:20.947",
|
||||
"lastModified": "2025-01-07T21:15:08.877",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.5,
|
||||
"impactScore": 5.3
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48439",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-06-06T06:15:49.933",
|
||||
"lastModified": "2024-11-21T07:33:21.043",
|
||||
"lastModified": "2025-01-07T21:15:09.040",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48440",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-06-06T06:15:50.140",
|
||||
"lastModified": "2024-11-21T07:33:21.143",
|
||||
"lastModified": "2025-01-07T21:15:09.207",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.4,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48441",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-06-06T06:15:50.247",
|
||||
"lastModified": "2024-11-21T07:33:21.270",
|
||||
"lastModified": "2025-01-07T21:15:09.367",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.4,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48442",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-06-06T06:15:50.410",
|
||||
"lastModified": "2024-11-21T07:33:21.413",
|
||||
"lastModified": "2025-01-07T21:15:09.540",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.4,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48443",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-06-06T06:15:50.607",
|
||||
"lastModified": "2024-11-21T07:33:21.527",
|
||||
"lastModified": "2025-01-07T21:15:09.697",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48444",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-06-06T06:15:50.703",
|
||||
"lastModified": "2024-11-21T07:33:21.620",
|
||||
"lastModified": "2025-01-07T21:15:09.883",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48445",
|
||||
"sourceIdentifier": "security@unisoc.com",
|
||||
"published": "2023-06-06T06:15:50.853",
|
||||
"lastModified": "2024-11-21T07:33:21.740",
|
||||
"lastModified": "2025-01-07T21:15:10.060",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20725",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-06-06T13:15:11.937",
|
||||
"lastModified": "2024-11-21T07:41:25.417",
|
||||
"lastModified": "2025-01-07T21:15:10.227",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20728",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-06-06T13:15:12.070",
|
||||
"lastModified": "2024-11-21T07:41:25.767",
|
||||
"lastModified": "2025-01-07T21:15:10.397",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20736",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-06-06T13:15:13.083",
|
||||
"lastModified": "2024-11-21T07:41:26.697",
|
||||
"lastModified": "2025-01-07T22:15:27.733",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,6 +69,20 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-362"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20737",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-06-06T13:15:13.230",
|
||||
"lastModified": "2024-11-21T07:41:26.817",
|
||||
"lastModified": "2025-01-07T22:15:28.423",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20738",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-06-06T13:15:13.430",
|
||||
"lastModified": "2024-11-21T07:41:26.943",
|
||||
"lastModified": "2025-01-07T22:15:28.617",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20739",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-06-06T13:15:13.590",
|
||||
"lastModified": "2024-11-21T07:41:27.070",
|
||||
"lastModified": "2025-01-07T22:15:28.793",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20740",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-06-06T13:15:13.727",
|
||||
"lastModified": "2024-11-21T07:41:27.190",
|
||||
"lastModified": "2025-01-07T21:15:10.563",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20741",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-06-06T13:15:13.873",
|
||||
"lastModified": "2024-11-21T07:41:27.300",
|
||||
"lastModified": "2025-01-07T21:15:10.730",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20742",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-06-06T13:15:14.033",
|
||||
"lastModified": "2024-11-21T07:41:27.417",
|
||||
"lastModified": "2025-01-07T21:15:10.920",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20743",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-06-06T13:15:14.163",
|
||||
"lastModified": "2024-11-21T07:41:27.537",
|
||||
"lastModified": "2025-01-07T21:15:11.097",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20744",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2023-06-06T13:15:14.370",
|
||||
"lastModified": "2024-11-21T07:41:27.647",
|
||||
"lastModified": "2025-01-07T21:15:11.247",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2132",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-06-06T17:15:14.090",
|
||||
"lastModified": "2024-11-21T07:57:59.417",
|
||||
"lastModified": "2025-01-07T22:15:29.490",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -65,6 +65,16 @@
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2157",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-06-06T20:15:12.120",
|
||||
"lastModified": "2024-11-21T07:58:02.920",
|
||||
"lastModified": "2025-01-07T22:15:29.647",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2253",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-06-06T20:15:12.493",
|
||||
"lastModified": "2024-11-21T07:58:14.710",
|
||||
"lastModified": "2025-01-07T22:15:29.833",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-23583",
|
||||
"sourceIdentifier": "secure@intel.com",
|
||||
"published": "2023-11-14T19:15:18.113",
|
||||
"lastModified": "2024-11-21T07:46:28.483",
|
||||
"lastModified": "2025-01-07T22:15:28.987",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -62,7 +62,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secure@intel.com",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -72,13 +72,23 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27283",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-05-04T14:16:01.720",
|
||||
"lastModified": "2024-11-21T07:52:34.810",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-07T21:08:32.720",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,24 +69,63 @@
|
||||
"value": "CWE-204"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:aspera_orchestrator:4.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52DDCCC7-4347-49F8-A623-46C30C3512D7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/248545",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7150191",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/248545",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7150191",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2961",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-06-06T20:15:13.523",
|
||||
"lastModified": "2024-11-21T07:59:39.230",
|
||||
"lastModified": "2025-01-07T22:15:30.027",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37395",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-12-11T03:15:04.877",
|
||||
"lastModified": "2024-12-11T03:15:04.877",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-07T21:10:50.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionEndIncluding": "5.0.7",
|
||||
"matchCriteriaId": "055F62A0-D9E6-4FE6-83B2-0F9BAFF12FE8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7148632",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37407",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-05-03T16:15:10.697",
|
||||
"lastModified": "2024-11-21T08:11:39.140",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-07T21:06:46.840",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,22 +71,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:aspera_orchestrator:4.0.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "52DDCCC7-4347-49F8-A623-46C30C3512D7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260116",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7150117",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260116",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7150117",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38360",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-04T18:15:08.743",
|
||||
"lastModified": "2024-11-21T08:13:24.827",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-07T21:23:43.017",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,22 +71,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:cics_tx:10.1:*:*:*:advanced:*:*:*",
|
||||
"matchCriteriaId": "73BBDE39-E8CF-416C-838D-046ADDA011F8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260769",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7066435",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260769",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7066435",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38362",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-04T16:15:49.130",
|
||||
"lastModified": "2024-11-21T08:13:25.080",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-07T21:24:06.857",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,24 +69,63 @@
|
||||
"value": "CWE-204"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:cics_tx:10.1:*:*:*:advanced:*:*:*",
|
||||
"matchCriteriaId": "73BBDE39-E8CF-416C-838D-046ADDA011F8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260814",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://https://www.ibm.com/support/pages/node/7066430",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260814",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://https://www.ibm.com/support/pages/node/7066430",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
16
CVE-2024/CVE-2024-105xx/CVE-2024-10541.json
Normal file
16
CVE-2024/CVE-2024-105xx/CVE-2024-10541.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2024-10541",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-07T21:15:11.490",
|
||||
"lastModified": "2025-01-07T21:15:11.490",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. This is not a valid vulnerability. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21259",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2024-10-15T20:15:16.590",
|
||||
"lastModified": "2024-10-18T15:00:17.133",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-07T21:16:14.797",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -72,15 +72,15 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.0.0",
|
||||
"versionEndIncluding": "7.0.22",
|
||||
"matchCriteriaId": "1546CD49-450F-49FF-B492-8AC165123739"
|
||||
"versionEndExcluding": "7.0.22",
|
||||
"matchCriteriaId": "3B9F767A-0A1C-4082-BE31-DD58B4A5B570"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.1.0",
|
||||
"versionEndIncluding": "7.1.2",
|
||||
"matchCriteriaId": "6B6D587F-89CC-4F88-B787-B7BDB295E121"
|
||||
"versionEndExcluding": "7.1.2",
|
||||
"matchCriteriaId": "3A2D3A95-A0D6-44A9-A53E-15B1D376B393"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21442",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-03-12T17:15:53.557",
|
||||
"lastModified": "2024-11-21T08:54:22.560",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-07T21:18:53.787",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,16 +49,86 @@
|
||||
"value": "CWE-170"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.4170",
|
||||
"matchCriteriaId": "2CA95D8E-CAD9-4D07-AE35-36D83D546AA8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.4170",
|
||||
"matchCriteriaId": "968B931A-18E6-4425-B326-5A02C0B93A08"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22000.2836",
|
||||
"matchCriteriaId": "D08CEC8B-343C-486E-B6FA-F4D60ACF7E63"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.3296",
|
||||
"matchCriteriaId": "4DBD4A55-729C-4F86-AE29-6067F62FD03A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.3296",
|
||||
"matchCriteriaId": "A332CC68-568F-406B-8463-9FEF359BEA4C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.2340",
|
||||
"matchCriteriaId": "9EDA5547-D293-41D0-A10C-4A613E725231"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.763",
|
||||
"matchCriteriaId": "0AD05A2D-BA23-4B63-8B75-1395F74C36CB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21442",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21442",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26688",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-03T15:15:52.370",
|
||||
"lastModified": "2024-11-21T09:02:50.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-07T21:12:29.727",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,67 +15,231 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fs,hugetlb: corrige la desreferencia del puntero NULL en hugetlbs_fill_super Al configurar un SYSTEM de archivos de Hugetlb a trav\u00e9s de la llamada al SYSTEM fsconfig(), existe una posible desreferencia de NULL en hugetlbfs_fill_super() causada por la asignaci\u00f3n de NULL a ctx. ->hstate en hugetlbfs_parse_param() cuando el tama\u00f1o de p\u00e1gina solicitado no es v\u00e1lido. Por ejemplo: siguiendo los siguientes pasos: fd = fsopen(\"hugetlbfs\", FSOPEN_CLOEXEC); fsconfig(fd, FSCONFIG_SET_STRING, \"tama\u00f1o de p\u00e1gina\", \"1024\", 0); fsconfig(fd, FSCONFIG_CMD_CREATE, NULL, NULL, 0); Dado que el \"tama\u00f1o de p\u00e1gina\" solicitado no es v\u00e1lido, ctxt->hstate ser\u00e1 reemplazado por NULL, perdiendo su valor anterior, e imprimiremos un error: ... ... case Opt_pagesize: ps = memparse(param->string, &descansar); ctx->hestado = h; if (!ctx->hstate) { pr_err(\"Tama\u00f1o de p\u00e1gina no admitido %lu MB\\n\", ps / SZ_1M); devolver -EINVAL; } devolver 0; ... ... Esto es un problema porque m\u00e1s adelante eliminaremos la referencia a ctxt->hstate en hugetlbfs_fill_super() ... ... sb->s_blocksize = huge_page_size(ctx->hstate); ... ... Causando debajo Ups. Solucione este problema reemplazando el valor cxt->hstate solo cuando se sepa que el tama\u00f1o de p\u00e1gina es v\u00e1lido. kernel: hugetlbfs: Tama\u00f1o de p\u00e1gina no admitido 0 MB kernel: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000028 kernel: #PF: acceso de lectura del supervisor en modo kernel kernel: #PF: c\u00f3digo_error(0x0000) - p\u00e1gina no presente kernel: PGD 800000010f66c067 P4D 800000010f66c067 PUD 1b22f8067 PMD 0 kernel: Ups: 0000 [#1] PREEMPT SMP PTI kernel: CPU: 4 PID: 5659 Comm: syscall Contaminado: GE 6.8.0-rc2-default+ #22 5a47c3fef76212addcc6eb71344 Kernel aabc35190ae8f: Nombre del hardware: Intel Corp. GROVEPORT/GROVEPORT, BIOS GVPRCRB1.86B.0016.D04.1705030402 03/05/2017 kernel: RIP: 0010:hugetlbfs_fill_super+0xb4/0x1a0 kernel: C\u00f3digo: 48 8b 3b e8 3e c6 ed ff 48 85 c0 48 89 45 20 0f 84 d6 00 00 00 48 b8 ff ff ff ff ff ff ff 7f 4c 89 e7 49 89 44 24 20 48 8b 03 <8b> 48 28 b8 00 10 00 00 48 d3 e0 49 89 44 24 18 48 8b 03 8b 40 28 kernel: RSP: 0018:ffffbe9960fcbd48 EFLAGS: 00010246 kernel: RAX: 0000000000000000 RBX: ffff9af5272ae780 RCX: 0000000000372004 kernel: RDX: ffffffffffffffff RSI: ffffffffffffffff R DI: ffff9af555e9b000 kernel: RBP: ffff9af52ee66b00 R08: 0000000000000040 R09: 0000000000370004 kernel: R10: ffffbe9960fcbd48 R11: 0000000000000040 R12: ffff9af555e9b000 kernel: R13: fffffffa66b86c0 R14: ffff9af507d2f400 R15: ffff9af507d2f400 kernel: FS: 00007ffbc0ba4740(0000) GS:ffff9b0bd7 000000(0000) knlGS:0000000000000000 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 kernel: CR2: 0000000000000028 CR3: 00000001b1ee0000 CR4: 00000000001506f0 kernel: Seguimiento de llamadas: kernel: kernel: ? __die_body+0x1a/0x60 n\u00facleo: ? page_fault_oops+0x16f/0x4a0 n\u00facleo:? search_bpf_extables+0x65/0x70 n\u00facleo:? fixup_exception+0x22/0x310 kernel:? exc_page_fault+0x69/0x150 n\u00facleo:? asm_exc_page_fault+0x22/0x30 n\u00facleo:? __pfx_hugetlbfs_fill_super+0x10/0x10 n\u00facleo:? n\u00facleo enormetlbfs_fill_super+0xb4/0x1a0:? enormetlbfs_fill_super+0x28/0x1a0 kernel:? __pfx_hugetlbfs_fill_super+0x10/0x10 kernel: vfs_get_super+0x40/0xa0 kernel:? __pfx_bpf_lsm_capable+0x10/0x10 kernel: vfs_get_tree+0x25/0xd0 kernel: vfs_cmd_create+0x64/0xe0 kernel: __x64_sys_fsconfig+0x395/0x410 kernel: do_syscall_64+0x80/0x160 kernel: ? syscall_exit_to_user_mode+0x82/0x240 kernel:? do_syscall_64+0x8d/0x160 n\u00facleo:? syscall_exit_to_user_mode+0x82/0x240 kernel:? do_syscall_64+0x8d/0x160 n\u00facleo:? exc_page_fault+0x69/0x150 kernel: Entry_SYSCALL_64_after_hwframe+0x6e/0x76 kernel: RIP: 0033:0x7ffbc0cb87c9 kernel: C\u00f3digo: 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 97 96 0d 00 f7 d8 64 89 01 48 ---truncado---"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.1",
|
||||
"versionEndExcluding": "5.4.271",
|
||||
"matchCriteriaId": "6A4B5A96-B786-4F9E-AC8D-21120839B09B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.212",
|
||||
"matchCriteriaId": "01B34738-A022-44A9-9250-DCBC76539CB9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.151",
|
||||
"matchCriteriaId": "EEAFD33E-C22F-4FB1-A417-9C96AB3E0358"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.79",
|
||||
"matchCriteriaId": "656E2F29-1779-4EFC-AA64-8F984E2885B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.18",
|
||||
"matchCriteriaId": "BD961E49-FEDA-47CF-BF23-4D2BD942B4E0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.7.6",
|
||||
"matchCriteriaId": "C6D6A5C8-7308-42A9-8A72-ABF3DEA4BB82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/13c5a9fb07105557a1fa9efdb4f23d7ef30b7274",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1dde8ef4b7a749ae1bc73617c91775631d167557",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/22850c9950a4e43a67299755d11498f3292d02ff",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2e2c07104b4904aed1389a59b25799b95a85b5b9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/79d72c68c58784a3e1cd2378669d51bfd0cb7498",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/80d852299987a8037be145a94f41874228f1a773",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ec78418801ef7b0c22cd6a30145ec480dd48db39",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/13c5a9fb07105557a1fa9efdb4f23d7ef30b7274",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1dde8ef4b7a749ae1bc73617c91775631d167557",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/22850c9950a4e43a67299755d11498f3292d02ff",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2e2c07104b4904aed1389a59b25799b95a85b5b9",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/79d72c68c58784a3e1cd2378669d51bfd0cb7498",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/80d852299987a8037be145a94f41874228f1a773",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ec78418801ef7b0c22cd6a30145ec480dd48db39",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26717",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-03T15:15:53.850",
|
||||
"lastModified": "2024-11-21T09:02:54.607",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-07T21:16:14.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,47 +15,162 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: HID: i2c-hid-of: corrige NULL-deref en caso de encendido fallido Hace un tiempo, la implementaci\u00f3n de I2C HID se dividi\u00f3 en una parte ACPI y OF, pero el nuevo controlador OF nunca Inicializa el puntero del cliente al que se le quita la referencia en caso de fallos de encendido."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.12",
|
||||
"versionEndExcluding": "5.15.149",
|
||||
"matchCriteriaId": "ECC74ED9-C6F0-4F37-9917-0F2B0BAD54B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.79",
|
||||
"matchCriteriaId": "656E2F29-1779-4EFC-AA64-8F984E2885B1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.18",
|
||||
"matchCriteriaId": "BD961E49-FEDA-47CF-BF23-4D2BD942B4E0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.7.6",
|
||||
"matchCriteriaId": "C6D6A5C8-7308-42A9-8A72-ABF3DEA4BB82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/00aab7dcb2267f2aef59447602f34501efe1a07f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4cad91344a62536a2949873bad6365fbb6232776",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/62f5d219edbd174829aa18d4b3d97cd5fefbb783",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d7d7a0e3b6f5adc45f23667cbb919e99093a5b5c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e28d6b63aeecbda450935fb58db0e682ea8212d3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/00aab7dcb2267f2aef59447602f34501efe1a07f",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4cad91344a62536a2949873bad6365fbb6232776",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/62f5d219edbd174829aa18d4b3d97cd5fefbb783",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d7d7a0e3b6f5adc45f23667cbb919e99093a5b5c",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e28d6b63aeecbda450935fb58db0e682ea8212d3",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26728",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-03T17:15:50.763",
|
||||
"lastModified": "2024-11-21T09:02:55.997",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-07T21:15:57.473",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,114 @@
|
||||
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: corrige la desreferencia del puntero nulo en la lectura de edid Utilice el adaptador i2c cuando no haya aux_mode en dc_link para corregir una desreferencia del puntero nulo que ocurre al ejecutar igt@ kms_force_connector_basic en un SYSTEM con DCN2.1 y conector HDMI se detect\u00f3 como se muestra a continuaci\u00f3n: [+0.178146] ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 00000000000004c0 [+0.000010] #PF: acceso de lectura del supervisor en modo kernel [+0.000005] #PF: c\u00f3digo_error (0x0000) - p\u00e1gina no presente [+0.000004] PGD 0 P4D 0 [+0.000006] Ups: 0000 [#1] PREEMPT SMP NOPTI [+0.000006] CPU: 15 PID: 2368 Comm: kms_force_conne No contaminado 6.5.0-asdn+ #152 [+0.000005] Nombre de hardware: HP HP ENVY x360 Convertible 13-ay1xxx/8929, BIOS F.01 14/07/2021 [+0.000004] RIP: 0010:i2c_transfer+0xd/0x100 [+0.000011] C\u00f3digo: ea fc ff ff 66 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 54 55 53 <48> 8b 4 7 10 48 89 fb 48 83 38 00 0f 84 b3 00 00 00 83 3d 2f 80 16 [ +0.000004] RSP: 0018:ffff9c4f89c0fad0 EFLAGS: 00010246 [ +0.000005] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000000080 [+0.000003] RDX: 0000000000000002 RSI: ffff9c4f89c0fb20 RDI : 00000000000004b0 [ +0.000003] RBP: ffff9c4f89c0fb80 R08: 0000000000000080 R09: ffff8d8e0b15b980 [ +0.000003] R10: 00000000000380e0 R11: 0000000000000000 R12: 0000000000000080 [ +0.000002] R13: 0000000000000002 R14: ffff9c4f89c0fb0e R15: ffff9c4f89c0fb0f [ +0.000004] FS: 000 07f9ad2176c40(0000 ) GS:ffff8d90fe9c0000(0000) knlGS:0000000000000000 [ +0.000003] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ +0.000004] CR2: 0000000000000 4c0 CR3: 0000000121bc4000 CR4: 0000000000750ee0 [ +0.000003] PKRU: 55555554 [ +0.000003] Seguimiento de llamadas: [ +0.000006] [ +0.000006] ? __die+0x23/0x70 [ +0.000011] ? page_fault_oops+0x17d/0x4c0 [+0.000008]? preempt_count_add+0x6e/0xa0 [+0.000008]? srso_alias_return_thunk+0x5/0x7f [+0.000011]? exc_page_fault+0x7f/0x180 [+0.000009]? asm_exc_page_fault+0x26/0x30 [+0.000013]? i2c_transfer+0xd/0x100 [ +0.000010] drm_do_probe_ddc_edid+0xc2/0x140 [drm] [ +0.000067] ? srso_alias_return_thunk+0x5/0x7f [+0.000006]? _drm_do_get_edid+0x97/0x3c0 [drm] [ +0.000043] ? __pfx_drm_do_probe_ddc_edid+0x10/0x10 [drm] [ +0.000042] edid_block_read+0x3b/0xd0 [drm] [ +0.000043] _drm_do_get_edid+0xb6/0x3c0 [drm] [ +0.000041] ? __pfx_drm_do_probe_ddc_edid+0x10/0x10 [drm] [ +0.000043] drm_edid_read_custom+0x37/0xd0 [drm] [ +0.000044] amdgpu_dm_connector_mode_valid+0x129/0x1d0 [amdgpu] [ +0.000153] dr m_connector_mode_valid+0x3b/0x60 [drm_kms_helper] [ +0.000000] __drm_helper_update_and_validate+ 0xfe/0x3c0 [drm_kms_helper] [+0.000000]? amdgpu_dm_connector_get_modes+0xb6/0x520 [amdgpu] [+0.000000]? srso_alias_return_thunk+0x5/0x7f [ +0.000000] drm_helper_probe_single_connector_modes+0x2ab/0x540 [drm_kms_helper] [ +0.000000] status_store+0xb2/0x1f0 [drm] [ +0.000000] kernfs_fop_write_iter +0x136/0x1d0 [ +0,000000] vfs_write+0x24d/0x440 [ +0,000000 ] ksys_write+0x6f/0xf0 [ +0.000000] do_syscall_64+0x60/0xc0 [ +0.000000] ? srso_alias_return_thunk+0x5/0x7f [+0.000000]? syscall_exit_to_user_mode+0x2b/0x40 [+0.000000]? srso_alias_return_thunk+0x5/0x7f [+0.000000]? do_syscall_64+0x6c/0xc0 [+0.000000]? do_syscall_64+0x6c/0xc0 [ +0.000000] Entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ +0.000000] RIP: 0033:0x7f9ad46b4b00 [ +0.000000] C\u00f3digo: 40 00 48 8b 15 19 b3 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 80 3d e1 3a 0e 00 00 74 17 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 48 83 ec 28 48 89 [ +0 .000000] RSP : 002b:00007ffcbd3bd6d8 EFLAGS: 00000202 ORIG_RAX: 0000000000000001 [ +0.000000] RAX: ffffffffffffffffda RBX: 00000000000000000 RCX: 00007f9ad46b4b00 [ +0 .000000] RDX: 0000000000000002 RSI: 00007f9ad48a7417 RDI: 0000000000000009 [+0.000000] RBP: 0000000000000002 R08 ---truncado-- -"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.7.7",
|
||||
"matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2d392f7268a1a9bfbd98c831f0f4c964e59aa145",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9671761792156f2339627918bafcd713a8a6f777",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2d392f7268a1a9bfbd98c831f0f4c964e59aa145",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9671761792156f2339627918bafcd713a8a6f777",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26729",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-03T17:15:50.820",
|
||||
"lastModified": "2024-11-21T09:02:56.113",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-07T21:14:13.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,114 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: corrige una posible desreferencia de puntero nulo en dc_dmub_srv. Corrige posibles advertencias de desreferencia de puntero nulo en las funciones dc_dmub_srv_cmd_list_queue_execute() y dc_dmub_srv_is_hw_pwr_up(). En ambas funciones, se estaba desreferenciando la variable 'dc_dmub_srv' antes de verificar si era nula. Esto podr\u00eda provocar una desreferencia del puntero nulo si 'dc_dmub_srv' es nulo. La soluci\u00f3n es comprobar si 'dc_dmub_srv' es nulo antes de eliminar la referencia a \u00e9l. Por lo tanto, se mueven las comprobaciones nulas de 'dc_dmub_srv' al comienzo de las funciones para garantizar que 'dc_dmub_srv' no sea nulo cuando se desreferencia. Encontrado por smatch y arreglando as\u00ed lo siguiente: drivers/gpu/drm/amd/amdgpu/../display/dc/dc_dmub_srv.c:133 dc_dmub_srv_cmd_list_queue_execute() advertencia: variable desreferenciada antes de verificar 'dc_dmub_srv' (ver l\u00ednea 128) drivers/ gpu/drm/amd/amdgpu/../display/dc/dc_dmub_srv.c:1167 dc_dmub_srv_is_hw_pwr_up() advertencia: variable desreferenciada antes de verificar 'dc_dmub_srv' (ver l\u00ednea 1164)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.7.7",
|
||||
"matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/351080ba3414c96afff0f1338b4aeb2983195b80",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d2b48f340d9e4a8fbeb1cdc84cd8da6ad143a907",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/351080ba3414c96afff0f1338b4aeb2983195b80",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d2b48f340d9e4a8fbeb1cdc84cd8da6ad143a907",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26738",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-03T17:15:51.303",
|
||||
"lastModified": "2024-11-21T09:02:57.417",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-07T21:13:43.273",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,135 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc/pseries/iommu: la adici\u00f3n de DLPAR no inicializa completamente pci_controller Cuando se agrega din\u00e1micamente un dispositivo PCI, el kernel falla con una desreferencia del puntero NULL: ERROR: desreferencia del puntero NULL del kernel activado le\u00eddo en 0x00000030 Direcci\u00f3n de instrucci\u00f3n err\u00f3nea: 0xc0000000006bbe5c Vaya: acceso al kernel del \u00e1rea defectuosa, firma: 11 [#1] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 M\u00f3dulos NUMA pSeries vinculados en: rpadlpar_io rpaphp rpcsec_gss_krb5 auth_r pcgss nfsv4 dns_resolver nfs lockd gracia fscache netfs xsk_diag vinculaci\u00f3n nft_compat nf_tables nfnetlink rfkill binfmt_misc dm_multipath rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_core_mod ib_umad ib_iser libiscsi scsi_transport_iscsi ib_ipoib rdma_cm iw_cm ib_cm mlx5 _ib ib_uverbs ib_core pseries_rng drm drm_panel_orientation_quirks xfs libcrc32c mlx5_core mlxfw sd_mod t10_pi sg tls ibmvscsi ibmveth scsi_transport_srp vmx_crypto pseries_wdt psample dm_mirror dm_region_hash dm_log dm_mod CPU fusible : 17 PID: 2685 Comm: drmgr No contaminado 6.7.0-203405+ #66 Nombre de hardware: IBM,9080-HEX POWER10 (sin procesar) 0x800200 0xf000006 de:IBM,FW1060.00 (NH1060_008) hv:phyp pSeries NIP: c0000000006b be5c LR : c000000000a13e68 CTR: c0000000000579f8 REGS: c00000009924f240 TRAP: 0300 No contaminado (6.7.0-203405+) MSR: 8000000000009033 CR: 2400 2220 XER: 20040006 CFAR: c000000000a13e64 DAR: 0000000000000030 DSISR: 40000000 IRQMASK: 0 ... NIP sysfs_add_link_to_group+0x34/0x94 LR iommu_device_link+0x5c/0x118 Seguimiento de llamadas: iommu_init_device+0x26c/0x318 (no confiable) iommu_device_ enlace+0x5c/0x118 iommu_init_device+0xa8/0x318 iommu_probe_device+0xc0/0x134 iommu_bus_notifier+ 0x44/0x104 notifier_call_chain+0xb8/0x19c blocking_notifier_call_chain+0x64/0x98 bus_notify+0x50/0x7c device_add+0x640/0x918 pci_device_add+0x23c/0x298 of_create_pci_dev+0x400/0x884 of_s can_pci_dev+0x124/0x1b0 __of_scan_bus+0x78/0x18c pcibios_scan_phb+0x2a4/0x3b0 init_phb_dynamic+ 0xb8/0x110 dlpar_add_slot+0x170/0x3b8 [rpadlpar_io] add_slot_store.part.0+0xb4/0x130 [rpadlpar_io] kobj_attr_store+0x2c/0x48 sysfs_kf_write+0x64/0x78 kernfs_fop_write_iter+0x1b 0/0x290 vfs_write+0x350/0x4a0 ksys_write+0x84/0x140 system_call_exception+ 0x124/0x330 system_call_vectored_common+0x15c/0x2ec el commit a940904443e4 (\"powerpc/iommu: agregue iommu_ops para informar capacidades y permitir dominios de bloqueo\") rompi\u00f3 la adici\u00f3n DLPAR de dispositivos PCI. Lo anterior agreg\u00f3 la estructura iommu_device a pci_controller. Durante el arranque del SYSTEM, se descubren dispositivos PCI y esta estructura iommu_device reci\u00e9n agregada se inicializa mediante una llamada a iommu_device_register(). Durante la adici\u00f3n DLPAR de un dispositivo PCI, se asigna una nueva estructura pci_controller pero no se realizan llamadas a la interfaz iommu_device_register(). La soluci\u00f3n es registrar tambi\u00e9n el dispositivo iommu durante la adici\u00f3n de DLPAR."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4",
|
||||
"versionEndExcluding": "6.6.19",
|
||||
"matchCriteriaId": "42342D9F-A537-444E-8441-E8C6CAD53884"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.7.7",
|
||||
"matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/46e36ebd5e00a148b67ed77c1d31675996f77c25",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a5c57fd2e9bd1c8ea8613a8f94fd0be5eccbf321",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b8315b2e25b4e68e42fcb74630f824b9a5067765",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/46e36ebd5e00a148b67ed77c1d31675996f77c25",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a5c57fd2e9bd1c8ea8613a8f94fd0be5eccbf321",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b8315b2e25b4e68e42fcb74630f824b9a5067765",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26754",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-03T17:15:52.050",
|
||||
"lastModified": "2024-11-21T09:02:59.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-07T21:13:04.700",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,79 +15,273 @@
|
||||
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: gtp: corrige use-after-free y null-ptr-deref en gtp_genl_dump_pdp() La estructura de operaciones pernet gtp_net_ops para el subSYSTEM debe registrarse antes de registrar la familia netlink gen\u00e9rica. Syzkaller encontr\u00f3 el error 'fallo de protecci\u00f3n general en gtp_genl_dump_pdp': fallo de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN NOPTI KASAN: null-ptr-deref en el rango [0x0000000000000010-0x00000000000000 017] CPU: 1 PID : 5826 Comm: gtp Not tainted 6.8.0-rc3-std-def-alt1 #1 Nombre del hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009), BIOS 1.16.0-alt1 01/04/2014 RIP: 0010:gtp_genl_dump_pdp +0x1be/0x800 [gtp] C\u00f3digo: c6 89 c6 e8 64 e9 86 df 58 45 85 f6 0f 85 4e 04 00 00 e8 c5 ee 86 df 48 8b 54 24 18 48 b8 00 00 00 00 00 fc ff df 48 c1 e un 03 <80> 3c 02 00 0f 85 de 05 00 00 48 8b 44 24 18 4c 8b 30 4c 39 f0 74 RSP: 0018:ffff888014107220 EFLAGS: 00010202 RAX: dffffc0000000000 RBX : 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 00000000000000000 R11: 0000000000000000 R12 : 0000000000000000 R13: ffff88800fcda588 R14: 0000000000000001 R15: 0000000000000000 FS: 00007f1be4eb05c0(0000) GS:ffff88806ce80000(0000) kn lGS:0000000000000000 CS: 0010 DS: 0000 ES : 0000 CR0: 0000000080050033 CR2: 00007f1be4e766cf CR3: 000000000c33e000 CR4: 0000000000750ef0 PKRU: 55555554 Seguimiento de llamadas: ? show_regs+0x90/0xa0? die_addr+0x50/0xd0? exc_general_protection+0x148/0x220? asm_exc_general_protection+0x22/0x30? gtp_genl_dump_pdp+0x1be/0x800 [gtp] ? __alloc_skb+0x1dd/0x350 ? __pfx___alloc_skb+0x10/0x10 genl_dumpit+0x11d/0x230 netlink_dump+0x5b9/0xce0 ? lockdep_hardirqs_on_prepare+0x253/0x430? __pfx_netlink_dump+0x10/0x10 ? kasan_save_track+0x10/0x40? __kasan_kmalloc+0x9b/0xa0 ? genl_start+0x675/0x970 __netlink_dump_start+0x6fc/0x9f0 genl_family_rcv_msg_dumpit+0x1bb/0x2d0 ? __pfx_genl_family_rcv_msg_dumpit+0x10/0x10 ? genl_op_from_small+0x2a/0x440? cap_capaz+0x1d0/0x240 ? __pfx_genl_start+0x10/0x10? __pfx_genl_dumpit+0x10/0x10 ? __pfx_genl_done+0x10/0x10 ? seguridad_capaz+0x9d/0xe0"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.7",
|
||||
"versionEndExcluding": "4.19.308",
|
||||
"matchCriteriaId": "7C8E75DC-9A95-42F1-A4E0-0C7AB700F7F3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.270",
|
||||
"matchCriteriaId": "5D8044B1-C7E8-44A4-9F03-A4D7BCDB1721"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.211",
|
||||
"matchCriteriaId": "7DDA4DCF-671D-415D-94DF-6E3C77DF0704"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.150",
|
||||
"matchCriteriaId": "CB6C60DE-9E0C-46C5-904D-D4F4031F8E95"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.80",
|
||||
"matchCriteriaId": "BA7850CE-97C9-4408-A348-6173296BCA2B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.19",
|
||||
"matchCriteriaId": "8D82004C-B2AE-4048-9344-32EFF65953B0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.7.7",
|
||||
"matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/136cfaca22567a03bbb3bf53a43d8cb5748b80ec",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2e534fd15e5c2ca15821c897352cf0e8a3e30dca",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3963f16cc7643b461271989b712329520374ad2a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5013bd54d283eda5262c9ae3bcc966d01daf8576",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a576308800be28f2eaa099e7caad093b97d66e77",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ba6b8b02a3314e62571a540efa96560888c5f03e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f0ecdfa679189d26aedfe24212d4e69e42c2c861",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f8cbd1791900b5d96466eede8e9439a5b9ca4de7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/136cfaca22567a03bbb3bf53a43d8cb5748b80ec",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2e534fd15e5c2ca15821c897352cf0e8a3e30dca",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3963f16cc7643b461271989b712329520374ad2a",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5013bd54d283eda5262c9ae3bcc966d01daf8576",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a576308800be28f2eaa099e7caad093b97d66e77",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ba6b8b02a3314e62571a540efa96560888c5f03e",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f0ecdfa679189d26aedfe24212d4e69e42c2c861",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f8cbd1791900b5d96466eede8e9439a5b9ca4de7",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-26855",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-04-17T11:15:08.690",
|
||||
"lastModified": "2024-11-21T09:03:13.437",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-07T22:06:59.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,67 +15,246 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: ice: corrige una posible desreferencia de puntero NULL en ice_bridge_setlink() La funci\u00f3n ice_bridge_setlink() puede encontrar una desreferencia de puntero NULL si nlmsg_find_attr() devuelve NULL y br_spec se desreferencia posteriormente en nla_for_each_nested( ). Para solucionar este problema, agregue una verificaci\u00f3n para garantizar que br_spec no sea NULL antes de continuar con la iteraci\u00f3n del atributo anidado."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.272",
|
||||
"matchCriteriaId": "06199E67-91F5-4EC0-828B-22825E4DBAD1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.213",
|
||||
"matchCriteriaId": "CE7B425A-A38B-494A-AA47-EC2251748164"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.152",
|
||||
"matchCriteriaId": "DBBE9241-559E-479A-895A-02186BA03EBF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.82",
|
||||
"matchCriteriaId": "933AC628-7DAD-4B2D-82E3-3B7B331B1C09"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.22",
|
||||
"matchCriteriaId": "AC6FD6F8-5B16-4F53-8116-D42F4BF4FBAC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.7.10",
|
||||
"matchCriteriaId": "FB4549F9-0160-455F-8CDC-98D38AEF6D66"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/06e456a05d669ca30b224b8ed962421770c1496c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0e296067ae0d74a10b4933601f9aa9f0ec8f157f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1a770927dc1d642b22417c3e668c871689fc58b3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/37fe99016b12d32100ce670216816dba6c48b309",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8d95465d9a424200485792858c5b3be54658ce19",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/afdd29726a6de4ba27cd15590661424c888dc596",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d9fefc51133107e59d192d773be86c1150cfeebb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/06e456a05d669ca30b224b8ed962421770c1496c",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0e296067ae0d74a10b4933601f9aa9f0ec8f157f",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1a770927dc1d642b22417c3e668c871689fc58b3",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/37fe99016b12d32100ce670216816dba6c48b309",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8d95465d9a424200485792858c5b3be54658ce19",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/afdd29726a6de4ba27cd15590661424c888dc596",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d9fefc51133107e59d192d773be86c1150cfeebb",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28760",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-05-14T15:14:40.643",
|
||||
"lastModified": "2024-11-21T09:06:54.740",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-07T21:02:43.143",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,24 +69,74 @@
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0.0.1",
|
||||
"versionEndExcluding": "11.0.0.26",
|
||||
"matchCriteriaId": "056DBFFF-F476-4595-BE83-21661986A05F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.0.1.0",
|
||||
"versionEndExcluding": "12.0.12.1",
|
||||
"matchCriteriaId": "52DD0479-B430-4320-9AD3-71CD847B7DD0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/285244",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7150845",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/285244",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7150845",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28761",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-05-14T15:14:41.123",
|
||||
"lastModified": "2024-11-21T09:06:54.880",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-07T21:02:54.690",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,97 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0.0.1",
|
||||
"versionEndExcluding": "11.0.0.26",
|
||||
"matchCriteriaId": "056DBFFF-F476-4595-BE83-21661986A05F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.0.1.0",
|
||||
"versionEndExcluding": "12.0.12.1",
|
||||
"matchCriteriaId": "52DD0479-B430-4320-9AD3-71CD847B7DD0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/285245",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7150847",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/285245",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7150847",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31893",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-05-22T19:15:08.893",
|
||||
"lastModified": "2024-11-21T09:14:05.667",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-07T21:03:12.027",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,24 +69,67 @@
|
||||
"value": "CWE-324"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-672"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.0.1.0",
|
||||
"versionEndExcluding": "12.0.12.2",
|
||||
"matchCriteriaId": "C00FDFA6-B48D-4308-891D-54213C436685"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/288174",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7154606",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/288174",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7154606",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-31904",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-05-22T19:15:09.153",
|
||||
"lastModified": "2024-11-21T09:14:06.617",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-07T21:05:40.810",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,24 +69,74 @@
|
||||
"value": "CWE-248"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0.0.1",
|
||||
"versionEndExcluding": "11.0.0.26",
|
||||
"matchCriteriaId": "056DBFFF-F476-4595-BE83-21661986A05F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.0.1.0",
|
||||
"versionEndExcluding": "12.0.12.1",
|
||||
"matchCriteriaId": "52DD0479-B430-4320-9AD3-71CD847B7DD0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/289647",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7154607",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/289647",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7154607",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-39532",
|
||||
"sourceIdentifier": "sirt@juniper.net",
|
||||
"published": "2024-07-11T17:15:10.403",
|
||||
"lastModified": "2024-11-21T09:27:56.860",
|
||||
"lastModified": "2025-01-07T21:15:11.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An\u00a0Insertion of Sensitive Information into Log File vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to access sensitive information.\n\nWhen another user performs a specific operation, sensitive information is stored as plain text in a specific log file, so that a high-privileged attacker has access to this information.\nThis issue affects:\n\nJunos OS:\n\n\n\n * All versions before 22.1R2-S2,\n * 22.1R3 and later versions,\n * 22.2 versions before 22.2R2-S1, 22.2R3,\n * 22.3 versions before 22.3R1-S2, 22.3R2;\n\n\n\n\nJunos OS Evolved:\n\n\n\n * All versions before before 22.1R3-EVO,\n * 22.2-EVO versions before 22.2R2-S1-EVO, 22.2R3-EVO,\n * 22.3-EVO versions before 22.3R1-S1-EVO, 22.3R2-EVO."
