diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48390.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48390.json index 6a6e957c24d..83ebc6f4761 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48390.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48390.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48390", "sourceIdentifier": "security@unisoc.com", "published": "2023-06-06T06:15:48.860", - "lastModified": "2024-11-21T07:33:18.660", + "lastModified": "2025-01-07T21:15:07.953", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 4.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48438.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48438.json index 176609026a9..633322518fc 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48438.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48438.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48438", "sourceIdentifier": "security@unisoc.com", "published": "2023-06-06T06:15:49.810", - "lastModified": "2024-11-21T07:33:20.947", + "lastModified": "2025-01-07T21:15:08.877", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.5, + "impactScore": 5.3 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48439.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48439.json index b3966583959..611802469ac 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48439.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48439.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48439", "sourceIdentifier": "security@unisoc.com", "published": "2023-06-06T06:15:49.933", - "lastModified": "2024-11-21T07:33:21.043", + "lastModified": "2025-01-07T21:15:09.040", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48440.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48440.json index 84c2a307f86..986a0eccb68 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48440.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48440.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48440", "sourceIdentifier": "security@unisoc.com", "published": "2023-06-06T06:15:50.140", - "lastModified": "2024-11-21T07:33:21.143", + "lastModified": "2025-01-07T21:15:09.207", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 4.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48441.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48441.json index c67b0c9fe25..21ee99fe198 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48441.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48441.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48441", "sourceIdentifier": "security@unisoc.com", "published": "2023-06-06T06:15:50.247", - "lastModified": "2024-11-21T07:33:21.270", + "lastModified": "2025-01-07T21:15:09.367", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 4.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48442.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48442.json index a3bec613e26..eb35f266634 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48442.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48442.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48442", "sourceIdentifier": "security@unisoc.com", "published": "2023-06-06T06:15:50.410", - "lastModified": "2024-11-21T07:33:21.413", + "lastModified": "2025-01-07T21:15:09.540", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 4.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48443.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48443.json index e8d0d5e91e2..daa74c6bc18 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48443.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48443.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48443", "sourceIdentifier": "security@unisoc.com", "published": "2023-06-06T06:15:50.607", - "lastModified": "2024-11-21T07:33:21.527", + "lastModified": "2025-01-07T21:15:09.697", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48444.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48444.json index 934d89e62e4..2eb281b8b66 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48444.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48444.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48444", "sourceIdentifier": "security@unisoc.com", "published": "2023-06-06T06:15:50.703", - "lastModified": "2024-11-21T07:33:21.620", + "lastModified": "2025-01-07T21:15:09.883", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48445.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48445.json index 1f6f9b7f448..e876f73d7ff 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48445.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48445.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48445", "sourceIdentifier": "security@unisoc.com", "published": "2023-06-06T06:15:50.853", - "lastModified": "2024-11-21T07:33:21.740", + "lastModified": "2025-01-07T21:15:10.060", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20725.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20725.json index f379452304a..a96717b0b26 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20725.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20725.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20725", "sourceIdentifier": "security@mediatek.com", "published": "2023-06-06T13:15:11.937", - "lastModified": "2024-11-21T07:41:25.417", + "lastModified": "2025-01-07T21:15:10.227", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20728.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20728.json index 0a6c0f57c72..2ae2dea9fb7 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20728.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20728.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20728", "sourceIdentifier": "security@mediatek.com", "published": "2023-06-06T13:15:12.070", - "lastModified": "2024-11-21T07:41:25.767", + "lastModified": "2025-01-07T21:15:10.397", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20736.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20736.json index 245f52bc90c..d9928f591c2 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20736.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20736.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20736", "sourceIdentifier": "security@mediatek.com", "published": "2023-06-06T13:15:13.083", - "lastModified": "2024-11-21T07:41:26.697", + "lastModified": "2025-01-07T22:15:27.733", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 } ] }, @@ -49,6 +69,20 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20737.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20737.json index e12f564ef0e..55bdd7707e7 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20737.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20737.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20737", "sourceIdentifier": "security@mediatek.com", "published": "2023-06-06T13:15:13.230", - "lastModified": "2024-11-21T07:41:26.817", + "lastModified": "2025-01-07T22:15:28.423", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-667" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20738.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20738.json index 505dc48a69a..cbbeabebb7b 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20738.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20738.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20738", "sourceIdentifier": "security@mediatek.com", "published": "2023-06-06T13:15:13.430", - "lastModified": "2024-11-21T07:41:26.943", + "lastModified": "2025-01-07T22:15:28.617", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20739.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20739.json index 2e0e1a7083f..1da2d14d77e 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20739.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20739.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20739", "sourceIdentifier": "security@mediatek.com", "published": "2023-06-06T13:15:13.590", - "lastModified": "2024-11-21T07:41:27.070", + "lastModified": "2025-01-07T22:15:28.793", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20740.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20740.json index 91237becf3a..649d85c5270 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20740.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20740.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20740", "sourceIdentifier": "security@mediatek.com", "published": "2023-06-06T13:15:13.727", - "lastModified": "2024-11-21T07:41:27.190", + "lastModified": "2025-01-07T21:15:10.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20741.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20741.json index 83641be37f1..f0c07b25753 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20741.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20741.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20741", "sourceIdentifier": "security@mediatek.com", "published": "2023-06-06T13:15:13.873", - "lastModified": "2024-11-21T07:41:27.300", + "lastModified": "2025-01-07T21:15:10.730", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20742.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20742.json index 65a0324fa7e..77a9b592276 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20742.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20742.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20742", "sourceIdentifier": "security@mediatek.com", "published": "2023-06-06T13:15:14.033", - "lastModified": "2024-11-21T07:41:27.417", + "lastModified": "2025-01-07T21:15:10.920", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20743.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20743.json index e8ed5d5f931..da1476ed916 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20743.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20743.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20743", "sourceIdentifier": "security@mediatek.com", "published": "2023-06-06T13:15:14.163", - "lastModified": "2024-11-21T07:41:27.537", + "lastModified": "2025-01-07T21:15:11.097", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-667" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20744.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20744.json index 8ee5df8098f..f6cf6f053a5 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20744.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20744.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20744", "sourceIdentifier": "security@mediatek.com", "published": "2023-06-06T13:15:14.370", - "lastModified": "2024-11-21T07:41:27.647", + "lastModified": "2025-01-07T21:15:11.247", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2132.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2132.json index f942d28b833..ef467718b04 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2132.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2132.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2132", "sourceIdentifier": "cve@gitlab.com", "published": "2023-06-06T17:15:14.090", - "lastModified": "2024-11-21T07:57:59.417", + "lastModified": "2025-01-07T22:15:29.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-1333" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2157.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2157.json index 3806034e1af..09303eec713 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2157.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2157.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2157", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-06T20:15:12.120", - "lastModified": "2024-11-21T07:58:02.920", + "lastModified": "2025-01-07T22:15:29.647", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2253.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2253.json index 56f830eb9c7..ab915768e8e 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2253.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2253.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2253", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-06T20:15:12.493", - "lastModified": "2024-11-21T07:58:14.710", + "lastModified": "2025-01-07T22:15:29.833", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23583.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23583.json index 5efd85ab800..f91a95a24dc 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23583.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23583.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23583", "sourceIdentifier": "secure@intel.com", "published": "2023-11-14T19:15:18.113", - "lastModified": "2024-11-21T07:46:28.483", + "lastModified": "2025-01-07T22:15:28.987", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secure@intel.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -72,13 +72,23 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-272xx/CVE-2023-27283.json b/CVE-2023/CVE-2023-272xx/CVE-2023-27283.json index 2cd93e29c7a..096eed94f36 100644 --- a/CVE-2023/CVE-2023-272xx/CVE-2023-27283.json +++ b/CVE-2023/CVE-2023-272xx/CVE-2023-27283.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27283", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-05-04T14:16:01.720", - "lastModified": "2024-11-21T07:52:34.810", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T21:08:32.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,24 +69,63 @@ "value": "CWE-204" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_orchestrator:4.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "52DDCCC7-4347-49F8-A623-46C30C3512D7" + } + ] + } + ] } ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/248545", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7150191", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/248545", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7150191", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2961.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2961.json index c5a7957cd21..597c095b32d 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2961.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2961.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2961", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-06T20:15:13.523", - "lastModified": "2024-11-21T07:59:39.230", + "lastModified": "2025-01-07T22:15:30.027", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-373xx/CVE-2023-37395.json b/CVE-2023/CVE-2023-373xx/CVE-2023-37395.json index 5a7293bf47b..18027f8dd67 100644 --- a/CVE-2023/CVE-2023-373xx/CVE-2023-37395.json +++ b/CVE-2023/CVE-2023-373xx/CVE-2023-37395.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37395", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-12-11T03:15:04.877", - "lastModified": "2024-12-11T03:15:04.877", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T21:10:50.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, @@ -51,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndIncluding": "5.0.7", + "matchCriteriaId": "055F62A0-D9E6-4FE6-83B2-0F9BAFF12FE8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ibm.com/support/pages/node/7148632", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37407.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37407.json index 0d029be0466..f5132a4a766 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37407.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37407.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37407", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-05-03T16:15:10.697", - "lastModified": "2024-11-21T08:11:39.140", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T21:06:46.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,22 +71,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:aspera_orchestrator:4.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "52DDCCC7-4347-49F8-A623-46C30C3512D7" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260116", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7150117", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260116", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7150117", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38360.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38360.json index b57db656c4f..9d577b07efc 100644 --- a/CVE-2023/CVE-2023-383xx/CVE-2023-38360.json +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38360.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38360", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-03-04T18:15:08.743", - "lastModified": "2024-11-21T08:13:24.827", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T21:23:43.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,22 +71,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cics_tx:10.1:*:*:*:advanced:*:*:*", + "matchCriteriaId": "73BBDE39-E8CF-416C-838D-046ADDA011F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260769", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7066435", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260769", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7066435", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38362.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38362.json index 713784479f2..2f7e4220130 100644 --- a/CVE-2023/CVE-2023-383xx/CVE-2023-38362.json +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38362.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38362", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-03-04T16:15:49.130", - "lastModified": "2024-11-21T08:13:25.080", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T21:24:06.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,24 +69,63 @@ "value": "CWE-204" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cics_tx:10.1:*:*:*:advanced:*:*:*", + "matchCriteriaId": "73BBDE39-E8CF-416C-838D-046ADDA011F8" + } + ] + } + ] } ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260814", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://https://www.ibm.com/support/pages/node/7066430", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/260814", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://https://www.ibm.com/support/pages/node/7066430", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10541.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10541.json new file mode 100644 index 00000000000..eed2f15c278 --- /dev/null +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10541.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2024-10541", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-01-07T21:15:11.490", + "lastModified": "2025-01-07T21:15:11.490", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. This is not a valid vulnerability. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21259.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21259.json index c6e3140a158..eb2bf9a3387 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21259.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21259.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21259", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:16.590", - "lastModified": "2024-10-18T15:00:17.133", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T21:16:14.797", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -72,15 +72,15 @@ "vulnerable": true, "criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", "versionStartIncluding": "7.0.0", - "versionEndIncluding": "7.0.22", - "matchCriteriaId": "1546CD49-450F-49FF-B492-8AC165123739" + "versionEndExcluding": "7.0.22", + "matchCriteriaId": "3B9F767A-0A1C-4082-BE31-DD58B4A5B570" }, { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*", "versionStartIncluding": "7.1.0", - "versionEndIncluding": "7.1.2", - "matchCriteriaId": "6B6D587F-89CC-4F88-B787-B7BDB295E121" + "versionEndExcluding": "7.1.2", + "matchCriteriaId": "3A2D3A95-A0D6-44A9-A53E-15B1D376B393" } ] } diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21442.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21442.json index ac11bbed7db..11a5756b4da 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21442.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21442.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21442", "sourceIdentifier": "secure@microsoft.com", "published": "2024-03-12T17:15:53.557", - "lastModified": "2024-11-21T08:54:22.560", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T21:18:53.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,86 @@ "value": "CWE-170" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4170", + "matchCriteriaId": "2CA95D8E-CAD9-4D07-AE35-36D83D546AA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4170", + "matchCriteriaId": "968B931A-18E6-4425-B326-5A02C0B93A08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2836", + "matchCriteriaId": "D08CEC8B-343C-486E-B6FA-F4D60ACF7E63" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.3296", + "matchCriteriaId": "4DBD4A55-729C-4F86-AE29-6067F62FD03A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.3296", + "matchCriteriaId": "A332CC68-568F-406B-8463-9FEF359BEA4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2340", + "matchCriteriaId": "9EDA5547-D293-41D0-A10C-4A613E725231" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.763", + "matchCriteriaId": "0AD05A2D-BA23-4B63-8B75-1395F74C36CB" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21442", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21442", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26688.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26688.json index 7b80d65c851..5ca270d1aa5 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26688.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26688.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26688", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T15:15:52.370", - "lastModified": "2024-11-21T09:02:50.947", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-07T21:12:29.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,67 +15,231 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fs,hugetlb: corrige la desreferencia del puntero NULL en hugetlbs_fill_super Al configurar un SYSTEM de archivos de Hugetlb a trav\u00e9s de la llamada al SYSTEM fsconfig(), existe una posible desreferencia de NULL en hugetlbfs_fill_super() causada por la asignaci\u00f3n de NULL a ctx. ->hstate en hugetlbfs_parse_param() cuando el tama\u00f1o de p\u00e1gina solicitado no es v\u00e1lido. Por ejemplo: siguiendo los siguientes pasos: fd = fsopen(\"hugetlbfs\", FSOPEN_CLOEXEC); fsconfig(fd, FSCONFIG_SET_STRING, \"tama\u00f1o de p\u00e1gina\", \"1024\", 0); fsconfig(fd, FSCONFIG_CMD_CREATE, NULL, NULL, 0); Dado que el \"tama\u00f1o de p\u00e1gina\" solicitado no es v\u00e1lido, ctxt->hstate ser\u00e1 reemplazado por NULL, perdiendo su valor anterior, e imprimiremos un error: ... ... case Opt_pagesize: ps = memparse(param->string, &descansar); ctx->hestado = h; if (!ctx->hstate) { pr_err(\"Tama\u00f1o de p\u00e1gina no admitido %lu MB\\n\", ps / SZ_1M); devolver -EINVAL; } devolver 0; ... ... Esto es un problema porque m\u00e1s adelante eliminaremos la referencia a ctxt->hstate en hugetlbfs_fill_super() ... ... sb->s_blocksize = huge_page_size(ctx->hstate); ... ... Causando debajo Ups. Solucione este problema reemplazando el valor cxt->hstate solo cuando se sepa que el tama\u00f1o de p\u00e1gina es v\u00e1lido. kernel: hugetlbfs: Tama\u00f1o de p\u00e1gina no admitido 0 MB kernel: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000028 kernel: #PF: acceso de lectura del supervisor en modo kernel kernel: #PF: c\u00f3digo_error(0x0000) - p\u00e1gina no presente kernel: PGD 800000010f66c067 P4D 800000010f66c067 PUD 1b22f8067 PMD 0 kernel: Ups: 0000 [#1] PREEMPT SMP PTI kernel: CPU: 4 PID: 5659 Comm: syscall Contaminado: GE 6.8.0-rc2-default+ #22 5a47c3fef76212addcc6eb71344 Kernel aabc35190ae8f: Nombre del hardware: Intel Corp. GROVEPORT/GROVEPORT, BIOS GVPRCRB1.86B.0016.D04.1705030402 03/05/2017 kernel: RIP: 0010:hugetlbfs_fill_super+0xb4/0x1a0 kernel: C\u00f3digo: 48 8b 3b e8 3e c6 ed ff 48 85 c0 48 89 45 20 0f 84 d6 00 00 00 48 b8 ff ff ff ff ff ff ff 7f 4c 89 e7 49 89 44 24 20 48 8b 03 <8b> 48 28 b8 00 10 00 00 48 d3 e0 49 89 44 24 18 48 8b 03 8b 40 28 kernel: RSP: 0018:ffffbe9960fcbd48 EFLAGS: 00010246 kernel: RAX: 0000000000000000 RBX: ffff9af5272ae780 RCX: 0000000000372004 kernel: RDX: ffffffffffffffff RSI: ffffffffffffffff R DI: ffff9af555e9b000 kernel: RBP: ffff9af52ee66b00 R08: 0000000000000040 R09: 0000000000370004 kernel: R10: ffffbe9960fcbd48 R11: 0000000000000040 R12: ffff9af555e9b000 kernel: R13: fffffffa66b86c0 R14: ffff9af507d2f400 R15: ffff9af507d2f400 kernel: FS: 00007ffbc0ba4740(0000) GS:ffff9b0bd7 000000(0000) knlGS:0000000000000000 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 kernel: CR2: 0000000000000028 CR3: 00000001b1ee0000 CR4: 00000000001506f0 kernel: Seguimiento de llamadas: kernel: kernel: ? __die_body+0x1a/0x60 n\u00facleo: ? page_fault_oops+0x16f/0x4a0 n\u00facleo:? search_bpf_extables+0x65/0x70 n\u00facleo:? fixup_exception+0x22/0x310 kernel:? exc_page_fault+0x69/0x150 n\u00facleo:? asm_exc_page_fault+0x22/0x30 n\u00facleo:? __pfx_hugetlbfs_fill_super+0x10/0x10 n\u00facleo:? n\u00facleo enormetlbfs_fill_super+0xb4/0x1a0:? enormetlbfs_fill_super+0x28/0x1a0 kernel:? __pfx_hugetlbfs_fill_super+0x10/0x10 kernel: vfs_get_super+0x40/0xa0 kernel:? __pfx_bpf_lsm_capable+0x10/0x10 kernel: vfs_get_tree+0x25/0xd0 kernel: vfs_cmd_create+0x64/0xe0 kernel: __x64_sys_fsconfig+0x395/0x410 kernel: do_syscall_64+0x80/0x160 kernel: ? syscall_exit_to_user_mode+0x82/0x240 kernel:? do_syscall_64+0x8d/0x160 n\u00facleo:? syscall_exit_to_user_mode+0x82/0x240 kernel:? do_syscall_64+0x8d/0x160 n\u00facleo:? exc_page_fault+0x69/0x150 kernel: Entry_SYSCALL_64_after_hwframe+0x6e/0x76 kernel: RIP: 0033:0x7ffbc0cb87c9 kernel: C\u00f3digo: 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 97 96 0d 00 f7 d8 64 89 01 48 ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1", + "versionEndExcluding": "5.4.271", + "matchCriteriaId": "6A4B5A96-B786-4F9E-AC8D-21120839B09B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.212", + "matchCriteriaId": "01B34738-A022-44A9-9250-DCBC76539CB9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.151", + "matchCriteriaId": "EEAFD33E-C22F-4FB1-A417-9C96AB3E0358" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.79", + "matchCriteriaId": "656E2F29-1779-4EFC-AA64-8F984E2885B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.18", + "matchCriteriaId": "BD961E49-FEDA-47CF-BF23-4D2BD942B4E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.6", + "matchCriteriaId": "C6D6A5C8-7308-42A9-8A72-ABF3DEA4BB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/13c5a9fb07105557a1fa9efdb4f23d7ef30b7274", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1dde8ef4b7a749ae1bc73617c91775631d167557", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/22850c9950a4e43a67299755d11498f3292d02ff", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2e2c07104b4904aed1389a59b25799b95a85b5b9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/79d72c68c58784a3e1cd2378669d51bfd0cb7498", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/80d852299987a8037be145a94f41874228f1a773", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ec78418801ef7b0c22cd6a30145ec480dd48db39", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/13c5a9fb07105557a1fa9efdb4f23d7ef30b7274", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1dde8ef4b7a749ae1bc73617c91775631d167557", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/22850c9950a4e43a67299755d11498f3292d02ff", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2e2c07104b4904aed1389a59b25799b95a85b5b9", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/79d72c68c58784a3e1cd2378669d51bfd0cb7498", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/80d852299987a8037be145a94f41874228f1a773", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ec78418801ef7b0c22cd6a30145ec480dd48db39", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26717.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26717.json index 8fde4dd03be..ec80c4d76f7 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26717.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26717.