Auto-Update: 2024-12-11T15:00:46.621510+00:00

This commit is contained in:
cad-safe-bot 2024-12-11 15:04:10 +00:00
parent 76426896dd
commit e32be85f02
20 changed files with 1558 additions and 158 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-46958",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-27T19:04:06.813",
"lastModified": "2024-11-21T06:35:01.890",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-11T14:43:21.320",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,131 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: corrige la ejecuci\u00f3n entre transacciones abortadas y fsyncs que conducen a use-after-free. Hay una carrera entre una tarea que aborta una transacci\u00f3n durante un commit, una tarea que realiza una fsync y la transacci\u00f3n. kthread, lo que conduce a un use-after-free del \u00e1rbol ra\u00edz del registro. Cuando esto sucede, se genera un seguimiento de pila como el siguiente: Informaci\u00f3n BTRFS (dispositivo dm-0): solo lectura forzada Advertencia BTRFS (dispositivo dm-0): omitir confirmaci\u00f3n de transacci\u00f3n abortada. BTRFS: error (dispositivo dm-0) en cleanup_transaction:1958: errno=-5 falla de IO Advertencia de BTRFS (dispositivo dm-0): escritura de p\u00e1gina perdida debido a un error de IO en /dev/mapper/error-test (-5) BTRFS Advertencia (dispositivo dm-0): omitir confirmaci\u00f3n de transacci\u00f3n abortada. Advertencia BTRFS (dispositivo dm-0): IO directa fall\u00f3 en 261 rw 0,0 sector 0xa4e8 len 4096 err no 10 Error BTRFS (dispositivo dm-0): error al escribir el superbloque primario en el dispositivo 1 Advertencia BTRFS (dispositivo dm-0) : error de IO directo ino 261 rw 0,0 sector 0x12e000 len 4096 err no 10 advertencia BTRFS (dispositivo dm-0): error de IO directo ino 261 rw 0,0 sector 0x12e008 len 4096 error no 10 advertencia BTRFS (dispositivo dm-0) : error de IO directo ino 261 rw 0,0 sector 0x12e010 len 4096 error no 10 BTRFS: error (dispositivo dm-0) en write_all_supers:4110: errno=-5 error de IO (1 error al escribir supers) BTRFS: error (dispositivo dm -0) en btrfs_sync_log:3308: errno=-5 Fallo de E/S Fallo de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0x6b6b6b6b6b6b6b68: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC PTI CPU: 2 PID: 2458471 Comm: fsstress Not tainted 5.12.0- rc5-btrfs-next-84 #1 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 01/04/2014 RIP: 0010:__mutex_lock+ 0x139/0xa40 C\u00f3digo: c0 74 19 (...) RSP: 0018:ffff9f18830d7b00 EFLAGS: 00010202 RAX: 6b6b6b6b6b6b6b68 RBX: 0000000000000001 RCX: 00000000000000002 RD X: ffffffffb9c54d13 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffff9f18830d7bc0 R08: 00000000000000000 R09: 0000000000000000 R10: ffff9f18830d7be0 R11: 0000000000000001 R12: ffff8c6cd199c040 R13: ffff8c6c95821358 R14: 00000000fffffffb R15: ffff8c6cbcf01358 FS: 00007fa9140c2b 80(0000) GS:ffff8c6fac600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fa913d52000 CR3: 000000013d2 b4003 CR4 : 0000000000370ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 00000000000000000 DR6: 00000000fffe0ff0 DR7: 000000 0000000400 Rastreo de llamadas: ? __btrfs_handle_fs_error+0xde/0x146 [btrfs] ? btrfs_sync_log+0x7c1/0xf20 [btrfs]? btrfs_sync_log+0x7c1/0xf20 [btrfs] btrfs_sync_log+0x7c1/0xf20 [btrfs] btrfs_sync_file+0x40c/0x580 [btrfs] do_fsync+0x38/0x70 __x64_sys_fsync+0x10/0x20 do_syscall_64+ 0x33/0x80 Entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fa9142a55c3 C\u00f3digo : 8b 15 09 (...) RSP: 002b:00007fff26278d48 EFLAGS: 00000246 ORIG_RAX: 000000000000004a RAX: ffffffffffffffda RBX: 0000563c83cb4560 RCX: 00007fa9142a55c 3 RDX: 00007fff26278cb0 RSI: 00007fff26278cb0 RDI: 0000000000000005 RBP: 0000000000000005 R08: 000000000000000001 R09: 00007fff26278d5c R10: 0 000000000000000 R11: 0000000000000246 R12: 0000000000000340 R13: 00007fff26278de0 R14: 00007fff26278d96 R15: 0000563c83ca57c0 M\u00f3dulos vinculados en: btrfs dm_zero dm_snapshot dm _thin_pool (...) ---[ end trace ee2f1b19327d791d ]--- Los pasos que conducen a este bloqueo son los siguientes: 1) Estamos en la transacci\u00f3n N; 2) Tenemos dos tareas con un identificador de transacci\u00f3n adjunto a la transacci\u00f3n N. Tarea A y Tarea B. La tarea B est\u00e1 realizando una sincronizaci\u00f3n f; 3) La tarea B est\u00e1 en btrfs_sync_log() y ha guardado fs_info->log_root_tree en una variable local llamada 'log_root_tree' en la parte superior de btrfs_sync_log().---truncado---"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/061dde8245356d8864d29e25207aa4daa0be4d3c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/633f7f216663587f17601eaa1cf2ac3d5654874c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/a4794be7b00b7eda4b45fffd283ab7d76df7e5d6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/e2da98788369bfba1138bada72765c47989a4338",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/061dde8245356d8864d29e25207aa4daa0be4d3c",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/633f7f216663587f17601eaa1cf2ac3d5654874c",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/a4794be7b00b7eda4b45fffd283ab7d76df7e5d6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/e2da98788369bfba1138bada72765c47989a4338",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.7",
"versionEndExcluding": "5.10.36",
"matchCriteriaId": "C6E35DB7-8D08-44A4-88FE-9B73324500C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.11.20",
"matchCriteriaId": "EEC03413-9760-46D4-AC1D-EB084A1D4111"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.3",
"matchCriteriaId": "F9D6B2DE-7E4A-4B3B-9AEE-3A2C5F23DA32"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/061dde8245356d8864d29e25207aa4daa0be4d3c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/633f7f216663587f17601eaa1cf2ac3d5654874c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a4794be7b00b7eda4b45fffd283ab7d76df7e5d6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e2da98788369bfba1138bada72765c47989a4338",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/061dde8245356d8864d29e25207aa4daa0be4d3c",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/633f7f216663587f17601eaa1cf2ac3d5654874c",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a4794be7b00b7eda4b45fffd283ab7d76df7e5d6",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e2da98788369bfba1138bada72765c47989a4338",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-46960",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-27T19:04:06.860",
"lastModified": "2024-11-21T06:35:02.180",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-11T14:47:28.957",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,63 +15,194 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: devuelve el c\u00f3digo de error correcto de smb2_get_enc_key Evite una advertencia si el error se repite: [440700.376476] CIFS VFS: \\\\otters.example.com crypt_message: no se pudo obtener la clave de cifrado [440700.386947] ------------[ cortar aqu\u00ed ]------------ [440700.386948] err = 1 [440700.386977] ADVERTENCIA: CPU: 11 PID: 2733 en / build/linux-hwe-5.4-p6lk6L/linux-hwe-5.4-5.4.0/lib/errseq.c:74 errseq_set+0x5c/0x70 ... [440700.397304] CPU: 11 PID: 2733 Comm: tar Contaminado: G OE 5.4.0-70-generic #78~18.04.1-Ubuntu... [440700.397334] Seguimiento de llamadas: [440700.397346] __filemap_set_wb_err+0x1a/0x70 [440700.397419] cifs_writepages+0x9c7/0xb30 [cifs ] [440700.397426] do_writepages+0x4b /0xe0 [440700.397444] __filemap_fdatawrite_range+0xcb/0x100 [440700.397455] filemap_write_and_wait+0x42/0xa0 [440700.397486] cifs_setattr+0x68b/0xf30 [cifs] [440700.39749 3] notify_change+0x358/0x4a0 [440700.397500] utimes_common+0xe9/0x1c0 [440700.397510] do_utimes+ 0xc5/0x150 [440700.397520] __x64_sys_utimensat+0x88/0xd0"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/83728cbf366e334301091d5b808add468ab46b27",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/93f3339b22ba17e66f0808737467b70ba087eaec",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/aaa0faa5c28a91c362352d6b35dc3ed10df56fb0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/b399c1a3ea0b9d10047ff266d65533df7f15532f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e486f8397f3f14a7cadc166138141fdb14379a54",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e94851629c49c65b4fbb29a5725ddfd7988f8f20",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f59a9242942fef0de7b926e438ba4eae65d4b4dd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/83728cbf366e334301091d5b808add468ab46b27",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/93f3339b22ba17e66f0808737467b70ba087eaec",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/aaa0faa5c28a91c362352d6b35dc3ed10df56fb0",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/b399c1a3ea0b9d10047ff266d65533df7f15532f",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/e486f8397f3f14a7cadc166138141fdb14379a54",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/e94851629c49c65b4fbb29a5725ddfd7988f8f20",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/f59a9242942fef0de7b926e438ba4eae65d4b4dd",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.11",