|
||||
"value": "An Insertion of Sensitive Information into Log File vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to access sensitive information.\n\nWhen another user performs a specific operation, sensitive information is stored as plain text in a specific log file, so that a high-privileged attacker has access to this information.\nThis issue affects:\n\nJunos OS:\n\n\n\n * All versions before 21.2R3-S9;\n * \n\n21.4 versions before 21.4R3-S9;\n\n * 22.2 versions before 22.2R2-S1, 22.2R3;\n * 22.3 versions before 22.3R1-S1, 22.3R2;\n\n\n\n\nJunos OS Evolved:\n\n\n\n * All versions before before 22.1R3-EVO;\n * 22.2-EVO versions before 22.2R2-S1-EVO, 22.2R3-EVO;\n * 22.3-EVO versions before 22.3R1-S1-EVO, 22.3R2-EVO."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -16,50 +16,6 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "sirt@juniper.net",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "sirt@juniper.net",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46242",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-07T16:15:33.950",
|
||||
"lastModified": "2025-01-07T16:15:33.950",
|
||||
"lastModified": "2025-01-07T21:15:11.783",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An issue in the validate_email function in CTFd/utils/validators/__init__.py of CTFd 3.7.3 allows attackers to cause a Regular expression Denial of Service (ReDoS) via supplying a crafted string as e-mail address during registration."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://ctfd.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46603",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-07T16:15:34.370",
|
||||
"lastModified": "2025-01-07T16:15:34.370",
|
||||
"lastModified": "2025-01-07T21:15:11.983",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An XML External Entity (XXE) vulnerability in Elspec Engineering G5 Digital Fault Recorder Firmware v1.2.1.12 allows attackers to cause a Denial of Service (DoS) via a crafted XML payload."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://elspec.com",
|
||||
|
@ -2,20 +2,51 @@
|
||||
"id": "CVE-2024-48455",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-06T22:15:09.510",
|
||||
"lastModified": "2025-01-06T22:15:09.510",
|
||||
"lastModified": "2025-01-07T22:15:30.620",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Netis Wifi6 Router NX10 2.0.1.3643 and 2.0.1.3582 and Netis Wifi 11AC Router NC65 3.0.0.3749 and Netis Wifi 11AC Router NC63 3.0.0.3327 and 3.0.0.3503 and Netis Wifi 11AC Router NC21 3.0.0.3800, 3.0.0.3500 and 3.0.0.3329 and Netis Wifi Router MW5360 1.0.1.3442 and 1.0.1.3031 allows a remote attacker to obtain sensitive information via the mode_name, wl_link parameters of the skk_get.cgi component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en Netis Wifi6 Router NX10 2.0.1.3643 y 2.0.1.3582 y Netis Wifi 11AC Router NC65 3.0.0.3749 y Netis Wifi 11AC Router NC63 3.0.0.3327 y 3.0.0.3503 y Netis Wifi 11AC Router NC21 3.0.0.3800, 3.0.0.3500 y 3.0.0.3329 y Netis Wifi Router MW5360 1.0.1.3442 y 1.0.1.3031 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de los par\u00e1metros mode_name, wl_link del componente skk_get.cgi."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 2.7,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/users/h00die-gr3y/projects/1/views/1",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/users/h00die-gr3y/projects/1/views/1?pane=issue&itemId=92065458&issue=h00die-gr3y%7Ch00die-gr3y%7C2",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-53935",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-06T22:15:10.520",
|
||||
"lastModified": "2025-01-06T22:15:10.520",
|
||||
"lastModified": "2025-01-07T22:15:30.790",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The com.callos14.callscreen.colorphone (aka iCall OS17 - Color Phone Flash) application through 4.3 for Android enables any application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.callos14.callscreen.colorphone.DialerActivity component."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La aplicaci\u00f3n com.callos14.callscreen.colorphone (tambi\u00e9n conocida como iCall OS17 - Color Phone Flash) hasta la versi\u00f3n 4.3 para Android permite que cualquier aplicaci\u00f3n (sin permisos) realice llamadas telef\u00f3nicas sin interacci\u00f3n del usuario enviando una intenci\u00f3n manipulada a trav\u00e9s del componente com.callos14.callscreen.colorphone.DialerActivity."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/actuator/com.callos14.callscreen.colorphone",
|
||||
|
@ -2,20 +2,51 @@
|
||||
"id": "CVE-2024-54763",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-06T22:15:10.737",
|
||||
"lastModified": "2025-01-06T22:15:10.737",
|
||||
"lastModified": "2025-01-07T22:15:30.950",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An access control issue in the component /login/hostinfo.cgi of ipTIME A2004 v12.17.0 allows attackers to obtain sensitive information without authentication."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema de control de acceso en el componente /login/hostinfo.cgi de ipTIME A2004 v12.17.0 permite a los atacantes obtener informaci\u00f3n confidencial sin autenticaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Shuanunio/CVE_Requests/blob/main/ipTIME/A2004/ipTIME_A2004_unauthorized_access_vulnerability_first.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Shuanunio/CVE_Requests/blob/main/ipTIME/A2004/ipTIME_A2004_unauthorized_access_vulnerability_first.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,51 @@
|
||||
"id": "CVE-2024-54764",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-06T23:15:06.510",
|
||||
"lastModified": "2025-01-06T23:15:06.510",
|
||||
"lastModified": "2025-01-07T22:15:31.113",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An access control issue in the component /login/hostinfo2.cgi of ipTIME A2004 v12.17.0 allows attackers to obtain sensitive information without authentication."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema de control de acceso en el componente /login/hostinfo2.cgi de ipTIME A2004 v12.17.0 permite a los atacantes obtener informaci\u00f3n confidencial sin autenticaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Shuanunio/CVE_Requests/blob/main/ipTIME/A2004/ipTIME_A2004_unauthorized_access_vulnerability_second.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Shuanunio/CVE_Requests/blob/main/ipTIME/A2004/ipTIME_A2004_unauthorized_access_vulnerability_second.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-54879",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-06T18:15:21.880",
|
||||
"lastModified": "2025-01-06T18:15:21.880",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-07T21:15:12.170",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SeaCMS V13.1 is vulnerable to Incorrect Access Control. A logic flaw can be exploited by an attacker to allow any user to recharge members indefinitely."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "SeaCMS V13.1 es vulnerable a un control de acceso incorrecto. Un atacante puede aprovechar un fallo l\u00f3gico para permitir que cualquier usuario recargue miembros de forma indefinida."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-281"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seacms.com",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-54880",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-06T18:15:22.037",
|
||||
"lastModified": "2025-01-06T18:15:22.037",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-07T21:15:12.367",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SeaCMS V13.1 is vulnerable to Incorrect Access Control. A logic flaw can be exploited by an attacker to allow any user to register accounts in bulk."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "SeaCMS V13.1 es vulnerable a un control de acceso incorrecto. Un atacante puede aprovechar un fallo l\u00f3gico para permitir que cualquier usuario registre cuentas en masa."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-281"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.csdn.net/weixin_46686336/article/details/144797063",
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-55408",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-06T19:15:13.010",
|
||||
"lastModified": "2025-01-06T19:15:13.010",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-07T22:15:31.260",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the AsusSAIO.sys component of ASUS System Analysis IO v1.0.0 allows attackers to perform arbitrary read and write actions via supplying crafted IOCTL requests."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en el componente AsusSAIO.sys de ASUS System Analysis IO v1.0.0 permite a los atacantes realizar acciones de lectura y escritura arbitrarias mediante el suministro de solicitudes IOCTL manipuladas."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://asus.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-55410",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-07T18:15:20.387",
|
||||
"lastModified": "2025-01-07T18:15:20.387",
|
||||
"lastModified": "2025-01-07T22:15:31.423",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "An issue in the 690b33e1-0462-4e84-9bea-c7552b45432a.sys component of Asus GPU Tweak II Program Driver v1.0.0.0 allows attackers to perform arbitrary read and write actions via supplying crafted IOCTL requests."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://asus.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-56728",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-29T12:15:06.920",
|
||||
"lastModified": "2024-12-29T12:15:06.920",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-07T22:03:07.837",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,145 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: octeontx2-pf: gestionar errores otx2_mbox_get_rsp en otx2_ethtool.c. Agregar verificaci\u00f3n de puntero de error despu\u00e9s de llamar a otx2_mbox_get_rsp()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-754"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.7",
|
||||
"versionEndExcluding": "5.10.231",
|
||||
"matchCriteriaId": "3F0A8F02-4FAC-4C62-B7E1-CF1481D2D6B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.174",
|
||||
"matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.120",
|
||||
"matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.64",
|
||||
"matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.11.11",
|
||||
"matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.12",
|
||||
"versionEndExcluding": "6.12.2",
|
||||
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/05a6ce174c0c724e5914e1e5efd826bab8f382b4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2db2194727b1f49a5096c1c3981adef1b7638733",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/55c41b97001a09bb490ffa2e667e251d75d15ab1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5ff9de1f2712cbca53da2e37d831eea7ffcb43b6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6cda142cee032b8fe65ee11f78721721c3988feb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c0f64fd73b60aee85f88c270c9d714ead27a7b7a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e26f8eac6bb20b20fdb8f7dc695711ebce4c7c5c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-56729",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-29T12:15:07.023",
|
||||
"lastModified": "2024-12-29T12:15:07.023",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-07T21:53:02.797",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,103 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: smb: inicializar cfid->tcon antes de realizar operaciones de red Evitar la fuga de una referencia tcon cuando una interrupci\u00f3n de arrendamiento se ejecuta con la apertura del directorio en cach\u00e9. El procesamiento de la interrupci\u00f3n de la fuga puede tomar una referencia al tcon en cached_dir_lease_break() y luego no liberar la referencia en cached_dir_offload_close, ya que cfid->tcon sigue siendo NULL."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.1",
|
||||
"versionEndExcluding": "6.6.64",
|
||||
"matchCriteriaId": "7081676E-4D8A-48BF-AAF4-73B8F49078AE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.11.11",
|
||||
"matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.12",
|
||||
"versionEndExcluding": "6.12.2",
|
||||
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1b9ab6b648f89441c8a13cb3fd8ca83ffebc5262",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4b216c8f9c7d84ef7de33ca60b97e08e03ef3292",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/625e2357c8fcfae6e66dcc667dc656fe390bab15",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c353ee4fb119a2582d0e011f66a76a38f5cf984d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-56730",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-29T12:15:07.130",
|
||||
"lastModified": "2024-12-29T12:15:07.130",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-07T21:23:52.260",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,75 @@
|
||||
"value": "En el kernel Linux, se ha resuelto la siguiente vulnerabilidad: net/9p/usbg: se corrige la gesti\u00f3n de la asignaci\u00f3n de memoria fallida de kzalloc() En el kernel vanilla linux-next, next-20241108, la herramienta coccinelle proporcion\u00f3 el siguiente informe de error: ./net/9p/trans_usbg.c:912:5-11: ERROR: la funci\u00f3n de asignaci\u00f3n en la l\u00ednea 911 devuelve NULL, no ERR_PTR en caso de error Se corrigi\u00f3 el error de kzalloc() para gestionar el caso de retorno NULL en el agotamiento de la memoria."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.12",
|
||||
"versionEndExcluding": "6.12.2",
|
||||
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2cdb416de8b5795fd25fadcb69e1198b6df6d8cc",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ff1060813d9347e8c45c8b8cff93a4dfdb6726ad",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-56739",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-29T12:15:07.240",
|
||||
"lastModified": "2024-12-29T12:15:07.240",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-07T21:21:31.403",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,43 +15,173 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: rtc: comprobar si __rtc_read_time se ha ejecutado correctamente en rtc_timer_do_work() Si la llamada a __rtc_read_time falla, la estructura rtc_time tm; puede contener datos no inicializados o una fecha/hora ilegal le\u00edda desde el hardware RTC. Al llamar a rtc_tm_to_ktime m\u00e1s tarde, el resultado puede ser un valor muy grande (posiblemente KTIME_MAX). Si hay temporizadores peri\u00f3dicos en rtc->timerqueue, expirar\u00e1n continuamente, lo que puede provocar un bloqueo suave del kernel."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-908"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.6.38",
|
||||
"versionEndExcluding": "4.19.325",
|
||||
"matchCriteriaId": "CB94EE42-C491-42E4-9163-363118710E58"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.287",
|
||||
"matchCriteriaId": "E4B15788-D35E-4E5B-A9C0-070AE3729B34"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.231",
|
||||
"matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.174",
|
||||
"matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.120",
|
||||
"matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.64",
|
||||
"matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.11.11",
|
||||
"matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.12",
|
||||
"versionEndExcluding": "6.12.2",
|
||||
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0d68e8514d9040108ff7d1b37ca71096674b6efe",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/246f621d363988e7040f4546d20203dc713fa3e1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/39ad0a1ae17b54509cd9e93dcd8cec16e7c12d3f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/44b3257ff705d63d5f00ef8ed314a0eeb7ec37f2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a1f0b4af90cc18b10261ecde56c6a56b22c75bd1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dd4b1cbcc916fad5d10c2662b62def9f05e453d4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e77bce0a8c3989b4173c36f4195122bca8f4a3e1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e8ba8a2bc4f60a1065f23d6a0e7cbea945a0f40d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fde56535505dde3336df438e949ef4742b6d6d6e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-56740",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-29T12:15:07.360",
|
||||
"lastModified": "2024-12-29T12:15:07.360",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-07T22:24:05.593",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,75 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfs/localio: debe borrar res.replen en nfs_local_read_done De lo contrario, puede producirse corrupci\u00f3n de memoria debido a que las lecturas LOCALIO de NFSv3 dejan basura en res.replen: - nfs3_read_done() copia eso en server->read_hdrsize; desde all\u00ed, nfs3_proc_read_setup() lo copia en args.replen en nuevas solicitudes. - nfs3_xdr_enc_read3args() pasa eso a rpc_prepare_reply_pages() que lo incluye en hdrsize para xdr_init_pages, de modo que rq_rcv_buf contiene una longitud rid\u00edcula. - Esto se copia a rq_private_buf y xs_read_stream_request() eventualmente pasa el kvec a sock_recvmsg() que recibe datos entrantes en un lugar completamente equivocado. Esto se reproduce f\u00e1cilmente con NFSv3 LOCALIO, que est\u00e1 prestando servicio a las lecturas, cuando se le obliga a volver a utilizar RPC normal. Este cambio a utilizar NFSv3 normal con RPC puede ocurrir por varias razones, pero este problema se expuso con una prueba que detiene y luego reinicia el servidor NFSv3 mientras LOCALIO realiza operaciones de E/S de lectura pesadas."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.12",
|
||||
"versionEndExcluding": "6.12.2",
|
||||
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/650703bc4ed3edf841e851c99ab8e7ba9e5262a3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/de5dac261eeab99762bbdf7c20cee5d26ef4462e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-56741",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-29T12:15:07.477",
|
||||
"lastModified": "2024-12-29T12:15:07.477",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-07T22:19:45.437",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,35 +15,145 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: apparmor: prueba: Se corrige la p\u00e9rdida de memoria para aa_unpack_strdup() La cadena asignada por kmemdup() en aa_unpack_strdup() no se libera y provoca las siguientes p\u00e9rdidas de memoria; lib\u00e9rela para solucionarlo. objeto sin referencia 0xffffff80c6af8a50 (tama\u00f1o 8): comm \"kunit_try_catch\", pid 225, jiffies 4294894407 volcado hexadecimal (primeros 8 bytes): 74 65 73 74 69 6e 67 00 pruebas. seguimiento inverso (crc 5eab668b): [<0000000001e3714d>] kmemleak_alloc+0x34/0x40 [<000000006e6c7776>] __kmalloc_node_track_caller_noprof+0x300/0x3e0 [<000000006870467c>] kmemdup_noprof+0x34/0x60 [<000000001176bb03>] aa_unpack_strdup+0xd0/0x18c [<000000008ecde918>] pol\u00edtica_unpack_test_unpack_strdup_with_null_name+0xf8/0x3ec [<0000000032ef8f77>] kunit_try_run_case+0x13c/0x3ac [<00000000f3edea23>] kunit_generic_run_threadfn_adapter+0x80/0xec [<00000000adf936cf>] kthread+0x2e8/0x374 [<0000000041bb1628>] ret_from_fork+0x10/0x20 objeto sin referencia 0xffffff80c2a29090 (tama\u00f1o 8): comm \"kunit_try_catch\", pid 227, jiffies 4294894409 volcado hexadecimal (primeros 8 bytes): 74 65 73 74 69 6e 67 00 prueba. seguimiento inverso (crc 5eab668b): [<0000000001e3714d>] kmemleak_alloc+0x34/0x40 [<000000006e6c7776>] __kmalloc_node_track_caller_noprof+0x300/0x3e0 [<000000006870467c>] kmemdup_noprof+0x34/0x60 [<000000001176bb03>] aa_unpack_strdup+0xd0/0x18c [<0000000046a45c1a>] pol\u00edtica_unpack_test_unpack_strdup_with_name+0xd0/0x3c4 [<0000000032ef8f77>] kunit_try_run_case+0x13c/0x3ac [<00000000f3edea23>] kunit_generic_run_threadfn_adapter+0x80/0xec [<00000000adf936cf>] kthread+0x2e8/0x374 [<0000000041bb1628>] ret_from_fork+0x10/0x20"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.6",
|
||||
"versionEndExcluding": "5.10.231",
|
||||
"matchCriteriaId": "C4BFC75B-E0F6-4CC1-BE2F-50FBE9ECC42A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.174",
|
||||
"matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.120",
|
||||
"matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.64",
|
||||
"matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.11.11",
|
||||
"matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.12",
|
||||
"versionEndExcluding": "6.12.2",
|
||||
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2a9b68f2dc6812bd1b8880b5c00e60203d6f61f6",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/5354599855a9b5568e05ce686119ee3ff8b19bd5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/59a149e7c38e7b76616c8b333fc6aa5b6fb2293c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/7290f59231910ccba427d441a6e8b8c6f6112448",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/89265f88701e54dde255ddf862093baeca57548c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d62ee5739a66644b0e7f11e657d562458cdcdea3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f856246ff6da25c4f8fdd73a9c875e878b085e9f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-56742",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-29T12:15:07.593",
|
||||
"lastModified": "2024-12-29T12:15:07.593",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-07T22:19:23.543",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,19 +15,89 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vfio/mlx5: Se solucion\u00f3 un problema de desenrollado en mlx5vf_add_migration_pages() Se solucion\u00f3 un problema de desenrollado en mlx5vf_add_migration_pages(). Si se asigna un conjunto de p\u00e1ginas pero no se puede agregar a la tabla SG, es necesario liberarlas para evitar una p\u00e9rdida de memoria. Cualquier p\u00e1gina agregada correctamente a la tabla SG se liberar\u00e1 como parte de mlx5vf_free_data_buffer()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.18",
|
||||
"versionEndExcluding": "6.11.11",
|
||||
"matchCriteriaId": "7740549B-C7C1-452B-9F27-2ED88215F47F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.12",
|
||||
"versionEndExcluding": "6.12.2",
|
||||
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/22e87bf3f77c18f5982c19ffe2732ef0c7a25f16",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/769fe4ce444b646b0bf6ac308de80686c730c7df",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c44f1b2ddfa81c8d7f8e9b6bc76c427bc00e69d5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-56743",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-29T12:15:07.707",
|
||||
"lastModified": "2024-12-29T12:15:07.707",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-07T22:18:53.437",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,75 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfs_common: no debe mantener la RCU mientras se llama a nfsd_file_put_local Mueva la retenci\u00f3n de la RCU de nfs_to_nfsd_file_put_local a nfs_to_nfsd_net_put. Es la llamada a nfs_to->nfsd_serv_put la que requiere la RCU de todos modos (las puts para nfsd_file y netns se combinaron para evitar una referencia indirecta adicional, pero esa microoptimizaci\u00f3n ahora no es posible). Esto corrige xfstests generic/013 y su activaci\u00f3n: \"\u00a1Cambio de contexto voluntario dentro de la secci\u00f3n cr\u00edtica del lado de lectura de RCU!\" [ 143.545738] Seguimiento de llamadas: [ 143.546206] [ 143.546625] ? asm_exc_invalid_op+0x1f/0x30 [ 143.551736] ? rcu_note_context_switch+0x496/0x5d0 [ 143.552634] ? wakeup_preempt+0x62/0x70 [ 143.553358] ? __schedule+0xaa/0x1380 [ 143.554025] ? _raw_spin_unlock_irqrestore+0x12/0x40 [ 143.554958] ? try_to_wake_up+0x1fe/0x6b0 [ 143.555715] ? xfs_efi_item_format+0x50/0xc0 [xfs] [ 143.559894] lectura_bajada+0x4e/0xb0 [ 143.560519] xlog_cil_commit+0x1b2/0xbc0 [xfs] [ 143.561460] ? xfs_inode_item_precommit+0xc7/0x220 [xfs] [ 143.563309] ? xfs_trans_run_precommits+0x69/0xd0 [xfs] [ 143.564394] __xfs_trans_commit+0xb5/0x330 [xfs] [ 143.565367] xfs_trans_roll+0x48/0xc0 [xfs] [ 143.566262] xfs_defer_trans_roll+0x57/0x100 [xfs] [ 143.567278] xfs_defer_finish_noroll+0x27a/0x490 [xfs] [ 143.568342] xfs_defer_finish+0x1a/0x80 [xfs] [ 143.569267] xfs_bunmapi_range+0x4d/0xb0 [xfs] [ 143.570208] xfs_itruncate_extents_flags+0x13d/0x230 [xfs] [ 143.571353] xfs_free_eofblocks+0x12e/0x190 [xfs] [ 143.572359] xfs_file_release+0x12d/0x140 [xfs] [ 143.573324] __fput+0xe8/0x2d0 [ 143.573922] __fput_sync+0x1d/0x30 [ 143.574574] nfsd_filp_close+0x33/0x60 [nfsd] [ 143.575430] nfsd_file_free+0x96/0x150 [nfsd] [ 143.576274] nfsd_file_put+0xf7/0x1a0 [nfsd] [ 143.577104] nfsd_file_put_local+0x18/0x30 [nfsd] [ 143.578070] nfs_close_local_fh+0x101/0x110 [nfs_localio] [ 143.579079] __put_nfs_open_context+0xc9/0x180 [nfs] [ 143.580031] nfs_file_clear_open_context+0x4a/0x60 [nfs] [ 143.581038] liberaci\u00f3n_archivo_nfs+0x3e/0x60 [nfs] [ 143.581879] __fput+0xe8/0x2d0 [ 143.582464] __fput_sync+0x1d/0x30 [ 143.583108] __x64_sys_close+0x41/0x80 [ 143.583823] llamada_sys_x64+0x189a/0x20d0 [ 143.584552] llamada_sys_64+0x64/0x170 [ 143.585240] entrada_SYSCALL_64_despu\u00e9s_hwframe+0x76/0x7e [ 143.586185] Descanse en paz: 0033:0x7f3c5153efd7"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.12",