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26717", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T15:15:53.850", - "lastModified": "2024-11-21T09:02:54.607", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-07T21:16:14.697", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,162 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: HID: i2c-hid-of: corrige NULL-deref en caso de encendido fallido Hace un tiempo, la implementaci\u00f3n de I2C HID se dividi\u00f3 en una parte ACPI y OF, pero el nuevo controlador OF nunca Inicializa el puntero del cliente al que se le quita la referencia en caso de fallos de encendido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.15.149", + "matchCriteriaId": "ECC74ED9-C6F0-4F37-9917-0F2B0BAD54B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.79", + "matchCriteriaId": "656E2F29-1779-4EFC-AA64-8F984E2885B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.18", + "matchCriteriaId": "BD961E49-FEDA-47CF-BF23-4D2BD942B4E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.6", + "matchCriteriaId": "C6D6A5C8-7308-42A9-8A72-ABF3DEA4BB82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/00aab7dcb2267f2aef59447602f34501efe1a07f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4cad91344a62536a2949873bad6365fbb6232776", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/62f5d219edbd174829aa18d4b3d97cd5fefbb783", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d7d7a0e3b6f5adc45f23667cbb919e99093a5b5c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e28d6b63aeecbda450935fb58db0e682ea8212d3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/00aab7dcb2267f2aef59447602f34501efe1a07f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4cad91344a62536a2949873bad6365fbb6232776", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/62f5d219edbd174829aa18d4b3d97cd5fefbb783", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d7d7a0e3b6f5adc45f23667cbb919e99093a5b5c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e28d6b63aeecbda450935fb58db0e682ea8212d3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26728.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26728.json index d16eb119275..4522cbfc959 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26728.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26728.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26728", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:50.763", - "lastModified": "2024-11-21T09:02:55.997", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T21:15:57.473", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,114 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: corrige la desreferencia del puntero nulo en la lectura de edid Utilice el adaptador i2c cuando no haya aux_mode en dc_link para corregir una desreferencia del puntero nulo que ocurre al ejecutar igt@ kms_force_connector_basic en un SYSTEM con DCN2.1 y conector HDMI se detect\u00f3 como se muestra a continuaci\u00f3n: [+0.178146] ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 00000000000004c0 [+0.000010] #PF: acceso de lectura del supervisor en modo kernel [+0.000005] #PF: c\u00f3digo_error (0x0000) - p\u00e1gina no presente [+0.000004] PGD 0 P4D 0 [+0.000006] Ups: 0000 [#1] PREEMPT SMP NOPTI [+0.000006] CPU: 15 PID: 2368 Comm: kms_force_conne No contaminado 6.5.0-asdn+ #152 [+0.000005] Nombre de hardware: HP HP ENVY x360 Convertible 13-ay1xxx/8929, BIOS F.01 14/07/2021 [+0.000004] RIP: 0010:i2c_transfer+0xd/0x100 [+0.000011] C\u00f3digo: ea fc ff ff 66 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 0f 1f 44 00 00 41 54 55 53 <48> 8b 4 7 10 48 89 fb 48 83 38 00 0f 84 b3 00 00 00 83 3d 2f 80 16 [ +0.000004] RSP: 0018:ffff9c4f89c0fad0 EFLAGS: 00010246 [ +0.000005] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000000080 [+0.000003] RDX: 0000000000000002 RSI: ffff9c4f89c0fb20 RDI : 00000000000004b0 [ +0.000003] RBP: ffff9c4f89c0fb80 R08: 0000000000000080 R09: ffff8d8e0b15b980 [ +0.000003] R10: 00000000000380e0 R11: 0000000000000000 R12: 0000000000000080 [ +0.000002] R13: 0000000000000002 R14: ffff9c4f89c0fb0e R15: ffff9c4f89c0fb0f [ +0.000004] FS: 000 07f9ad2176c40(0000 ) GS:ffff8d90fe9c0000(0000) knlGS:0000000000000000 [ +0.000003] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ +0.000004] CR2: 0000000000000 4c0 CR3: 0000000121bc4000 CR4: 0000000000750ee0 [ +0.000003] PKRU: 55555554 [ +0.000003] Seguimiento de llamadas: [ +0.000006] [ +0.000006] ? __die+0x23/0x70 [ +0.000011] ? page_fault_oops+0x17d/0x4c0 [+0.000008]? preempt_count_add+0x6e/0xa0 [+0.000008]? srso_alias_return_thunk+0x5/0x7f [+0.000011]? exc_page_fault+0x7f/0x180 [+0.000009]? asm_exc_page_fault+0x26/0x30 [+0.000013]? i2c_transfer+0xd/0x100 [ +0.000010] drm_do_probe_ddc_edid+0xc2/0x140 [drm] [ +0.000067] ? srso_alias_return_thunk+0x5/0x7f [+0.000006]? _drm_do_get_edid+0x97/0x3c0 [drm] [ +0.000043] ? __pfx_drm_do_probe_ddc_edid+0x10/0x10 [drm] [ +0.000042] edid_block_read+0x3b/0xd0 [drm] [ +0.000043] _drm_do_get_edid+0xb6/0x3c0 [drm] [ +0.000041] ? __pfx_drm_do_probe_ddc_edid+0x10/0x10 [drm] [ +0.000043] drm_edid_read_custom+0x37/0xd0 [drm] [ +0.000044] amdgpu_dm_connector_mode_valid+0x129/0x1d0 [amdgpu] [ +0.000153] dr m_connector_mode_valid+0x3b/0x60 [drm_kms_helper] [ +0.000000] __drm_helper_update_and_validate+ 0xfe/0x3c0 [drm_kms_helper] [+0.000000]? amdgpu_dm_connector_get_modes+0xb6/0x520 [amdgpu] [+0.000000]? srso_alias_return_thunk+0x5/0x7f [ +0.000000] drm_helper_probe_single_connector_modes+0x2ab/0x540 [drm_kms_helper] [ +0.000000] status_store+0xb2/0x1f0 [drm] [ +0.000000] kernfs_fop_write_iter +0x136/0x1d0 [ +0,000000] vfs_write+0x24d/0x440 [ +0,000000 ] ksys_write+0x6f/0xf0 [ +0.000000] do_syscall_64+0x60/0xc0 [ +0.000000] ? srso_alias_return_thunk+0x5/0x7f [+0.000000]? syscall_exit_to_user_mode+0x2b/0x40 [+0.000000]? srso_alias_return_thunk+0x5/0x7f [+0.000000]? do_syscall_64+0x6c/0xc0 [+0.000000]? do_syscall_64+0x6c/0xc0 [ +0.000000] Entry_SYSCALL_64_after_hwframe+0x6e/0xd8 [ +0.000000] RIP: 0033:0x7f9ad46b4b00 [ +0.000000] C\u00f3digo: 40 00 48 8b 15 19 b3 0d 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 80 3d e1 3a 0e 00 00 74 17 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 48 83 ec 28 48 89 [ +0 .000000] RSP : 002b:00007ffcbd3bd6d8 EFLAGS: 00000202 ORIG_RAX: 0000000000000001 [ +0.000000] RAX: ffffffffffffffffda RBX: 00000000000000000 RCX: 00007f9ad46b4b00 [ +0 .000000] RDX: 0000000000000002 RSI: 00007f9ad48a7417 RDI: 0000000000000009 [+0.000000] RBP: 0000000000000002 R08 ---truncado-- -" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2d392f7268a1a9bfbd98c831f0f4c964e59aa145", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9671761792156f2339627918bafcd713a8a6f777", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2d392f7268a1a9bfbd98c831f0f4c964e59aa145", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9671761792156f2339627918bafcd713a8a6f777", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26729.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26729.json index ef763398eeb..95656586fb2 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26729.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26729.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26729", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:50.820", - "lastModified": "2024-11-21T09:02:56.113", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T21:14:13.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,114 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: corrige una posible desreferencia de puntero nulo en dc_dmub_srv. Corrige posibles advertencias de desreferencia de puntero nulo en las funciones dc_dmub_srv_cmd_list_queue_execute() y dc_dmub_srv_is_hw_pwr_up(). En ambas funciones, se estaba desreferenciando la variable 'dc_dmub_srv' antes de verificar si era nula. Esto podr\u00eda provocar una desreferencia del puntero nulo si 'dc_dmub_srv' es nulo. La soluci\u00f3n es comprobar si 'dc_dmub_srv' es nulo antes de eliminar la referencia a \u00e9l. Por lo tanto, se mueven las comprobaciones nulas de 'dc_dmub_srv' al comienzo de las funciones para garantizar que 'dc_dmub_srv' no sea nulo cuando se desreferencia. Encontrado por smatch y arreglando as\u00ed lo siguiente: drivers/gpu/drm/amd/amdgpu/../display/dc/dc_dmub_srv.c:133 dc_dmub_srv_cmd_list_queue_execute() advertencia: variable desreferenciada antes de verificar 'dc_dmub_srv' (ver l\u00ednea 128) drivers/ gpu/drm/amd/amdgpu/../display/dc/dc_dmub_srv.c:1167 dc_dmub_srv_is_hw_pwr_up() advertencia: variable desreferenciada antes de verificar 'dc_dmub_srv' (ver l\u00ednea 1164)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/351080ba3414c96afff0f1338b4aeb2983195b80", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d2b48f340d9e4a8fbeb1cdc84cd8da6ad143a907", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/351080ba3414c96afff0f1338b4aeb2983195b80", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d2b48f340d9e4a8fbeb1cdc84cd8da6ad143a907", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26738.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26738.json index 7198fb77d7c..a3e7b32bff6 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26738.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26738.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26738", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:51.303", - "lastModified": "2024-11-21T09:02:57.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-07T21:13:43.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,135 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc/pseries/iommu: la adici\u00f3n de DLPAR no inicializa completamente pci_controller Cuando se agrega din\u00e1micamente un dispositivo PCI, el kernel falla con una desreferencia del puntero NULL: ERROR: desreferencia del puntero NULL del kernel activado le\u00eddo en 0x00000030 Direcci\u00f3n de instrucci\u00f3n err\u00f3nea: 0xc0000000006bbe5c Vaya: acceso al kernel del \u00e1rea defectuosa, firma: 11 [#1] LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 M\u00f3dulos NUMA pSeries vinculados en: rpadlpar_io rpaphp rpcsec_gss_krb5 auth_r pcgss nfsv4 dns_resolver nfs lockd gracia fscache netfs xsk_diag vinculaci\u00f3n nft_compat nf_tables nfnetlink rfkill binfmt_misc dm_multipath rpcrdma sunrpc rdma_ucm ib_srpt ib_isert iscsi_target_mod target_core_mod ib_umad ib_iser libiscsi scsi_transport_iscsi ib_ipoib rdma_cm iw_cm ib_cm mlx5 _ib ib_uverbs ib_core pseries_rng drm drm_panel_orientation_quirks xfs libcrc32c mlx5_core mlxfw sd_mod t10_pi sg tls ibmvscsi ibmveth scsi_transport_srp vmx_crypto pseries_wdt psample dm_mirror dm_region_hash dm_log dm_mod CPU fusible : 17 PID: 2685 Comm: drmgr No contaminado 6.7.0-203405+ #66 Nombre de hardware: IBM,9080-HEX POWER10 (sin procesar) 0x800200 0xf000006 de:IBM,FW1060.00 (NH1060_008) hv:phyp pSeries NIP: c0000000006b be5c LR : c000000000a13e68 CTR: c0000000000579f8 REGS: c00000009924f240 TRAP: 0300 No contaminado (6.7.0-203405+) MSR: 8000000000009033 CR: 2400 2220 XER: 20040006 CFAR: c000000000a13e64 DAR: 0000000000000030 DSISR: 40000000 IRQMASK: 0 ... NIP sysfs_add_link_to_group+0x34/0x94 LR iommu_device_link+0x5c/0x118 Seguimiento de llamadas: iommu_init_device+0x26c/0x318 (no confiable) iommu_device_ enlace+0x5c/0x118 iommu_init_device+0xa8/0x318 iommu_probe_device+0xc0/0x134 iommu_bus_notifier+ 0x44/0x104 notifier_call_chain+0xb8/0x19c blocking_notifier_call_chain+0x64/0x98 bus_notify+0x50/0x7c device_add+0x640/0x918 pci_device_add+0x23c/0x298 of_create_pci_dev+0x400/0x884 of_s can_pci_dev+0x124/0x1b0 __of_scan_bus+0x78/0x18c pcibios_scan_phb+0x2a4/0x3b0 init_phb_dynamic+ 0xb8/0x110 dlpar_add_slot+0x170/0x3b8 [rpadlpar_io] add_slot_store.part.0+0xb4/0x130 [rpadlpar_io] kobj_attr_store+0x2c/0x48 sysfs_kf_write+0x64/0x78 kernfs_fop_write_iter+0x1b 0/0x290 vfs_write+0x350/0x4a0 ksys_write+0x84/0x140 system_call_exception+ 0x124/0x330 system_call_vectored_common+0x15c/0x2ec el commit a940904443e4 (\"powerpc/iommu: agregue iommu_ops para informar capacidades y permitir dominios de bloqueo\") rompi\u00f3 la adici\u00f3n DLPAR de dispositivos PCI. Lo anterior agreg\u00f3 la estructura iommu_device a pci_controller. Durante el arranque del SYSTEM, se descubren dispositivos PCI y esta estructura iommu_device reci\u00e9n agregada se inicializa mediante una llamada a iommu_device_register(). Durante la adici\u00f3n DLPAR de un dispositivo PCI, se asigna una nueva estructura pci_controller pero no se realizan llamadas a la interfaz iommu_device_register(). La soluci\u00f3n es registrar tambi\u00e9n el dispositivo iommu durante la adici\u00f3n de DLPAR." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4", + "versionEndExcluding": "6.6.19", + "matchCriteriaId": "42342D9F-A537-444E-8441-E8C6CAD53884" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/46e36ebd5e00a148b67ed77c1d31675996f77c25", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a5c57fd2e9bd1c8ea8613a8f94fd0be5eccbf321", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b8315b2e25b4e68e42fcb74630f824b9a5067765", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/46e36ebd5e00a148b67ed77c1d31675996f77c25", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a5c57fd2e9bd1c8ea8613a8f94fd0be5eccbf321", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b8315b2e25b4e68e42fcb74630f824b9a5067765", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26754.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26754.json index 80bd6fec6a3..4388c95f763 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26754.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26754.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26754", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:52.050", - "lastModified": "2024-11-21T09:02:59.710", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-07T21:13:04.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,79 +15,273 @@ "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: gtp: corrige use-after-free y null-ptr-deref en gtp_genl_dump_pdp() La estructura de operaciones pernet gtp_net_ops para el subSYSTEM debe registrarse antes de registrar la familia netlink gen\u00e9rica. Syzkaller encontr\u00f3 el error 'fallo de protecci\u00f3n general en gtp_genl_dump_pdp': fallo de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN NOPTI KASAN: null-ptr-deref en el rango [0x0000000000000010-0x00000000000000 017] CPU: 1 PID : 5826 Comm: gtp Not tainted 6.8.0-rc3-std-def-alt1 #1 Nombre del hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009), BIOS 1.16.0-alt1 01/04/2014 RIP: 0010:gtp_genl_dump_pdp +0x1be/0x800 [gtp] C\u00f3digo: c6 89 c6 e8 64 e9 86 df 58 45 85 f6 0f 85 4e 04 00 00 e8 c5 ee 86 df 48 8b 54 24 18 48 b8 00 00 00 00 00 fc ff df 48 c1 e un 03 <80> 3c 02 00 0f 85 de 05 00 00 48 8b 44 24 18 4c 8b 30 4c 39 f0 74 RSP: 0018:ffff888014107220 EFLAGS: 00010202 RAX: dffffc0000000000 RBX : 0000000000000000 RCX: 0000000000000000 RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 00000000000000000 R11: 0000000000000000 R12 : 0000000000000000 R13: ffff88800fcda588 R14: 0000000000000001 R15: 0000000000000000 FS: 00007f1be4eb05c0(0000) GS:ffff88806ce80000(0000) kn lGS:0000000000000000 CS: 0010 DS: 0000 ES : 0000 CR0: 0000000080050033 CR2: 00007f1be4e766cf CR3: 000000000c33e000 CR4: 0000000000750ef0 PKRU: 55555554 Seguimiento de llamadas: ? show_regs+0x90/0xa0? die_addr+0x50/0xd0? exc_general_protection+0x148/0x220? asm_exc_general_protection+0x22/0x30? gtp_genl_dump_pdp+0x1be/0x800 [gtp] ? __alloc_skb+0x1dd/0x350 ? __pfx___alloc_skb+0x10/0x10 genl_dumpit+0x11d/0x230 netlink_dump+0x5b9/0xce0 ? lockdep_hardirqs_on_prepare+0x253/0x430? __pfx_netlink_dump+0x10/0x10 ? kasan_save_track+0x10/0x40? __kasan_kmalloc+0x9b/0xa0 ? genl_start+0x675/0x970 __netlink_dump_start+0x6fc/0x9f0 genl_family_rcv_msg_dumpit+0x1bb/0x2d0 ? __pfx_genl_family_rcv_msg_dumpit+0x10/0x10 ? genl_op_from_small+0x2a/0x440? cap_capaz+0x1d0/0x240 ? __pfx_genl_start+0x10/0x10? __pfx_genl_dumpit+0x10/0x10 ? __pfx_genl_done+0x10/0x10 ? seguridad_capaz+0x9d/0xe0" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + }, + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.7", + "versionEndExcluding": "4.19.308", + "matchCriteriaId": "7C8E75DC-9A95-42F1-A4E0-0C7AB700F7F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.270", + "matchCriteriaId": "5D8044B1-C7E8-44A4-9F03-A4D7BCDB1721" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.211", + "matchCriteriaId": "7DDA4DCF-671D-415D-94DF-6E3C77DF0704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.150", + "matchCriteriaId": "CB6C60DE-9E0C-46C5-904D-D4F4031F8E95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.80", + "matchCriteriaId": "BA7850CE-97C9-4408-A348-6173296BCA2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.19", + "matchCriteriaId": "8D82004C-B2AE-4048-9344-32EFF65953B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.7", + "matchCriteriaId": "575EE16B-67F2-4B5B-B5F8-1877715C898B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/136cfaca22567a03bbb3bf53a43d8cb5748b80ec", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2e534fd15e5c2ca15821c897352cf0e8a3e30dca", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3963f16cc7643b461271989b712329520374ad2a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5013bd54d283eda5262c9ae3bcc966d01daf8576", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a576308800be28f2eaa099e7caad093b97d66e77", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ba6b8b02a3314e62571a540efa96560888c5f03e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f0ecdfa679189d26aedfe24212d4e69e42c2c861", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f8cbd1791900b5d96466eede8e9439a5b9ca4de7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/136cfaca22567a03bbb3bf53a43d8cb5748b80ec", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2e534fd15e5c2ca15821c897352cf0e8a3e30dca", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3963f16cc7643b461271989b712329520374ad2a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5013bd54d283eda5262c9ae3bcc966d01daf8576", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a576308800be28f2eaa099e7caad093b97d66e77", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ba6b8b02a3314e62571a540efa96560888c5f03e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f0ecdfa679189d26aedfe24212d4e69e42c2c861", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f8cbd1791900b5d96466eede8e9439a5b9ca4de7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26855.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26855.json index 7c3a0e5373e..7ca799cc5e4 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26855.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26855.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26855", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T11:15:08.690", - "lastModified": "2024-11-21T09:03:13.437", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T22:06:59.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,67 +15,246 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: ice: corrige una posible desreferencia de puntero NULL en ice_bridge_setlink() La funci\u00f3n ice_bridge_setlink() puede encontrar una desreferencia de puntero NULL si nlmsg_find_attr() devuelve NULL y br_spec se desreferencia posteriormente en nla_for_each_nested( ). Para solucionar este problema, agregue una verificaci\u00f3n para garantizar que br_spec no sea NULL antes de continuar con la iteraci\u00f3n del atributo anidado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.272", + "matchCriteriaId": "06199E67-91F5-4EC0-828B-22825E4DBAD1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.213", + "matchCriteriaId": "CE7B425A-A38B-494A-AA47-EC2251748164" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.152", + "matchCriteriaId": "DBBE9241-559E-479A-895A-02186BA03EBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.82", + "matchCriteriaId": "933AC628-7DAD-4B2D-82E3-3B7B331B1C09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.22", + "matchCriteriaId": "AC6FD6F8-5B16-4F53-8116-D42F4BF4FBAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.10", + "matchCriteriaId": "FB4549F9-0160-455F-8CDC-98D38AEF6D66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*", + "matchCriteriaId": "B9F4EA73-0894-400F-A490-3A397AB7A517" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc2:*:*:*:*:*:*", + "matchCriteriaId": "056BD938-0A27-4569-B391-30578B309EE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F02056A5-B362-4370-9FF8-6F0BD384D520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc4:*:*:*:*:*:*", + "matchCriteriaId": "62075ACE-B2A0-4B16-829D-B3DA5AE5CC41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc5:*:*:*:*:*:*", + "matchCriteriaId": "A780F817-2A77-4130-A9B7-5C25606314E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.8:rc6:*:*:*:*:*:*", + "matchCriteriaId": "AEB9199B-AB8F-4877-8964-E2BA95B5F15C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/06e456a05d669ca30b224b8ed962421770c1496c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0e296067ae0d74a10b4933601f9aa9f0ec8f157f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1a770927dc1d642b22417c3e668c871689fc58b3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/37fe99016b12d32100ce670216816dba6c48b309", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8d95465d9a424200485792858c5b3be54658ce19", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/afdd29726a6de4ba27cd15590661424c888dc596", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d9fefc51133107e59d192d773be86c1150cfeebb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/06e456a05d669ca30b224b8ed962421770c1496c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0e296067ae0d74a10b4933601f9aa9f0ec8f157f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1a770927dc1d642b22417c3e668c871689fc58b3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/37fe99016b12d32100ce670216816dba6c48b309", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8d95465d9a424200485792858c5b3be54658ce19", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/afdd29726a6de4ba27cd15590661424c888dc596", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d9fefc51133107e59d192d773be86c1150cfeebb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28760.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28760.json index d044455cfc6..2e31f6e541c 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28760.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28760.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28760", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-05-14T15:14:40.643", - "lastModified": "2024-11-21T09:06:54.740", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-07T21:02:43.143", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,24 +69,74 @@ "value": "CWE-770" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0.1", + "versionEndExcluding": "11.0.0.26", + "matchCriteriaId": "056DBFFF-F476-4595-BE83-21661986A05F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0.1.0", + "versionEndExcluding": "12.0.12.1", + "matchCriteriaId": "52DD0479-B430-4320-9AD3-71CD847B7DD0" + } + ] + } + ] } ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/285244", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7150845", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/285244", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7150845", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28761.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28761.json index f91b8ee0f16..78037c92f7e 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28761.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28761.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28761", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-05-14T15:14:41.123", - "lastModified": "2024-11-21T09:06:54.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-07T21:02:54.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,97 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0.1", + "versionEndExcluding": "11.0.0.26", + "matchCriteriaId": "056DBFFF-F476-4595-BE83-21661986A05F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0.1.0", + "versionEndExcluding": "12.0.12.1", + "matchCriteriaId": "52DD0479-B430-4320-9AD3-71CD847B7DD0" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/285245", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7150847", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/285245", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7150847", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31893.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31893.json index e44eeae5d12..285863892c2 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31893.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31893.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31893", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-05-22T19:15:08.893", - "lastModified": "2024-11-21T09:14:05.667", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-07T21:03:12.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,24 +69,67 @@ "value": "CWE-324" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-672" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0.1.0", + "versionEndExcluding": "12.0.12.2", + "matchCriteriaId": "C00FDFA6-B48D-4308-891D-54213C436685" + } + ] + } + ] } ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/288174", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7154606", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/288174", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7154606", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31904.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31904.json index fde508bb0e5..3078616d256 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31904.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31904.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31904", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-05-22T19:15:09.153", - "lastModified": "2024-11-21T09:14:06.617", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-07T21:05:40.810", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,24 +69,74 @@ "value": "CWE-248" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0.0.1", + "versionEndExcluding": "11.0.0.26", + "matchCriteriaId": "056DBFFF-F476-4595-BE83-21661986A05F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0.1.0", + "versionEndExcluding": "12.0.12.1", + "matchCriteriaId": "52DD0479-B430-4320-9AD3-71CD847B7DD0" + } + ] + } + ] } ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/289647", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7154607", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/289647", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7154607", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39532.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39532.json index fa9f6f2b9bf..6ff250932ac 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39532.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39532.json @@ -2,13 +2,13 @@ "id": "CVE-2024-39532", "sourceIdentifier": "sirt@juniper.net", "published": "2024-07-11T17:15:10.403", - "lastModified": "2024-11-21T09:27:56.860", + "lastModified": "2025-01-07T21:15:11.583", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An\u00a0Insertion of Sensitive Information into Log File vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to access sensitive information.\n\nWhen another user performs a specific operation, sensitive information is stored as plain text in a specific log file, so that a high-privileged attacker has access to this information.\nThis issue affects:\n\nJunos OS:\n\n\n\n * All versions before 22.1R2-S2,\n * 22.1R3 and later versions,\n * 22.2 versions before 22.2R2-S1, 22.2R3,\n * 22.3 versions before 22.3R1-S2, 22.3R2;\n\n\n\n\nJunos OS Evolved:\n\n\n\n * All versions before before 22.1R3-EVO,\n * 22.2-EVO versions before 22.2R2-S1-EVO, 22.2R3-EVO,\n * 22.3-EVO versions before 22.3R1-S1-EVO, 22.3R2-EVO." + "value": "An Insertion of Sensitive Information into Log File vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to access sensitive information.