"versionEndExcluding": "4.14.233",
"matchCriteriaId": "3CEB4F43-643B-4BF2-BC3B-FB797EC75463"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.191",
"matchCriteriaId": "5B6E6817-19A8-4C0A-8807-71DA48CF9191"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.118",
"matchCriteriaId": "C83F5505-AF9D-4F2A-8D37-A8EB73ED772D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.36",
"matchCriteriaId": "003E22D0-CA29-4338-8B35-0754C740074F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.11.20",
"matchCriteriaId": "EEC03413-9760-46D4-AC1D-EB084A1D4111"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.3",
"matchCriteriaId": "F9D6B2DE-7E4A-4B3B-9AEE-3A2C5F23DA32"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/83728cbf366e334301091d5b808add468ab46b27",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/93f3339b22ba17e66f0808737467b70ba087eaec",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/aaa0faa5c28a91c362352d6b35dc3ed10df56fb0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b399c1a3ea0b9d10047ff266d65533df7f15532f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e486f8397f3f14a7cadc166138141fdb14379a54",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e94851629c49c65b4fbb29a5725ddfd7988f8f20",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f59a9242942fef0de7b926e438ba4eae65d4b4dd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/83728cbf366e334301091d5b808add468ab46b27",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/93f3339b22ba17e66f0808737467b70ba087eaec",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/aaa0faa5c28a91c362352d6b35dc3ed10df56fb0",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b399c1a3ea0b9d10047ff266d65533df7f15532f",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e486f8397f3f14a7cadc166138141fdb14379a54",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e94851629c49c65b4fbb29a5725ddfd7988f8f20",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f59a9242942fef0de7b926e438ba4eae65d4b4dd",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-46961",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-27T19:04:06.907",
"lastModified": "2024-11-21T06:35:02.310",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-11T14:49:59.620",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,47 +15,152 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: irqchip/gic-v3: no habilitar irqs cuando se manejan interrupciones espurias. Activamos el siguiente error al ejecutar nuestro kernel 4.19 con los parches pseudo-NMI respaldados: [14.816231] - -----------[ cortar aqu\u00ed ]------------ \u00a1ERROR del kernel [14.816231] en irq.c:99! [14.816232] Error interno: Ups - ERROR: 0 [#1] SMP [14.816232] Intercambiador de procesos/0 (pid: 0, l\u00edmite de pila = 0x(____ptrval____)) [14.816233] CPU: 0 PID: 0 Comunicaciones: intercambiador/0 Contaminado: GO 4.19.95.aarch64 #14 [ 14.816233] Nombre de hardware: evb (DT) [ 14.816234] pstate: 80400085 (Nzcv daIf +PAN -UAO) [ 14.816234] pc : asm_nmi_enter+0x94/0x98 [ 14.816235] lr : asm_nmi_enter +0x18/0x98 [ 14.816235] sp : ffff000008003c50 [ 14.816235] pmr_save: 00000070 [ 14.816237] x29: ffff000008003c50 x28: ffff0000095f56c0 [ 14.816 238] x27: 0000000000000000 x26: ffff000008004000 [ 14.816239] x25: 00000000015e0000 x24: ffff8008fb916000 [ 14.816240] x23: 000000002040 0005x22 : ffff0000080817cc [ 14.816241] x21: ffff000008003da0 x20: 0000000000000060 [ 14.816242] x19: 00000000000003ff x18: ffffffffffffffff [ 14.816243] x 17: 0000000000000008 x16: 003d090000000000 [ 14.816244] x15: ffff0000095ea6c8 x14: ffff8008fff5ab40 [ 14.816244] x13: ffff8008fff58b9d x12: 00 00000000000000 [14.816245] x11: ffff000008c8a200 x10: 000000008e31fca5 [ 14.816246] x9 : ffff000008c8a208 x8 : 0000000000000000f [ 14.816247] x7 : 0000000000000004 x6 : ffff8008fff58b9e [ 14.816248] x5 : 00000000000000000 x4 : 0000000080000000 [ 14.816249] x3 : 00000000000000000 x2 : 0000000080000000 [ 14.81 6250] x1: 0000000000120000 x0: ffff0000095f56c0 [ 14.816251] Rastreo de llamadas: [ 14.816251] asm_nmi_enter+0x94/0x98 [ 14.816251] el1_irq+0x8c/0x180 (IRQ C) [ 14.816252] gic_handle_irq+0xbc/0x2e4 [ 14.816252] el1_irq+0xcc/0x180 (IRQ B) [ 14.816253] arch_timer_handler_virt+0x38/0x58 [ 14.816253] handle_percpu_devid_irq+0x90/0x240 [ 14.816253] generic_handle_irq+0x34/0x50 [ 14.816254] __handle_domain_irq+0x68/0xc0 [ 14.81625 4] gic_handle_irq+0xf8/0x2e4 [ 14.816255] el1_irq+0xcc/0x180 (IRQ A) [ 14.816255] arch_cpu_idle+0x34/0x1c8 [ 14.816255] default_idle_call+0x24/0x44 [ 14.816256] do_idle+0x1d0/0x2c8 [ 14.816256] cpu_startup_entry+0x28/0x30 [ 14.8162 56] rest_init+0xb8/0xc8 [ 14.816257] start_kernel+0x4c8/0x4f4 [ 14.816257] C\u00f3digo: 940587f1 d5384100 b9401001 36a7fd01 (d4210000) [14.816258] M\u00f3dulos vinculados en: start_dp(O) smeth(O) [15.103092] ---[ end trace 701753956cb14aa8 ]--- [ 15.1030 93] P\u00e1nico en el kernel: no se sincroniza: excepci\u00f3n fatal en interrupci\u00f3n [15.103099] SMP: deteniendo CPU secundarias [15.103100] Desplazamiento del kernel: deshabilitado [15.103100] Caracter\u00edsticas de la CPU: 0x36,a2400218 [15.103100] L\u00edmite de memoria: ninguno causado por un 'BUG_ON(in_nmi())' en nmi_enter(). Desde el seguimiento de la llamada, podemos encontrar tres interrupciones (anotadas A, B, C arriba): la interrupci\u00f3n (A) es reemplazada por (B), que es interrumpida a\u00fan m\u00e1s por (C). Investigaciones posteriores muestran que (B) da como resultado que se llame a nmi_enter(), pero que en realidad es una interrupci\u00f3n espuria. Adem\u00e1s, las interrupciones se vuelven a habilitar en el contexto de incendios (B) y (C) con prioridad NMI. Terminamos con una situaci\u00f3n de NMI anidada, algo que definitivamente no queremos (y no podemos) manejar. El error aqu\u00ed es que las interrupciones espurias nunca deber\u00edan dar lugar a ning\u00fan cambio de estado y simplemente deber\u00edamos volver al contexto interrumpido. Mover el manejo de interrupciones espurias lo antes posible en el controlador GICv3 soluciona este problema. [maz: reescrib\u00ed el mensaje de confirmaci\u00f3n, corregido Correcciones: etiqueta]"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/3f72d3709f53af72835af7dc8b15ba61611a0e36",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/7be4db5c2b59fa77071c93ca4329876fb9777202",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/a97709f563a078e259bf0861cd259aa60332890a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/e7ea8e46e3b777be26aa855fe07778c415f24926",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ea817ac1014c04f47885532b55f5d0898deadfba",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/3f72d3709f53af72835af7dc8b15ba61611a0e36",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/7be4db5c2b59fa77071c93ca4329876fb9777202",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/a97709f563a078e259bf0861cd259aa60332890a",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/e7ea8e46e3b777be26aa855fe07778c415f24926",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/ea817ac1014c04f47885532b55f5d0898deadfba",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.1",
"versionEndExcluding": "5.4.118",
"matchCriteriaId": "8761CB27-5D41-47B9-868D-12B5772BF0E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.36",
"matchCriteriaId": "003E22D0-CA29-4338-8B35-0754C740074F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.11.20",
"matchCriteriaId": "EEC03413-9760-46D4-AC1D-EB084A1D4111"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.3",
"matchCriteriaId": "F9D6B2DE-7E4A-4B3B-9AEE-3A2C5F23DA32"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/3f72d3709f53af72835af7dc8b15ba61611a0e36",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7be4db5c2b59fa77071c93ca4329876fb9777202",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a97709f563a078e259bf0861cd259aa60332890a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e7ea8e46e3b777be26aa855fe07778c415f24926",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ea817ac1014c04f47885532b55f5d0898deadfba",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3f72d3709f53af72835af7dc8b15ba61611a0e36",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7be4db5c2b59fa77071c93ca4329876fb9777202",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a97709f563a078e259bf0861cd259aa60332890a",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e7ea8e46e3b777be26aa855fe07778c415f24926",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ea817ac1014c04f47885532b55f5d0898deadfba",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-46962",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-27T19:04:06.960",
