From f0478725b0ea6f8da5fa9f1df90eb8d25b4f5e4a Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 18 Mar 2025 21:03:50 +0000 Subject: [PATCH] Auto-Update: 2025-03-18T21:00:19.783526+00:00 --- CVE-2017/CVE-2017-175xx/CVE-2017-17506.json | 16 +- CVE-2018/CVE-2018-138xx/CVE-2018-13873.json | 16 +- CVE-2018/CVE-2018-140xx/CVE-2018-14015.json | 10 +- CVE-2019/CVE-2019-166xx/CVE-2019-16638.json | 32 +- CVE-2020/CVE-2020-162xx/CVE-2020-16296.json | 17 +- CVE-2020/CVE-2020-175xx/CVE-2020-17538.json | 20 +- CVE-2021/CVE-2021-321xx/CVE-2021-32163.json | 32 +- CVE-2021/CVE-2021-324xx/CVE-2021-32419.json | 32 +- CVE-2021/CVE-2021-332xx/CVE-2021-33226.json | 32 +- CVE-2021/CVE-2021-333xx/CVE-2021-33391.json | 32 +- CVE-2021/CVE-2021-339xx/CVE-2021-33948.json | 32 +- CVE-2021/CVE-2021-339xx/CVE-2021-33949.json | 32 +- CVE-2021/CVE-2021-339xx/CVE-2021-33950.json | 32 +- CVE-2021/CVE-2021-449xx/CVE-2021-44923.json | 10 +- CVE-2021/CVE-2021-476xx/CVE-2021-47631.json | 152 ++++++- CVE-2021/CVE-2021-476xx/CVE-2021-47632.json | 93 +++- CVE-2021/CVE-2021-476xx/CVE-2021-47636.json | 130 +++++- CVE-2021/CVE-2021-476xx/CVE-2021-47637.json | 130 +++++- CVE-2021/CVE-2021-476xx/CVE-2021-47638.json | 142 +++++- CVE-2021/CVE-2021-476xx/CVE-2021-47640.json | 118 ++++- CVE-2021/CVE-2021-476xx/CVE-2021-47641.json | 153 ++++++- CVE-2021/CVE-2021-476xx/CVE-2021-47644.json | 105 ++++- CVE-2021/CVE-2021-476xx/CVE-2021-47645.json | 105 ++++- CVE-2021/CVE-2021-476xx/CVE-2021-47648.json | 106 ++++- CVE-2021/CVE-2021-476xx/CVE-2021-47651.json | 118 ++++- CVE-2021/CVE-2021-476xx/CVE-2021-47652.json | 154 ++++++- CVE-2022/CVE-2022-387xx/CVE-2022-38714.json | 12 +- CVE-2022/CVE-2022-388xx/CVE-2022-38867.json | 32 +- CVE-2022/CVE-2022-46xx/CVE-2022-4645.json | 72 ++- CVE-2022/CVE-2022-483xx/CVE-2022-48327.json | 32 +- CVE-2022/CVE-2022-490xx/CVE-2022-49055.json | 146 +++++- CVE-2022/CVE-2022-490xx/CVE-2022-49058.json | 152 ++++++- CVE-2022/CVE-2022-491xx/CVE-2022-49190.json | 94 +++- CVE-2022/CVE-2022-492xx/CVE-2022-49201.json | 98 ++++- CVE-2022/CVE-2022-492xx/CVE-2022-49203.json | 70 ++- CVE-2022/CVE-2022-492xx/CVE-2022-49206.json | 118 ++++- CVE-2022/CVE-2022-492xx/CVE-2022-49207.json | 94 +++- CVE-2022/CVE-2022-492xx/CVE-2022-49208.json | 94 +++- CVE-2022/CVE-2022-492xx/CVE-2022-49209.json | 118 ++++- CVE-2022/CVE-2022-492xx/CVE-2022-49210.json | 106 ++++- CVE-2022/CVE-2022-492xx/CVE-2022-49211.json | 106 ++++- CVE-2022/CVE-2022-492xx/CVE-2022-49212.json | 142 +++++- CVE-2022/CVE-2022-492xx/CVE-2022-49213.json | 106 ++++- CVE-2022/CVE-2022-492xx/CVE-2022-49215.json | 98 ++++- CVE-2022/CVE-2022-492xx/CVE-2022-49216.json | 154 ++++++- CVE-2022/CVE-2022-492xx/CVE-2022-49218.json | 70 ++- CVE-2022/CVE-2022-492xx/CVE-2022-49219.json | 94 +++- CVE-2022/CVE-2022-492xx/CVE-2022-49221.json | 113 ++++- CVE-2022/CVE-2022-492xx/CVE-2022-49224.json | 154 ++++++- CVE-2022/CVE-2022-492xx/CVE-2022-49225.json | 70 ++- CVE-2022/CVE-2022-492xx/CVE-2022-49230.json | 82 +++- CVE-2022/CVE-2022-492xx/CVE-2022-49231.json | 70 ++- CVE-2022/CVE-2022-492xx/CVE-2022-49232.json | 130 +++++- CVE-2022/CVE-2022-492xx/CVE-2022-49233.json | 70 ++- CVE-2022/CVE-2022-492xx/CVE-2022-49235.json | 154 ++++++- CVE-2022/CVE-2022-492xx/CVE-2022-49237.json | 70 ++- CVE-2022/CVE-2022-492xx/CVE-2022-49239.json | 106 ++++- CVE-2023/CVE-2023-11xx/CVE-2023-1195.json | 22 +- CVE-2023/CVE-2023-18xx/CVE-2023-1859.json | 22 +- CVE-2023/CVE-2023-205xx/CVE-2023-20578.json | 14 +- CVE-2023/CVE-2023-20xx/CVE-2023-2019.json | 22 +- CVE-2023/CVE-2023-21xx/CVE-2023-2177.json | 22 +- CVE-2023/CVE-2023-230xx/CVE-2023-23064.json | 32 +- CVE-2023/CVE-2023-238xx/CVE-2023-23848.json | 32 +- CVE-2023/CVE-2023-238xx/CVE-2023-23850.json | 32 +- CVE-2023/CVE-2023-240xx/CVE-2023-24062.json | 34 +- CVE-2023/CVE-2023-242xx/CVE-2023-24236.json | 32 +- CVE-2023/CVE-2023-242xx/CVE-2023-24238.json | 32 +- CVE-2023/CVE-2023-244xx/CVE-2023-24483.json | 32 +- CVE-2023/CVE-2023-244xx/CVE-2023-24484.json | 22 +- CVE-2023/CVE-2023-245xx/CVE-2023-24580.json | 32 +- CVE-2023/CVE-2023-29xx/CVE-2023-2938.json | 32 +- CVE-2023/CVE-2023-310xx/CVE-2023-31084.json | 32 +- CVE-2023/CVE-2023-332xx/CVE-2023-33250.json | 32 +- CVE-2023/CVE-2023-332xx/CVE-2023-33288.json | 32 +- CVE-2023/CVE-2023-344xx/CVE-2023-34400.json | 39 +- CVE-2023/CVE-2023-370xx/CVE-2023-37022.json | 39 +- CVE-2023/CVE-2023-370xx/CVE-2023-37027.json | 34 +- CVE-2023/CVE-2023-370xx/CVE-2023-37058.json | 32 +- CVE-2023/CVE-2023-407xx/CVE-2023-40747.json | 14 +- CVE-2023/CVE-2023-438xx/CVE-2023-43850.json | 27 +- CVE-2023/CVE-2023-508xx/CVE-2023-50804.json | 12 +- CVE-2024/CVE-2024-125xx/CVE-2024-12577.json | 27 +- CVE-2024/CVE-2024-211xx/CVE-2024-21164.json | 14 +- CVE-2024/CVE-2024-221xx/CVE-2024-22102.json | 32 +- CVE-2024/CVE-2024-230xx/CVE-2024-23091.json | 32 +- CVE-2024/CVE-2024-234xx/CVE-2024-23486.json | 14 +- CVE-2024/CVE-2024-237xx/CVE-2024-23762.json | 32 +- CVE-2024/CVE-2024-239xx/CVE-2024-23929.json | 39 +- CVE-2024/CVE-2024-244xx/CVE-2024-24423.json | 32 +- CVE-2024/CVE-2024-264xx/CVE-2024-26495.json | 41 +- CVE-2024/CVE-2024-273xx/CVE-2024-27383.json | 14 +- CVE-2024/CVE-2024-384xx/CVE-2024-38477.json | 24 +- CVE-2024/CVE-2024-392xx/CVE-2024-39241.json | 32 +- CVE-2024/CVE-2024-399xx/CVE-2024-39924.json | 39 +- CVE-2024/CVE-2024-399xx/CVE-2024-39926.json | 39 +- CVE-2024/CVE-2024-403xx/CVE-2024-40393.json | 32 +- CVE-2024/CVE-2024-406xx/CVE-2024-40604.json | 32 +- CVE-2024/CVE-2024-408xx/CVE-2024-40842.json | 34 +- CVE-2024/CVE-2024-408xx/CVE-2024-40857.json | 34 +- CVE-2024/CVE-2024-413xx/CVE-2024-41310.json | 34 +- CVE-2024/CVE-2024-415xx/CVE-2024-41572.json | 32 +- CVE-2024/CVE-2024-416xx/CVE-2024-41614.json | 34 +- CVE-2024/CVE-2024-419xx/CVE-2024-41924.json | 14 +- CVE-2024/CVE-2024-41xx/CVE-2024-4180.json | 27 +- CVE-2024/CVE-2024-420xx/CVE-2024-42006.json | 34 +- CVE-2024/CVE-2024-426xx/CVE-2024-42698.json | 14 +- CVE-2024/CVE-2024-441xx/CVE-2024-44154.json | 34 +- CVE-2024/CVE-2024-441xx/CVE-2024-44155.json | 24 +- CVE-2024/CVE-2024-441xx/CVE-2024-44176.json | 34 +- CVE-2024/CVE-2024-441xx/CVE-2024-44186.json | 34 +- CVE-2024/CVE-2024-445xx/CVE-2024-44552.json | 14 +- CVE-2024/CVE-2024-465xx/CVE-2024-46581.json | 34 +- CVE-2024/CVE-2024-465xx/CVE-2024-46592.json | 34 +- CVE-2024/CVE-2024-470xx/CVE-2024-47049.json | 38 +- CVE-2024/CVE-2024-478xx/CVE-2024-47857.json | 39 +- CVE-2024/CVE-2024-478xx/CVE-2024-47899.json | 27 +- CVE-2024/CVE-2024-488xx/CVE-2024-48822.json | 14 +- CVE-2024/CVE-2024-489xx/CVE-2024-48955.json | 39 +- CVE-2024/CVE-2024-497xx/CVE-2024-49744.json | 39 +- CVE-2024/CVE-2024-509xx/CVE-2024-50945.json | 39 +- CVE-2024/CVE-2024-511xx/CVE-2024-51163.json | 39 +- CVE-2024/CVE-2024-529xx/CVE-2024-52943.json | 14 +- CVE-2024/CVE-2024-535xx/CVE-2024-53584.json | 39 +- CVE-2024/CVE-2024-544xx/CVE-2024-54478.json | 62 ++- CVE-2024/CVE-2024-570xx/CVE-2024-57019.json | 34 +- CVE-2024/CVE-2024-570xx/CVE-2024-57020.json | 34 +- CVE-2024/CVE-2024-570xx/CVE-2024-57098.json | 39 +- CVE-2024/CVE-2024-574xx/CVE-2024-57433.json | 39 +- CVE-2024/CVE-2024-575xx/CVE-2024-57580.json | 34 +- CVE-2024/CVE-2024-575xx/CVE-2024-57581.json | 34 +- CVE-2024/CVE-2024-576xx/CVE-2024-57655.json | 39 +- CVE-2024/CVE-2024-577xx/CVE-2024-57721.json | 39 +- CVE-2024/CVE-2024-75xx/CVE-2024-7527.json | 14 +- CVE-2024/CVE-2024-77xx/CVE-2024-7713.json | 24 +- CVE-2024/CVE-2024-93xx/CVE-2024-9398.json | 22 +- CVE-2025/CVE-2025-04xx/CVE-2025-0436.json | 37 +- CVE-2025/CVE-2025-206xx/CVE-2025-20633.json | 22 +- CVE-2025/CVE-2025-215xx/CVE-2025-21532.json | 14 +- CVE-2025/CVE-2025-215xx/CVE-2025-21547.json | 14 +- CVE-2025/CVE-2025-216xx/CVE-2025-21619.json | 78 ++++ CVE-2025/CVE-2025-229xx/CVE-2025-22918.json | 39 +- CVE-2025/CVE-2025-241xx/CVE-2025-24115.json | 36 +- CVE-2025/CVE-2025-241xx/CVE-2025-24130.json | 24 +- CVE-2025/CVE-2025-241xx/CVE-2025-24146.json | 39 +- CVE-2025/CVE-2025-241xx/CVE-2025-24154.json | 36 +- CVE-2025/CVE-2025-241xx/CVE-2025-24163.json | 24 +- CVE-2025/CVE-2025-247xx/CVE-2025-24799.json | 56 +++ CVE-2025/CVE-2025-248xx/CVE-2025-24801.json | 56 +++ CVE-2025/CVE-2025-250xx/CVE-2025-25040.json | 56 +++ CVE-2025/CVE-2025-250xx/CVE-2025-25042.json | 56 +++ CVE-2025/CVE-2025-264xx/CVE-2025-26410.json | 27 +- CVE-2025/CVE-2025-270xx/CVE-2025-27080.json | 56 +++ CVE-2025/CVE-2025-288xx/CVE-2025-28867.json | 47 +- CVE-2025/CVE-2025-288xx/CVE-2025-28870.json | 47 +- CVE-2025/CVE-2025-297xx/CVE-2025-29790.json | 82 ++++ CVE-2025/CVE-2025-299xx/CVE-2025-29907.json | 86 ++++ CVE-2025/CVE-2025-299xx/CVE-2025-29930.json | 82 ++++ CVE-2025/CVE-2025-301xx/CVE-2025-30137.json | 25 ++ CVE-2025/CVE-2025-301xx/CVE-2025-30138.json | 25 ++ CVE-2025/CVE-2025-301xx/CVE-2025-30139.json | 25 ++ CVE-2025/CVE-2025-301xx/CVE-2025-30141.json | 25 ++ CVE-2025/CVE-2025-301xx/CVE-2025-30142.json | 25 ++ README.md | 80 ++-- _state.csv | 464 ++++++++++---------- 165 files changed, 8135 insertions(+), 814 deletions(-) create mode 100644 CVE-2025/CVE-2025-216xx/CVE-2025-21619.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24799.json create mode 100644 CVE-2025/CVE-2025-248xx/CVE-2025-24801.json create mode 100644 CVE-2025/CVE-2025-250xx/CVE-2025-25040.json create mode 100644 CVE-2025/CVE-2025-250xx/CVE-2025-25042.json create mode 100644 CVE-2025/CVE-2025-270xx/CVE-2025-27080.json create mode 100644 CVE-2025/CVE-2025-297xx/CVE-2025-29790.json create mode 100644 CVE-2025/CVE-2025-299xx/CVE-2025-29907.json create mode 100644 CVE-2025/CVE-2025-299xx/CVE-2025-29930.json create mode 100644 CVE-2025/CVE-2025-301xx/CVE-2025-30137.json create mode 100644 CVE-2025/CVE-2025-301xx/CVE-2025-30138.json create mode 100644 CVE-2025/CVE-2025-301xx/CVE-2025-30139.json create mode 100644 CVE-2025/CVE-2025-301xx/CVE-2025-30141.json create mode 100644 CVE-2025/CVE-2025-301xx/CVE-2025-30142.json diff --git a/CVE-2017/CVE-2017-175xx/CVE-2017-17506.json b/CVE-2017/CVE-2017-175xx/CVE-2017-17506.json index c0d9ad42510..07b06619119 100644 --- a/CVE-2017/CVE-2017-175xx/CVE-2017-17506.json +++ b/CVE-2017/CVE-2017-175xx/CVE-2017-17506.json @@ -2,8 +2,8 @@ "id": "CVE-2017-17506", "sourceIdentifier": "cve@mitre.org", "published": "2017-12-11T03:29:00.440", - "lastModified": "2024-11-21T03:18:03.183", - "vulnStatus": "Modified", + "lastModified": "2025-03-18T20:25:10.330", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", @@ -85,8 +85,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:hdfgroup:hdf5:1.10.1:*:*:*:*:*:*:*", - "matchCriteriaId": "448E192C-0858-4E4B-8D03-B7684C97EFBA" + "criteria": "cpe:2.3:a:hdfgroup:hdf5:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.8.0", + "versionEndIncluding": "1.10.1", + "matchCriteriaId": "D6A139D8-EA25-44A3-9A7B-67CCE650579E" } ] } diff --git a/CVE-2018/CVE-2018-138xx/CVE-2018-13873.json b/CVE-2018/CVE-2018-138xx/CVE-2018-13873.json index a358e647c16..d0034665b7c 100644 --- a/CVE-2018/CVE-2018-138xx/CVE-2018-13873.json +++ b/CVE-2018/CVE-2018-138xx/CVE-2018-13873.json @@ -2,8 +2,8 @@ "id": "CVE-2018-13873", "sourceIdentifier": "cve@mitre.org", "published": "2018-07-10T21:29:00.577", - "lastModified": "2024-11-21T03:48:14.007", - "vulnStatus": "Modified", + "lastModified": "2025-03-18T20:24:50.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", @@ -85,8 +85,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:hdfgroup:hdf5:1.8.20:*:*:*:*:*:*:*", - "matchCriteriaId": "DBACEBD3-409C-4169-BF10-582071D36973" + "criteria": "cpe:2.3:a:hdfgroup:hdf5:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.8.0", + "versionEndIncluding": "1.8.20", + "matchCriteriaId": "5648F864-D078-444B-8378-217F444B53FF" } ] } diff --git a/CVE-2018/CVE-2018-140xx/CVE-2018-14015.json b/CVE-2018/CVE-2018-140xx/CVE-2018-14015.json index 5552d5cf490..9683aa226ba 100644 --- a/CVE-2018/CVE-2018-140xx/CVE-2018-14015.json +++ b/CVE-2018/CVE-2018-140xx/CVE-2018-14015.json @@ -2,8 +2,8 @@ "id": "CVE-2018-14015", "sourceIdentifier": "cve@mitre.org", "published": "2018-07-12T20:29:00.180", - "lastModified": "2024-11-21T03:48:27.123", - "vulnStatus": "Modified", + "lastModified": "2025-03-18T20:25:23.