\n\nWhen another user performs a specific operation, sensitive information is stored as plain text in a specific log file, so that a high-privileged attacker has access to this information.\nThis issue affects:\n\nJunos OS:\n\n\n\n * All versions before 21.2R3-S9;\n * \n\n21.4 versions before 21.4R3-S9;\n\n * 22.2 versions before 22.2R2-S1, 22.2R3;\n * 22.3 versions before 22.3R1-S1, 22.3R2;\n\n\n\n\nJunos OS Evolved:\n\n\n\n * All versions before before 22.1R3-EVO;\n * 22.2-EVO versions before 22.2R2-S1-EVO, 22.2R3-EVO;\n * 22.3-EVO versions before 22.3R1-S1-EVO, 22.3R2-EVO." }, { "lang": "es", @@ -16,50 +16,6 @@ } ], "metrics": { - "cvssMetricV40": [ - { - "source": "sirt@juniper.net", - "type": "Secondary", - "cvssData": { - "version": "4.0", - "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", - "baseScore": 4.2, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "attackRequirements": "NONE", - "privilegesRequired": "HIGH", - "userInteraction": "PASSIVE", - "vulnerableSystemConfidentiality": "NONE", - "vulnerableSystemIntegrity": "NONE", - "vulnerableSystemAvailability": "NONE", - "subsequentSystemConfidentiality": "HIGH", - "subsequentSystemIntegrity": "LOW", - "subsequentSystemAvailability": "NONE", - "exploitMaturity": "NOT_DEFINED", - "confidentialityRequirements": "NOT_DEFINED", - "integrityRequirements": "NOT_DEFINED", - "availabilityRequirements": "NOT_DEFINED", - "modifiedAttackVector": "NOT_DEFINED", - "modifiedAttackComplexity": "NOT_DEFINED", - "modifiedAttackRequirements": "NOT_DEFINED", - "modifiedPrivilegesRequired": "NOT_DEFINED", - "modifiedUserInteraction": "NOT_DEFINED", - "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", - "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", - "modifiedVulnerableSystemAvailability": "NOT_DEFINED", - "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", - "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", - "modifiedSubsequentSystemAvailability": "NOT_DEFINED", - "safety": "NOT_DEFINED", - "automatable": "NOT_DEFINED", - "recovery": "NOT_DEFINED", - "valueDensity": "NOT_DEFINED", - "vulnerabilityResponseEffort": "NOT_DEFINED", - "providerUrgency": "NOT_DEFINED" - } - } - ], "cvssMetricV31": [ { "source": "sirt@juniper.net", diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46242.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46242.json index 11f51d2757e..3427b8e8644 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46242.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46242.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46242", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T16:15:33.950", - "lastModified": "2025-01-07T16:15:33.950", + "lastModified": "2025-01-07T21:15:11.783", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue in the validate_email function in CTFd/utils/validators/__init__.py of CTFd 3.7.3 allows attackers to cause a Regular expression Denial of Service (ReDoS) via supplying a crafted string as e-mail address during registration." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] + } + ], "references": [ { "url": "http://ctfd.com", diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46603.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46603.json index aeb9c8dd73d..459c0e593db 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46603.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46603.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46603", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T16:15:34.370", - "lastModified": "2025-01-07T16:15:34.370", + "lastModified": "2025-01-07T21:15:11.983", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An XML External Entity (XXE) vulnerability in Elspec Engineering G5 Digital Fault Recorder Firmware v1.2.1.12 allows attackers to cause a Denial of Service (DoS) via a crafted XML payload." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], "references": [ { "url": "http://elspec.com", diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48455.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48455.json index 4a0b9458379..2f816c0657b 100644 --- a/CVE-2024/CVE-2024-484xx/CVE-2024-48455.json +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48455.json @@ -2,20 +2,51 @@ "id": "CVE-2024-48455", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T22:15:09.510", - "lastModified": "2025-01-06T22:15:09.510", + "lastModified": "2025-01-07T22:15:30.620", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Netis Wifi6 Router NX10 2.0.1.3643 and 2.0.1.3582 and Netis Wifi 11AC Router NC65 3.0.0.3749 and Netis Wifi 11AC Router NC63 3.0.0.3327 and 3.0.0.3503 and Netis Wifi 11AC Router NC21 3.0.0.3800, 3.0.0.3500 and 3.0.0.3329 and Netis Wifi Router MW5360 1.0.1.3442 and 1.0.1.3031 allows a remote attacker to obtain sensitive information via the mode_name, wl_link parameters of the skk_get.cgi component." + }, + { + "lang": "es", + "value": "Un problema en Netis Wifi6 Router NX10 2.0.1.3643 y 2.0.1.3582 y Netis Wifi 11AC Router NC65 3.0.0.3749 y Netis Wifi 11AC Router NC63 3.0.0.3327 y 3.0.0.3503 y Netis Wifi 11AC Router NC21 3.0.0.3800, 3.0.0.3500 y 3.0.0.3329 y Netis Wifi Router MW5360 1.0.1.3442 y 1.0.1.3031 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de los par\u00e1metros mode_name, wl_link del componente skk_get.cgi." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 2.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://github.com/users/h00die-gr3y/projects/1/views/1", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/users/h00die-gr3y/projects/1/views/1?pane=issue&itemId=92065458&issue=h00die-gr3y%7Ch00die-gr3y%7C2", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53935.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53935.json index c9fdd55c2d1..b7a9658e43c 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53935.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53935.json @@ -2,16 +2,43 @@ "id": "CVE-2024-53935", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T22:15:10.520", - "lastModified": "2025-01-06T22:15:10.520", + "lastModified": "2025-01-07T22:15:30.790", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The com.callos14.callscreen.colorphone (aka iCall OS17 - Color Phone Flash) application through 4.3 for Android enables any application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.callos14.callscreen.colorphone.DialerActivity component." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n com.callos14.callscreen.colorphone (tambi\u00e9n conocida como iCall OS17 - Color Phone Flash) hasta la versi\u00f3n 4.3 para Android permite que cualquier aplicaci\u00f3n (sin permisos) realice llamadas telef\u00f3nicas sin interacci\u00f3n del usuario enviando una intenci\u00f3n manipulada a trav\u00e9s del componente com.callos14.callscreen.colorphone.DialerActivity." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://github.com/actuator/com.callos14.callscreen.colorphone", diff --git a/CVE-2024/CVE-2024-547xx/CVE-2024-54763.json b/CVE-2024/CVE-2024-547xx/CVE-2024-54763.json index 40a57179505..6ea09035899 100644 --- a/CVE-2024/CVE-2024-547xx/CVE-2024-54763.json +++ b/CVE-2024/CVE-2024-547xx/CVE-2024-54763.json @@ -2,20 +2,51 @@ "id": "CVE-2024-54763", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T22:15:10.737", - "lastModified": "2025-01-06T22:15:10.737", + "lastModified": "2025-01-07T22:15:30.950", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An access control issue in the component /login/hostinfo.cgi of ipTIME A2004 v12.17.0 allows attackers to obtain sensitive information without authentication." + }, + { + "lang": "es", + "value": "Un problema de control de acceso en el componente /login/hostinfo.cgi de ipTIME A2004 v12.17.0 permite a los atacantes obtener informaci\u00f3n confidencial sin autenticaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://github.com/Shuanunio/CVE_Requests/blob/main/ipTIME/A2004/ipTIME_A2004_unauthorized_access_vulnerability_first.md", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Shuanunio/CVE_Requests/blob/main/ipTIME/A2004/ipTIME_A2004_unauthorized_access_vulnerability_first.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-547xx/CVE-2024-54764.json b/CVE-2024/CVE-2024-547xx/CVE-2024-54764.json index c17a075bf8c..cf3c4452f5c 100644 --- a/CVE-2024/CVE-2024-547xx/CVE-2024-54764.json +++ b/CVE-2024/CVE-2024-547xx/CVE-2024-54764.json @@ -2,20 +2,51 @@ "id": "CVE-2024-54764", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T23:15:06.510", - "lastModified": "2025-01-06T23:15:06.510", + "lastModified": "2025-01-07T22:15:31.113", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An access control issue in the component /login/hostinfo2.cgi of ipTIME A2004 v12.17.0 allows attackers to obtain sensitive information without authentication." + }, + { + "lang": "es", + "value": "Un problema de control de acceso en el componente /login/hostinfo2.cgi de ipTIME A2004 v12.17.0 permite a los atacantes obtener informaci\u00f3n confidencial sin autenticaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://github.com/Shuanunio/CVE_Requests/blob/main/ipTIME/A2004/ipTIME_A2004_unauthorized_access_vulnerability_second.md", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Shuanunio/CVE_Requests/blob/main/ipTIME/A2004/ipTIME_A2004_unauthorized_access_vulnerability_second.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54879.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54879.json index 7dfeaa1605d..55febfdb2d8 100644 --- a/CVE-2024/CVE-2024-548xx/CVE-2024-54879.json +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54879.json @@ -2,16 +2,55 @@ "id": "CVE-2024-54879", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T18:15:21.880", - "lastModified": "2025-01-06T18:15:21.880", - "vulnStatus": "Received", + "lastModified": "2025-01-07T21:15:12.170", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SeaCMS V13.1 is vulnerable to Incorrect Access Control. A logic flaw can be exploited by an attacker to allow any user to recharge members indefinitely." + }, + { + "lang": "es", + "value": "SeaCMS V13.1 es vulnerable a un control de acceso incorrecto. Un atacante puede aprovechar un fallo l\u00f3gico para permitir que cualquier usuario recargue miembros de forma indefinida." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://seacms.com", diff --git a/CVE-2024/CVE-2024-548xx/CVE-2024-54880.json b/CVE-2024/CVE-2024-548xx/CVE-2024-54880.json index beeaf5ab877..27ef9d39bf3 100644 --- a/CVE-2024/CVE-2024-548xx/CVE-2024-54880.json +++ b/CVE-2024/CVE-2024-548xx/CVE-2024-54880.json @@ -2,16 +2,55 @@ "id": "CVE-2024-54880", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T18:15:22.037", - "lastModified": "2025-01-06T18:15:22.037", - "vulnStatus": "Received", + "lastModified": "2025-01-07T21:15:12.367", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SeaCMS V13.1 is vulnerable to Incorrect Access Control. A logic flaw can be exploited by an attacker to allow any user to register accounts in bulk." + }, + { + "lang": "es", + "value": "SeaCMS V13.1 es vulnerable a un control de acceso incorrecto. Un atacante puede aprovechar un fallo l\u00f3gico para permitir que cualquier usuario registre cuentas en masa." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://blog.csdn.net/weixin_46686336/article/details/144797063", diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55408.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55408.json index 6d180c912bd..f4dedc0e1b2 100644 --- a/CVE-2024/CVE-2024-554xx/CVE-2024-55408.json +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55408.json @@ -2,16 +2,43 @@ "id": "CVE-2024-55408", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-06T19:15:13.010", - "lastModified": "2025-01-06T19:15:13.010", - "vulnStatus": "Received", + "lastModified": "2025-01-07T22:15:31.260", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the AsusSAIO.sys component of ASUS System Analysis IO v1.0.0 allows attackers to perform arbitrary read and write actions via supplying crafted IOCTL requests." + }, + { + "lang": "es", + "value": "Un problema en el componente AsusSAIO.sys de ASUS System Analysis IO v1.0.0 permite a los atacantes realizar acciones de lectura y escritura arbitrarias mediante el suministro de solicitudes IOCTL manipuladas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "http://asus.com", diff --git a/CVE-2024/CVE-2024-554xx/CVE-2024-55410.json b/CVE-2024/CVE-2024-554xx/CVE-2024-55410.json index 052bd5f4e84..13404efef15 100644 --- a/CVE-2024/CVE-2024-554xx/CVE-2024-55410.json +++ b/CVE-2024/CVE-2024-554xx/CVE-2024-55410.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55410", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-07T18:15:20.387", - "lastModified": "2025-01-07T18:15:20.387", + "lastModified": "2025-01-07T22:15:31.423", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue in the 690b33e1-0462-4e84-9bea-c7552b45432a.sys component of Asus GPU Tweak II Program Driver v1.0.0.0 allows attackers to perform arbitrary read and write actions via supplying crafted IOCTL requests." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] + } + ], "references": [ { "url": "http://asus.com", diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56728.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56728.json index c67e42ddeb9..ae6de7c606a 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56728.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56728.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56728", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:06.920", - "lastModified": "2024-12-29T12:15:06.920", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T22:03:07.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,145 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: octeontx2-pf: gestionar errores otx2_mbox_get_rsp en otx2_ethtool.c. Agregar verificaci\u00f3n de puntero de error despu\u00e9s de llamar a otx2_mbox_get_rsp()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.7", + "versionEndExcluding": "5.10.231", + "matchCriteriaId": "3F0A8F02-4FAC-4C62-B7E1-CF1481D2D6B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.174", + "matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/05a6ce174c0c724e5914e1e5efd826bab8f382b4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2db2194727b1f49a5096c1c3981adef1b7638733", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/55c41b97001a09bb490ffa2e667e251d75d15ab1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5ff9de1f2712cbca53da2e37d831eea7ffcb43b6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6cda142cee032b8fe65ee11f78721721c3988feb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c0f64fd73b60aee85f88c270c9d714ead27a7b7a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e26f8eac6bb20b20fdb8f7dc695711ebce4c7c5c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56729.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56729.json index dfc6fe36dab..eb7851664e2 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56729.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56729.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56729", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:07.023", - "lastModified": "2024-12-29T12:15:07.023", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T21:53:02.797", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: smb: inicializar cfid->tcon antes de realizar operaciones de red Evitar la fuga de una referencia tcon cuando una interrupci\u00f3n de arrendamiento se ejecuta con la apertura del directorio en cach\u00e9. El procesamiento de la interrupci\u00f3n de la fuga puede tomar una referencia al tcon en cached_dir_lease_break() y luego no liberar la referencia en cached_dir_offload_close, ya que cfid->tcon sigue siendo NULL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "7081676E-4D8A-48BF-AAF4-73B8F49078AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1b9ab6b648f89441c8a13cb3fd8ca83ffebc5262", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4b216c8f9c7d84ef7de33ca60b97e08e03ef3292", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/625e2357c8fcfae6e66dcc667dc656fe390bab15", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c353ee4fb119a2582d0e011f66a76a38f5cf984d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56730.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56730.json index 3d6360f1423..ede4678ba66 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56730.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56730.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56730", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:07.130", - "lastModified": "2024-12-29T12:15:07.130", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T21:23:52.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel Linux, se ha resuelto la siguiente vulnerabilidad: net/9p/usbg: se corrige la gesti\u00f3n de la asignaci\u00f3n de memoria fallida de kzalloc() En el kernel vanilla linux-next, next-20241108, la herramienta coccinelle proporcion\u00f3 el siguiente informe de error: ./net/9p/trans_usbg.c:912:5-11: ERROR: la funci\u00f3n de asignaci\u00f3n en la l\u00ednea 911 devuelve NULL, no ERR_PTR en caso de error Se corrigi\u00f3 el error de kzalloc() para gestionar el caso de retorno NULL en el agotamiento de la memoria." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2cdb416de8b5795fd25fadcb69e1198b6df6d8cc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ff1060813d9347e8c45c8b8cff93a4dfdb6726ad", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56739.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56739.json index 26ee8d956f8..f37ea08f550 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56739.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56739.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56739", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:07.240", - "lastModified": "2024-12-29T12:15:07.240", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T21:21:31.403", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,173 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: rtc: comprobar si __rtc_read_time se ha ejecutado correctamente en rtc_timer_do_work() Si la llamada a __rtc_read_time falla, la estructura rtc_time tm; puede contener datos no inicializados o una fecha/hora ilegal le\u00edda desde el hardware RTC. Al llamar a rtc_tm_to_ktime m\u00e1s tarde, el resultado puede ser un valor muy grande (posiblemente KTIME_MAX). Si hay temporizadores peri\u00f3dicos en rtc->timerqueue, expirar\u00e1n continuamente, lo que puede provocar un bloqueo suave del kernel." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.38", + "versionEndExcluding": "4.19.325", + "matchCriteriaId": "CB94EE42-C491-42E4-9163-363118710E58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.287", + "matchCriteriaId": "E4B15788-D35E-4E5B-A9C0-070AE3729B34" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.231", + "matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.174", + "matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0d68e8514d9040108ff7d1b37ca71096674b6efe", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/246f621d363988e7040f4546d20203dc713fa3e1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/39ad0a1ae17b54509cd9e93dcd8cec16e7c12d3f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/44b3257ff705d63d5f00ef8ed314a0eeb7ec37f2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a1f0b4af90cc18b10261ecde56c6a56b22c75bd1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dd4b1cbcc916fad5d10c2662b62def9f05e453d4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e77bce0a8c3989b4173c36f4195122bca8f4a3e1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e8ba8a2bc4f60a1065f23d6a0e7cbea945a0f40d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fde56535505dde3336df438e949ef4742b6d6d6e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56740.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56740.json index 72c66dcbb40..44096a1f03f 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56740.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56740.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56740", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:07.360", - "lastModified": "2024-12-29T12:15:07.360", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T22:24:05.593", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfs/localio: debe borrar res.replen en nfs_local_read_done De lo contrario, puede producirse corrupci\u00f3n de memoria debido a que las lecturas LOCALIO de NFSv3 dejan basura en res.replen: - nfs3_read_done() copia eso en server->read_hdrsize; desde all\u00ed, nfs3_proc_read_setup() lo copia en args.replen en nuevas solicitudes. - nfs3_xdr_enc_read3args() pasa eso a rpc_prepare_reply_pages() que lo incluye en hdrsize para xdr_init_pages, de modo que rq_rcv_buf contiene una longitud rid\u00edcula. - Esto se copia a rq_private_buf y xs_read_stream_request() eventualmente pasa el kvec a sock_recvmsg() que recibe datos entrantes en un lugar completamente equivocado. Esto se reproduce f\u00e1cilmente con NFSv3 LOCALIO, que est\u00e1 prestando servicio a las lecturas, cuando se le obliga a volver a utilizar RPC normal. Este cambio a utilizar NFSv3 normal con RPC puede ocurrir por varias razones, pero este problema se expuso con una prueba que detiene y luego reinicia el servidor NFSv3 mientras LOCALIO realiza operaciones de E/S de lectura pesadas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/650703bc4ed3edf841e851c99ab8e7ba9e5262a3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/de5dac261eeab99762bbdf7c20cee5d26ef4462e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56741.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56741.json index f88cb4c4644..8eb58eb1940 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56741.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56741.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56741", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:07.477", - "lastModified": "2024-12-29T12:15:07.477", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T22:19:45.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,145 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: apparmor: prueba: Se corrige la p\u00e9rdida de memoria para aa_unpack_strdup() La cadena asignada por kmemdup() en aa_unpack_strdup() no se libera y provoca las siguientes p\u00e9rdidas de memoria; lib\u00e9rela para solucionarlo. objeto sin referencia 0xffffff80c6af8a50 (tama\u00f1o 8): comm \"kunit_try_catch\", pid 225, jiffies 4294894407 volcado hexadecimal (primeros 8 bytes): 74 65 73 74 69 6e 67 00 pruebas. seguimiento inverso (crc 5eab668b): [<0000000001e3714d>] kmemleak_alloc+0x34/0x40 [<000000006e6c7776>] __kmalloc_node_track_caller_noprof+0x300/0x3e0 [<000000006870467c>] kmemdup_noprof+0x34/0x60 [<000000001176bb03>] aa_unpack_strdup+0xd0/0x18c [<000000008ecde918>] pol\u00edtica_unpack_test_unpack_strdup_with_null_name+0xf8/0x3ec [<0000000032ef8f77>] kunit_try_run_case+0x13c/0x3ac [<00000000f3edea23>] kunit_generic_run_threadfn_adapter+0x80/0xec [<00000000adf936cf>] kthread+0x2e8/0x374 [<0000000041bb1628>] ret_from_fork+0x10/0x20 objeto sin referencia 0xffffff80c2a29090 (tama\u00f1o 8): comm \"kunit_try_catch\", pid 227, jiffies 4294894409 volcado hexadecimal (primeros 8 bytes): 74 65 73 74 69 6e 67 00 prueba. seguimiento inverso (crc 5eab668b): [<0000000001e3714d>] kmemleak_alloc+0x34/0x40 [<000000006e6c7776>] __kmalloc_node_track_caller_noprof+0x300/0x3e0 [<000000006870467c>] kmemdup_noprof+0x34/0x60 [<000000001176bb03>] aa_unpack_strdup+0xd0/0x18c [<0000000046a45c1a>] pol\u00edtica_unpack_test_unpack_strdup_with_name+0xd0/0x3c4 [<0000000032ef8f77>] kunit_try_run_case+0x13c/0x3ac [<00000000f3edea23>] kunit_generic_run_threadfn_adapter+0x80/0xec [<00000000adf936cf>] kthread+0x2e8/0x374 [<0000000041bb1628>] ret_from_fork+0x10/0x20" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.6", + "versionEndExcluding": "5.10.231", + "matchCriteriaId": "C4BFC75B-E0F6-4CC1-BE2F-50FBE9ECC42A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.174", + "matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2a9b68f2dc6812bd1b8880b5c00e60203d6f61f6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5354599855a9b5568e05ce686119ee3ff8b19bd5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/59a149e7c38e7b76616c8b333fc6aa5b6fb2293c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7290f59231910ccba427d441a6e8b8c6f6112448", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/89265f88701e54dde255ddf862093baeca57548c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d62ee5739a66644b0e7f11e657d562458cdcdea3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f856246ff6da25c4f8fdd73a9c875e878b085e9f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56742.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56742.json index 5752c77e0e6..c2e2362bc19 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56742.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56742.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56742", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:07.593", - "lastModified": "2024-12-29T12:15:07.593", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T22:19:23.543", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vfio/mlx5: Se solucion\u00f3 un problema de desenrollado en mlx5vf_add_migration_pages() Se solucion\u00f3 un problema de desenrollado en mlx5vf_add_migration_pages(). Si se asigna un conjunto de p\u00e1ginas pero no se puede agregar a la tabla SG, es necesario liberarlas para evitar una p\u00e9rdida de memoria. Cualquier p\u00e1gina agregada correctamente a la tabla SG se liberar\u00e1 como parte de mlx5vf_free_data_buffer()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "7740549B-C7C1-452B-9F27-2ED88215F47F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/22e87bf3f77c18f5982c19ffe2732ef0c7a25f16", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/769fe4ce444b646b0bf6ac308de80686c730c7df", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c44f1b2ddfa81c8d7f8e9b6bc76c427bc00e69d5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56743.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56743.json index fd0fe10d868..f43d5fd6e5f 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56743.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56743.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56743", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:07.707", - "lastModified": "2024-12-29T12:15:07.707", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T22:18:53.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfs_common: no debe mantener la RCU mientras se llama a nfsd_file_put_local Mueva la retenci\u00f3n de la RCU de nfs_to_nfsd_file_put_local a nfs_to_nfsd_net_put. Es la llamada a nfs_to->nfsd_serv_put la que requiere la RCU de todos modos (las puts para nfsd_file y netns se combinaron para evitar una referencia indirecta adicional, pero esa microoptimizaci\u00f3n ahora no es posible). Esto corrige xfstests generic/013 y su activaci\u00f3n: \"\u00a1Cambio de contexto voluntario dentro de la secci\u00f3n cr\u00edtica del lado de lectura de RCU!