"lastModified": "2024-11-21T06:35:02.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-11T14:56:40.457",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,47 +15,152 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mmc: uniphier-sd: corrige una fuga de recursos en la funci\u00f3n de eliminaci\u00f3n Falta una llamada 'tmio_mmc_host_free()' en la funci\u00f3n de eliminaci\u00f3n, para equilibrar un 'tmio_mmc_host_alloc()' llamar a la sonda. Esto se hace en la ruta de manejo de errores de la sonda, pero no en la funci\u00f3n de eliminaci\u00f3n. Agrega la llamada faltante."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/0d8941b9b2d3e7b3481fdf43b1a6189d162175b7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
{
"url": "https://git.kernel.org/stable/c/25ac6ce65f1ab458982d15ec1caf441acd37106a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/d6e7fda496978f2763413b5523557b38dc2bf6c2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/e29c84857e2d51aa017ce04284b962742fb97d9e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ebe0f12cf4c044f812c6d17011531582f9ac8bb3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/0d8941b9b2d3e7b3481fdf43b1a6189d162175b7",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/25ac6ce65f1ab458982d15ec1caf441acd37106a",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/d6e7fda496978f2763413b5523557b38dc2bf6c2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/e29c84857e2d51aa017ce04284b962742fb97d9e",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/ebe0f12cf4c044f812c6d17011531582f9ac8bb3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.118",
"matchCriteriaId": "C83F5505-AF9D-4F2A-8D37-A8EB73ED772D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.36",
"matchCriteriaId": "003E22D0-CA29-4338-8B35-0754C740074F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.11.20",
"matchCriteriaId": "EEC03413-9760-46D4-AC1D-EB084A1D4111"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.3",
"matchCriteriaId": "F9D6B2DE-7E4A-4B3B-9AEE-3A2C5F23DA32"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0d8941b9b2d3e7b3481fdf43b1a6189d162175b7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/25ac6ce65f1ab458982d15ec1caf441acd37106a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d6e7fda496978f2763413b5523557b38dc2bf6c2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e29c84857e2d51aa017ce04284b962742fb97d9e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ebe0f12cf4c044f812c6d17011531582f9ac8bb3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/0d8941b9b2d3e7b3481fdf43b1a6189d162175b7",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/25ac6ce65f1ab458982d15ec1caf441acd37106a",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d6e7fda496978f2763413b5523557b38dc2bf6c2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e29c84857e2d51aa017ce04284b962742fb97d9e",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ebe0f12cf4c044f812c6d17011531582f9ac8bb3",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2023-23472",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-12-11T13:15:05.150",
"lastModified": "2024-12-11T13:15:05.150",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM InfoSphere DataStage Flow Designer (InfoSphere Information Server 11.7) could allow an authenticated user to obtain sensitive information that could aid in further attacks against the system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.1,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-497"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/6988167",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-11351",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-11T13:15:06.350",
"lastModified": "2024-12-11T13:15:06.350",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Restrict \u2013 membership, site, content and user access restrictions for WordPress plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.8 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3201494/restricted-content",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de982653-26b4-4a7b-a391-373362bcb834?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23349",
"sourceIdentifier": "security@apache.org",
"published": "2024-02-22T10:15:08.427",
"lastModified": "2024-11-21T08:57:33.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-11T14:22:19.183",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,30 @@
"value": "Neutralizaci\u00f3n inadecuada de la entrada durante la vulnerabilidad de generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en Apache Answer. Este problema afecta a Apache Answer: hasta 1.2.1. Ataque XSS cuando el usuario ingresa un resumen. Un usuario que haya iniciado sesi\u00f3n, al modificar su propia pregunta enviada, puede ingresar c\u00f3digo malicioso en el resumen para crear dicho ataque. Se recomienda a los usuarios actualizar a la versi\u00f3n [1.2.5], que soluciona el problema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
@ -28,22 +51,56 @@
]
}
],
"references": [
"configurations": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/02/22/2",
"source": "security@apache.org"
},
"nodes": [
{
"url": "https://lists.apache.org/thread/y5902t09vfgy7892z3vzr1zq900sgyqg",
"source": "security@apache.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/02/22/2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.apache.org/thread/y5902t09vfgy7892z3vzr1zq900sgyqg",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:answer:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.2.1",
"matchCriteriaId": "F977E6DB-B10B-4AC2-BD22-EA5F228989A9"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/02/22/2",
"source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.apache.org/thread/y5902t09vfgy7892z3vzr1zq900sgyqg",
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/02/22/2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.apache.org/thread/y5902t09vfgy7892z3vzr1zq900sgyqg",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25606",
"sourceIdentifier": "security@liferay.com",
"published": "2024-02-20T09:15:09.533",
"lastModified": "2024-11-21T09:01:04.087",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-11T14:27:37.600",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.3,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 5.8
}
]
},
@ -49,16 +69,276 @@
"value": "CWE-611"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.2",
"matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
"matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
"matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
"matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
"matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
"matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
"matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
"matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
"matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
"matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_17:*:*:*:*:*:*",
"matchCriteriaId": "F2B55C77-9FAA-4E14-8CEF-9C4CAC804007"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_18:*:*:*:*:*:*",
"matchCriteriaId": "54E499E6-C747-476B-BFE2-C04D9F8744F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_19:*:*:*:*:*:*",
"matchCriteriaId": "6A773FC6-429D-483D-9736-25323B55A71F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
"matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
"matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
"matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
"matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
"matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
"matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
"matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
"matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
"matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
"matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
"matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
"matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
"matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_6:*:*:*:*:*:*",
"matchCriteriaId": "71E41E59-D71F-48F0-812B-39D59F81997B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_7:*:*:*:*:*:*",
"matchCriteriaId": "B6AAAAF1-994E-409D-8FC7-DE2A2CF60AD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
"matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
"matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
"matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
"matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*",
"matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update10:*:*:*:*:*:*",
"matchCriteriaId": "AA984F92-4C6C-4049-A731-96F587B51E75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update11:*:*:*:*:*:*",
"matchCriteriaId": "CADDF499-DDC4-4CEE-B512-404EA2024FCB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update4:*:*:*:*:*:*",
"matchCriteriaId": "AD408C73-7D78-4EB1-AA2C-F4A6D4DC980B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update5:*:*:*:*:*:*",
"matchCriteriaId": "513F3229-7C31-44EB-88F6-E564BE725853"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update6:*:*:*:*:*:*",
"matchCriteriaId": "76B9CD05-A10E-439C-9FDE-EA88EC3AF2C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update7:*:*:*:*:*:*",
"matchCriteriaId": "A7D2D415-36AA-41B2-8FD9-21A98CDFE1EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update8:*:*:*:*:*:*",
"matchCriteriaId": "124F2D2E-F8E7-4EDE-A98B-DD72FB43DF20"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update9:*:*:*:*:*:*",
"matchCriteriaId": "0DEE5985-289E-4138-B7C0-1E471BA7A1FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*",
"matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*",
"matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*",
"matchCriteriaId": "10B863B8-201D-494C-8175-168820996174"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*",
"matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.4.3.8",
"matchCriteriaId": "EEC6590B-9ECD-4B86-A964-0824C7F129EB"
}
]
}
]
}
],
"references": [
{
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25606",
"source": "security@liferay.com"
"source": "security@liferay.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25606",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26578",
"sourceIdentifier": "security@apache.org",
"published": "2024-02-22T10:15:08.503",
"lastModified": "2024-11-21T09:02:34.530",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-11T14:25:58.393",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,30 @@
"value": "Ejecuci\u00f3n simult\u00e1nea mediante recurso compartido con vulnerabilidad de sincronizaci\u00f3n incorrecta ('Condici\u00f3n de Ejecuci\u00f3n') en Apache Answer. Este problema afecta a Apache Answer: hasta 1.2.1. El env\u00edo repetido durante el registro result\u00f3 en el registro del mismo usuario. Cuando los usuarios se registran, si env\u00edan r\u00e1pidamente varios registros utilizando scripts, puede resultar en la creaci\u00f3n de varias cuentas de usuario simult\u00e1neamente con el mismo nombre. Se recomienda a los usuarios actualizar a la versi\u00f3n [1.2.5], que soluciona el problema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
@ -28,22 +51,56 @@
]
}
],
"references": [
"configurations": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/02/22/3",
"source": "security@apache.org"
},
"nodes": [
{
"url": "https://lists.apache.org/thread/ko0ksnznt2484lxt0zts2ygr82ldkhcb",
"source": "security@apache.org"
},
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/02/22/3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.apache.org/thread/ko0ksnznt2484lxt0zts2ygr82ldkhcb",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:answer:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.2.1",
"matchCriteriaId": "F977E6DB-B10B-4AC2-BD22-EA5F228989A9"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/02/22/3",
"source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.apache.org/thread/ko0ksnznt2484lxt0zts2ygr82ldkhcb",
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/02/22/3",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.apache.org/thread/ko0ksnznt2484lxt0zts2ygr82ldkhcb",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42135",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-30T08:15:05.433",
"lastModified": "2024-11-21T09:33:40.560",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-11T14:59:33.097",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,109 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: vhost_task: maneja SIGKILL vaciando el trabajo y saliendo. En lugar de demorarnos hasta que se cierre el dispositivo, esto nos permite manejar SIGKILL de la siguiente manera: 1. marcar al trabajador como eliminado para que ya no intentemos hacerlo. \u00daselo con nuevas virtqueues y nuevas operaciones de descarga. 2. configurar la cola virtual para el mapeo de trabajadores para que no haya trabajos nuevos en cola. 3. ejecutar todas las obras existentes."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/abe067dc3a662eef7d5cddbbc41ed50a0b68b0af",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/db5247d9bf5c6ade9fd70b4e4897441e0269b233",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/dec987fe2df670827eb53b97c9552ed8dfc63ad4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/abe067dc3a662eef7d5cddbbc41ed50a0b68b0af",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/db5247d9bf5c6ade9fd70b4e4897441e0269b233",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/dec987fe2df670827eb53b97c9552ed8dfc63ad4",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.39",
"matchCriteriaId": "AFFE1388-D45B-4287-88F7-BBA975D80E4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.9",
"matchCriteriaId": "ADCC1407-0CB3-4C8F-B4C5-07F682CD7085"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/abe067dc3a662eef7d5cddbbc41ed50a0b68b0af",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/db5247d9bf5c6ade9fd70b4e4897441e0269b233",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dec987fe2df670827eb53b97c9552ed8dfc63ad4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/abe067dc3a662eef7d5cddbbc41ed50a0b68b0af",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/db5247d9bf5c6ade9fd70b4e4897441e0269b233",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/dec987fe2df670827eb53b97c9552ed8dfc63ad4",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-51460",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-12-11T13:15:06.510",
"lastModified": "2024-12-11T13:15:06.510",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM InfoSphere Information Server 11.7 could allow an authenticated user to obtain sensitive information when a detailed technical error message is returned in a stack trace. This information could be used in further attacks against the system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-209"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7177698",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-53131",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-12-04T15:15:13.090",
"lastModified": "2024-12-05T12:15:19.513",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-11T14:55:01.573",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,110 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint Serie de parches \"nilfs2: fix null-ptr-deref bugs on block tracepoints\". Esta serie corrige errores de desreferencia de puntero nulo que ocurren al usar nilfs2 y dos puntos de seguimiento relacionados con bloques. Este parche (de 2): Se ha informado que al usar el punto de seguimiento \"block:block_touch_buffer\", touch_buffer() llamado desde __nilfs_get_folio_block() causa una desreferencia de puntero NULL o un error de protecci\u00f3n general cuando KASAN est\u00e1 habilitado. Esto sucede porque, dado que el punto de seguimiento se agreg\u00f3 en touch_buffer(), hace referencia al miembro dev_t bh->b_bdev->bd_dev independientemente de si el cabezal del b\u00fafer tiene un puntero a una estructura block_device. En la implementaci\u00f3n actual, la estructura block_device se establece despu\u00e9s de que la funci\u00f3n regresa al llamador. Aqu\u00ed, touch_buffer() se utiliza para marcar el folio/p\u00e1gina que posee el encabezado del b\u00fafer como accedido, pero el asistente de b\u00fasqueda com\u00fan para folio/p\u00e1gina utilizado por la funci\u00f3n de llamada se optimiz\u00f3 para marcar el folio/p\u00e1gina como accedido cuando se reimplement\u00f3 hace mucho tiempo, eliminando la necesidad de llamar a touch_buffer() aqu\u00ed en primer lugar. Por lo tanto, esto resuelve el problema al eliminar la llamada a touch_buffer() en s\u00ed."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/085556bf8c70e2629e02e79268dac3016a08b8bf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/3b2a4fd9bbee77afdd3ed5a05a0c02b6cde8d3b9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/59b49ca67cca7b007a5afd3de0283c8008157665",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/77e47f89d32c2d72eb33d0becbce7abe14d061f4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cd45e963e44b0f10d90b9e6c0e8b4f47f3c92471",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.9",
"versionEndExcluding": "6.1.119",