|
||||
"versionEndExcluding": "6.12.2",
|
||||
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3e6e3e97d64f50d9b6b1d62274f08925b1adbfc2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c840b8e1f039e90f97ca55525667eb961422f86c",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-56744",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-29T12:15:07.817",
|
||||
"lastModified": "2024-12-29T12:15:07.817",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-07T22:14:03.760",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,23 +15,103 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: correcci\u00f3n para evitar un posible bloqueo en f2fs_record_stop_reason() syzbot informa un problema de bloqueo de f2fs como se muestra a continuaci\u00f3n: ========================================================= ADVERTENCIA: se detect\u00f3 una posible dependencia de bloqueo circular 6.12.0-rc3-syzkaller-00087-gc964ced77262 #0 No contaminado ------------------------------------------------------ kswapd0/79 est\u00e1 intentando adquirir el bloqueo: ffff888011824088 (&sbi->sb_lock){++++}-{3:3}, en: f2fs_down_write fs/f2fs/f2fs.h:2199 [inline] ffff888011824088 (&sbi->sb_lock){++++}-{3:3}, en: f2fs_record_stop_reason+0x52/0x1d0 fs/f2fs/super.c:4068 pero la tarea ya tiene el bloqueo: ffff88804bd92610 (sb_internal#2){.+.+}-{0:0}, en: f2fs_evict_inode+0x662/0x15c0 fs/f2fs/inode.c:842 cuyo bloqueo ya depende del nuevo bloqueo. la cadena de dependencia existente (en orden inverso) es: -> #2 (sb_internal#2){.+.+}-{0:0}: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 percpu_down_read include/linux/percpu-rwsem.h:51 [en l\u00ednea] __sb_start_write include/linux/fs.h:1716 [en l\u00ednea] sb_start_intwrite+0x4d/0x1c0 include/linux/fs.h:1899 f2fs_evict_inode+0x662/0x15c0 fs/f2fs/inode.c:842 evict+0x4e8/0x9b0 fs/inode.c:725 f2fs_evict_inode+0x1a4/0x15c0 fs/f2fs/inode.c:807 desalojar+0x4e8/0x9b0 fs/inode.c:725 lista_de_eliminaci\u00f3n fs/inode.c:774 [en l\u00ednea] podar_icache_sb+0x239/0x2f0 fs/inode.c:963 super_cache_scan+0x38c/0x4b0 fs/super.c:223 encoger_losa+0x701/0x1160 mm/shrinker.c:435 encoger_losa+0x1093/0x14d0 mm/shrinker.c:662 encoger_uno+0x43b/0x850 mm/vmscan.c:4818 encoger_muchos mm/vmscan.c:4879 [en l\u00ednea] nodo_de_encogimiento_lru_gen mm/vmscan.c:4957 [en l\u00ednea] nodo_reducci\u00f3n+0x3799/0x3de0 mm/vmscan.c:5937 nodo_reducci\u00f3n_kswapd mm/vmscan.c:6765 [en l\u00ednea] balance_pgdat mm/vmscan.c:6957 [en l\u00ednea] kswapd+0x1ca3/0x3700 mm/vmscan.c:7226 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_de_la_bifurcaci\u00f3n+0x4b/0x80 arch/x86/kernel/process.c:147 ret_de_la_bifurcaci\u00f3n_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 -> #1 (fs_reclaim){+.+.}-{0:0}: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __fs_reclaim_acquire mm/page_alloc.c:3834 [en l\u00ednea] fs_reclaim_acquire+0x88/0x130 mm/page_alloc.c:3848 might_alloc include/linux/sched/mm.h:318 [en l\u00ednea] prepare_alloc_pages+0x147/0x5b0 mm/page_alloc.c:4493 __alloc_pages_noprof+0x16f/0x710 mm/page_alloc.c:4722 alloc_pages_mpol_noprof+0x3e8/0x680 mm/mempolicy.c:2265 alloc_pages_noprof mm/mempolicy.c:2345 [en l\u00ednea] folio_alloc_noprof+0x128/0x180 mm/mempolicy.c:2352 filemap_alloc_folio_noprof+0xdf/0x500 mm/filemap.c:1010 do_read_cache_folio+0x2eb/0x850 mm/filemap.c:3787 read_mapping_folio include/linux/pagemap.h:1011 [en l\u00ednea] f2fs_commit_super+0x3c0/0x7d0 fs/f2fs/super.c:4032 f2fs_record_stop_reason+0x13b/0x1d0 fs/f2fs/super.c:4079 f2fs_handle_critical_error+0x2ac/0x5c0 fs/f2fs/super.c:4174 f2fs_write_inode+0x35f/0x4d0 fs/f2fs/inode.c:785 escritura_inodo fs/fs-writeback.c:1503 [en l\u00ednea] __writeback_single_inode+0x711/0x10d0 fs/fs-writeback.c:1723 escritura_inversa_single_inode+0x1f3/0x660 fs/fs-writeback.c:1779 sync_inode_metadata+0xc4/0x120 fs/fs-writeback.c:2849 f2fs_release_file+0xa8/0x100 fs/f2fs/file.c:1941 __fput+0x23f/0x880 fs/file_table.c:431 tarea_trabajo_ejecutar+0x24f/0x310 kernel/tarea_trabajo.c:228 reanudar_modo_usuario_trabajo include/linux/reanudar_modo_usuario.h:50 [en l\u00ednea] salir_al_bucle_modo_usuario kernel/entrada/com\u00fan.c:114 [en l\u00ednea] salir_al_bucle_modo_usuario_preparar include/linux/entrada-com\u00fan.h:328 [en l\u00ednea] __syscall_salir_al_modo_usuario_trabajo kernel/entrada/com\u00fan.c:207 [en l\u00ednea] syscall_salir_al_modo_usuario_trabajo+0x168/0x370 kernel/entrada/com\u00fan.c:218 hacer_syscall_64+0x100/0x230 arch/x86/entrada/com\u00fan.c:89 entrada_SYSCALL_64_after_hwframe+0x77/0x7f ---truncado---"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-667"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4.4",
|
||||
"versionEndExcluding": "6.6.64",
|
||||
"matchCriteriaId": "D19234B8-D413-446B-AEF8-3A02C2A03442"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.11.11",
|
||||
"matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.12",
|
||||
"versionEndExcluding": "6.12.2",
|
||||
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1539a088b108996bcdaddb7775070b5163b14233",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/801092a2c9c251ef6a8678fcb8fcc1220474a697",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/ecf4e6782b01fd578b565b3dd2be7bb0ac91082e",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f10a890308a7cd8794e21f646f09827c6cb4bf5d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-56745",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-29T12:15:07.937",
|
||||
"lastModified": "2024-12-29T12:15:07.937",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-07T22:47:40.577",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,31 +15,131 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI: Corregir p\u00e9rdida de memoria de reset_method_store() En reset_method_store(), se asigna una cadena a trav\u00e9s de kstrndup() y se asigna a las \"opciones\" locales. Luego, se usa options con strsep() para buscar espacios: while ((name = strsep(&options, \" \")) != NULL) { Si no quedan espacios, strsep() establece options en NULL, por lo que el kfree(options) posterior no libera la memoria asignada a trav\u00e9s de kstrndup(). Se soluciona utilizando un tmp_options separado para iterar con strsep() de modo que se preserve options."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.15",
|
||||
"versionEndExcluding": "5.15.174",
|
||||
"matchCriteriaId": "005C9407-09BA-46F6-A8A9-A04EED9F948E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.120",
|
||||
"matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.64",
|
||||
"matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.11.11",
|
||||
"matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.12",
|
||||
"versionEndExcluding": "6.12.2",
|
||||
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2985b1844f3f3447f2d938eff1ef6762592065a5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/403efb4457c0c8f8f51e904cc57d39193780c6bd",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/543d0eb40e45c6a51f1bff02f417b602e54472d5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8e098baf6bc3f3a6aefc383509aba07e202f7ee0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/931d07ccffcc3614f20aaf602b31e89754e21c59",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fe6fae61f3b993160aef5fe2b7141a83872c144f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-56746",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-29T12:15:08.070",
|
||||
"lastModified": "2024-12-29T12:15:08.070",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-07T22:47:17.513",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,43 +15,173 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fbdev: sh7760fb: Se solucion\u00f3 una posible p\u00e9rdida de memoria en sh7760fb_alloc_mem(). Cuando la informaci\u00f3n como info->screen_base no est\u00e1 lista, llamar a sh7760fb_free_mem() no libera la memoria correctamente. En su lugar, llame a dma_free_coherent()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.6.27",
|
||||
"versionEndExcluding": "4.19.325",
|
||||
"matchCriteriaId": "ABBE7205-6BEE-4F12-87E6-E19349AB0A8A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.287",
|
||||
"matchCriteriaId": "E4B15788-D35E-4E5B-A9C0-070AE3729B34"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.231",
|
||||
"matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.174",
|
||||
"matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.120",
|
||||
"matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.64",
|
||||
"matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.11.11",
|
||||
"matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.12",
|
||||
"versionEndExcluding": "6.12.2",
|
||||
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0d3fb3b3e9d66f7b6346e3b90bc0ff48683539ce",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/29216bb390e36daeebef66abaa02d9751330252b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3dd9df8e5f34c6fc4217a7498c1fb3c352d4afc2",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/40f4326ed05a3b3537556ff2a844958b9e779a98",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bad37309c8b8bf1cfc893750df0951a804009ca0",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d10cd53e5a7fb3b7c6f83d4d9a5ea1d97a3ed9a5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d48cbfa90dce506030151915fa3346d67f964af4",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f4fbd70e15fafe36a7583954ce189aaf5536aeec",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f89d17ae2ac42931be2a0153fecbf8533280c927",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-56747",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2024-12-29T12:15:08.183",
|
||||
"lastModified": "2024-12-29T12:15:08.183",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-07T22:47:01.040",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,43 +15,173 @@
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: qedi: Se corrige una posible p\u00e9rdida de memoria en qedi_alloc_and_init_sb(). El gancho \"qedi_ops->common->sb_init = qed_sb_init\" no libera la memoria DMA sb_virt cuando falla. Agregue dma_free_coherent() para liberarla. Esta es la misma forma que qedr_alloc_mem_sb() y qede_alloc_mem_sb()."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.10",
|
||||
"versionEndExcluding": "4.19.325",
|
||||
"matchCriteriaId": "E56DA84C-65AC-480A-9C9B-B9C54A6C25DB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.20",
|
||||
"versionEndExcluding": "5.4.287",
|
||||
"matchCriteriaId": "E4B15788-D35E-4E5B-A9C0-070AE3729B34"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.5",
|
||||
"versionEndExcluding": "5.10.231",
|
||||
"matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.11",
|
||||
"versionEndExcluding": "5.15.174",
|
||||
"matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.16",
|
||||
"versionEndExcluding": "6.1.120",
|
||||
"matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.64",
|
||||
"matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.11.11",
|
||||
"matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.12",
|
||||
"versionEndExcluding": "6.12.2",
|
||||
"matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/10a6fc486ac40a410f0fb84cc15161238eccd20a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/20b775cf274cfbfa3da871a1108877e17b8b19e1",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/4e48e5b26b3edc0e1dd329201ffc924a7a1f9337",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/95bbdca4999bc59a72ebab01663d421d6ce5775d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a4d2011cbe039b25024831427b60ab91ee247066",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/b778b5240485106abf665eb509cc01779ed0cb00",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bb8b45883eb072adba297922b67d1467082ac880",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cfc76acaf2c4b43d1e140f1e4cbde15adb540bc5",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/eaf92fad1f21be63427920c12f22227e5f757424",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,24 +2,87 @@
|
||||
"id": "CVE-2024-56757",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-01-06T17:15:40.297",
|
||||
"lastModified": "2025-01-06T17:15:40.297",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-07T22:46:35.897",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btusb: mediatek: add intf release flow when usb disconnect\n\nMediaTek claim an special usb intr interface for ISO data transmission.\nThe interface need to be released before unregistering hci device when\nusb disconnect. Removing BT usb dongle without properly releasing the\ninterface may cause Kernel panic while unregister hci device."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: btusb: mediatek: agregar flujo de liberaci\u00f3n de intf cuando se desconecta el USB MediaTek reclama una interfaz USB intr especial para la transmisi\u00f3n de datos ISO. La interfaz debe liberarse antes de anular el registro del dispositivo HCI cuando se desconecta el USB. Quitar el dispositivo USB BT sin liberar correctamente la interfaz puede provocar un p\u00e1nico del kernel al anular el registro del dispositivo HCI."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-404"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "6.12.8",
|
||||
"matchCriteriaId": "37A8903F-DC48-45AD-98DC-188AFD7C5844"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/489304e67087abddc2666c5af0159cb95afdcf59",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/cc569d791ab2a0de74f76e470515d25d24c9b84b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,24 +2,115 @@
|
||||
"id": "CVE-2024-56758",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-01-06T17:15:40.597",
|
||||
"lastModified": "2025-01-06T17:15:40.597",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-07T22:43:35.403",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: check folio mapping after unlock in relocate_one_folio()\n\nWhen we call btrfs_read_folio() to bring a folio uptodate, we unlock the\nfolio. The result of that is that a different thread can modify the\nmapping (like remove it with invalidate) before we call folio_lock().\nThis results in an invalid page and we need to try again.\n\nIn particular, if we are relocating concurrently with aborting a\ntransaction, this can result in a crash like the following:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000000\n PGD 0 P4D 0\n Oops: 0000 [#1] SMP\n CPU: 76 PID: 1411631 Comm: kworker/u322:5\n Workqueue: events_unbound btrfs_reclaim_bgs_work\n RIP: 0010:set_page_extent_mapped+0x20/0xb0\n RSP: 0018:ffffc900516a7be8 EFLAGS: 00010246\n RAX: ffffea009e851d08 RBX: ffffea009e0b1880 RCX: 0000000000000000\n RDX: 0000000000000000 RSI: ffffc900516a7b90 RDI: ffffea009e0b1880\n RBP: 0000000003573000 R08: 0000000000000001 R09: ffff88c07fd2f3f0\n R10: 0000000000000000 R11: 0000194754b575be R12: 0000000003572000\n R13: 0000000003572fff R14: 0000000000100cca R15: 0000000005582fff\n FS: 0000000000000000(0000) GS:ffff88c07fd00000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000000 CR3: 000000407d00f002 CR4: 00000000007706f0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n PKRU: 55555554\n Call Trace:\n <TASK>\n ? __die+0x78/0xc0\n ? page_fault_oops+0x2a8/0x3a0\n ? __switch_to+0x133/0x530\n ? wq_worker_running+0xa/0x40\n ? exc_page_fault+0x63/0x130\n ? asm_exc_page_fault+0x22/0x30\n ? set_page_extent_mapped+0x20/0xb0\n relocate_file_extent_cluster+0x1a7/0x940\n relocate_data_extent+0xaf/0x120\n relocate_block_group+0x20f/0x480\n btrfs_relocate_block_group+0x152/0x320\n btrfs_relocate_chunk+0x3d/0x120\n btrfs_reclaim_bgs_work+0x2ae/0x4e0\n process_scheduled_works+0x184/0x370\n worker_thread+0xc6/0x3e0\n ? blk_add_timer+0xb0/0xb0\n kthread+0xae/0xe0\n ? flush_tlb_kernel_range+0x90/0x90\n ret_from_fork+0x2f/0x40\n ? flush_tlb_kernel_range+0x90/0x90\n ret_from_fork_asm+0x11/0x20\n </TASK>\n\nThis occurs because cleanup_one_transaction() calls\ndestroy_delalloc_inodes() which calls invalidate_inode_pages2() which\ntakes the folio_lock before setting mapping to NULL. We fail to check\nthis, and subsequently call set_extent_mapping(), which assumes that\nmapping != NULL (in fact it asserts that in debug mode)\n\nNote that the \"fixes\" patch here is not the one that introduced the\nrace (the very first iteration of this code from 2009) but a more recent\nchange that made this particular crash happen in practice."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: comprobar la asignaci\u00f3n de folios despu\u00e9s de desbloquear en relocate_one_folio() Cuando llamamos a btrfs_read_folio() para actualizar un folio, desbloqueamos el folio. El resultado de eso es que un hilo diferente puede modificar la asignaci\u00f3n (como eliminarla con invalidate) antes de que llamemos a folio_lock(). Esto da como resultado una p\u00e1gina no v\u00e1lida y debemos volver a intentarlo. En particular, si estamos reubicando simult\u00e1neamente y abortando una transacci\u00f3n, esto puede resultar en un bloqueo como el siguiente: ERROR: desreferencia de puntero NULL del n\u00facleo, direcci\u00f3n: 0000000000000000 PGD 0 P4D 0 Oops: 0000 [#1] SMP CPU: 76 PID: 1411631 Comm: kworker/u322:5 Workqueue: events_unbound btrfs_reclaim_bgs_work RIP: 0010:set_page_extent_mapped+0x20/0xb0 RSP: 0018:ffffc900516a7be8 EFLAGS: 00010246 RAX: ffffea009e851d08 RBX: ffffea009e0b1880 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffc900516a7b90 RDI: ffffea009e0b1880 RBP: 0000000003573000 R08: 0000000000000001 R09: ffff88c07fd2f3f0 R10: 000000000000000 R11: 0000194754b575be R12: 0000000003572000 R13: 0000000003572fff R14: 0000000000100cca R15: 0000000005582fff FS: 0000000000000000(0000) GS:ffff88c07fd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000000000 CR3: 000000407d00f002 CR4: 00000000007706f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 00000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Seguimiento de llamadas: ? __die+0x78/0xc0 ? page_fault_oops+0x2a8/0x3a0 ? __switch_to+0x133/0x530 ? wq_worker_running+0xa/0x40 ? exc_page_fault+0x63/0x130 ? asm_exc_page_fault+0x22/0x30 ? blk_add_timer+0xb0/0xb0 kthread+0xae/0xe0 ? flush_tlb_kernel_range+0x90/0x90 ret_from_fork+0x2f/0x40 ? flush_tlb_kernel_range+0x90/0x90 ret_from_fork_asm+0x11/0x20 Esto ocurre porque cleanup_one_transaction() llama a destroy_delalloc_inodes() que llama a invalidate_inode_pages2() que toma el folio_lock antes de establecer mapping en NULL. No comprobamos esto y, posteriormente, llamamos a set_extent_mapping(), que supone que mapping != NULL (de hecho, lo afirma en modo de depuraci\u00f3n). Tenga en cuenta que el parche de \"correcciones\" aqu\u00ed no es el que introdujo la ejecuci\u00f3n(la primera iteraci\u00f3n de este c\u00f3digo de 2009), sino un cambio m\u00e1s reciente que hizo que este fallo en particular sucediera en la pr\u00e1ctica."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.1.54",
|
||||
"versionEndExcluding": "6.2",
|
||||
"matchCriteriaId": "AF92BAD7-36C7-4B11-8CAA-5B5EFABE096A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.5.4",
|
||||
"versionEndExcluding": "6.12.8",
|
||||
"matchCriteriaId": "74FB61B2-9981-44D8-A191-6219D9D9CBCB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3e74859ee35edc33a022c3f3971df066ea0ca6b9",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d508e56270389b3a16f5b3cf247f4eb1bbad1578",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,32 +2,171 @@
|
||||
"id": "CVE-2024-56766",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-01-06T17:15:43.127",
|
||||
"lastModified": "2025-01-06T17:15:43.127",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-07T22:59:50.807",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: rawnand: fix double free in atmel_pmecc_create_user()\n\nThe \"user\" pointer was converted from being allocated with kzalloc() to\nbeing allocated by devm_kzalloc(). Calling kfree(user) will lead to a\ndouble free."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mtd: rawnand: se corrige una liberaci\u00f3n doble en atmel_pmecc_create_user(). El puntero \"usuario\" pas\u00f3 de estar asignado con kzalloc() a estar asignado por devm_kzalloc(). Llamar a kfree(user) provocar\u00e1 una liberaci\u00f3n doble."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-415"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.19.325",
|
||||
"versionEndExcluding": "4.20",
|
||||
"matchCriteriaId": "3C960EB7-4E90-49E0-BB92-BE6F1B8CF26F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.4.287",
|
||||
"versionEndExcluding": "5.5",
|
||||
"matchCriteriaId": "2E049AFB-F729-4E03-87D4-2BB4FFA5E622"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.10.231",
|
||||
"versionEndExcluding": "5.11",
|
||||
"matchCriteriaId": "055DF185-747E-444A-AEC9-E23AA67777A2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.15.174",
|
||||
"versionEndExcluding": "5.16",
|
||||
"matchCriteriaId": "5EDFC1D5-0414-42C6-B6E2-1101700AA7DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.1.120",
|
||||
"versionEndExcluding": "6.1.123",
|
||||
"matchCriteriaId": "010819A3-7BB5-4ACE-9F5E-C53664C957C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.6.64",
|
||||
"versionEndExcluding": "6.6.69",
|
||||
"matchCriteriaId": "1DA730E9-7DB9-4919-A111-9038A4685B92"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.11.11",
|
||||
"versionEndExcluding": "6.12",
|
||||
"matchCriteriaId": "4CBF5F6E-D446-4CAE-AAA4-413442319824"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.12.2",
|
||||
"versionEndExcluding": "6.12.8",
|
||||
"matchCriteriaId": "42EECCF9-F7F0-46E2-A493-B31E541E6147"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/6ea15205d7e2b811fbbdf79783f686f58abfb4b7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d2f090ea57f8d6587e09d4066f740a8617767b3d",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/d8e4771f99c0400a1873235704b28bb803c83d17",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/dd45c87782738715d5e7c167f8dabf0814a7394a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,32 +2,136 @@
|
||||
"id": "CVE-2024-56767",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-01-06T17:15:43.477",
|
||||
"lastModified": "2025-01-06T17:15:43.477",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-07T22:51:02.250",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset\n\nThe at_xdmac_memset_create_desc may return NULL, which will lead to a\nnull pointer dereference. For example, the len input is error, or the\natchan->free_descs_list is empty and memory is exhausted. Therefore, add\ncheck to avoid this."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dmaengine: at_xdmac: evitar null_prt_deref en at_xdmac_prep_dma_memset El par\u00e1metro at_xdmac_memset_create_desc puede devolver NULL, lo que provocar\u00e1 una desreferencia de puntero nulo. Por ejemplo, la entrada len es un error o la lista atchan->free_descs_list est\u00e1 vac\u00eda y la memoria est\u00e1 agotada. Por lo tanto, agregue una comprobaci\u00f3n para evitar esto."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.2",
|
||||
"versionEndExcluding": "6.1.123",
|
||||
"matchCriteriaId": "F5F0EA73-3F4D-47C1-9667-244C435D9457"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.69",
|
||||