\" [ 143.545738] Seguimiento de llamadas: [ 143.546206] [ 143.546625] ? asm_exc_invalid_op+0x1f/0x30 [ 143.551736] ? rcu_note_context_switch+0x496/0x5d0 [ 143.552634] ? wakeup_preempt+0x62/0x70 [ 143.553358] ? __schedule+0xaa/0x1380 [ 143.554025] ? _raw_spin_unlock_irqrestore+0x12/0x40 [ 143.554958] ? try_to_wake_up+0x1fe/0x6b0 [ 143.555715] ? xfs_efi_item_format+0x50/0xc0 [xfs] [ 143.559894] lectura_bajada+0x4e/0xb0 [ 143.560519] xlog_cil_commit+0x1b2/0xbc0 [xfs] [ 143.561460] ? xfs_inode_item_precommit+0xc7/0x220 [xfs] [ 143.563309] ? xfs_trans_run_precommits+0x69/0xd0 [xfs] [ 143.564394] __xfs_trans_commit+0xb5/0x330 [xfs] [ 143.565367] xfs_trans_roll+0x48/0xc0 [xfs] [ 143.566262] xfs_defer_trans_roll+0x57/0x100 [xfs] [ 143.567278] xfs_defer_finish_noroll+0x27a/0x490 [xfs] [ 143.568342] xfs_defer_finish+0x1a/0x80 [xfs] [ 143.569267] xfs_bunmapi_range+0x4d/0xb0 [xfs] [ 143.570208] xfs_itruncate_extents_flags+0x13d/0x230 [xfs] [ 143.571353] xfs_free_eofblocks+0x12e/0x190 [xfs] [ 143.572359] xfs_file_release+0x12d/0x140 [xfs] [ 143.573324] __fput+0xe8/0x2d0 [ 143.573922] __fput_sync+0x1d/0x30 [ 143.574574] nfsd_filp_close+0x33/0x60 [nfsd] [ 143.575430] nfsd_file_free+0x96/0x150 [nfsd] [ 143.576274] nfsd_file_put+0xf7/0x1a0 [nfsd] [ 143.577104] nfsd_file_put_local+0x18/0x30 [nfsd] [ 143.578070] nfs_close_local_fh+0x101/0x110 [nfs_localio] [ 143.579079] __put_nfs_open_context+0xc9/0x180 [nfs] [ 143.580031] nfs_file_clear_open_context+0x4a/0x60 [nfs] [ 143.581038] liberaci\u00f3n_archivo_nfs+0x3e/0x60 [nfs] [ 143.581879] __fput+0xe8/0x2d0 [ 143.582464] __fput_sync+0x1d/0x30 [ 143.583108] __x64_sys_close+0x41/0x80 [ 143.583823] llamada_sys_x64+0x189a/0x20d0 [ 143.584552] llamada_sys_64+0x64/0x170 [ 143.585240] entrada_SYSCALL_64_despu\u00e9s_hwframe+0x76/0x7e [ 143.586185] Descanse en paz: 0033:0x7f3c5153efd7" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3e6e3e97d64f50d9b6b1d62274f08925b1adbfc2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c840b8e1f039e90f97ca55525667eb961422f86c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56744.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56744.json index 8a329cd4d20..a9527c8aca7 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56744.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56744.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56744", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:07.817", - "lastModified": "2024-12-29T12:15:07.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T22:14:03.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: correcci\u00f3n para evitar un posible bloqueo en f2fs_record_stop_reason() syzbot informa un problema de bloqueo de f2fs como se muestra a continuaci\u00f3n: ========================================================= ADVERTENCIA: se detect\u00f3 una posible dependencia de bloqueo circular 6.12.0-rc3-syzkaller-00087-gc964ced77262 #0 No contaminado ------------------------------------------------------ kswapd0/79 est\u00e1 intentando adquirir el bloqueo: ffff888011824088 (&sbi->sb_lock){++++}-{3:3}, en: f2fs_down_write fs/f2fs/f2fs.h:2199 [inline] ffff888011824088 (&sbi->sb_lock){++++}-{3:3}, en: f2fs_record_stop_reason+0x52/0x1d0 fs/f2fs/super.c:4068 pero la tarea ya tiene el bloqueo: ffff88804bd92610 (sb_internal#2){.+.+}-{0:0}, en: f2fs_evict_inode+0x662/0x15c0 fs/f2fs/inode.c:842 cuyo bloqueo ya depende del nuevo bloqueo. la cadena de dependencia existente (en orden inverso) es: -> #2 (sb_internal#2){.+.+}-{0:0}: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 percpu_down_read include/linux/percpu-rwsem.h:51 [en l\u00ednea] __sb_start_write include/linux/fs.h:1716 [en l\u00ednea] sb_start_intwrite+0x4d/0x1c0 include/linux/fs.h:1899 f2fs_evict_inode+0x662/0x15c0 fs/f2fs/inode.c:842 evict+0x4e8/0x9b0 fs/inode.c:725 f2fs_evict_inode+0x1a4/0x15c0 fs/f2fs/inode.c:807 desalojar+0x4e8/0x9b0 fs/inode.c:725 lista_de_eliminaci\u00f3n fs/inode.c:774 [en l\u00ednea] podar_icache_sb+0x239/0x2f0 fs/inode.c:963 super_cache_scan+0x38c/0x4b0 fs/super.c:223 encoger_losa+0x701/0x1160 mm/shrinker.c:435 encoger_losa+0x1093/0x14d0 mm/shrinker.c:662 encoger_uno+0x43b/0x850 mm/vmscan.c:4818 encoger_muchos mm/vmscan.c:4879 [en l\u00ednea] nodo_de_encogimiento_lru_gen mm/vmscan.c:4957 [en l\u00ednea] nodo_reducci\u00f3n+0x3799/0x3de0 mm/vmscan.c:5937 nodo_reducci\u00f3n_kswapd mm/vmscan.c:6765 [en l\u00ednea] balance_pgdat mm/vmscan.c:6957 [en l\u00ednea] kswapd+0x1ca3/0x3700 mm/vmscan.c:7226 kthread+0x2f0/0x390 kernel/kthread.c:389 ret_de_la_bifurcaci\u00f3n+0x4b/0x80 arch/x86/kernel/process.c:147 ret_de_la_bifurcaci\u00f3n_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 -> #1 (fs_reclaim){+.+.}-{0:0}: lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5825 __fs_reclaim_acquire mm/page_alloc.c:3834 [en l\u00ednea] fs_reclaim_acquire+0x88/0x130 mm/page_alloc.c:3848 might_alloc include/linux/sched/mm.h:318 [en l\u00ednea] prepare_alloc_pages+0x147/0x5b0 mm/page_alloc.c:4493 __alloc_pages_noprof+0x16f/0x710 mm/page_alloc.c:4722 alloc_pages_mpol_noprof+0x3e8/0x680 mm/mempolicy.c:2265 alloc_pages_noprof mm/mempolicy.c:2345 [en l\u00ednea] folio_alloc_noprof+0x128/0x180 mm/mempolicy.c:2352 filemap_alloc_folio_noprof+0xdf/0x500 mm/filemap.c:1010 do_read_cache_folio+0x2eb/0x850 mm/filemap.c:3787 read_mapping_folio include/linux/pagemap.h:1011 [en l\u00ednea] f2fs_commit_super+0x3c0/0x7d0 fs/f2fs/super.c:4032 f2fs_record_stop_reason+0x13b/0x1d0 fs/f2fs/super.c:4079 f2fs_handle_critical_error+0x2ac/0x5c0 fs/f2fs/super.c:4174 f2fs_write_inode+0x35f/0x4d0 fs/f2fs/inode.c:785 escritura_inodo fs/fs-writeback.c:1503 [en l\u00ednea] __writeback_single_inode+0x711/0x10d0 fs/fs-writeback.c:1723 escritura_inversa_single_inode+0x1f3/0x660 fs/fs-writeback.c:1779 sync_inode_metadata+0xc4/0x120 fs/fs-writeback.c:2849 f2fs_release_file+0xa8/0x100 fs/f2fs/file.c:1941 __fput+0x23f/0x880 fs/file_table.c:431 tarea_trabajo_ejecutar+0x24f/0x310 kernel/tarea_trabajo.c:228 reanudar_modo_usuario_trabajo include/linux/reanudar_modo_usuario.h:50 [en l\u00ednea] salir_al_bucle_modo_usuario kernel/entrada/com\u00fan.c:114 [en l\u00ednea] salir_al_bucle_modo_usuario_preparar include/linux/entrada-com\u00fan.h:328 [en l\u00ednea] __syscall_salir_al_modo_usuario_trabajo kernel/entrada/com\u00fan.c:207 [en l\u00ednea] syscall_salir_al_modo_usuario_trabajo+0x168/0x370 kernel/entrada/com\u00fan.c:218 hacer_syscall_64+0x100/0x230 arch/x86/entrada/com\u00fan.c:89 entrada_SYSCALL_64_after_hwframe+0x77/0x7f ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.4", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "D19234B8-D413-446B-AEF8-3A02C2A03442" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1539a088b108996bcdaddb7775070b5163b14233", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/801092a2c9c251ef6a8678fcb8fcc1220474a697", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ecf4e6782b01fd578b565b3dd2be7bb0ac91082e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f10a890308a7cd8794e21f646f09827c6cb4bf5d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56745.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56745.json index 2976c62b490..a51af51d74d 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56745.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56745.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56745", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:07.937", - "lastModified": "2024-12-29T12:15:07.937", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T22:47:40.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,131 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: PCI: Corregir p\u00e9rdida de memoria de reset_method_store() En reset_method_store(), se asigna una cadena a trav\u00e9s de kstrndup() y se asigna a las \"opciones\" locales. Luego, se usa options con strsep() para buscar espacios: while ((name = strsep(&options, \" \")) != NULL) { Si no quedan espacios, strsep() establece options en NULL, por lo que el kfree(options) posterior no libera la memoria asignada a trav\u00e9s de kstrndup(). Se soluciona utilizando un tmp_options separado para iterar con strsep() de modo que se preserve options." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.174", + "matchCriteriaId": "005C9407-09BA-46F6-A8A9-A04EED9F948E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2985b1844f3f3447f2d938eff1ef6762592065a5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/403efb4457c0c8f8f51e904cc57d39193780c6bd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/543d0eb40e45c6a51f1bff02f417b602e54472d5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8e098baf6bc3f3a6aefc383509aba07e202f7ee0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/931d07ccffcc3614f20aaf602b31e89754e21c59", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fe6fae61f3b993160aef5fe2b7141a83872c144f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56746.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56746.json index b089e4d5c30..1fb63bd9376 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56746.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56746.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56746", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:08.070", - "lastModified": "2024-12-29T12:15:08.070", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T22:47:17.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,173 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fbdev: sh7760fb: Se solucion\u00f3 una posible p\u00e9rdida de memoria en sh7760fb_alloc_mem(). Cuando la informaci\u00f3n como info->screen_base no est\u00e1 lista, llamar a sh7760fb_free_mem() no libera la memoria correctamente. En su lugar, llame a dma_free_coherent()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.27", + "versionEndExcluding": "4.19.325", + "matchCriteriaId": "ABBE7205-6BEE-4F12-87E6-E19349AB0A8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.287", + "matchCriteriaId": "E4B15788-D35E-4E5B-A9C0-070AE3729B34" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.231", + "matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.174", + "matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0d3fb3b3e9d66f7b6346e3b90bc0ff48683539ce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/29216bb390e36daeebef66abaa02d9751330252b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3dd9df8e5f34c6fc4217a7498c1fb3c352d4afc2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/40f4326ed05a3b3537556ff2a844958b9e779a98", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bad37309c8b8bf1cfc893750df0951a804009ca0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d10cd53e5a7fb3b7c6f83d4d9a5ea1d97a3ed9a5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d48cbfa90dce506030151915fa3346d67f964af4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f4fbd70e15fafe36a7583954ce189aaf5536aeec", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f89d17ae2ac42931be2a0153fecbf8533280c927", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56747.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56747.json index 86a63b2d9a8..7a3c2ac5ebb 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56747.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56747.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56747", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-29T12:15:08.183", - "lastModified": "2024-12-29T12:15:08.183", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-07T22:47:01.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,173 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: qedi: Se corrige una posible p\u00e9rdida de memoria en qedi_alloc_and_init_sb(). El gancho \"qedi_ops->common->sb_init = qed_sb_init\" no libera la memoria DMA sb_virt cuando falla. Agregue dma_free_coherent() para liberarla. Esta es la misma forma que qedr_alloc_mem_sb() y qede_alloc_mem_sb()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.19.325", + "matchCriteriaId": "E56DA84C-65AC-480A-9C9B-B9C54A6C25DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.287", + "matchCriteriaId": "E4B15788-D35E-4E5B-A9C0-070AE3729B34" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.231", + "matchCriteriaId": "B5C644CC-2BD7-4E32-BC54-8DCC7ABE9935" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.174", + "matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.64", + "matchCriteriaId": "CA16DEE3-ABEC-4449-9F4A-7A3DC4FC36C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.11", + "matchCriteriaId": "21434379-192D-472F-9B54-D45E3650E893" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.2", + "matchCriteriaId": "D8882B1B-2ABC-4838-AC1D-DBDBB5764776" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/10a6fc486ac40a410f0fb84cc15161238eccd20a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/20b775cf274cfbfa3da871a1108877e17b8b19e1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4e48e5b26b3edc0e1dd329201ffc924a7a1f9337", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/95bbdca4999bc59a72ebab01663d421d6ce5775d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a4d2011cbe039b25024831427b60ab91ee247066", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b778b5240485106abf665eb509cc01779ed0cb00", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bb8b45883eb072adba297922b67d1467082ac880", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cfc76acaf2c4b43d1e140f1e4cbde15adb540bc5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eaf92fad1f21be63427920c12f22227e5f757424", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56757.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56757.json index 217741dc431..362a3b9efec 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56757.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56757.json @@ -2,24 +2,87 @@ "id": "CVE-2024-56757", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-06T17:15:40.297", - "lastModified": "2025-01-06T17:15:40.297", - "vulnStatus": "Received", + "lastModified": "2025-01-07T22:46:35.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: btusb: mediatek: add intf release flow when usb disconnect\n\nMediaTek claim an special usb intr interface for ISO data transmission.\nThe interface need to be released before unregistering hci device when\nusb disconnect. Removing BT usb dongle without properly releasing the\ninterface may cause Kernel panic while unregister hci device." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: btusb: mediatek: agregar flujo de liberaci\u00f3n de intf cuando se desconecta el USB MediaTek reclama una interfaz USB intr especial para la transmisi\u00f3n de datos ISO. La interfaz debe liberarse antes de anular el registro del dispositivo HCI cuando se desconecta el USB. Quitar el dispositivo USB BT sin liberar correctamente la interfaz puede provocar un p\u00e1nico del kernel al anular el registro del dispositivo HCI." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.12.8", + "matchCriteriaId": "37A8903F-DC48-45AD-98DC-188AFD7C5844" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/489304e67087abddc2666c5af0159cb95afdcf59", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cc569d791ab2a0de74f76e470515d25d24c9b84b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56758.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56758.json index 5f4f3a04d01..d986ce6f372 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56758.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56758.json @@ -2,24 +2,115 @@ "id": "CVE-2024-56758", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-06T17:15:40.597", - "lastModified": "2025-01-06T17:15:40.597", - "vulnStatus": "Received", + "lastModified": "2025-01-07T22:43:35.403", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: check folio mapping after unlock in relocate_one_folio()\n\nWhen we call btrfs_read_folio() to bring a folio uptodate, we unlock the\nfolio. The result of that is that a different thread can modify the\nmapping (like remove it with invalidate) before we call folio_lock().\nThis results in an invalid page and we need to try again.\n\nIn particular, if we are relocating concurrently with aborting a\ntransaction, this can result in a crash like the following:\n\n BUG: kernel NULL pointer dereference, address: 0000000000000000\n PGD 0 P4D 0\n Oops: 0000 [#1] SMP\n CPU: 76 PID: 1411631 Comm: kworker/u322:5\n Workqueue: events_unbound btrfs_reclaim_bgs_work\n RIP: 0010:set_page_extent_mapped+0x20/0xb0\n RSP: 0018:ffffc900516a7be8 EFLAGS: 00010246\n RAX: ffffea009e851d08 RBX: ffffea009e0b1880 RCX: 0000000000000000\n RDX: 0000000000000000 RSI: ffffc900516a7b90 RDI: ffffea009e0b1880\n RBP: 0000000003573000 R08: 0000000000000001 R09: ffff88c07fd2f3f0\n R10: 0000000000000000 R11: 0000194754b575be R12: 0000000003572000\n R13: 0000000003572fff R14: 0000000000100cca R15: 0000000005582fff\n FS: 0000000000000000(0000) GS:ffff88c07fd00000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000000 CR3: 000000407d00f002 CR4: 00000000007706f0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n PKRU: 55555554\n Call Trace:\n \n ? __die+0x78/0xc0\n ? page_fault_oops+0x2a8/0x3a0\n ? __switch_to+0x133/0x530\n ? wq_worker_running+0xa/0x40\n ? exc_page_fault+0x63/0x130\n ? asm_exc_page_fault+0x22/0x30\n ? set_page_extent_mapped+0x20/0xb0\n relocate_file_extent_cluster+0x1a7/0x940\n relocate_data_extent+0xaf/0x120\n relocate_block_group+0x20f/0x480\n btrfs_relocate_block_group+0x152/0x320\n btrfs_relocate_chunk+0x3d/0x120\n btrfs_reclaim_bgs_work+0x2ae/0x4e0\n process_scheduled_works+0x184/0x370\n worker_thread+0xc6/0x3e0\n ? blk_add_timer+0xb0/0xb0\n kthread+0xae/0xe0\n ? flush_tlb_kernel_range+0x90/0x90\n ret_from_fork+0x2f/0x40\n ? flush_tlb_kernel_range+0x90/0x90\n ret_from_fork_asm+0x11/0x20\n \n\nThis occurs because cleanup_one_transaction() calls\ndestroy_delalloc_inodes() which calls invalidate_inode_pages2() which\ntakes the folio_lock before setting mapping to NULL. We fail to check\nthis, and subsequently call set_extent_mapping(), which assumes that\nmapping != NULL (in fact it asserts that in debug mode)\n\nNote that the \"fixes\" patch here is not the one that introduced the\nrace (the very first iteration of this code from 2009) but a more recent\nchange that made this particular crash happen in practice." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: comprobar la asignaci\u00f3n de folios despu\u00e9s de desbloquear en relocate_one_folio() Cuando llamamos a btrfs_read_folio() para actualizar un folio, desbloqueamos el folio. El resultado de eso es que un hilo diferente puede modificar la asignaci\u00f3n (como eliminarla con invalidate) antes de que llamemos a folio_lock(). Esto da como resultado una p\u00e1gina no v\u00e1lida y debemos volver a intentarlo. En particular, si estamos reubicando simult\u00e1neamente y abortando una transacci\u00f3n, esto puede resultar en un bloqueo como el siguiente: ERROR: desreferencia de puntero NULL del n\u00facleo, direcci\u00f3n: 0000000000000000 PGD 0 P4D 0 Oops: 0000 [#1] SMP CPU: 76 PID: 1411631 Comm: kworker/u322:5 Workqueue: events_unbound btrfs_reclaim_bgs_work RIP: 0010:set_page_extent_mapped+0x20/0xb0 RSP: 0018:ffffc900516a7be8 EFLAGS: 00010246 RAX: ffffea009e851d08 RBX: ffffea009e0b1880 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffffc900516a7b90 RDI: ffffea009e0b1880 RBP: 0000000003573000 R08: 0000000000000001 R09: ffff88c07fd2f3f0 R10: 000000000000000 R11: 0000194754b575be R12: 0000000003572000 R13: 0000000003572fff R14: 0000000000100cca R15: 0000000005582fff FS: 0000000000000000(0000) GS:ffff88c07fd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000000000 CR3: 000000407d00f002 CR4: 00000000007706f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 00000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 PKRU: 55555554 Seguimiento de llamadas: ? __die+0x78/0xc0 ? page_fault_oops+0x2a8/0x3a0 ? __switch_to+0x133/0x530 ? wq_worker_running+0xa/0x40 ? exc_page_fault+0x63/0x130 ? asm_exc_page_fault+0x22/0x30 ? blk_add_timer+0xb0/0xb0 kthread+0xae/0xe0 ? flush_tlb_kernel_range+0x90/0x90 ret_from_fork+0x2f/0x40 ? flush_tlb_kernel_range+0x90/0x90 ret_from_fork_asm+0x11/0x20 Esto ocurre porque cleanup_one_transaction() llama a destroy_delalloc_inodes() que llama a invalidate_inode_pages2() que toma el folio_lock antes de establecer mapping en NULL. No comprobamos esto y, posteriormente, llamamos a set_extent_mapping(), que supone que mapping != NULL (de hecho, lo afirma en modo de depuraci\u00f3n). Tenga en cuenta que el parche de \"correcciones\" aqu\u00ed no es el que introdujo la ejecuci\u00f3n(la primera iteraci\u00f3n de este c\u00f3digo de 2009), sino un cambio m\u00e1s reciente que hizo que este fallo en particular sucediera en la pr\u00e1ctica." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.54", + "versionEndExcluding": "6.2", + "matchCriteriaId": "AF92BAD7-36C7-4B11-8CAA-5B5EFABE096A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.5.4", + "versionEndExcluding": "6.12.8", + "matchCriteriaId": "74FB61B2-9981-44D8-A191-6219D9D9CBCB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/3e74859ee35edc33a022c3f3971df066ea0ca6b9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d508e56270389b3a16f5b3cf247f4eb1bbad1578", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56766.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56766.json index c2c02342d36..cba846494c5 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56766.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56766.json @@ -2,32 +2,171 @@ "id": "CVE-2024-56766", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-06T17:15:43.127", - "lastModified": "2025-01-06T17:15:43.127", - "vulnStatus": "Received", + "lastModified": "2025-01-07T22:59:50.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmtd: rawnand: fix double free in atmel_pmecc_create_user()\n\nThe \"user\" pointer was converted from being allocated with kzalloc() to\nbeing allocated by devm_kzalloc(). Calling kfree(user) will lead to a\ndouble free." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mtd: rawnand: se corrige una liberaci\u00f3n doble en atmel_pmecc_create_user(). El puntero \"usuario\" pas\u00f3 de estar asignado con kzalloc() a estar asignado por devm_kzalloc(). Llamar a kfree(user) provocar\u00e1 una liberaci\u00f3n doble." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.325", + "versionEndExcluding": "4.20", + "matchCriteriaId": "3C960EB7-4E90-49E0-BB92-BE6F1B8CF26F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.287", + "versionEndExcluding": "5.5", + "matchCriteriaId": "2E049AFB-F729-4E03-87D4-2BB4FFA5E622" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.231", + "versionEndExcluding": "5.11", + "matchCriteriaId": "055DF185-747E-444A-AEC9-E23AA67777A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.174", + "versionEndExcluding": "5.16", + "matchCriteriaId": "5EDFC1D5-0414-42C6-B6E2-1101700AA7DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.120", + "versionEndExcluding": "6.1.123", + "matchCriteriaId": "010819A3-7BB5-4ACE-9F5E-C53664C957C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.64", + "versionEndExcluding": "6.6.69", + "matchCriteriaId": "1DA730E9-7DB9-4919-A111-9038A4685B92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11.11", + "versionEndExcluding": "6.12", + "matchCriteriaId": "4CBF5F6E-D446-4CAE-AAA4-413442319824" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12.2", + "versionEndExcluding": "6.12.8", + "matchCriteriaId": "42EECCF9-F7F0-46E2-A493-B31E541E6147" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/6ea15205d7e2b811fbbdf79783f686f58abfb4b7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d2f090ea57f8d6587e09d4066f740a8617767b3d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d8e4771f99c0400a1873235704b28bb803c83d17", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dd45c87782738715d5e7c167f8dabf0814a7394a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56767.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56767.json index 0dec26b24c2..0025f0e0bbe 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56767.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56767.json @@ -2,32 +2,136 @@ "id": "CVE-2024-56767", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-06T17:15:43.477", - "lastModified": "2025-01-06T17:15:43.477", - "vulnStatus": "Received", + "lastModified": "2025-01-07T22:51:02.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: at_xdmac: avoid null_prt_deref in at_xdmac_prep_dma_memset\n\nThe at_xdmac_memset_create_desc may return NULL, which will lead to a\nnull pointer dereference. For example, the len input is error, or the\natchan->free_descs_list is empty and memory is exhausted. Therefore, add\ncheck to avoid this." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dmaengine: at_xdmac: evitar null_prt_deref en at_xdmac_prep_dma_memset El par\u00e1metro at_xdmac_memset_create_desc puede devolver NULL, lo que provocar\u00e1 una desreferencia de puntero nulo. Por ejemplo, la entrada len es un error o la lista atchan->free_descs_list est\u00e1 vac\u00eda y la memoria est\u00e1 agotada. Por lo tanto, agregue una comprobaci\u00f3n para evitar esto." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2", + "versionEndExcluding": "6.1.123", + "matchCriteriaId": "F5F0EA73-3F4D-47C1-9667-244C435D9457" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.69", + "matchCriteriaId": "EF18E3CB-058C-4836-B36D-8073F1C09977" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.8", + "matchCriteriaId": "E79883DD-75BE-4DA9-B4EC-AC6DE63BD438" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/54376d8d26596f98ed7432a788314bb9154bf3e3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c43ec96e8d34399bd9dab2f2dc316b904892133f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e658f1c133b854b2ae799147301d82dddb8f3162", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fdba6d5e455388377ec7e82a5913ddfcc7edd93b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56768.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56768.json index a33cd489a28..2315c20fb60 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56768.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56768.json @@ -2,24 +2,103 @@ "id": "CVE-2024-56768", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-06T17:15:43.800", - "lastModified": "2025-01-06T17:15:43.800", - "vulnStatus": "Received", + "lastModified": "2025-01-07T22:50:43.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix bpf_get_smp_processor_id() on !CONFIG_SMP\n\nOn x86-64 calling bpf_get_smp_processor_id() in a kernel with CONFIG_SMP\ndisabled can trigger the following bug, as pcpu_hot is unavailable:\n\n [ 8.471774] BUG: unable to handle page fault for address: 00000000936a290c\n [ 8.471849] #PF: supervisor read access in kernel mode\n [ 8.471881] #PF: error_code(0x0000) - not-present page\n\nFix by inlining a return 0 in the !CONFIG_SMP case." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: Corregir bpf_get_smp_processor_id() en !CONFIG_SMP En x86-64, llamar a bpf_get_smp_processor_id() en un kernel con CONFIG_SMP deshabilitado puede provocar el siguiente error, ya que pcpu_hot no est\u00e1 disponible: [ 8.471774] ERROR: no se puede gestionar el error de p\u00e1gina para la direcci\u00f3n: 00000000936a290c [ 8.471849] #PF: acceso de lectura de supervisor en modo kernel [ 8.471881] #PF: error_code(0x0000) - p\u00e1gina no presente Corregir incrustando un retorno 0 en el caso de !CONFIG_SMP." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10", + "versionEndExcluding": "6.12.8", + "matchCriteriaId": "BCD9BDC5-9E29-45B5-92A6-8752B9E03902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/23579010cf0a12476e96a5f1acdf78a9c5843657", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f4ab7d74247b0150547cf909b3f6f24ee85183df", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-567xx/CVE-2024-56769.json b/CVE-2024/CVE-2024-567xx/CVE-2024-56769.json index cf962cb4f63..901d7010e06 100644 --- a/CVE-2024/CVE-2024-567xx/CVE-2024-56769.json +++ b/CVE-2024/CVE-2024-567xx/CVE-2024-56769.json @@ -2,32 +2,131 @@ "id": "CVE-2024-56769", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-06T17:15:44.063", - "lastModified": "2025-01-06T17:15:44.063", - "vulnStatus": "Received", + "lastModified": "2025-01-07T22:49:54.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: dvb-frontends: dib3000mb: fix uninit-value in dib3000_write_reg\n\nSyzbot reports [1] an uninitialized value issue found by KMSAN in\ndib3000_read_reg().\n\nLocal u8 rb[2] is used in i2c_transfer() as a read buffer; in case\nthat call fails, the buffer may end up with some undefined values.\n\nSince no elaborate error handling is expected in dib3000_write_reg(),\nsimply zero out rb buffer to mitigate the problem.