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -85,8 +85,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:radare:radare2:2.7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "693C6349-1A2D-48F3-A861-9E3F7832D174" + "criteria": "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndIncluding": "2.7.0", + "matchCriteriaId": "B8B8BB50-8502-4546-8D37-942FAE629739" } ] } diff --git a/CVE-2019/CVE-2019-166xx/CVE-2019-16638.json b/CVE-2019/CVE-2019-166xx/CVE-2019-16638.json index e223f6d44aa..c98c7b0ced3 100644 --- a/CVE-2019/CVE-2019-166xx/CVE-2019-16638.json +++ b/CVE-2019/CVE-2019-166xx/CVE-2019-16638.json @@ -2,7 +2,7 @@ "id": "CVE-2019-16638", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T17:15:10.330", - "lastModified": "2024-11-21T04:30:51.497", + "lastModified": "2025-03-18T20:15:16.020", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-312" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-162xx/CVE-2020-16296.json b/CVE-2020/CVE-2020-162xx/CVE-2020-16296.json index b722f6e5487..0c3e7a1798e 100644 --- a/CVE-2020/CVE-2020-162xx/CVE-2020-16296.json +++ b/CVE-2020/CVE-2020-162xx/CVE-2020-16296.json @@ -2,8 +2,8 @@ "id": "CVE-2020-16296", "sourceIdentifier": "cve@mitre.org", "published": "2020-08-13T03:15:13.383", - "lastModified": "2024-11-21T05:07:07.440", - "vulnStatus": "Modified", + "lastModified": "2025-03-18T20:25:57.440", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -86,8 +86,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.18", "versionEndExcluding": "9.52", - "matchCriteriaId": "F5FAC7D9-2E45-4720-833F-EE7E5FA53299" + "matchCriteriaId": "7F3B7B83-FABF-4F34-98C0-ECD5259D9A6F" } ] } @@ -151,7 +152,10 @@ }, { "url": "https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=9f39ed4a92578a020ae10459643e1fe72573d134", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00032.html", @@ -193,7 +197,10 @@ }, { "url": "https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=9f39ed4a92578a020ae10459643e1fe72573d134", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00032.html", diff --git a/CVE-2020/CVE-2020-175xx/CVE-2020-17538.json b/CVE-2020/CVE-2020-175xx/CVE-2020-17538.json index b03f57f186b..612b3ffbc1c 100644 --- a/CVE-2020/CVE-2020-175xx/CVE-2020-17538.json +++ b/CVE-2020/CVE-2020-175xx/CVE-2020-17538.json @@ -2,8 +2,8 @@ "id": "CVE-2020-17538", "sourceIdentifier": "cve@mitre.org", "published": "2020-08-13T03:15:14.493", - "lastModified": "2024-11-21T05:08:19.363", - "vulnStatus": "Modified", + "lastModified": "2025-03-18T20:26:51.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -85,8 +85,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:artifex:ghostscript:9.50:*:*:*:*:*:*:*", - "matchCriteriaId": "089333A5-72AA-4E68-8A8E-81876AAC9DD3" + "criteria": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.18", + "versionEndExcluding": "9.52", + "matchCriteriaId": "7F3B7B83-FABF-4F34-98C0-ECD5259D9A6F" } ] } @@ -150,7 +152,10 @@ }, { "url": "https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=9f39ed4a92578a020ae10459643e1fe72573d134", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00032.html", @@ -192,7 +197,10 @@ }, { "url": "https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=9f39ed4a92578a020ae10459643e1fe72573d134", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00032.html", diff --git a/CVE-2021/CVE-2021-321xx/CVE-2021-32163.json b/CVE-2021/CVE-2021-321xx/CVE-2021-32163.json index eabc0b044f0..6c813505015 100644 --- a/CVE-2021/CVE-2021-321xx/CVE-2021-32163.json +++ b/CVE-2021/CVE-2021-321xx/CVE-2021-32163.json @@ -2,7 +2,7 @@ "id": "CVE-2021-32163", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-17T18:15:10.917", - "lastModified": "2024-11-21T06:06:53.683", + "lastModified": "2025-03-18T20:15:16.247", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-324xx/CVE-2021-32419.json b/CVE-2021/CVE-2021-324xx/CVE-2021-32419.json index f0d4e759dbf..8234cf3e669 100644 --- a/CVE-2021/CVE-2021-324xx/CVE-2021-32419.json +++ b/CVE-2021/CVE-2021-324xx/CVE-2021-32419.json @@ -2,7 +2,7 @@ "id": "CVE-2021-32419", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-17T18:15:10.970", - "lastModified": "2024-11-21T06:07:00.247", + "lastModified": "2025-03-18T20:15:16.413", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-332xx/CVE-2021-33226.json b/CVE-2021/CVE-2021-332xx/CVE-2021-33226.json index 2fe0d8fd566..094c4a2b624 100644 --- a/CVE-2021/CVE-2021-332xx/CVE-2021-33226.json +++ b/CVE-2021/CVE-2021-332xx/CVE-2021-33226.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33226", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-17T18:15:11.083", - "lastModified": "2024-11-21T06:08:33.643", + "lastModified": "2025-03-18T19:15:38.633", "vulnStatus": "Modified", "cveTags": [ { @@ -39,6 +39,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -52,6 +72,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-333xx/CVE-2021-33391.json b/CVE-2021/CVE-2021-333xx/CVE-2021-33391.json index e5510cb540e..9f70ecd1850 100644 --- a/CVE-2021/CVE-2021-333xx/CVE-2021-33391.json +++ b/CVE-2021/CVE-2021-333xx/CVE-2021-33391.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33391", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-17T18:15:11.187", - "lastModified": "2024-11-21T06:08:47.487", + "lastModified": "2025-03-18T19:15:39.667", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-339xx/CVE-2021-33948.json b/CVE-2021/CVE-2021-339xx/CVE-2021-33948.json index c73381da48f..ee2a57063d6 100644 --- a/CVE-2021/CVE-2021-339xx/CVE-2021-33948.json +++ b/CVE-2021/CVE-2021-339xx/CVE-2021-33948.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33948", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-17T18:15:11.293", - "lastModified": "2024-11-21T06:09:47.800", + "lastModified": "2025-03-18T19:15:39.840", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-339xx/CVE-2021-33949.json b/CVE-2021/CVE-2021-339xx/CVE-2021-33949.json index d6911bfce82..7dfa232a032 100644 --- a/CVE-2021/CVE-2021-339xx/CVE-2021-33949.json +++ b/CVE-2021/CVE-2021-339xx/CVE-2021-33949.