"matchCriteriaId": "EF18E3CB-058C-4836-B36D-8073F1C09977"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.12.8",
|
||||
"matchCriteriaId": "E79883DD-75BE-4DA9-B4EC-AC6DE63BD438"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/54376d8d26596f98ed7432a788314bb9154bf3e3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c43ec96e8d34399bd9dab2f2dc316b904892133f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/e658f1c133b854b2ae799147301d82dddb8f3162",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/fdba6d5e455388377ec7e82a5913ddfcc7edd93b",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,24 +2,103 @@
|
||||
"id": "CVE-2024-56768",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-01-06T17:15:43.800",
|
||||
"lastModified": "2025-01-06T17:15:43.800",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-07T22:50:43.207",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix bpf_get_smp_processor_id() on !CONFIG_SMP\n\nOn x86-64 calling bpf_get_smp_processor_id() in a kernel with CONFIG_SMP\ndisabled can trigger the following bug, as pcpu_hot is unavailable:\n\n [ 8.471774] BUG: unable to handle page fault for address: 00000000936a290c\n [ 8.471849] #PF: supervisor read access in kernel mode\n [ 8.471881] #PF: error_code(0x0000) - not-present page\n\nFix by inlining a return 0 in the !CONFIG_SMP case."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: Corregir bpf_get_smp_processor_id() en !CONFIG_SMP En x86-64, llamar a bpf_get_smp_processor_id() en un kernel con CONFIG_SMP deshabilitado puede provocar el siguiente error, ya que pcpu_hot no est\u00e1 disponible: [ 8.471774] ERROR: no se puede gestionar el error de p\u00e1gina para la direcci\u00f3n: 00000000936a290c [ 8.471849] #PF: acceso de lectura de supervisor en modo kernel [ 8.471881] #PF: error_code(0x0000) - p\u00e1gina no presente Corregir incrustando un retorno 0 en el caso de !CONFIG_SMP."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.10",
|
||||
"versionEndExcluding": "6.12.8",
|
||||
"matchCriteriaId": "BCD9BDC5-9E29-45B5-92A6-8752B9E03902"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/23579010cf0a12476e96a5f1acdf78a9c5843657",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f4ab7d74247b0150547cf909b3f6f24ee85183df",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,32 +2,131 @@
|
||||
"id": "CVE-2024-56769",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-01-06T17:15:44.063",
|
||||
"lastModified": "2025-01-06T17:15:44.063",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-07T22:49:54.483",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg\n\nSyzbot reports [1] an uninitialized value issue found by KMSAN in\ndib3000_read_reg().\n\nLocal u8 rb[2] is used in i2c_transfer() as a read buffer; in case\nthat call fails, the buffer may end up with some undefined values.\n\nSince no elaborate error handling is expected in dib3000_write_reg(),\nsimply zero out rb buffer to mitigate the problem.\n\n[1] Syzkaller report\ndvb-usb: bulk message failed: -22 (6/0)\n=====================================================\nBUG: KMSAN: uninit-value in dib3000mb_attach+0x2d8/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758\n dib3000mb_attach+0x2d8/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758\n dibusb_dib3000mb_frontend_attach+0x155/0x2f0 drivers/media/usb/dvb-usb/dibusb-mb.c:31\n dvb_usb_adapter_frontend_init+0xed/0x9a0 drivers/media/usb/dvb-usb/dvb-usb-dvb.c:290\n dvb_usb_adapter_init drivers/media/usb/dvb-usb/dvb-usb-init.c:90 [inline]\n dvb_usb_init drivers/media/usb/dvb-usb/dvb-usb-init.c:186 [inline]\n dvb_usb_device_init+0x25a8/0x3760 drivers/media/usb/dvb-usb/dvb-usb-init.c:310\n dibusb_probe+0x46/0x250 drivers/media/usb/dvb-usb/dibusb-mb.c:110\n...\nLocal variable rb created at:\n dib3000_read_reg+0x86/0x4e0 drivers/media/dvb-frontends/dib3000mb.c:54\n dib3000mb_attach+0x123/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758\n..."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: dvb-frontends: dib3000mb: correcci\u00f3n de un valor no inicializado en dib3000_write_reg Syzbot informa [1] de un problema de valor no inicializado encontrado por KMSAN en dib3000_read_reg(). El rb u8 local [2] se utiliza en i2c_transfer() como un b\u00fafer de lectura; en caso de que esa llamada falle, el b\u00fafer puede terminar con algunos valores indefinidos. Dado que no se espera una gesti\u00f3n elaborada de errores en dib3000_write_reg(), simplemente ponga a cero el b\u00fafer rb para mitigar el problema. [1] Syzkaller informa dvb-usb: error en el mensaje masivo: -22 (6/0) ======================================================= ERROR: KMSAN: valor no inicializado en dib3000mb_attach+0x2d8/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758 dib3000mb_attach+0x2d8/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758 dibusb_dib3000mb_frontend_attach+0x155/0x2f0 drivers/media/usb/dvb-usb/dibusb-mb.c:31 dvb_usb_adapter_frontend_init+0xed/0x9a0 drivers/media/usb/dvb-usb/dvb-usb-dvb.c:290 dvb_usb_adapter_init drivers/media/usb/dvb-usb/dvb-usb-init.c:90 [en l\u00ednea] dvb_usb_init drivers/media/usb/dvb-usb/dvb-usb-init.c:186 [en l\u00ednea] dvb_usb_device_init+0x25a8/0x3760 drivers/media/usb/dvb-usb/dvb-usb-init.c:310 dibusb_probe+0x46/0x250 drivers/media/usb/dvb-usb/dibusb-mb.c:110 ... Variable local rb manipulado en: dib3000_read_reg+0x86/0x4e0 drivers/media/dvb-frontends/dib3000mb.c:54 dib3000mb_attach+0x123/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758 ..."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-908"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.6.19",
|
||||
"versionEndExcluding": "6.1.123",
|
||||
"matchCriteriaId": "C5D912DD-BB55-4C0A-AEDF-47A0C02B408C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.2",
|
||||
"versionEndExcluding": "6.6.69",
|
||||
"matchCriteriaId": "EF18E3CB-058C-4836-B36D-8073F1C09977"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.7",
|
||||
"versionEndExcluding": "6.12.8",
|
||||
"matchCriteriaId": "E79883DD-75BE-4DA9-B4EC-AC6DE63BD438"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/1d6de21f00293d819b5ca6dbe75ff1f3b6392140",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/2dd59fe0e19e1ab955259978082b62e5751924c7",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/3876e3a1c31a58a352c6bf5d2a90e3304445a637",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/c1197c1457bb7098cf46366e898eb52b41b6876a",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-221xx/CVE-2025-22132.json
Normal file
64
CVE-2025/CVE-2025-221xx/CVE-2025-22132.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-22132",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-07T22:15:31.590",
|
||||
"lastModified": "2025-01-07T22:15:31.590",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WeGIA is a web manager for charitable institutions. A Cross-Site Scripting (XSS) vulnerability was identified in the file upload functionality of the WeGIA/html/socio/sistema/controller/controla_xlsx.php endpoint. By uploading a file containing malicious JavaScript code, an attacker can execute arbitrary scripts in the context of a victim's browser. This can lead to information theft, session hijacking, and other forms of client-side exploitation. This vulnerability is fixed in 3.2.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nilsonLazarin/WeGIA/commit/330f641db43cfb0c8ea8bb6025cc0732de4d4d6b",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nilsonLazarin/WeGIA/security/advisories/GHSA-h8hr-jhcx-fcv9",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-221xx/CVE-2025-22133.json
Normal file
64
CVE-2025/CVE-2025-221xx/CVE-2025-22133.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-22133",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-07T22:15:31.740",
|
||||
"lastModified": "2025-01-07T22:15:31.740",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WeGIA is a web manager for charitable institutions. Prior to 3.2.8, a critical vulnerability was identified in the /WeGIA/html/socio/sistema/controller/controla_xlsx.php endpoint. The endpoint accepts file uploads without proper validation, allowing the upload of malicious files, such as .phar, which can then be executed by the server. This vulnerability is fixed in 3.2.8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.9,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/nilsonLazarin/WeGIA/commit/a08f04de96d3caec85496d7a89a5b82d1960d9dd",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/nilsonLazarin/WeGIA/security/advisories/GHSA-mjgr-2jxv-v8qf",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
73
README.md
73
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-01-07T21:00:22.641032+00:00
|
||||
2025-01-07T23:00:22.280308+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-01-07T20:53:53.143000+00:00
|
||||
2025-01-07T22:59:50.807000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,54 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
276205
|
||||
276208
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `10`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2022-41572](CVE-2022/CVE-2022-415xx/CVE-2022-41572.json) (`2025-01-07T20:15:27.943`)
|
||||
- [CVE-2022-41573](CVE-2022/CVE-2022-415xx/CVE-2022-41573.json) (`2025-01-07T20:15:28.057`)
|
||||
- [CVE-2022-45185](CVE-2022/CVE-2022-451xx/CVE-2022-45185.json) (`2025-01-07T20:15:28.173`)
|
||||
- [CVE-2022-45186](CVE-2022/CVE-2022-451xx/CVE-2022-45186.json) (`2025-01-07T20:15:28.293`)
|
||||
- [CVE-2024-35532](CVE-2024/CVE-2024-355xx/CVE-2024-35532.json) (`2025-01-07T20:15:29.627`)
|
||||
- [CVE-2024-40427](CVE-2024/CVE-2024-404xx/CVE-2024-40427.json) (`2025-01-07T19:15:32.260`)
|
||||
- [CVE-2024-53522](CVE-2024/CVE-2024-535xx/CVE-2024-53522.json) (`2025-01-07T20:15:30.083`)
|
||||
- [CVE-2024-54819](CVE-2024/CVE-2024-548xx/CVE-2024-54819.json) (`2025-01-07T20:15:30.197`)
|
||||
- [CVE-2024-55218](CVE-2024/CVE-2024-552xx/CVE-2024-55218.json) (`2025-01-07T20:15:30.310`)
|
||||
- [CVE-2025-0218](CVE-2025/CVE-2025-02xx/CVE-2025-0218.json) (`2025-01-07T20:15:30.710`)
|
||||
- [CVE-2024-10541](CVE-2024/CVE-2024-105xx/CVE-2024-10541.json) (`2025-01-07T21:15:11.490`)
|
||||
- [CVE-2025-22132](CVE-2025/CVE-2025-221xx/CVE-2025-22132.json) (`2025-01-07T22:15:31.590`)
|
||||
- [CVE-2025-22133](CVE-2025/CVE-2025-221xx/CVE-2025-22133.json) (`2025-01-07T22:15:31.740`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `78`
|
||||
Recently modified CVEs: `72`
|
||||
|
||||
- [CVE-2024-28914](CVE-2024/CVE-2024-289xx/CVE-2024-28914.json) (`2025-01-07T19:51:53.947`)
|
||||
- [CVE-2024-28915](CVE-2024/CVE-2024-289xx/CVE-2024-28915.json) (`2025-01-07T19:48:07.427`)
|
||||
- [CVE-2024-28917](CVE-2024/CVE-2024-289xx/CVE-2024-28917.json) (`2025-01-07T19:29:24.970`)
|
||||
- [CVE-2024-31899](CVE-2024/CVE-2024-318xx/CVE-2024-31899.json) (`2025-01-07T20:02:40.877`)
|
||||
- [CVE-2024-44292](CVE-2024/CVE-2024-442xx/CVE-2024-44292.json) (`2025-01-07T19:11:30.300`)
|
||||
- [CVE-2024-44293](CVE-2024/CVE-2024-442xx/CVE-2024-44293.json) (`2025-01-07T19:08:46.427`)
|
||||
- [CVE-2024-44298](CVE-2024/CVE-2024-442xx/CVE-2024-44298.json) (`2025-01-07T19:00:43.213`)
|
||||
- [CVE-2024-44450](CVE-2024/CVE-2024-444xx/CVE-2024-44450.json) (`2025-01-07T19:15:32.417`)
|
||||
- [CVE-2024-46602](CVE-2024/CVE-2024-466xx/CVE-2024-46602.json) (`2025-01-07T19:15:32.597`)
|
||||
- [CVE-2024-48245](CVE-2024/CVE-2024-482xx/CVE-2024-48245.json) (`2025-01-07T20:15:29.750`)
|
||||
- [CVE-2024-53345](CVE-2024/CVE-2024-533xx/CVE-2024-53345.json) (`2025-01-07T20:15:29.923`)
|
||||
- [CVE-2024-54006](CVE-2024/CVE-2024-540xx/CVE-2024-54006.json) (`2025-01-07T19:15:32.803`)
|
||||
- [CVE-2024-54007](CVE-2024/CVE-2024-540xx/CVE-2024-54007.json) (`2025-01-07T19:15:32.927`)
|
||||
- [CVE-2024-54038](CVE-2024/CVE-2024-540xx/CVE-2024-54038.json) (`2025-01-07T19:15:33.067`)
|
||||
- [CVE-2024-54042](CVE-2024/CVE-2024-540xx/CVE-2024-54042.json) (`2025-01-07T19:15:33.203`)
|
||||
- [CVE-2024-54043](CVE-2024/CVE-2024-540xx/CVE-2024-54043.json) (`2025-01-07T19:15:33.380`)
|
||||
- [CVE-2024-54044](CVE-2024/CVE-2024-540xx/CVE-2024-54044.json) (`2025-01-07T19:15:33.563`)
|
||||
- [CVE-2024-54046](CVE-2024/CVE-2024-540xx/CVE-2024-54046.json) (`2025-01-07T19:15:33.737`)
|
||||
- [CVE-2024-54047](CVE-2024/CVE-2024-540xx/CVE-2024-54047.json) (`2025-01-07T19:15:33.927`)
|
||||
- [CVE-2024-54048](CVE-2024/CVE-2024-540xx/CVE-2024-54048.json) (`2025-01-07T19:15:34.100`)
|
||||
- [CVE-2024-54050](CVE-2024/CVE-2024-540xx/CVE-2024-54050.json) (`2025-01-07T19:15:34.280`)
|
||||
- [CVE-2024-54051](CVE-2024/CVE-2024-540xx/CVE-2024-54051.json) (`2025-01-07T19:15:34.463`)
|
||||
- [CVE-2024-5445](CVE-2024/CVE-2024-54xx/CVE-2024-5445.json) (`2025-01-07T20:15:30.600`)
|
||||
- [CVE-2024-55555](CVE-2024/CVE-2024-555xx/CVE-2024-55555.json) (`2025-01-07T20:15:30.430`)
|
||||
- [CVE-2025-0299](CVE-2025/CVE-2025-02xx/CVE-2025-0299.json) (`2025-01-07T19:15:34.743`)
|
||||
- [CVE-2024-53935](CVE-2024/CVE-2024-539xx/CVE-2024-53935.json) (`2025-01-07T22:15:30.790`)
|
||||
- [CVE-2024-54763](CVE-2024/CVE-2024-547xx/CVE-2024-54763.json) (`2025-01-07T22:15:30.950`)
|
||||
- [CVE-2024-54764](CVE-2024/CVE-2024-547xx/CVE-2024-54764.json) (`2025-01-07T22:15:31.113`)
|
||||
- [CVE-2024-54879](CVE-2024/CVE-2024-548xx/CVE-2024-54879.json) (`2025-01-07T21:15:12.170`)
|
||||
- [CVE-2024-54880](CVE-2024/CVE-2024-548xx/CVE-2024-54880.json) (`2025-01-07T21:15:12.367`)
|
||||
- [CVE-2024-55408](CVE-2024/CVE-2024-554xx/CVE-2024-55408.json) (`2025-01-07T22:15:31.260`)
|
||||
- [CVE-2024-55410](CVE-2024/CVE-2024-554xx/CVE-2024-55410.json) (`2025-01-07T22:15:31.423`)
|
||||
- [CVE-2024-56728](CVE-2024/CVE-2024-567xx/CVE-2024-56728.json) (`2025-01-07T22:03:07.837`)
|
||||
- [CVE-2024-56729](CVE-2024/CVE-2024-567xx/CVE-2024-56729.json) (`2025-01-07T21:53:02.797`)
|
||||
- [CVE-2024-56730](CVE-2024/CVE-2024-567xx/CVE-2024-56730.json) (`2025-01-07T21:23:52.260`)
|
||||
- [CVE-2024-56739](CVE-2024/CVE-2024-567xx/CVE-2024-56739.json) (`2025-01-07T21:21:31.403`)
|
||||
- [CVE-2024-56740](CVE-2024/CVE-2024-567xx/CVE-2024-56740.json) (`2025-01-07T22:24:05.593`)
|
||||
- [CVE-2024-56741](CVE-2024/CVE-2024-567xx/CVE-2024-56741.json) (`2025-01-07T22:19:45.437`)
|
||||
- [CVE-2024-56742](CVE-2024/CVE-2024-567xx/CVE-2024-56742.json) (`2025-01-07T22:19:23.543`)
|
||||
- [CVE-2024-56743](CVE-2024/CVE-2024-567xx/CVE-2024-56743.json) (`2025-01-07T22:18:53.437`)
|
||||
- [CVE-2024-56744](CVE-2024/CVE-2024-567xx/CVE-2024-56744.json) (`2025-01-07T22:14:03.760`)
|
||||
- [CVE-2024-56745](CVE-2024/CVE-2024-567xx/CVE-2024-56745.json) (`2025-01-07T22:47:40.577`)
|
||||
- [CVE-2024-56746](CVE-2024/CVE-2024-567xx/CVE-2024-56746.json) (`2025-01-07T22:47:17.513`)
|
||||
- [CVE-2024-56747](CVE-2024/CVE-2024-567xx/CVE-2024-56747.json) (`2025-01-07T22:47:01.040`)
|
||||
- [CVE-2024-56757](CVE-2024/CVE-2024-567xx/CVE-2024-56757.json) (`2025-01-07T22:46:35.897`)
|
||||
- [CVE-2024-56758](CVE-2024/CVE-2024-567xx/CVE-2024-56758.json) (`2025-01-07T22:43:35.403`)
|
||||
- [CVE-2024-56766](CVE-2024/CVE-2024-567xx/CVE-2024-56766.json) (`2025-01-07T22:59:50.807`)
|
||||
- [CVE-2024-56767](CVE-2024/CVE-2024-567xx/CVE-2024-56767.json) (`2025-01-07T22:51:02.250`)
|
||||
- [CVE-2024-56768](CVE-2024/CVE-2024-567xx/CVE-2024-56768.json) (`2025-01-07T22:50:43.207`)
|
||||
- [CVE-2024-56769](CVE-2024/CVE-2024-567xx/CVE-2024-56769.json) (`2025-01-07T22:49:54.483`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
323
_state.csv
323
_state.csv
@ -162946,7 +162946,7 @@ CVE-2020-7751,0,0,5799124deef6e91709e5ed5fec8a8a58dfd29bdbf924a8749b407004f71c6e
|
||||
CVE-2020-7752,0,0,1e183a09a9702f79c06550a758fd9a1da75c0472a7242a95a17ac64530932a50,2024-11-21T05:37:44.200000
|
||||
CVE-2020-7753,0,0,30f85c85e8cbb6a43a91e611a078c97c8da287c99574493008768b687264a5d5,2024-11-21T05:37:44.317000
|
||||
CVE-2020-7754,0,0,92fc29f81e2ae89d0af49e5ebac06a75e57e8271ff64484f07cfe58d4f6a2726,2024-11-21T05:37:44.450000
|
||||
CVE-2020-7755,0,1,d6f66dc61088177368e41b2a78adba5baa79b4806a828cc662bd9d3349ea71e3,2025-01-07T19:45:20.860000
|
||||
CVE-2020-7755,0,0,d6f66dc61088177368e41b2a78adba5baa79b4806a828cc662bd9d3349ea71e3,2025-01-07T19:45:20.860000
|
||||
CVE-2020-7757,0,0,7a796924da0a0a36f602d5ac2fe11027c32436d44b0db2d6a40f376409a07578,2024-11-21T05:37:44.683000
|
||||
CVE-2020-7758,0,0,d8db0db98d50e6e3826a98fac238d383a9607eebfca39c582355be51aa52c3aa,2024-11-21T05:37:44.793000
|
||||
CVE-2020-7759,0,0,86bef14edef8f16abff95492f0199c0568e2822ebcb6d81c44a536d6d05152f4,2024-11-21T05:37:44.910000
|
||||
@ -167036,7 +167036,7 @@ CVE-2021-20447,0,0,c5b80c3e9cab0dec7042bd80d15c4a68e214d99828a5d012bc1cadfc913e7
|
||||
CVE-2021-20448,0,0,37cccd30af9b7c79bb0d01b2e89c3d72d043ff013378cd48704b48558d1f95b7,2024-11-21T05:46:36.740000
|
||||
CVE-2021-2045,0,0,dedf7d8aff603a7cd1d7b0fbd50f67e4bc4c55af370fbac985e04f14c8af38c4,2024-11-21T06:02:15.393000
|
||||
CVE-2021-20450,0,0,c277954dcc01142621c71d59d5d1fc644df23a1ada38b6368abecc3ca6c27d2c,2024-12-05T21:15:06.663000
|
||||
CVE-2021-20451,0,1,797407a62df654342e8aae6c25ae355b48050c7c796e0fa8eb4c7dcfa98ad018,2025-01-07T19:25:37.353000
|
||||
CVE-2021-20451,0,0,797407a62df654342e8aae6c25ae355b48050c7c796e0fa8eb4c7dcfa98ad018,2025-01-07T19:25:37.353000
|
||||
CVE-2021-20453,0,0,69cac692ccb994b91ee56611307326b4371e627412e63b371dd093ede4578a39,2024-11-21T05:46:37.100000
|
||||
CVE-2021-20454,0,0,b5a9b823983a12936ec287dc3098e2bed23b7aa3e8189b7deea101639225c258,2024-11-21T05:46:37.220000
|
||||
CVE-2021-20455,0,0,8b7018f692a10e801c382acdf873135d57690a09d34295e52fba3a2cb6405207,2025-01-07T16:15:27.430000
|
||||
@ -187285,7 +187285,7 @@ CVE-2021-47091,0,0,01b41e88028f350f16a13041540bc4155867909fe7c12b4c9b8428b97f0dd
|
||||
CVE-2021-47092,0,0,d6975da3bb883b2068192aa25e708d7bcd2cee4c428c25b242ef9266ba445f15,2024-11-21T06:35:22.863000
|
||||
CVE-2021-47093,0,0,8e59b890f30b57830049220e5420df84b7509112405936ef20687a0cc46d7425,2024-11-21T06:35:22.970000
|
||||
CVE-2021-47094,0,0,70c9a9987f608c1e0dea21a73ea19fe2b8d1a6f7e0c1e3046a1c2fcc811a4ae9,2024-11-21T06:35:23.090000
|
||||
CVE-2021-47095,0,1,f1325d2319a8e87982889ff7e5d6ba5a22acc09a0f6caf76a80eb14b35abca9c,2025-01-07T20:15:00.280000
|
||||
CVE-2021-47095,0,0,f1325d2319a8e87982889ff7e5d6ba5a22acc09a0f6caf76a80eb14b35abca9c,2025-01-07T20:15:00.280000
|
||||
CVE-2021-47096,0,0,a7889cc1343f95b816f2f3dd00a5e6cba7d24215c4fc0bb99eabcd7da60665f6,2024-11-21T06:35:23.370000
|
||||
CVE-2021-47097,0,0,bc6485d8fce602afec969ad73cb67c2487d0407728ebb5edcbf1c54474a627b6,2024-11-21T06:35:23.540000
|
||||
CVE-2021-47098,0,0,5f93d92c93bc0735c2ccb5f7fa279b06bb3b593f9cb4ed62248bd5b209cf2235,2024-11-21T06:35:23.650000
|
||||
@ -187298,7 +187298,7 @@ CVE-2021-47104,0,0,106f2b5520760467943f47cb23329a1907137148a138d2cede6ef704d6e19
|
||||
CVE-2021-47105,0,0,c70bcdb3e4cbea4051aa23250c557a66de07f80b342d42024622054eb24f08ea,2024-11-21T06:35:24.523000
|
||||
CVE-2021-47106,0,0,27334527400dbf9b93c9b718dd5f958b31aa596e4bfc81d49d5ef21b989aaedf,2024-11-21T06:35:24.633000
|
||||
CVE-2021-47107,0,0,be272f01aeb3781cd9faff996c74315b3c711ebc0838122ffa859b7f28658968,2024-11-21T06:35:24.743000
|
||||
CVE-2021-47108,0,1,c23d21093fa3a1351345df0e77e2a410b9bd2af3a158493fefa58626321a1a7f,2025-01-07T20:14:35.703000
|
||||
CVE-2021-47108,0,0,c23d21093fa3a1351345df0e77e2a410b9bd2af3a158493fefa58626321a1a7f,2025-01-07T20:14:35.703000
|
||||
CVE-2021-47109,0,0,d0d4755876ffc6bcaecd2654bbd49d22799ea5ef8fd867c14e00689af63486ed,2024-11-21T06:35:24.957000
|
||||
CVE-2021-47110,0,0,50cf5c09f89aeaf543ffa132567ade0b5308efed772ea95eb1751760f1f935bc,2024-11-21T06:35:25.077000
|
||||
CVE-2021-47111,0,0,6be0860ee1b01c3b774e4d6d191b57114cbf9a3d1a31a3499b909d6e18b8c18b,2024-11-21T06:35:25.200000
|
||||
@ -187628,11 +187628,11 @@ CVE-2021-47434,0,0,5d889b13cb9c4b665236a8505baf9fc1a75a9299c3e831d6b6d287c793912
|
||||
CVE-2021-47435,0,0,0399af6b00ad6d67b30f2a2d4ab4d4b1ec972f935d310d8de643cb3a5a801bba,2024-11-21T06:36:08.267000
|
||||
CVE-2021-47436,0,0,b1f66ac5efd878d993a17fd0c4c8653610f9b7bf14cd6f149a32b3292e9a73ee,2024-11-21T06:36:08.397000
|
||||
CVE-2021-47437,0,0,c01151e46ab4e7793f5441a89041baf3c67d2bee71ab3272ec9d4117f61ed3eb,2024-11-21T06:36:08.510000
|
||||
CVE-2021-47438,0,1,be81f99bd1ceb58f333eb7d8cd405f4be714465eff11c5e96abfd42454bc4f82,2025-01-07T20:14:16.923000
|
||||
CVE-2021-47438,0,0,be81f99bd1ceb58f333eb7d8cd405f4be714465eff11c5e96abfd42454bc4f82,2025-01-07T20:14:16.923000
|
||||
CVE-2021-47439,0,0,bf14a0f38b96daec4193df570224923cb3d883f9edff75541283af389e7a2865,2024-11-21T06:36:08.737000
|
||||
CVE-2021-47440,0,0,505142ec219081d7d2b2448d13c4e14b72665831ce9ab07b5a08335ba5eb9fc4,2024-11-21T06:36:08.900000
|
||||
CVE-2021-47441,0,0,09636dba9270b76cc81d516cefb92d04ce3ea312624476b372d8e417149fc37e,2024-11-21T06:36:09.100000
|
||||
CVE-2021-47442,0,1,12ac79ea7abfbc534a53a93b8adf1be859d564a09c1dc442425e87c7e7e06b1c,2025-01-07T20:14:00.147000
|
||||
CVE-2021-47442,0,0,12ac79ea7abfbc534a53a93b8adf1be859d564a09c1dc442425e87c7e7e06b1c,2025-01-07T20:14:00.147000
|
||||
CVE-2021-47443,0,0,1c44c609b9131c8a42904b5eb724c5c516998eac086fd64d9bacafeecf320ee1,2024-11-21T06:36:09.423000
|
||||
CVE-2021-47444,0,0,5027f476c6b4fbbd0fc834558cdc872961498ee4eaa06ce0110853d2bab7aaf8,2024-11-21T06:36:09.610000
|
||||
CVE-2021-47445,0,0,3b75b9562d783cbb548f6816de44722b90a10be1a0301f9957c5e8ad33f72247,2024-11-21T06:36:09.717000
|
||||
@ -187656,14 +187656,14 @@ CVE-2021-47462,0,0,07fb99f6b69fcff11957f81be22850be05321e21eb2876eebbef290a5bea7
|
||||
CVE-2021-47463,0,0,4495cacfd7f74068d9d051b3089c31a3267cbe4043665d75ead773ddce4dc5bd,2024-11-21T06:36:12.637000
|
||||
CVE-2021-47464,0,0,7ecf96945294987b38fcfae942be067e1dee18c114b24357d054ec8eb6961ea5,2024-11-21T06:36:12.803000
|
||||
CVE-2021-47465,0,0,535892ab31dce73283081a80facebf1e71ee3d315d764e5fe5d443a49db8dec5,2024-11-21T06:36:13.087000
|
||||
CVE-2021-47466,0,1,1032289734719583c5e473b913f50de249ff26383cf0cfb68845789d6c77770a,2025-01-07T20:13:41.913000
|
||||
CVE-2021-47466,0,0,1032289734719583c5e473b913f50de249ff26383cf0cfb68845789d6c77770a,2025-01-07T20:13:41.913000
|
||||
CVE-2021-47467,0,0,f1671883b861b3993e0f37b61979df79b70a26ce821e0ab47424da081f565ac4,2024-11-21T06:36:13.530000
|
||||
CVE-2021-47468,0,0,a10cb21e48d1fcccab4656f6b0eaaff4aefc96cc2dc1aa8d51c23ff6e4c1f711,2024-11-21T06:36:13.810000
|
||||
CVE-2021-47469,0,0,98447d3fd3f6b800ad9977b55e9306fe93b440cd5418c5909a1036adb8f16620,2024-11-21T06:36:14.260000
|
||||
CVE-2021-47470,0,0,31b51d65d4f91bfc13870b25b73da1134ebe92d090430ef26caf88d4ce9503ce,2024-11-21T06:36:14.467000
|
||||
CVE-2021-47471,0,0,d878bb0529efd29ac48845865976a4b915822b3369f2778ab6066a3c3081c56d,2024-11-21T06:36:14.623000
|
||||
CVE-2021-47472,0,0,4a163680eb0964c77bae31dc9771b9bdcab4b71fd554a2d2151c19134b7cbb1d,2024-06-17T17:15:51.050000
|
||||
CVE-2021-47473,0,1,5fca53b1af9e776f298f7a6ef44b038561cd25810ca2fc0d88e4a5892f204ef8,2025-01-07T20:19:15.517000
|
||||
CVE-2021-47473,0,0,5fca53b1af9e776f298f7a6ef44b038561cd25810ca2fc0d88e4a5892f204ef8,2025-01-07T20:19:15.517000
|
||||
CVE-2021-47474,0,0,37365f7f291b0071769e44ce34e7b45f4eec5359854460670e42d17ed0bb7d0f,2024-11-21T06:36:15.077000
|
||||
CVE-2021-47475,0,0,c88321d71e0af93c86603b8a29992e1dcb6e5a31fb81953d6216a2d2d418d351,2024-11-21T06:36:15.267000
|
||||
CVE-2021-47476,0,0,f9ce36d5ed06acd740a45b7f53cd0d827925ad283ed7b43a9da4e1a75de3d02d,2024-11-21T06:36:15.453000
|
||||
@ -192021,7 +192021,7 @@ CVE-2022-22359,0,0,2bf01eb540622dca847eaacee6236e255186c1277196c7cc79e981387a737
|
||||
CVE-2022-22360,0,0,565952d652a3bdb7d639feb074a1b0e26498767df3453bcf21d65b3148621e6f,2024-11-21T06:46:41.973000
|
||||
CVE-2022-22361,0,0,10b0f271693e25631ef1989315b59440c197a948d70ee3735bfc385e81ac916f,2024-11-21T06:46:42.090000
|
||||
CVE-2022-22363,0,0,e770f7f5dbc3b57de7d846ca0e694a449e70e29864fe0c3385ac95fbf3aa5eb9,2025-01-07T16:15:28.050000
|
||||
CVE-2022-22364,0,1,699859f56e67a1509bb3bd386cabe5337a40af606a12e422bc971d532159bce0,2025-01-07T20:16:36.033000
|
||||
CVE-2022-22364,0,0,699859f56e67a1509bb3bd386cabe5337a40af606a12e422bc971d532159bce0,2025-01-07T20:16:36.033000
|
||||
CVE-2022-22365,0,0,93b131a9b6677b900794e8bfb444f14fa30b748b1163134645f09fea46b11764,2024-11-21T06:46:42.330000
|
||||
CVE-2022-22366,0,0,09a7cac2af7c3326b1c4db129ec697d7b77dfaf6bb69f773673a6a77e39cac91,2024-11-21T06:46:42.450000
|
||||
CVE-2022-22367,0,0,f882ca26722150b960229aa69678dc678f007562e394dfb4b417a39357dc7df4,2024-11-21T06:46:42.593000
|
||||