\n\n[1] Syzkaller report\ndvb-usb: bulk message failed: -22 (6/0)\n=====================================================\nBUG: KMSAN: uninit-value in dib3000mb_attach+0x2d8/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758\n dib3000mb_attach+0x2d8/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758\n dibusb_dib3000mb_frontend_attach+0x155/0x2f0 drivers/media/usb/dvb-usb/dibusb-mb.c:31\n dvb_usb_adapter_frontend_init+0xed/0x9a0 drivers/media/usb/dvb-usb/dvb-usb-dvb.c:290\n dvb_usb_adapter_init drivers/media/usb/dvb-usb/dvb-usb-init.c:90 [inline]\n dvb_usb_init drivers/media/usb/dvb-usb/dvb-usb-init.c:186 [inline]\n dvb_usb_device_init+0x25a8/0x3760 drivers/media/usb/dvb-usb/dvb-usb-init.c:310\n dibusb_probe+0x46/0x250 drivers/media/usb/dvb-usb/dibusb-mb.c:110\n...\nLocal variable rb created at:\n dib3000_read_reg+0x86/0x4e0 drivers/media/dvb-frontends/dib3000mb.c:54\n dib3000mb_attach+0x123/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758\n..." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: dvb-frontends: dib3000mb: correcci\u00f3n de un valor no inicializado en dib3000_write_reg Syzbot informa [1] de un problema de valor no inicializado encontrado por KMSAN en dib3000_read_reg(). El rb u8 local [2] se utiliza en i2c_transfer() como un b\u00fafer de lectura; en caso de que esa llamada falle, el b\u00fafer puede terminar con algunos valores indefinidos. Dado que no se espera una gesti\u00f3n elaborada de errores en dib3000_write_reg(), simplemente ponga a cero el b\u00fafer rb para mitigar el problema. [1] Syzkaller informa dvb-usb: error en el mensaje masivo: -22 (6/0) ======================================================= ERROR: KMSAN: valor no inicializado en dib3000mb_attach+0x2d8/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758 dib3000mb_attach+0x2d8/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758 dibusb_dib3000mb_frontend_attach+0x155/0x2f0 drivers/media/usb/dvb-usb/dibusb-mb.c:31 dvb_usb_adapter_frontend_init+0xed/0x9a0 drivers/media/usb/dvb-usb/dvb-usb-dvb.c:290 dvb_usb_adapter_init drivers/media/usb/dvb-usb/dvb-usb-init.c:90 [en l\u00ednea] dvb_usb_init drivers/media/usb/dvb-usb/dvb-usb-init.c:186 [en l\u00ednea] dvb_usb_device_init+0x25a8/0x3760 drivers/media/usb/dvb-usb/dvb-usb-init.c:310 dibusb_probe+0x46/0x250 drivers/media/usb/dvb-usb/dibusb-mb.c:110 ... Variable local rb manipulado en: dib3000_read_reg+0x86/0x4e0 drivers/media/dvb-frontends/dib3000mb.c:54 dib3000mb_attach+0x123/0x3c0 drivers/media/dvb-frontends/dib3000mb.c:758 ..." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.19", + "versionEndExcluding": "6.1.123", + "matchCriteriaId": "C5D912DD-BB55-4C0A-AEDF-47A0C02B408C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.69", + "matchCriteriaId": "EF18E3CB-058C-4836-B36D-8073F1C09977" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.8", + "matchCriteriaId": "E79883DD-75BE-4DA9-B4EC-AC6DE63BD438" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/1d6de21f00293d819b5ca6dbe75ff1f3b6392140", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2dd59fe0e19e1ab955259978082b62e5751924c7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3876e3a1c31a58a352c6bf5d2a90e3304445a637", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c1197c1457bb7098cf46366e898eb52b41b6876a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22132.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22132.json new file mode 100644 index 00000000000..9d0b43a54dc --- /dev/null +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22132.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-22132", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-07T22:15:31.590", + "lastModified": "2025-01-07T22:15:31.590", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "WeGIA is a web manager for charitable institutions. A Cross-Site Scripting (XSS) vulnerability was identified in the file upload functionality of the WeGIA/html/socio/sistema/controller/controla_xlsx.php endpoint. By uploading a file containing malicious JavaScript code, an attacker can execute arbitrary scripts in the context of a victim's browser. This can lead to information theft, session hijacking, and other forms of client-side exploitation. This vulnerability is fixed in 3.2.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/nilsonLazarin/WeGIA/commit/330f641db43cfb0c8ea8bb6025cc0732de4d4d6b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nilsonLazarin/WeGIA/security/advisories/GHSA-h8hr-jhcx-fcv9", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-221xx/CVE-2025-22133.json b/CVE-2025/CVE-2025-221xx/CVE-2025-22133.json new file mode 100644 index 00000000000..74dedb03d47 --- /dev/null +++ b/CVE-2025/CVE-2025-221xx/CVE-2025-22133.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-22133", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-07T22:15:31.740", + "lastModified": "2025-01-07T22:15:31.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "WeGIA is a web manager for charitable institutions. Prior to 3.2.8, a critical vulnerability was identified in the /WeGIA/html/socio/sistema/controller/controla_xlsx.php endpoint. The endpoint accepts file uploads without proper validation, allowing the upload of malicious files, such as .phar, which can then be executed by the server. This vulnerability is fixed in 3.2.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + }, + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/nilsonLazarin/WeGIA/commit/a08f04de96d3caec85496d7a89a5b82d1960d9dd", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nilsonLazarin/WeGIA/security/advisories/GHSA-mjgr-2jxv-v8qf", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index ba8f17661b4..75a8bd6caad 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-07T21:00:22.641032+00:00 +2025-01-07T23:00:22.280308+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-07T20:53:53.143000+00:00 +2025-01-07T22:59:50.807000+00:00 ``` ### Last Data Feed Release @@ -33,54 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -276205 +276208 ``` ### CVEs added in the last Commit -Recently added CVEs: `10` +Recently added CVEs: `3` -- [CVE-2022-41572](CVE-2022/CVE-2022-415xx/CVE-2022-41572.json) (`2025-01-07T20:15:27.943`) -- [CVE-2022-41573](CVE-2022/CVE-2022-415xx/CVE-2022-41573.json) (`2025-01-07T20:15:28.057`) -- [CVE-2022-45185](CVE-2022/CVE-2022-451xx/CVE-2022-45185.json) (`2025-01-07T20:15:28.173`) -- [CVE-2022-45186](CVE-2022/CVE-2022-451xx/CVE-2022-45186.json) (`2025-01-07T20:15:28.293`) -- [CVE-2024-35532](CVE-2024/CVE-2024-355xx/CVE-2024-35532.json) (`2025-01-07T20:15:29.627`) -- [CVE-2024-40427](CVE-2024/CVE-2024-404xx/CVE-2024-40427.json) (`2025-01-07T19:15:32.260`) -- [CVE-2024-53522](CVE-2024/CVE-2024-535xx/CVE-2024-53522.json) (`2025-01-07T20:15:30.083`) -- [CVE-2024-54819](CVE-2024/CVE-2024-548xx/CVE-2024-54819.json) (`2025-01-07T20:15:30.197`) -- [CVE-2024-55218](CVE-2024/CVE-2024-552xx/CVE-2024-55218.json) (`2025-01-07T20:15:30.310`) -- [CVE-2025-0218](CVE-2025/CVE-2025-02xx/CVE-2025-0218.json) (`2025-01-07T20:15:30.710`) +- [CVE-2024-10541](CVE-2024/CVE-2024-105xx/CVE-2024-10541.json) (`2025-01-07T21:15:11.490`) +- [CVE-2025-22132](CVE-2025/CVE-2025-221xx/CVE-2025-22132.json) (`2025-01-07T22:15:31.590`) +- [CVE-2025-22133](CVE-2025/CVE-2025-221xx/CVE-2025-22133.json) (`2025-01-07T22:15:31.740`) ### CVEs modified in the last Commit -Recently modified CVEs: `78` +Recently modified CVEs: `72` -- [CVE-2024-28914](CVE-2024/CVE-2024-289xx/CVE-2024-28914.json) (`2025-01-07T19:51:53.947`) -- [CVE-2024-28915](CVE-2024/CVE-2024-289xx/CVE-2024-28915.json) (`2025-01-07T19:48:07.427`) -- [CVE-2024-28917](CVE-2024/CVE-2024-289xx/CVE-2024-28917.json) (`2025-01-07T19:29:24.970`) -- [CVE-2024-31899](CVE-2024/CVE-2024-318xx/CVE-2024-31899.json) (`2025-01-07T20:02:40.877`) -- [CVE-2024-44292](CVE-2024/CVE-2024-442xx/CVE-2024-44292.json) (`2025-01-07T19:11:30.300`) -- [CVE-2024-44293](CVE-2024/CVE-2024-442xx/CVE-2024-44293.json) (`2025-01-07T19:08:46.427`) -- [CVE-2024-44298](CVE-2024/CVE-2024-442xx/CVE-2024-44298.json) (`2025-01-07T19:00:43.213`) -- [CVE-2024-44450](CVE-2024/CVE-2024-444xx/CVE-2024-44450.json) (`2025-01-07T19:15:32.417`) -- [CVE-2024-46602](CVE-2024/CVE-2024-466xx/CVE-2024-46602.json) (`2025-01-07T19:15:32.597`) -- [CVE-2024-48245](CVE-2024/CVE-2024-482xx/CVE-2024-48245.json) (`2025-01-07T20:15:29.750`) -- [CVE-2024-53345](CVE-2024/CVE-2024-533xx/CVE-2024-53345.json) (`2025-01-07T20:15:29.923`) -- [CVE-2024-54006](CVE-2024/CVE-2024-540xx/CVE-2024-54006.json) (`2025-01-07T19:15:32.803`) -- [CVE-2024-54007](CVE-2024/CVE-2024-540xx/CVE-2024-54007.json) (`2025-01-07T19:15:32.927`) -- [CVE-2024-54038](CVE-2024/CVE-2024-540xx/CVE-2024-54038.json) (`2025-01-07T19:15:33.067`) -- [CVE-2024-54042](CVE-2024/CVE-2024-540xx/CVE-2024-54042.json) (`2025-01-07T19:15:33.203`) -- [CVE-2024-54043](CVE-2024/CVE-2024-540xx/CVE-2024-54043.json) (`2025-01-07T19:15:33.380`) -- [CVE-2024-54044](CVE-2024/CVE-2024-540xx/CVE-2024-54044.json) (`2025-01-07T19:15:33.563`) -- [CVE-2024-54046](CVE-2024/CVE-2024-540xx/CVE-2024-54046.json) (`2025-01-07T19:15:33.737`) -- [CVE-2024-54047](CVE-2024/CVE-2024-540xx/CVE-2024-54047.json) (`2025-01-07T19:15:33.927`) -- [CVE-2024-54048](CVE-2024/CVE-2024-540xx/CVE-2024-54048.json) (`2025-01-07T19:15:34.100`) -- [CVE-2024-54050](CVE-2024/CVE-2024-540xx/CVE-2024-54050.json) (`2025-01-07T19:15:34.280`) -- [CVE-2024-54051](CVE-2024/CVE-2024-540xx/CVE-2024-54051.json) (`2025-01-07T19:15:34.463`) -- [CVE-2024-5445](CVE-2024/CVE-2024-54xx/CVE-2024-5445.json) (`2025-01-07T20:15:30.600`) -- [CVE-2024-55555](CVE-2024/CVE-2024-555xx/CVE-2024-55555.json) (`2025-01-07T20:15:30.430`) -- [CVE-2025-0299](CVE-2025/CVE-2025-02xx/CVE-2025-0299.json) (`2025-01-07T19:15:34.743`) +- [CVE-2024-53935](CVE-2024/CVE-2024-539xx/CVE-2024-53935.json) (`2025-01-07T22:15:30.790`) +- [CVE-2024-54763](CVE-2024/CVE-2024-547xx/CVE-2024-54763.json) (`2025-01-07T22:15:30.950`) +- [CVE-2024-54764](CVE-2024/CVE-2024-547xx/CVE-2024-54764.json) (`2025-01-07T22:15:31.113`) +- [CVE-2024-54879](CVE-2024/CVE-2024-548xx/CVE-2024-54879.json) (`2025-01-07T21:15:12.170`) +- [CVE-2024-54880](CVE-2024/CVE-2024-548xx/CVE-2024-54880.json) (`2025-01-07T21:15:12.367`) +- [CVE-2024-55408](CVE-2024/CVE-2024-554xx/CVE-2024-55408.json) (`2025-01-07T22:15:31.260`) +- [CVE-2024-55410](CVE-2024/CVE-2024-554xx/CVE-2024-55410.json) (`2025-01-07T22:15:31.423`) +- [CVE-2024-56728](CVE-2024/CVE-2024-567xx/CVE-2024-56728.json) (`2025-01-07T22:03:07.837`) +- [CVE-2024-56729](CVE-2024/CVE-2024-567xx/CVE-2024-56729.json) (`2025-01-07T21:53:02.797`) +- [CVE-2024-56730](CVE-2024/CVE-2024-567xx/CVE-2024-56730.json) (`2025-01-07T21:23:52.260`) +- [CVE-2024-56739](CVE-2024/CVE-2024-567xx/CVE-2024-56739.json) (`2025-01-07T21:21:31.403`) +- [CVE-2024-56740](CVE-2024/CVE-2024-567xx/CVE-2024-56740.json) (`2025-01-07T22:24:05.593`) +- [CVE-2024-56741](CVE-2024/CVE-2024-567xx/CVE-2024-56741.json) (`2025-01-07T22:19:45.437`) +- [CVE-2024-56742](CVE-2024/CVE-2024-567xx/CVE-2024-56742.json) (`2025-01-07T22:19:23.543`) +- [CVE-2024-56743](CVE-2024/CVE-2024-567xx/CVE-2024-56743.json) (`2025-01-07T22:18:53.437`) +- [CVE-2024-56744](CVE-2024/CVE-2024-567xx/CVE-2024-56744.json) (`2025-01-07T22:14:03.760`) +- [CVE-2024-56745](CVE-2024/CVE-2024-567xx/CVE-2024-56745.json) (`2025-01-07T22:47:40.577`) +- [CVE-2024-56746](CVE-2024/CVE-2024-567xx/CVE-2024-56746.json) (`2025-01-07T22:47:17.513`) +- [CVE-2024-56747](CVE-2024/CVE-2024-567xx/CVE-2024-56747.json) (`2025-01-07T22:47:01.040`) +- [CVE-2024-56757](CVE-2024/CVE-2024-567xx/CVE-2024-56757.json) (`2025-01-07T22:46:35.897`) +- [CVE-2024-56758](CVE-2024/CVE-2024-567xx/CVE-2024-56758.json) (`2025-01-07T22:43:35.403`) +- [CVE-2024-56766](CVE-2024/CVE-2024-567xx/CVE-2024-56766.json) (`2025-01-07T22:59:50.807`) +- [CVE-2024-56767](CVE-2024/CVE-2024-567xx/CVE-2024-56767.json) (`2025-01-07T22:51:02.250`) +- [CVE-2024-56768](CVE-2024/CVE-2024-567xx/CVE-2024-56768.json) (`2025-01-07T22:50:43.207`) +- [CVE-2024-56769](CVE-2024/CVE-2024-567xx/CVE-2024-56769.json) (`2025-01-07T22:49:54.483`) ## Download and Usage diff --git a/_state.csv b/_state.csv index a17a0e1f515..faf4f739e79 100644 --- a/_state.csv +++ b/_state.csv @@ -162946,7 +162946,7 @@ CVE-2020-7751,0,0,5799124deef6e91709e5ed5fec8a8a58dfd29bdbf924a8749b407004f71c6e CVE-2020-7752,0,0,1e183a09a9702f79c06550a758fd9a1da75c0472a7242a95a17ac64530932a50,2024-11-21T05:37:44.200000 CVE-2020-7753,0,0,30f85c85e8cbb6a43a91e611a078c97c8da287c99574493008768b687264a5d5,2024-11-21T05:37:44.317000 CVE-2020-7754,0,0,92fc29f81e2ae89d0af49e5ebac06a75e57e8271ff64484f07cfe58d4f6a2726,2024-11-21T05:37:44.450000 -CVE-2020-7755,0,1,d6f66dc61088177368e41b2a78adba5baa79b4806a828cc662bd9d3349ea71e3,2025-01-07T19:45:20.860000 +CVE-2020-7755,0,0,d6f66dc61088177368e41b2a78adba5baa79b4806a828cc662bd9d3349ea71e3,2025-01-07T19:45:20.860000 CVE-2020-7757,0,0,7a796924da0a0a36f602d5ac2fe11027c32436d44b0db2d6a40f376409a07578,2024-11-21T05:37:44.683000 CVE-2020-7758,0,0,d8db0db98d50e6e3826a98fac238d383a9607eebfca39c582355be51aa52c3aa,2024-11-21T05:37:44.793000 CVE-2020-7759,0,0,86bef14edef8f16abff95492f0199c0568e2822ebcb6d81c44a536d6d05152f4,2024-11-21T05:37:44.910000 @@ -167036,7 +167036,7 @@ CVE-2021-20447,0,0,c5b80c3e9cab0dec7042bd80d15c4a68e214d99828a5d012bc1cadfc913e7 CVE-2021-20448,0,0,37cccd30af9b7c79bb0d01b2e89c3d72d043ff013378cd48704b48558d1f95b7,2024-11-21T05:46:36.740000 CVE-2021-2045,0,0,dedf7d8aff603a7cd1d7b0fbd50f67e4bc4c55af370fbac985e04f14c8af38c4,2024-11-21T06:02:15.393000 CVE-2021-20450,0,0,c277954dcc01142621c71d59d5d1fc644df23a1ada38b6368abecc3ca6c27d2c,2024-12-05T21:15:06.663000 -CVE-2021-20451,0,1,797407a62df654342e8aae6c25ae355b48050c7c796e0fa8eb4c7dcfa98ad018,2025-01-07T19:25:37.353000 +CVE-2021-20451,0,0,797407a62df654342e8aae6c25ae355b48050c7c796e0fa8eb4c7dcfa98ad018,2025-01-07T19:25:37.353000 CVE-2021-20453,0,0,69cac692ccb994b91ee56611307326b4371e627412e63b371dd093ede4578a39,2024-11-21T05:46:37.100000 CVE-2021-20454,0,0,b5a9b823983a12936ec287dc3098e2bed23b7aa3e8189b7deea101639225c258,2024-11-21T05:46:37.220000 CVE-2021-20455,0,0,8b7018f692a10e801c382acdf873135d57690a09d34295e52fba3a2cb6405207,2025-01-07T16:15:27.430000 @@ -187285,7 +187285,7 @@ CVE-2021-47091,0,0,01b41e88028f350f16a13041540bc4155867909fe7c12b4c9b8428b97f0dd CVE-2021-47092,0,0,d6975da3bb883b2068192aa25e708d7bcd2cee4c428c25b242ef9266ba445f15,2024-11-21T06:35:22.863000 CVE-2021-47093,0,0,8e59b890f30b57830049220e5420df84b7509112405936ef20687a0cc46d7425,2024-11-21T06:35:22.970000 CVE-2021-47094,0,0,70c9a9987f608c1e0dea21a73ea19fe2b8d1a6f7e0c1e3046a1c2fcc811a4ae9,2024-11-21T06:35:23.090000 -CVE-2021-47095,0,1,f1325d2319a8e87982889ff7e5d6ba5a22acc09a0f6caf76a80eb14b35abca9c,2025-01-07T20:15:00.280000 +CVE-2021-47095,0,0,f1325d2319a8e87982889ff7e5d6ba5a22acc09a0f6caf76a80eb14b35abca9c,2025-01-07T20:15:00.280000 CVE-2021-47096,0,0,a7889cc1343f95b816f2f3dd00a5e6cba7d24215c4fc0bb99eabcd7da60665f6,2024-11-21T06:35:23.370000 CVE-2021-47097,0,0,bc6485d8fce602afec969ad73cb67c2487d0407728ebb5edcbf1c54474a627b6,2024-11-21T06:35:23.540000 CVE-2021-47098,0,0,5f93d92c93bc0735c2ccb5f7fa279b06bb3b593f9cb4ed62248bd5b209cf2235,2024-11-21T06:35:23.650000 @@ -187298,7 +187298,7 @@ CVE-2021-47104,0,0,106f2b5520760467943f47cb23329a1907137148a138d2cede6ef704d6e19 CVE-2021-47105,0,0,c70bcdb3e4cbea4051aa23250c557a66de07f80b342d42024622054eb24f08ea,2024-11-21T06:35:24.523000 CVE-2021-47106,0,0,27334527400dbf9b93c9b718dd5f958b31aa596e4bfc81d49d5ef21b989aaedf,2024-11-21T06:35:24.633000 CVE-2021-47107,0,0,be272f01aeb3781cd9faff996c74315b3c711ebc0838122ffa859b7f28658968,2024-11-21T06:35:24.743000 -CVE-2021-47108,0,1,c23d21093fa3a1351345df0e77e2a410b9bd2af3a158493fefa58626321a1a7f,2025-01-07T20:14:35.703000 +CVE-2021-47108,0,0,c23d21093fa3a1351345df0e77e2a410b9bd2af3a158493fefa58626321a1a7f,2025-01-07T20:14:35.703000 CVE-2021-47109,0,0,d0d4755876ffc6bcaecd2654bbd49d22799ea5ef8fd867c14e00689af63486ed,2024-11-21T06:35:24.957000 CVE-2021-47110,0,0,50cf5c09f89aeaf543ffa132567ade0b5308efed772ea95eb1751760f1f935bc,2024-11-21T06:35:25.077000 CVE-2021-47111,0,0,6be0860ee1b01c3b774e4d6d191b57114cbf9a3d1a31a3499b909d6e18b8c18b,2024-11-21T06:35:25.200000 @@ -187628,11 +187628,11 @@ CVE-2021-47434,0,0,5d889b13cb9c4b665236a8505baf9fc1a75a9299c3e831d6b6d287c793912 CVE-2021-47435,0,0,0399af6b00ad6d67b30f2a2d4ab4d4b1ec972f935d310d8de643cb3a5a801bba,2024-11-21T06:36:08.267000 CVE-2021-47436,0,0,b1f66ac5efd878d993a17fd0c4c8653610f9b7bf14cd6f149a32b3292e9a73ee,2024-11-21T06:36:08.397000 CVE-2021-47437,0,0,c01151e46ab4e7793f5441a89041baf3c67d2bee71ab3272ec9d4117f61ed3eb,2024-11-21T06:36:08.510000 -CVE-2021-47438,0,1,be81f99bd1ceb58f333eb7d8cd405f4be714465eff11c5e96abfd42454bc4f82,2025-01-07T20:14:16.923000 +CVE-2021-47438,0,0,be81f99bd1ceb58f333eb7d8cd405f4be714465eff11c5e96abfd42454bc4f82,2025-01-07T20:14:16.923000 CVE-2021-47439,0,0,bf14a0f38b96daec4193df570224923cb3d883f9edff75541283af389e7a2865,2024-11-21T06:36:08.737000 CVE-2021-47440,0,0,505142ec219081d7d2b2448d13c4e14b72665831ce9ab07b5a08335ba5eb9fc4,2024-11-21T06:36:08.900000 CVE-2021-47441,0,0,09636dba9270b76cc81d516cefb92d04ce3ea312624476b372d8e417149fc37e,2024-11-21T06:36:09.100000 -CVE-2021-47442,0,1,12ac79ea7abfbc534a53a93b8adf1be859d564a09c1dc442425e87c7e7e06b1c,2025-01-07T20:14:00.147000 +CVE-2021-47442,0,0,12ac79ea7abfbc534a53a93b8adf1be859d564a09c1dc442425e87c7e7e06b1c,2025-01-07T20:14:00.147000 CVE-2021-47443,0,0,1c44c609b9131c8a42904b5eb724c5c516998eac086fd64d9bacafeecf320ee1,2024-11-21T06:36:09.423000 CVE-2021-47444,0,0,5027f476c6b4fbbd0fc834558cdc872961498ee4eaa06ce0110853d2bab7aaf8,2024-11-21T06:36:09.610000 CVE-2021-47445,0,0,3b75b9562d783cbb548f6816de44722b90a10be1a0301f9957c5e8ad33f72247,2024-11-21T06:36:09.717000 @@ -187656,14 +187656,14 @@ CVE-2021-47462,0,0,07fb99f6b69fcff11957f81be22850be05321e21eb2876eebbef290a5bea7 CVE-2021-47463,0,0,4495cacfd7f74068d9d051b3089c31a3267cbe4043665d75ead773ddce4dc5bd,2024-11-21T06:36:12.637000 CVE-2021-47464,0,0,7ecf96945294987b38fcfae942be067e1dee18c114b24357d054ec8eb6961ea5,2024-11-21T06:36:12.803000 CVE-2021-47465,0,0,535892ab31dce73283081a80facebf1e71ee3d315d764e5fe5d443a49db8dec5,2024-11-21T06:36:13.087000 -CVE-2021-47466,0,1,1032289734719583c5e473b913f50de249ff26383cf0cfb68845789d6c77770a,2025-01-07T20:13:41.913000 +CVE-2021-47466,0,0,1032289734719583c5e473b913f50de249ff26383cf0cfb68845789d6c77770a,2025-01-07T20:13:41.913000 CVE-2021-47467,0,0,f1671883b861b3993e0f37b61979df79b70a26ce821e0ab47424da081f565ac4,2024-11-21T06:36:13.530000 CVE-2021-47468,0,0,a10cb21e48d1fcccab4656f6b0eaaff4aefc96cc2dc1aa8d51c23ff6e4c1f711,2024-11-21T06:36:13.810000 CVE-2021-47469,0,0,98447d3fd3f6b800ad9977b55e9306fe93b440cd5418c5909a1036adb8f16620,2024-11-21T06:36:14.260000 CVE-2021-47470,0,0,31b51d65d4f91bfc13870b25b73da1134ebe92d090430ef26caf88d4ce9503ce,2024-11-21T06:36:14.467000 CVE-2021-47471,0,0,d878bb0529efd29ac48845865976a4b915822b3369f2778ab6066a3c3081c56d,2024-11-21T06:36:14.623000 CVE-2021-47472,0,0,4a163680eb0964c77bae31dc9771b9bdcab4b71fd554a2d2151c19134b7cbb1d,2024-06-17T17:15:51.050000 -CVE-2021-47473,0,1,5fca53b1af9e776f298f7a6ef44b038561cd25810ca2fc0d88e4a5892f204ef8,2025-01-07T20:19:15.517000 +CVE-2021-47473,0,0,5fca53b1af9e776f298f7a6ef44b038561cd25810ca2fc0d88e4a5892f204ef8,2025-01-07T20:19:15.517000 CVE-2021-47474,0,0,37365f7f291b0071769e44ce34e7b45f4eec5359854460670e42d17ed0bb7d0f,2024-11-21T06:36:15.077000 CVE-2021-47475,0,0,c88321d71e0af93c86603b8a29992e1dcb6e5a31fb81953d6216a2d2d418d351,2024-11-21T06:36:15.267000 CVE-2021-47476,0,0,f9ce36d5ed06acd740a45b7f53cd0d827925ad283ed7b43a9da4e1a75de3d02d,2024-11-21T06:36:15.453000 @@ -192021,7 +192021,7 @@ CVE-2022-22359,0,0,2bf01eb540622dca847eaacee6236e255186c1277196c7cc79e981387a737 CVE-2022-22360,0,0,565952d652a3bdb7d639feb074a1b0e26498767df3453bcf21d65b3148621e6f,2024-11-21T06:46:41.973000 CVE-2022-22361,0,0,10b0f271693e25631ef1989315b59440c197a948d70ee3735bfc385e81ac916f,2024-11-21T06:46:42.090000 CVE-2022-22363,0,0,e770f7f5dbc3b57de7d846ca0e694a449e70e29864fe0c3385ac95fbf3aa5eb9,2025-01-07T16:15:28.050000 -CVE-2022-22364,0,1,699859f56e67a1509bb3bd386cabe5337a40af606a12e422bc971d532159bce0,2025-01-07T20:16:36.033000 +CVE-2022-22364,0,0,699859f56e67a1509bb3bd386cabe5337a40af606a12e422bc971d532159bce0,2025-01-07T20:16:36.033000 CVE-2022-22365,0,0,93b131a9b6677b900794e8bfb444f14fa30b748b1163134645f09fea46b11764,2024-11-21T06:46:42.330000 CVE-2022-22366,0,0,09a7cac2af7c3326b1c4db129ec697d7b77dfaf6bb69f773673a6a77e39cac91,2024-11-21T06:46:42.450000 CVE-2022-22367,0,0,f882ca26722150b960229aa69678dc678f007562e394dfb4b417a39357dc7df4,2024-11-21T06:46:42.593000 @@ -203221,7 +203221,7 @@ CVE-2022-35910,0,0,7fc2885883102fc727096e2774117802777ce074d4d291f5fc97a3501d4d7 CVE-2022-35911,0,0,e0726f2dc12f74ea86390dfef1e1d1c742ae547b53b4529dd114c069c4165757,2024-11-21T07:11:56.440000 CVE-2022-35912,0,0,75fe2e3206f9f165b585185e652fc4bbcebe0f8a26b7326a958ab5ee47c053a8,2024-11-21T07:11:56.617000 CVE-2022-35913,0,0,89a6a4cbb147809e631e777d2af221126f33a975dee4dca0c25011e88eda7e40,2024-11-21T07:11:56.810000 -CVE-2022-35914,0,1,5a5de11c6ecd5a98419e5da748612ce23acd9a3e31d42e856954871074055e90,2025-01-07T20:15:27.193000 +CVE-2022-35914,0,0,5a5de11c6ecd5a98419e5da748612ce23acd9a3e31d42e856954871074055e90,2025-01-07T20:15:27.193000 CVE-2022-35915,0,0,cbd708eca6adbf0ed7ec96e61eb8e6e42a02c1eacc456abedba64aa3a407f9ab,2024-11-21T07:11:57.170000 CVE-2022-35916,0,0,9af87e09731f27efc95196b424b67dd321aa236a2082bf5ebbbcb2d7300805df,2024-11-21T07:11:57.320000 CVE-2022-35917,0,0,7e238076ca80dfe65eff9f389b38bd22676dbbcca323966feafdf40cc77142c4,2024-11-21T07:11:57.457000 @@ -206783,16 +206783,16 @@ CVE-2022-40651,0,0,0ee3f0a222c300a35eb41435b4e3c3340b0747385434b981f128054a3f5a5 CVE-2022-40652,0,0,f32088c9a1830c350a4bc47c084a1615cc8346bb98e43adb5f6b15fd72a6fdff,2024-11-21T07:21:47.480000 CVE-2022-40653,0,0,c530db75e85c82b709a959ba53c21f08704f2b35f5bde582da61130f3362365f,2024-11-21T07:21:47.603000 CVE-2022-40654,0,0,4a46c62924a27a366107e74b116fb512902645049da93f83830cc9c6a2d8ac0b,2024-11-21T07:21:47.720000 -CVE-2022-40655,0,1,2249c53d8e144885dfcb8a9246dcaf2d20b9aae1bba8a07bafbe683c0ee33660,2025-01-07T19:15:26.640000 -CVE-2022-40656,0,1,1044de2766d6139d42c3838c636718ded3086336153566473fbd9d5b75f70796,2025-01-07T19:15:27.777000 -CVE-2022-40657,0,1,e05667279d1b44886e2627e0eccadcb95e8621815492bc9bff52007195a0cace,2025-01-07T19:15:27.923000 -CVE-2022-40658,0,1,f239d41ca8fe37d9655fa04e5640ad3bb681bc7ff83b16555aed5901d506bfa3,2025-01-07T19:15:28.043000 -CVE-2022-40659,0,1,125d00e0c5b0bde1034e361503cc23e7e6f8a5fdcd5ee9ddb72999261e117040,2025-01-07T19:15:28.163000 +CVE-2022-40655,0,0,2249c53d8e144885dfcb8a9246dcaf2d20b9aae1bba8a07bafbe683c0ee33660,2025-01-07T19:15:26.640000 +CVE-2022-40656,0,0,1044de2766d6139d42c3838c636718ded3086336153566473fbd9d5b75f70796,2025-01-07T19:15:27.777000 +CVE-2022-40657,0,0,e05667279d1b44886e2627e0eccadcb95e8621815492bc9bff52007195a0cace,2025-01-07T19:15:27.923000 +CVE-2022-40658,0,0,f239d41ca8fe37d9655fa04e5640ad3bb681bc7ff83b16555aed5901d506bfa3,2025-01-07T19:15:28.043000 +CVE-2022-40659,0,0,125d00e0c5b0bde1034e361503cc23e7e6f8a5fdcd5ee9ddb72999261e117040,2025-01-07T19:15:28.163000 CVE-2022-4066,0,0,beae61b48c85e5f59e106fcd0e2231f7dd67421f06f8464ab6fe8ba24d8c3a6a,2024-11-21T07:34:32.567000 -CVE-2022-40660,0,1,387bf08689e0f098a2cf0c1279a07af8510fa11bd5fa89185f27b3b451cc4257,2025-01-07T19:15:28.287000 -CVE-2022-40661,0,1,a087c2690839e92b66bc8615c5d4fa6c5933210678822507e8dc38e67e956aba,2025-01-07T19:15:28.407000 -CVE-2022-40662,0,1,7d7e618c0ebec532e5076dd7f5754f7c602d242f7a04aaa8f1668b2ac8cd8180,2025-01-07T19:15:28.530000 -CVE-2022-40663,0,1,dde31399f5a66e6c570042ca074334e5e7f72b9477fce1392dfe59d8146293e2,2025-01-07T19:15:28.657000 +CVE-2022-40660,0,0,387bf08689e0f098a2cf0c1279a07af8510fa11bd5fa89185f27b3b451cc4257,2025-01-07T19:15:28.287000 +CVE-2022-40661,0,0,a087c2690839e92b66bc8615c5d4fa6c5933210678822507e8dc38e67e956aba,2025-01-07T19:15:28.407000 +CVE-2022-40662,0,0,7d7e618c0ebec532e5076dd7f5754f7c602d242f7a04aaa8f1668b2ac8cd8180,2025-01-07T19:15:28.530000 +CVE-2022-40663,0,0,dde31399f5a66e6c570042ca074334e5e7f72b9477fce1392dfe59d8146293e2,2025-01-07T19:15:28.657000 CVE-2022-40664,0,0,6384fb998400dd78dbbbbeb97701764cf40b03283cb2d5b45fedc9b8706ae4ab,2024-11-21T07:21:49.007000 CVE-2022-40665,0,0,11adc7edb24b1840642261dc605f3c70eb716a34efafd620ebb9fd24f65e6877,2023-11-07T03:52:33.163000 CVE-2022-40666,0,0,632ec9ff8b574405a7f28bedb20e0ca0512dfd079c1ef041a8fc193cc4145955,2023-11-07T03:52:33.393000 @@ -207554,8 +207554,8 @@ CVE-2022-41568,0,0,6205fdde5e39bc36de73db4dcd6211c4ac286d5b081b138486c1c05c18b4e CVE-2022-4157,0,0,662b08d19a468f391d3afa6bd0cb88ad7c569aafdca4fb8c2cd984f331979391,2024-11-21T07:34:41.270000 CVE-2022-41570,0,0,68d8e3713c67a900ebaccd270512214f137c6b2444cfced04a663beebd955153,2024-11-21T07:23:24.863000 CVE-2022-41571,0,0,d21192f5b84bd2e0d8b3b7685c8fa13d81d53fbe0d3de64478a1014c88f8f353,2024-11-21T07:23:25 -CVE-2022-41572,1,1,f95f7bbeea349210a4046397aa546f86cb914d717e7896125ced31e784e6f659,2025-01-07T20:15:27.943000 -CVE-2022-41573,1,1,fccec5dc8db1c1b73eb5b79c92265cfb099870d7525f75f00681a86090e4945f,2025-01-07T20:15:28.057000 +CVE-2022-41572,0,0,f95f7bbeea349210a4046397aa546f86cb914d717e7896125ced31e784e6f659,2025-01-07T20:15:27.943000 +CVE-2022-41573,0,0,fccec5dc8db1c1b73eb5b79c92265cfb099870d7525f75f00681a86090e4945f,2025-01-07T20:15:28.057000 CVE-2022-41574,0,0,21e917fa5154deb6e3b8d21ad116ef9dde7c875c812d3df1ee5d78c46dfa6a1a,2024-11-21T07:23:25.140000 CVE-2022-41575,0,0,8334a25c2009fcf3e6c0edb09d3dd5a6ab1272c7f22935bf5852c90ba12a2139,2024-11-21T07:23:25.287000 CVE-2022-41576,0,0,f5bafe8f1c17d8fad2ba21f970ed4ca48d42f1479d46600aad0cea7bb4120781,2024-11-21T07:23:25.433000 @@ -210254,8 +210254,8 @@ CVE-2022-45180,0,0,c3040cfe413949900a60ea83b3e98e1e8732363bd29ebf48fee6449f220d6 CVE-2022-45182,0,0,5ce5fd3aa8778337f722afc8524f8be33eca4a37a3b49427434ef8a1f42497ed,2024-11-21T07:28:55.140000 CVE-2022-45183,0,0,17c24bcc8ff5f83b3692890867f1b0390aceb5de23aec693bc352190eaa3a4c7,2024-11-21T07:28:55.287000 CVE-2022-45184,0,0,3d0fcb0285b7ec260e08c96917c32aa853ace4307fda2ec9ee77dd573c819440,2024-11-21T07:28:55.440000 -CVE-2022-45185,1,1,16d2233a18969fa33cb7529ccf2b16d6901990a16b8ca89ae75ef2569e19f35a,2025-01-07T20:15:28.173000 -CVE-2022-45186,1,1,cbab4651c9fce94e005c4bf988af7f08dca08724bcb7165c66fbaed2bab9c6c7,2025-01-07T20:15:28.293000 +CVE-2022-45185,0,0,16d2233a18969fa33cb7529ccf2b16d6901990a16b8ca89ae75ef2569e19f35a,2025-01-07T20:15:28.173000 +CVE-2022-45186,0,0,cbab4651c9fce94e005c4bf988af7f08dca08724bcb7165c66fbaed2bab9c6c7,2025-01-07T20:15:28.293000 CVE-2022-45188,0,0,897fe5d1be1d67bd18e0e84eecbd7aca5e96a3d426012bdcc62fcf1d224f7bf1,2024-11-21T07:28:55.583000 CVE-2022-4519,0,0,7e1b44f974b691b3ba99a7d6700f057355f3a483598f1d23e777976a85d319f9,2024-11-21T07:35:25.163000 CVE-2022-45190,0,0,f89ea31ba0ad427a758e6e41fdbb51266db819bb50b4347855d75db4180bf5f5,2024-11-21T07:28:55.763000 @@ -212420,7 +212420,7 @@ CVE-2022-48387,0,0,1e066de8fbcf6dac1339a1019e2d06a1bc4f1405e91b36f5521ca76272a43 CVE-2022-48388,0,0,13c757f93b0eef3b01e33ed39a736bad6d77d2a3105a2c7f4342f90b9f1fe088,2024-11-21T07:33:18.410000 CVE-2022-48389,0,0,eb063ff8dfa13e2a555c12156bbbd8338c343d47ca77d7533f59bc8ad443a959,2024-11-21T07:33:18.530000 CVE-2022-4839,0,0,71e9ea09316157b1d161766da1ca86a6c0636a9e403561b03ca92cbf29b77453,2024-11-21T07:36:02.903000 -CVE-2022-48390,0,0,5f587c34887fcead4e2c35f5a76458452399724a2a59915a5efda4fe3812b6d9,2024-11-21T07:33:18.660000 +CVE-2022-48390,0,1,2118f140d5a464f1e6eb994741768b9d34b16134f7a115aa13be1e0c15719039,2025-01-07T21:15:07.953000 CVE-2022-48391,0,0,b0f9e32700a5259cacfd61903d32c8fecc499367dd139627b668ea028c620663,2024-11-21T07:33:18.783000 CVE-2022-48392,0,0,e261bc3cd82de084dbc978363fda247a43174aec5203a1d324ca83f5fbf1b9f0,2024-11-21T07:33:18.910000 CVE-2022-4840,0,0,8593d435f1bfe4de06d5751803d143b53df092b88164a311eec3d96d433c7a2a,2024-11-21T07:36:03.047000 @@ -212442,15 +212442,15 @@ CVE-2022-48433,0,0,23ec3010492192080b98bdc3f0ec44e6a27c5950f7ca53485182a36f15632 CVE-2022-48434,0,0,7014f51deddc59d8cff943ebe8fe7eebfbaf0cea59cfbf3f6b2efad0b9067276,2024-11-21T07:33:20.487000 CVE-2022-48435,0,0,643f242af7cac04fe39080eaf04c7ceb3de585119d9640f84bbfc75f6711a652,2024-11-21T07:33:20.703000 