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33949", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-17T18:15:11.347", - "lastModified": "2024-11-21T06:09:47.950", + "lastModified": "2025-03-18T19:15:40.000", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-339xx/CVE-2021-33950.json b/CVE-2021/CVE-2021-339xx/CVE-2021-33950.json index cfe6265e1c6..e358f79c100 100644 --- a/CVE-2021/CVE-2021-339xx/CVE-2021-33950.json +++ b/CVE-2021/CVE-2021-339xx/CVE-2021-33950.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33950", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-17T18:15:11.403", - "lastModified": "2024-11-21T06:09:48.117", + "lastModified": "2025-03-18T19:15:40.160", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-611" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-449xx/CVE-2021-44923.json b/CVE-2021/CVE-2021-449xx/CVE-2021-44923.json index 80522a1c0bd..d3300dc8d08 100644 --- a/CVE-2021/CVE-2021-449xx/CVE-2021-44923.json +++ b/CVE-2021/CVE-2021-449xx/CVE-2021-44923.json @@ -2,8 +2,8 @@ "id": "CVE-2021-44923", "sourceIdentifier": "cve@mitre.org", "published": "2021-12-21T21:15:07.717", - "lastModified": "2024-11-21T06:31:42.747", - "vulnStatus": "Modified", + "lastModified": "2025-03-18T20:27:28.367", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -85,8 +85,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F" + "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.9.0", + "versionEndIncluding": "1.1.0", + "matchCriteriaId": "09771DAE-BE6D-498E-9DB3-3C3D4AB5BFC7" } ] } diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47631.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47631.json index 110863e2c5f..5b1f0e745c9 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47631.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47631.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47631", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:04.400", - "lastModified": "2025-02-26T06:37:04.400", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:35:26.410", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,169 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ARM: davinci: da850-evm: Evitar la desreferencia de puntero NULL Con versiones m\u00e1s nuevas de GCC, hay un p\u00e1nico en da850_evm_config_emac() al iniciar multi_v5_defconfig en QEMU bajo la m\u00e1quina palmetto-bmc: No se puede manejar la desreferencia de puntero NULL del kernel en la direcci\u00f3n virtual 00000020 pgd = (ptrval) [00000020] *pgd=00000000 Error interno: Oops: 5 [#1] PREEMPT M\u00f3dulos ARM vinculados: CPU: 0 PID: 1 Comm: swapper No contaminado 5.15.0 #1 Nombre del hardware: Sistema gen\u00e9rico basado en DT La PC est\u00e1 en da850_evm_config_emac+0x1c/0x120 LR est\u00e1 en El puntero emac_pdata en soc_info es NULL porque davinci_soc_info solo se completa en m\u00e1quinas davinci, pero se llama a da850_evm_config_emac() en todas las m\u00e1quinas a trav\u00e9s de device_initcall(). Mueva la asignaci\u00f3n rmii_en debajo de la verificaci\u00f3n de la m\u00e1quina para que solo se desreferencia cuando se ejecuta en un SoC compatible." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.33", + "versionEndExcluding": "4.9.311", + "matchCriteriaId": "69F5BE41-4847-4042-A7A9-B9871DCBCCCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.276", + "matchCriteriaId": "6D9B028C-6313-47F9-94B7-5F8122345E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.239", + "matchCriteriaId": "712D9B45-4B53-4563-94B5-F758AFBBFB0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.190", + "matchCriteriaId": "E0ADBA6D-47D8-4518-8D10-9B9196DE680B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.112", + "matchCriteriaId": "0460A5D2-3024-497A-B799-23E025B91972" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.35", + "matchCriteriaId": "05ABCC3F-88A9-47F9-9D40-8665747B2E43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.4", + "matchCriteriaId": "E22C86CB-06CD-4D16-AB2A-F21EE8199262" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*", + "matchCriteriaId": "6AD94161-84BB-42E6-9882-4FC0C42E9FC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*", + "matchCriteriaId": "7AB06DDF-3C2B-416D-B448-E990D8FF67A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0940795c6834fbe7705acc5c3d4b2f7a5f67527a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0a312ec66a03133d28570f07bc52749ccfef54da", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/83a1cde5c74bfb44b49cb2a940d044bb2380f4ea", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/89931d4762572aaee6edbe5673d41f8082de110f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a12b356d45cbb6e8a1b718d1436b3d6239a862f3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c06f476e5b74bcabb8c4a2fba55864a37e62843b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c5628533a3ece64235d04fe11ec44d2be99e423d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c64e2ed5cc376e137e572babfd2edc38b2cfb61b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47632.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47632.json index f687dbae481..ca02d9b3105 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47632.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47632.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47632", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:04.943", - "lastModified": "2025-02-26T06:37:04.