"matchCriteriaId": "B9F07E74-2989-4705-AED1-FEACA2FEF716"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6.0",
"versionEndExcluding": "6.6.63",
"matchCriteriaId": "DC8AE946-6593-4D8D-863A-0BC137CF667F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11.0",
"versionEndExcluding": "6.11.10",
"matchCriteriaId": "5D7D3F96-FD78-48BB-9935-3CD41775FEAA"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/085556bf8c70e2629e02e79268dac3016a08b8bf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3b2a4fd9bbee77afdd3ed5a05a0c02b6cde8d3b9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/59b49ca67cca7b007a5afd3de0283c8008157665",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/77e47f89d32c2d72eb33d0becbce7abe14d061f4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cd45e963e44b0f10d90b9e6c0e8b4f47f3c92471",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-54008",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2024-12-10T19:15:30.900",
"lastModified": "2024-12-10T19:15:30.900",
"lastModified": "2024-12-11T14:15:19.713",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -35,6 +35,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04765en_us&docLocale=en_US",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7232",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T22:15:15.920",
"lastModified": "2024-11-22T22:15:15.920",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-11T14:44:38.737",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -51,10 +73,30 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1004/",
"source": "zdi-disclosures@trendmicro.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:avast:free_antivirus:23.12.6094:build_23.12.8700.813:*:*:*:*:*:*",
"matchCriteriaId": "09E65B75-405A-4F8C-96AB-A04EA144FF12"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1004/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7238",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T22:15:16.663",
"lastModified": "2024-11-22T22:15:16.663",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-11T14:34:42.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -51,10 +73,30 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1011/",
"source": "zdi-disclosures@trendmicro.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vipre:advanced_security:12.0.1.214:*:*:*:*:*:*:*",
"matchCriteriaId": "9084015C-B278-48A4-BC84-F5ACCD57E585"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1011/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7239",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T22:15:16.780",
"lastModified": "2024-11-22T22:15:16.780",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-11T14:25:45.607",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -51,10 +73,30 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1010/",
"source": "zdi-disclosures@trendmicro.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vipre:advanced_security:12.0.1.214:*:*:*:*:*:*:*",
"matchCriteriaId": "9084015C-B278-48A4-BC84-F5ACCD57E585"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1010/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7240",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T22:15:16.890",
"lastModified": "2024-11-22T22:15:16.890",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-11T14:22:23.280",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -51,10 +73,30 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1012/",
"source": "zdi-disclosures@trendmicro.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f-secure:total:19.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7D9704EF-C37E-40DB-881C-182961B65263"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1012/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8025",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T22:15:18.713",
"lastModified": "2024-11-22T22:15:18.713",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-11T14:02:07.930",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -49,16 +71,49 @@
"value": "CWE-122"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nikon:nef_codec:1.31.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CE76D594-3E0A-466D-A446-B617CFE15D34"
}
]
}
]
}
],
"references": [
{
"url": "https://downloadcenter.nikonimglib.com/en/download/sw/259.html",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1422/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-11T13:01:43.009958+00:00
2024-12-11T15:00:46.621510+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-11T12:48:19.230000+00:00
2024-12-11T14:59:33.097000+00:00
```
### Last Data Feed Release
@ -33,35 +33,37 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
273172
273175
```
### CVEs added in the last Commit
Recently added CVEs: `11`
Recently added CVEs: `3`
- [CVE-2024-10511](CVE-2024/CVE-2024-105xx/CVE-2024-10511.json) (`2024-12-11T09:15:05.293`)
- [CVE-2024-11008](CVE-2024/CVE-2024-110xx/CVE-2024-11008.json) (`2024-12-11T11:15:04.947`)
- [CVE-2024-11401](CVE-2024/CVE-2024-114xx/CVE-2024-11401.json) (`2024-12-11T10:15:06.013`)
- [CVE-2024-11737](CVE-2024/CVE-2024-117xx/CVE-2024-11737.json) (`2024-12-11T10:15:06.677`)
- [CVE-2024-11840](CVE-2024/CVE-2024-118xx/CVE-2024-11840.json) (`2024-12-11T11:15:06.453`)
- [CVE-2024-12004](CVE-2024/CVE-2024-120xx/CVE-2024-12004.json) (`2024-12-11T09:15:05.500`)
- [CVE-2024-12283](CVE-2024/CVE-2024-122xx/CVE-2024-12283.json) (`2024-12-11T09:15:05.697`)
- [CVE-2024-12294](CVE-2024/CVE-2024-122xx/CVE-2024-12294.json) (`2024-12-11T11:15:06.623`)
- [CVE-2024-12325](CVE-2024/CVE-2024-123xx/CVE-2024-12325.json) (`2024-12-11T12:15:19.200`)
- [CVE-2024-12363](CVE-2024/CVE-2024-123xx/CVE-2024-12363.json) (`2024-12-11T10:15:07.260`)
- [CVE-2024-54269](CVE-2024/CVE-2024-542xx/CVE-2024-54269.json) (`2024-12-11T10:15:07.790`)
- [CVE-2023-23472](CVE-2023/CVE-2023-234xx/CVE-2023-23472.json) (`2024-12-11T13:15:05.150`)
- [CVE-2024-11351](CVE-2024/CVE-2024-113xx/CVE-2024-11351.json) (`2024-12-11T13:15:06.350`)
- [CVE-2024-51460](CVE-2024/CVE-2024-514xx/CVE-2024-51460.json) (`2024-12-11T13:15:06.510`)
### CVEs modified in the last Commit
Recently modified CVEs: `5`
Recently modified CVEs: `15`
- [CVE-2024-11053](CVE-2024/CVE-2024-110xx/CVE-2024-11053.json) (`2024-12-11T10:15:05.397`)
- [CVE-2024-49532](CVE-2024/CVE-2024-495xx/CVE-2024-49532.json) (`2024-12-11T12:15:20.753`)
- [CVE-2024-49533](CVE-2024/CVE-2024-495xx/CVE-2024-49533.json) (`2024-12-11T12:48:18.580`)
- [CVE-2024-49534](CVE-2024/CVE-2024-495xx/CVE-2024-49534.json) (`2024-12-11T12:48:19.230`)
- [CVE-2024-8602](CVE-2024/CVE-2024-86xx/CVE-2024-8602.json) (`2024-12-11T09:15:05.890`)
- [CVE-2021-46958](CVE-2021/CVE-2021-469xx/CVE-2021-46958.json) (`2024-12-11T14:43:21.320`)
- [CVE-2021-46960](CVE-2021/CVE-2021-469xx/CVE-2021-46960.json) (`2024-12-11T14:47:28.957`)
- [CVE-2021-46961](CVE-2021/CVE-2021-469xx/CVE-2021-46961.json) (`2024-12-11T14:49:59.620`)
- [CVE-2021-46962](CVE-2021/CVE-2021-469xx/CVE-2021-46962.json) (`2024-12-11T14:56:40.457`)
- [CVE-2024-23349](CVE-2024/CVE-2024-233xx/CVE-2024-23349.json) (`2024-12-11T14:22:19.183`)
- [CVE-2024-25606](CVE-2024/CVE-2024-256xx/CVE-2024-25606.json) (`2024-12-11T14:27:37.600`)
- [CVE-2024-26578](CVE-2024/CVE-2024-265xx/CVE-2024-26578.json) (`2024-12-11T14:25:58.393`)
- [CVE-2024-42135](CVE-2024/CVE-2024-421xx/CVE-2024-42135.json) (`2024-12-11T14:59:33.097`)
- [CVE-2024-53131](CVE-2024/CVE-2024-531xx/CVE-2024-53131.json) (`2024-12-11T14:55:01.573`)
- [CVE-2024-54008](CVE-2024/CVE-2024-540xx/CVE-2024-54008.json) (`2024-12-11T14:15:19.713`)
- [CVE-2024-7232](CVE-2024/CVE-2024-72xx/CVE-2024-7232.json) (`2024-12-11T14:44:38.737`)
- [CVE-2024-7238](CVE-2024/CVE-2024-72xx/CVE-2024-7238.json) (`2024-12-11T14:34:42.833`)
- [CVE-2024-7239](CVE-2024/CVE-2024-72xx/CVE-2024-7239.json) (`2024-12-11T14:25:45.607`)
- [CVE-2024-7240](CVE-2024/CVE-2024-72xx/CVE-2024-7240.json) (`2024-12-11T14:22:23.280`)
- [CVE-2024-8025](CVE-2024/CVE-2024-80xx/CVE-2024-8025.json) (`2024-12-11T14:02:07.930`)
## Download and Usage

View File

@ -187099,11 +187099,11 @@ CVE-2021-46954,0,0,e1fa2a573497ac3cca2eee300a8202a85d71444ad1ae9d67a48ccba1351fd
CVE-2021-46955,0,0,fba2bdea5b92fd2bb608ef13865c7c716d690c748a48c0107fec8f1770dcc976,2024-12-06T17:53:52.043000
CVE-2021-46956,0,0,76c2d7d149a52a4365576d3df8b3754fee5701e4ff7f9a4a2a36c2118984f44d,2024-12-06T17:54:34.117000
CVE-2021-46957,0,0,bbe461b34c6df98a2e7d85c7c55d1deb4507d01fe0a54998222ee20412cbfadb,2024-11-21T06:35:01.700000
CVE-2021-46958,0,0,317f8c07920524ffd2335976a75de30b1b2705580b11da123b84707ba836c004,2024-11-21T06:35:01.890000
CVE-2021-46958,0,1,5b50b682b8116efcca529fbd28c5eefb378e5effcdc8ded445bdcaaf6f6266bf,2024-12-11T14:43:21.320000
CVE-2021-46959,0,0,bb00e0a22da9b704f505ef16ef46738f1a4c1788be5f1b4157870da30260bb29,2024-12-10T17:55:18.607000