CVE-2022-48437,0,0,c7f0af8c3894789ad77797876ed456afd4c24282aa7ecf309332cbfa5cfa2319,2024-11-21T07:33:20.810000 -CVE-2022-48438,0,0,e25bd36a18aa9e7ef8feccfe61d68f58881dad4289871711c379dbe5b17d29e5,2024-11-21T07:33:20.947000 -CVE-2022-48439,0,0,a7fd2f48168b0a13dcde898abdc2174929e9261f2ca701c8fd9ae7561f1c3249,2024-11-21T07:33:21.043000 +CVE-2022-48438,0,1,392067ae12dc53385d11e29ef20c18ad26361f7290750eb71212eb2bf283758a,2025-01-07T21:15:08.877000 +CVE-2022-48439,0,1,9de2bda4f4d9456bfbe7af36f508cc6aad156ed697950a52c509395d512ed99d,2025-01-07T21:15:09.040000 CVE-2022-4844,0,0,fb9279a7b9b9b7166b9ee820061e3a5fa4ecc6725efc0393e0e65ad192d73c59,2024-11-21T07:36:03.533000 -CVE-2022-48440,0,0,bdf19ad83e32c0e63eb4839b7db6c14b90f93a96082a6d50d79bae04470b2b9b,2024-11-21T07:33:21.143000 -CVE-2022-48441,0,0,5a640d91de511a39fdb86bd3847864125ac3b85da62f8093d991c0ba6a4cfc09,2024-11-21T07:33:21.270000 -CVE-2022-48442,0,0,fe1850d08ab62c2031f1f2c71aa59be2e0b1831ea9634a9e086168c134201c09,2024-11-21T07:33:21.413000 -CVE-2022-48443,0,0,b0a4afd90e76e69e34b6540a7d54589e2da91a0b8eb76d7db0b9c06666ae97c6,2024-11-21T07:33:21.527000 -CVE-2022-48444,0,0,e65d7a8c98c5ad776ca83a326541ec575fd1b7967955330cb66d44139a2e930c,2024-11-21T07:33:21.620000 -CVE-2022-48445,0,0,6c5d17d2dbc1b9af7090501edffe8acf9fccd89852088bde6793afe33afd21a6,2024-11-21T07:33:21.740000 +CVE-2022-48440,0,1,2fe3f303d29db41d82faaff8677058062598256f86b45f411b030a90e045017c,2025-01-07T21:15:09.207000 +CVE-2022-48441,0,1,2144f85c8f6da27bf8bcddb1af91af74735d8903f864ad8211a75e19a882c541,2025-01-07T21:15:09.367000 +CVE-2022-48442,0,1,d36a83d31e2b2754d833291552bce7be87a9cf43f9024c349a5f366fda0620dd,2025-01-07T21:15:09.540000 +CVE-2022-48443,0,1,ede0a966ec363c9aa77ae45de82f64c7a4fa2ce6bfb2197a737f0138a1ce43c3,2025-01-07T21:15:09.697000 +CVE-2022-48444,0,1,80dd0e8f471992a8c1ed2d9a802b8b1afebf5a5dc5e78a467453e6eda63da9a2,2025-01-07T21:15:09.883000 +CVE-2022-48445,0,1,63a0ea938ebf45b316f1c1a9997a08b535f3c06a17da269e04cc3f84ec90d2e0,2025-01-07T21:15:10.060000 CVE-2022-48446,0,0,ccde3852914606dc8343bf8afa1543aae9290421da0754748cda5178d190c1aa,2024-11-21T07:33:21.837000 CVE-2022-48447,0,0,1724b246a993086daa9332f1055ab5ac7831c12a5899e0a2ee81adf639ba4a1e,2024-11-21T07:33:21.933000 CVE-2022-48448,0,0,aab762f41031ef9a64f5ec500c2b61dc17e4a94e44de08811d0dda1de8d89367,2024-11-21T07:33:22.027000 @@ -215512,9 +215512,9 @@ CVE-2023-20709,0,0,f77eb6f47a9c01aeb7b37b0bb403dc2906cc5a60047939406ce5f60a7d638 CVE-2023-2071,0,0,6ca8691d1e9c7cafae6a5748684ff3584a63b6c0782aca4e9e39176c7a9a8482,2024-11-21T07:57:52.790000 CVE-2023-20710,0,0,36b3bd652704b53ed81bf08e9d3b6a30770e9e5726f30280c46f0944c40c0139,2024-11-21T07:41:23.967000 CVE-2023-20711,0,0,a3a059039f4079683556bc911267d66baaed48cea9038f1dfc5e720f76c3a013,2024-11-21T07:41:24.080000 -CVE-2023-20712,0,1,448f7cc7b18b7736e4158919a106777207ebeaae578ec88d49e8147b47bd416f,2025-01-07T19:15:28.830000 -CVE-2023-20715,0,1,8e093ad3da4ecddaecba75d344d8950a8e8f5da70b953ce26dbfe70f2bae96c6,2025-01-07T19:15:29.033000 -CVE-2023-20716,0,1,bc3be8c9031ce5b0447b088e80cf2c0fbcfc772b8457c122fb9d1df8c33921cf,2025-01-07T19:15:29.203000 +CVE-2023-20712,0,0,448f7cc7b18b7736e4158919a106777207ebeaae578ec88d49e8147b47bd416f,2025-01-07T19:15:28.830000 +CVE-2023-20715,0,0,8e093ad3da4ecddaecba75d344d8950a8e8f5da70b953ce26dbfe70f2bae96c6,2025-01-07T19:15:29.033000 +CVE-2023-20716,0,0,bc3be8c9031ce5b0447b088e80cf2c0fbcfc772b8457c122fb9d1df8c33921cf,2025-01-07T19:15:29.203000 CVE-2023-20717,0,0,b1525d88cbb5a71350e022089167c9477dd4337e8a5f350edb710d89d59053d5,2024-11-21T07:41:24.550000 CVE-2023-20718,0,0,2e64cc91ac3fceb6b2ea1e66c38b215865ab90c7fd81e4e8c5d4727f49967c2a,2024-11-21T07:41:24.663000 CVE-2023-20719,0,0,45e4dff0160f18a628c25174a9fe687a5bec30bfc32b0dec31f347aba43aa199,2024-11-21T07:41:24.780000 @@ -215524,10 +215524,10 @@ CVE-2023-20721,0,0,4ac0489da75d4749b3cca2d595c249202b58d4263b9ac12b1a7212ea3e62d CVE-2023-20722,0,0,8920eb055d033db9af8b82d589874977302f3c6343fff535a2c237261054f9eb,2024-11-21T07:41:25.093000 CVE-2023-20723,0,0,9d0686f907129b6919ada24bf4f11d306c0e127a565ad2d2e14861ae5024a41c,2024-11-21T07:41:25.200000 CVE-2023-20724,0,0,987f1a6ebac7796ad97470c40868ad4c190da72715630d9002692d9f05c5b7e0,2024-11-21T07:41:25.307000 -CVE-2023-20725,0,0,94abaae00a4babab1164edbbfa8363656a1ec46a4f867a80845b517abb1ae09b,2024-11-21T07:41:25.417000 +CVE-2023-20725,0,1,f09278808328dfcfcad9a9453e6e7f164215557bbd6c9f4188e9f9b639210912,2025-01-07T21:15:10.227000 CVE-2023-20726,0,0,0839a4ee0c7a4b353253d289124d14c8c0a8623790680626ad23a3507d551e11,2024-11-21T07:41:25.530000 CVE-2023-20727,0,0,c273371285cb88eaafd1f4f037322ee5da28f16900e0cd91d46b0d20048f91b1,2024-11-21T07:41:25.650000 -CVE-2023-20728,0,0,97e069253243c2c44c8d84d45c262ef1cee6cb08769c4fa43e37b02112acff0c,2024-11-21T07:41:25.767000 +CVE-2023-20728,0,1,a92d83daff0e8454efbc72619861f5e9876e5beba7cfa77f65738746f6788e6d,2025-01-07T21:15:10.397000 CVE-2023-20729,0,0,15b527ebbacb287f60215b283686e0c580dca8c072c93e41ac0b4e73c89071f1,2024-11-21T07:41:25.890000 CVE-2023-2073,0,0,96898ca4843b2e00caae369ccfc8a05e2eb3212aba8406e285b4a550c82c8d6c,2024-11-21T07:57:53.033000 CVE-2023-20730,0,0,8c705778dd34116f8b4be0e4f5f17bf62e2de2fd642fa24793b838d3811f30bc,2024-11-21T07:41:26 @@ -215536,25 +215536,25 @@ CVE-2023-20732,0,0,aaf62277d633267c6edf36a18170b89fc48801d9adae63fbe1b9d8feb477a CVE-2023-20733,0,0,6cde01793ae2c978bd440d898834d2f1a96c5a3fb43c402b931a43d7d0a61974,2024-11-21T07:41:26.340000 CVE-2023-20734,0,0,842934ea8f6042f29aa5c330143b6a382e58af8a82c7874ee7031969899dac6c,2024-11-21T07:41:26.467000 CVE-2023-20735,0,0,2a213002d4fdc2e6ac31daeba7ec590270a33fef3bdf4b76e5b89a3cbbd47d79,2024-11-21T07:41:26.577000 -CVE-2023-20736,0,0,a8d91a70c45e80259f53e59f7321ec2caa7e591f92d4b77d66a476a81c73f41d,2024-11-21T07:41:26.697000 -CVE-2023-20737,0,0,d77bfd5558890f39caa39fcef4b5004e55802858176519f9cefbc136ae7f8920,2024-11-21T07:41:26.817000 -CVE-2023-20738,0,0,d131c94db2ebd14af24cd66803fa046c86cb6b68fffb41e3a5a308b37447476f,2024-11-21T07:41:26.943000 -CVE-2023-20739,0,0,ac0a081ac6ab84323a1432d5221f312dcbe84ac050a009270ee83d574537cc0f,2024-11-21T07:41:27.070000 +CVE-2023-20736,0,1,26b81593811b831870ef407b06774afbafd1125e84c5fc0fd9ce51c1f7c1d41d,2025-01-07T22:15:27.733000 +CVE-2023-20737,0,1,1ab002369cec3db0ce7099072764da36218b02beee38e464302d20f9c6feb57a,2025-01-07T22:15:28.423000 +CVE-2023-20738,0,1,cde8215494ffae4a3905fb8d6625d49af5a9ed7229e8854b086538f13216fbdb,2025-01-07T22:15:28.617000 +CVE-2023-20739,0,1,d5212701b9f265bf75cf40b79f618caddf5c79ca0ab735a4ae0091769e5791b4,2025-01-07T22:15:28.793000 CVE-2023-2074,0,0,671f70886f04f2cdf0e97c0b41f6d54f9fb7fab0417fac46532bc8d6cb674974,2024-11-21T07:57:53.163000 -CVE-2023-20740,0,0,f87085edcc0352b163b36e88aebee8d12d5ec6eced711e6f54d9f3b4d953987e,2024-11-21T07:41:27.190000 -CVE-2023-20741,0,0,f19c5b46bcb0db7883f168feb825792c4aeb29539ad6f23311cb14609af3661b,2024-11-21T07:41:27.300000 -CVE-2023-20742,0,0,0ed7dd2c5d85b2c8c93b5e5036706eb710632b87a4ec98ca6568a3f276a7243e,2024-11-21T07:41:27.417000 -CVE-2023-20743,0,0,45748f80ddb55c431e02d8fff6188e875503d1f8c6c944d52deb6cc0f4f3eeee,2024-11-21T07:41:27.537000 -CVE-2023-20744,0,0,ec97d9b03864c08ac4f0eed46caab0dbf38ac8caba26e742d5719accdd8bd15f,2024-11-21T07:41:27.647000 -CVE-2023-20745,0,1,08255572a79b7cf72582bba6cf99401cf35f2a798f317f929fa11478b27bfe9a,2025-01-07T20:15:28.547000 -CVE-2023-20746,0,1,dfd9a10171d19553dae54bb490f16357210544afece4396aac07238c29d19ec3,2025-01-07T20:15:28.743000 -CVE-2023-20747,0,1,fbcfd8bfad395d7d4bbafdaea1f66fc7f8975bd0c84110f91076984865cc29c8,2025-01-07T20:15:28.907000 +CVE-2023-20740,0,1,6e687cc5d6b5b97dc53f774d09047b5e0b517c343146c53be1f66b32d02d37a9,2025-01-07T21:15:10.563000 +CVE-2023-20741,0,1,3c8ab3e56e73ba60fa872cefac2194b92ee3b6bbafa9086a759155b0715383d6,2025-01-07T21:15:10.730000 +CVE-2023-20742,0,1,38643571aed93ac770f4cbd57c4ff49d40582ab89bbb2b523235d7f9c234ed71,2025-01-07T21:15:10.920000 +CVE-2023-20743,0,1,78fd1316c4b41a412f28e2bfba3f6670a78806f4878db1e49b07791ac560d53b,2025-01-07T21:15:11.097000 +CVE-2023-20744,0,1,78ae89b7a88bee1b325a1dd2ebbe4b6d02b7e4cf46fff4b388538a1d9b83cb40,2025-01-07T21:15:11.247000 +CVE-2023-20745,0,0,08255572a79b7cf72582bba6cf99401cf35f2a798f317f929fa11478b27bfe9a,2025-01-07T20:15:28.547000 +CVE-2023-20746,0,0,dfd9a10171d19553dae54bb490f16357210544afece4396aac07238c29d19ec3,2025-01-07T20:15:28.743000 +CVE-2023-20747,0,0,fbcfd8bfad395d7d4bbafdaea1f66fc7f8975bd0c84110f91076984865cc29c8,2025-01-07T20:15:28.907000 CVE-2023-20748,0,0,c759e8d161babea3fb80f95c9aa6e38834769d7485817179ea9bbadad5af2e2e,2024-11-21T07:41:28.127000 -CVE-2023-20749,0,1,e3bece7625da8039efb5b0bb52c2c27f3752e33fe6836a819ed46536685c6458,2025-01-07T19:15:29.377000 +CVE-2023-20749,0,0,e3bece7625da8039efb5b0bb52c2c27f3752e33fe6836a819ed46536685c6458,2025-01-07T19:15:29.377000 CVE-2023-2075,0,0,0a4f35a8246b26434f7b08902da3187457523a56cf31cb608840fb7c8fa8de4f,2024-11-21T07:57:53.297000 -CVE-2023-20750,0,1,1532ead8d5fbe302be3d4e3d29472c21a43184045709cf6dfa1d7e5cb56c0a50,2025-01-07T19:15:29.593000 -CVE-2023-20751,0,1,9285a2f146e41684cbe61d90953372b927ce15c75e97b680cec159b65b964afb,2025-01-07T19:15:29.790000 -CVE-2023-20752,0,1,b9c415f3559b4618b6a1803988736d4cc42315d317863bc78fa0b6969d658f31,2025-01-07T19:15:29.980000 +CVE-2023-20750,0,0,1532ead8d5fbe302be3d4e3d29472c21a43184045709cf6dfa1d7e5cb56c0a50,2025-01-07T19:15:29.593000 +CVE-2023-20751,0,0,9285a2f146e41684cbe61d90953372b927ce15c75e97b680cec159b65b964afb,2025-01-07T19:15:29.790000 +CVE-2023-20752,0,0,b9c415f3559b4618b6a1803988736d4cc42315d317863bc78fa0b6969d658f31,2025-01-07T19:15:29.980000 CVE-2023-20753,0,0,894ea3c916ef487eca328031be030c7a54c104ab4a4cc803e8eaa13c9de479a4,2024-11-21T07:41:28.740000 CVE-2023-20754,0,0,6a6b978389dd6b302bf846afccf04f4a380633dbad5c5b490388df8c07573427,2024-11-21T07:41:28.860000 CVE-2023-20755,0,0,1751679f9f3d310d94908ec8228deb3ca926be5e977d2eb823d8305d1ab1897a,2024-11-21T07:41:28.977000 @@ -216141,7 +216141,7 @@ CVE-2023-21316,0,0,cd91b7668c83f66933675d82be196c64da0988041fc847c145bc65955e386 CVE-2023-21317,0,0,e207113c4d3dcdeba7b2df0dfe284d238a624805c22d571e1d9d08282e29a593,2024-11-21T07:42:37.757000 CVE-2023-21318,0,0,b73472bf765bac1e50448017c7d45838fc52a97de86dc9a46338c27a2db3dbf2,2024-11-21T07:42:37.873000 CVE-2023-21319,0,0,702d466854df6af069ce2cdeb58bd349df8842472574a7a82875e645a4f778d6,2024-11-21T07:42:37.990000 -CVE-2023-2132,0,0,b2d77092c84a96089d1590983b505f399d1cbb90e7fafd6064d4fc7a6f772bf4,2024-11-21T07:57:59.417000 +CVE-2023-2132,0,1,374c6fecdcbe513fc231ef1c3b60eeb7a8a5bd409df576ec3fa1a39c93f4a25a,2025-01-07T22:15:29.490000 CVE-2023-21320,0,0,06cd88a9d9c4e04b9bcd518736512fd5fef0d950a3e81fab88ec9c98818583ce,2024-11-21T07:42:38.107000 CVE-2023-21321,0,0,1a182994b902ba0eef896470a303e10a8ec18719dbb0d12b7cfbd2789fab2edb,2024-11-21T07:42:38.227000 CVE-2023-21323,0,0,09246e4b387bc178d921e8e7702ee312acc9b8962c19355c7e6b5778eb489b2f,2024-11-21T07:42:38.343000 @@ -216388,7 +216388,7 @@ CVE-2023-21566,0,0,a6208efd3bb20875065bb908d7c048ac83773ae3f620ff7a2072cab13d45a CVE-2023-21567,0,0,7c0178689b609fa19a702c1ab4b58e4795bf76ca3a16a2366aeb7558ff130a35,2024-11-21T07:43:06.047000 CVE-2023-21568,0,0,4f69f941be8ddb65f9859d2fdfa33a84a899aae234b548f142ca072d6d5f94fd,2024-11-21T07:43:06.167000 CVE-2023-21569,0,0,c6088c24db273d99b3d49ee91bab9430920364f586581be35edbcdbcaff027b8,2024-11-21T07:43:06.307000 -CVE-2023-2157,0,0,365dfa3000979933deecffabe613524b45a54e9fbb7f5d82f51c7ccb47749983,2024-11-21T07:58:02.920000 +CVE-2023-2157,0,1,83b41c36ae466de262ff181b4a36d36aac22dd0e160799cc0120741cff68f365,2025-01-07T22:15:29.647000 CVE-2023-21570,0,0,12d9133b308351c5314894481afa1a9c3d69fb7d36d6f6fe2e1201a1fed2b6db,2024-11-21T07:43:06.430000 CVE-2023-21571,0,0,08ca5c4925fa3101f176929345187173e682e2dbe9bae34d43306545519ed0a2,2024-11-21T07:43:06.547000 CVE-2023-21572,0,0,8a990d13e7e7225a4ea34e6669638dea7280e14c6d6971c32d936fd6550f5052,2024-11-21T07:43:06.670000 @@ -217291,7 +217291,7 @@ CVE-2023-22524,0,0,a5c3da63197b907c163cc782dc121b4b6fc115cfe17510997020b1ddd0b47 CVE-2023-22525,0,0,62b72c6b8ad0e3f82c71a5f6ce0387cedbfc989ba173145f5f0e8d3ea260a9d2,2024-01-16T18:15:09.257000 CVE-2023-22526,0,0,50165c3f267915824733b91cc094050089a1d59d92e890932064a82a6a136f85,2024-11-21T07:44:58.907000 CVE-2023-22527,0,0,420b23f3540735c53d3d55a1b3373224f473a8100432b25c3e5ffb85eaecf19e,2024-11-21T07:44:59.040000 -CVE-2023-2253,0,0,1fb6e410994f49f2560a16b54a87ff4b6f39498d282efcc4e94c3be88c986730,2024-11-21T07:58:14.710000 +CVE-2023-2253,0,1,b9097f9e403cdb5d037ea41035272641d53f751988678f7a85476a4acfd8b99a,2025-01-07T22:15:29.833000 CVE-2023-2254,0,0,3e407c04b45b0e6f36fd7cad3373e80962de22c83968e41c624a3bcbea8c98c8,2024-11-21T07:58:14.830000 CVE-2023-2255,0,0,a587bcc9a68e2dd3cad145801af7fe005841d8266d2538b9c9fc1553589c72d2,2024-11-21T07:58:14.943000 CVE-2023-22551,0,0,f241a9745d817419730e82432832dea3f1b9f3fa3d0848f43b0de18834d6f659,2024-11-21T07:44:59.190000 @@ -217936,7 +217936,7 @@ CVE-2023-2347,0,0,1b510b70d5055256be9b7fcc7958f0e58a0f64f1d305c1e7bd8117d463d820 CVE-2023-23470,0,0,805f33b64cf2149db6b5e5d1695195d5fb15d1d1e7fd0dc5ce1bcf2fd6089263,2024-11-21T07:46:15.897000 CVE-2023-23472,0,0,5103efe9fcba254d02277196dd09763d4fa56d8c7608208ce71a8e52bf44288f,2024-12-11T13:15:05.150000 CVE-2023-23473,0,0,6e568225fe37b401d88506d3abb6e7be1d1fd3f5dd589c1df7bd297f7599cab4,2024-11-21T07:46:16.040000 -CVE-2023-23474,0,1,1cf29c71593c18b3a889ecdc7a5efc7ca211ccecb748f72e349e9935d02e8d55,2025-01-07T19:14:04.893000 +CVE-2023-23474,0,0,1cf29c71593c18b3a889ecdc7a5efc7ca211ccecb748f72e349e9935d02e8d55,2025-01-07T19:14:04.893000 CVE-2023-23475,0,0,3a68aebf09e3ed863e58894bdc66525870538242756e587e97f59ebf17bf6357,2024-11-21T07:46:16.307000 CVE-2023-23476,0,0,2e6b555a0924678877345e4633df778e13fd08cc4f1629059332e48df051fc7d,2024-11-21T07:46:16.433000 CVE-2023-23477,0,0,0a25458f0a0ea9769f8b631215587c9800ad24f883b79174cba3be644607137f,2024-11-21T07:46:16.563000 @@ -218045,7 +218045,7 @@ CVE-2023-2358,0,0,741ea2baf1c1b42cad77b16eb938e0e69bff6fd0ba50c2237729dcc1a88e29 CVE-2023-23580,0,0,9115984e8fce0dd4844d20c5a2e10543d36040e5e8b799529ac40ba1aff6054b,2024-11-21T07:46:28.143000 CVE-2023-23581,0,0,cfcd9a8c375e45c40cfa34b03405174e349b0fb79cdccc2f4e65de0822f412b5,2024-11-21T07:46:28.257000 CVE-2023-23582,0,0,331875310909ede948ea30ed2a7bdb077b6b4a05c2cc04eadf515645a5415cfb,2024-11-21T07:46:28.373000 -CVE-2023-23583,0,0,458b147da6fbe40723efbc0aef4f697cf9cc2b075cf180de5ee0869dde1fccf8,2024-11-21T07:46:28.483000 +CVE-2023-23583,0,1,2c2965a649ef77bcc110cb0bb2ec33eccb76195343f5386f0959b4c67b67d069,2025-01-07T22:15:28.987000 CVE-2023-23584,0,0,295095fd6188c2800c5d0d41ddb306a4db4f368791063a0317c5b83a62ddeebc,2024-11-21T07:46:28.840000 CVE-2023-23585,0,0,af0397a9ba4e50c4e542e8d2865d18b5a3841536d4a15be19e416acaf2a59dc1,2024-11-21T07:46:28.967000 CVE-2023-23586,0,0,b8e49de223fd6b7264ea19160cf43a6508c72af6e4c92998e3e5d7705f1485ad,2024-11-21T07:46:29.090000 @@ -221001,7 +221001,7 @@ CVE-2023-27270,0,0,b353b6a72e4e58410301ccefd29c08ef46fb0abf28ef408799b5c9355a080 CVE-2023-27271,0,0,ca26e9f6d27c3aafb7eb9fc8b5ca0b11f608a799e69fc7a6b578b3fbd658c1fb,2024-11-21T07:52:34.510000 CVE-2023-27279,0,0,ab9df5075109ac6cc605ce982239417da3476eea3efb0dd3f2019e217ea04529,2024-11-21T07:52:34.650000 CVE-2023-2728,0,0,2827d8cb170006dd0625bb16230a69968c39d41d6579387b7d6e19a4eb8204e0,2024-11-21T07:59:10.813000 -CVE-2023-27283,0,0,ec79bd579465ca5f6a70a7e8376ce6e8b0d5635b7c5cf745bf2d97b60b641574,2024-11-21T07:52:34.810000 +CVE-2023-27283,0,1,4eb7cf6aaab63ab057573f5328debaefda12e59e8a469fc0511c6b657323a182,2025-01-07T21:08:32.720000 CVE-2023-27284,0,0,4408bce2306239ecd34326d79638c1e49212e8029d89759902d8949e75a5a4a2,2024-11-21T07:52:34.947000 CVE-2023-27285,0,0,1007a628ba537eeb9cf3829c1e971c955976a8c54c997aa8b8fb2b201a43b344,2024-11-21T07:52:35.097000 CVE-2023-27286,0,0,0ddae44b2ed029aef181f2c509a039c45c2fa7e460c42bcc46086a02769bb052,2024-11-21T07:52:35.267000 @@ -222533,7 +222533,7 @@ CVE-2023-2894,0,0,e49133c4234db93ec00e796083811bf0248ad4cb3ca587f14a72a4f18b2bab CVE-2023-28949,0,0,8a96a3fc2871e1836493f7683561cc19bbf134583f37ba5e12a3f08a1ddc01c7,2024-11-21T07:56:16.260000 CVE-2023-2895,0,0,de004e88a9e28f5c9cc6b6d7d74753178806dd04a1ef8b0a5c5377076cdfd351,2024-11-21T07:59:30.933000 CVE-2023-28950,0,0,46b472a2e12177ffc42d223be71ab3a62993ee8d3831c5f6b71cfccf5beb8fb3,2024-11-21T07:56:16.380000 -CVE-2023-28952,0,1,3d2e5af7e51d4745242ad92dbc5c841c742e69996bd97b1783ee3a602d1a5835,2025-01-07T19:19:12.627000 +CVE-2023-28952,0,0,3d2e5af7e51d4745242ad92dbc5c841c742e69996bd97b1783ee3a602d1a5835,2025-01-07T19:19:12.627000 CVE-2023-28953,0,0,3a8ea5a6a41fd162ee6ce470b91438a8d164651461354e891ac8c0b58bcd1815,2024-11-21T07:56:16.607000 CVE-2023-28955,0,0,5be48cfccd53cd07a0e32906ca66b7f0cbbab6d19ef9922ac1bf37c1c5e0fad2,2024-11-21T07:56:16.723000 CVE-2023-28956,0,0,306477773c0fba0f27f9dfee906e62a6e5017fc5a8fb8e43a0654d63ad90ca29,2024-11-21T07:56:16.847000 @@ -223124,7 +223124,7 @@ CVE-2023-29596,0,0,593f87685c917ce62fce222111469a58f6a103d1069600cf1954f9dba9f02 CVE-2023-29597,0,0,e1763ab618763e98f35a4c4923d04a00d0c2ecd63630e837c45d9638b844255e,2024-11-21T07:57:19.903000 CVE-2023-29598,0,0,d88f04a1227bb862f6e3f18ec095997f6ac3923beb6f36d8a5506131af1fb4fa,2024-11-21T07:57:20.040000 CVE-2023-2960,0,0,48a0168913d42895e0af9bc8b28adee7c798da461e73cc299d9a3c017dfa4e49,2024-11-21T07:59:39.103000 -CVE-2023-2961,0,0,a641b566f19e633bdb02ae2d24b07b88c83667735758c116b6fbb3ba0db2eb74,2024-11-21T07:59:39.230000 +CVE-2023-2961,0,1,66ef00a608b2a021300da86f928385555ef3fb4046ba707e6bc268c0661b0861,2025-01-07T22:15:30.027000 CVE-2023-2962,0,0,26e2b9d69888708eab2fd7307bd64e2d761487e1de306e822b7bf8c9ece38661,2024-11-21T07:59:39.350000 CVE-2023-29621,0,0,6ecbf697196fee59674986aec6e441529498d1801d22962c60289eb5adaaa89f,2024-11-21T07:57:20.173000 CVE-2023-29622,0,0,2f8e41bd79c69218bb0d7184345faacc6191b5f8d756774a0ac5d57d4bb21159,2024-11-21T07:57:20.310000 @@ -227203,7 +227203,7 @@ CVE-2023-35075,0,0,2953da8da78e493f198bf6289dbc7e5d7641503e5404893e569d48f285395 CVE-2023-35077,0,0,eb14aac67890fa8d1fe987a9cb034d5f686d957f0f0145aaa057938b78feea0d,2024-11-21T08:07:55.893000 CVE-2023-35078,0,0,da67801e474f67cd5bc794e4ce91b3cd46907839a2bf92a4bfbbbfc835a8d4a6,2024-12-20T17:50:19.417000 CVE-2023-3508,0,0,395b7f87ebc096b9954e0550c1d2fe07fbb8e45e4a9326e080b172d48d631a2f,2024-11-21T08:17:25.110000 -CVE-2023-35080,0,1,c795f1b717ccd5c6029fe9293a4858a391ee366079e269d35fa396a4e87f2669,2025-01-07T19:15:30.777000 +CVE-2023-35080,0,0,c795f1b717ccd5c6029fe9293a4858a391ee366079e269d35fa396a4e87f2669,2025-01-07T19:15:30.777000 CVE-2023-35081,0,0,3ff9e53f470e6e32796fa00a0491beb0c2fac3be4074335f2a07617a10f0712e,2024-12-20T19:13:39.710000 CVE-2023-35082,0,0,d7b1b6ea9b9084f37a439f164bf96e51fac8bcb613dd61012a9fb18c4474a287,2024-12-26T20:48:22.997000 CVE-2023-35083,0,0,1cd4bcca5b9cfa70eed0cf37488fa381a5e331ebd127c18204dc83e903d1af15,2024-11-21T08:07:56.550000 @@ -228853,13 +228853,13 @@ CVE-2023-37391,0,0,4f8185c778b183f03fde80b2e0a6f8204c1953ca856ca39425308aada0205 CVE-2023-37392,0,0,5d384d02d8631121044e3a4a15b16f1d9a0f4a021dabe4d8bb61a797ed5b1a00,2024-11-21T08:11:38.163000 CVE-2023-37393,0,0,5f8f09fae8cdcb705f9690d0759ddda2b79a794e330faf4cfaec7caf2ec598cb,2024-11-21T08:11:38.303000 CVE-2023-37394,0,0,0338eb93ab89f059f3206d02bfc24033e086b6f86189917b378799b18d81fa05,2024-11-21T08:11:38.443000 -CVE-2023-37395,0,0,305aec30b6240f96a61b44d9081d278ebc7566775553900a586862fd5da6f75e,2024-12-11T03:15:04.877000 +CVE-2023-37395,0,1,ae2ea880c24ffda91fdf95fae1832230039bf46a7989dddf214f9ee098180f21,2025-01-07T21:10:50.467000 CVE-2023-37396,0,0,d153f1aeffbef9dae43a5086d1ceff3df8243a40d5d453bcd9d77e66af9665bb,2024-12-19T15:40:24.690000 CVE-2023-37397,0,0,495ea247e2c316b481151d70502bd709d1dab32c4174e2af8b8520a039b7ff2e,2024-11-21T08:11:38.713000 CVE-2023-3740,0,0,95c282366f230bbe869486165117092592fba41b4089df0587e4879cfea633c7,2024-11-21T08:17:57.383000 CVE-2023-37400,0,0,be3704cb1104081f1dd220708905d6e5e97ae560bed0115a1e128e7cfcce3788,2024-12-19T15:41:42.607000 CVE-2023-37404,0,0,14062fbfb247d7eff73830bc3da8f5fe1a2fec40a3cca7bee10d3f475380647e,2024-11-21T08:11:39.010000 -CVE-2023-37407,0,0,0b209ffb8e9ca938a74b56360a4d0a64c3ab986a79c97bef4469477165b630a2,2024-11-21T08:11:39.140000 +CVE-2023-37407,0,1,4d11a36e41fa3acc5f564431e82d0f4e97124ab39df0cb5f293ada9821e2cabb,2025-01-07T21:06:46.840000 CVE-2023-3741,0,0,1ddd4fff44ed6da7a38f77e1cd87d0e1a51a839bcb171f62bcdf113f89dbd961,2024-11-21T08:17:57.493000 CVE-2023-37410,0,0,4259c5a1111c28363272e35fbab32b984c617cae11efedba0dfffe4bceca6df3,2024-11-21T08:11:39.267000 CVE-2023-37411,0,0,3d58ac698f1ccfd9fb6c0533fcab0f7eaef0b769727ea84c4cc4998507c4495a,2024-11-21T08:11:39.410000 @@ -229665,9 +229665,9 @@ CVE-2023-38356,0,0,f12d63f114b9597a741e147d04baeda414226256adf5e65851fdad50e811d CVE-2023-38357,0,0,3f5d7a5fbfcf76d163273a9a6775b5595ecc31ad32c5692b81055f402a613177,2024-11-21T08:13:24.547000 CVE-2023-38359,0,0,2cc3d7177758a63f58358cc629f055a288bd166f6f79c9c65da1bba1293d3416,2024-12-17T18:55:23.353000 CVE-2023-3836,0,0,b938497c6283f522cfc6f320c334e7b21510c79dccb6b10b70b8bb7e99acad20,2024-11-21T08:18:10.880000 -CVE-2023-38360,0,0,5cb7887101ea5948ba05da06d158ba74b31a85b37a89c27db140b2f43122a4d8,2024-11-21T08:13:24.827000 +CVE-2023-38360,0,1,1c7da5c7700ad7488c7900db95772c5a2624c05e141bdc9ba48d2000106a4c81,2025-01-07T21:23:43.017000 CVE-2023-38361,0,0,5646b0dc24d6ba6ae916f311ff7d533fa4bb30c1b1c8f75f4f9f318ff84a8186,2024-11-21T08:13:24.947000 -CVE-2023-38362,0,0,b89ce4560dce1640eb355306cdb6b16cd5dd362502c6c26197191d0f29c80026,2024-11-21T08:13:25.080000 +CVE-2023-38362,0,1,63db9a756cbcd9154b49462038447e02050e91ecd2f3b6d2a3334ae6361cd14a,2025-01-07T21:24:06.857000 CVE-2023-38363,0,0,a591869353ec495b6ced3419001a4bc71a1d976d71be89cc15611c55d2ef9dd8,2024-11-21T08:13:25.203000 CVE-2023-38364,0,0,8e811d572c6ae14997b41396824245065fc1674c69eae1daee3876448a447237,2024-11-21T08:13:25.330000 CVE-2023-38366,0,0,16bd6b400ddaa02bf5571d8eccd7a20051795581659f90f920a074946e4cde85,2024-11-21T08:13:25.467000 @@ -229852,7 +229852,7 @@ CVE-2023-38537,0,0,e06740b8037277dc127193a81a40981762064d56c04b903dd9547e9105b64 CVE-2023-38538,0,0,8e58f8e949a1585b01725192a50b8257f2a8b0d94296dcbdb08e88289892cc4c,2024-11-21T08:13:47.463000 CVE-2023-3854,0,0,7b400fbfa45bcf9f9eb1433dc60d5d266ef5f190546d63957537ef59d6609ad1,2024-11-21T08:18:13.467000 CVE-2023-38541,0,0,b81a698819b354a0e07def0edeb32d53a43cd3db452c2e7302617161a443f024,2024-11-21T08:13:47.613000 -CVE-2023-38543,0,1,9e3af4531e43f5677526b7f10f6c415eed9d42534cf2e2ec7e7acb1480c040ac,2025-01-07T19:15:30.943000 +CVE-2023-38543,0,0,9e3af4531e43f5677526b7f10f6c415eed9d42534cf2e2ec7e7acb1480c040ac,2025-01-07T19:15:30.943000 CVE-2023-38544,0,0,8dbb1a660034a252199bf3aba268cd48e857709594f614422deafbb9308a766a,2024-11-21T08:13:47.867000 CVE-2023-38545,0,0,e07825bf96f297953b47ccb383822b1252760769cb01a7a6e2fee9ceace4d8e1,2024-11-21T08:13:47.993000 CVE-2023-38546,0,0,00c2dff4f6b2ae33ce75cd3cce35fd9b9d277894f55f990507e4d4d09e93f29d,2024-11-21T08:13:48.237000 @@ -231601,8 +231601,8 @@ CVE-2023-4069,0,0,e431deddcbd630c623287b5871baaa61aa2bf1909bdce248c6d3d4d2bd6def CVE-2023-40691,0,0,087ac100d38a251659a8131cdad7785d92f33627762816b8d3172bffde69cf54,2024-11-21T08:19:58.663000 CVE-2023-40692,0,0,5e7c518b1554d99a2ca07d24eb723bafa15164b0260043d2eb05fa50377b0109,2024-11-21T08:19:58.837000 CVE-2023-40694,0,0,6645cd2c1b2fdda25bb07cabf5866a02754a531518083f7d9184fa97b42b0648,2024-11-21T08:19:58.987000 -CVE-2023-40695,0,1,c6c3f0a0fb5a3c3a40b6c32c17c6098f6dd11c821a44d5885c7eb36c167cdffb,2025-01-07T20:26:29.693000 -CVE-2023-40696,0,1,73098f81c252a21b6ffa6944010799e813c48be6ae2dac4ac51f404be7072d83,2025-01-07T19:14:51.167000 +CVE-2023-40695,0,0,c6c3f0a0fb5a3c3a40b6c32c17c6098f6dd11c821a44d5885c7eb36c167cdffb,2025-01-07T20:26:29.693000 +CVE-2023-40696,0,0,73098f81c252a21b6ffa6944010799e813c48be6ae2dac4ac51f404be7072d83,2025-01-07T19:14:51.167000 CVE-2023-40699,0,0,8cce2cad9a89e1de8e141d9f23a8df9af780cd94941d7d990fbd3ce17aee5c4f,2024-11-21T08:19:59.373000 CVE-2023-4070,0,0,066e18fa8bda5a96bac47b0b24377cff1d84b43a98e9f18feedc5e13462c73f4,2024-11-21T08:34:20.670000 CVE-2023-40702,0,0,e74c0f643081715383a8e16bab9b19678bae3ee08bebb83702f0ce5f8f7aba5c,2024-11-21T08:19:59.500000 @@ -232327,7 +232327,7 @@ CVE-2023-41712,0,0,62ecb3c4b0f816752b56cd0569fe78cb63cd532ea9ce377317f13a1e663ab CVE-2023-41713,0,0,22a2c2c902d0403ee6c301f7437fcaafd37a993e80f5f8e9abead2e079627784,2024-11-21T08:21:31.807000 CVE-2023-41715,0,0,9231094ac3a696177f152a50d9a09bedd851ee9a683d7b6b310cdf943029a1cb,2024-11-21T08:21:31.977000 CVE-2023-41717,0,0,3499c69e264d16957e1d92a48950a34af6c9e3a4e83d15078b2f17bb199bece7,2024-11-21T08:21:32.140000 -CVE-2023-41718,0,1,e53d64dcc35525c0691916c6a237389138b17d34aa223f5752ada1e8412ed291,2025-01-07T19:15:31.163000 +CVE-2023-41718,0,0,e53d64dcc35525c0691916c6a237389138b17d34aa223f5752ada1e8412ed291,2025-01-07T19:15:31.163000 CVE-2023-41719,0,0,63f3cefb982a25006ea915460f5f66605d362be42d938b42d843941bd51d3258,2024-11-21T08:21:32.450000 CVE-2023-4172,0,0,35171359667f7109d11b9239198c87ea621de2a8ad49820de58561f588f82485,2024-11-21T08:34:32.510000 CVE-2023-41720,0,0,57be3467dc157bdad2843a48fe81e854ec2fcf7d8b8b2b0b5f50e3741eb7d129,2024-11-21T08:21:32.593000 @@ -240145,7 +240145,7 @@ CVE-2023-52638,0,0,c6d956093aab90e17727bec1d09e03b2c3f6f5f0fbd5eeebd240123e9fae6 CVE-2023-52639,0,0,b9266e7df56c393cbd7d2f91daa1a5f5d3b49bd1a9fdf904c1c821471c67f58b,2024-11-21T08:40:15.663000 CVE-2023-5264,0,0,3e616cabf1a089b6e6cdd95ca27e570fd2ac3366b640b4e1c4e5769bd4fd0c47,2024-11-21T08:41:24.370000 CVE-2023-52640,0,0,708b1b04581c76bbcca2f83a78734877c6b33f6cded25f181b3a228af75a749a,2024-11-21T08:40:15.817000 -CVE-2023-52641,0,1,592af7f4c429865af31c53495a7c752ac71766466d99208a5aded5501f7c7deb,2025-01-07T20:18:38.497000 +CVE-2023-52641,0,0,592af7f4c429865af31c53495a7c752ac71766466d99208a5aded5501f7c7deb,2025-01-07T20:18:38.497000 CVE-2023-52642,0,0,05d60fedf578d1ba56385f5513e46bbdf0600669e68de5121a528e674c343d1c,2024-11-21T08:40:16.077000 CVE-2023-52643,0,0,a052e4860e296c0ee05d86ba39ef967c09f91349f04358ad0c2d31e70cf765ee,2024-11-21T08:40:16.210000 CVE-2023-52644,0,0,c34c6ce67f7bd1744e5ffb2bc7e1ab174b24b6c795ada11f0160dd6a25188de3,2024-11-21T08:40:16.333000 @@ -240207,7 +240207,7 @@ CVE-2023-52694,0,0,cfbf017e740a0cf0d210f574e1ea8ca61cee0625c7b19d4dca4bcb082f19b CVE-2023-52695,0,0,984f4b76a47d115f881e67e7241000ffb845ebded2afbe77d441750f5714636f,2024-11-21T08:40:22.767000 CVE-2023-52696,0,0,8d3c619e6b67aec84c360870ab51a63b72bf0f1f73bd1e08fb04785342ca53c8,2024-11-21T08:40:22.877000 CVE-2023-52697,0,0,671a7cb490453caa76b4ef84f02213be4f065b94138442feda1943d5df1ac542,2024-11-21T08:40:23.073000 -CVE-2023-52698,0,1,dc918e5419de6d571c6117f3cfa5beafb8c09e338285110139e171aa94e0afd7,2025-01-07T20:18:13.340000 +CVE-2023-52698,0,0,dc918e5419de6d571c6117f3cfa5beafb8c09e338285110139e171aa94e0afd7,2025-01-07T20:18:13.340000 CVE-2023-52699,0,0,7ae259a98c648d116baaac9a0a2fb48438466ea1ef5c4ff6f25c6dad558d8939,2024-11-21T08:40:23.313000 CVE-2023-5270,0,0,028b3369e4393aaac4eae433175a5edbad7b5425254bbb3b4903c56b3f73ee7f,2024-12-23T15:18:44.853000 CVE-2023-52700,0,0,941df9df38105cf470545869077a5e89f909e73a5596a4472b2ed873ccfca7ff,2024-11-21T08:40:23.517000 @@ -243634,6 +243634,7 @@ CVE-2024-10537,0,0,245f407c71543e9ed1f1e8091a091327bb8b8bb7a6ad44fab60dad856af50 CVE-2024-10538,0,0,61014a490bb67ac6333227cbe080cbc3323afad1485db0781083c911c48fb77e,2024-11-14T13:27:00.400000 CVE-2024-1054,0,0,94b651608db3d30d3daebf6e295a99b6cb748f5b340c93c3e226c28c09fa8fa8,2024-11-21T08:49:41.570000 CVE-2024-10540,0,0,45dc62d2a6882ed78eb940dad2c8292ca30098100a55bb2bb2d5e31ef03fa351,2024-11-04T13:18:27.017000 +CVE-2024-10541,1,1,17e645860588c5290ea1de09ebbe30e3ee704356357c444bb1176f1b7d6de69a,2025-01-07T21:15:11.490000 CVE-2024-10542,0,0,b3e07484251514e52f0e88e2f4715863b15a20a77b62be04e1c46b181791456c,2024-11-26T06:15:07.683000 CVE-2024-10543,0,0,90ed84dfbad8ca67e321375858c5c3c79d5c97a1d4224d37fe3ff44d9ef23ac7,2024-11-08T21:19:02.700000 CVE-2024-10544,0,0,1bdfbd43adcd8874b1d0e0fced36513ba83ecb83c2ae7fcf0e84ae50dc2443f2,2024-11-01T12:57:03.417000 @@ -247346,7 +247347,7 @@ CVE-2024-21254,0,0,ca5a61847414e5686e028062adf6af23040b45bb319b3657a3584462ead36 CVE-2024-21255,0,0,add4c955b981a3076cea346ec3a18ea4e9f5e51e47b4b234e1b1f3ce176112a5,2024-10-18T18:16:50.040000 