@ -203221,7 +203221,7 @@ CVE-2022-35910,0,0,7fc2885883102fc727096e2774117802777ce074d4d291f5fc97a3501d4d7
|
||||
CVE-2022-35911,0,0,e0726f2dc12f74ea86390dfef1e1d1c742ae547b53b4529dd114c069c4165757,2024-11-21T07:11:56.440000
|
||||
CVE-2022-35912,0,0,75fe2e3206f9f165b585185e652fc4bbcebe0f8a26b7326a958ab5ee47c053a8,2024-11-21T07:11:56.617000
|
||||
CVE-2022-35913,0,0,89a6a4cbb147809e631e777d2af221126f33a975dee4dca0c25011e88eda7e40,2024-11-21T07:11:56.810000
|
||||
CVE-2022-35914,0,1,5a5de11c6ecd5a98419e5da748612ce23acd9a3e31d42e856954871074055e90,2025-01-07T20:15:27.193000
|
||||
CVE-2022-35914,0,0,5a5de11c6ecd5a98419e5da748612ce23acd9a3e31d42e856954871074055e90,2025-01-07T20:15:27.193000
|
||||
CVE-2022-35915,0,0,cbd708eca6adbf0ed7ec96e61eb8e6e42a02c1eacc456abedba64aa3a407f9ab,2024-11-21T07:11:57.170000
|
||||
CVE-2022-35916,0,0,9af87e09731f27efc95196b424b67dd321aa236a2082bf5ebbbcb2d7300805df,2024-11-21T07:11:57.320000
|
||||
CVE-2022-35917,0,0,7e238076ca80dfe65eff9f389b38bd22676dbbcca323966feafdf40cc77142c4,2024-11-21T07:11:57.457000
|
||||
@ -206783,16 +206783,16 @@ CVE-2022-40651,0,0,0ee3f0a222c300a35eb41435b4e3c3340b0747385434b981f128054a3f5a5
|
||||
CVE-2022-40652,0,0,f32088c9a1830c350a4bc47c084a1615cc8346bb98e43adb5f6b15fd72a6fdff,2024-11-21T07:21:47.480000
|
||||
CVE-2022-40653,0,0,c530db75e85c82b709a959ba53c21f08704f2b35f5bde582da61130f3362365f,2024-11-21T07:21:47.603000
|
||||
CVE-2022-40654,0,0,4a46c62924a27a366107e74b116fb512902645049da93f83830cc9c6a2d8ac0b,2024-11-21T07:21:47.720000
|
||||
CVE-2022-40655,0,1,2249c53d8e144885dfcb8a9246dcaf2d20b9aae1bba8a07bafbe683c0ee33660,2025-01-07T19:15:26.640000
|
||||
CVE-2022-40656,0,1,1044de2766d6139d42c3838c636718ded3086336153566473fbd9d5b75f70796,2025-01-07T19:15:27.777000
|
||||
CVE-2022-40657,0,1,e05667279d1b44886e2627e0eccadcb95e8621815492bc9bff52007195a0cace,2025-01-07T19:15:27.923000
|
||||
CVE-2022-40658,0,1,f239d41ca8fe37d9655fa04e5640ad3bb681bc7ff83b16555aed5901d506bfa3,2025-01-07T19:15:28.043000
|
||||
CVE-2022-40659,0,1,125d00e0c5b0bde1034e361503cc23e7e6f8a5fdcd5ee9ddb72999261e117040,2025-01-07T19:15:28.163000
|
||||
CVE-2022-40655,0,0,2249c53d8e144885dfcb8a9246dcaf2d20b9aae1bba8a07bafbe683c0ee33660,2025-01-07T19:15:26.640000
|
||||
CVE-2022-40656,0,0,1044de2766d6139d42c3838c636718ded3086336153566473fbd9d5b75f70796,2025-01-07T19:15:27.777000
|
||||
CVE-2022-40657,0,0,e05667279d1b44886e2627e0eccadcb95e8621815492bc9bff52007195a0cace,2025-01-07T19:15:27.923000
|
||||
CVE-2022-40658,0,0,f239d41ca8fe37d9655fa04e5640ad3bb681bc7ff83b16555aed5901d506bfa3,2025-01-07T19:15:28.043000
|
||||
CVE-2022-40659,0,0,125d00e0c5b0bde1034e361503cc23e7e6f8a5fdcd5ee9ddb72999261e117040,2025-01-07T19:15:28.163000
|
||||
CVE-2022-4066,0,0,beae61b48c85e5f59e106fcd0e2231f7dd67421f06f8464ab6fe8ba24d8c3a6a,2024-11-21T07:34:32.567000
|
||||
CVE-2022-40660,0,1,387bf08689e0f098a2cf0c1279a07af8510fa11bd5fa89185f27b3b451cc4257,2025-01-07T19:15:28.287000
|
||||
CVE-2022-40661,0,1,a087c2690839e92b66bc8615c5d4fa6c5933210678822507e8dc38e67e956aba,2025-01-07T19:15:28.407000
|
||||
CVE-2022-40662,0,1,7d7e618c0ebec532e5076dd7f5754f7c602d242f7a04aaa8f1668b2ac8cd8180,2025-01-07T19:15:28.530000
|
||||
CVE-2022-40663,0,1,dde31399f5a66e6c570042ca074334e5e7f72b9477fce1392dfe59d8146293e2,2025-01-07T19:15:28.657000
|
||||
CVE-2022-40660,0,0,387bf08689e0f098a2cf0c1279a07af8510fa11bd5fa89185f27b3b451cc4257,2025-01-07T19:15:28.287000
|
||||
CVE-2022-40661,0,0,a087c2690839e92b66bc8615c5d4fa6c5933210678822507e8dc38e67e956aba,2025-01-07T19:15:28.407000
|
||||
CVE-2022-40662,0,0,7d7e618c0ebec532e5076dd7f5754f7c602d242f7a04aaa8f1668b2ac8cd8180,2025-01-07T19:15:28.530000
|
||||
CVE-2022-40663,0,0,dde31399f5a66e6c570042ca074334e5e7f72b9477fce1392dfe59d8146293e2,2025-01-07T19:15:28.657000
|
||||
CVE-2022-40664,0,0,6384fb998400dd78dbbbbeb97701764cf40b03283cb2d5b45fedc9b8706ae4ab,2024-11-21T07:21:49.007000
|
||||
CVE-2022-40665,0,0,11adc7edb24b1840642261dc605f3c70eb716a34efafd620ebb9fd24f65e6877,2023-11-07T03:52:33.163000
|
||||
CVE-2022-40666,0,0,632ec9ff8b574405a7f28bedb20e0ca0512dfd079c1ef041a8fc193cc4145955,2023-11-07T03:52:33.393000
|
||||
@ -207554,8 +207554,8 @@ CVE-2022-41568,0,0,6205fdde5e39bc36de73db4dcd6211c4ac286d5b081b138486c1c05c18b4e
|
||||
CVE-2022-4157,0,0,662b08d19a468f391d3afa6bd0cb88ad7c569aafdca4fb8c2cd984f331979391,2024-11-21T07:34:41.270000
|
||||
CVE-2022-41570,0,0,68d8e3713c67a900ebaccd270512214f137c6b2444cfced04a663beebd955153,2024-11-21T07:23:24.863000
|
||||
CVE-2022-41571,0,0,d21192f5b84bd2e0d8b3b7685c8fa13d81d53fbe0d3de64478a1014c88f8f353,2024-11-21T07:23:25
|
||||
CVE-2022-41572,1,1,f95f7bbeea349210a4046397aa546f86cb914d717e7896125ced31e784e6f659,2025-01-07T20:15:27.943000
|
||||
CVE-2022-41573,1,1,fccec5dc8db1c1b73eb5b79c92265cfb099870d7525f75f00681a86090e4945f,2025-01-07T20:15:28.057000
|
||||
CVE-2022-41572,0,0,f95f7bbeea349210a4046397aa546f86cb914d717e7896125ced31e784e6f659,2025-01-07T20:15:27.943000
|
||||
CVE-2022-41573,0,0,fccec5dc8db1c1b73eb5b79c92265cfb099870d7525f75f00681a86090e4945f,2025-01-07T20:15:28.057000
|
||||
CVE-2022-41574,0,0,21e917fa5154deb6e3b8d21ad116ef9dde7c875c812d3df1ee5d78c46dfa6a1a,2024-11-21T07:23:25.140000
|
||||
CVE-2022-41575,0,0,8334a25c2009fcf3e6c0edb09d3dd5a6ab1272c7f22935bf5852c90ba12a2139,2024-11-21T07:23:25.287000
|
||||
CVE-2022-41576,0,0,f5bafe8f1c17d8fad2ba21f970ed4ca48d42f1479d46600aad0cea7bb4120781,2024-11-21T07:23:25.433000
|
||||
@ -210254,8 +210254,8 @@ CVE-2022-45180,0,0,c3040cfe413949900a60ea83b3e98e1e8732363bd29ebf48fee6449f220d6
|
||||
CVE-2022-45182,0,0,5ce5fd3aa8778337f722afc8524f8be33eca4a37a3b49427434ef8a1f42497ed,2024-11-21T07:28:55.140000
|
||||
CVE-2022-45183,0,0,17c24bcc8ff5f83b3692890867f1b0390aceb5de23aec693bc352190eaa3a4c7,2024-11-21T07:28:55.287000
|
||||
CVE-2022-45184,0,0,3d0fcb0285b7ec260e08c96917c32aa853ace4307fda2ec9ee77dd573c819440,2024-11-21T07:28:55.440000
|
||||
CVE-2022-45185,1,1,16d2233a18969fa33cb7529ccf2b16d6901990a16b8ca89ae75ef2569e19f35a,2025-01-07T20:15:28.173000
|
||||
CVE-2022-45186,1,1,cbab4651c9fce94e005c4bf988af7f08dca08724bcb7165c66fbaed2bab9c6c7,2025-01-07T20:15:28.293000
|
||||
CVE-2022-45185,0,0,16d2233a18969fa33cb7529ccf2b16d6901990a16b8ca89ae75ef2569e19f35a,2025-01-07T20:15:28.173000
|
||||
CVE-2022-45186,0,0,cbab4651c9fce94e005c4bf988af7f08dca08724bcb7165c66fbaed2bab9c6c7,2025-01-07T20:15:28.293000
|
||||
CVE-2022-45188,0,0,897fe5d1be1d67bd18e0e84eecbd7aca5e96a3d426012bdcc62fcf1d224f7bf1,2024-11-21T07:28:55.583000
|
||||
CVE-2022-4519,0,0,7e1b44f974b691b3ba99a7d6700f057355f3a483598f1d23e777976a85d319f9,2024-11-21T07:35:25.163000
|
||||
CVE-2022-45190,0,0,f89ea31ba0ad427a758e6e41fdbb51266db819bb50b4347855d75db4180bf5f5,2024-11-21T07:28:55.763000
|
||||
@ -212420,7 +212420,7 @@ CVE-2022-48387,0,0,1e066de8fbcf6dac1339a1019e2d06a1bc4f1405e91b36f5521ca76272a43
|
||||
CVE-2022-48388,0,0,13c757f93b0eef3b01e33ed39a736bad6d77d2a3105a2c7f4342f90b9f1fe088,2024-11-21T07:33:18.410000
|
||||
CVE-2022-48389,0,0,eb063ff8dfa13e2a555c12156bbbd8338c343d47ca77d7533f59bc8ad443a959,2024-11-21T07:33:18.530000
|
||||
CVE-2022-4839,0,0,71e9ea09316157b1d161766da1ca86a6c0636a9e403561b03ca92cbf29b77453,2024-11-21T07:36:02.903000
|
||||
CVE-2022-48390,0,0,5f587c34887fcead4e2c35f5a76458452399724a2a59915a5efda4fe3812b6d9,2024-11-21T07:33:18.660000
|
||||
CVE-2022-48390,0,1,2118f140d5a464f1e6eb994741768b9d34b16134f7a115aa13be1e0c15719039,2025-01-07T21:15:07.953000
|
||||
CVE-2022-48391,0,0,b0f9e32700a5259cacfd61903d32c8fecc499367dd139627b668ea028c620663,2024-11-21T07:33:18.783000
|
||||
CVE-2022-48392,0,0,e261bc3cd82de084dbc978363fda247a43174aec5203a1d324ca83f5fbf1b9f0,2024-11-21T07:33:18.910000
|
||||
CVE-2022-4840,0,0,8593d435f1bfe4de06d5751803d143b53df092b88164a311eec3d96d433c7a2a,2024-11-21T07:36:03.047000
|
||||
@ -212442,15 +212442,15 @@ CVE-2022-48433,0,0,23ec3010492192080b98bdc3f0ec44e6a27c5950f7ca53485182a36f15632
|
||||
CVE-2022-48434,0,0,7014f51deddc59d8cff943ebe8fe7eebfbaf0cea59cfbf3f6b2efad0b9067276,2024-11-21T07:33:20.487000
|
||||
CVE-2022-48435,0,0,643f242af7cac04fe39080eaf04c7ceb3de585119d9640f84bbfc75f6711a652,2024-11-21T07:33:20.703000
|
||||
CVE-2022-48437,0,0,c7f0af8c3894789ad77797876ed456afd4c24282aa7ecf309332cbfa5cfa2319,2024-11-21T07:33:20.810000
|
||||
CVE-2022-48438,0,0,e25bd36a18aa9e7ef8feccfe61d68f58881dad4289871711c379dbe5b17d29e5,2024-11-21T07:33:20.947000
|
||||
CVE-2022-48439,0,0,a7fd2f48168b0a13dcde898abdc2174929e9261f2ca701c8fd9ae7561f1c3249,2024-11-21T07:33:21.043000
|
||||
CVE-2022-48438,0,1,392067ae12dc53385d11e29ef20c18ad26361f7290750eb71212eb2bf283758a,2025-01-07T21:15:08.877000
|
||||
CVE-2022-48439,0,1,9de2bda4f4d9456bfbe7af36f508cc6aad156ed697950a52c509395d512ed99d,2025-01-07T21:15:09.040000
|
||||
CVE-2022-4844,0,0,fb9279a7b9b9b7166b9ee820061e3a5fa4ecc6725efc0393e0e65ad192d73c59,2024-11-21T07:36:03.533000
|
||||
CVE-2022-48440,0,0,bdf19ad83e32c0e63eb4839b7db6c14b90f93a96082a6d50d79bae04470b2b9b,2024-11-21T07:33:21.143000
|
||||
CVE-2022-48441,0,0,5a640d91de511a39fdb86bd3847864125ac3b85da62f8093d991c0ba6a4cfc09,2024-11-21T07:33:21.270000
|
||||
CVE-2022-48442,0,0,fe1850d08ab62c2031f1f2c71aa59be2e0b1831ea9634a9e086168c134201c09,2024-11-21T07:33:21.413000
|
||||
CVE-2022-48443,0,0,b0a4afd90e76e69e34b6540a7d54589e2da91a0b8eb76d7db0b9c06666ae97c6,2024-11-21T07:33:21.527000
|
||||
CVE-2022-48444,0,0,e65d7a8c98c5ad776ca83a326541ec575fd1b7967955330cb66d44139a2e930c,2024-11-21T07:33:21.620000
|
||||
CVE-2022-48445,0,0,6c5d17d2dbc1b9af7090501edffe8acf9fccd89852088bde6793afe33afd21a6,2024-11-21T07:33:21.740000
|
||||
CVE-2022-48440,0,1,2fe3f303d29db41d82faaff8677058062598256f86b45f411b030a90e045017c,2025-01-07T21:15:09.207000
|
||||
CVE-2022-48441,0,1,2144f85c8f6da27bf8bcddb1af91af74735d8903f864ad8211a75e19a882c541,2025-01-07T21:15:09.367000
|
||||
CVE-2022-48442,0,1,d36a83d31e2b2754d833291552bce7be87a9cf43f9024c349a5f366fda0620dd,2025-01-07T21:15:09.540000
|
||||
CVE-2022-48443,0,1,ede0a966ec363c9aa77ae45de82f64c7a4fa2ce6bfb2197a737f0138a1ce43c3,2025-01-07T21:15:09.697000
|
||||
CVE-2022-48444,0,1,80dd0e8f471992a8c1ed2d9a802b8b1afebf5a5dc5e78a467453e6eda63da9a2,2025-01-07T21:15:09.883000
|
||||
CVE-2022-48445,0,1,63a0ea938ebf45b316f1c1a9997a08b535f3c06a17da269e04cc3f84ec90d2e0,2025-01-07T21:15:10.060000
|
||||
CVE-2022-48446,0,0,ccde3852914606dc8343bf8afa1543aae9290421da0754748cda5178d190c1aa,2024-11-21T07:33:21.837000
|
||||
CVE-2022-48447,0,0,1724b246a993086daa9332f1055ab5ac7831c12a5899e0a2ee81adf639ba4a1e,2024-11-21T07:33:21.933000
|
||||
CVE-2022-48448,0,0,aab762f41031ef9a64f5ec500c2b61dc17e4a94e44de08811d0dda1de8d89367,2024-11-21T07:33:22.027000
|
||||
@ -215512,9 +215512,9 @@ CVE-2023-20709,0,0,f77eb6f47a9c01aeb7b37b0bb403dc2906cc5a60047939406ce5f60a7d638
|
||||
CVE-2023-2071,0,0,6ca8691d1e9c7cafae6a5748684ff3584a63b6c0782aca4e9e39176c7a9a8482,2024-11-21T07:57:52.790000
|
||||
CVE-2023-20710,0,0,36b3bd652704b53ed81bf08e9d3b6a30770e9e5726f30280c46f0944c40c0139,2024-11-21T07:41:23.967000
|
||||
CVE-2023-20711,0,0,a3a059039f4079683556bc911267d66baaed48cea9038f1dfc5e720f76c3a013,2024-11-21T07:41:24.080000
|
||||
CVE-2023-20712,0,1,448f7cc7b18b7736e4158919a106777207ebeaae578ec88d49e8147b47bd416f,2025-01-07T19:15:28.830000
|
||||
CVE-2023-20715,0,1,8e093ad3da4ecddaecba75d344d8950a8e8f5da70b953ce26dbfe70f2bae96c6,2025-01-07T19:15:29.033000
|
||||
CVE-2023-20716,0,1,bc3be8c9031ce5b0447b088e80cf2c0fbcfc772b8457c122fb9d1df8c33921cf,2025-01-07T19:15:29.203000
|
||||
CVE-2023-20712,0,0,448f7cc7b18b7736e4158919a106777207ebeaae578ec88d49e8147b47bd416f,2025-01-07T19:15:28.830000
|
||||
CVE-2023-20715,0,0,8e093ad3da4ecddaecba75d344d8950a8e8f5da70b953ce26dbfe70f2bae96c6,2025-01-07T19:15:29.033000
|
||||
CVE-2023-20716,0,0,bc3be8c9031ce5b0447b088e80cf2c0fbcfc772b8457c122fb9d1df8c33921cf,2025-01-07T19:15:29.203000
|
||||
CVE-2023-20717,0,0,b1525d88cbb5a71350e022089167c9477dd4337e8a5f350edb710d89d59053d5,2024-11-21T07:41:24.550000
|
||||
CVE-2023-20718,0,0,2e64cc91ac3fceb6b2ea1e66c38b215865ab90c7fd81e4e8c5d4727f49967c2a,2024-11-21T07:41:24.663000
|
||||
CVE-2023-20719,0,0,45e4dff0160f18a628c25174a9fe687a5bec30bfc32b0dec31f347aba43aa199,2024-11-21T07:41:24.780000
|
||||
@ -215524,10 +215524,10 @@ CVE-2023-20721,0,0,4ac0489da75d4749b3cca2d595c249202b58d4263b9ac12b1a7212ea3e62d
|
||||
CVE-2023-20722,0,0,8920eb055d033db9af8b82d589874977302f3c6343fff535a2c237261054f9eb,2024-11-21T07:41:25.093000
|
||||
CVE-2023-20723,0,0,9d0686f907129b6919ada24bf4f11d306c0e127a565ad2d2e14861ae5024a41c,2024-11-21T07:41:25.200000
|
||||
CVE-2023-20724,0,0,987f1a6ebac7796ad97470c40868ad4c190da72715630d9002692d9f05c5b7e0,2024-11-21T07:41:25.307000
|
||||
CVE-2023-20725,0,0,94abaae00a4babab1164edbbfa8363656a1ec46a4f867a80845b517abb1ae09b,2024-11-21T07:41:25.417000
|
||||
CVE-2023-20725,0,1,f09278808328dfcfcad9a9453e6e7f164215557bbd6c9f4188e9f9b639210912,2025-01-07T21:15:10.227000
|
||||
CVE-2023-20726,0,0,0839a4ee0c7a4b353253d289124d14c8c0a8623790680626ad23a3507d551e11,2024-11-21T07:41:25.530000
|
||||
CVE-2023-20727,0,0,c273371285cb88eaafd1f4f037322ee5da28f16900e0cd91d46b0d20048f91b1,2024-11-21T07:41:25.650000
|
||||
CVE-2023-20728,0,0,97e069253243c2c44c8d84d45c262ef1cee6cb08769c4fa43e37b02112acff0c,2024-11-21T07:41:25.767000
|
||||
CVE-2023-20728,0,1,a92d83daff0e8454efbc72619861f5e9876e5beba7cfa77f65738746f6788e6d,2025-01-07T21:15:10.397000
|
||||
CVE-2023-20729,0,0,15b527ebbacb287f60215b283686e0c580dca8c072c93e41ac0b4e73c89071f1,2024-11-21T07:41:25.890000
|
||||
CVE-2023-2073,0,0,96898ca4843b2e00caae369ccfc8a05e2eb3212aba8406e285b4a550c82c8d6c,2024-11-21T07:57:53.033000
|
||||
CVE-2023-20730,0,0,8c705778dd34116f8b4be0e4f5f17bf62e2de2fd642fa24793b838d3811f30bc,2024-11-21T07:41:26
|
||||
@ -215536,25 +215536,25 @@ CVE-2023-20732,0,0,aaf62277d633267c6edf36a18170b89fc48801d9adae63fbe1b9d8feb477a
|
||||
CVE-2023-20733,0,0,6cde01793ae2c978bd440d898834d2f1a96c5a3fb43c402b931a43d7d0a61974,2024-11-21T07:41:26.340000
|
||||
CVE-2023-20734,0,0,842934ea8f6042f29aa5c330143b6a382e58af8a82c7874ee7031969899dac6c,2024-11-21T07:41:26.467000
|
||||
CVE-2023-20735,0,0,2a213002d4fdc2e6ac31daeba7ec590270a33fef3bdf4b76e5b89a3cbbd47d79,2024-11-21T07:41:26.577000
|
||||
CVE-2023-20736,0,0,a8d91a70c45e80259f53e59f7321ec2caa7e591f92d4b77d66a476a81c73f41d,2024-11-21T07:41:26.697000
|
||||
CVE-2023-20737,0,0,d77bfd5558890f39caa39fcef4b5004e55802858176519f9cefbc136ae7f8920,2024-11-21T07:41:26.817000
|
||||
CVE-2023-20738,0,0,d131c94db2ebd14af24cd66803fa046c86cb6b68fffb41e3a5a308b37447476f,2024-11-21T07:41:26.943000
|
||||
CVE-2023-20739,0,0,ac0a081ac6ab84323a1432d5221f312dcbe84ac050a009270ee83d574537cc0f,2024-11-21T07:41:27.070000
|
||||
CVE-2023-20736,0,1,26b81593811b831870ef407b06774afbafd1125e84c5fc0fd9ce51c1f7c1d41d,2025-01-07T22:15:27.733000
|
||||
CVE-2023-20737,0,1,1ab002369cec3db0ce7099072764da36218b02beee38e464302d20f9c6feb57a,2025-01-07T22:15:28.423000
|
||||
CVE-2023-20738,0,1,cde8215494ffae4a3905fb8d6625d49af5a9ed7229e8854b086538f13216fbdb,2025-01-07T22:15:28.617000
|
||||
CVE-2023-20739,0,1,d5212701b9f265bf75cf40b79f618caddf5c79ca0ab735a4ae0091769e5791b4,2025-01-07T22:15:28.793000
|
||||
CVE-2023-2074,0,0,671f70886f04f2cdf0e97c0b41f6d54f9fb7fab0417fac46532bc8d6cb674974,2024-11-21T07:57:53.163000
|
||||
CVE-2023-20740,0,0,f87085edcc0352b163b36e88aebee8d12d5ec6eced711e6f54d9f3b4d953987e,2024-11-21T07:41:27.190000
|
||||
CVE-2023-20741,0,0,f19c5b46bcb0db7883f168feb825792c4aeb29539ad6f23311cb14609af3661b,2024-11-21T07:41:27.300000
|
||||
CVE-2023-20742,0,0,0ed7dd2c5d85b2c8c93b5e5036706eb710632b87a4ec98ca6568a3f276a7243e,2024-11-21T07:41:27.417000
|
||||
CVE-2023-20743,0,0,45748f80ddb55c431e02d8fff6188e875503d1f8c6c944d52deb6cc0f4f3eeee,2024-11-21T07:41:27.537000
|
||||
CVE-2023-20744,0,0,ec97d9b03864c08ac4f0eed46caab0dbf38ac8caba26e742d5719accdd8bd15f,2024-11-21T07:41:27.647000
|
||||
CVE-2023-20745,0,1,08255572a79b7cf72582bba6cf99401cf35f2a798f317f929fa11478b27bfe9a,2025-01-07T20:15:28.547000
|
||||
CVE-2023-20746,0,1,dfd9a10171d19553dae54bb490f16357210544afece4396aac07238c29d19ec3,2025-01-07T20:15:28.743000
|
||||
CVE-2023-20747,0,1,fbcfd8bfad395d7d4bbafdaea1f66fc7f8975bd0c84110f91076984865cc29c8,2025-01-07T20:15:28.907000
|
||||
CVE-2023-20740,0,1,6e687cc5d6b5b97dc53f774d09047b5e0b517c343146c53be1f66b32d02d37a9,2025-01-07T21:15:10.563000
|
||||
CVE-2023-20741,0,1,3c8ab3e56e73ba60fa872cefac2194b92ee3b6bbafa9086a759155b0715383d6,2025-01-07T21:15:10.730000
|
||||
CVE-2023-20742,0,1,38643571aed93ac770f4cbd57c4ff49d40582ab89bbb2b523235d7f9c234ed71,2025-01-07T21:15:10.920000
|
||||
CVE-2023-20743,0,1,78fd1316c4b41a412f28e2bfba3f6670a78806f4878db1e49b07791ac560d53b,2025-01-07T21:15:11.097000
|
||||
CVE-2023-20744,0,1,78ae89b7a88bee1b325a1dd2ebbe4b6d02b7e4cf46fff4b388538a1d9b83cb40,2025-01-07T21:15:11.247000
|
||||
CVE-2023-20745,0,0,08255572a79b7cf72582bba6cf99401cf35f2a798f317f929fa11478b27bfe9a,2025-01-07T20:15:28.547000
|
||||
CVE-2023-20746,0,0,dfd9a10171d19553dae54bb490f16357210544afece4396aac07238c29d19ec3,2025-01-07T20:15:28.743000
|
||||
CVE-2023-20747,0,0,fbcfd8bfad395d7d4bbafdaea1f66fc7f8975bd0c84110f91076984865cc29c8,2025-01-07T20:15:28.907000
|
||||
CVE-2023-20748,0,0,c759e8d161babea3fb80f95c9aa6e38834769d7485817179ea9bbadad5af2e2e,2024-11-21T07:41:28.127000
|
||||
CVE-2023-20749,0,1,e3bece7625da8039efb5b0bb52c2c27f3752e33fe6836a819ed46536685c6458,2025-01-07T19:15:29.377000
|
||||
CVE-2023-20749,0,0,e3bece7625da8039efb5b0bb52c2c27f3752e33fe6836a819ed46536685c6458,2025-01-07T19:15:29.377000
|
||||
CVE-2023-2075,0,0,0a4f35a8246b26434f7b08902da3187457523a56cf31cb608840fb7c8fa8de4f,2024-11-21T07:57:53.297000
|
||||
CVE-2023-20750,0,1,1532ead8d5fbe302be3d4e3d29472c21a43184045709cf6dfa1d7e5cb56c0a50,2025-01-07T19:15:29.593000
|
||||
CVE-2023-20751,0,1,9285a2f146e41684cbe61d90953372b927ce15c75e97b680cec159b65b964afb,2025-01-07T19:15:29.790000
|
||||
CVE-2023-20752,0,1,b9c415f3559b4618b6a1803988736d4cc42315d317863bc78fa0b6969d658f31,2025-01-07T19:15:29.980000
|
||||
CVE-2023-20750,0,0,1532ead8d5fbe302be3d4e3d29472c21a43184045709cf6dfa1d7e5cb56c0a50,2025-01-07T19:15:29.593000
|
||||
CVE-2023-20751,0,0,9285a2f146e41684cbe61d90953372b927ce15c75e97b680cec159b65b964afb,2025-01-07T19:15:29.790000
|
||||
CVE-2023-20752,0,0,b9c415f3559b4618b6a1803988736d4cc42315d317863bc78fa0b6969d658f31,2025-01-07T19:15:29.980000
|
||||
CVE-2023-20753,0,0,894ea3c916ef487eca328031be030c7a54c104ab4a4cc803e8eaa13c9de479a4,2024-11-21T07:41:28.740000
|
||||
CVE-2023-20754,0,0,6a6b978389dd6b302bf846afccf04f4a380633dbad5c5b490388df8c07573427,2024-11-21T07:41:28.860000
|
||||
CVE-2023-20755,0,0,1751679f9f3d310d94908ec8228deb3ca926be5e977d2eb823d8305d1ab1897a,2024-11-21T07:41:28.977000
|
||||
@ -216141,7 +216141,7 @@ CVE-2023-21316,0,0,cd91b7668c83f66933675d82be196c64da0988041fc847c145bc65955e386
|
||||
CVE-2023-21317,0,0,e207113c4d3dcdeba7b2df0dfe284d238a624805c22d571e1d9d08282e29a593,2024-11-21T07:42:37.757000
|
||||
CVE-2023-21318,0,0,b73472bf765bac1e50448017c7d45838fc52a97de86dc9a46338c27a2db3dbf2,2024-11-21T07:42:37.873000
|
||||
CVE-2023-21319,0,0,702d466854df6af069ce2cdeb58bd349df8842472574a7a82875e645a4f778d6,2024-11-21T07:42:37.990000
|
||||
CVE-2023-2132,0,0,b2d77092c84a96089d1590983b505f399d1cbb90e7fafd6064d4fc7a6f772bf4,2024-11-21T07:57:59.417000
|
||||
CVE-2023-2132,0,1,374c6fecdcbe513fc231ef1c3b60eeb7a8a5bd409df576ec3fa1a39c93f4a25a,2025-01-07T22:15:29.490000
|
||||
CVE-2023-21320,0,0,06cd88a9d9c4e04b9bcd518736512fd5fef0d950a3e81fab88ec9c98818583ce,2024-11-21T07:42:38.107000
|
||||
CVE-2023-21321,0,0,1a182994b902ba0eef896470a303e10a8ec18719dbb0d12b7cfbd2789fab2edb,2024-11-21T07:42:38.227000
|
||||
CVE-2023-21323,0,0,09246e4b387bc178d921e8e7702ee312acc9b8962c19355c7e6b5778eb489b2f,2024-11-21T07:42:38.343000
|
||||
@ -216388,7 +216388,7 @@ CVE-2023-21566,0,0,a6208efd3bb20875065bb908d7c048ac83773ae3f620ff7a2072cab13d45a
|
||||
CVE-2023-21567,0,0,7c0178689b609fa19a702c1ab4b58e4795bf76ca3a16a2366aeb7558ff130a35,2024-11-21T07:43:06.047000
|
||||
CVE-2023-21568,0,0,4f69f941be8ddb65f9859d2fdfa33a84a899aae234b548f142ca072d6d5f94fd,2024-11-21T07:43:06.167000
|
||||
CVE-2023-21569,0,0,c6088c24db273d99b3d49ee91bab9430920364f586581be35edbcdbcaff027b8,2024-11-21T07:43:06.307000
|
||||
CVE-2023-2157,0,0,365dfa3000979933deecffabe613524b45a54e9fbb7f5d82f51c7ccb47749983,2024-11-21T07:58:02.920000
|
||||
CVE-2023-2157,0,1,83b41c36ae466de262ff181b4a36d36aac22dd0e160799cc0120741cff68f365,2025-01-07T22:15:29.647000
|
||||
CVE-2023-21570,0,0,12d9133b308351c5314894481afa1a9c3d69fb7d36d6f6fe2e1201a1fed2b6db,2024-11-21T07:43:06.430000
|
||||
CVE-2023-21571,0,0,08ca5c4925fa3101f176929345187173e682e2dbe9bae34d43306545519ed0a2,2024-11-21T07:43:06.547000
|
||||
CVE-2023-21572,0,0,8a990d13e7e7225a4ea34e6669638dea7280e14c6d6971c32d936fd6550f5052,2024-11-21T07:43:06.670000
|
||||
@ -217291,7 +217291,7 @@ CVE-2023-22524,0,0,a5c3da63197b907c163cc782dc121b4b6fc115cfe17510997020b1ddd0b47
|
||||
CVE-2023-22525,0,0,62b72c6b8ad0e3f82c71a5f6ce0387cedbfc989ba173145f5f0e8d3ea260a9d2,2024-01-16T18:15:09.257000
|
||||
CVE-2023-22526,0,0,50165c3f267915824733b91cc094050089a1d59d92e890932064a82a6a136f85,2024-11-21T07:44:58.907000
|
||||
CVE-2023-22527,0,0,420b23f3540735c53d3d55a1b3373224f473a8100432b25c3e5ffb85eaecf19e,2024-11-21T07:44:59.040000
|
||||
CVE-2023-2253,0,0,1fb6e410994f49f2560a16b54a87ff4b6f39498d282efcc4e94c3be88c986730,2024-11-21T07:58:14.710000
|
||||
CVE-2023-2253,0,1,b9097f9e403cdb5d037ea41035272641d53f751988678f7a85476a4acfd8b99a,2025-01-07T22:15:29.833000
|
||||
CVE-2023-2254,0,0,3e407c04b45b0e6f36fd7cad3373e80962de22c83968e41c624a3bcbea8c98c8,2024-11-21T07:58:14.830000
|
||||
CVE-2023-2255,0,0,a587bcc9a68e2dd3cad145801af7fe005841d8266d2538b9c9fc1553589c72d2,2024-11-21T07:58:14.943000
|
||||
CVE-2023-22551,0,0,f241a9745d817419730e82432832dea3f1b9f3fa3d0848f43b0de18834d6f659,2024-11-21T07:44:59.190000
|
||||
@ -217936,7 +217936,7 @@ CVE-2023-2347,0,0,1b510b70d5055256be9b7fcc7958f0e58a0f64f1d305c1e7bd8117d463d820
|
||||
CVE-2023-23470,0,0,805f33b64cf2149db6b5e5d1695195d5fb15d1d1e7fd0dc5ce1bcf2fd6089263,2024-11-21T07:46:15.897000
|
||||
CVE-2023-23472,0,0,5103efe9fcba254d02277196dd09763d4fa56d8c7608208ce71a8e52bf44288f,2024-12-11T13:15:05.150000
|
||||
CVE-2023-23473,0,0,6e568225fe37b401d88506d3abb6e7be1d1fd3f5dd589c1df7bd297f7599cab4,2024-11-21T07:46:16.040000
|
||||
CVE-2023-23474,0,1,1cf29c71593c18b3a889ecdc7a5efc7ca211ccecb748f72e349e9935d02e8d55,2025-01-07T19:14:04.893000
|
||||
CVE-2023-23474,0,0,1cf29c71593c18b3a889ecdc7a5efc7ca211ccecb748f72e349e9935d02e8d55,2025-01-07T19:14:04.893000
|
||||
CVE-2023-23475,0,0,3a68aebf09e3ed863e58894bdc66525870538242756e587e97f59ebf17bf6357,2024-11-21T07:46:16.307000
|
||||
CVE-2023-23476,0,0,2e6b555a0924678877345e4633df778e13fd08cc4f1629059332e48df051fc7d,2024-11-21T07:46:16.433000
|
||||
CVE-2023-23477,0,0,0a25458f0a0ea9769f8b631215587c9800ad24f883b79174cba3be644607137f,2024-11-21T07:46:16.563000
|
||||
@ -218045,7 +218045,7 @@ CVE-2023-2358,0,0,741ea2baf1c1b42cad77b16eb938e0e69bff6fd0ba50c2237729dcc1a88e29
|
||||
CVE-2023-23580,0,0,9115984e8fce0dd4844d20c5a2e10543d36040e5e8b799529ac40ba1aff6054b,2024-11-21T07:46:28.143000
|
||||
CVE-2023-23581,0,0,cfcd9a8c375e45c40cfa34b03405174e349b0fb79cdccc2f4e65de0822f412b5,2024-11-21T07:46:28.257000
|
||||
CVE-2023-23582,0,0,331875310909ede948ea30ed2a7bdb077b6b4a05c2cc04eadf515645a5415cfb,2024-11-21T07:46:28.373000
|
||||
CVE-2023-23583,0,0,458b147da6fbe40723efbc0aef4f697cf9cc2b075cf180de5ee0869dde1fccf8,2024-11-21T07:46:28.483000
|
||||
CVE-2023-23583,0,1,2c2965a649ef77bcc110cb0bb2ec33eccb76195343f5386f0959b4c67b67d069,2025-01-07T22:15:28.987000
|
||||
CVE-2023-23584,0,0,295095fd6188c2800c5d0d41ddb306a4db4f368791063a0317c5b83a62ddeebc,2024-11-21T07:46:28.840000
|
||||
CVE-2023-23585,0,0,af0397a9ba4e50c4e542e8d2865d18b5a3841536d4a15be19e416acaf2a59dc1,2024-11-21T07:46:28.967000
|
||||
CVE-2023-23586,0,0,b8e49de223fd6b7264ea19160cf43a6508c72af6e4c92998e3e5d7705f1485ad,2024-11-21T07:46:29.090000
|
||||
@ -221001,7 +221001,7 @@ CVE-2023-27270,0,0,b353b6a72e4e58410301ccefd29c08ef46fb0abf28ef408799b5c9355a080
|
||||
CVE-2023-27271,0,0,ca26e9f6d27c3aafb7eb9fc8b5ca0b11f608a799e69fc7a6b578b3fbd658c1fb,2024-11-21T07:52:34.510000
|
||||
CVE-2023-27279,0,0,ab9df5075109ac6cc605ce982239417da3476eea3efb0dd3f2019e217ea04529,2024-11-21T07:52:34.650000
|
||||
CVE-2023-2728,0,0,2827d8cb170006dd0625bb16230a69968c39d41d6579387b7d6e19a4eb8204e0,2024-11-21T07:59:10.813000
|
||||
CVE-2023-27283,0,0,ec79bd579465ca5f6a70a7e8376ce6e8b0d5635b7c5cf745bf2d97b60b641574,2024-11-21T07:52:34.810000
|
||||
CVE-2023-27283,0,1,4eb7cf6aaab63ab057573f5328debaefda12e59e8a469fc0511c6b657323a182,2025-01-07T21:08:32.720000