CVE-2021-46960,0,0,c4a01d4d86bef4e80567471da81b8c9c41b2c57974fe96d4afe631e5f53e8049,2024-11-21T06:35:02.180000
CVE-2021-46961,0,0,e637628638ee43775048aaec9e37d140ea58b39b013f1029760f9438722e69e1,2024-11-21T06:35:02.310000
CVE-2021-46962,0,0,e86c71bba9c983e586e34bd676d13ec99d08f43c95e99b00119c63ae7803cd5f,2024-11-21T06:35:02.443000
CVE-2021-46960,0,1,93adc63857297399bb3e172923626740b3a2251d6d6684f265fbff125aa509a0,2024-12-11T14:47:28.957000
CVE-2021-46961,0,1,5cd831cd809d2fe0046a1637f020f49a679577e4a0a98dad8858b62bb6faf1ce,2024-12-11T14:49:59.620000
CVE-2021-46962,0,1,c2add0fa35a2b624472b36db248d8d830acc6f42ffa2bcf78c3542a48bf06b43,2024-12-11T14:56:40.457000
CVE-2021-46963,0,0,ed803386ec84b6f1d2a8d52134d898d34d9dfaeaf4f90f7e8c8a4abcc6f6979e,2024-11-21T06:35:02.580000
CVE-2021-46964,0,0,add212b1b30e4a27a2fddf94d21547296337853832d6be635522371cdb728833,2024-11-21T06:35:02.703000
CVE-2021-46965,0,0,b46915ce2a81dd117323c8c6bb7b33e42c3c3992924bab30d16a37675e4afe55,2024-11-21T06:35:02.837000
@ -217829,6 +217829,7 @@ CVE-2023-23468,0,0,dcf3783a6e46e2a0eeb9074ee47ed2d5c0a9c74ff1896870c21e1e0585b30
CVE-2023-23469,0,0,69288f0f15e2c2829cc139ea58aa96679edf14002fe3924391288bf0361cb528,2024-11-21T07:46:15.757000
CVE-2023-2347,0,0,537d1f3c8d04870af60e6afd6bd0bbb550617328ab9535d9b20c15152403871d,2024-11-21T07:58:25.880000
CVE-2023-23470,0,0,805f33b64cf2149db6b5e5d1695195d5fb15d1d1e7fd0dc5ce1bcf2fd6089263,2024-11-21T07:46:15.897000
CVE-2023-23472,1,1,d1adab87d9c998e6269bb24ccf75fba4c0d07d5114972fb5981530f6c90d0406,2024-12-11T13:15:05.150000
CVE-2023-23473,0,0,6e568225fe37b401d88506d3abb6e7be1d1fd3f5dd589c1df7bd297f7599cab4,2024-11-21T07:46:16.040000
CVE-2023-23474,0,0,b8acb675618c02fb8615d33e861383e47b93572a37e4fdcdcd749f7ca7a5a118,2024-11-21T07:46:16.183000
CVE-2023-23475,0,0,3a68aebf09e3ed863e58894bdc66525870538242756e587e97f59ebf17bf6357,2024-11-21T07:46:16.307000
@ -243284,7 +243285,7 @@ CVE-2024-10508,0,0,3c8ca455116090fc18d0350a110b8bb6a6e21d65af46a84fffdf80725f5b3
CVE-2024-10509,0,0,f0b7ecf89c97695400b3d4347ae46c239dcae25c8470ed90af5bd1df1138e483,2024-11-01T20:52:15.573000
CVE-2024-1051,0,0,47e83543cdb00e91b0b2e6dfcb71fb878c597c188c0668b9ed609335433c9d66,2024-11-21T08:49:41.187000
CVE-2024-10510,0,0,1a1b225dc371f891ed5076d52ce3977c9397cc1b9a9aecca92726347c481951f,2024-11-29T16:15:08.733000
CVE-2024-10511,1,1,ee07b0caff70deca8b41bd3b6ccd18f16e3d99411cca536c66b66eed04915414,2024-12-11T09:15:05.293000
CVE-2024-10511,0,0,ee07b0caff70deca8b41bd3b6ccd18f16e3d99411cca536c66b66eed04915414,2024-12-11T09:15:05.293000
CVE-2024-10515,0,0,14324a428dd077d8f7bb8b90151b521be92a127d3fed7cf5017dbabd68aea528,2024-11-21T13:57:24.187000
CVE-2024-10516,0,0,41abef9bd4588b7c0f5163eb6fc95284400f27617ce541752b60c8df384ecab0,2024-12-06T14:15:19.667000
CVE-2024-10519,0,0,0f4b4a1e9d73c1dc5e7d90ae91171b7454c700ee85af6548970583aa8f68f73b,2024-11-23T10:15:03.600000
@ -243665,7 +243666,7 @@ CVE-2024-11004,0,0,30fe68a257b05692750323b521c5f518985bf9c969788c60d49e72cf40cd2
CVE-2024-11005,0,0,975391e22047d3945c6f3bb53e7adad1d72b5dc3bc794e99654eb1b89426f12f,2024-11-22T17:15:06.803000
CVE-2024-11006,0,0,0e93ac1b0efb24ee7d808883c78ff1d229849a32cacc57a86392940297a299c2,2024-11-22T17:15:06.913000
CVE-2024-11007,0,0,62a2e0757d628f20a5e5c0dd4a347b28f717af7d2afebfa5668d63b84e88b9e1,2024-11-22T17:15:07.010000
CVE-2024-11008,1,1,1880244f1f67b5841f1d2e94dcf73ce7501d11084552d8b71465fd847ea3803b,2024-12-11T11:15:04.947000
CVE-2024-11008,0,0,1880244f1f67b5841f1d2e94dcf73ce7501d11084552d8b71465fd847ea3803b,2024-12-11T11:15:04.947000
CVE-2024-11009,0,0,f480d27ee8261f76524c7f6e635dd05967cd1bee3828280624cb8a929fc9e083,2024-11-27T12:15:19.383000
CVE-2024-11010,0,0,df432a6ddcc96473c4608b251cddef86854ccd41b5717633ded9b47b86325565,2024-12-10T00:15:21.207000
CVE-2024-11013,0,0,1584e7889c2d3a99777654ed0e3acd92f4aff58e9059c4aeb7efc6520ecfc42a,2024-11-29T08:15:03.923000
@ -243695,7 +243696,7 @@ CVE-2024-11048,0,0,ee0614f8b92ffed3e1b3dc74317f3bf75a0ccca022aff193893f1abe1be52
CVE-2024-11049,0,0,f15d3cde98533895db175c6daeef740cd643f4fe5ea44a8fb9695d76fbd71539,2024-11-23T01:41:19.207000
CVE-2024-11050,0,0,97b09a9297d22ccf4873559fbbb697493b98dfb210b831947a035d7cd550348b,2024-11-23T01:38:15.047000
CVE-2024-11051,0,0,0c5db2f4a5372b3789ea13ae4e153849a79584f39670640750e498cda1bc9950,2024-12-02T15:14:56.087000
CVE-2024-11053,0,1,bc78603271bb633e85e4d1f56d4ae4eb8b7e4725f8dc4f33de4f337018994a76,2024-12-11T10:15:05.397000
CVE-2024-11053,0,0,bc78603271bb633e85e4d1f56d4ae4eb8b7e4725f8dc4f33de4f337018994a76,2024-12-11T10:15:05.397000
CVE-2024-11054,0,0,62fc21be220f83b3b99662a715e1e46c9921295e254139d37846c3d822e7f7f0,2024-11-14T02:43:36.197000
CVE-2024-11055,0,0,361b4525d8d554dca9b7af21fbdc2732ba2b4cb91ff03c9d581c539d68f515b7,2024-11-14T15:18:45.933000
CVE-2024-11056,0,0,9d9d3c33a7dea9c205bece3d4c8bdb949d23390d0100cf526cee841daf2a71cc,2024-11-14T15:21:09.907000
@ -243911,6 +243912,7 @@ CVE-2024-1134,0,0,3b9e316f9f09adef1cfd4f6b3383505dbc9180172570e63197eb1d9f1f72ee
CVE-2024-11341,0,0,fc1530097b0e35ed459b254b1ecb0cad070bf3ed96eaf9858f6cdb401383b357,2024-12-05T10:31:39.520000
CVE-2024-11342,0,0,e5c7c30c6a212e83bae351facc5b11e3c8030751d949156ac2c5ae223532d502,2024-11-26T04:15:04.030000
CVE-2024-1135,0,0,68c50f9eb4591d8bb506721809b1f0298841fc2528944ed9529aba74567efa11,2024-11-21T08:49:52.457000
CVE-2024-11351,1,1,826b9861e058dc7cd171d254424cebec62cad9d99bf32049629edf3acf54bc21,2024-12-11T13:15:06.350000
CVE-2024-11352,0,0,3e29015c6ddb727a2fde19c192da7eef0aa6d301384cc964189003e83042cffc,2024-12-06T09:15:06.650000
CVE-2024-11353,0,0,ef44a4979882bdb8ebc7e65b79558cac81921a597185e183e034648fbf6765f4,2024-12-07T02:15:17.850000
CVE-2024-11354,0,0,87986c107f2d598ec9b5e54e0419b4149d63b452699e5d17cc10ffbc61f46d56,2024-11-26T17:34:55.767000
@ -243943,7 +243945,7 @@ CVE-2024-11395,0,0,2c785115768091bea44fe3e26e4ea70367c535f8cb96f9ee4af4a34ca2f81
CVE-2024-11398,0,0,6bc73f661401a8dde5698cef66f54bb03a0cf44e7d4372165a54805de1061f29,2024-12-04T07:15:05.983000
CVE-2024-1140,0,0,e367e373e330a6c319ba1be412de101ae17a95b0fed1ad3fa83bac6f1faa29f8,2024-11-21T08:49:53.403000
CVE-2024-11400,0,0,f0d968b1fcd82e57778ae527db41a43291e92e150d389e79eb9e311a943ae3a4,2024-11-25T15:02:53.013000
CVE-2024-11401,1,1,6d7b37cf0ef78794f5a23da0580b81099a6aeb56da350b9df4b8f1e9f4d48208,2024-12-11T10:15:06.013000
CVE-2024-11401,0,0,6d7b37cf0ef78794f5a23da0580b81099a6aeb56da350b9df4b8f1e9f4d48208,2024-12-11T10:15:06.013000
CVE-2024-11402,0,0,e7ae3fa2fa6e79198d2bcac530a6805477d44c934650be2a141e6ae6e94c93ed,2024-11-28T11:15:17.613000
CVE-2024-11403,0,0,b3df7bf41156ce41154983c83b0636a1aa7e44c18278702ab49ee5bf72bcc6ee,2024-11-25T14:15:06.310000
CVE-2024-11404,0,0,0e1883534fa0b703d3bb5764163f7c50e7ea172c78345c28aae1aacd9300a1e5,2024-11-21T13:57:24.187000
@ -244193,7 +244195,7 @@ CVE-2024-11729,0,0,2827c895dedc0ed4dd965773a11bae36af1e873ca6340b82c6f253a207f9b
CVE-2024-1173,0,0,c4d4cdf7c6a3868eb9e98cb8ff74e2d000c2d6f84447d896138ac8342670c9eb,2024-11-21T08:49:57.650000
CVE-2024-11730,0,0,1c75a29ac86330ee59ce7e562964d19e5b2f34b817b5e3f64dd6b06aec3955ea,2024-12-06T11:15:08.033000
CVE-2024-11732,0,0,6786f7c223dbf5c7abf2566386e4c9fbb35edf5a2ada6569df25893c7ff24b7c,2024-12-03T08:15:06.383000
CVE-2024-11737,1,1,adbb619cbb79a807a6b16c33974d09efae1c89dafcbf1284cac41939ec6cf676,2024-12-11T10:15:06.677000
CVE-2024-11737,0,0,adbb619cbb79a807a6b16c33974d09efae1c89dafcbf1284cac41939ec6cf676,2024-12-11T10:15:06.677000
CVE-2024-11738,0,0,5803102c629088a1a2da01b2d25c2140a03e3f90be532f5ab04ee726320c55e3,2024-12-06T15:15:07.723000
CVE-2024-1174,0,0,6b46be4d722ab187c094170b7547b36656d9ec8ed90fcec0cd49c5c30bebda75,2024-11-21T08:49:57.790000
CVE-2024-11742,0,0,159958446bfcddf210e603d44dd5e0653c4d00985f509f964ecd8fded8c95573,2024-12-04T21:04:48.830000
@ -244245,7 +244247,7 @@ CVE-2024-11823,0,0,39aa0fbc102b8a9648f017c9098019c8c94234f421f38dd89f51eddc70f54
CVE-2024-11828,0,0,602aa5ef7af00586aa736b8ffe32cf96277c2dc1be2f8a5d747f0e8c798e383a,2024-11-26T19:15:22.910000
CVE-2024-1183,0,0,65ecfa5c3d2b221c19281f6b798c6cc7087d171223e10f3dd191314d09620aec,2024-11-21T08:49:58.950000
CVE-2024-1184,0,0,2df19971af19652a2c9010665a81893140f6f37a453740869a5d55aaa9937e61,2024-11-21T08:49:59.067000
CVE-2024-11840,1,1,09e01e238ec312d53d671f8cf876f09242b194b014906fd4d44fc65beb910377,2024-12-11T11:15:06.453000
CVE-2024-11840,0,0,09e01e238ec312d53d671f8cf876f09242b194b014906fd4d44fc65beb910377,2024-12-11T11:15:06.453000
CVE-2024-11844,0,0,04412f8d1e89e121c8013622c692022d4f804bc36ac5e0beee05cf8987e8ae7f,2024-12-03T09:15:04.473000
CVE-2024-1185,0,0,78290528f068dedb8140a9e577b3dd14843a1270282e7453db0a3904a48bc34c,2024-11-21T08:49:59.223000
CVE-2024-11853,0,0,34e99eba0841fa956ba4d7c4a308f8505540f1a8e5d486ec7f2fdd3d46494b2f,2024-12-03T08:15:06.710000
@ -244318,7 +244320,7 @@ CVE-2024-12000,0,0,e45e46bd9049a7c2eac2343a939848eded6d5b005c7247796df205afc6eac