CVE-2024-21257,0,0,7feb6ca18f4c7ab0b40ef8d13e4835d8441b817ed51b4f20b125f44783b82b3f,2024-11-06T22:55:18.400000 CVE-2024-21258,0,0,19bbc464aa5d2fbb9ef1bdb1e9f31517c1bd3577455200e481e8fe34ec625df9,2024-11-06T22:56:19.527000 -CVE-2024-21259,0,0,bd8d73af255fa71fbf763d2afc8cb43bb42e4abb98a932960e1049e52a909cf5,2024-10-18T15:00:17.133000 +CVE-2024-21259,0,1,26a004b56ef6804b22fb308baea616e6bab2cb436eaf74d4037265c8604784d5,2025-01-07T21:16:14.797000 CVE-2024-2126,0,0,e9479a9fb042176157f8223dce67ad410aa32310af0a1f3ceee175bce508ec4a,2024-11-21T09:09:05.117000 CVE-2024-21260,0,0,d3876c08dbb0a88c0e2ef8ee94d63f41849715f9d921f55c480e0c8b1a0af1ff,2024-10-18T19:05:29.830000 CVE-2024-21261,0,0,2cab31e1a64c8464debb8734cc85ed8dbe5360082fe40024c1550d3766bf219b,2024-10-21T18:27:17.307000 @@ -247532,7 +247533,7 @@ CVE-2024-21439,0,0,b4de77c1b44ae433db50d72eb6467ad113a52ff535c478fb00b6733aa8d8c CVE-2024-2144,0,0,bd55c3e242215167621c383bf5dd406306578bd4f4401f4b644791f5fe39f163,2024-11-21T09:09:07.537000 CVE-2024-21440,0,0,1259e2b506f536c13fe55e40d7ba60f51486a69462fae5526e6743dbca1db03d,2024-12-05T03:25:52.233000 CVE-2024-21441,0,0,0a4dc823b20e791363ed6237d2233d35d039061038cc40d1dd049cedef8731f8,2024-12-05T03:15:20.800000 -CVE-2024-21442,0,0,07043c996397604f9ac949a9f5aa813358583b656cdcc31b44ac426bb9a025e8,2024-11-21T08:54:22.560000 +CVE-2024-21442,0,1,e33f04825343ab789d0034882ebb9e4ece99f0ebb7e7b69c95eec54b9d9a6ddb,2025-01-07T21:18:53.787000 CVE-2024-21443,0,0,c2e6ed54d01619298231829fdf2a396f626a40f55cf63ef5452fea36519eb2dd,2024-12-27T17:51:02.103000 CVE-2024-21444,0,0,a8c6c6274226dbd29fa0d9ac33fdf9a2b6daef7a6f57066d1b02a7561d909a58,2024-12-05T03:18:50.527000 CVE-2024-21445,0,0,82395e1bf965267a108ae6c83941355d531d61dc0cf2e64a73b3ce95db8a8b88,2024-12-27T17:51:59.413000 @@ -247914,14 +247915,14 @@ CVE-2024-21845,0,0,0b5c9f7aae0924a3862ec7a96e0d785053823d9c4d4b1e4e83d815264370b CVE-2024-21846,0,0,0f052eb872b1673703402ec5c955c7e8b4c0fc134d1ccc21f7d4ff8929a257a5,2024-11-21T08:55:06.823000 CVE-2024-21848,0,0,35252b842e230026a48a4227271bf34000651cb11c68e2a5903447968ed3f995,2024-12-13T16:36:59.837000 CVE-2024-21849,0,0,b358000d3cb8925554482dcc184b5dd54860030956160bd8e569954a069a741a,2024-12-12T19:10:52.200000 -CVE-2024-2185,0,1,b4be232b56e364ee9de27665c2e6f874bb7f51bb6ee6a56cdb11326265f749a0,2025-01-07T20:42:49.500000 +CVE-2024-2185,0,0,b4be232b56e364ee9de27665c2e6f874bb7f51bb6ee6a56cdb11326265f749a0,2025-01-07T20:42:49.500000 CVE-2024-21850,0,0,3f4996285ba8f36af13beac4e19f7f6eaac6b7c930044e4f18b3bcd24f607c71,2024-11-15T14:00:09.720000 CVE-2024-21851,0,0,357d45614df90945550287893cfbeb32cbb4c927c6c52e5c9529544fa122fec4,2024-11-21T08:55:07.400000 CVE-2024-21852,0,0,74a89e8ad5e242dcaa69632c98166ec72cd5d0a1eabe8107cc899068b6ea0ada,2024-11-21T08:55:07.547000 CVE-2024-21853,0,0,03873964bacd463823aea35d75df2179a268a9ee8ab035ecc0200603d0f2ddea,2024-11-15T14:00:09.720000 CVE-2024-21855,0,0,cd01486a1dbc0a9a886ff2827620764e44df4ea15f59879419eb00eb59af385d,2024-12-20T17:05:24.753000 CVE-2024-21857,0,0,c575350fcef843725e7ef275d0f3a96677c72165608cfb91eba4d11094a1a3f8,2024-08-14T17:49:14.177000 -CVE-2024-2186,0,1,e7b9bc33689c26748efbb2d9800c342e319e02f8dc6c3d554b2a80d535cba19e,2025-01-07T20:42:22.523000 +CVE-2024-2186,0,0,e7b9bc33689c26748efbb2d9800c342e319e02f8dc6c3d554b2a80d535cba19e,2025-01-07T20:42:22.523000 CVE-2024-21860,0,0,c33a33edbd83b6963f5e370eb0c3bd18861faf04570d72f488d2420923622b3b,2024-11-21T08:55:07.907000 CVE-2024-21861,0,0,6b46cab83c4653618e7f5bd1ab4b2560afcb293785e1fc5ffbe383635565d28f,2024-11-21T08:55:08.070000 CVE-2024-21862,0,0,cae542eee890ef9bb6fceb8a06c060e70a53518f8f628e986a2314a90fc0fc98,2024-11-21T08:55:08.207000 @@ -251275,7 +251276,7 @@ CVE-2024-26621,0,0,f287c9063032a301fe385469e2711a2664244dd0593a1fc0cc0e696517e39 CVE-2024-26622,0,0,44771474d96e6a32e262a8e82c8d605514616358779ded6b7654a20fc0c2a12a,2024-12-11T17:36:15.267000 CVE-2024-26623,0,0,0559021091993fe9db37214ef7cd77c9efff423028df4dd92763f3af84de83b6,2024-11-21T09:02:42.767000 CVE-2024-26624,0,0,dfec722c86cb19deabe85be0fdccacdcf71bc34ee8cead4ebe6ca2d88e75d73c,2024-03-27T14:15:10.163000 -CVE-2024-26625,0,1,4ef7613269bfa498d42e416f035cc6661e69596240803b3ec29e423a2773965c,2025-01-07T20:17:40.503000 +CVE-2024-26625,0,0,4ef7613269bfa498d42e416f035cc6661e69596240803b3ec29e423a2773965c,2025-01-07T20:17:40.503000 CVE-2024-26626,0,0,c637241eede756972b018a0fcc06f149dac17cabb0f560373fa5e5595e3e8ad3,2024-12-12T17:26:08.137000 CVE-2024-26627,0,0,9f12c31c6ce3575af57af9fa35a77bbd2153ed3ef1d5ea2659ac8c0a7eace89d,2024-11-21T09:02:43.143000 CVE-2024-26628,0,0,da7f47400f41cb31ecd3afb43bae4a639d3d68eda0a5da59e7d46fbaf261a8b7,2024-03-20T17:15:07.367000 @@ -251299,7 +251300,7 @@ CVE-2024-26643,0,0,265075385090bf0e4e7c3bf5dd42e26aa590c7fbf73f4fca758ef0cd3664d CVE-2024-26644,0,0,3e955ecc04cafd50770b4e01603b044ae0abf17da766c5be4deb9ef73da57365,2024-11-21T09:02:45.230000 CVE-2024-26645,0,0,bdee23b950a8dff0fe3120bc636185265634a180ed90c1f8f21f6b1361aee6ee,2024-11-21T09:02:45.353000 CVE-2024-26646,0,0,5c3b675eed417f04e79fbe9a962446c0936c3d49eec6b3e012c1e53cad995753,2024-11-21T09:02:45.490000 -CVE-2024-26647,0,1,0087defa8b2daf5e29c0c380220574740551b7537aefbd17ea5876ff9a0ca272,2025-01-07T20:15:48.587000 +CVE-2024-26647,0,0,0087defa8b2daf5e29c0c380220574740551b7537aefbd17ea5876ff9a0ca272,2025-01-07T20:15:48.587000 CVE-2024-26648,0,0,57660c3f5372b373298dbe0cd29fd4332764e7181a5b50e285b698a5ae516b44,2024-11-21T09:02:45.723000 CVE-2024-26649,0,0,e755538fa424fa67581263d7164952806f11ff46847ca4f67e57e88a22ecb657,2024-11-21T09:02:45.903000 CVE-2024-2665,0,0,e8a4fbd065beb502154468fd78b921bced0b1204d6203610753a8aa8e33e647d,2024-11-21T09:10:14.640000 @@ -251344,21 +251345,21 @@ CVE-2024-26684,0,0,7aa60e463942f2c72d93ddfc8a0b68ac9056fa18048f70d6c381cb5fe8681 CVE-2024-26685,0,0,d788863551b13aca79bd9e91f7defc379df7538a66da57b8c8f0d772600cb03c,2024-11-21T09:02:50.510000 CVE-2024-26686,0,0,c1cdfdf069774f9f1a258f3fcde20f093223b3fed9526d89f0a4d95e2acb3a5a,2024-12-09T13:10:00.537000 CVE-2024-26687,0,0,55d2e164366a53f2463770b85dedb6b40cdbd484c5c1068cd2bbd41cd0d1cb60,2024-11-21T09:02:50.820000 -CVE-2024-26688,0,0,2d3bf5721d0821a5b92d7cc11d5dd7313b5c89213c2e9bdc19b591cbd2c7d5ab,2024-11-21T09:02:50.947000 +CVE-2024-26688,0,1,a0933753ecf706512391da968c1bf6e01179d03229619ccebb51447535c3b458,2025-01-07T21:12:29.727000 CVE-2024-26689,0,0,3990e6568ef2171cfa776ff7d235c6bb3e88f3ec5aa2c29b003efb5d71ec2178,2024-11-21T09:02:51.073000 CVE-2024-2669,0,0,c588913dfaa588cf78efc07ab4d9bf054643db6c53a4f3ed9269092984658c62,2024-11-21T09:10:15.140000 CVE-2024-26690,0,0,2c7b24fb82937969d4004e2fcf893dbb69bba8a0a64d7e77bdd23c96decb3399,2024-11-21T09:02:51.193000 CVE-2024-26691,0,0,7878b9be6d1b840ce81b6b9ba5d2bb037a477b0ec0114b4a6fa216b7702e37ca,2024-11-21T09:02:51.377000 CVE-2024-26692,0,0,e7f487356d74c96106975bf2abfe9db6d6da6422f0939133b174aaec264ed9e0,2024-11-21T09:02:51.487000 CVE-2024-26693,0,0,0d216053635f1d975b6125d601423966cfb8e3352e6cb20eea467a9c7f54bfc5,2024-11-21T09:02:51.593000 -CVE-2024-26694,0,1,31366aaef63a6678374a95d259ee5e17e7b5f964d9e410ff050a98b8f6c7cbb0,2025-01-07T20:53:53.143000 +CVE-2024-26694,0,0,31366aaef63a6678374a95d259ee5e17e7b5f964d9e410ff050a98b8f6c7cbb0,2025-01-07T20:53:53.143000 CVE-2024-26695,0,0,1ae7cd1e1e85f699df2959b2788d7af1c813dbc8bb82849f43b281e54bed1937,2025-01-07T17:27:31.323000 CVE-2024-26696,0,0,265278528371538cc023600a4c7d8dbbc5ef61d12e3796a87a5522e53c60b655,2024-11-21T09:02:51.970000 CVE-2024-26697,0,0,45e5cf8cc205b6572bf2614df87fc02ee354aaf14f2ce522f92421e8870dc643,2024-11-21T09:02:52.090000 CVE-2024-26698,0,0,f3c474569b48f60e66044478a18c11a89915914693da10adf07718688bd99993,2024-11-21T09:02:52.217000 CVE-2024-26699,0,0,0b80c7a4d186d8dc0c9dedc04a03a65f2409d878d3e6a8441dd6b732b9a45aeb,2024-11-21T09:02:52.340000 CVE-2024-2670,0,0,ee5a365e52a4a0c176386e10c0e370e69b922461fd0630b822d8ac97c67fccc0,2024-11-21T09:10:15.280000 -CVE-2024-26700,0,1,d340b64f76c76c9e47b3fd93523ba35bc98d09d990c5461e898e1d4216e0399a,2025-01-07T20:26:40.460000 +CVE-2024-26700,0,0,d340b64f76c76c9e47b3fd93523ba35bc98d09d990c5461e898e1d4216e0399a,2025-01-07T20:26:40.460000 CVE-2024-26701,0,0,b03e1ce32248050afb32bc7948ab24791df0affca83332817771b6e5cd8267b8,2024-04-03T17:15:50.720000 CVE-2024-26702,0,0,b5af06f31671bccc450c0989ef4ab99a946595a7c4a168f34f6c9ec495d6a954,2024-11-21T09:02:52.640000 CVE-2024-26703,0,0,8e81605caebe413a04ffd15d9f1628a42c2dec0efcddf166b5d3f822f05e79e7,2024-11-21T09:02:52.843000 @@ -251374,9 +251375,9 @@ CVE-2024-26711,0,0,8dccb84b3c19a8be9b5c23386e56431114b107c936ab5d88e825fada25c33 CVE-2024-26712,0,0,fb8685ddd0683cdabb2327df61ff8cea2e7e86fcfa201af9434b63269c960077,2024-11-21T09:02:53.947000 CVE-2024-26713,0,0,e7e300ec5bbfa68ba83e0a47cb90f58abff0db2ab2dd369821dd312aa798bced,2024-12-19T12:15:06.330000 CVE-2024-26714,0,0,87db1e3510e7967d782bddedfcd8da69fbf9dd7de01e3acc10c009bc5f1ae976,2024-11-21T09:02:54.257000 -CVE-2024-26715,0,1,5ae11c6f26422b5fce76497cbf0825dce861f7ce3314d6efe4d1a3f4e53e909c,2025-01-07T20:25:50.327000 -CVE-2024-26716,0,1,fd0bb09e387c4c792e9af49d76ec08db20adb4a2f2405ca74a5c652c09a1a316,2025-01-07T20:24:08.810000 -CVE-2024-26717,0,0,7b0bca736d524de19c0e00e378dd20b4e516f8a07cee5fa2f3ccb3c887524650,2024-11-21T09:02:54.607000 +CVE-2024-26715,0,0,5ae11c6f26422b5fce76497cbf0825dce861f7ce3314d6efe4d1a3f4e53e909c,2025-01-07T20:25:50.327000 +CVE-2024-26716,0,0,fd0bb09e387c4c792e9af49d76ec08db20adb4a2f2405ca74a5c652c09a1a316,2025-01-07T20:24:08.810000 +CVE-2024-26717,0,1,46c391c98b1b32eddf64a008a07bf662b627805646f0b2a7812f9b60cc4c81f0,2025-01-07T21:16:14.697000 CVE-2024-26718,0,0,b71c0a254c7aad42c306d673849eee87146b27e1c3e5db37335467c2a89b2d97,2024-11-21T09:02:54.723000 CVE-2024-26719,0,0,49272ffb2292f3d85039eb80d999203cc47568c7ee88d8dd11d75770d1415067,2024-11-21T09:02:54.847000 CVE-2024-2672,0,0,37c31eab6f5cd3fb8466d604392093c92b8e3eb9dce60eeef838946e4f379074,2024-11-21T09:10:15.560000 @@ -251388,8 +251389,8 @@ CVE-2024-26724,0,0,43e9a149198997f589b6cd208e12f3a69d3baa8ce56112adffc81394841c1 CVE-2024-26725,0,0,e9fe20a5c5e5470547a40a8d97f1401a07214b8c6c4b76fbce65efa947d2335c,2025-01-07T17:28:15.293000 CVE-2024-26726,0,0,a2e6006099000b7188e7331f1757708510f6f822879749731a4c6d16b7b3a5dc,2024-11-21T09:02:55.767000 CVE-2024-26727,0,0,f9e493a2bebe6568fa8635c090fa7c3e7b404bd3fd35053c77015e7873b7cdd0,2024-11-21T09:02:55.880000 -CVE-2024-26728,0,0,338379872f24f5239a89f2a94a5bc497d4b27c1cc10ab739d5f79b5a2f1814b7,2024-11-21T09:02:55.997000 -CVE-2024-26729,0,0,9f93d80f4cfc862fa6702110f35a22991166890e89d7bb1467e45d00cb7837ae,2024-11-21T09:02:56.113000 +CVE-2024-26728,0,1,7a1b5252bba1cef22267913e083366e2f39c736eb8eef161449f7ded9aaebcba,2025-01-07T21:15:57.473000 +CVE-2024-26729,0,1,24cf9adc4db4b9564630e9709ebc75b534e05f18a43df73e371a82f4fe1149a6,2025-01-07T21:14:13.190000 CVE-2024-2673,0,0,eb02539fc7c795b37ffb3a29a53cdb85bbf62191410ae4d0ae87b7214fdb4b02,2024-11-21T09:10:15.700000 CVE-2024-26730,0,0,4282f275af7b9ab810034661a7d2fe758e353eb17c2f903213e76a01d8248927,2024-11-21T09:02:56.220000 CVE-2024-26731,0,0,93df8098dbc8b35339297c34d2cc186ab96abe59edc56773a7bed56c8ef330b4,2024-11-21T09:02:56.323000 @@ -251399,7 +251400,7 @@ CVE-2024-26734,0,0,d8df93e379db9f8ef23f0da2e3b3ff375dd783ed41c8881d3342919ab9533 CVE-2024-26735,0,0,23416017cb42c35b17ab61282110d884834e0c54e876d15ce4bdaf6d667bf541,2024-11-21T09:02:56.883000 CVE-2024-26736,0,0,b29129ddb5d3afb3852cff1b0fe131c66351f86286513d203d1c2dae3f9ca5da,2024-11-21T09:02:57.090000 CVE-2024-26737,0,0,03a6f3a24bd6f11bc15a839c4e708d9160bb2b3e53fb885adad418a2aca958d6,2024-11-21T09:02:57.210000 -CVE-2024-26738,0,0,70cc2f36f2f1843016c91868853f1d3cb6c904553112ede4ffd2ba15f359199e,2024-11-21T09:02:57.417000 +CVE-2024-26738,0,1,7401dc8ccba47014fc09b50b349b2fbe5d1a660cb458a9c717c4b0bf3e62c9a2,2025-01-07T21:13:43.273000 CVE-2024-26739,0,0,3e91524254897924d33159faf525041742412059c301b8791dc3047a5453f1e7,2025-01-07T17:28:37.057000 CVE-2024-2674,0,0,8fe3ca5c10cd895f32135cc2d60fd9befe59849157b4cb265f3ba85a4513aee7,2024-11-21T09:10:15.840000 CVE-2024-26740,0,0,5c985b6d9944a225321eb8d8626fe328a08a180b8b9ad6ec1127b25a27e4e7b4,2024-11-21T09:02:57.653000 @@ -251417,7 +251418,7 @@ CVE-2024-26750,0,0,94dd61c3c28ff5b4b8be06dbb38fde205c5b9d50e1d14542fa5032faf9ddf CVE-2024-26751,0,0,1e619e8fe0318e1c48482a9e82bff0725291c1d0b69bffec38f5e08d3f2af80b,2024-11-21T09:02:59.333000 CVE-2024-26752,0,0,8b44b0cbe238350cd3aba9d2cef251b57898811e1fd6d1e9877c06b446f7e0df,2024-11-21T09:02:59.473000 CVE-2024-26753,0,0,3e95fab79cfa5db33e808b0f0ced27ef7c3e60e59f402c3da90378d05e29d3e5,2024-11-21T09:02:59.593000 -CVE-2024-26754,0,0,a275b9743c15d110f0920e9a74d7b86d06f71096bc480ed6cd8bb8452d4a7502,2024-11-21T09:02:59.710000 +CVE-2024-26754,0,1,175be97ba4873a77188833236c6ae06bc719c11b1be4fb508248fd70bc0f47e4,2025-01-07T21:13:04.700000 CVE-2024-26755,0,0,afbbb8c803ab19908e74568d9ad9d4969c2fce1da26912e6aec42da718604890,2024-11-21T09:02:59.840000 CVE-2024-26756,0,0,277504566c3f61e232c5a3428990fe53a476b409dd55cca3fc33763192194c3e,2024-11-21T09:03:00.037000 CVE-2024-26757,0,0,ea19223d6591c0bb304a57b49e3343899072ac606ffd2b71bfbed5f59d9bfd66,2024-11-21T09:03:00.147000 @@ -251528,7 +251529,7 @@ CVE-2024-26851,0,0,6e3bec1a4c10667fb8ac1e3787bac484f3ff56735f1084c7552b609d42ad9 CVE-2024-26852,0,0,86895d5a9082f520ea7cc4247cf45e9a0864c97e8f51f735ee80ceef101e0307,2024-11-21T09:03:12.853000 CVE-2024-26853,0,0,92cc7cb6502d647ed7793d48a497cabd5b87799860a174a884240562d715c3a3,2024-11-21T09:03:13.087000 CVE-2024-26854,0,0,0c9ab848ba46617ecbcffd4f1556a5554ce08fb9c94a290def4913695ceb8d33,2024-11-21T09:03:13.223000 -CVE-2024-26855,0,0,4fa27f572b760b7d4fa187c4ed90475ea061e437e669b812f2b520951b870fea,2024-11-21T09:03:13.437000 +CVE-2024-26855,0,1,56b630f771d4eb82fb88fdfce22b5e50ddb19d9e6dfda25139a755420be7f379,2025-01-07T22:06:59.357000 CVE-2024-26856,0,0,60453161c4585e438d0182f59b3246f8975d2405c75589121dc24920bd956503,2024-11-21T09:03:13.557000 CVE-2024-26857,0,0,17f9879de007a3724949c9b26519f2d2821087aeaa81cfe5596c2e79c9baddf5,2024-11-21T09:03:13.687000 CVE-2024-26858,0,0,8ecfbd5757c21058ce63348d67f9ca24ef7a65e27484e67bd18128e756205172,2024-11-21T09:03:13.893000 @@ -252982,8 +252983,8 @@ CVE-2024-28756,0,0,690c3487a07876dd049c19665e845da2f28dadbd04cc6a33595a627926345 CVE-2024-28757,0,0,8dcf3053aeb841f4c3a05d9db7c88ad0311eeb143731b145bb3e58cda5d82a20,2024-11-21T09:06:54.427000 CVE-2024-28759,0,0,c922889c9fbea01425ba4e2700505b2918fd90679ef9f59186bfe2fa2d671d0d,2024-11-21T09:06:54.587000 CVE-2024-2876,0,0,71c3a804e8eb8bd03fb495c4bf9bde93ee7dd07888efcbbc5faa48502cbce8d5,2024-11-21T09:10:43.890000 -CVE-2024-28760,0,0,68e010dc44e656e286ebd73c538be9ce7268acda0fbfa9110862129c79d923fb,2024-11-21T09:06:54.740000 -CVE-2024-28761,0,0,616b7e09c3bcd95cb79ce0093cc728c720fcdd0e8df0ed8d707b9bd5ccafd84e,2024-11-21T09:06:54.880000 +CVE-2024-28760,0,1,87ee4a50e50beb3eb3a2ff436ddbd84c55b2df2ce2872466f7017d881731ed16,2025-01-07T21:02:43.143000 +CVE-2024-28761,0,1,f990216988bc90d162638e8b7945a6d12e4276303d0bad539d5b65fad7ce50a0,2025-01-07T21:02:54.690000 CVE-2024-28762,0,0,e7146f96c55753c65cd4f661c712c523979eaaba20e1cbe7b3b78b7197e1711c,2024-11-21T09:06:55.017000 CVE-2024-28764,0,0,42363a94f8163c9cad8147d31e6295d669ad4dcbcb1cf61276272a7a155229ea,2024-11-21T09:06:55.180000 CVE-2024-28767,0,0,3dcbbe23de561638ccf8a9738544653a62b61fe75d19cdbb00efaaf18a46718a,2024-12-20T14:15:23.850000 @@ -253094,19 +253095,19 @@ CVE-2024-28902,0,0,6935ffbe9d1c3f809438d600a7f6adc91e111fc1d33b218365dfa5a7c37c4 CVE-2024-28903,0,0,64ec3b664b527dc5202a815956ff5fb4d37fd90ed4f608888e1bf4cd1af17166,2024-11-21T09:07:09.347000 CVE-2024-28904,0,0,9f007588993cf4a4ddcca27129a47e2feae065c5111b453c43fc38b2aff0f7f2,2024-12-05T18:54:13.320000 CVE-2024-28905,0,0,a08eee1382a1bc3a2ad1eab03718f1c1af09a74713904c7f3a9b3b8a590e95d7,2024-12-05T18:50:21.030000 -CVE-2024-28906,0,1,2d31615044f057a4577ab855bd3b743067a2cccf8fb6a4a0761ba8b0e41a1734,2025-01-07T20:30:25.303000 +CVE-2024-28906,0,0,2d31615044f057a4577ab855bd3b743067a2cccf8fb6a4a0761ba8b0e41a1734,2025-01-07T20:30:25.303000 CVE-2024-28907,0,0,6962329ba7e3ae2352f1b9ea34d824ac8e100aa431c0de37f35c4650a2e18f3d,2024-12-05T18:28:21.740000 -CVE-2024-28908,0,1,e189c552850b13ca5d7cf421de7fdb33bf42d073e18ceb4a8a422b1f433b922d,2025-01-07T20:22:56.653000 -CVE-2024-28909,0,1,2869f3da223760286387aba0b464ef4c8875977e0881d377c9525fc6f7881df0,2025-01-07T20:20:43.007000 +CVE-2024-28908,0,0,e189c552850b13ca5d7cf421de7fdb33bf42d073e18ceb4a8a422b1f433b922d,2025-01-07T20:22:56.653000 +CVE-2024-28909,0,0,2869f3da223760286387aba0b464ef4c8875977e0881d377c9525fc6f7881df0,2025-01-07T20:20:43.007000 CVE-2024-2891,0,0,1ff34ae211a25afff02de381688fd5a4684ffa990ce2b6494a9492549a569d38,2024-11-21T09:10:46.173000 -CVE-2024-28910,0,1,e3b369e4a8d472d72e9a19b12774a71460fc4bab55bc84a0c4568ee848a06deb,2025-01-07T20:17:51.460000 -CVE-2024-28911,0,1,5df5116a7758f00ac661fba3cb2509ac1329af2e07838f553897093eddccdcad,2025-01-07T20:11:27.670000 -CVE-2024-28912,0,1,652f6f09ef9e3cb510a1123a480abcb8fb57058b882893d580010967efb9e099,2025-01-07T20:08:15.217000 -CVE-2024-28913,0,1,3680b0f7a5cea0c8ffb90c366d0338d5211c1942b9d5d8480bdc5ddc82421b30,2025-01-07T20:03:28.853000 -CVE-2024-28914,0,1,8b0b3b0fa5a15e2252e78d407a87af3f4d7576daf56d9f4726d1bc959cd00697,2025-01-07T19:51:53.947000 -CVE-2024-28915,0,1,4d9efd3b5de3b2e9930bbec9717f9230f7b3a49711c9d523bcf861dacb977e7c,2025-01-07T19:48:07.427000 +CVE-2024-28910,0,0,e3b369e4a8d472d72e9a19b12774a71460fc4bab55bc84a0c4568ee848a06deb,2025-01-07T20:17:51.460000 +CVE-2024-28911,0,0,5df5116a7758f00ac661fba3cb2509ac1329af2e07838f553897093eddccdcad,2025-01-07T20:11:27.670000 +CVE-2024-28912,0,0,652f6f09ef9e3cb510a1123a480abcb8fb57058b882893d580010967efb9e099,2025-01-07T20:08:15.217000 +CVE-2024-28913,0,0,3680b0f7a5cea0c8ffb90c366d0338d5211c1942b9d5d8480bdc5ddc82421b30,2025-01-07T20:03:28.853000 +CVE-2024-28914,0,0,8b0b3b0fa5a15e2252e78d407a87af3f4d7576daf56d9f4726d1bc959cd00697,2025-01-07T19:51:53.947000 +CVE-2024-28915,0,0,4d9efd3b5de3b2e9930bbec9717f9230f7b3a49711c9d523bcf861dacb977e7c,2025-01-07T19:48:07.427000 CVE-2024-28916,0,0,7e8518a9373fa848d2766930cdc99728632e579ae0d86f80b414ea87c8f277e4,2024-11-21T09:07:11.097000 -CVE-2024-28917,0,1,89bc645416800446819a0650a2fb393ffa2225d66115e5b665d823e1631a9607,2025-01-07T19:29:24.970000 +CVE-2024-28917,0,0,89bc645416800446819a0650a2fb393ffa2225d66115e5b665d823e1631a9607,2025-01-07T19:29:24.970000 CVE-2024-28919,0,0,aafa3cfe96f5188bd9152d58f128e96a412041872d57e6b50d887b3f050539ba,2024-11-21T09:07:11.350000 CVE-2024-2892,0,0,74c239cacaa79151a1c470c6b6fc24b5a5eb0198576c9c168529a88848909c96,2024-11-21T09:10:46.323000 CVE-2024-28920,0,0,8d9bd6a3440ce6d19f673b3fe6a9e1359093edcf28c49624e6aa256d0d806b46,2024-11-21T09:07:11.497000 @@ -255315,15 +255316,15 @@ CVE-2024-3189,0,0,cf3c2d45c5c1f6cc61b6d398c2f0b2f840ed23d80ea9e7c4c6d89950994902 CVE-2024-31890,0,0,651fa0b1e1cfc65d537ba9b852527cb69af9fe2a04587dff5261b833582033b6,2024-11-21T09:14:05.540000 CVE-2024-31891,0,0,01ff6a81cab4a69609149b5caef3f483d0f0e227ded20c94a2b847f21423d70d,2024-12-14T13:15:17.630000 CVE-2024-31892,0,0,135dcdbc319a0ed23513a221119da13b2a8156f6458cff759f3b3e22d1b3e094,2024-12-14T13:15:18.877000 -CVE-2024-31893,0,0,1ee5de64a507073e1576552d494f92a47974a8768c38ce20796f66762af14f93,2024-11-21T09:14:05.667000 +CVE-2024-31893,0,1,f9f7cc52ac70574dbdc37ee8d3b0b8ab46f5010ec8db22134e66e018bc4778d8,2025-01-07T21:03:12.027000 CVE-2024-31894,0,0,07db0489096a710a1181f86402d3a99764c6888ab4e60622f37ae6ec81631794,2024-11-21T09:14:05.810000 CVE-2024-31895,0,0,bb7c808cedfab935c4b791381449fa00e1393d5ea1cf070e6cc5e4a4ab36ed78,2024-11-21T09:14:05.943000 CVE-2024-31897,0,0,482d60ce194a404c922472f634fe27b65cdb7d56b2dfc2459272befae42533ec,2024-11-21T09:14:06.077000 CVE-2024-31898,0,0,2bdf434c4d06bca201e71e4a7c99060368586d3dea800b988968adc32062eddf,2024-11-21T09:14:06.253000 -CVE-2024-31899,0,1,e3477cb6ba6850b36435640b21267340780a9020b61b2670506bdd2d9d1ba253,2025-01-07T20:02:40.877000 +CVE-2024-31899,0,0,e3477cb6ba6850b36435640b21267340780a9020b61b2670506bdd2d9d1ba253,2025-01-07T20:02:40.877000 CVE-2024-3190,0,0,bad297e304fb4b0d6eafd0a234cf1fc72af8a9c2c234dc9ef80f9a08d6ffcbca,2024-11-21T09:29:06.810000 CVE-2024-31902,0,0,003a18851ece455ee1e6ea2a4455c0284b8742534b1304a5388aa31d40a16816,2024-11-21T09:14:06.483000 -CVE-2024-31904,0,0,5f5d88f0484ab34936eb86409c567784521f9f068dbf78e68d57fb0bc21f336d,2024-11-21T09:14:06.617000 +CVE-2024-31904,0,1,d2a04e1afb3ab14e7bd62c982b1ec9fbcf0becba36a47360842f1553f25b269c,2025-01-07T21:05:40.810000 CVE-2024-31905,0,0,4f1bdfcd5321f7b992df963e233e7a11fb0781b24167b44218cf69a784597a28,2024-08-28T22:08:30.560000 CVE-2024-31907,0,0,766c5037edcc6c2c834f4d55bbd6954e77b70d6bdf71d2c01d166b4beda2cf32,2024-11-21T09:14:06.817000 CVE-2024-31908,0,0,b99423df6404f34750bc64b8c4574b7d4db6c4a5987445ad5dba0b24ab9eb708,2024-11-21T09:14:06.937000 @@ -258004,7 +258005,7 @@ CVE-2024-35522,0,0,2626616769563e7a96297f39345d530eb58b02f356a18fe02e8e08a2db8a5 CVE-2024-35526,0,0,de3a832d01072d880b0e7f865e64ed7d95d3fed5f854bbcc2e5b8cb7231ebca2,2024-11-21T09:20:23.833000 CVE-2024-35527,0,0,d802d5954ff7f9b39a6b2dc0af26915bbf794a29707ccef9cebcfa3c1be1edad,2024-11-21T09:20:24.040000 CVE-2024-3553,0,0,c997e76340d2569cee154991e02a7ad2e13c17e9507753eb8dd6bd1059f541e8,2024-11-21T09:29:51.813000 -CVE-2024-35532,1,1,2d6a1e6edf6723210792fea24e36d8fe80ee885db9e530e01977e15143747c2c,2025-01-07T20:15:29.627000 +CVE-2024-35532,0,0,2d6a1e6edf6723210792fea24e36d8fe80ee885db9e530e01977e15143747c2c,2025-01-07T20:15:29.627000 CVE-2024-35537,0,0,21d93b44cce1e0ea0c269b874880ed5b770c1a2fdf35d7de97a57a169f267fd1,2024-11-21T09:20:24.273000 CVE-2024-35538,0,0,1466111acec37e4d2df7289bfbd264c0429fad437a46245bcd2bfb14bbd7c76d,2024-08-20T15:44:20.567000 CVE-2024-35539,0,0,4f279216ce5454db3adbdb46420f92fade8a007bf9e1d3c6bbc30aa69408e3de,2024-08-21T14:35:10.017000 @@ -261233,7 +261234,7 @@ CVE-2024-39528,0,0,c79ba2efce8080439e31061a59d60d49ff19a7d0e674f985945fc09dd7915 CVE-2024-39529,0,0,07f2d85334985052d06798e7918102d9dc582f03d4d04e26f78822a1712fdc51,2024-11-21T09:27:56.317000 CVE-2024-39530,0,0,51b367e2f05743e4f39c9cdaa9d7be3668935616532004771da83875016c1458,2024-11-21T09:27:56.513000 CVE-2024-39531,0,0,459b011e4c3f1134a81db60cc80e40554ccfdac4af0c9514d1507b5a00cba421,2024-11-21T09:27:56.690000 -CVE-2024-39532,0,0,6f17118e46bbf178ffc0c19f5efbe73e7ab4c476379d2d51acb370a41356d70c,2024-11-21T09:27:56.860000 +CVE-2024-39532,0,1,4e654fe3f3fc798a571bbe8bc7c174c4c2234ea22efe56fa51b1b77175e722e7,2025-01-07T21:15:11.583000 CVE-2024-39533,0,0,9173059361e83f3e5c35e883f22f5c6f7c4018530ced5cb7ee239b8c3299b88e,2024-11-21T09:27:57.003000 CVE-2024-39534,0,0,3b21e0bd2000bbec85c5cd71fc3cc60e6f9a339fda2a638c4078d5a94d1acfe8,2024-10-15T12:58:51.050000 CVE-2024-39535,0,0,5d67b38c02f98e745cc8eb5481b9722c64305d5b562b0327f0da191b27abef95,2024-11-21T09:27:57.230000 @@ -261692,7 +261693,7 @@ CVE-2024-4042,0,0,cecab8b1687d6be49a591036e1f884eeaaaac74f662dec1e0d521caf21f5dd CVE-2024-40420,0,0,2cc64060c56a9cd8ae43221cc949a39e78df1f9a724e5e5fe2d1f288499041f6,2024-12-18T20:15:22.773000 CVE-2024-40422,0,0,66694de383944722e2f25fc6c01858a58042d8c38d3705e14f9fc82648bd4ecd,2024-11-21T09:31:04.907000 CVE-2024-40425,0,0,57fa5f5d788296fbd065197156216c884c87febf9dc0d47016294cebb94993ba,2024-11-21T09:31:05.133000 -CVE-2024-40427,1,1,1fb052fdadb0605579fe48a16ba2ab3f64cfc776f49819992accdd9953796a46,2025-01-07T19:15:32.260000 +CVE-2024-40427,0,0,1fb052fdadb0605579fe48a16ba2ab3f64cfc776f49819992accdd9953796a46,2025-01-07T19:15:32.260000 CVE-2024-4043,0,0,d4b5f95f306543d879cec12e990f7b6a12bdbc75a98caec12c24a6e719c63084,2024-11-21T09:42:05.460000 CVE-2024-40430,0,0,546dc110e07f45ee3ffd84e8af87c8ef8c5f6d93dcd27e587cb3a3c5233f7799,2024-09-13T21:15:10.357000 CVE-2024-40431,0,0,e23592fbcb9fa660acf205a0231389b077a5c59972c85ee664d839efe06b83e4,2024-10-25T12:56:07.750000 @@ -264720,13 +264721,13 @@ CVE-2024-44289,0,0,cebc5a6dd69bb4dfb6fc1913fbecdc8def2c3ab557066dcaad90744b17bd9 CVE-2024-4429,0,0,472cc76d4e2d79b293ac3f5fbb2003341a74de830a9679197105713be5b829ff,2024-11-21T09:42:48.820000 CVE-2024-44290,0,0,3f10326ddda1c7d048782a293610e4b0eadcb04b9c4d906fd270793108dd8832,2024-12-16T22:15:06.690000 CVE-2024-44291,0,0,9fbd08e4a2248003e1aa444c3a50c6b5ccdfdd8d43ab2891c86e69ab7e61bce8,2024-12-16T19:15:08.180000 -CVE-2024-44292,0,1,f31278c8b11189f7e88880f9a06e8a9b515052f5634156c446409bd71b5b0014,2025-01-07T19:11:30.300000 -CVE-2024-44293,0,1,5262123e91fdeff9f4e62ccf3b4dbc5904b965efdd877d91d60494ebf3a083bf,2025-01-07T19:08:46.427000 +CVE-2024-44292,0,0,f31278c8b11189f7e88880f9a06e8a9b515052f5634156c446409bd71b5b0014,2025-01-07T19:11:30.300000 +CVE-2024-44293,0,0,5262123e91fdeff9f4e62ccf3b4dbc5904b965efdd877d91d60494ebf3a083bf,2025-01-07T19:08:46.427000 CVE-2024-44294,0,0,39c4b8619d1953e77ef2c82b0222202a45c3a25d1ed0c03e471ab470880aa0e2,2024-10-29T21:35:21.347000 CVE-2024-44295,0,0,fb3bb1168f264d5ea57ac326382812654e52d772ee8cf2d79e0cd717b2d51c9c,2024-12-12T18:21:21.147000 CVE-2024-44296,0,0,5fa9d13f224f3a0a67aaaa3541de4a3651fe9910d7529312fb8483d35af02925,2024-11-14T14:58:09.900000 CVE-2024-44297,0,0,15b11a1a880cbcc6b8dc8f6c7e90f9afa6080bf98d20fe4b15a67c3ef7cd8eaa,2024-10-30T15:35:17.777000 -CVE-2024-44298,0,1,64784e81947396c199d7c1d021c6b05802cd1ece1576c434a521b3dd9f3dca38,2025-01-07T19:00:43.213000 +CVE-2024-44298,0,0,64784e81947396c199d7c1d021c6b05802cd1ece1576c434a521b3dd9f3dca38,2025-01-07T19:00:43.213000 CVE-2024-44299,0,0,3fad1e1fc6e494d5112c8007d008afd8a0cdb0129eb46588d4ade8d86481d2e9,2024-12-13T18:47:10.657000 CVE-2024-4430,0,0,cd2b5f6c22c5864ef6fbb53b96bda6b69614cea20c5eca84025328f7be701bc0,2024-11-21T09:42:48.940000 CVE-2024-44300,0,0,bae43a573b0fc5576aad7e68076991c0fff3f7113750dddf3be341943a7729db,2024-12-20T19:15:07.507000 @@ -264779,7 +264780,7 @@ CVE-2024-44439,0,0,532d340c7125d38b3791848ed20a07920e65477c51ca4d64efca5629beabb CVE-2024-4444,0,0,feeaffc9146fccf0816d38147af86858ffa3c68d94baf1fab273954d1c7348c4,2024-11-21T09:42:50.610000 CVE-2024-44445,0,0,70e29647242626c5fc3cd02b62378e61567a9538e073b5b0672118158325e4f5,2024-11-21T22:15:07.637000 CVE-2024-4445,0,0,46341af9b6fb502c6f33de80f90e54dcbc98c3195a6f7b6924f2303483fe6e07,2024-11-21T09:42:50.723000 -CVE-2024-44450,0,1,b6d4cb9f3062751960bc65f4ba2a54253ec161ef54efc949eeaece289e8f3cb4,2025-01-07T19:15:32.417000 +CVE-2024-44450,0,0,b6d4cb9f3062751960bc65f4ba2a54253ec161ef54efc949eeaece289e8f3cb4,2025-01-07T19:15:32.417000 CVE-2024-44459,0,0,6692baff458ff714d53ffedc49b8e8781eaf99012cbbded46425655a64ca52e7,2024-10-30T20:35:29.427000 CVE-2024-4446,0,0,a4fc1a809d7fdafb7a075aa0f7592e0b84c47ee34b07d544758f459a4a149dac,2024-11-21T09:42:50.843000 CVE-2024-44460,0,0,9863860565b5b349bc349acea444639a968dc1cc5f314565dcb3e0a824f6c075,2024-10-30T19:35:23.557000 @@ -265787,7 +265788,7 @@ CVE-2024-46239,0,0,039d008e66cebe4327bee95b97b4914de6b1e6cba80f55339b9918f2122a1 CVE-2024-4624,0,0,b8449ff3b8e0ee2c88b4f6d45e1af5d82eabc4c0852145584765c0329d0b8432,2024-11-21T09:43:14.500000 CVE-2024-46240,0,0,1191cdf44b6509cbee2a8abac44a625a4ac7bf4a3622ea84bd1d88a32af8af69,2024-10-25T19:00:20.737000 CVE-2024-46241,0,0,1f0674ec17f2d56b2953e5c99a2b749bf8e4230c80e89ee3aa315644015de064,2024-09-26T13:32:55.343000 -CVE-2024-46242,0,0,d23dfffa50059d3cca3d03fe3bd881789dcf7805de796241f7d089988319ccf8,2025-01-07T16:15:33.950000 +CVE-2024-46242,0,1,769195230f50897f071b58f9b4b54dec1834197fa3d9d04995e60de3195c248b,2025-01-07T21:15:11.783000 CVE-2024-46256,0,0,e8ff1292d6b21c7ae8cc6b0452346dfd4818ec086d9a14227767a4b9e342f7b1,2024-10-24T17:15:16.690000 CVE-2024-46257,0,0,2e21e52a1504a13633477840dbd557e9ad05285ae3938c3634988f0489dcfd2d,2024-10-24T18:15:08.617000 CVE-2024-46258,0,0,c52e6b996ce625372477bea80c1b4801ac61785137225fc2e692df95afee475a,2024-10-04T16:41:08.497000 @@ -265943,8 +265944,8 @@ CVE-2024-46598,0,0,cc14f076324de01fb0aedc665220d3a3ce311adfb4ca6be3700a7951d6f4c CVE-2024-4660,0,0,61cefac851d738e6211130f613c3c24b72cb5a59425ed2099eb13a6958c5f9b7,2024-11-21T09:43:19.410000 CVE-2024-46600,0,0,a2edf2944e549d9be47dd52eb91fd1fdfd1682be8e1c383075c7935775b4a0c4,2024-09-26T13:32:02.803000 CVE-2024-46601,0,0,d1aa8c76af546481926d81fa58587c0b0819234b4bbf0362674827e463f9a514,2025-01-07T16:15:34.087000 -CVE-2024-46602,0,1,9bf065832521a48ba06a7d71177908b2b7ce3608232449bb38e1d8f5f48286b3,2025-01-07T19:15:32.597000 -CVE-2024-46603,0,0,836e3dc8bfaeddf29857fbecb92cd5946281a59796c24b0d8d2aec535913b1f1,2025-01-07T16:15:34.370000 +CVE-2024-46602,0,0,9bf065832521a48ba06a7d71177908b2b7ce3608232449bb38e1d8f5f48286b3,2025-01-07T19:15:32.597000 +CVE-2024-46603,0,1,c30a25f7b88dcc01303c233fbff3cb3e51c22a29f42bd3bc5cdd7863e4696348,2025-01-07T21:15:11.983000 CVE-2024-46605,0,0,1055d0ef26a73f5e645f2fdb8709387122d75ec2801b9b56966b3a9b26aba333,2024-10-18T12:53:04.627000 CVE-2024-46606,0,0,28b5ab017aae3b940eef21410c789c635db9a13916d1c5cd18485d534534131f,2024-10-18T12:53:04.627000 CVE-2024-46607,0,0,60627a32f7e8fcaeaabd9ac6ff6cf0f372f36d39c465be7eb007e5b08e6157e9,2024-09-26T13:32:02.803000 @@ -267251,7 +267252,7 @@ CVE-2024-48238,0,0,3f2ffc614fa15d916232399b967037f846ea28604374a981ad0466971cf3e CVE-2024-48239,0,0,0c07796f9941e77d31ea455c930d1849f400f89336e89d408653eccdc74bdbd1,2024-10-29T19:35:22.840000 CVE-2024-4824,0,0,99e5c25e3efbae2d6155cb78a769b081c4e63979dfca195378dce1a55688edc2,2024-11-21T09:43:41.940000 CVE-2024-48241,0,0,942b4afc357baeaceadf6e602d4d8e3bfa0474bc4cebfcbfe23fbed098a739b4,2024-11-01T12:57:03.417000 -CVE-2024-48245,0,1,7131ea275da65bf915f9243b9e4c8a536d1c22efe172cdad637796c446928e25,2025-01-07T20:15:29.750000 +CVE-2024-48245,0,0,7131ea275da65bf915f9243b9e4c8a536d1c22efe172cdad637796c446928e25,2025-01-07T20:15:29.750000 CVE-2024-48249,0,0,2b7bc564c0f7feefef01fa93cd50d56ca2a93e73b5f3eb01b90321a2b54ebe80,2024-10-15T18:35:15.607000 CVE-2024-4825,0,0,5c1d8ba2e7dfb16ca18af9c563e1590f25a3d396f69347243d31cae6dbf069a9,2024-11-21T09:43:42.050000 CVE-2024-48251,0,0,c80def3e238ed0fab4e8dad7bc06f5b33b90fcccea2cf3bdaafbfe1c7c4fb67e,2024-10-17T18:35:12.280000 @@ -267322,7 +267323,7 @@ CVE-2024-4845,0,0,e1e461ef60509dabf0e7e2dde808d36cb958becba4b5c88bdf30fa8f1c23ed CVE-2024-48450,0,0,2ad4bca80a954b5a64850267d64cde36a0cc73a58476afe8de69f997e4304a47,2024-10-29T21:35:23.350000 CVE-2024-48453,0,0,3e4df1eeae274bbab92d66627c425462f4715efda5653276293edf2b80192e38,2024-12-12T02:04:03.420000 CVE-2024-48454,0,0,9e0f8e82bd55ca3c8b98e816c5edf51ab830449d458f68194479be7d35927289,2024-10-25T12:56:07.750000 -CVE-2024-48455,0,0,6e133e8ee57b44bba6c49d6e60aaa60c9d55d5d8bd2e95486d0bc2e58c6233d2,2025-01-06T22:15:09.510000 +CVE-2024-48455,0,1,a648d35b2f8e965b19a855c3cf0ba90eba06b6a31f91dba6390c9d300b4dd829,2025-01-07T22:15:30.620000 CVE-2024-48456,0,0,fbb569fb57e72aec0b2b4128e6a8adfd90b8bb9238365e9a09eddcb2d6533a26,2025-01-07T16:15:34.867000 CVE-2024-48457,0,0,99b77ae7cdd1ef223e036610bca59359991ba4db95d35fe9aa786febce4524d5,2025-01-07T16:15:35.057000 CVE-2024-48459,0,0,f2ab7e7f3244c10dbfc979fa6bc201608cff2894282b5a96f254cb41fcce18b6,2024-10-29T20:35:32.737000 @@ -270645,7 +270646,7 @@ CVE-2024-53333,0,0,fec584e947b0ef91060e7974c2bc2800b0a5e22197ac40e517d4bb4ecce04 CVE-2024-53334,0,0,16279143f552729b554e869e900fcdb0e710a67308c49b11d3ac0e3ed52e676d,2024-11-21T21:15:24.810000 CVE-2024-53335,0,0,c7b5a8f73d12d44b7820d29b4dc55e553a7dba1e50218bfd0cdeaf78dc12e004,2024-11-26T18:15:19.850000 CVE-2024-5334,0,0,cb79190d7e117b2165ef511634fe8d33c9e23cab24dd6ad00dc4efad8b756c7c,2024-11-21T09:47:26.523000 -CVE-2024-53345,0,1,c1df2ca9bd6e970d2bf0dbceea5a58876e705d442c82eed7def9cfc5fe58518f,2025-01-07T20:15:29.923000 +CVE-2024-53345,0,0,c1df2ca9bd6e970d2bf0dbceea5a58876e705d442c82eed7def9cfc5fe58518f,2025-01-07T20:15:29.923000 CVE-2024-5335,0,0,227008637fcf0f08540aa31f6f2f1e0a27300047ea0b90140042ff30c0f0094f,2024-08-21T12:30:33.697000 CVE-2024-5336,0,0,3be15ca705f47dea3ffc9a0dd73cdf82724f581c9671519a64e222f9d7a209cc,2024-11-21T09:47:26.713000 CVE-2024-53364,0,0,924e143b4294f3ffb491904ae2396d08e4637aeb46539cceee83f2ecfb2d4d99,2024-12-02T20:15:07.487000 @@ -270693,7 +270694,7 @@ CVE-2024-53506,0,0,9dfa3208f902ab3513f3502d8928ce98e8eedec2f27ad06842644780d149d CVE-2024-53507,0,0,12d141a23906013906618b23cee234cf31c91fd8e1e8d9da3760596286952af5,2024-12-02T17:15:13.707000 CVE-2024-5351,0,0,a2df3cc9be27d64a2cd3dc5a2f1d5f6a44f6e98794670e6c0c19928c9af58ef2,2024-11-21T09:47:28.610000 CVE-2024-5352,0,0,afede3a744404a4b63e0d831a5ec0e86e744b459100c94c26c1030a6d60025a6,2024-11-21T09:47:28.743000 -CVE-2024-53522,1,1,01c6c63f4eef54d3a96f9df90045ba15d3944187ddf970bcef733c6fb4d720d2,2025-01-07T20:15:30.083000 +CVE-2024-53522,0,0,01c6c63f4eef54d3a96f9df90045ba15d3944187ddf970bcef733c6fb4d720d2,2025-01-07T20:15:30.083000 CVE-2024-53523,0,0,62264463ec7bd597c8cd954da8d0baf08b58aa4c7ac24397d44469055812e6bd,2024-12-11T17:15:20.073000 CVE-2024-5353,0,0,797e03a5615e2bede928ac816012d8783c471de5bd74a0480881887afd7a657a,2024-11-21T09:47:28.863000 CVE-2024-5354,0,0,e179ff0fdd33289a32ca4c68c73a51c0aa8ddee9c94944cd1d4fd7185f36a76c,2024-11-21T09:47:28.997000 @@ -270938,7 +270939,7 @@ CVE-2024-53931,0,0,77ff5a910067e68acb1360e732666f9398c8f9d529fa9282c40e4c59ef92a CVE-2024-53932,0,0,a1340f254ee4139622dc4827742470a22bd1d8c2724823dabd329fa8971bf8d2,2025-01-06T22:15:10.187000 CVE-2024-53933,0,0,eff8ccb6015491c912bdd95414ebddaaa03db0ff46f959740ee621262994cf84,2025-01-06T22:15:10.293000 CVE-2024-53934,0,0,186984c1ab3c6b8a0c4a6202e5bbca851e30216bf20f2c66a54f43deedb614ef,2025-01-06T22:15:10.410000 -CVE-2024-53935,0,0,07076ad3cb19de6b468d315d885ef4139d86f26f4202655178ffb592f53b0a14,2025-01-06T22:15:10.520000 +CVE-2024-53935,0,1,e7a89bbaab57e9f8cfa36ddccaa7ded268242ad9837ae15774898afacfe8a75f,2025-01-07T22:15:30.790000 CVE-2024-53936,0,0,0fbb410b7e63d8868365f11fe6adaac28e4e5f4dab7ddbba3c6ad260cff18dfa,2025-01-06T22:15:10.630000 CVE-2024-53937,0,0,d1cd3a208e2e01cbeda6e314a3aeae43902ecd4a49e9dc0eff32993f2ac3461c,2024-12-03T19:15:12.127000 CVE-2024-53938,0,0,d0a91f2a4ef2aa08452cc7e6ae9a19bbc5f3a7a19dbe27547769ceb8e70ec886,2024-12-03T19:15:12.330000 @@ -270989,8 +270990,8 @@ CVE-2024-54002,0,0,7c5a00df1d470c32b9eac42d93309bb19614d9762fa0f049a771979bb9894 CVE-2024-54003,0,0,b632b439005206974a2b4ec6ab08a78e134e0c09d892996aec7289d7221f0377,2024-11-27T20:15:26.133000 CVE-2024-54004,0,0,5d94a9bc2fe383b10883d5f21fb711b04368ee28bef8377081c80a039d1c1dee,2024-11-27T19:15:33.723000 CVE-2024-54005,0,0,a1140344f7f7dfc4d3d4467b796a2fa8133c201f3d329efe99a74d57c08e17e6,2024-12-10T14:30:47.037000 -CVE-2024-54006,0,1,6bd5efcea443530b6f536e39e0d35c4df9fc909f18659576dbacb0ce5ccdea52,2025-01-07T19:15:32.803000 -CVE-2024-54007,0,1,796fbe1a2dec13fc9ac82cc0124bd0d476bde5dd7ac7433c3ded9782c4bc47c9,2025-01-07T19:15:32.927000 +CVE-2024-54006,0,0,6bd5efcea443530b6f536e39e0d35c4df9fc909f18659576dbacb0ce5ccdea52,2025-01-07T19:15:32.803000 +CVE-2024-54007,0,0,796fbe1a2dec13fc9ac82cc0124bd0d476bde5dd7ac7433c3ded9782c4bc47c9,2025-01-07T19:15:32.927000 CVE-2024-54008,0,0,eea0fea8f522a304d841eaa6b0b75d4fade41407f80f4626ca71a3072a5c233d,2024-12-11T14:15:19.713000 CVE-2024-54009,0,0,57a4bb8c66b26b4000e58cbef542e2f0e67be86fc478ee09e8a3296c8cd7f828,2024-12-19T23:15:06.887000 CVE-2024-54014,0,0,fef0a2723f6d0eb99b08285b0e1281168729dd64327291d1bbdb15f503c04c5e,2024-12-05T03:15:14.530000 @@ -271001,22 +271002,22 @@ CVE-2024-54032,0,0,1ae7bed178388a8becc0b2310728246bc38710e9f7ad794feb179bb616bab CVE-2024-54034,0,0,846c3b0b931699290bf75d8254acba5f2bce35b8e0dd38d2639a5ac7272aaf0b,2024-12-19T19:03:03.917000 CVE-2024-54036,0,0,5ff59e80ea96b2b983e83d15c9d0716c72355206496f4f700438ea4b4a5594da,2024-12-19T19:02:47.713000 CVE-2024-54037,0,0,f556890ba3fe80df125187ebcadddc7ae2b89a3c8454bb4084a0b553458107af,2024-12-18T14:40:29.303000 -CVE-2024-54038,0,1,11006f86f9ad07fee6554c4706f364c593d2901da83f284a0a21db4b393d28db,2025-01-07T19:15:33.067000 +CVE-2024-54038,0,0,11006f86f9ad07fee6554c4706f364c593d2901da83f284a0a21db4b393d28db,2025-01-07T19:15:33.067000 CVE-2024-54039,0,0,71aebf25c5147d9790628c00b402ce1cee82b243f9de77d9f70b222872f7f46c,2024-12-18T14:40:37.587000 CVE-2024-5404,0,0,3740c7be3046d2190332188e66ec21e8b1d4282df75b875095c31d64e80fbe92,2024-11-21T09:47:35.213000 CVE-2024-54040,0,0,13233b484ebb0fc9bf3b9db7209ca33808cdf1c4b9bbbc04e46251909657b46e,2024-12-18T14:40:44.710000 CVE-2024-54041,0,0,d9bcc030129bf6dec82b04a143991ef06874386036703482c0d5681793cd304a,2024-12-18T14:40:52.247000 -CVE-2024-54042,0,1,90a1ddd7db7d1b7d5d242a3cfd639eb7c1fe8d6a39b2e8ee608be76bd82a6e1e,2025-01-07T19:15:33.203000 -CVE-2024-54043,0,1,dc515103146ccb34bd50f3fbefa21435e92bca3e14bf9d14ddffa34196bdae79,2025-01-07T19:15:33.380000 -CVE-2024-54044,0,1,c20e102efa7ddd5163f9e0b09e33d560997926319ee568a1e3b152f8e8a936b9,2025-01-07T19:15:33.563000 +CVE-2024-54042,0,0,90a1ddd7db7d1b7d5d242a3cfd639eb7c1fe8d6a39b2e8ee608be76bd82a6e1e,2025-01-07T19:15:33.203000 +CVE-2024-54043,0,0,dc515103146ccb34bd50f3fbefa21435e92bca3e14bf9d14ddffa34196bdae79,2025-01-07T19:15:33.380000 +CVE-2024-54044,0,0,c20e102efa7ddd5163f9e0b09e33d560997926319ee568a1e3b152f8e8a936b9,2025-01-07T19:15:33.563000 CVE-2024-54045,0,0,16afccc174d0d1eb47914c68c8c94946afb636a9e0351682dbd249dbd8289141,2024-12-18T14:41:55.727000 -CVE-2024-54046,0,1,4147896988ea400826897ed84751e2d66dc4d1623c45f5f20fac0c38b24df883,2025-01-07T19:15:33.737000 -CVE-2024-54047,0,1,2db1d2e91f38cc9f98e0063ab03e3d19115b6886a060e6091af5adca0b5efd86,2025-01-07T19:15:33.927000 -CVE-2024-54048,0,1,ac9598b0e4a940322a0fc0233d3725f9151d3d57b9ea64fd1353bc72c0fe362b,2025-01-07T19:15:34.100000 +CVE-2024-54046,0,0,4147896988ea400826897ed84751e2d66dc4d1623c45f5f20fac0c38b24df883,2025-01-07T19:15:33.737000 +CVE-2024-54047,0,0,2db1d2e91f38cc9f98e0063ab03e3d19115b6886a060e6091af5adca0b5efd86,2025-01-07T19:15:33.927000 +CVE-2024-54048,0,0,ac9598b0e4a940322a0fc0233d3725f9151d3d57b9ea64fd1353bc72c0fe362b,2025-01-07T19:15:34.100000 CVE-2024-54049,0,0,b25add6c7f4972fe04c3adfdc0b2278f3dba4fd570c385f036735c8663a66627,2024-12-18T14:42:33.907000 CVE-2024-5405,0,0,8df36cd9ebb4aacfaea97c0ae9188e72e9768324f03849be72121f482af48749,2024-11-21T09:47:35.333000 -CVE-2024-54050,0,1,d86bfacb40d068018684361f59a6c023ffca124558fabdf95f5e1ba05cab6cf1,2025-01-07T19:15:34.280000 -CVE-2024-54051,0,1,5f58bec93e83d404983aacc63d16a45cdf05389bafc54f5215f8dce6ee3b79eb,2025-01-07T19:15:34.463000 +CVE-2024-54050,0,0,d86bfacb40d068018684361f59a6c023ffca124558fabdf95f5e1ba05cab6cf1,2025-01-07T19:15:34.280000 +CVE-2024-54051,0,0,5f58bec93e83d404983aacc63d16a45cdf05389bafc54f5215f8dce6ee3b79eb,2025-01-07T19:15:34.463000 CVE-2024-5406,0,0,5db0f501f7c712d4bcce798425460b3472165eeef82fd225689429d234120e5b,2024-11-21T09:47:35.457000 CVE-2024-5407,0,0,e082637321598f3dc8c3c9e1760b81a1e1197c4d13cd58fed3245c37f0bb71c9,2024-11-21T09:47:35.567000 CVE-2024-5408,0,0,0b23a712a85d13fef48f02294d854672174790bd624dfee1416450ccef66434a,2024-11-21T09:47:35.690000 @@ -271354,7 +271355,7 @@ CVE-2024-54440,0,0,9b88f7d99cecca6e6d64d74e7bc4b9afd66c4a9b5857582e450bf8ac5f697 CVE-2024-54441,0,0,4998045381787fcc4b3ba91881da0472af2407cb6b3b4e86c69cbecd8e8e1ec5,2024-12-16T15:15:23.130000 CVE-2024-54442,0,0,4654114cbbe36af251b0a17ca273aa4c42991899ac7df3d541352dc363b8b95d,2024-12-16T15:15:23.273000 CVE-2024-54443,0,0,a19735fa20af88aa6b80d25f5f3fba13bc36980cd33611fe0939754004239647,2024-12-16T15:15:23.420000 -CVE-2024-5445,0,1,c40580d53f9b682d94099117e69022274091b9acdf334d268d23808d911785d3,2025-01-07T20:15:30.600000 +CVE-2024-5445,0,0,c40580d53f9b682d94099117e69022274091b9acdf334d268d23808d911785d3,2025-01-07T20:15:30.600000 CVE-2024-54450,0,0,3b0637c895cf32b1c321f76a19a44544a10628e30551ed123328bb004ad742a1,2024-12-28T19:15:07.103000 CVE-2024-54451,0,0,62bfea464680a36276017f91bb5ae11f8712be2380f4e61a47de9850848009b7,2024-12-28T19:15:07.340000 CVE-2024-54452,0,0,30db43977a4bb0060f4301184eef5e7e4316f5a66e91aba57b8474d2cdaf07d1,2024-12-28T19:15:07.570000 @@ -271439,8 +271440,8 @@ CVE-2024-54749,0,0,2c9d895fdb5b90a3967a9403130c1863e1d8648bd0343f58138b0aee4bfec CVE-2024-5475,0,0,3f93fbbe9009c236ea2c6da72827f7bd871ace2e1ffd3b439453d8900914ef7f,2024-11-21T09:47:45.480000 CVE-2024-54750,0,0,a2b9bd793ac60105835f796550f4eca54ad7139b40ad2fdf283a28d5ab7647fe,2024-12-09T23:15:34.020000 CVE-2024-54751,0,0,1362ae63d46fa3e6e13ddf6e48994d99d3189782d67a09cf0bde552f8a9a1b0f,2024-12-11T16:15:14.910000 -CVE-2024-54763,0,0,569e1b003ff4063f8b2d3c6abf3b92c3cfcf659be7b3e8d47a113001dd609ca8,2025-01-06T22:15:10.737000 -CVE-2024-54764,0,0,209c75bf142c690be0633df50e11eea12bb8b77d1b813f37310e8ad2ef7f5122,2025-01-06T23:15:06.510000 +CVE-2024-54763,0,1,a28abc0036bf5dd37db3abf51504ee9d8814d71bd02efc1ca179d108a93c5f59,2025-01-07T22:15:30.950000 +CVE-2024-54764,0,1,a35d44940374d4d013f3417b0c39eadc28db9efc4fa6d67b447b188437088daa,2025-01-07T22:15:31.113000 CVE-2024-54767,0,0,7c02cf0b0d6cbdcad4d274fa0bc8d056590e80886a47139f828b2d63cc3bf859,2025-01-07T16:15:36.157000 CVE-2024-54774,0,0,4ed84230e45b966235391401edd82584405ef683a3e2fc4ff18ea7ccdbfb6480,2024-12-28T18:15:10.397000 CVE-2024-54775,0,0,3fdaf8fe1f78335459cdc17721da7bdc51023f16b45ae3c005b68536d3244569,2024-12-28T17:15:07.733000 @@ -271451,7 +271452,7 @@ CVE-2024-5480,0,0,dcddee05a122e48deec7dd054d03a98cfc3767234733af70ab63ade3136481 CVE-2024-5481,0,0,6aaa03c1e132f74e5c4e90ead29bd24eb7065ad2c73e1f2805fbc82099451674,2024-11-21T09:47:45.877000 CVE-2024-54810,0,0,98b1b32485df996df7d9929d6a4a4f3f6576d87de7e3a8405b0f88648f287e10,2024-12-13T18:15:21.707000 CVE-2024-54811,0,0,c518d2be0055f2f694c9ca48885a5257eabcc0287b36c8555688778fe5e578d7,2024-12-13T18:15:21.940000 -CVE-2024-54819,1,1,77d4e85444047de3840d61f4b59305e5e917055110df4f1b974d9ad2c652c4a3,2025-01-07T20:15:30.197000 +CVE-2024-54819,0,0,77d4e85444047de3840d61f4b59305e5e917055110df4f1b974d9ad2c652c4a3,2025-01-07T20:15:30.197000 CVE-2024-5482,0,0,201df0de22cd2de6baef389275fa06366007791ec5f711f789012d102cd7d319,2024-11-21T09:47:46.010000 CVE-2024-5483,0,0,079d428e5ef1f2457bdcfb946982be872b42b40e94b6bfbc28ab3fe49f413326,2024-11-21T09:47:46.130000 CVE-2024-5484,0,0,b3b185b98c733a0f4717de1a808b2127ff5f3061f156212c34336d217a368118,2024-05-31T11:15:09.783000 @@ -271459,9 +271460,9 @@ CVE-2024-54842,0,0,ccaf3a44f3596e593a08308e4797efa5052c648d3a0bb0b78b9bc5f97386b CVE-2024-5485,0,0,f687486069d8da51bc217d8f3c1b4f2cb223a1d0f0b0390694d1cbb1988c70fb,2024-11-21T09:47:46.253000 CVE-2024-5486,0,0,6dfb8e6d8cb1d8bab5afe16e5d1d045c354e9fc780a2307ae97dd3f4b30153b6,2024-11-21T09:47:46.367000 CVE-2024-5487,0,0,9fbfbc79e6dff8c3b550139a3c2eecf9b7c4bdde8704bc6cfe1f3d5f4415c8a9,2024-08-16T20:22:51.930000 -CVE-2024-54879,0,0,fc78c87ad890a14f75e2c419893ddaa2e8d27d4e1393b3bb787cf2908e1ca68d,2025-01-06T18:15:21.880000 +CVE-2024-54879,0,1,b29885c9d1f972b1a85e410837486f9a5cbdaaa5454176171e37cc430fed9212,2025-01-07T21:15:12.170000 CVE-2024-5488,0,0,703a569b98e6f1a8130cee58df129e22e6ef47912a99f32d5a452e25c6109519,2024-11-21T09:47:46.633000 -CVE-2024-54880,0,0,19b90b651153de387978c7aca82ad8b353028b1b94f86a0a639ec1980415ed4a,2025-01-06T18:15:22.037000 +CVE-2024-54880,0,1,e5b3a5485624ea2d9e12e0827ea5724e74a008cbdfa4830f07e177ce5a2b6b3e,2025-01-07T21:15:12.367000 CVE-2024-5489,0,0,6c00a6a2badf83516471ea1d81b619bbe482cb4a54de89ffa7bd06f7fa1ffabd,2024-11-21T09:47:46.807000 CVE-2024-5490,0,0,7e66a0f19af78ba5ab311e474f6c7a834b406cb5857b42d263e55e1190767452,2024-08-27T14:36:10.033000 CVE-2024-54907,0,0,80a392b1154d757e3dee13d617bee74a64b3baf8f41f4c6bebbb399698b18a69,2024-12-26T20:15:21.800000 @@ -271541,7 +271542,7 @@ CVE-2024-5519,0,0,8f24512a902c7b13458f945742cb7fe1d59be3b3655c7a61619611df90263e CVE-2024-55196,0,0,967b3e10360837eff90c3277f4028e12b0cc2c527c2b826781915311e274c9a4,2025-01-02T20:16:06.017000 CVE-2024-5520,0,0,2719a0027800a6c03c5991cd5e32370933ecb1de4c1c57d912093caa874b1ac4,2024-11-21T09:47:51.540000 CVE-2024-5521,0,0,2b6f458ccb1380159b254eccc510c8e2cee9041e86f89c2477b6805e666cde62,2024-11-21T09:47:51.653000 -CVE-2024-55218,1,1,92ce18e45b29c67c1b6a0fd63b59f7bd9743f1e01e7df6cfb7d6037be0245171,2025-01-07T20:15:30.310000 +CVE-2024-55218,0,0,92ce18e45b29c67c1b6a0fd63b59f7bd9743f1e01e7df6cfb7d6037be0245171,2025-01-07T20:15:30.310000 CVE-2024-5522,0,0,df1bc4811acd8877854299da044a99554378b9c2498586ce956f30305786dd34,2024-11-21T09:47:51.770000 CVE-2024-5523,0,0,0b2c43ef384781b0113b9be6f2b000f9de2199a81d337c7e51164ef3b409e6ae,2024-11-21T09:47:51.940000 CVE-2024-55231,0,0,bc333f6409b44ab3c99000a12bad2fde8a29ce447ecd07b39a700d49ee237739,2024-12-26T20:15:22.363000 @@ -271564,9 +271565,9 @@ CVE-2024-5536,0,0,1f54d5f4d84e17ea150621a726d470a096ebe102b1b2c9727888baf5a5215c CVE-2024-5537,0,0,dc964262ed4087ff313c4be3be100753a858d893c6319a531383572e591004b1,2024-05-30T17:15:34.583000 CVE-2024-5538,0,0,349018b8a831720930f224f86428ace57b32dfb3177832784fb8b5e53a9e5993,2024-05-31T11:15:09.923000 CVE-2024-55407,0,0,556b85e1087b7070a9c561b1629c1e863de59c432206201377d38b83402acd89,2025-01-07T16:15:36.480000 -CVE-2024-55408,0,0,ab1bcbfb27fd1483d3ffbbb7fd6604f52d3a36813a1b039bd2c2b2c31076a008,2025-01-06T19:15:13.010000 +CVE-2024-55408,0,1,f29d22484915f373690eb82371db4cff76b365f8201325c0d76b3e731d67ff58,2025-01-07T22:15:31.260000 CVE-2024-5541,0,0,f9b4d455e6b62fc87b5177b190c5e5d55cffd60f56e01c7f957c7d36f3e08c46,2024-11-21T09:47:53.453000 -CVE-2024-55410,0,0,f21bc15ce65427de3d1568f279150edcc6469479003174eee745e0690e31a73c,2025-01-07T18:15:20.387000 +CVE-2024-55410,0,1,a341b2a61f8dc44291b67917ab046b0ca56af6f84ecbeba25576f5a2ddd34b5b,2025-01-07T22:15:31.423000 CVE-2024-55411,0,0,1aaefe335c6784c1c51d968334cc18ae747aab41b366982bf94b394b831a6ba0,2025-01-07T18:15:20.543000 CVE-2024-55412,0,0,17b18ba76fae98112f34a2a804fb362110fc4f134e23a208e67528a65fb8dd1c,2025-01-07T18:15:20.700000 CVE-2024-55413,0,0,b1d11b4cd0e66963e957801a3a382988999f51eced77f066473c6ac9888be3ce,2025-01-07T18:15:20.843000 @@ -271616,7 +271617,7 @@ CVE-2024-5555,0,0,742073dac4de00aad4cb6df58c8d366b01298901468c1f8f2b3d987b013951 CVE-2024-55550,0,0,f14b09989fc33e9668bd77f32e52a61daf63a823657985b5bd0cda5251e19e1b,2025-01-07T16:15:36.660000 CVE-2024-55553,0,0,3bc316f0af4b80bc58ae910e6172da9ff5010fe0b778c5270df43d1041706470,2025-01-07T16:15:36.840000 CVE-2024-55554,0,0,09e3cdaa4a820daeb6598bb5a8faaf533e66285f3e6a4797b593c193d2a0933a,2024-12-17T17:15:09.843000 -CVE-2024-55555,0,1,0fff864cbeb4400bcfcde3625f1f4cf98f881f2b9aba59b727db3372655bde9e,2025-01-07T20:15:30.430000 +CVE-2024-55555,0,0,0fff864cbeb4400bcfcde3625f1f4cf98f881f2b9aba59b727db3372655bde9e,2025-01-07T20:15:30.430000 CVE-2024-55556,0,0,f6240e3c75d02dffd25d8327c36b48f04ddfbf6dc1d3897c46320c15b6f0b8d9,2025-01-07T16:15:37.017000 CVE-2024-55557,0,0,1c44f970be9c9162e2fd5fa3f9e1778bc69c31c3d5707dcbd0caa2e430754ba4,2024-12-17T16:15:25.900000 CVE-2024-5556,0,0,f573f07f74091c9ef49ab63e55c790d8f661c071a22a95c82ecfdf6c6886287c,2024-08-27T14:36:53.273000 @@ -272271,25 +272272,25 @@ CVE-2024-56724,0,0,cc2f7e3f8dc8d55c1d83c89cb0d90d388267abaf43e50a6614a9271f4c553 CVE-2024-56725,0,0,0d8c143455dd4c74ade00023de074d019020f9329ec8ea40eab7f04748540c97,2024-12-29T12:15:06.607000 CVE-2024-56726,0,0,7396cabb8e6cb5316a0d2b902b918bc1194670ee7afa660cbe82cee81253f4d0,2025-01-06T17:10:17.110000 CVE-2024-56727,0,0,eabc494dc2a4c2aa78fd4293bd969b774f7d696451c6d2e61e97848894874fc8,2025-01-06T17:09:19.120000 -CVE-2024-56728,0,0,f2ee93b21b4b586bc43bd7afb5d904413b46e64426b9c99ca422b148a3d36cd2,2024-12-29T12:15:06.920000 -CVE-2024-56729,0,0,571aff2aa5aff270b4fb31202621677957065bb98def964761742ced7d4824aa,2024-12-29T12:15:07.023000 +CVE-2024-56728,0,1,9876b31ab8f2f62b05d07e7b6cd6963d4d5c3e44378c964e0a90a0aa79c2c6a4,2025-01-07T22:03:07.837000 +CVE-2024-56729,0,1,2c6c814be3178fdefbbd68f1fd2794002dcc90cc7683b20479607fb1bf1edf8f,2025-01-07T21:53:02.797000 CVE-2024-5673,0,0,f8b3774ce465f722b68e8727929e95d8d546e4b203a41a4244c7e4dffeee7a73,2024-11-21T09:48:08.057000 -CVE-2024-56730,0,0,d4ab7ba34f47b3c80faa3ea378d4e530ba63a506a38d471fc2d560e5e085df7c,2024-12-29T12:15:07.130000 +CVE-2024-56730,0,1,c59cea0a90fbb10c7538383a1832b8ca0fc27e087a27113d6586256c0bdb2474,2025-01-07T21:23:52.260000 CVE-2024-56732,0,0,12847f4e6541904299057a6dbcce9d9b25d11860494767f53e7fa399998c84f1,2024-12-28T17:15:08.190000 CVE-2024-56733,0,0,c2474ef73dd56102a08444876977f4dc5534d1c12671d5b5a9d94af958afe92a,2024-12-30T17:15:09.990000 CVE-2024-56734,0,0,6427d02d23c640a3b0eb03146808f06ca7a42e16ade66d98d53142a7e6b8af94,2024-12-30T17:15:10.133000 CVE-2024-56737,0,0,c3aaf99c36c23af464a66c062701c19603d594053e6f3cc8853149bf45f4a8bd,2024-12-31T19:15:48.200000 CVE-2024-56738,0,0,2c6e7a0135dc52aa66f71228f9c31faaeccb71b3032abf4849b70327f1510fa7,2024-12-31T19:15:48.367000 -CVE-2024-56739,0,0,f80ccd01e5b96edf6d42a3a4590df490095fd6315b9dd1db6f820fa259aaf3d8,2024-12-29T12:15:07.240000 +CVE-2024-56739,0,1,4f6c09aecb431282e0adb0614c417ec109730556bc26b8429f533744c616ad23,2025-01-07T21:21:31.403000 CVE-2024-5674,0,0,7c06c249e0424ac37040b124ed7da9cd19cf8f5ce54c37fa3d48f3eda72c297e,2024-11-21T09:48:08.183000 -CVE-2024-56740,0,0,970f96c10afe908de18d5b77a72b07ed862320da335a222ff91b647a2085663b,2024-12-29T12:15:07.360000 -CVE-2024-56741,0,0,8a8e29421262cd89391f600f1f520508dd3ace7141d73bbd71e301e892894031,2024-12-29T12:15:07.477000 -CVE-2024-56742,0,0,3f7cc17d3d11087cf1a22cdfe78fd5f93bb210dba8f43bf7710333d10c715afa,2024-12-29T12:15:07.593000 -CVE-2024-56743,0,0,fd1d7f8f83191d685ddc5a9db1e22ba4af3166df243bf9d72d013e5b4ebbc13a,2024-12-29T12:15:07.707000 -CVE-2024-56744,0,0,4fb6fc62444e03b4b24149d4d01a77f456dd95cbd7c45472910876c848ac5814,2024-12-29T12:15:07.817000 -CVE-2024-56745,0,0,b40e135615f262de3724a7319b7081ad59bcb8e0361d7744019371cf8598c258,2024-12-29T12:15:07.937000 -CVE-2024-56746,0,0,172916252a614d41841f536ebea02633e8a1f1bfa89d3eaf7c619c78078148c2,2024-12-29T12:15:08.070000 -CVE-2024-56747,0,0,2a3930adda2877ad219cae5ca5ac16a65b8c270ff5f76553f4625cfaba043f13,2024-12-29T12:15:08.183000 +CVE-2024-56740,0,1,70a50e80e6a90e1d35505246d853ee996c83b7e5576c2651235f05a5725944be,2025-01-07T22:24:05.593000 +CVE-2024-56741,0,1,dcf196bf2d7138300d9a677a8269cf2fb8625e786235ea6d7c80e1132d68ca46,2025-01-07T22:19:45.437000 +CVE-2024-56742,0,1,7deb9b2a167beb7a8fcf4db04a7950563fb235559121cc799b8c4190eed913e3,2025-01-07T22:19:23.543000 +CVE-2024-56743,0,1,9cd4347068d20096e4006ddd9eca348a120014b53b656235516fbac8cd02e397,2025-01-07T22:18:53.437000 +CVE-2024-56744,0,1,e47e8659c23e341e004881aab280fa7f5c55f47327c4604d9dc68615ed6fc1b1,2025-01-07T22:14:03.760000 +CVE-2024-56745,0,1,63922d0f7bf521e7f76f6c3a463c694c1c6303a11796dc8693d9ac5885cd14d0,2025-01-07T22:47:40.577000 +CVE-2024-56746,0,1,abfb409172a5eaa28b9deb47330deb20a292000d0ed88feaa21e3baad05a4b65,2025-01-07T22:47:17.513000 +CVE-2024-56747,0,1,3e977f3bc0634213a2f3d8a798976445c5102bef7095b0a437529ad2ef079a3d,2025-01-07T22:47:01.040000 CVE-2024-56748,0,0,fb30b675e7357a581772e704fd8acef36fd2795661d5099b6926a52f72af7d5d,2025-01-06T17:07:33.423000 CVE-2024-56749,0,0,b0b97a777278ac5c6701ceeeaf8bc5407c17231b9cae6f5871f8fe89d39b5886,2025-01-06T17:06:18.380000 CVE-2024-5675,0,0,a93ae1d48690177c193b4a8fbcc4865158a63f066f83c2c6531b88eed5564aca,2024-11-21T09:48:08.303000 @@ -272300,8 +272301,8 @@ CVE-2024-56753,0,0,6bf8e7013af143083f591269ccf18926bfd2ae2511b74d6745979c86af90b CVE-2024-56754,0,0,0719ef5595d01f11c4fdd47e3e22b1fc21ab1d413809f498383df6b132d482c4,2025-01-06T20:28:24.853000 CVE-2024-56755,0,0,205ce7afe96425c287c52b7a72e2ff26171d854700f3cf3d8f25e737abb82fe4,2025-01-06T20:26:39.200000 CVE-2024-56756,0,0,bd03068cc43b4cd3609b9bb8866c84806441d6e0d20095ddeda56dff7ba7d05a,2025-01-06T20:33:10.813000 -CVE-2024-56757,0,0,a9cabd1b9e3bc1032f2ed13919426c61c9c36a86caef86a70fb68faf6d2329dd,2025-01-06T17:15:40.297000 -CVE-2024-56758,0,0,9dd0a642ae784b8676a7d7ad81b5dd7fc5ec0a04511ef1500ac70b82cc63466f,2025-01-06T17:15:40.597000 +CVE-2024-56757,0,1,46c6c9ed6516d3e8d957dd15e681278f460a9b87f55fe95de169dcd9aa1996fa,2025-01-07T22:46:35.897000 +CVE-2024-56758,0,1,2c55925c10785ee32a5bb0aa9138d84e7f9119c83900c2491032df52cfe48084,2025-01-07T22:43:35.403000 CVE-2024-56759,0,0,51a4d69e473c95c2503d056afe5ba878b3c1df07567e3048365baf01598b1c06,2025-01-06T17:15:40.900000 CVE-2024-5676,0,0,42e21ca7cdab0bdccf25cf6637d45fef7f036494b6d014c88b5835e6e4847379,2024-11-21T09:48:08.420000 CVE-2024-56760,0,0,2125177c83e1cff8a660b64e56488eda9a1564eb230e3213cd7e7d6e709ec7af,2025-01-06T17:15:41.173000 @@ -272310,10 +272311,10 @@ CVE-2024-56762,0,0,60cbcc45f06c16ba0161fce9430eab44b47458e705e9b29759993ec95842a CVE-2024-56763,0,0,5a5e00ab0150e4c9f23d35d9c1a4efb51410e8b448d4cbf3a876661bb5e810ab,2025-01-06T17:15:42.150000 CVE-2024-56764,0,0,91b72a2ccbced4a7c9f79beaf4b327a4d43d7e0f7fa40f1c959b20a384ea4c3d,2025-01-06T17:15:42.483000 CVE-2024-56765,0,0,2f958432f7b5e0953f9bb292214ab20c0363a79c8806ec0afc9fc2b493a5e4c0,2025-01-06T17:15:42.800000 -CVE-2024-56766,0,0,bf389ecd458f82d208b3fe6ac0e0cd9630e655e25369cc4984a2771492afc836,2025-01-06T17:15:43.127000 -CVE-2024-56767,0,0,b14fc64b14624303f26256201fa2e15ffbb1d3fd68d803b6f403b8d6eda55f4a,2025-01-06T17:15:43.477000 -CVE-2024-56768,0,0,2711975874778288d04f9537752ffd5439cccd65a5b6b2082bec18e66e19f912,2025-01-06T17:15:43.800000 -CVE-2024-56769,0,0,0353fe7a008f689293e1a78ceaf4d2240ef571b6dfbe38e9939db5ac8e335c84,2025-01-06T17:15:44.063000 +CVE-2024-56766,0,1,44ccd5c116ae5f54c7fa640969bae2c9a2fd2beb0cf248edd7acf2adcb614ef6,2025-01-07T22:59:50.807000 +CVE-2024-56767,0,1,d69c719ff44c9bc26c1f6b95810e7e5be266383e1fa4b4ba2c15f5c845d552e2,2025-01-07T22:51:02.250000 +CVE-2024-56768,0,1,d8373e0dbf214f4feec34d3f904be6536bfb761175850928b1ed7e4f24a9c3b7,2025-01-07T22:50:43.207000 +CVE-2024-56769,0,1,e75774dddc9639ce3f1ef9c47d4ccb2bed68d565027bcdd2f05bc827ccd14b56,2025-01-07T22:49:54.483000 CVE-2024-5677,0,0,1c94c489b32a2f3740f8b8867e0aff380d1e56445098bb97785a4bdba0037977,2024-11-21T09:48:08.540000 CVE-2024-5678,0,0,bb4133b16eab99226f567cd512e0bec4d1a7175fc845cb5a8a3e18dcdbfd75d7,2024-08-15T18:05:54.847000 CVE-2024-5679,0,0,dc654eef86d673e662acc6dfc1ecb27b2f541880d76227d1d93861f825adc641,2024-11-21T09:48:08.710000 @@ -276027,7 +276028,7 @@ CVE-2025-0211,0,0,b9d423ddc7f5d7131d18e0c6e82ffdb0d7d511a9f93fbce8fd485a1054d607 CVE-2025-0212,0,0,4580d93240903455f5f37037363ed2ecac8e5e965bf219492073a30508f06c44,2025-01-04T16:15:23.003000 CVE-2025-0213,0,0,ae6082586b13f3a0897a3a0c9bb93f3136f000a55537ffc29cc265d27526ea6d,2025-01-04T17:15:06.743000 CVE-2025-0214,0,0,9254508d81ea0b82f0019bc7737a4434f0760310a24cc79081ad4facc4fcf53a,2025-01-04T17:15:07.507000 -CVE-2025-0218,1,1,b30dc9959db76bbe16cbb2687253a109c8d9824f5a519b4a12cebcd5992ce308,2025-01-07T20:15:30.710000 +CVE-2025-0218,0,0,b30dc9959db76bbe16cbb2687253a109c8d9824f5a519b4a12cebcd5992ce308,2025-01-07T20:15:30.710000 CVE-2025-0219,0,0,74ca1a5c2e45573606f215442248239c1abebb58720b73e72827cf6185a790f0,2025-01-05T06:15:05.183000 CVE-2025-0220,0,0,e2a1de80227234e2ee0ad6599c3e6137c8cd2931a8e4558632166ff8d1637d7a,2025-01-05T13:15:05.850000 CVE-2025-0221,0,0,bf2d1013ca5e346bb2f023d267f8796cd36ff872dcfd00def4c61e9ac89e1567,2025-01-05T15:15:17.473000 @@ -276059,7 +276060,7 @@ CVE-2025-0295,0,0,52a16028421d06d344a294c38baeb65e7eade91eddca5850ff08cb460a814e CVE-2025-0296,0,0,ef99994aa0e927283601f299ff2a2a7b6828140dc06395bd45961df4e93495db,2025-01-07T16:15:39.673000 CVE-2025-0297,0,0,e6df0dbc25b69f65f6585e2723e6f83d60a4cc3da33516aa4da5024622d55482,2025-01-07T16:15:39.887000 CVE-2025-0298,0,0,ec923ed4b9b6afa6228d656ddb0c601f5ebbf31d02abf4f38a99c8dda70d2f64,2025-01-07T17:15:31.770000 -CVE-2025-0299,0,1,46c993a70c9dd5843cd4dc3486123b8f79f076cb607c745df442454088b3fb74,2025-01-07T19:15:34.743000 +CVE-2025-0299,0,0,46c993a70c9dd5843cd4dc3486123b8f79f076cb607c745df442454088b3fb74,2025-01-07T19:15:34.743000 CVE-2025-0300,0,0,6462b093b202cdda5c643638789beb08104cb14d8ff95eb1f2f740fecb0f8630,2025-01-07T17:15:32.090000 CVE-2025-0301,0,0,db7e09db06a3c89075ef99c6e0773ce8d9b6391802870d788b13b4dc1d994dbc,2025-01-07T18:15:21.460000 CVE-2025-21604,0,0,ec728601eba6bd539d6daf316c2c18ea930a896bd5f0099ef67fb1e9d57f3d64,2025-01-06T16:15:30.927000 @@ -276077,6 +276078,8 @@ CVE-2025-21620,0,0,66289b3b3f28df54a495a49470b309f007a7b7fd72e39a3c6fd58a9e688ab CVE-2025-21622,0,0,6c5785ebf77d1798b874aaffe451a58c4a37257af0382e9b593172ad9a04e2cc,2025-01-07T18:15:21.703000 CVE-2025-21623,0,0,6087933d996aad8edaafac7f0dbca82dce0a66add1f565d4e48b576d3a77cbb8,2025-01-07T17:15:32.313000 CVE-2025-21624,0,0,48317da35eed5453ecdf02e6a373b353bc1bb2bc0793e255b08a0ed1235e3ac9,2025-01-07T17:15:32.417000 +CVE-2025-22132,1,1,68d348d844ec3947f7795605dbc0f9b5ea1e9ec0bb464d07ae2fd1571ba27a37,2025-01-07T22:15:31.590000 +CVE-2025-22133,1,1,c3c09e89206d0579374bc72133ed0f9fade2e2e60ff10357f2761c25411f1f67,2025-01-07T22:15:31.740000 CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000 CVE-2025-22261,0,0,b64f32ab7c14edb8b70371073baa276f94f41977fffad6128d5b8c7f32ae4fb7,2025-01-07T11:15:13.290000 CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000