|
||||
CVE-2023-27284,0,0,4408bce2306239ecd34326d79638c1e49212e8029d89759902d8949e75a5a4a2,2024-11-21T07:52:34.947000
|
||||
CVE-2023-27285,0,0,1007a628ba537eeb9cf3829c1e971c955976a8c54c997aa8b8fb2b201a43b344,2024-11-21T07:52:35.097000
|
||||
CVE-2023-27286,0,0,0ddae44b2ed029aef181f2c509a039c45c2fa7e460c42bcc46086a02769bb052,2024-11-21T07:52:35.267000
|
||||
@ -222533,7 +222533,7 @@ CVE-2023-2894,0,0,e49133c4234db93ec00e796083811bf0248ad4cb3ca587f14a72a4f18b2bab
|
||||
CVE-2023-28949,0,0,8a96a3fc2871e1836493f7683561cc19bbf134583f37ba5e12a3f08a1ddc01c7,2024-11-21T07:56:16.260000
|
||||
CVE-2023-2895,0,0,de004e88a9e28f5c9cc6b6d7d74753178806dd04a1ef8b0a5c5377076cdfd351,2024-11-21T07:59:30.933000
|
||||
CVE-2023-28950,0,0,46b472a2e12177ffc42d223be71ab3a62993ee8d3831c5f6b71cfccf5beb8fb3,2024-11-21T07:56:16.380000
|
||||
CVE-2023-28952,0,1,3d2e5af7e51d4745242ad92dbc5c841c742e69996bd97b1783ee3a602d1a5835,2025-01-07T19:19:12.627000
|
||||
CVE-2023-28952,0,0,3d2e5af7e51d4745242ad92dbc5c841c742e69996bd97b1783ee3a602d1a5835,2025-01-07T19:19:12.627000
|
||||
CVE-2023-28953,0,0,3a8ea5a6a41fd162ee6ce470b91438a8d164651461354e891ac8c0b58bcd1815,2024-11-21T07:56:16.607000
|
||||
CVE-2023-28955,0,0,5be48cfccd53cd07a0e32906ca66b7f0cbbab6d19ef9922ac1bf37c1c5e0fad2,2024-11-21T07:56:16.723000
|
||||
CVE-2023-28956,0,0,306477773c0fba0f27f9dfee906e62a6e5017fc5a8fb8e43a0654d63ad90ca29,2024-11-21T07:56:16.847000
|
||||
@ -223124,7 +223124,7 @@ CVE-2023-29596,0,0,593f87685c917ce62fce222111469a58f6a103d1069600cf1954f9dba9f02
|
||||
CVE-2023-29597,0,0,e1763ab618763e98f35a4c4923d04a00d0c2ecd63630e837c45d9638b844255e,2024-11-21T07:57:19.903000
|
||||
CVE-2023-29598,0,0,d88f04a1227bb862f6e3f18ec095997f6ac3923beb6f36d8a5506131af1fb4fa,2024-11-21T07:57:20.040000
|
||||
CVE-2023-2960,0,0,48a0168913d42895e0af9bc8b28adee7c798da461e73cc299d9a3c017dfa4e49,2024-11-21T07:59:39.103000
|
||||
CVE-2023-2961,0,0,a641b566f19e633bdb02ae2d24b07b88c83667735758c116b6fbb3ba0db2eb74,2024-11-21T07:59:39.230000
|
||||
CVE-2023-2961,0,1,66ef00a608b2a021300da86f928385555ef3fb4046ba707e6bc268c0661b0861,2025-01-07T22:15:30.027000
|
||||
CVE-2023-2962,0,0,26e2b9d69888708eab2fd7307bd64e2d761487e1de306e822b7bf8c9ece38661,2024-11-21T07:59:39.350000
|
||||
CVE-2023-29621,0,0,6ecbf697196fee59674986aec6e441529498d1801d22962c60289eb5adaaa89f,2024-11-21T07:57:20.173000
|
||||
CVE-2023-29622,0,0,2f8e41bd79c69218bb0d7184345faacc6191b5f8d756774a0ac5d57d4bb21159,2024-11-21T07:57:20.310000
|
||||
@ -227203,7 +227203,7 @@ CVE-2023-35075,0,0,2953da8da78e493f198bf6289dbc7e5d7641503e5404893e569d48f285395
|
||||
CVE-2023-35077,0,0,eb14aac67890fa8d1fe987a9cb034d5f686d957f0f0145aaa057938b78feea0d,2024-11-21T08:07:55.893000
|
||||
CVE-2023-35078,0,0,da67801e474f67cd5bc794e4ce91b3cd46907839a2bf92a4bfbbbfc835a8d4a6,2024-12-20T17:50:19.417000
|
||||
CVE-2023-3508,0,0,395b7f87ebc096b9954e0550c1d2fe07fbb8e45e4a9326e080b172d48d631a2f,2024-11-21T08:17:25.110000
|
||||
CVE-2023-35080,0,1,c795f1b717ccd5c6029fe9293a4858a391ee366079e269d35fa396a4e87f2669,2025-01-07T19:15:30.777000
|
||||
CVE-2023-35080,0,0,c795f1b717ccd5c6029fe9293a4858a391ee366079e269d35fa396a4e87f2669,2025-01-07T19:15:30.777000
|
||||
CVE-2023-35081,0,0,3ff9e53f470e6e32796fa00a0491beb0c2fac3be4074335f2a07617a10f0712e,2024-12-20T19:13:39.710000
|
||||
CVE-2023-35082,0,0,d7b1b6ea9b9084f37a439f164bf96e51fac8bcb613dd61012a9fb18c4474a287,2024-12-26T20:48:22.997000
|
||||
CVE-2023-35083,0,0,1cd4bcca5b9cfa70eed0cf37488fa381a5e331ebd127c18204dc83e903d1af15,2024-11-21T08:07:56.550000
|
||||
@ -228853,13 +228853,13 @@ CVE-2023-37391,0,0,4f8185c778b183f03fde80b2e0a6f8204c1953ca856ca39425308aada0205
|
||||
CVE-2023-37392,0,0,5d384d02d8631121044e3a4a15b16f1d9a0f4a021dabe4d8bb61a797ed5b1a00,2024-11-21T08:11:38.163000
|
||||
CVE-2023-37393,0,0,5f8f09fae8cdcb705f9690d0759ddda2b79a794e330faf4cfaec7caf2ec598cb,2024-11-21T08:11:38.303000
|
||||
CVE-2023-37394,0,0,0338eb93ab89f059f3206d02bfc24033e086b6f86189917b378799b18d81fa05,2024-11-21T08:11:38.443000
|
||||
CVE-2023-37395,0,0,305aec30b6240f96a61b44d9081d278ebc7566775553900a586862fd5da6f75e,2024-12-11T03:15:04.877000
|
||||
CVE-2023-37395,0,1,ae2ea880c24ffda91fdf95fae1832230039bf46a7989dddf214f9ee098180f21,2025-01-07T21:10:50.467000
|
||||
CVE-2023-37396,0,0,d153f1aeffbef9dae43a5086d1ceff3df8243a40d5d453bcd9d77e66af9665bb,2024-12-19T15:40:24.690000
|
||||
CVE-2023-37397,0,0,495ea247e2c316b481151d70502bd709d1dab32c4174e2af8b8520a039b7ff2e,2024-11-21T08:11:38.713000
|
||||
CVE-2023-3740,0,0,95c282366f230bbe869486165117092592fba41b4089df0587e4879cfea633c7,2024-11-21T08:17:57.383000
|
||||
CVE-2023-37400,0,0,be3704cb1104081f1dd220708905d6e5e97ae560bed0115a1e128e7cfcce3788,2024-12-19T15:41:42.607000
|
||||
CVE-2023-37404,0,0,14062fbfb247d7eff73830bc3da8f5fe1a2fec40a3cca7bee10d3f475380647e,2024-11-21T08:11:39.010000
|
||||
CVE-2023-37407,0,0,0b209ffb8e9ca938a74b56360a4d0a64c3ab986a79c97bef4469477165b630a2,2024-11-21T08:11:39.140000
|
||||
CVE-2023-37407,0,1,4d11a36e41fa3acc5f564431e82d0f4e97124ab39df0cb5f293ada9821e2cabb,2025-01-07T21:06:46.840000
|
||||
CVE-2023-3741,0,0,1ddd4fff44ed6da7a38f77e1cd87d0e1a51a839bcb171f62bcdf113f89dbd961,2024-11-21T08:17:57.493000
|
||||
CVE-2023-37410,0,0,4259c5a1111c28363272e35fbab32b984c617cae11efedba0dfffe4bceca6df3,2024-11-21T08:11:39.267000
|
||||
CVE-2023-37411,0,0,3d58ac698f1ccfd9fb6c0533fcab0f7eaef0b769727ea84c4cc4998507c4495a,2024-11-21T08:11:39.410000
|
||||
@ -229665,9 +229665,9 @@ CVE-2023-38356,0,0,f12d63f114b9597a741e147d04baeda414226256adf5e65851fdad50e811d
|
||||
CVE-2023-38357,0,0,3f5d7a5fbfcf76d163273a9a6775b5595ecc31ad32c5692b81055f402a613177,2024-11-21T08:13:24.547000
|
||||
CVE-2023-38359,0,0,2cc3d7177758a63f58358cc629f055a288bd166f6f79c9c65da1bba1293d3416,2024-12-17T18:55:23.353000
|
||||
CVE-2023-3836,0,0,b938497c6283f522cfc6f320c334e7b21510c79dccb6b10b70b8bb7e99acad20,2024-11-21T08:18:10.880000
|
||||
CVE-2023-38360,0,0,5cb7887101ea5948ba05da06d158ba74b31a85b37a89c27db140b2f43122a4d8,2024-11-21T08:13:24.827000
|
||||
CVE-2023-38360,0,1,1c7da5c7700ad7488c7900db95772c5a2624c05e141bdc9ba48d2000106a4c81,2025-01-07T21:23:43.017000
|
||||
CVE-2023-38361,0,0,5646b0dc24d6ba6ae916f311ff7d533fa4bb30c1b1c8f75f4f9f318ff84a8186,2024-11-21T08:13:24.947000
|
||||
CVE-2023-38362,0,0,b89ce4560dce1640eb355306cdb6b16cd5dd362502c6c26197191d0f29c80026,2024-11-21T08:13:25.080000
|
||||
CVE-2023-38362,0,1,63db9a756cbcd9154b49462038447e02050e91ecd2f3b6d2a3334ae6361cd14a,2025-01-07T21:24:06.857000
|
||||
CVE-2023-38363,0,0,a591869353ec495b6ced3419001a4bc71a1d976d71be89cc15611c55d2ef9dd8,2024-11-21T08:13:25.203000
|
||||
CVE-2023-38364,0,0,8e811d572c6ae14997b41396824245065fc1674c69eae1daee3876448a447237,2024-11-21T08:13:25.330000
|
||||
CVE-2023-38366,0,0,16bd6b400ddaa02bf5571d8eccd7a20051795581659f90f920a074946e4cde85,2024-11-21T08:13:25.467000
|
||||
@ -229852,7 +229852,7 @@ CVE-2023-38537,0,0,e06740b8037277dc127193a81a40981762064d56c04b903dd9547e9105b64
|
||||
CVE-2023-38538,0,0,8e58f8e949a1585b01725192a50b8257f2a8b0d94296dcbdb08e88289892cc4c,2024-11-21T08:13:47.463000
|
||||
CVE-2023-3854,0,0,7b400fbfa45bcf9f9eb1433dc60d5d266ef5f190546d63957537ef59d6609ad1,2024-11-21T08:18:13.467000
|
||||
CVE-2023-38541,0,0,b81a698819b354a0e07def0edeb32d53a43cd3db452c2e7302617161a443f024,2024-11-21T08:13:47.613000
|
||||
CVE-2023-38543,0,1,9e3af4531e43f5677526b7f10f6c415eed9d42534cf2e2ec7e7acb1480c040ac,2025-01-07T19:15:30.943000
|
||||
CVE-2023-38543,0,0,9e3af4531e43f5677526b7f10f6c415eed9d42534cf2e2ec7e7acb1480c040ac,2025-01-07T19:15:30.943000
|
||||
CVE-2023-38544,0,0,8dbb1a660034a252199bf3aba268cd48e857709594f614422deafbb9308a766a,2024-11-21T08:13:47.867000
|
||||
CVE-2023-38545,0,0,e07825bf96f297953b47ccb383822b1252760769cb01a7a6e2fee9ceace4d8e1,2024-11-21T08:13:47.993000
|
||||
CVE-2023-38546,0,0,00c2dff4f6b2ae33ce75cd3cce35fd9b9d277894f55f990507e4d4d09e93f29d,2024-11-21T08:13:48.237000
|
||||
@ -231601,8 +231601,8 @@ CVE-2023-4069,0,0,e431deddcbd630c623287b5871baaa61aa2bf1909bdce248c6d3d4d2bd6def
|
||||
CVE-2023-40691,0,0,087ac100d38a251659a8131cdad7785d92f33627762816b8d3172bffde69cf54,2024-11-21T08:19:58.663000
|
||||
CVE-2023-40692,0,0,5e7c518b1554d99a2ca07d24eb723bafa15164b0260043d2eb05fa50377b0109,2024-11-21T08:19:58.837000
|
||||
CVE-2023-40694,0,0,6645cd2c1b2fdda25bb07cabf5866a02754a531518083f7d9184fa97b42b0648,2024-11-21T08:19:58.987000
|
||||
CVE-2023-40695,0,1,c6c3f0a0fb5a3c3a40b6c32c17c6098f6dd11c821a44d5885c7eb36c167cdffb,2025-01-07T20:26:29.693000
|
||||
CVE-2023-40696,0,1,73098f81c252a21b6ffa6944010799e813c48be6ae2dac4ac51f404be7072d83,2025-01-07T19:14:51.167000
|
||||
CVE-2023-40695,0,0,c6c3f0a0fb5a3c3a40b6c32c17c6098f6dd11c821a44d5885c7eb36c167cdffb,2025-01-07T20:26:29.693000
|
||||
CVE-2023-40696,0,0,73098f81c252a21b6ffa6944010799e813c48be6ae2dac4ac51f404be7072d83,2025-01-07T19:14:51.167000
|
||||
CVE-2023-40699,0,0,8cce2cad9a89e1de8e141d9f23a8df9af780cd94941d7d990fbd3ce17aee5c4f,2024-11-21T08:19:59.373000
|
||||
CVE-2023-4070,0,0,066e18fa8bda5a96bac47b0b24377cff1d84b43a98e9f18feedc5e13462c73f4,2024-11-21T08:34:20.670000
|
||||
CVE-2023-40702,0,0,e74c0f643081715383a8e16bab9b19678bae3ee08bebb83702f0ce5f8f7aba5c,2024-11-21T08:19:59.500000
|
||||
@ -232327,7 +232327,7 @@ CVE-2023-41712,0,0,62ecb3c4b0f816752b56cd0569fe78cb63cd532ea9ce377317f13a1e663ab
|
||||
CVE-2023-41713,0,0,22a2c2c902d0403ee6c301f7437fcaafd37a993e80f5f8e9abead2e079627784,2024-11-21T08:21:31.807000
|
||||
CVE-2023-41715,0,0,9231094ac3a696177f152a50d9a09bedd851ee9a683d7b6b310cdf943029a1cb,2024-11-21T08:21:31.977000
|
||||
CVE-2023-41717,0,0,3499c69e264d16957e1d92a48950a34af6c9e3a4e83d15078b2f17bb199bece7,2024-11-21T08:21:32.140000
|
||||
CVE-2023-41718,0,1,e53d64dcc35525c0691916c6a237389138b17d34aa223f5752ada1e8412ed291,2025-01-07T19:15:31.163000
|
||||
CVE-2023-41718,0,0,e53d64dcc35525c0691916c6a237389138b17d34aa223f5752ada1e8412ed291,2025-01-07T19:15:31.163000
|
||||
CVE-2023-41719,0,0,63f3cefb982a25006ea915460f5f66605d362be42d938b42d843941bd51d3258,2024-11-21T08:21:32.450000
|
||||
CVE-2023-4172,0,0,35171359667f7109d11b9239198c87ea621de2a8ad49820de58561f588f82485,2024-11-21T08:34:32.510000
|
||||
CVE-2023-41720,0,0,57be3467dc157bdad2843a48fe81e854ec2fcf7d8b8b2b0b5f50e3741eb7d129,2024-11-21T08:21:32.593000
|
||||
@ -240145,7 +240145,7 @@ CVE-2023-52638,0,0,c6d956093aab90e17727bec1d09e03b2c3f6f5f0fbd5eeebd240123e9fae6
|
||||
CVE-2023-52639,0,0,b9266e7df56c393cbd7d2f91daa1a5f5d3b49bd1a9fdf904c1c821471c67f58b,2024-11-21T08:40:15.663000
|
||||
CVE-2023-5264,0,0,3e616cabf1a089b6e6cdd95ca27e570fd2ac3366b640b4e1c4e5769bd4fd0c47,2024-11-21T08:41:24.370000
|
||||
CVE-2023-52640,0,0,708b1b04581c76bbcca2f83a78734877c6b33f6cded25f181b3a228af75a749a,2024-11-21T08:40:15.817000
|
||||
CVE-2023-52641,0,1,592af7f4c429865af31c53495a7c752ac71766466d99208a5aded5501f7c7deb,2025-01-07T20:18:38.497000
|
||||
CVE-2023-52641,0,0,592af7f4c429865af31c53495a7c752ac71766466d99208a5aded5501f7c7deb,2025-01-07T20:18:38.497000
|
||||
CVE-2023-52642,0,0,05d60fedf578d1ba56385f5513e46bbdf0600669e68de5121a528e674c343d1c,2024-11-21T08:40:16.077000
|
||||
CVE-2023-52643,0,0,a052e4860e296c0ee05d86ba39ef967c09f91349f04358ad0c2d31e70cf765ee,2024-11-21T08:40:16.210000
|
||||
CVE-2023-52644,0,0,c34c6ce67f7bd1744e5ffb2bc7e1ab174b24b6c795ada11f0160dd6a25188de3,2024-11-21T08:40:16.333000
|
||||
@ -240207,7 +240207,7 @@ CVE-2023-52694,0,0,cfbf017e740a0cf0d210f574e1ea8ca61cee0625c7b19d4dca4bcb082f19b
|
||||
CVE-2023-52695,0,0,984f4b76a47d115f881e67e7241000ffb845ebded2afbe77d441750f5714636f,2024-11-21T08:40:22.767000
|
||||
CVE-2023-52696,0,0,8d3c619e6b67aec84c360870ab51a63b72bf0f1f73bd1e08fb04785342ca53c8,2024-11-21T08:40:22.877000
|
||||
CVE-2023-52697,0,0,671a7cb490453caa76b4ef84f02213be4f065b94138442feda1943d5df1ac542,2024-11-21T08:40:23.073000
|
||||
CVE-2023-52698,0,1,dc918e5419de6d571c6117f3cfa5beafb8c09e338285110139e171aa94e0afd7,2025-01-07T20:18:13.340000
|
||||
CVE-2023-52698,0,0,dc918e5419de6d571c6117f3cfa5beafb8c09e338285110139e171aa94e0afd7,2025-01-07T20:18:13.340000
|
||||
CVE-2023-52699,0,0,7ae259a98c648d116baaac9a0a2fb48438466ea1ef5c4ff6f25c6dad558d8939,2024-11-21T08:40:23.313000
|
||||
CVE-2023-5270,0,0,028b3369e4393aaac4eae433175a5edbad7b5425254bbb3b4903c56b3f73ee7f,2024-12-23T15:18:44.853000
|
||||
CVE-2023-52700,0,0,941df9df38105cf470545869077a5e89f909e73a5596a4472b2ed873ccfca7ff,2024-11-21T08:40:23.517000
|
||||
@ -243634,6 +243634,7 @@ CVE-2024-10537,0,0,245f407c71543e9ed1f1e8091a091327bb8b8bb7a6ad44fab60dad856af50
|
||||
CVE-2024-10538,0,0,61014a490bb67ac6333227cbe080cbc3323afad1485db0781083c911c48fb77e,2024-11-14T13:27:00.400000
|
||||
CVE-2024-1054,0,0,94b651608db3d30d3daebf6e295a99b6cb748f5b340c93c3e226c28c09fa8fa8,2024-11-21T08:49:41.570000
|
||||
CVE-2024-10540,0,0,45dc62d2a6882ed78eb940dad2c8292ca30098100a55bb2bb2d5e31ef03fa351,2024-11-04T13:18:27.017000
|
||||
CVE-2024-10541,1,1,17e645860588c5290ea1de09ebbe30e3ee704356357c444bb1176f1b7d6de69a,2025-01-07T21:15:11.490000
|
||||
CVE-2024-10542,0,0,b3e07484251514e52f0e88e2f4715863b15a20a77b62be04e1c46b181791456c,2024-11-26T06:15:07.683000
|
||||
CVE-2024-10543,0,0,90ed84dfbad8ca67e321375858c5c3c79d5c97a1d4224d37fe3ff44d9ef23ac7,2024-11-08T21:19:02.700000
|
||||
CVE-2024-10544,0,0,1bdfbd43adcd8874b1d0e0fced36513ba83ecb83c2ae7fcf0e84ae50dc2443f2,2024-11-01T12:57:03.417000
|
||||
@ -247346,7 +247347,7 @@ CVE-2024-21254,0,0,ca5a61847414e5686e028062adf6af23040b45bb319b3657a3584462ead36
|
||||
CVE-2024-21255,0,0,add4c955b981a3076cea346ec3a18ea4e9f5e51e47b4b234e1b1f3ce176112a5,2024-10-18T18:16:50.040000
|
||||
CVE-2024-21257,0,0,7feb6ca18f4c7ab0b40ef8d13e4835d8441b817ed51b4f20b125f44783b82b3f,2024-11-06T22:55:18.400000
|
||||
CVE-2024-21258,0,0,19bbc464aa5d2fbb9ef1bdb1e9f31517c1bd3577455200e481e8fe34ec625df9,2024-11-06T22:56:19.527000
|
||||
CVE-2024-21259,0,0,bd8d73af255fa71fbf763d2afc8cb43bb42e4abb98a932960e1049e52a909cf5,2024-10-18T15:00:17.133000
|
||||
CVE-2024-21259,0,1,26a004b56ef6804b22fb308baea616e6bab2cb436eaf74d4037265c8604784d5,2025-01-07T21:16:14.797000
|
||||
CVE-2024-2126,0,0,e9479a9fb042176157f8223dce67ad410aa32310af0a1f3ceee175bce508ec4a,2024-11-21T09:09:05.117000
|
||||
CVE-2024-21260,0,0,d3876c08dbb0a88c0e2ef8ee94d63f41849715f9d921f55c480e0c8b1a0af1ff,2024-10-18T19:05:29.830000
|
||||
CVE-2024-21261,0,0,2cab31e1a64c8464debb8734cc85ed8dbe5360082fe40024c1550d3766bf219b,2024-10-21T18:27:17.307000
|
||||
@ -247532,7 +247533,7 @@ CVE-2024-21439,0,0,b4de77c1b44ae433db50d72eb6467ad113a52ff535c478fb00b6733aa8d8c
|
||||
CVE-2024-2144,0,0,bd55c3e242215167621c383bf5dd406306578bd4f4401f4b644791f5fe39f163,2024-11-21T09:09:07.537000
|
||||
CVE-2024-21440,0,0,1259e2b506f536c13fe55e40d7ba60f51486a69462fae5526e6743dbca1db03d,2024-12-05T03:25:52.233000
|
||||
CVE-2024-21441,0,0,0a4dc823b20e791363ed6237d2233d35d039061038cc40d1dd049cedef8731f8,2024-12-05T03:15:20.800000
|
||||
CVE-2024-21442,0,0,07043c996397604f9ac949a9f5aa813358583b656cdcc31b44ac426bb9a025e8,2024-11-21T08:54:22.560000
|
||||
CVE-2024-21442,0,1,e33f04825343ab789d0034882ebb9e4ece99f0ebb7e7b69c95eec54b9d9a6ddb,2025-01-07T21:18:53.787000
|
||||
CVE-2024-21443,0,0,c2e6ed54d01619298231829fdf2a396f626a40f55cf63ef5452fea36519eb2dd,2024-12-27T17:51:02.103000
|
||||
CVE-2024-21444,0,0,a8c6c6274226dbd29fa0d9ac33fdf9a2b6daef7a6f57066d1b02a7561d909a58,2024-12-05T03:18:50.527000
|
||||
CVE-2024-21445,0,0,82395e1bf965267a108ae6c83941355d531d61dc0cf2e64a73b3ce95db8a8b88,2024-12-27T17:51:59.413000
|
||||
@ -247914,14 +247915,14 @@ CVE-2024-21845,0,0,0b5c9f7aae0924a3862ec7a96e0d785053823d9c4d4b1e4e83d815264370b
|
||||
CVE-2024-21846,0,0,0f052eb872b1673703402ec5c955c7e8b4c0fc134d1ccc21f7d4ff8929a257a5,2024-11-21T08:55:06.823000
|
||||
CVE-2024-21848,0,0,35252b842e230026a48a4227271bf34000651cb11c68e2a5903447968ed3f995,2024-12-13T16:36:59.837000
|
||||
CVE-2024-21849,0,0,b358000d3cb8925554482dcc184b5dd54860030956160bd8e569954a069a741a,2024-12-12T19:10:52.200000
|
||||
CVE-2024-2185,0,1,b4be232b56e364ee9de27665c2e6f874bb7f51bb6ee6a56cdb11326265f749a0,2025-01-07T20:42:49.500000
|
||||
CVE-2024-2185,0,0,b4be232b56e364ee9de27665c2e6f874bb7f51bb6ee6a56cdb11326265f749a0,2025-01-07T20:42:49.500000
|
||||
CVE-2024-21850,0,0,3f4996285ba8f36af13beac4e19f7f6eaac6b7c930044e4f18b3bcd24f607c71,2024-11-15T14:00:09.720000
|
||||
CVE-2024-21851,0,0,357d45614df90945550287893cfbeb32cbb4c927c6c52e5c9529544fa122fec4,2024-11-21T08:55:07.400000
|
||||
CVE-2024-21852,0,0,74a89e8ad5e242dcaa69632c98166ec72cd5d0a1eabe8107cc899068b6ea0ada,2024-11-21T08:55:07.547000
|
||||
CVE-2024-21853,0,0,03873964bacd463823aea35d75df2179a268a9ee8ab035ecc0200603d0f2ddea,2024-11-15T14:00:09.720000
|
||||
CVE-2024-21855,0,0,cd01486a1dbc0a9a886ff2827620764e44df4ea15f59879419eb00eb59af385d,2024-12-20T17:05:24.753000
|
||||
CVE-2024-21857,0,0,c575350fcef843725e7ef275d0f3a96677c72165608cfb91eba4d11094a1a3f8,2024-08-14T17:49:14.177000
|
||||
CVE-2024-2186,0,1,e7b9bc33689c26748efbb2d9800c342e319e02f8dc6c3d554b2a80d535cba19e,2025-01-07T20:42:22.523000
|
||||
CVE-2024-2186,0,0,e7b9bc33689c26748efbb2d9800c342e319e02f8dc6c3d554b2a80d535cba19e,2025-01-07T20:42:22.523000
|
||||
CVE-2024-21860,0,0,c33a33edbd83b6963f5e370eb0c3bd18861faf04570d72f488d2420923622b3b,2024-11-21T08:55:07.907000
|
||||
CVE-2024-21861,0,0,6b46cab83c4653618e7f5bd1ab4b2560afcb293785e1fc5ffbe383635565d28f,2024-11-21T08:55:08.070000
|
||||
CVE-2024-21862,0,0,cae542eee890ef9bb6fceb8a06c060e70a53518f8f628e986a2314a90fc0fc98,2024-11-21T08:55:08.207000
|
||||
@ -251275,7 +251276,7 @@ CVE-2024-26621,0,0,f287c9063032a301fe385469e2711a2664244dd0593a1fc0cc0e696517e39
|
||||
CVE-2024-26622,0,0,44771474d96e6a32e262a8e82c8d605514616358779ded6b7654a20fc0c2a12a,2024-12-11T17:36:15.267000
|
||||
CVE-2024-26623,0,0,0559021091993fe9db37214ef7cd77c9efff423028df4dd92763f3af84de83b6,2024-11-21T09:02:42.767000
|
||||
CVE-2024-26624,0,0,dfec722c86cb19deabe85be0fdccacdcf71bc34ee8cead4ebe6ca2d88e75d73c,2024-03-27T14:15:10.163000
|
||||
CVE-2024-26625,0,1,4ef7613269bfa498d42e416f035cc6661e69596240803b3ec29e423a2773965c,2025-01-07T20:17:40.503000
|
||||
CVE-2024-26625,0,0,4ef7613269bfa498d42e416f035cc6661e69596240803b3ec29e423a2773965c,2025-01-07T20:17:40.503000
|
||||
CVE-2024-26626,0,0,c637241eede756972b018a0fcc06f149dac17cabb0f560373fa5e5595e3e8ad3,2024-12-12T17:26:08.137000
|
||||
CVE-2024-26627,0,0,9f12c31c6ce3575af57af9fa35a77bbd2153ed3ef1d5ea2659ac8c0a7eace89d,2024-11-21T09:02:43.143000
|
||||
CVE-2024-26628,0,0,da7f47400f41cb31ecd3afb43bae4a639d3d68eda0a5da59e7d46fbaf261a8b7,2024-03-20T17:15:07.367000
|
||||
@ -251299,7 +251300,7 @@ CVE-2024-26643,0,0,265075385090bf0e4e7c3bf5dd42e26aa590c7fbf73f4fca758ef0cd3664d
|
||||
CVE-2024-26644,0,0,3e955ecc04cafd50770b4e01603b044ae0abf17da766c5be4deb9ef73da57365,2024-11-21T09:02:45.230000
|
||||
CVE-2024-26645,0,0,bdee23b950a8dff0fe3120bc636185265634a180ed90c1f8f21f6b1361aee6ee,2024-11-21T09:02:45.353000
|
||||
CVE-2024-26646,0,0,5c3b675eed417f04e79fbe9a962446c0936c3d49eec6b3e012c1e53cad995753,2024-11-21T09:02:45.490000
|
||||
CVE-2024-26647,0,1,0087defa8b2daf5e29c0c380220574740551b7537aefbd17ea5876ff9a0ca272,2025-01-07T20:15:48.587000
|
||||
CVE-2024-26647,0,0,0087defa8b2daf5e29c0c380220574740551b7537aefbd17ea5876ff9a0ca272,2025-01-07T20:15:48.587000
|
||||
CVE-2024-26648,0,0,57660c3f5372b373298dbe0cd29fd4332764e7181a5b50e285b698a5ae516b44,2024-11-21T09:02:45.723000
|
||||
CVE-2024-26649,0,0,e755538fa424fa67581263d7164952806f11ff46847ca4f67e57e88a22ecb657,2024-11-21T09:02:45.903000
|
||||
CVE-2024-2665,0,0,e8a4fbd065beb502154468fd78b921bced0b1204d6203610753a8aa8e33e647d,2024-11-21T09:10:14.640000
|
||||
@ -251344,21 +251345,21 @@ CVE-2024-26684,0,0,7aa60e463942f2c72d93ddfc8a0b68ac9056fa18048f70d6c381cb5fe8681
|
||||
CVE-2024-26685,0,0,d788863551b13aca79bd9e91f7defc379df7538a66da57b8c8f0d772600cb03c,2024-11-21T09:02:50.510000
|
||||
CVE-2024-26686,0,0,c1cdfdf069774f9f1a258f3fcde20f093223b3fed9526d89f0a4d95e2acb3a5a,2024-12-09T13:10:00.537000
|
||||
CVE-2024-26687,0,0,55d2e164366a53f2463770b85dedb6b40cdbd484c5c1068cd2bbd41cd0d1cb60,2024-11-21T09:02:50.820000
|
||||
CVE-2024-26688,0,0,2d3bf5721d0821a5b92d7cc11d5dd7313b5c89213c2e9bdc19b591cbd2c7d5ab,2024-11-21T09:02:50.947000
|
||||
CVE-2024-26688,0,1,a0933753ecf706512391da968c1bf6e01179d03229619ccebb51447535c3b458,2025-01-07T21:12:29.727000
|
||||
CVE-2024-26689,0,0,3990e6568ef2171cfa776ff7d235c6bb3e88f3ec5aa2c29b003efb5d71ec2178,2024-11-21T09:02:51.073000
|
||||
CVE-2024-2669,0,0,c588913dfaa588cf78efc07ab4d9bf054643db6c53a4f3ed9269092984658c62,2024-11-21T09:10:15.140000
|
||||
CVE-2024-26690,0,0,2c7b24fb82937969d4004e2fcf893dbb69bba8a0a64d7e77bdd23c96decb3399,2024-11-21T09:02:51.193000
|
||||
CVE-2024-26691,0,0,7878b9be6d1b840ce81b6b9ba5d2bb037a477b0ec0114b4a6fa216b7702e37ca,2024-11-21T09:02:51.377000
|
||||
CVE-2024-26692,0,0,e7f487356d74c96106975bf2abfe9db6d6da6422f0939133b174aaec264ed9e0,2024-11-21T09:02:51.487000
|
||||
CVE-2024-26693,0,0,0d216053635f1d975b6125d601423966cfb8e3352e6cb20eea467a9c7f54bfc5,2024-11-21T09:02:51.593000
|
||||
CVE-2024-26694,0,1,31366aaef63a6678374a95d259ee5e17e7b5f964d9e410ff050a98b8f6c7cbb0,2025-01-07T20:53:53.143000
|
||||
CVE-2024-26694,0,0,31366aaef63a6678374a95d259ee5e17e7b5f964d9e410ff050a98b8f6c7cbb0,2025-01-07T20:53:53.143000
|
||||
CVE-2024-26695,0,0,1ae7cd1e1e85f699df2959b2788d7af1c813dbc8bb82849f43b281e54bed1937,2025-01-07T17:27:31.323000
|
||||
CVE-2024-26696,0,0,265278528371538cc023600a4c7d8dbbc5ef61d12e3796a87a5522e53c60b655,2024-11-21T09:02:51.970000
|
||||
CVE-2024-26697,0,0,45e5cf8cc205b6572bf2614df87fc02ee354aaf14f2ce522f92421e8870dc643,2024-11-21T09:02:52.090000
|
||||
CVE-2024-26698,0,0,f3c474569b48f60e66044478a18c11a89915914693da10adf07718688bd99993,2024-11-21T09:02:52.217000
|
||||
CVE-2024-26699,0,0,0b80c7a4d186d8dc0c9dedc04a03a65f2409d878d3e6a8441dd6b732b9a45aeb,2024-11-21T09:02:52.340000
|
||||
CVE-2024-2670,0,0,ee5a365e52a4a0c176386e10c0e370e69b922461fd0630b822d8ac97c67fccc0,2024-11-21T09:10:15.280000
|
||||
CVE-2024-26700,0,1,d340b64f76c76c9e47b3fd93523ba35bc98d09d990c5461e898e1d4216e0399a,2025-01-07T20:26:40.460000
|
||||
CVE-2024-26700,0,0,d340b64f76c76c9e47b3fd93523ba35bc98d09d990c5461e898e1d4216e0399a,2025-01-07T20:26:40.460000
|
||||
CVE-2024-26701,0,0,b03e1ce32248050afb32bc7948ab24791df0affca83332817771b6e5cd8267b8,2024-04-03T17:15:50.720000
|
||||
CVE-2024-26702,0,0,b5af06f31671bccc450c0989ef4ab99a946595a7c4a168f34f6c9ec495d6a954,2024-11-21T09:02:52.640000
|
||||
CVE-2024-26703,0,0,8e81605caebe413a04ffd15d9f1628a42c2dec0efcddf166b5d3f822f05e79e7,2024-11-21T09:02:52.843000
|
||||
@ -251374,9 +251375,9 @@ CVE-2024-26711,0,0,8dccb84b3c19a8be9b5c23386e56431114b107c936ab5d88e825fada25c33
|
||||
CVE-2024-26712,0,0,fb8685ddd0683cdabb2327df61ff8cea2e7e86fcfa201af9434b63269c960077,2024-11-21T09:02:53.947000
|
||||
CVE-2024-26713,0,0,e7e300ec5bbfa68ba83e0a47cb90f58abff0db2ab2dd369821dd312aa798bced,2024-12-19T12:15:06.330000
|
||||
CVE-2024-26714,0,0,87db1e3510e7967d782bddedfcd8da69fbf9dd7de01e3acc10c009bc5f1ae976,2024-11-21T09:02:54.257000
|
||||
CVE-2024-26715,0,1,5ae11c6f26422b5fce76497cbf0825dce861f7ce3314d6efe4d1a3f4e53e909c,2025-01-07T20:25:50.327000
|
||||
CVE-2024-26716,0,1,fd0bb09e387c4c792e9af49d76ec08db20adb4a2f2405ca74a5c652c09a1a316,2025-01-07T20:24:08.810000
|
||||
CVE-2024-26717,0,0,7b0bca736d524de19c0e00e378dd20b4e516f8a07cee5fa2f3ccb3c887524650,2024-11-21T09:02:54.607000
|
||||
CVE-2024-26715,0,0,5ae11c6f26422b5fce76497cbf0825dce861f7ce3314d6efe4d1a3f4e53e909c,2025-01-07T20:25:50.327000
|
||||
CVE-2024-26716,0,0,fd0bb09e387c4c792e9af49d76ec08db20adb4a2f2405ca74a5c652c09a1a316,2025-01-07T20:24:08.810000
|
||||
CVE-2024-26717,0,1,46c391c98b1b32eddf64a008a07bf662b627805646f0b2a7812f9b60cc4c81f0,2025-01-07T21:16:14.697000
|
||||
CVE-2024-26718,0,0,b71c0a254c7aad42c306d673849eee87146b27e1c3e5db37335467c2a89b2d97,2024-11-21T09:02:54.723000
|
||||
CVE-2024-26719,0,0,49272ffb2292f3d85039eb80d999203cc47568c7ee88d8dd11d75770d1415067,2024-11-21T09:02:54.847000
|
||||
CVE-2024-2672,0,0,37c31eab6f5cd3fb8466d604392093c92b8e3eb9dce60eeef838946e4f379074,2024-11-21T09:10:15.560000
|
||||
@ -251388,8 +251389,8 @@ CVE-2024-26724,0,0,43e9a149198997f589b6cd208e12f3a69d3baa8ce56112adffc81394841c1
|
||||
CVE-2024-26725,0,0,e9fe20a5c5e5470547a40a8d97f1401a07214b8c6c4b76fbce65efa947d2335c,2025-01-07T17:28:15.293000
|
||||
CVE-2024-26726,0,0,a2e6006099000b7188e7331f1757708510f6f822879749731a4c6d16b7b3a5dc,2024-11-21T09:02:55.767000
|
||||
CVE-2024-26727,0,0,f9e493a2bebe6568fa8635c090fa7c3e7b404bd3fd35053c77015e7873b7cdd0,2024-11-21T09:02:55.880000