CVE-2024-12001,0,0,75bbf94d31b41f422ac1216beeda365d0b924dd232e408edb33262f11bb39f10,2024-12-10T23:16:24.893000
CVE-2024-12002,0,0,642bad4c124467ff4f581f355ddf310f5dadc994966ff22ccdf8e42852d0744f,2024-12-10T23:21:19.827000
CVE-2024-12003,0,0,e39ee63656708893dab4dc4b108494b2da97ab05cd1b7a687dd08b180fa7d4d8,2024-12-06T09:15:07.630000
CVE-2024-12004,1,1,7e4e24a5d67ea69d4a4f30f000844c0ff592f0fb4af7e0aa61274a2e2a55f08c,2024-12-11T09:15:05.500000
CVE-2024-12004,0,0,7e4e24a5d67ea69d4a4f30f000844c0ff592f0fb4af7e0aa61274a2e2a55f08c,2024-12-11T09:15:05.500000
CVE-2024-12007,0,0,8e607a1eddf324cb0db7978994624ff72f4892cd536259d2d33593eb53a4d98b,2024-12-11T03:16:24.473000
CVE-2024-1201,0,0,ede9ef00e40c3771a17b2608d045b2ee9c35ff3d800bb0d000b60662409e157c,2024-11-21T08:50:01.647000
CVE-2024-12015,0,0,d5a693fd232b1e3fbc53d72a834e39c83a435aa6e5ae231752c351acc22ca6db,2024-12-02T14:15:05.383000
@ -244402,10 +244404,10 @@ CVE-2024-1226,0,0,b8e723228c95f73a75e74922943d4c7b5983bd824925379e4a1dadf0498e92
CVE-2024-1227,0,0,2b74966c63acb4b53db9100814c0ea98b900c2b18de594c13a326b21bfb265c8,2024-11-21T08:50:06.103000
CVE-2024-12270,0,0,39bcf28b0c7f0c2cc7925c4c71867c3d58c667f7e488518c8c9808ae3acf42cd,2024-12-07T10:15:06.200000
CVE-2024-1228,0,0,02a2d35b9c29d8600ba5afee210d0e6465f5ee41eb5d9edcafc9d5f9e15f44ef,2024-11-21T08:50:06.280000
CVE-2024-12283,1,1,dca4df71f894f590cb0f5d26cfe1803e25114c809f761c64773c44a35cabeb38,2024-12-11T09:15:05.697000
CVE-2024-12283,0,0,dca4df71f894f590cb0f5d26cfe1803e25114c809f761c64773c44a35cabeb38,2024-12-11T09:15:05.697000
CVE-2024-12286,0,0,fd7295e26214e392d9cfe3b72df0f6a777b0e479184a2a0c173af7d7cc4270a2,2024-12-10T18:15:27.150000
CVE-2024-1229,0,0,8ad8bfe76844e757ec6d08a1bad2f097b99b608e965943a6e4928e217dfee4df,2024-11-21T08:50:06.520000
CVE-2024-12294,1,1,c80c38451ddc3a567e7758d3362278a970e04ba14ecece8e507b66c499c77553,2024-12-11T11:15:06.623000
CVE-2024-12294,0,0,c80c38451ddc3a567e7758d3362278a970e04ba14ecece8e507b66c499c77553,2024-12-11T11:15:06.623000
CVE-2024-1230,0,0,4e58704ea3cd6d96f1b95bf7630f56ca27fd7e9cf7f7c464007165035f04082e,2024-11-21T08:50:06.710000
CVE-2024-12305,0,0,591beb549e2fd130a4eb51689f906f54cfd4f9ef094b292b5ebd58de367d8b56,2024-12-09T09:15:04.970000
CVE-2024-12306,0,0,7a6ad19881298b2491617643bd5219a8f3696a7257d332ef3f9d18eb332eeb87,2024-12-09T09:15:05.293000
@ -244413,7 +244415,7 @@ CVE-2024-12307,0,0,23aacf8c044133a030d70d78a0f87e6b3da2eadc1bf68e4a395d80d759eab
CVE-2024-1231,0,0,b14e8b0a07bc5ec367647c5978c3a1256f30a8a16700580e77b0e0e8d9654fdc,2024-11-21T08:50:06.870000
CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000
CVE-2024-12323,0,0,cda0016ec5c0b14f1438c5124cf1a1a11494fb26a27490c50b47e2260e80d4bf,2024-12-10T15:15:07.300000
CVE-2024-12325,1,1,71dcfc0e1510c4d112935e942e5da24f635d661929d4a007be66df22f4234e9f,2024-12-11T12:15:19.200000
CVE-2024-12325,0,0,71dcfc0e1510c4d112935e942e5da24f635d661929d4a007be66df22f4234e9f,2024-12-11T12:15:19.200000
CVE-2024-12326,0,0,f960296d4c7a80b2aa28fc7f84f75a77ad31211d0d7e9b5df25b051a57e66633,2024-12-06T21:15:05.957000
CVE-2024-1233,0,0,9d758d75169c31056a2dd99a6ff761ac0a3c179827b3dc598c6fb0d83614dada,2024-11-21T08:50:07.317000
CVE-2024-1234,0,0,6b4d1ae0b8159c98fb379447cf95a21f71a7514cfa9af5f48616ab89e3a52cca,2024-11-21T08:50:07.567000
@ -244436,7 +244438,7 @@ CVE-2024-12358,0,0,c693e0849f917c8e8b82ecbabaa009531cb87832861cfd247370c207501db
CVE-2024-12359,0,0,c89d1a1aa75e792ebb41728457dc48f1f26a200ebabc2671ae04aee3d706d446,2024-12-10T23:34:02.110000
CVE-2024-1236,0,0,98cf8c8d0d2027d41420e47ce0e54a62c55b6c82b55779fb1975380b5e094f29,2024-11-21T08:50:07.797000
CVE-2024-12360,0,0,9c92ce0fa75af6038fb90116f61bca41613e1dcad55daccb6d63b1c2c6eac745,2024-12-10T23:33:47.773000
CVE-2024-12363,1,1,0a491da0a2abbcf7984025bbc6c43b56fe1619f44d47ff309424ed17b404b173,2024-12-11T10:15:07.260000
CVE-2024-12363,0,0,0a491da0a2abbcf7984025bbc6c43b56fe1619f44d47ff309424ed17b404b173,2024-12-11T10:15:07.260000
CVE-2024-12369,0,0,020d729c045c8eaa8f498306958a74fd2b364bdb1cd395ef2460e8703f80119a,2024-12-09T21:15:08.203000
CVE-2024-1237,0,0,7608b762d209f55f10a23dbde634d086adad1d6240344714ec7de5c458d836b6,2024-11-21T08:50:07.910000
CVE-2024-1238,0,0,61e2d99ce6e3dfa86afb8331abcc236f68b5fa34f245659f4f6216db5239b32e,2024-11-21T08:50:08.053000
@ -247804,7 +247806,7 @@ CVE-2024-23345,0,0,93238d3b825f485d8eb374a435c101f669289e1d89c688d77924b26c7cc59
CVE-2024-23346,0,0,15a6ec1f47e9a6cfc97c2a72502eaa07279591547945e2ab80bf144c2636f3b3,2024-11-21T08:57:33.443000
CVE-2024-23347,0,0,25471626506419779168ea545004b9fe96b382d2dd9a27aa905a7945d77256d0,2024-11-21T08:57:33.577000
CVE-2024-23348,0,0,a129e6b3747159f86ada3699e7ce730a1fff4c4aa879c6338bc74b8e570fdbe1,2024-11-21T08:57:33.707000
CVE-2024-23349,0,0,eb17e6b1fd6696c1da992538406a371a894f92f2d06d606e8b3f6aa506c6a246,2024-11-21T08:57:33.853000
CVE-2024-23349,0,1,4f771bcc93ebb4ca49452299c3a1c8f24e42a293d9a873d9c6b26612990ea1f9,2024-12-11T14:22:19.183000
CVE-2024-2335,0,0,ed64babb31900629e88691a28bf293e48139716a308e0dcea2c4d5bc974613c1,2024-11-21T09:09:31.907000
CVE-2024-23350,0,0,339ca97a071d45a6e59ad694d2760add389eaeb02c1699dfd49abf0f96fae5ce,2024-11-26T15:48:05.817000
CVE-2024-23351,0,0,8649c4833ba8351b45556d140a13f7a21d02c862e3d1f89c33bba0b7ac42ae62,2024-11-21T08:57:34.173000
@ -249327,7 +249329,7 @@ CVE-2024-25602,0,0,43c5fd7be09141d81d52c491e8514b96cba0daa24c348da2dd7a06a5b7ef9
CVE-2024-25603,0,0,6efc2ab54ea3be651c1cc1d95ba47da582406dbdf361cbfd55e80b7611a41412,2024-11-21T09:01:03.690000
CVE-2024-25604,0,0,adb2744e99dce2faa265e66e541e673623a62dc0725d7f7a02f3571eed752f2b,2024-12-10T22:59:32.727000
CVE-2024-25605,0,0,cd3f213631c053f1b608e3b480951743b40dfcd47cd39c4fbb6227f798899db1,2024-12-10T22:20:47.737000
CVE-2024-25606,0,0,bde9b15898ae8e9ac91d25fcc0eaa7295bb6e28d0668446fd2e7868187bc749d,2024-11-21T09:01:04.087000
CVE-2024-25606,0,1,cac38eab3443645d7904eb9442ba71c62f7d0310cd49ec6e2c6f23596207af9e,2024-12-11T14:27:37.600000
CVE-2024-25607,0,0,92a9fb01b0a8ceee06add8818a4f6f32834dea0c68b94bc58e295449a80a9e8b,2024-11-21T09:01:04.213000
CVE-2024-25608,0,0,7279c61e8730c275fdc995418fe07aa60ec60482b57bc6e0726dab12a2b3647c,2024-11-21T09:01:04.343000
CVE-2024-25609,0,0,55a8a632e5823ec358a36f05933df0c5d27523588b88b0d4903abb387c61beef,2024-11-21T09:01:04.470000
@ -250028,7 +250030,7 @@ CVE-2024-26566,0,0,17fcdac1abfd469cf3ffd2a7711c92e40eda453c6c83e0105c8a9c787273b
CVE-2024-2657,0,0,0a4026599cc8f564da68adf5d96fb16ac5a93f2d83477b37500b3fcf5ca350a2,2024-11-21T09:10:13.690000
CVE-2024-26574,0,0,c9911895eba0376ea8a04813b72831a135e34cb8219fef4dc4368d52d0492aa2,2024-11-21T09:02:34.080000
CVE-2024-26577,0,0,b31cfe48a896bbe0069a91709f0e0fcdcc1053cc2c31cf21b6fc4d7e6e447649,2024-11-21T09:02:34.307000
CVE-2024-26578,0,0,dc2abd261efaae4d6302030c302f6e783d178e59520fc50d28cd4e6d5089d099,2024-11-21T09:02:34.530000
CVE-2024-26578,0,1,2e58008b2e2354ced3f03ecb873037b7722363d10f6079fa1efe7f01fe5f0136,2024-12-11T14:25:58.393000
CVE-2024-26579,0,0,9c84da18e023cd09fe2fb7cf03db0b8a51d68ccf0b7a927b5e53949a549ffecd,2024-11-21T09:02:34.660000
CVE-2024-26580,0,0,2da523ae9bab4583fae6c14513aa51a5182ca599877e28f208436ca984866b9b,2024-11-21T09:02:34.773000
CVE-2024-26581,0,0,80b86b5dff9ca5be14908e5f3367dd0289faaf1f938aad6d98d56fc7348c93e6,2024-11-21T09:02:34.970000
@ -261609,7 +261611,7 @@ CVE-2024-42131,0,0,db085189da3b1018c39f394e11d97ed680f76fa1907c88c45ed38fab0f2eb
CVE-2024-42132,0,0,62638dac35ecadbd01a50f2d7971ef730320c69562f8244ae5965c2dd83a62aa,2024-11-21T09:33:40.220000
CVE-2024-42133,0,0,c0e81121fdc58f27a3e76b08e8d6881c1a767f5a54a91918926c95174eed2109,2024-11-21T09:33:40.330000
CVE-2024-42134,0,0,822056960c6524aacc2ff35fee40fa8b035616373ee26f3432ea53ebec5d459e,2024-11-21T09:33:40.443000
CVE-2024-42135,0,0,b3c3507ab345ff5ee6da5cf472a2d01e7a7141c8e2a505a8ce1ce8a81c7ea3d1,2024-11-21T09:33:40.560000
CVE-2024-42135,0,1,0d77200cd1db63536fe02bbc697ee9cac3377a841f3e6d1c18cc172ac5451f93,2024-12-11T14:59:33.097000
CVE-2024-42136,0,0,46cf0449c1576cec046c7cfd30f571d29aa4a3763cd2bcc721d00c8e3b8292c0,2024-11-21T09:33:40.673000
CVE-2024-42137,0,0,af91881db6e05d40d39068871045965102a2d4547246ad7308857f29c1a14506,2024-11-21T09:33:40.817000
CVE-2024-42138,0,0,5578d34a042bc0a91eb3eb443168291ecf7a51e5c04224989ea9b7f5c2d40694,2024-11-21T09:33:40.960000
@ -266387,9 +266389,9 @@ CVE-2024-49528,0,0,63319d635eea06771d746aaef2fa7b933b9c0f0420f665631edc0ca867ae1
CVE-2024-49529,0,0,bc912441c1467e88d09c1eebc868707893b19843941c8a4da84053631d70d7a6,2024-12-03T14:37:05.960000
CVE-2024-49530,0,0,afafe2f9e708a0df7b6d673b385a03bf08c9e6f95dcc179119b1592790dc1dc9,2024-12-10T20:15:18.107000
CVE-2024-49531,0,0,43539ba71c9f721c1ff762780d88d45522d85ce331f91d895b58432f07e6d879,2024-12-10T20:15:18.270000
CVE-2024-49532,0,1,4e372532dd8c4ca18ce90209f001d470d219b9faa378c4c94ed7fff494be9829,2024-12-11T12:15:20.753000