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:35:06.943", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,102 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc/set_memory: Evitar recursi\u00f3n de spinlock en change_page_attr() La confirmaci\u00f3n 1f9ad21c3b38 (\"powerpc/mm: Implementar rutinas set_memory()\") incluy\u00f3 un spin_lock() en change_page_attr() para realizar de forma segura las operaciones de tres pasos. Pero luego, la confirmaci\u00f3n 9f7853d7609d (\"powerpc/mm: Arreglar set_memory_*() contra accesos concurrentes\") lo modific\u00f3 para usar pte_update() y realizar la operaci\u00f3n de forma segura contra accesos concurrentes. Mientras tanto, Maxime inform\u00f3 de cierta recursi\u00f3n de spinlock. [ 15.351649] ERROR: recursi\u00f3n de spinlock en CPU#0, kworker/0:2/217 [ 15.357540] bloqueo: init_mm+0x3c/0x420, .magic: dead4ead, .owner: kworker/0:2/217, .owner_cpu: 0 [ 15.366563] CPU: 0 PID: 217 Comm: kworker/0:2 No contaminado 5.15.0+ #523 [ 15.373350] Cola de trabajo: events do_free_init [ 15.377615] Call Trace: [ 15.380232] [e4105ac0] [800946a4] do_raw_spin_lock+0xf8/0x120 (unreliable) [ 15.387340] [e4105ae0] [8001f4ec] change_page_attr+0x40/0x1d4 [ 15.393413] [e4105b10] [801424e0] __apply_to_page_range+0x164/0x310 [ 15.400009] [e4105b60] [80169620] free_pcp_prepare+0x1e4/0x4a0 [ 15.406045] [e4105ba0] [8016c5a0] free_unref_page+0x40/0x2b8 [ 15.411979] [e4105be0] [8018724c] kasan_depopulate_vmalloc_pte+0x6c/0x94 [ 15.418989] [e4105c00] [801424e0] __apply_to_page_range+0x164/0x310 [ 15.425451] [e4105c50] [80187834] kasan_release_vmalloc+0xbc/0x134 [ 15.431898] [e4105c70] [8015f7a8] __purge_vmap_area_lazy+0x4e4/0xdd8 [ 15.438560] [e4105d30] [80160d10] _vm_unmap_aliases.part.0+0x17c/0x24c [ 15.445283] [e4105d60] [801642d0] __vunmap+0x2f0/0x5c8 [ 15.450684] [e4105db0] [800e32d0] do_free_init+0x68/0x94 [ 15.456181] [e4105dd0] [8005d094] process_one_work+0x4bc/0x7b8 [ 15.462283] [e4105e90] [8005d614] worker_thread+0x284/0x6e8 [ 15.468227] [e4105f00] [8006aaec] kthread+0x1f0/0x210 [ 15.473489] [e4105f40] [80017148] ret_from_kernel_thread+0x14/0x1c Elimina la secuencia de lectura/modificaci\u00f3n/escritura para hacer que la operaci\u00f3n sea at\u00f3mica y elimina el spin_lock() en change_page_attr(). Para hacer la operaci\u00f3n de forma at\u00f3mica, ya no podemos usar ayudantes de modificaci\u00f3n de pte. Debido a que todas las plataformas tienen diferentes combinaciones de bits, no es f\u00e1cil usar esos bits directamente. Pero todas tienen el conjunto de indicadores _PAGE_KERNEL_{RO/ROX/RW/RWX}. Todo lo que necesitamos es comparar dos conjuntos para saber qu\u00e9 bits est\u00e1n configurados o borrados. Por ejemplo, al comparar _PAGE_KERNEL_ROX y _PAGE_KERNEL_RO sabes qu\u00e9 bit se borra y qu\u00e9 bit se configura al cambiar el permiso de ejecuci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.34", + "matchCriteriaId": "EE872F08-121D-4AE8-82B9-2B5DA905C944" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.20", + "matchCriteriaId": "ABBBA66E-0244-4621-966B-9790AF1EEB00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.3", + "matchCriteriaId": "AE420AC7-1E59-4398-B84F-71F4B4337762" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/6def4eaf0391f24be541633a954c0e4876858b1e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6ebe5ca2cbe438a688f2ae238ef5a0b0b5f3468a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/96917107e67846f1d959ed03be281048efad14c5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a4c182ecf33584b9b2d1aa9dad073014a504c01f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47636.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47636.json index 4d384fe00cc..90ef006f2f9 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47636.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47636.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47636", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:05.377", - "lastModified": "2025-02-26T06:37:05.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:29:55.410", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,145 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ubifs: Se corrige la lectura fuera de los l\u00edmites en la funci\u00f3n ubifs_wbuf_write_nolock() ubifs_wbuf_write_nolock() puede acceder a buf fuera de los l\u00edmites en el siguiente proceso: ubifs_wbuf_write_nolock(): classified_len = ALIGN(len, 8); // Supongamos que len = 4089, classified_len = 4096 if (aligned_len <= wbuf->avail) ... // No satisface if (wbuf->used) { ubifs_leb_write() // Complete algunos datos en avail wbuf len -= wbuf->avail; // len a\u00fan no est\u00e1 alineado a 8 bytes classified_len -= wbuf->avail; } n = classified_len >> c->max_write_shift; if (n) { n <<= c->max_write_shift; err = ubifs_leb_write(c, wbuf->lnum, buf + escrito, wbuf->offs, n); // n > len, lectura fuera de los l\u00edmites menor a 8(n-len) bytes }, lo cual puede ser detectado por KASAN: =========================================================== ERROR: KASAN: slab fuera de los l\u00edmites en ecc_sw_hamming_calculate+0x1dc/0x7d0 Lectura de tama\u00f1o 4 en la direcci\u00f3n ffff888105594ff8 por la tarea kworker/u8:4/128 Cola de trabajo: escritura diferida wb_workfn (flush-ubifs_0_0) Rastreo de llamadas: kasan_report.cold+0x81/0x165 nand_write_page_swecc+0xa9/0x160 ubifs_leb_write+0xf2/0x1b0 [ubifs] ubifs_wbuf_write_nolock+0x421/0x12c0 [ubifs] write_head+0xdc/0x1c0 [ubifs] ubifs_jnl_write_inode+0x627/0x960 [ubifs] wb_workfn+0x8af/0xb80 La funci\u00f3n ubifs_wbuf_write_nolock() acepta que el par\u00e1metro 'len' no est\u00e9 alineado con 8 bytes, 'len' representa la longitud verdadera de buf (que est\u00e1 asignada en 'ubifs_jnl_xxx', p. ej. ubifs_jnl_write_inode), por lo que ubifs_wbuf_write_nolock() debe manejar la longitud le\u00edda de 'buf' con cuidado para escribir leb de forma segura. Obtenga un reproductor en [Enlace]." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.27", + "versionEndExcluding": "4.19.238", + "matchCriteriaId": "EF5DCB1F-AE17-4717-80C7-5786A2F74C0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.189", + "matchCriteriaId": "8CB6E8F5-C2B1-46F3-A807-0F6104AC340F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.110", + "matchCriteriaId": "91D3BFD0-D3F3-4018-957C-96CCBF357D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/07a209fadee7b53b46858538e1177597273862e4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3b7fb89135a20587d57f8877c02e25003e9edbdf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4f2262a334641e05f645364d5ade1f565c85f20b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5343575aa11c5d7044107d59d43f84aec01312b0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a7054aaf1909cf40489c0ec1b728fdcf79c751a6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b80ccbec0e4804436c382d7dd60e943c386ed83a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e09fa5318d51f522e1af4fbaf8f74999355980c8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47637.