|
||||
CVE-2024-26728,0,0,338379872f24f5239a89f2a94a5bc497d4b27c1cc10ab739d5f79b5a2f1814b7,2024-11-21T09:02:55.997000
|
||||
CVE-2024-26729,0,0,9f93d80f4cfc862fa6702110f35a22991166890e89d7bb1467e45d00cb7837ae,2024-11-21T09:02:56.113000
|
||||
CVE-2024-26728,0,1,7a1b5252bba1cef22267913e083366e2f39c736eb8eef161449f7ded9aaebcba,2025-01-07T21:15:57.473000
|
||||
CVE-2024-26729,0,1,24cf9adc4db4b9564630e9709ebc75b534e05f18a43df73e371a82f4fe1149a6,2025-01-07T21:14:13.190000
|
||||
CVE-2024-2673,0,0,eb02539fc7c795b37ffb3a29a53cdb85bbf62191410ae4d0ae87b7214fdb4b02,2024-11-21T09:10:15.700000
|
||||
CVE-2024-26730,0,0,4282f275af7b9ab810034661a7d2fe758e353eb17c2f903213e76a01d8248927,2024-11-21T09:02:56.220000
|
||||
CVE-2024-26731,0,0,93df8098dbc8b35339297c34d2cc186ab96abe59edc56773a7bed56c8ef330b4,2024-11-21T09:02:56.323000
|
||||
@ -251399,7 +251400,7 @@ CVE-2024-26734,0,0,d8df93e379db9f8ef23f0da2e3b3ff375dd783ed41c8881d3342919ab9533
|
||||
CVE-2024-26735,0,0,23416017cb42c35b17ab61282110d884834e0c54e876d15ce4bdaf6d667bf541,2024-11-21T09:02:56.883000
|
||||
CVE-2024-26736,0,0,b29129ddb5d3afb3852cff1b0fe131c66351f86286513d203d1c2dae3f9ca5da,2024-11-21T09:02:57.090000
|
||||
CVE-2024-26737,0,0,03a6f3a24bd6f11bc15a839c4e708d9160bb2b3e53fb885adad418a2aca958d6,2024-11-21T09:02:57.210000
|
||||
CVE-2024-26738,0,0,70cc2f36f2f1843016c91868853f1d3cb6c904553112ede4ffd2ba15f359199e,2024-11-21T09:02:57.417000
|
||||
CVE-2024-26738,0,1,7401dc8ccba47014fc09b50b349b2fbe5d1a660cb458a9c717c4b0bf3e62c9a2,2025-01-07T21:13:43.273000
|
||||
CVE-2024-26739,0,0,3e91524254897924d33159faf525041742412059c301b8791dc3047a5453f1e7,2025-01-07T17:28:37.057000
|
||||
CVE-2024-2674,0,0,8fe3ca5c10cd895f32135cc2d60fd9befe59849157b4cb265f3ba85a4513aee7,2024-11-21T09:10:15.840000
|
||||
CVE-2024-26740,0,0,5c985b6d9944a225321eb8d8626fe328a08a180b8b9ad6ec1127b25a27e4e7b4,2024-11-21T09:02:57.653000
|
||||
@ -251417,7 +251418,7 @@ CVE-2024-26750,0,0,94dd61c3c28ff5b4b8be06dbb38fde205c5b9d50e1d14542fa5032faf9ddf
|
||||
CVE-2024-26751,0,0,1e619e8fe0318e1c48482a9e82bff0725291c1d0b69bffec38f5e08d3f2af80b,2024-11-21T09:02:59.333000
|
||||
CVE-2024-26752,0,0,8b44b0cbe238350cd3aba9d2cef251b57898811e1fd6d1e9877c06b446f7e0df,2024-11-21T09:02:59.473000
|
||||
CVE-2024-26753,0,0,3e95fab79cfa5db33e808b0f0ced27ef7c3e60e59f402c3da90378d05e29d3e5,2024-11-21T09:02:59.593000
|
||||
CVE-2024-26754,0,0,a275b9743c15d110f0920e9a74d7b86d06f71096bc480ed6cd8bb8452d4a7502,2024-11-21T09:02:59.710000
|
||||
CVE-2024-26754,0,1,175be97ba4873a77188833236c6ae06bc719c11b1be4fb508248fd70bc0f47e4,2025-01-07T21:13:04.700000
|
||||
CVE-2024-26755,0,0,afbbb8c803ab19908e74568d9ad9d4969c2fce1da26912e6aec42da718604890,2024-11-21T09:02:59.840000
|
||||
CVE-2024-26756,0,0,277504566c3f61e232c5a3428990fe53a476b409dd55cca3fc33763192194c3e,2024-11-21T09:03:00.037000
|
||||
CVE-2024-26757,0,0,ea19223d6591c0bb304a57b49e3343899072ac606ffd2b71bfbed5f59d9bfd66,2024-11-21T09:03:00.147000
|
||||
@ -251528,7 +251529,7 @@ CVE-2024-26851,0,0,6e3bec1a4c10667fb8ac1e3787bac484f3ff56735f1084c7552b609d42ad9
|
||||
CVE-2024-26852,0,0,86895d5a9082f520ea7cc4247cf45e9a0864c97e8f51f735ee80ceef101e0307,2024-11-21T09:03:12.853000
|
||||
CVE-2024-26853,0,0,92cc7cb6502d647ed7793d48a497cabd5b87799860a174a884240562d715c3a3,2024-11-21T09:03:13.087000
|
||||
CVE-2024-26854,0,0,0c9ab848ba46617ecbcffd4f1556a5554ce08fb9c94a290def4913695ceb8d33,2024-11-21T09:03:13.223000
|
||||
CVE-2024-26855,0,0,4fa27f572b760b7d4fa187c4ed90475ea061e437e669b812f2b520951b870fea,2024-11-21T09:03:13.437000
|
||||
CVE-2024-26855,0,1,56b630f771d4eb82fb88fdfce22b5e50ddb19d9e6dfda25139a755420be7f379,2025-01-07T22:06:59.357000
|
||||
CVE-2024-26856,0,0,60453161c4585e438d0182f59b3246f8975d2405c75589121dc24920bd956503,2024-11-21T09:03:13.557000
|
||||
CVE-2024-26857,0,0,17f9879de007a3724949c9b26519f2d2821087aeaa81cfe5596c2e79c9baddf5,2024-11-21T09:03:13.687000
|
||||
CVE-2024-26858,0,0,8ecfbd5757c21058ce63348d67f9ca24ef7a65e27484e67bd18128e756205172,2024-11-21T09:03:13.893000
|
||||
@ -252982,8 +252983,8 @@ CVE-2024-28756,0,0,690c3487a07876dd049c19665e845da2f28dadbd04cc6a33595a627926345
|
||||
CVE-2024-28757,0,0,8dcf3053aeb841f4c3a05d9db7c88ad0311eeb143731b145bb3e58cda5d82a20,2024-11-21T09:06:54.427000
|
||||
CVE-2024-28759,0,0,c922889c9fbea01425ba4e2700505b2918fd90679ef9f59186bfe2fa2d671d0d,2024-11-21T09:06:54.587000
|
||||
CVE-2024-2876,0,0,71c3a804e8eb8bd03fb495c4bf9bde93ee7dd07888efcbbc5faa48502cbce8d5,2024-11-21T09:10:43.890000
|
||||
CVE-2024-28760,0,0,68e010dc44e656e286ebd73c538be9ce7268acda0fbfa9110862129c79d923fb,2024-11-21T09:06:54.740000
|
||||
CVE-2024-28761,0,0,616b7e09c3bcd95cb79ce0093cc728c720fcdd0e8df0ed8d707b9bd5ccafd84e,2024-11-21T09:06:54.880000
|
||||
CVE-2024-28760,0,1,87ee4a50e50beb3eb3a2ff436ddbd84c55b2df2ce2872466f7017d881731ed16,2025-01-07T21:02:43.143000
|
||||
CVE-2024-28761,0,1,f990216988bc90d162638e8b7945a6d12e4276303d0bad539d5b65fad7ce50a0,2025-01-07T21:02:54.690000
|
||||
CVE-2024-28762,0,0,e7146f96c55753c65cd4f661c712c523979eaaba20e1cbe7b3b78b7197e1711c,2024-11-21T09:06:55.017000
|
||||
CVE-2024-28764,0,0,42363a94f8163c9cad8147d31e6295d669ad4dcbcb1cf61276272a7a155229ea,2024-11-21T09:06:55.180000
|
||||
CVE-2024-28767,0,0,3dcbbe23de561638ccf8a9738544653a62b61fe75d19cdbb00efaaf18a46718a,2024-12-20T14:15:23.850000
|
||||
@ -253094,19 +253095,19 @@ CVE-2024-28902,0,0,6935ffbe9d1c3f809438d600a7f6adc91e111fc1d33b218365dfa5a7c37c4
|
||||
CVE-2024-28903,0,0,64ec3b664b527dc5202a815956ff5fb4d37fd90ed4f608888e1bf4cd1af17166,2024-11-21T09:07:09.347000
|
||||
CVE-2024-28904,0,0,9f007588993cf4a4ddcca27129a47e2feae065c5111b453c43fc38b2aff0f7f2,2024-12-05T18:54:13.320000
|
||||
CVE-2024-28905,0,0,a08eee1382a1bc3a2ad1eab03718f1c1af09a74713904c7f3a9b3b8a590e95d7,2024-12-05T18:50:21.030000
|
||||
CVE-2024-28906,0,1,2d31615044f057a4577ab855bd3b743067a2cccf8fb6a4a0761ba8b0e41a1734,2025-01-07T20:30:25.303000
|
||||
CVE-2024-28906,0,0,2d31615044f057a4577ab855bd3b743067a2cccf8fb6a4a0761ba8b0e41a1734,2025-01-07T20:30:25.303000
|
||||
CVE-2024-28907,0,0,6962329ba7e3ae2352f1b9ea34d824ac8e100aa431c0de37f35c4650a2e18f3d,2024-12-05T18:28:21.740000
|
||||
CVE-2024-28908,0,1,e189c552850b13ca5d7cf421de7fdb33bf42d073e18ceb4a8a422b1f433b922d,2025-01-07T20:22:56.653000
|
||||
CVE-2024-28909,0,1,2869f3da223760286387aba0b464ef4c8875977e0881d377c9525fc6f7881df0,2025-01-07T20:20:43.007000
|
||||
CVE-2024-28908,0,0,e189c552850b13ca5d7cf421de7fdb33bf42d073e18ceb4a8a422b1f433b922d,2025-01-07T20:22:56.653000
|
||||
CVE-2024-28909,0,0,2869f3da223760286387aba0b464ef4c8875977e0881d377c9525fc6f7881df0,2025-01-07T20:20:43.007000
|
||||
CVE-2024-2891,0,0,1ff34ae211a25afff02de381688fd5a4684ffa990ce2b6494a9492549a569d38,2024-11-21T09:10:46.173000
|
||||
CVE-2024-28910,0,1,e3b369e4a8d472d72e9a19b12774a71460fc4bab55bc84a0c4568ee848a06deb,2025-01-07T20:17:51.460000
|
||||
CVE-2024-28911,0,1,5df5116a7758f00ac661fba3cb2509ac1329af2e07838f553897093eddccdcad,2025-01-07T20:11:27.670000
|
||||
CVE-2024-28912,0,1,652f6f09ef9e3cb510a1123a480abcb8fb57058b882893d580010967efb9e099,2025-01-07T20:08:15.217000
|
||||
CVE-2024-28913,0,1,3680b0f7a5cea0c8ffb90c366d0338d5211c1942b9d5d8480bdc5ddc82421b30,2025-01-07T20:03:28.853000
|
||||
CVE-2024-28914,0,1,8b0b3b0fa5a15e2252e78d407a87af3f4d7576daf56d9f4726d1bc959cd00697,2025-01-07T19:51:53.947000
|
||||
CVE-2024-28915,0,1,4d9efd3b5de3b2e9930bbec9717f9230f7b3a49711c9d523bcf861dacb977e7c,2025-01-07T19:48:07.427000
|
||||
CVE-2024-28910,0,0,e3b369e4a8d472d72e9a19b12774a71460fc4bab55bc84a0c4568ee848a06deb,2025-01-07T20:17:51.460000
|
||||
CVE-2024-28911,0,0,5df5116a7758f00ac661fba3cb2509ac1329af2e07838f553897093eddccdcad,2025-01-07T20:11:27.670000
|
||||
CVE-2024-28912,0,0,652f6f09ef9e3cb510a1123a480abcb8fb57058b882893d580010967efb9e099,2025-01-07T20:08:15.217000
|
||||
CVE-2024-28913,0,0,3680b0f7a5cea0c8ffb90c366d0338d5211c1942b9d5d8480bdc5ddc82421b30,2025-01-07T20:03:28.853000
|
||||
CVE-2024-28914,0,0,8b0b3b0fa5a15e2252e78d407a87af3f4d7576daf56d9f4726d1bc959cd00697,2025-01-07T19:51:53.947000
|
||||
CVE-2024-28915,0,0,4d9efd3b5de3b2e9930bbec9717f9230f7b3a49711c9d523bcf861dacb977e7c,2025-01-07T19:48:07.427000
|
||||
CVE-2024-28916,0,0,7e8518a9373fa848d2766930cdc99728632e579ae0d86f80b414ea87c8f277e4,2024-11-21T09:07:11.097000
|
||||
CVE-2024-28917,0,1,89bc645416800446819a0650a2fb393ffa2225d66115e5b665d823e1631a9607,2025-01-07T19:29:24.970000
|
||||
CVE-2024-28917,0,0,89bc645416800446819a0650a2fb393ffa2225d66115e5b665d823e1631a9607,2025-01-07T19:29:24.970000
|
||||
CVE-2024-28919,0,0,aafa3cfe96f5188bd9152d58f128e96a412041872d57e6b50d887b3f050539ba,2024-11-21T09:07:11.350000
|
||||
CVE-2024-2892,0,0,74c239cacaa79151a1c470c6b6fc24b5a5eb0198576c9c168529a88848909c96,2024-11-21T09:10:46.323000
|
||||
CVE-2024-28920,0,0,8d9bd6a3440ce6d19f673b3fe6a9e1359093edcf28c49624e6aa256d0d806b46,2024-11-21T09:07:11.497000
|
||||
@ -255315,15 +255316,15 @@ CVE-2024-3189,0,0,cf3c2d45c5c1f6cc61b6d398c2f0b2f840ed23d80ea9e7c4c6d89950994902
|
||||
CVE-2024-31890,0,0,651fa0b1e1cfc65d537ba9b852527cb69af9fe2a04587dff5261b833582033b6,2024-11-21T09:14:05.540000
|
||||
CVE-2024-31891,0,0,01ff6a81cab4a69609149b5caef3f483d0f0e227ded20c94a2b847f21423d70d,2024-12-14T13:15:17.630000
|
||||
CVE-2024-31892,0,0,135dcdbc319a0ed23513a221119da13b2a8156f6458cff759f3b3e22d1b3e094,2024-12-14T13:15:18.877000
|
||||
CVE-2024-31893,0,0,1ee5de64a507073e1576552d494f92a47974a8768c38ce20796f66762af14f93,2024-11-21T09:14:05.667000
|
||||
CVE-2024-31893,0,1,f9f7cc52ac70574dbdc37ee8d3b0b8ab46f5010ec8db22134e66e018bc4778d8,2025-01-07T21:03:12.027000
|
||||
CVE-2024-31894,0,0,07db0489096a710a1181f86402d3a99764c6888ab4e60622f37ae6ec81631794,2024-11-21T09:14:05.810000
|
||||
CVE-2024-31895,0,0,bb7c808cedfab935c4b791381449fa00e1393d5ea1cf070e6cc5e4a4ab36ed78,2024-11-21T09:14:05.943000
|
||||
CVE-2024-31897,0,0,482d60ce194a404c922472f634fe27b65cdb7d56b2dfc2459272befae42533ec,2024-11-21T09:14:06.077000
|
||||
CVE-2024-31898,0,0,2bdf434c4d06bca201e71e4a7c99060368586d3dea800b988968adc32062eddf,2024-11-21T09:14:06.253000
|
||||
CVE-2024-31899,0,1,e3477cb6ba6850b36435640b21267340780a9020b61b2670506bdd2d9d1ba253,2025-01-07T20:02:40.877000
|
||||
CVE-2024-31899,0,0,e3477cb6ba6850b36435640b21267340780a9020b61b2670506bdd2d9d1ba253,2025-01-07T20:02:40.877000
|
||||
CVE-2024-3190,0,0,bad297e304fb4b0d6eafd0a234cf1fc72af8a9c2c234dc9ef80f9a08d6ffcbca,2024-11-21T09:29:06.810000
|
||||
CVE-2024-31902,0,0,003a18851ece455ee1e6ea2a4455c0284b8742534b1304a5388aa31d40a16816,2024-11-21T09:14:06.483000
|
||||
CVE-2024-31904,0,0,5f5d88f0484ab34936eb86409c567784521f9f068dbf78e68d57fb0bc21f336d,2024-11-21T09:14:06.617000
|
||||
CVE-2024-31904,0,1,d2a04e1afb3ab14e7bd62c982b1ec9fbcf0becba36a47360842f1553f25b269c,2025-01-07T21:05:40.810000
|
||||
CVE-2024-31905,0,0,4f1bdfcd5321f7b992df963e233e7a11fb0781b24167b44218cf69a784597a28,2024-08-28T22:08:30.560000
|
||||
CVE-2024-31907,0,0,766c5037edcc6c2c834f4d55bbd6954e77b70d6bdf71d2c01d166b4beda2cf32,2024-11-21T09:14:06.817000
|
||||
CVE-2024-31908,0,0,b99423df6404f34750bc64b8c4574b7d4db6c4a5987445ad5dba0b24ab9eb708,2024-11-21T09:14:06.937000
|
||||
@ -258004,7 +258005,7 @@ CVE-2024-35522,0,0,2626616769563e7a96297f39345d530eb58b02f356a18fe02e8e08a2db8a5
|
||||
CVE-2024-35526,0,0,de3a832d01072d880b0e7f865e64ed7d95d3fed5f854bbcc2e5b8cb7231ebca2,2024-11-21T09:20:23.833000
|
||||
CVE-2024-35527,0,0,d802d5954ff7f9b39a6b2dc0af26915bbf794a29707ccef9cebcfa3c1be1edad,2024-11-21T09:20:24.040000
|
||||
CVE-2024-3553,0,0,c997e76340d2569cee154991e02a7ad2e13c17e9507753eb8dd6bd1059f541e8,2024-11-21T09:29:51.813000
|
||||
CVE-2024-35532,1,1,2d6a1e6edf6723210792fea24e36d8fe80ee885db9e530e01977e15143747c2c,2025-01-07T20:15:29.627000
|
||||
CVE-2024-35532,0,0,2d6a1e6edf6723210792fea24e36d8fe80ee885db9e530e01977e15143747c2c,2025-01-07T20:15:29.627000
|
||||
CVE-2024-35537,0,0,21d93b44cce1e0ea0c269b874880ed5b770c1a2fdf35d7de97a57a169f267fd1,2024-11-21T09:20:24.273000
|
||||
CVE-2024-35538,0,0,1466111acec37e4d2df7289bfbd264c0429fad437a46245bcd2bfb14bbd7c76d,2024-08-20T15:44:20.567000
|
||||
CVE-2024-35539,0,0,4f279216ce5454db3adbdb46420f92fade8a007bf9e1d3c6bbc30aa69408e3de,2024-08-21T14:35:10.017000
|
||||
@ -261233,7 +261234,7 @@ CVE-2024-39528,0,0,c79ba2efce8080439e31061a59d60d49ff19a7d0e674f985945fc09dd7915
|
||||
CVE-2024-39529,0,0,07f2d85334985052d06798e7918102d9dc582f03d4d04e26f78822a1712fdc51,2024-11-21T09:27:56.317000
|
||||
CVE-2024-39530,0,0,51b367e2f05743e4f39c9cdaa9d7be3668935616532004771da83875016c1458,2024-11-21T09:27:56.513000
|
||||
CVE-2024-39531,0,0,459b011e4c3f1134a81db60cc80e40554ccfdac4af0c9514d1507b5a00cba421,2024-11-21T09:27:56.690000
|
||||
CVE-2024-39532,0,0,6f17118e46bbf178ffc0c19f5efbe73e7ab4c476379d2d51acb370a41356d70c,2024-11-21T09:27:56.860000
|
||||
CVE-2024-39532,0,1,4e654fe3f3fc798a571bbe8bc7c174c4c2234ea22efe56fa51b1b77175e722e7,2025-01-07T21:15:11.583000
|
||||
CVE-2024-39533,0,0,9173059361e83f3e5c35e883f22f5c6f7c4018530ced5cb7ee239b8c3299b88e,2024-11-21T09:27:57.003000
|
||||
CVE-2024-39534,0,0,3b21e0bd2000bbec85c5cd71fc3cc60e6f9a339fda2a638c4078d5a94d1acfe8,2024-10-15T12:58:51.050000
|
||||
CVE-2024-39535,0,0,5d67b38c02f98e745cc8eb5481b9722c64305d5b562b0327f0da191b27abef95,2024-11-21T09:27:57.230000
|
||||
@ -261692,7 +261693,7 @@ CVE-2024-4042,0,0,cecab8b1687d6be49a591036e1f884eeaaaac74f662dec1e0d521caf21f5dd
|
||||
CVE-2024-40420,0,0,2cc64060c56a9cd8ae43221cc949a39e78df1f9a724e5e5fe2d1f288499041f6,2024-12-18T20:15:22.773000
|
||||
CVE-2024-40422,0,0,66694de383944722e2f25fc6c01858a58042d8c38d3705e14f9fc82648bd4ecd,2024-11-21T09:31:04.907000
|
||||
CVE-2024-40425,0,0,57fa5f5d788296fbd065197156216c884c87febf9dc0d47016294cebb94993ba,2024-11-21T09:31:05.133000
|
||||
CVE-2024-40427,1,1,1fb052fdadb0605579fe48a16ba2ab3f64cfc776f49819992accdd9953796a46,2025-01-07T19:15:32.260000
|
||||
CVE-2024-40427,0,0,1fb052fdadb0605579fe48a16ba2ab3f64cfc776f49819992accdd9953796a46,2025-01-07T19:15:32.260000
|
||||
CVE-2024-4043,0,0,d4b5f95f306543d879cec12e990f7b6a12bdbc75a98caec12c24a6e719c63084,2024-11-21T09:42:05.460000
|
||||
CVE-2024-40430,0,0,546dc110e07f45ee3ffd84e8af87c8ef8c5f6d93dcd27e587cb3a3c5233f7799,2024-09-13T21:15:10.357000
|
||||
CVE-2024-40431,0,0,e23592fbcb9fa660acf205a0231389b077a5c59972c85ee664d839efe06b83e4,2024-10-25T12:56:07.750000
|
||||
@ -264720,13 +264721,13 @@ CVE-2024-44289,0,0,cebc5a6dd69bb4dfb6fc1913fbecdc8def2c3ab557066dcaad90744b17bd9
|
||||
CVE-2024-4429,0,0,472cc76d4e2d79b293ac3f5fbb2003341a74de830a9679197105713be5b829ff,2024-11-21T09:42:48.820000
|
||||
CVE-2024-44290,0,0,3f10326ddda1c7d048782a293610e4b0eadcb04b9c4d906fd270793108dd8832,2024-12-16T22:15:06.690000
|
||||
CVE-2024-44291,0,0,9fbd08e4a2248003e1aa444c3a50c6b5ccdfdd8d43ab2891c86e69ab7e61bce8,2024-12-16T19:15:08.180000
|
||||
CVE-2024-44292,0,1,f31278c8b11189f7e88880f9a06e8a9b515052f5634156c446409bd71b5b0014,2025-01-07T19:11:30.300000
|
||||
CVE-2024-44293,0,1,5262123e91fdeff9f4e62ccf3b4dbc5904b965efdd877d91d60494ebf3a083bf,2025-01-07T19:08:46.427000
|
||||
CVE-2024-44292,0,0,f31278c8b11189f7e88880f9a06e8a9b515052f5634156c446409bd71b5b0014,2025-01-07T19:11:30.300000
|
||||
CVE-2024-44293,0,0,5262123e91fdeff9f4e62ccf3b4dbc5904b965efdd877d91d60494ebf3a083bf,2025-01-07T19:08:46.427000
|
||||
CVE-2024-44294,0,0,39c4b8619d1953e77ef2c82b0222202a45c3a25d1ed0c03e471ab470880aa0e2,2024-10-29T21:35:21.347000
|
||||
CVE-2024-44295,0,0,fb3bb1168f264d5ea57ac326382812654e52d772ee8cf2d79e0cd717b2d51c9c,2024-12-12T18:21:21.147000
|
||||
CVE-2024-44296,0,0,5fa9d13f224f3a0a67aaaa3541de4a3651fe9910d7529312fb8483d35af02925,2024-11-14T14:58:09.900000
|
||||
CVE-2024-44297,0,0,15b11a1a880cbcc6b8dc8f6c7e90f9afa6080bf98d20fe4b15a67c3ef7cd8eaa,2024-10-30T15:35:17.777000
|
||||
CVE-2024-44298,0,1,64784e81947396c199d7c1d021c6b05802cd1ece1576c434a521b3dd9f3dca38,2025-01-07T19:00:43.213000
|
||||
CVE-2024-44298,0,0,64784e81947396c199d7c1d021c6b05802cd1ece1576c434a521b3dd9f3dca38,2025-01-07T19:00:43.213000
|
||||
CVE-2024-44299,0,0,3fad1e1fc6e494d5112c8007d008afd8a0cdb0129eb46588d4ade8d86481d2e9,2024-12-13T18:47:10.657000
|
||||
CVE-2024-4430,0,0,cd2b5f6c22c5864ef6fbb53b96bda6b69614cea20c5eca84025328f7be701bc0,2024-11-21T09:42:48.940000
|
||||
CVE-2024-44300,0,0,bae43a573b0fc5576aad7e68076991c0fff3f7113750dddf3be341943a7729db,2024-12-20T19:15:07.507000
|
||||
@ -264779,7 +264780,7 @@ CVE-2024-44439,0,0,532d340c7125d38b3791848ed20a07920e65477c51ca4d64efca5629beabb
|
||||
CVE-2024-4444,0,0,feeaffc9146fccf0816d38147af86858ffa3c68d94baf1fab273954d1c7348c4,2024-11-21T09:42:50.610000
|
||||
CVE-2024-44445,0,0,70e29647242626c5fc3cd02b62378e61567a9538e073b5b0672118158325e4f5,2024-11-21T22:15:07.637000
|
||||
CVE-2024-4445,0,0,46341af9b6fb502c6f33de80f90e54dcbc98c3195a6f7b6924f2303483fe6e07,2024-11-21T09:42:50.723000
|
||||
CVE-2024-44450,0,1,b6d4cb9f3062751960bc65f4ba2a54253ec161ef54efc949eeaece289e8f3cb4,2025-01-07T19:15:32.417000
|
||||
CVE-2024-44450,0,0,b6d4cb9f3062751960bc65f4ba2a54253ec161ef54efc949eeaece289e8f3cb4,2025-01-07T19:15:32.417000
|
||||
CVE-2024-44459,0,0,6692baff458ff714d53ffedc49b8e8781eaf99012cbbded46425655a64ca52e7,2024-10-30T20:35:29.427000
|
||||
CVE-2024-4446,0,0,a4fc1a809d7fdafb7a075aa0f7592e0b84c47ee34b07d544758f459a4a149dac,2024-11-21T09:42:50.843000
|
||||
CVE-2024-44460,0,0,9863860565b5b349bc349acea444639a968dc1cc5f314565dcb3e0a824f6c075,2024-10-30T19:35:23.557000
|
||||
@ -265787,7 +265788,7 @@ CVE-2024-46239,0,0,039d008e66cebe4327bee95b97b4914de6b1e6cba80f55339b9918f2122a1
|
||||
CVE-2024-4624,0,0,b8449ff3b8e0ee2c88b4f6d45e1af5d82eabc4c0852145584765c0329d0b8432,2024-11-21T09:43:14.500000
|
||||
CVE-2024-46240,0,0,1191cdf44b6509cbee2a8abac44a625a4ac7bf4a3622ea84bd1d88a32af8af69,2024-10-25T19:00:20.737000
|
||||
CVE-2024-46241,0,0,1f0674ec17f2d56b2953e5c99a2b749bf8e4230c80e89ee3aa315644015de064,2024-09-26T13:32:55.343000
|
||||
CVE-2024-46242,0,0,d23dfffa50059d3cca3d03fe3bd881789dcf7805de796241f7d089988319ccf8,2025-01-07T16:15:33.950000
|
||||
CVE-2024-46242,0,1,769195230f50897f071b58f9b4b54dec1834197fa3d9d04995e60de3195c248b,2025-01-07T21:15:11.783000
|
||||
CVE-2024-46256,0,0,e8ff1292d6b21c7ae8cc6b0452346dfd4818ec086d9a14227767a4b9e342f7b1,2024-10-24T17:15:16.690000
|
||||
CVE-2024-46257,0,0,2e21e52a1504a13633477840dbd557e9ad05285ae3938c3634988f0489dcfd2d,2024-10-24T18:15:08.617000
|
||||
CVE-2024-46258,0,0,c52e6b996ce625372477bea80c1b4801ac61785137225fc2e692df95afee475a,2024-10-04T16:41:08.497000
|
||||
@ -265943,8 +265944,8 @@ CVE-2024-46598,0,0,cc14f076324de01fb0aedc665220d3a3ce311adfb4ca6be3700a7951d6f4c
|
||||
CVE-2024-4660,0,0,61cefac851d738e6211130f613c3c24b72cb5a59425ed2099eb13a6958c5f9b7,2024-11-21T09:43:19.410000
|
||||
CVE-2024-46600,0,0,a2edf2944e549d9be47dd52eb91fd1fdfd1682be8e1c383075c7935775b4a0c4,2024-09-26T13:32:02.803000
|
||||
CVE-2024-46601,0,0,d1aa8c76af546481926d81fa58587c0b0819234b4bbf0362674827e463f9a514,2025-01-07T16:15:34.087000
|
||||
CVE-2024-46602,0,1,9bf065832521a48ba06a7d71177908b2b7ce3608232449bb38e1d8f5f48286b3,2025-01-07T19:15:32.597000
|
||||
CVE-2024-46603,0,0,836e3dc8bfaeddf29857fbecb92cd5946281a59796c24b0d8d2aec535913b1f1,2025-01-07T16:15:34.370000
|
||||
CVE-2024-46602,0,0,9bf065832521a48ba06a7d71177908b2b7ce3608232449bb38e1d8f5f48286b3,2025-01-07T19:15:32.597000
|
||||
CVE-2024-46603,0,1,c30a25f7b88dcc01303c233fbff3cb3e51c22a29f42bd3bc5cdd7863e4696348,2025-01-07T21:15:11.983000
|
||||
CVE-2024-46605,0,0,1055d0ef26a73f5e645f2fdb8709387122d75ec2801b9b56966b3a9b26aba333,2024-10-18T12:53:04.627000
|
||||
CVE-2024-46606,0,0,28b5ab017aae3b940eef21410c789c635db9a13916d1c5cd18485d534534131f,2024-10-18T12:53:04.627000
|
||||
CVE-2024-46607,0,0,60627a32f7e8fcaeaabd9ac6ff6cf0f372f36d39c465be7eb007e5b08e6157e9,2024-09-26T13:32:02.803000
|
||||
@ -267251,7 +267252,7 @@ CVE-2024-48238,0,0,3f2ffc614fa15d916232399b967037f846ea28604374a981ad0466971cf3e
|
||||
CVE-2024-48239,0,0,0c07796f9941e77d31ea455c930d1849f400f89336e89d408653eccdc74bdbd1,2024-10-29T19:35:22.840000
|
||||
CVE-2024-4824,0,0,99e5c25e3efbae2d6155cb78a769b081c4e63979dfca195378dce1a55688edc2,2024-11-21T09:43:41.940000
|
||||
CVE-2024-48241,0,0,942b4afc357baeaceadf6e602d4d8e3bfa0474bc4cebfcbfe23fbed098a739b4,2024-11-01T12:57:03.417000
|
||||
CVE-2024-48245,0,1,7131ea275da65bf915f9243b9e4c8a536d1c22efe172cdad637796c446928e25,2025-01-07T20:15:29.750000
|
||||
CVE-2024-48245,0,0,7131ea275da65bf915f9243b9e4c8a536d1c22efe172cdad637796c446928e25,2025-01-07T20:15:29.750000
|
||||
CVE-2024-48249,0,0,2b7bc564c0f7feefef01fa93cd50d56ca2a93e73b5f3eb01b90321a2b54ebe80,2024-10-15T18:35:15.607000
|
||||
CVE-2024-4825,0,0,5c1d8ba2e7dfb16ca18af9c563e1590f25a3d396f69347243d31cae6dbf069a9,2024-11-21T09:43:42.050000
|
||||
CVE-2024-48251,0,0,c80def3e238ed0fab4e8dad7bc06f5b33b90fcccea2cf3bdaafbfe1c7c4fb67e,2024-10-17T18:35:12.280000
|
||||
@ -267322,7 +267323,7 @@ CVE-2024-4845,0,0,e1e461ef60509dabf0e7e2dde808d36cb958becba4b5c88bdf30fa8f1c23ed
|
||||
CVE-2024-48450,0,0,2ad4bca80a954b5a64850267d64cde36a0cc73a58476afe8de69f997e4304a47,2024-10-29T21:35:23.350000
|
||||
CVE-2024-48453,0,0,3e4df1eeae274bbab92d66627c425462f4715efda5653276293edf2b80192e38,2024-12-12T02:04:03.420000
|
||||
CVE-2024-48454,0,0,9e0f8e82bd55ca3c8b98e816c5edf51ab830449d458f68194479be7d35927289,2024-10-25T12:56:07.750000
|
||||
CVE-2024-48455,0,0,6e133e8ee57b44bba6c49d6e60aaa60c9d55d5d8bd2e95486d0bc2e58c6233d2,2025-01-06T22:15:09.510000
|
||||
CVE-2024-48455,0,1,a648d35b2f8e965b19a855c3cf0ba90eba06b6a31f91dba6390c9d300b4dd829,2025-01-07T22:15:30.620000
|
||||
CVE-2024-48456,0,0,fbb569fb57e72aec0b2b4128e6a8adfd90b8bb9238365e9a09eddcb2d6533a26,2025-01-07T16:15:34.867000
|
||||
CVE-2024-48457,0,0,99b77ae7cdd1ef223e036610bca59359991ba4db95d35fe9aa786febce4524d5,2025-01-07T16:15:35.057000
|
||||
CVE-2024-48459,0,0,f2ab7e7f3244c10dbfc979fa6bc201608cff2894282b5a96f254cb41fcce18b6,2024-10-29T20:35:32.737000
|
||||
@ -270645,7 +270646,7 @@ CVE-2024-53333,0,0,fec584e947b0ef91060e7974c2bc2800b0a5e22197ac40e517d4bb4ecce04
|
||||
CVE-2024-53334,0,0,16279143f552729b554e869e900fcdb0e710a67308c49b11d3ac0e3ed52e676d,2024-11-21T21:15:24.810000
|
||||
CVE-2024-53335,0,0,c7b5a8f73d12d44b7820d29b4dc55e553a7dba1e50218bfd0cdeaf78dc12e004,2024-11-26T18:15:19.850000
|
||||
CVE-2024-5334,0,0,cb79190d7e117b2165ef511634fe8d33c9e23cab24dd6ad00dc4efad8b756c7c,2024-11-21T09:47:26.523000
|
||||
CVE-2024-53345,0,1,c1df2ca9bd6e970d2bf0dbceea5a58876e705d442c82eed7def9cfc5fe58518f,2025-01-07T20:15:29.923000
|
||||
CVE-2024-53345,0,0,c1df2ca9bd6e970d2bf0dbceea5a58876e705d442c82eed7def9cfc5fe58518f,2025-01-07T20:15:29.923000
|
||||
CVE-2024-5335,0,0,227008637fcf0f08540aa31f6f2f1e0a27300047ea0b90140042ff30c0f0094f,2024-08-21T12:30:33.697000
|
||||
CVE-2024-5336,0,0,3be15ca705f47dea3ffc9a0dd73cdf82724f581c9671519a64e222f9d7a209cc,2024-11-21T09:47:26.713000
|
||||
CVE-2024-53364,0,0,924e143b4294f3ffb491904ae2396d08e4637aeb46539cceee83f2ecfb2d4d99,2024-12-02T20:15:07.487000
|
||||
@ -270693,7 +270694,7 @@ CVE-2024-53506,0,0,9dfa3208f902ab3513f3502d8928ce98e8eedec2f27ad06842644780d149d
|
||||
CVE-2024-53507,0,0,12d141a23906013906618b23cee234cf31c91fd8e1e8d9da3760596286952af5,2024-12-02T17:15:13.707000
|
||||
CVE-2024-5351,0,0,a2df3cc9be27d64a2cd3dc5a2f1d5f6a44f6e98794670e6c0c19928c9af58ef2,2024-11-21T09:47:28.610000
|
||||
CVE-2024-5352,0,0,afede3a744404a4b63e0d831a5ec0e86e744b459100c94c26c1030a6d60025a6,2024-11-21T09:47:28.743000
|
||||
CVE-2024-53522,1,1,01c6c63f4eef54d3a96f9df90045ba15d3944187ddf970bcef733c6fb4d720d2,2025-01-07T20:15:30.083000
|
||||
CVE-2024-53522,0,0,01c6c63f4eef54d3a96f9df90045ba15d3944187ddf970bcef733c6fb4d720d2,2025-01-07T20:15:30.083000
|
||||
CVE-2024-53523,0,0,62264463ec7bd597c8cd954da8d0baf08b58aa4c7ac24397d44469055812e6bd,2024-12-11T17:15:20.073000
|
||||
CVE-2024-5353,0,0,797e03a5615e2bede928ac816012d8783c471de5bd74a0480881887afd7a657a,2024-11-21T09:47:28.863000
|
||||
CVE-2024-5354,0,0,e179ff0fdd33289a32ca4c68c73a51c0aa8ddee9c94944cd1d4fd7185f36a76c,2024-11-21T09:47:28.997000
|
||||
@ -270938,7 +270939,7 @@ CVE-2024-53931,0,0,77ff5a910067e68acb1360e732666f9398c8f9d529fa9282c40e4c59ef92a
|
||||
CVE-2024-53932,0,0,a1340f254ee4139622dc4827742470a22bd1d8c2724823dabd329fa8971bf8d2,2025-01-06T22:15:10.187000
|
||||
CVE-2024-53933,0,0,eff8ccb6015491c912bdd95414ebddaaa03db0ff46f959740ee621262994cf84,2025-01-06T22:15:10.293000
|
||||
CVE-2024-53934,0,0,186984c1ab3c6b8a0c4a6202e5bbca851e30216bf20f2c66a54f43deedb614ef,2025-01-06T22:15:10.410000
|
||||
CVE-2024-53935,0,0,07076ad3cb19de6b468d315d885ef4139d86f26f4202655178ffb592f53b0a14,2025-01-06T22:15:10.520000