CVE-2024-49533,0,1,b7fa46411acc29bb525767df2f82a6876ab053bff5d4249298e29189fc8eb8b6,2024-12-11T12:48:18.580000
CVE-2024-49534,0,1,f5a65280f6923cb0001383f4d54b21a1bbdd11660c383cbfc1fbc3f07f52c595,2024-12-11T12:48:19.230000
CVE-2024-49532,0,0,4e372532dd8c4ca18ce90209f001d470d219b9faa378c4c94ed7fff494be9829,2024-12-11T12:15:20.753000
CVE-2024-49533,0,0,b7fa46411acc29bb525767df2f82a6876ab053bff5d4249298e29189fc8eb8b6,2024-12-11T12:48:18.580000
CVE-2024-49534,0,0,f5a65280f6923cb0001383f4d54b21a1bbdd11660c383cbfc1fbc3f07f52c595,2024-12-11T12:48:19.230000
CVE-2024-49535,0,0,e52b71be2403d7e7c7ec6df87555241b12f0d6af2e7ed28d403cc9e5574871ea,2024-12-10T20:15:18.923000
CVE-2024-49536,0,0,3226abc075af5af9440f5cdc9a3a66360f030ce3d405055960c0bca748fe4e92,2024-11-19T21:21:45.640000
CVE-2024-49537,0,0,9069a21f9ad82f63c2008fa214d1f0de46072a9dfd4ccd673ef0f8c9a149a49e,2024-12-10T21:15:16.500000
@ -267657,6 +267659,7 @@ CVE-2024-51432,0,0,90d6088b4b691a13d46bf67decae9a8dc78d3184ac661e87666bdc2bf7a41
CVE-2024-51434,0,0,fd0f2e493c6557b3a7b75698795afa3b125b8838b7989d6283ab0195617010c3,2024-11-08T19:01:03.880000
CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000
CVE-2024-5145,0,0,1ce6a725d120216d833ed23f25099d9f4810ecb9d4c63ffcf11012cbf68534d1,2024-11-21T09:47:03.920000
CVE-2024-51460,1,1,54ac0204b63f74164b897a6b6b8f06af4e57f79919a62eae732f4c393e26f20a,2024-12-11T13:15:06.510000
CVE-2024-51465,0,0,b984a1f47331a027471db6ecd22c9db67a7b4679236a111706732d4e42cb3082,2024-12-04T14:15:20.223000
CVE-2024-5147,0,0,b4fda03873bf91b8aee1014c1d03851aae8f0afeab0edb3aed7529ff221065c3,2024-11-21T09:47:04.057000
CVE-2024-51478,0,0,f0595ed35f1f283d907e9d623fdb50e27981165a57dcab6e98c75f63ec12b3b4,2024-11-01T12:57:03.417000
@ -268788,7 +268791,7 @@ CVE-2024-53128,0,0,f9eec68ede1e406488191c46f9d50f73ad3aa1613bc770edcaf522cca67dd
CVE-2024-53129,0,0,d1fc77f1dab17eeff37788fbf62ea42867a917fecd21166d87ba8aca6ef2ff20,2024-12-04T15:15:12.837000
CVE-2024-5313,0,0,be791a23ecd40bbfd3a356fb20dc239f3a0459ddf5fc8645766d7d90d3fc6d71,2024-11-21T09:47:24.663000
CVE-2024-53130,0,0,1ac44920956419aad8b1ca6bf8ac4668a9398d444f79b6ca27325351b5992189,2024-12-05T12:15:19.417000
CVE-2024-53131,0,0,774d0dbbc527675c217a09d9e629a20d83cbcdc307c262e6c9cf61b5b7701eff,2024-12-05T12:15:19.513000
CVE-2024-53131,0,1,19eba6d8151a3ccf75118bd0f587f03ce57bf19a786a52e87aafc302369fecff,2024-12-11T14:55:01.573000
CVE-2024-53132,0,0,784764b8393c16a2472dcd9ceb193598a6266f6f7101743057b3398e5016616d,2024-12-04T15:15:13.193000
CVE-2024-53133,0,0,7dc3bd97ae2fd964c9544e8c99d455f2dfa36bb52ebc957fde2a8701f7a2df3e,2024-12-04T15:15:13.310000
CVE-2024-53134,0,0,2ca33ba2789e0ed81e4159165518bbe19d131a1732e729bb807ce7f34c35506a,2024-12-04T15:15:13.503000
@ -269164,7 +269167,7 @@ CVE-2024-54002,0,0,7c5a00df1d470c32b9eac42d93309bb19614d9762fa0f049a771979bb9894
CVE-2024-54003,0,0,b632b439005206974a2b4ec6ab08a78e134e0c09d892996aec7289d7221f0377,2024-11-27T20:15:26.133000
CVE-2024-54004,0,0,5d94a9bc2fe383b10883d5f21fb711b04368ee28bef8377081c80a039d1c1dee,2024-11-27T19:15:33.723000
CVE-2024-54005,0,0,78bbd546deba4e2b14f99ce80711c725e32521468135821d5bfe1062b9007f78,2024-12-10T14:30:47.037000
CVE-2024-54008,0,0,c83adc0070c7b9fe5dc822e3df77a6cc986e702399c7129cd968ded9ec0b9a23,2024-12-10T19:15:30.900000
CVE-2024-54008,0,1,9593f48912b6399476026a38f0139749c7711d31f8d7f240872e5de4e305e3a9,2024-12-11T14:15:19.713000
CVE-2024-54014,0,0,9895136be901bda6024d3c86fc774e344b5ffa93f0cfe6e13e8990c6229717ed,2024-12-05T03:15:14.530000
CVE-2024-5402,0,0,ff0d9bb22ac0a71984c61b65bae28749f481f4dd7d54b4eb8642f168357fe194,2024-11-21T09:47:34.947000
CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000
@ -269275,7 +269278,7 @@ CVE-2024-54254,0,0,6bd242e91a77ad9f90586d1c5e750c7c7ef35caa4861ebccd75667e5bfdd8
CVE-2024-54255,0,0,d518bbc292d8d1ed45e1085d8351cd8eb89783a225379287ae001a806a27b758,2024-12-09T13:15:44.007000
CVE-2024-5426,0,0,5ea29bfa6e12ae428a874da685da80617819a2a2873f1c2f03b3a2184d9a719d,2024-11-21T09:47:37.890000
CVE-2024-54260,0,0,77b8fbae5dfcc4dde97d03f134d079c69e76d5819885d9eb9375c0c7f0405e6d,2024-12-09T13:15:44.153000
CVE-2024-54269,1,1,0bc9974eaf651dbbd6c977f144059de52f484482978cc1afb739ac8f56279a96,2024-12-11T10:15:07.790000
CVE-2024-54269,0,0,0bc9974eaf651dbbd6c977f144059de52f484482978cc1afb739ac8f56279a96,2024-12-11T10:15:07.790000
CVE-2024-5427,0,0,0e5a4a243a6c356d48858411e10959c0d2b5ef3e2a4a055bc1bad76f470ca7d5,2024-11-21T09:47:38.020000
CVE-2024-5428,0,0,5169bb0837062392ce64ea8c5c88b5f92f711aab81af161892590a75207e24aa,2024-12-09T22:51:14.763000
CVE-2024-5429,0,0,c5c127d3962dc4b6ee503ad5fd97fce8ef1325aee9713e37b6918218af05ded4,2024-10-18T12:53:04.627000
@ -270925,15 +270928,15 @@ CVE-2024-7228,0,0,a661e4304e23b944f3e8caf0591bdbb960fdef6359f8da5b3192c6c46e2a36
CVE-2024-7229,0,0,8efaf3b22bc612c6ca8d639c951b60915658eeaa33a73cd7f332a9e9f2f85e82,2024-12-09T20:04:08.797000
CVE-2024-7230,0,0,d3377bb66796c49c17d64d458ce5ec67560c57e6041313bf69cd2192d63dd3e2,2024-12-09T20:02:58.670000
CVE-2024-7231,0,0,822a99d1572fc0918e8ef2849d04bc7abba7466bb16a280b5875c6569fb3fa14,2024-12-09T20:01:00.623000
CVE-2024-7232,0,0,798d5a89669b4c71bd315f72bebc56d11f622b89fd931997013854c9fa21c023,2024-11-22T22:15:15.920000
CVE-2024-7232,0,1,145bec6ad818752e8e1aa21e21512188df08b9d67e720d8ed692b55ccf0053c5,2024-12-11T14:44:38.737000
CVE-2024-7233,0,0,245c9c7282702c0ad7d2d9fdcc98fa270b960e17480a03d5bfdac380727b2f08,2024-11-22T22:15:16.060000
CVE-2024-7234,0,0,c841032797f89ed33f5e5c6be97d90177bf36eff8435e446fc59dbaf44344590,2024-11-22T22:15:16.190000
CVE-2024-7235,0,0,19563b43b3a2c50df5995e73338cd7539ec685bdbbf6153d07006a345ecea5dc,2024-11-22T22:15:16.307000
CVE-2024-7236,0,0,bfe8ac9abbe8d96981ff80186e1a3adf2d31e739768635eb532383cfe3d6b902,2024-11-22T22:15:16.427000
CVE-2024-7237,0,0,662e39cca4be9b647909bd94510ead901bfe81a53d4b07cc53fbab12da70f718,2024-11-22T22:15:16.547000
CVE-2024-7238,0,0,6dc96245ea595553b878ec0d596535652093c4c6b67dcdfae5515849b2e3f407,2024-11-22T22:15:16.663000
CVE-2024-7239,0,0,8724318e0cf230292681d459bc1de03a030fd3a69d3cf6fafb24c48dfab5f216,2024-11-22T22:15:16.780000
CVE-2024-7240,0,0,ff35a4403d856dbcfc67a54df65195d6bc98a046b6b13b712d29da452c9663df,2024-11-22T22:15:16.890000
CVE-2024-7238,0,1,4b440d963378f1f4b9e96264a799f3697812528bd67e5c582e2981fc5ec5258f,2024-12-11T14:34:42.833000
CVE-2024-7239,0,1,53968c59a1174219ae44eef241610b22dfa99619aca14fbe12febb5f8fe62200,2024-12-11T14:25:45.607000
CVE-2024-7240,0,1,4119106a820cfa30ee1f58dc1a66e01faf0d8e616ec3f0cd9a46b5ee461420d8,2024-12-11T14:22:23.280000
CVE-2024-7241,0,0,2d262dc5b536521ef90a26c60e93d56427c74446a97caffd69699909d3022758,2024-11-26T15:08:51.357000
CVE-2024-7242,0,0,936971159de650d2954dd29c139b2685e1eb7d8690bb7709b88a437f9c6120d7,2024-11-26T14:59:29.483000
CVE-2024-7243,0,0,c6b88fa7532074a1fe50f63bbb0afc38fd44b72846ee13736713968c199e6910,2024-11-26T15:04:44.320000
@ -271618,7 +271621,7 @@ CVE-2024-8015,0,0,dd5555b85e994899c4893ace6d3afbd967c37c55c50d205d5b3c8bf6cb87a3
CVE-2024-8016,0,0,238c4df3f0de00a81fde1b1c7b561464841085dd6f47f09817353c1bbacbfe77,2024-09-03T14:51:16.470000
CVE-2024-8022,0,0,2c2738dbc526c308d2f52af114ef294873c5e8e6729dec83af9008e9c3b5cc37,2024-08-21T12:30:33.697000
CVE-2024-8023,0,0,a1b6d905a0240efa1881c72db04eeea68a6752bd4f402a8f1846f80b6c974719,2024-08-21T12:30:33.697000
CVE-2024-8025,0,0,688f7e4d5cdf12950b5f375d1bc6db9f5ba2bf006bfe68225511b92d3ff26344,2024-11-22T22:15:18.713000
CVE-2024-8025,0,1,70061881b166a3a1a51ca6087abec369478d3afe4c5d3b16bf1339b5559f41f2,2024-12-11T14:02:07.930000
CVE-2024-8030,0,0,0222c140f338b9929800e6ff1f38275ac87b01268708f4fe3253d79e319814e4,2024-08-28T12:57:27.610000
CVE-2024-8033,0,0,2e06813e88b6cfa39b77eeda56acb40b59d06578c1b6d8003a2b6bea9d735890,2024-08-27T19:39:04.953000
CVE-2024-8034,0,0,8737be6f93f1495d1046c9a435fb5c4639722e22541174f90d62414e220dc49f,2024-08-22T17:35:30.003000
@ -272078,7 +272081,7 @@ CVE-2024-8598,0,0,17bb7382ca41b399712cc44723ca89862306ddc2f56284b931416f3f7d8e7e
CVE-2024-8599,0,0,13d0ff884a73c291b4096f8b78ca27030351114c1d87f3c5c05bf8cf4b35984f,2024-11-01T16:17:25.073000
CVE-2024-8600,0,0,467df8817b963ff6dd4943ad648cb11c98233a9da8dfa53fb316598e73a6889f,2024-11-01T16:17:19.680000
CVE-2024-8601,0,0,3acaee371a9188d72925a2deaf0ff4d7e630c2dd4f9352ccbd013d52f89a3544,2024-09-17T17:54:39.767000
CVE-2024-8602,0,1,4be711d34a664a8b5e0b3d37ce84c88b22a5259bad96166dd05534c7898940cb,2024-12-11T09:15:05.890000
CVE-2024-8602,0,0,4be711d34a664a8b5e0b3d37ce84c88b22a5259bad96166dd05534c7898940cb,2024-12-11T09:15:05.890000
CVE-2024-8604,0,0,b0f4bef2cd9a719a1e9111dc84cb9eb65623a02bb8b15e8ab1025f3d735a01a0,2024-09-10T19:14:57.017000
CVE-2024-8605,0,0,18cd92611e13242841985be931e73363b96d6240a8d360002f41aa2863d0fe3b,2024-09-13T15:31:52.140000
CVE-2024-8606,0,0,d6634fb8da7243ac8a8022d5719888e145acab992bdb7a29d6a427971fe505a6,2024-09-30T15:32:34.647000

Can't render this file because it is too large.