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47637.json index a82c201e20f..b6b498ff8e2 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47637.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47637.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47637", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:05.477", - "lastModified": "2025-02-26T06:37:05.477", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:30:11.170", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,145 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad:\n\nubifs: Se corrige interbloqueo en concurrencia de un renombrado con whiteout simult\u00e1neo a la escritura del inodo.\n\nTareas colgadas:\n[ 77.028764] task:kworker/u8:4 state:D stack: 0 pid: 132\n[ 77.028820] Call Trace:\n[ 77.029027] schedule+0x8c/0x1b0\n[ 77.029067] mutex_lock+0x50/0x60\n[ 77.029074] ubifs_write_inode+0x68/0x1f0 [ubifs]\n[ 77.029117] __writeback_single_inode+0x43c/0x570\n[ 77.029128] writeback_sb_inodes+0x259/0x740\n[ 77.029148] wb_writeback+0x107/0x4d0\n[ 77.029163] wb_workfn+0x162/0x7b0\n\n[ 92.390442] task:aa state:D stack: 0 pid: 1506\n[ 92.390448] Call Trace:\n[ 92.390458] schedule+0x8c/0x1b0\n[ 92.390461] wb_wait_for_completion+0x82/0xd0\n[ 92.390469] __writeback_inodes_sb_nr+0xb2/0x110\n[ 92.390472] writeback_inodes_sb_nr+0x14/0x20\n[ 92.390476] ubifs_budget_space+0x705/0xdd0 [ubifs]\n[ 92.390503] do_rename.cold+0x7f/0x187 [ubifs]\n[ 92.390549] ubifs_rename+0x8b/0x180 [ubifs]\n[ 92.390571] vfs_rename+0xdb2/0x1170\n[ 92.390580] do_renameat2+0x554/0x770\n\n, ocasionado por procesos simult\u00e1neos de renombrado con whiteout y escritura del inodo:\n\trename_whiteout(Thread 1)\t wb_workfn(Thread2)\nubifs_rename\n do_rename\n lock_4_inodes (Hold ui_mutex)\n ubifs_budget_space\n make_free_space\n shrink_liability\n\t __writeback_inodes_sb_nr\n\t bdi_split_work_to_wbs (Queue new wb work)\n\t\t\t\t\t wb_do_writeback(wb work)\n\t\t\t\t\t\t__writeback_single_inode\n\t\t\t\t\t ubifs_write_inode\n\t\t\t\t\t LOCK(ui_mutex)\n\t\t\t\t\t\t\t ?\n\t wb_wait_for_completion (Wait wb work) <-- \u00a1interbloqueo!\n\nCaso de prueba:\n 1. SYS_renameat2(\"/mp/dir/file\", \"/mp/dir/whiteout\", RENAME_WHITEOUT)\n 2. Consumir todo el espacio antes de que kernel(mdelay) planifique el whiteout\n\nArreglado calculando el espacio de whiteout antes de bloquear los inodos de ubifs.\n\nTambi\u00e9n soluciona etiqueta la etiqueta goto err\u00f3nea 'out_release' en el flujo de errores\nde la planificaci\u00f3n del whiteout (al menos deber\u00eda recuperar el directorio i_size y desbloquear 4 inodos de ubifs).\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.9", + "versionEndExcluding": "4.19.238", + "matchCriteriaId": "4F595F79-E987-432C-B888-4E73F3873ECD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.189", + "matchCriteriaId": "8CB6E8F5-C2B1-46F3-A807-0F6104AC340F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.110", + "matchCriteriaId": "91D3BFD0-D3F3-4018-957C-96CCBF357D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/37bdf1ad592555ecda1d55b89f6e393e4c0589d1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/70e9090acc32348cedc5def0cd6d5c126efc97b9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/83e42a78428fc354f5e2049935b84c8d8d29b787", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8b278c8dcfb565cb65eceb62a38cbf7a7c326db5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9dddc8211430fb851ddf0b168e3a00c6f66cc185", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/afd427048047e8efdedab30e8888044e2be5aa9c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c58af8564a7b08757173009030b74baf4b2b762b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47638.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47638.json index e288b383c60..0fd9b9ce4e3 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47638.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47638.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47638", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:05.580", - "lastModified": "2025-02-26T06:37:05.580", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:08:37.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,159 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ubifs: rename_whiteout: Se corrige la doble liberaci\u00f3n para whiteout_ui->data 'whiteout_ui->data' se liberar\u00e1 dos veces si el presupuesto de espacio falla para la operaci\u00f3n de cambio de nombre de whiteout como el siguiente proceso: rename_whiteout dev = kmalloc whiteout_ui->data = dev kfree(whiteout_ui->data) // Libera la primera vez iput(whiteout) ubifs_free_inode kfree(ui->data) // \u00a1Doble liberaci\u00f3n! KASAN informa: ==================================================================== ERROR: KASAN: liberaci\u00f3n doble o liberaci\u00f3n no v\u00e1lida en ubifs_free_inode+0x4f/0x70 Seguimiento de llamadas: kfree+0x117/0x490 ubifs_free_inode+0x4f/0x70 [ubifs] i_callback+0x30/0x60 rcu_do_batch+0x366/0xac0 __do_softirq+0x133/0x57f Asignado por la tarea 1506: kmem_cache_alloc_trace+0x3c2/0x7a0 do_rename+0x9b7/0x1150 [ubifs] ubifs_rename+0x106/0x1f0 [ubifs] do_syscall_64+0x35/0x80 Liberado por la tarea 1506: kfree+0x117/0x490 do_rename.cold+0x53/0x8a [ubifs] ubifs_rename+0x106/0x1f0 [ubifs] do_syscall_64+0x35/0x80 La direcci\u00f3n con errores pertenece al objeto en ffff88810238bed8 que pertenece al cach\u00e9 kmalloc-8 de tama\u00f1o 8 ===================================================================== Deje que ubifs_free_inode() libere 'whiteout_ui->data'. Por cierto, elimine la asignaci\u00f3n no utilizada 'whiteout_ui->data_len = 0', el proceso 