|
||||
CVE-2024-53935,0,1,e7a89bbaab57e9f8cfa36ddccaa7ded268242ad9837ae15774898afacfe8a75f,2025-01-07T22:15:30.790000
|
||||
CVE-2024-53936,0,0,0fbb410b7e63d8868365f11fe6adaac28e4e5f4dab7ddbba3c6ad260cff18dfa,2025-01-06T22:15:10.630000
|
||||
CVE-2024-53937,0,0,d1cd3a208e2e01cbeda6e314a3aeae43902ecd4a49e9dc0eff32993f2ac3461c,2024-12-03T19:15:12.127000
|
||||
CVE-2024-53938,0,0,d0a91f2a4ef2aa08452cc7e6ae9a19bbc5f3a7a19dbe27547769ceb8e70ec886,2024-12-03T19:15:12.330000
|
||||
@ -270989,8 +270990,8 @@ CVE-2024-54002,0,0,7c5a00df1d470c32b9eac42d93309bb19614d9762fa0f049a771979bb9894
|
||||
CVE-2024-54003,0,0,b632b439005206974a2b4ec6ab08a78e134e0c09d892996aec7289d7221f0377,2024-11-27T20:15:26.133000
|
||||
CVE-2024-54004,0,0,5d94a9bc2fe383b10883d5f21fb711b04368ee28bef8377081c80a039d1c1dee,2024-11-27T19:15:33.723000
|
||||
CVE-2024-54005,0,0,a1140344f7f7dfc4d3d4467b796a2fa8133c201f3d329efe99a74d57c08e17e6,2024-12-10T14:30:47.037000
|
||||
CVE-2024-54006,0,1,6bd5efcea443530b6f536e39e0d35c4df9fc909f18659576dbacb0ce5ccdea52,2025-01-07T19:15:32.803000
|
||||
CVE-2024-54007,0,1,796fbe1a2dec13fc9ac82cc0124bd0d476bde5dd7ac7433c3ded9782c4bc47c9,2025-01-07T19:15:32.927000
|
||||
CVE-2024-54006,0,0,6bd5efcea443530b6f536e39e0d35c4df9fc909f18659576dbacb0ce5ccdea52,2025-01-07T19:15:32.803000
|
||||
CVE-2024-54007,0,0,796fbe1a2dec13fc9ac82cc0124bd0d476bde5dd7ac7433c3ded9782c4bc47c9,2025-01-07T19:15:32.927000
|
||||
CVE-2024-54008,0,0,eea0fea8f522a304d841eaa6b0b75d4fade41407f80f4626ca71a3072a5c233d,2024-12-11T14:15:19.713000
|
||||
CVE-2024-54009,0,0,57a4bb8c66b26b4000e58cbef542e2f0e67be86fc478ee09e8a3296c8cd7f828,2024-12-19T23:15:06.887000
|
||||
CVE-2024-54014,0,0,fef0a2723f6d0eb99b08285b0e1281168729dd64327291d1bbdb15f503c04c5e,2024-12-05T03:15:14.530000
|
||||
@ -271001,22 +271002,22 @@ CVE-2024-54032,0,0,1ae7bed178388a8becc0b2310728246bc38710e9f7ad794feb179bb616bab
|
||||
CVE-2024-54034,0,0,846c3b0b931699290bf75d8254acba5f2bce35b8e0dd38d2639a5ac7272aaf0b,2024-12-19T19:03:03.917000
|
||||
CVE-2024-54036,0,0,5ff59e80ea96b2b983e83d15c9d0716c72355206496f4f700438ea4b4a5594da,2024-12-19T19:02:47.713000
|
||||
CVE-2024-54037,0,0,f556890ba3fe80df125187ebcadddc7ae2b89a3c8454bb4084a0b553458107af,2024-12-18T14:40:29.303000
|
||||
CVE-2024-54038,0,1,11006f86f9ad07fee6554c4706f364c593d2901da83f284a0a21db4b393d28db,2025-01-07T19:15:33.067000
|
||||
CVE-2024-54038,0,0,11006f86f9ad07fee6554c4706f364c593d2901da83f284a0a21db4b393d28db,2025-01-07T19:15:33.067000
|
||||
CVE-2024-54039,0,0,71aebf25c5147d9790628c00b402ce1cee82b243f9de77d9f70b222872f7f46c,2024-12-18T14:40:37.587000
|
||||
CVE-2024-5404,0,0,3740c7be3046d2190332188e66ec21e8b1d4282df75b875095c31d64e80fbe92,2024-11-21T09:47:35.213000
|
||||
CVE-2024-54040,0,0,13233b484ebb0fc9bf3b9db7209ca33808cdf1c4b9bbbc04e46251909657b46e,2024-12-18T14:40:44.710000
|
||||
CVE-2024-54041,0,0,d9bcc030129bf6dec82b04a143991ef06874386036703482c0d5681793cd304a,2024-12-18T14:40:52.247000
|
||||
CVE-2024-54042,0,1,90a1ddd7db7d1b7d5d242a3cfd639eb7c1fe8d6a39b2e8ee608be76bd82a6e1e,2025-01-07T19:15:33.203000
|
||||
CVE-2024-54043,0,1,dc515103146ccb34bd50f3fbefa21435e92bca3e14bf9d14ddffa34196bdae79,2025-01-07T19:15:33.380000
|
||||
CVE-2024-54044,0,1,c20e102efa7ddd5163f9e0b09e33d560997926319ee568a1e3b152f8e8a936b9,2025-01-07T19:15:33.563000
|
||||
CVE-2024-54042,0,0,90a1ddd7db7d1b7d5d242a3cfd639eb7c1fe8d6a39b2e8ee608be76bd82a6e1e,2025-01-07T19:15:33.203000
|
||||
CVE-2024-54043,0,0,dc515103146ccb34bd50f3fbefa21435e92bca3e14bf9d14ddffa34196bdae79,2025-01-07T19:15:33.380000
|
||||
CVE-2024-54044,0,0,c20e102efa7ddd5163f9e0b09e33d560997926319ee568a1e3b152f8e8a936b9,2025-01-07T19:15:33.563000
|
||||
CVE-2024-54045,0,0,16afccc174d0d1eb47914c68c8c94946afb636a9e0351682dbd249dbd8289141,2024-12-18T14:41:55.727000
|
||||
CVE-2024-54046,0,1,4147896988ea400826897ed84751e2d66dc4d1623c45f5f20fac0c38b24df883,2025-01-07T19:15:33.737000
|
||||
CVE-2024-54047,0,1,2db1d2e91f38cc9f98e0063ab03e3d19115b6886a060e6091af5adca0b5efd86,2025-01-07T19:15:33.927000
|
||||
CVE-2024-54048,0,1,ac9598b0e4a940322a0fc0233d3725f9151d3d57b9ea64fd1353bc72c0fe362b,2025-01-07T19:15:34.100000
|
||||
CVE-2024-54046,0,0,4147896988ea400826897ed84751e2d66dc4d1623c45f5f20fac0c38b24df883,2025-01-07T19:15:33.737000
|
||||
CVE-2024-54047,0,0,2db1d2e91f38cc9f98e0063ab03e3d19115b6886a060e6091af5adca0b5efd86,2025-01-07T19:15:33.927000
|
||||
CVE-2024-54048,0,0,ac9598b0e4a940322a0fc0233d3725f9151d3d57b9ea64fd1353bc72c0fe362b,2025-01-07T19:15:34.100000
|
||||
CVE-2024-54049,0,0,b25add6c7f4972fe04c3adfdc0b2278f3dba4fd570c385f036735c8663a66627,2024-12-18T14:42:33.907000
|
||||
CVE-2024-5405,0,0,8df36cd9ebb4aacfaea97c0ae9188e72e9768324f03849be72121f482af48749,2024-11-21T09:47:35.333000
|
||||
CVE-2024-54050,0,1,d86bfacb40d068018684361f59a6c023ffca124558fabdf95f5e1ba05cab6cf1,2025-01-07T19:15:34.280000
|
||||
CVE-2024-54051,0,1,5f58bec93e83d404983aacc63d16a45cdf05389bafc54f5215f8dce6ee3b79eb,2025-01-07T19:15:34.463000
|
||||
CVE-2024-54050,0,0,d86bfacb40d068018684361f59a6c023ffca124558fabdf95f5e1ba05cab6cf1,2025-01-07T19:15:34.280000
|
||||
CVE-2024-54051,0,0,5f58bec93e83d404983aacc63d16a45cdf05389bafc54f5215f8dce6ee3b79eb,2025-01-07T19:15:34.463000
|
||||
CVE-2024-5406,0,0,5db0f501f7c712d4bcce798425460b3472165eeef82fd225689429d234120e5b,2024-11-21T09:47:35.457000
|
||||
CVE-2024-5407,0,0,e082637321598f3dc8c3c9e1760b81a1e1197c4d13cd58fed3245c37f0bb71c9,2024-11-21T09:47:35.567000
|
||||
CVE-2024-5408,0,0,0b23a712a85d13fef48f02294d854672174790bd624dfee1416450ccef66434a,2024-11-21T09:47:35.690000
|
||||
@ -271354,7 +271355,7 @@ CVE-2024-54440,0,0,9b88f7d99cecca6e6d64d74e7bc4b9afd66c4a9b5857582e450bf8ac5f697
|
||||
CVE-2024-54441,0,0,4998045381787fcc4b3ba91881da0472af2407cb6b3b4e86c69cbecd8e8e1ec5,2024-12-16T15:15:23.130000
|
||||
CVE-2024-54442,0,0,4654114cbbe36af251b0a17ca273aa4c42991899ac7df3d541352dc363b8b95d,2024-12-16T15:15:23.273000
|
||||
CVE-2024-54443,0,0,a19735fa20af88aa6b80d25f5f3fba13bc36980cd33611fe0939754004239647,2024-12-16T15:15:23.420000
|
||||
CVE-2024-5445,0,1,c40580d53f9b682d94099117e69022274091b9acdf334d268d23808d911785d3,2025-01-07T20:15:30.600000
|
||||
CVE-2024-5445,0,0,c40580d53f9b682d94099117e69022274091b9acdf334d268d23808d911785d3,2025-01-07T20:15:30.600000
|
||||
CVE-2024-54450,0,0,3b0637c895cf32b1c321f76a19a44544a10628e30551ed123328bb004ad742a1,2024-12-28T19:15:07.103000
|
||||
CVE-2024-54451,0,0,62bfea464680a36276017f91bb5ae11f8712be2380f4e61a47de9850848009b7,2024-12-28T19:15:07.340000
|
||||
CVE-2024-54452,0,0,30db43977a4bb0060f4301184eef5e7e4316f5a66e91aba57b8474d2cdaf07d1,2024-12-28T19:15:07.570000
|
||||
@ -271439,8 +271440,8 @@ CVE-2024-54749,0,0,2c9d895fdb5b90a3967a9403130c1863e1d8648bd0343f58138b0aee4bfec
|
||||
CVE-2024-5475,0,0,3f93fbbe9009c236ea2c6da72827f7bd871ace2e1ffd3b439453d8900914ef7f,2024-11-21T09:47:45.480000
|
||||
CVE-2024-54750,0,0,a2b9bd793ac60105835f796550f4eca54ad7139b40ad2fdf283a28d5ab7647fe,2024-12-09T23:15:34.020000
|
||||
CVE-2024-54751,0,0,1362ae63d46fa3e6e13ddf6e48994d99d3189782d67a09cf0bde552f8a9a1b0f,2024-12-11T16:15:14.910000
|
||||
CVE-2024-54763,0,0,569e1b003ff4063f8b2d3c6abf3b92c3cfcf659be7b3e8d47a113001dd609ca8,2025-01-06T22:15:10.737000
|
||||
CVE-2024-54764,0,0,209c75bf142c690be0633df50e11eea12bb8b77d1b813f37310e8ad2ef7f5122,2025-01-06T23:15:06.510000
|
||||
CVE-2024-54763,0,1,a28abc0036bf5dd37db3abf51504ee9d8814d71bd02efc1ca179d108a93c5f59,2025-01-07T22:15:30.950000
|
||||
CVE-2024-54764,0,1,a35d44940374d4d013f3417b0c39eadc28db9efc4fa6d67b447b188437088daa,2025-01-07T22:15:31.113000
|
||||
CVE-2024-54767,0,0,7c02cf0b0d6cbdcad4d274fa0bc8d056590e80886a47139f828b2d63cc3bf859,2025-01-07T16:15:36.157000
|
||||
CVE-2024-54774,0,0,4ed84230e45b966235391401edd82584405ef683a3e2fc4ff18ea7ccdbfb6480,2024-12-28T18:15:10.397000
|
||||
CVE-2024-54775,0,0,3fdaf8fe1f78335459cdc17721da7bdc51023f16b45ae3c005b68536d3244569,2024-12-28T17:15:07.733000
|
||||
@ -271451,7 +271452,7 @@ CVE-2024-5480,0,0,dcddee05a122e48deec7dd054d03a98cfc3767234733af70ab63ade3136481
|
||||
CVE-2024-5481,0,0,6aaa03c1e132f74e5c4e90ead29bd24eb7065ad2c73e1f2805fbc82099451674,2024-11-21T09:47:45.877000
|
||||
CVE-2024-54810,0,0,98b1b32485df996df7d9929d6a4a4f3f6576d87de7e3a8405b0f88648f287e10,2024-12-13T18:15:21.707000
|
||||
CVE-2024-54811,0,0,c518d2be0055f2f694c9ca48885a5257eabcc0287b36c8555688778fe5e578d7,2024-12-13T18:15:21.940000
|
||||
CVE-2024-54819,1,1,77d4e85444047de3840d61f4b59305e5e917055110df4f1b974d9ad2c652c4a3,2025-01-07T20:15:30.197000
|
||||
CVE-2024-54819,0,0,77d4e85444047de3840d61f4b59305e5e917055110df4f1b974d9ad2c652c4a3,2025-01-07T20:15:30.197000
|
||||
CVE-2024-5482,0,0,201df0de22cd2de6baef389275fa06366007791ec5f711f789012d102cd7d319,2024-11-21T09:47:46.010000
|
||||
CVE-2024-5483,0,0,079d428e5ef1f2457bdcfb946982be872b42b40e94b6bfbc28ab3fe49f413326,2024-11-21T09:47:46.130000
|
||||
CVE-2024-5484,0,0,b3b185b98c733a0f4717de1a808b2127ff5f3061f156212c34336d217a368118,2024-05-31T11:15:09.783000
|
||||
@ -271459,9 +271460,9 @@ CVE-2024-54842,0,0,ccaf3a44f3596e593a08308e4797efa5052c648d3a0bb0b78b9bc5f97386b
|
||||
CVE-2024-5485,0,0,f687486069d8da51bc217d8f3c1b4f2cb223a1d0f0b0390694d1cbb1988c70fb,2024-11-21T09:47:46.253000
|
||||
CVE-2024-5486,0,0,6dfb8e6d8cb1d8bab5afe16e5d1d045c354e9fc780a2307ae97dd3f4b30153b6,2024-11-21T09:47:46.367000
|
||||
CVE-2024-5487,0,0,9fbfbc79e6dff8c3b550139a3c2eecf9b7c4bdde8704bc6cfe1f3d5f4415c8a9,2024-08-16T20:22:51.930000
|
||||
CVE-2024-54879,0,0,fc78c87ad890a14f75e2c419893ddaa2e8d27d4e1393b3bb787cf2908e1ca68d,2025-01-06T18:15:21.880000
|
||||
CVE-2024-54879,0,1,b29885c9d1f972b1a85e410837486f9a5cbdaaa5454176171e37cc430fed9212,2025-01-07T21:15:12.170000
|
||||
CVE-2024-5488,0,0,703a569b98e6f1a8130cee58df129e22e6ef47912a99f32d5a452e25c6109519,2024-11-21T09:47:46.633000
|
||||
CVE-2024-54880,0,0,19b90b651153de387978c7aca82ad8b353028b1b94f86a0a639ec1980415ed4a,2025-01-06T18:15:22.037000
|
||||
CVE-2024-54880,0,1,e5b3a5485624ea2d9e12e0827ea5724e74a008cbdfa4830f07e177ce5a2b6b3e,2025-01-07T21:15:12.367000
|
||||
CVE-2024-5489,0,0,6c00a6a2badf83516471ea1d81b619bbe482cb4a54de89ffa7bd06f7fa1ffabd,2024-11-21T09:47:46.807000
|
||||
CVE-2024-5490,0,0,7e66a0f19af78ba5ab311e474f6c7a834b406cb5857b42d263e55e1190767452,2024-08-27T14:36:10.033000
|
||||
CVE-2024-54907,0,0,80a392b1154d757e3dee13d617bee74a64b3baf8f41f4c6bebbb399698b18a69,2024-12-26T20:15:21.800000
|
||||
@ -271541,7 +271542,7 @@ CVE-2024-5519,0,0,8f24512a902c7b13458f945742cb7fe1d59be3b3655c7a61619611df90263e
|
||||
CVE-2024-55196,0,0,967b3e10360837eff90c3277f4028e12b0cc2c527c2b826781915311e274c9a4,2025-01-02T20:16:06.017000
|
||||
CVE-2024-5520,0,0,2719a0027800a6c03c5991cd5e32370933ecb1de4c1c57d912093caa874b1ac4,2024-11-21T09:47:51.540000
|
||||
CVE-2024-5521,0,0,2b6f458ccb1380159b254eccc510c8e2cee9041e86f89c2477b6805e666cde62,2024-11-21T09:47:51.653000
|
||||
CVE-2024-55218,1,1,92ce18e45b29c67c1b6a0fd63b59f7bd9743f1e01e7df6cfb7d6037be0245171,2025-01-07T20:15:30.310000
|
||||
CVE-2024-55218,0,0,92ce18e45b29c67c1b6a0fd63b59f7bd9743f1e01e7df6cfb7d6037be0245171,2025-01-07T20:15:30.310000
|
||||
CVE-2024-5522,0,0,df1bc4811acd8877854299da044a99554378b9c2498586ce956f30305786dd34,2024-11-21T09:47:51.770000
|
||||
CVE-2024-5523,0,0,0b2c43ef384781b0113b9be6f2b000f9de2199a81d337c7e51164ef3b409e6ae,2024-11-21T09:47:51.940000
|
||||
CVE-2024-55231,0,0,bc333f6409b44ab3c99000a12bad2fde8a29ce447ecd07b39a700d49ee237739,2024-12-26T20:15:22.363000
|
||||
@ -271564,9 +271565,9 @@ CVE-2024-5536,0,0,1f54d5f4d84e17ea150621a726d470a096ebe102b1b2c9727888baf5a5215c
|
||||
CVE-2024-5537,0,0,dc964262ed4087ff313c4be3be100753a858d893c6319a531383572e591004b1,2024-05-30T17:15:34.583000
|
||||
CVE-2024-5538,0,0,349018b8a831720930f224f86428ace57b32dfb3177832784fb8b5e53a9e5993,2024-05-31T11:15:09.923000
|
||||
CVE-2024-55407,0,0,556b85e1087b7070a9c561b1629c1e863de59c432206201377d38b83402acd89,2025-01-07T16:15:36.480000
|
||||
CVE-2024-55408,0,0,ab1bcbfb27fd1483d3ffbbb7fd6604f52d3a36813a1b039bd2c2b2c31076a008,2025-01-06T19:15:13.010000
|
||||
CVE-2024-55408,0,1,f29d22484915f373690eb82371db4cff76b365f8201325c0d76b3e731d67ff58,2025-01-07T22:15:31.260000
|
||||
CVE-2024-5541,0,0,f9b4d455e6b62fc87b5177b190c5e5d55cffd60f56e01c7f957c7d36f3e08c46,2024-11-21T09:47:53.453000
|
||||
CVE-2024-55410,0,0,f21bc15ce65427de3d1568f279150edcc6469479003174eee745e0690e31a73c,2025-01-07T18:15:20.387000
|
||||
CVE-2024-55410,0,1,a341b2a61f8dc44291b67917ab046b0ca56af6f84ecbeba25576f5a2ddd34b5b,2025-01-07T22:15:31.423000
|
||||
CVE-2024-55411,0,0,1aaefe335c6784c1c51d968334cc18ae747aab41b366982bf94b394b831a6ba0,2025-01-07T18:15:20.543000
|
||||
CVE-2024-55412,0,0,17b18ba76fae98112f34a2a804fb362110fc4f134e23a208e67528a65fb8dd1c,2025-01-07T18:15:20.700000
|
||||
CVE-2024-55413,0,0,b1d11b4cd0e66963e957801a3a382988999f51eced77f066473c6ac9888be3ce,2025-01-07T18:15:20.843000
|
||||
@ -271616,7 +271617,7 @@ CVE-2024-5555,0,0,742073dac4de00aad4cb6df58c8d366b01298901468c1f8f2b3d987b013951
|
||||
CVE-2024-55550,0,0,f14b09989fc33e9668bd77f32e52a61daf63a823657985b5bd0cda5251e19e1b,2025-01-07T16:15:36.660000
|
||||
CVE-2024-55553,0,0,3bc316f0af4b80bc58ae910e6172da9ff5010fe0b778c5270df43d1041706470,2025-01-07T16:15:36.840000
|
||||
CVE-2024-55554,0,0,09e3cdaa4a820daeb6598bb5a8faaf533e66285f3e6a4797b593c193d2a0933a,2024-12-17T17:15:09.843000
|
||||
CVE-2024-55555,0,1,0fff864cbeb4400bcfcde3625f1f4cf98f881f2b9aba59b727db3372655bde9e,2025-01-07T20:15:30.430000
|
||||
CVE-2024-55555,0,0,0fff864cbeb4400bcfcde3625f1f4cf98f881f2b9aba59b727db3372655bde9e,2025-01-07T20:15:30.430000
|
||||
CVE-2024-55556,0,0,f6240e3c75d02dffd25d8327c36b48f04ddfbf6dc1d3897c46320c15b6f0b8d9,2025-01-07T16:15:37.017000
|
||||
CVE-2024-55557,0,0,1c44f970be9c9162e2fd5fa3f9e1778bc69c31c3d5707dcbd0caa2e430754ba4,2024-12-17T16:15:25.900000
|
||||
CVE-2024-5556,0,0,f573f07f74091c9ef49ab63e55c790d8f661c071a22a95c82ecfdf6c6886287c,2024-08-27T14:36:53.273000
|
||||
@ -272271,25 +272272,25 @@ CVE-2024-56724,0,0,cc2f7e3f8dc8d55c1d83c89cb0d90d388267abaf43e50a6614a9271f4c553
|
||||
CVE-2024-56725,0,0,0d8c143455dd4c74ade00023de074d019020f9329ec8ea40eab7f04748540c97,2024-12-29T12:15:06.607000
|
||||
CVE-2024-56726,0,0,7396cabb8e6cb5316a0d2b902b918bc1194670ee7afa660cbe82cee81253f4d0,2025-01-06T17:10:17.110000
|
||||
CVE-2024-56727,0,0,eabc494dc2a4c2aa78fd4293bd969b774f7d696451c6d2e61e97848894874fc8,2025-01-06T17:09:19.120000
|
||||
CVE-2024-56728,0,0,f2ee93b21b4b586bc43bd7afb5d904413b46e64426b9c99ca422b148a3d36cd2,2024-12-29T12:15:06.920000
|
||||
CVE-2024-56729,0,0,571aff2aa5aff270b4fb31202621677957065bb98def964761742ced7d4824aa,2024-12-29T12:15:07.023000
|
||||
CVE-2024-56728,0,1,9876b31ab8f2f62b05d07e7b6cd6963d4d5c3e44378c964e0a90a0aa79c2c6a4,2025-01-07T22:03:07.837000
|
||||
CVE-2024-56729,0,1,2c6c814be3178fdefbbd68f1fd2794002dcc90cc7683b20479607fb1bf1edf8f,2025-01-07T21:53:02.797000
|
||||
CVE-2024-5673,0,0,f8b3774ce465f722b68e8727929e95d8d546e4b203a41a4244c7e4dffeee7a73,2024-11-21T09:48:08.057000
|
||||
CVE-2024-56730,0,0,d4ab7ba34f47b3c80faa3ea378d4e530ba63a506a38d471fc2d560e5e085df7c,2024-12-29T12:15:07.130000
|
||||
CVE-2024-56730,0,1,c59cea0a90fbb10c7538383a1832b8ca0fc27e087a27113d6586256c0bdb2474,2025-01-07T21:23:52.260000
|
||||
CVE-2024-56732,0,0,12847f4e6541904299057a6dbcce9d9b25d11860494767f53e7fa399998c84f1,2024-12-28T17:15:08.190000
|
||||
CVE-2024-56733,0,0,c2474ef73dd56102a08444876977f4dc5534d1c12671d5b5a9d94af958afe92a,2024-12-30T17:15:09.990000
|
||||
CVE-2024-56734,0,0,6427d02d23c640a3b0eb03146808f06ca7a42e16ade66d98d53142a7e6b8af94,2024-12-30T17:15:10.133000
|
||||
CVE-2024-56737,0,0,c3aaf99c36c23af464a66c062701c19603d594053e6f3cc8853149bf45f4a8bd,2024-12-31T19:15:48.200000
|
||||
CVE-2024-56738,0,0,2c6e7a0135dc52aa66f71228f9c31faaeccb71b3032abf4849b70327f1510fa7,2024-12-31T19:15:48.367000
|
||||
CVE-2024-56739,0,0,f80ccd01e5b96edf6d42a3a4590df490095fd6315b9dd1db6f820fa259aaf3d8,2024-12-29T12:15:07.240000
|
||||
CVE-2024-56739,0,1,4f6c09aecb431282e0adb0614c417ec109730556bc26b8429f533744c616ad23,2025-01-07T21:21:31.403000
|
||||
CVE-2024-5674,0,0,7c06c249e0424ac37040b124ed7da9cd19cf8f5ce54c37fa3d48f3eda72c297e,2024-11-21T09:48:08.183000
|
||||
CVE-2024-56740,0,0,970f96c10afe908de18d5b77a72b07ed862320da335a222ff91b647a2085663b,2024-12-29T12:15:07.360000
|
||||
CVE-2024-56741,0,0,8a8e29421262cd89391f600f1f520508dd3ace7141d73bbd71e301e892894031,2024-12-29T12:15:07.477000
|
||||
CVE-2024-56742,0,0,3f7cc17d3d11087cf1a22cdfe78fd5f93bb210dba8f43bf7710333d10c715afa,2024-12-29T12:15:07.593000
|
||||
CVE-2024-56743,0,0,fd1d7f8f83191d685ddc5a9db1e22ba4af3166df243bf9d72d013e5b4ebbc13a,2024-12-29T12:15:07.707000
|
||||
CVE-2024-56744,0,0,4fb6fc62444e03b4b24149d4d01a77f456dd95cbd7c45472910876c848ac5814,2024-12-29T12:15:07.817000
|
||||
CVE-2024-56745,0,0,b40e135615f262de3724a7319b7081ad59bcb8e0361d7744019371cf8598c258,2024-12-29T12:15:07.937000
|
||||
CVE-2024-56746,0,0,172916252a614d41841f536ebea02633e8a1f1bfa89d3eaf7c619c78078148c2,2024-12-29T12:15:08.070000
|
||||
CVE-2024-56747,0,0,2a3930adda2877ad219cae5ca5ac16a65b8c270ff5f76553f4625cfaba043f13,2024-12-29T12:15:08.183000
|
||||
CVE-2024-56740,0,1,70a50e80e6a90e1d35505246d853ee996c83b7e5576c2651235f05a5725944be,2025-01-07T22:24:05.593000
|
||||
CVE-2024-56741,0,1,dcf196bf2d7138300d9a677a8269cf2fb8625e786235ea6d7c80e1132d68ca46,2025-01-07T22:19:45.437000
|
||||
CVE-2024-56742,0,1,7deb9b2a167beb7a8fcf4db04a7950563fb235559121cc799b8c4190eed913e3,2025-01-07T22:19:23.543000
|
||||
CVE-2024-56743,0,1,9cd4347068d20096e4006ddd9eca348a120014b53b656235516fbac8cd02e397,2025-01-07T22:18:53.437000
|
||||
CVE-2024-56744,0,1,e47e8659c23e341e004881aab280fa7f5c55f47327c4604d9dc68615ed6fc1b1,2025-01-07T22:14:03.760000
|
||||
CVE-2024-56745,0,1,63922d0f7bf521e7f76f6c3a463c694c1c6303a11796dc8693d9ac5885cd14d0,2025-01-07T22:47:40.577000
|
||||
CVE-2024-56746,0,1,abfb409172a5eaa28b9deb47330deb20a292000d0ed88feaa21e3baad05a4b65,2025-01-07T22:47:17.513000
|
||||
CVE-2024-56747,0,1,3e977f3bc0634213a2f3d8a798976445c5102bef7095b0a437529ad2ef079a3d,2025-01-07T22:47:01.040000
|
||||
CVE-2024-56748,0,0,fb30b675e7357a581772e704fd8acef36fd2795661d5099b6926a52f72af7d5d,2025-01-06T17:07:33.423000
|
||||
CVE-2024-56749,0,0,b0b97a777278ac5c6701ceeeaf8bc5407c17231b9cae6f5871f8fe89d39b5886,2025-01-06T17:06:18.380000
|
||||
CVE-2024-5675,0,0,a93ae1d48690177c193b4a8fbcc4865158a63f066f83c2c6531b88eed5564aca,2024-11-21T09:48:08.303000
|
||||
@ -272300,8 +272301,8 @@ CVE-2024-56753,0,0,6bf8e7013af143083f591269ccf18926bfd2ae2511b74d6745979c86af90b
|
||||
CVE-2024-56754,0,0,0719ef5595d01f11c4fdd47e3e22b1fc21ab1d413809f498383df6b132d482c4,2025-01-06T20:28:24.853000
|
||||
CVE-2024-56755,0,0,205ce7afe96425c287c52b7a72e2ff26171d854700f3cf3d8f25e737abb82fe4,2025-01-06T20:26:39.200000
|
||||
CVE-2024-56756,0,0,bd03068cc43b4cd3609b9bb8866c84806441d6e0d20095ddeda56dff7ba7d05a,2025-01-06T20:33:10.813000
|
||||
CVE-2024-56757,0,0,a9cabd1b9e3bc1032f2ed13919426c61c9c36a86caef86a70fb68faf6d2329dd,2025-01-06T17:15:40.297000
|
||||
CVE-2024-56758,0,0,9dd0a642ae784b8676a7d7ad81b5dd7fc5ec0a04511ef1500ac70b82cc63466f,2025-01-06T17:15:40.597000
|
||||
CVE-2024-56757,0,1,46c6c9ed6516d3e8d957dd15e681278f460a9b87f55fe95de169dcd9aa1996fa,2025-01-07T22:46:35.897000
|
||||
CVE-2024-56758,0,1,2c55925c10785ee32a5bb0aa9138d84e7f9119c83900c2491032df52cfe48084,2025-01-07T22:43:35.403000
|
||||
CVE-2024-56759,0,0,51a4d69e473c95c2503d056afe5ba878b3c1df07567e3048365baf01598b1c06,2025-01-06T17:15:40.900000
|
||||
CVE-2024-5676,0,0,42e21ca7cdab0bdccf25cf6637d45fef7f036494b6d014c88b5835e6e4847379,2024-11-21T09:48:08.420000
|
||||
CVE-2024-56760,0,0,2125177c83e1cff8a660b64e56488eda9a1564eb230e3213cd7e7d6e709ec7af,2025-01-06T17:15:41.173000
|
||||
@ -272310,10 +272311,10 @@ CVE-2024-56762,0,0,60cbcc45f06c16ba0161fce9430eab44b47458e705e9b29759993ec95842a
|
||||
CVE-2024-56763,0,0,5a5e00ab0150e4c9f23d35d9c1a4efb51410e8b448d4cbf3a876661bb5e810ab,2025-01-06T17:15:42.150000
|
||||
CVE-2024-56764,0,0,91b72a2ccbced4a7c9f79beaf4b327a4d43d7e0f7fa40f1c959b20a384ea4c3d,2025-01-06T17:15:42.483000
|
||||
CVE-2024-56765,0,0,2f958432f7b5e0953f9bb292214ab20c0363a79c8806ec0afc9fc2b493a5e4c0,2025-01-06T17:15:42.800000
|
||||
CVE-2024-56766,0,0,bf389ecd458f82d208b3fe6ac0e0cd9630e655e25369cc4984a2771492afc836,2025-01-06T17:15:43.127000
|
||||
CVE-2024-56767,0,0,b14fc64b14624303f26256201fa2e15ffbb1d3fd68d803b6f403b8d6eda55f4a,2025-01-06T17:15:43.477000
|
||||
CVE-2024-56768,0,0,2711975874778288d04f9537752ffd5439cccd65a5b6b2082bec18e66e19f912,2025-01-06T17:15:43.800000
|
||||
CVE-2024-56769,0,0,0353fe7a008f689293e1a78ceaf4d2240ef571b6dfbe38e9939db5ac8e335c84,2025-01-06T17:15:44.063000
|
||||
CVE-2024-56766,0,1,44ccd5c116ae5f54c7fa640969bae2c9a2fd2beb0cf248edd7acf2adcb614ef6,2025-01-07T22:59:50.807000
|
||||
CVE-2024-56767,0,1,d69c719ff44c9bc26c1f6b95810e7e5be266383e1fa4b4ba2c15f5c845d552e2,2025-01-07T22:51:02.250000
|
||||
CVE-2024-56768,0,1,d8373e0dbf214f4feec34d3f904be6536bfb761175850928b1ed7e4f24a9c3b7,2025-01-07T22:50:43.207000
|
||||
CVE-2024-56769,0,1,e75774dddc9639ce3f1ef9c47d4ccb2bed68d565027bcdd2f05bc827ccd14b56,2025-01-07T22:49:54.483000
|
||||
CVE-2024-5677,0,0,1c94c489b32a2f3740f8b8867e0aff380d1e56445098bb97785a4bdba0037977,2024-11-21T09:48:08.540000
|
||||
CVE-2024-5678,0,0,bb4133b16eab99226f567cd512e0bec4d1a7175fc845cb5a8a3e18dcdbfd75d7,2024-08-15T18:05:54.847000
|
||||
CVE-2024-5679,0,0,dc654eef86d673e662acc6dfc1ecb27b2f541880d76227d1d93861f825adc641,2024-11-21T09:48:08.710000
|
||||
@ -276027,7 +276028,7 @@ CVE-2025-0211,0,0,b9d423ddc7f5d7131d18e0c6e82ffdb0d7d511a9f93fbce8fd485a1054d607
|
||||
CVE-2025-0212,0,0,4580d93240903455f5f37037363ed2ecac8e5e965bf219492073a30508f06c44,2025-01-04T16:15:23.003000
|
||||
CVE-2025-0213,0,0,ae6082586b13f3a0897a3a0c9bb93f3136f000a55537ffc29cc265d27526ea6d,2025-01-04T17:15:06.743000
|
||||
CVE-2025-0214,0,0,9254508d81ea0b82f0019bc7737a4434f0760310a24cc79081ad4facc4fcf53a,2025-01-04T17:15:07.507000
|
||||
CVE-2025-0218,1,1,b30dc9959db76bbe16cbb2687253a109c8d9824f5a519b4a12cebcd5992ce308,2025-01-07T20:15:30.710000
|
||||
CVE-2025-0218,0,0,b30dc9959db76bbe16cbb2687253a109c8d9824f5a519b4a12cebcd5992ce308,2025-01-07T20:15:30.710000
|
||||
CVE-2025-0219,0,0,74ca1a5c2e45573606f215442248239c1abebb58720b73e72827cf6185a790f0,2025-01-05T06:15:05.183000
|
||||
CVE-2025-0220,0,0,e2a1de80227234e2ee0ad6599c3e6137c8cd2931a8e4558632166ff8d1637d7a,2025-01-05T13:15:05.850000
|
||||
CVE-2025-0221,0,0,bf2d1013ca5e346bb2f023d267f8796cd36ff872dcfd00def4c61e9ac89e1567,2025-01-05T15:15:17.473000
|
||||
@ -276059,7 +276060,7 @@ CVE-2025-0295,0,0,52a16028421d06d344a294c38baeb65e7eade91eddca5850ff08cb460a814e
|
||||
CVE-2025-0296,0,0,ef99994aa0e927283601f299ff2a2a7b6828140dc06395bd45961df4e93495db,2025-01-07T16:15:39.673000
|
||||
CVE-2025-0297,0,0,e6df0dbc25b69f65f6585e2723e6f83d60a4cc3da33516aa4da5024622d55482,2025-01-07T16:15:39.887000
|
||||
CVE-2025-0298,0,0,ec923ed4b9b6afa6228d656ddb0c601f5ebbf31d02abf4f38a99c8dda70d2f64,2025-01-07T17:15:31.770000
|
||||
CVE-2025-0299,0,1,46c993a70c9dd5843cd4dc3486123b8f79f076cb607c745df442454088b3fb74,2025-01-07T19:15:34.743000
|
||||
CVE-2025-0299,0,0,46c993a70c9dd5843cd4dc3486123b8f79f076cb607c745df442454088b3fb74,2025-01-07T19:15:34.743000
|
||||
CVE-2025-0300,0,0,6462b093b202cdda5c643638789beb08104cb14d8ff95eb1f2f740fecb0f8630,2025-01-07T17:15:32.090000
|
||||
CVE-2025-0301,0,0,db7e09db06a3c89075ef99c6e0773ce8d9b6391802870d788b13b4dc1d994dbc,2025-01-07T18:15:21.460000
|
||||
CVE-2025-21604,0,0,ec728601eba6bd539d6daf316c2c18ea930a896bd5f0099ef67fb1e9d57f3d64,2025-01-06T16:15:30.927000
|
||||
@ -276077,6 +276078,8 @@ CVE-2025-21620,0,0,66289b3b3f28df54a495a49470b309f007a7b7fd72e39a3c6fd58a9e688ab
|
||||
CVE-2025-21622,0,0,6c5785ebf77d1798b874aaffe451a58c4a37257af0382e9b593172ad9a04e2cc,2025-01-07T18:15:21.703000
|
||||
CVE-2025-21623,0,0,6087933d996aad8edaafac7f0dbca82dce0a66add1f565d4e48b576d3a77cbb8,2025-01-07T17:15:32.313000
|
||||
CVE-2025-21624,0,0,48317da35eed5453ecdf02e6a373b353bc1bb2bc0793e255b08a0ed1235e3ac9,2025-01-07T17:15:32.417000
|
||||
CVE-2025-22132,1,1,68d348d844ec3947f7795605dbc0f9b5ea1e9ec0bb464d07ae2fd1571ba27a37,2025-01-07T22:15:31.590000
|
||||
CVE-2025-22133,1,1,c3c09e89206d0579374bc72133ed0f9fade2e2e60ff10357f2761c25411f1f67,2025-01-07T22:15:31.740000
|
||||
CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000
|
||||
CVE-2025-22261,0,0,b64f32ab7c14edb8b70371073baa276f94f41977fffad6128d5b8c7f32ae4fb7,2025-01-07T11:15:13.290000
|
||||
CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user