'ubifs_evict_inode() -> ubifs_jnl_delete_inode() -> ubifs_jnl_write_inode()' no lo necesita (porque 'inc_nlink(whiteout)' no ser\u00e1 ejecutado por 'goto out_release', y el nlink del inodo whiteout es 0)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.9", + "versionEndExcluding": "4.14.276", + "matchCriteriaId": "EA8D1234-835A-47E7-8014-55948757E778" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.238", + "matchCriteriaId": "FA28527A-11D3-41D2-9C4C-ECAC0D6A4A2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.189", + "matchCriteriaId": "8CB6E8F5-C2B1-46F3-A807-0F6104AC340F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.110", + "matchCriteriaId": "91D3BFD0-D3F3-4018-957C-96CCBF357D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/14276d38c89a170363e90b6ac0a53c3cf61b87fc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2ad07009c459e56ebdcc089d850d664660fdb742", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2b3236ecf96db7af5836e1366ce39ace8ce832fa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/40a8f0d5e7b3999f096570edab71c345da812e3e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6d7a158a7363c1f6604aa47ae1a280a5c65123dd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8b3c7be16f3f4dfd6e15ac651484e59d3fa36274", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a90e2dbe66d2647ff95a0442ad2e86482d977fd8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b9a937f096e608b3368c1abc920d4d640ba2c94f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47640.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47640.json index 10153f03af7..71e62799da3 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47640.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47640.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47640", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:05.780", - "lastModified": "2025-02-26T06:37:05.780", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:09:21.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,131 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc/kasan: Se solucion\u00f3 que la regi\u00f3n temprana no se actualizara correctamente La tabla de p\u00e1ginas de shadow no se actualiza cuando PTE_RPN_SHIFT es 24 y PAGE_SHIFT es 12. No solo causa falsos positivos sino tambi\u00e9n falsos negativos como se muestra en el siguiente texto. Arr\u00e9glelo trayendo la l\u00f3gica de kasan_early_shadow_page_entry aqu\u00ed. 1. Falso positivo: ==================================================================== ERROR: KASAN: vmalloc fuera de los l\u00edmites en pcpu_alloc+0x508/0xa50 Escritura de tama\u00f1o 16 en la direcci\u00f3n f57f3be0 por la tarea swapper/0/1 CPU: 0 PID: 1 Comm: swapper/0 No contaminado 5.15.0-12267-gdebe436e77c7 #1 Seguimiento de llamadas: [c80d1c20] [c07fe7b8] dump_stack_lvl+0x4c/0x6c (no confiable) [c80d1c40] [c02ff668] print_address_description.constprop.0+0x88/0x300 [c80d1c70] [c02ff45c] kasan_report+0x1ec/0x200 [c80d1cb0] [c0300b20] kasan_check_range+0x160/0x2f0 [c80d1cc0] [c03018a4] memset+0x34/0x90 [c80d1ce0] [c0280108] pcpu_alloc+0x508/0xa50 [c80d1d40] [c02fd7bc] __kmem_cache_create+0xfc/0x570 [c80d1d70] [c0283d64] kmem_cache_create_usercopy+0x274/0x3e0 [c80d1db0] [c2036580] init_sd+0xc4/0x1d0 [c80d1de0] [c00044a0] do_one_initcall+0xc0/0x33c [c80d1eb0] [c2001624] kernel_init_freeable+0x2c8/0x384 [c80d1ef0] [c0004b14] kernel_init+0x24/0x170 [c80d1f10] [c001b26c] ret_from_kernel_thread+0x5c/0x64 Estado de la memoria alrededor de la direcci\u00f3n con errores: f57f3a80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f57f3b00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 >f57f3b80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ^ f57f3c80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 ===================================================================== 2. Falso negativo (con pruebas KASAN): ==================================================================== Antes de la correcci\u00f3n: ok 45 - kmalloc_double_kzfree # vmalloc_oob: EXPECTATIVA FALL\u00d3 en lib/test_kasan.c:1039 Se esperaba una falla de KASAN en \"((volatile char *)area)[3100]\", pero no ocurri\u00f3 ninguna no ok 46 - vmalloc_oob no ok 1 - kasan ======================================================================== Despu\u00e9s de la correcci\u00f3n: ok 1 - kasan" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4", + "versionEndExcluding": "5.4.189", + "matchCriteriaId": "80DDFBB5-E7D8-4F00-9608-47CCB8D46CA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.110", + "matchCriteriaId": "91D3BFD0-D3F3-4018-957C-96CCBF357D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5a3d8f3192a409893c57808cc935e16484df1068", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7f19245c3647afea8c7c41f795506ef70f64b9f2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dd75080aa8409ce10d50fb58981c6b59bf8707d3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/de56beace6648065d404cd9835aa7d30e3df519d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e3d157a4b4f4e0268c98be5b7013bf4b31234bb6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f39a3309393a4a484532f6ba745c6acbcfe06115", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47641.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47641.json index 6deee41468c..68de437e971 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47641.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47641.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47641", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:05.883", - "lastModified": "2025-02-26T06:37:05.883", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:09:26.503", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,172 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: video: fbdev: cirrusfb: comprobar pixclock para evitar la divisi\u00f3n por cero Realice una comprobaci\u00f3n de la depuraci\u00f3n del valor de pixclock para evitar la divisi\u00f3n por cero. Si el valor de pixclock es cero, el controlador cirrusfb redondear\u00e1 el valor de pixclock para obtener la frecuencia derivada lo m\u00e1s cercana posible a maxclock. Syzkaller inform\u00f3 un error de divisi\u00f3n en cirrusfb_check_pixclock. Error de divisi\u00f3n: 0000 [#1] SMP KASAN PTI CPU: 0 PID: 14938 Comm: cirrusfb_test No contaminado 5.15.0-rc6 #1 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.11.0-2 RIP: 0010:cirrusfb_check_var+0x6f1/0x1260 Seguimiento de llamadas: fb_set_var+0x398/0xf90 do_fb_ioctl+0x4b8/0x6f0 fb_ioctl+0xeb/0x130 __x64_sys_ioctl+0x19d/0x220 do_syscall_64+0x3a/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xae" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-369" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.9.311", + "matchCriteriaId": "C86EFD13-93D4-4385-83E8-C665BE8F570F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.276", + "matchCriteriaId": "6D9B028C-6313-47F9-94B7-5F8122345E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.238", + "matchCriteriaId": "FA28527A-11D3-41D2-9C4C-ECAC0D6A4A2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.189", + "matchCriteriaId": "8CB6E8F5-C2B1-46F3-A807-0F6104AC340F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.110", + "matchCriteriaId": "91D3BFD0-D3F3-4018-957C-96CCBF357D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1d3fb46439ad4e8f0c5739eb33d1875ac9e0f135", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/40b13e3d85744210db13457785646634e2d056bd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/45800c42ef000f417270bcfc08630e42486fca99", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/53a2088a396cfa1da92690a1da289634cd73bf0d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5c6f402bdcf9e7239c6bc7087eda71ac99b31379", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6fe23ff94e7840097202e85c148688940b37c9b1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8c7e2141fb89c620ab4e41512e262fbf25b8260d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c656d04247a2654ede5cead2ecbf83431dad5261", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e498b504f8c81b07efab9febf8503448de4dc9cf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47644.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47644.json index 80be33a04d1..90a20cfc77a 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47644.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47644.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47644", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:06.197", - "lastModified": "2025-02-26T06:37:06.197", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:09:34.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,116 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: staging: media: zoran: move videodev alloc Mueva parte del c\u00f3digo de zr36057_init() y cree nuevas funciones para manejar zr->video_dev. Esto permite facilitar la lectura del c\u00f3digo y reparar una p\u00e9rdida de memoria en zr->video_dev." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.10.110", + "matchCriteriaId": "B9CDD38D-425B-44B2-A60F-7E0DB2E4A472" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1e501ec38796f43e995731d1bcd4173cb1ccfce0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/82e3a496eb56da0b9f29fdc5b63cedb3289e91de", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bd01629315ffd5b63da91d0bd529a77d30e55028", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c1ba65100a359fe28cfe37e09e10c99f247cbf1e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ff3357bffd9fb78f59762d8955afc7382a279079", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47645.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47645.json index c34de96c6b1..0c7dad38614 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47645.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47645.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47645", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:06.293", - "lastModified": "2025-02-26T06:37:06.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:09:58.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,116 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: staging: media: zoran: calcula el n\u00famero de b\u00fafer correcto para zoran_reap_stat_com En el caso tmp_dcim=1, el \u00edndice del b\u00fafer se calcula mal. Esto genera una desreferencia de puntero NULL m\u00e1s adelante. Por lo tanto, arreglemos el c\u00e1lculo y agreguemos una verificaci\u00f3n para evitar que esto vuelva a aparecer." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.10.110", + "matchCriteriaId": "B9CDD38D-425B-44B2-A60F-7E0DB2E4A472" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/20811bbe685ca3eddd34b0c750860427d7030910", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/20db2ed1e2f9fcd417fa67853e5154f0c2537d6c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7e76f3ed7ab2ae026c6ef9cc23096a7554af8c52", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bafec1a6ba4b187a7fcdcfce0faebdc623d4ef8e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e3b86f4e558cea9eed71d894df2f19b10d60a207", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47648.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47648.json index a620ffc07ec..1b62d8b50b0 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47648.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47648.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47648", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:06.597", - "lastModified": "2025-02-26T06:37:06.597", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:10:10.993", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gpu: host1x: Se corrige una p\u00e9rdida de memoria en 'host1x_remove()'. Se agrega una llamada 'host1x_channel_list_free()' faltante en la funci\u00f3n de eliminaci\u00f3n, como ya se hizo en la ruta de manejo de errores de la funci\u00f3n de sonda." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.13", + "versionEndExcluding": "5.10.110", + "matchCriteriaId": "C0C1DAF0-5D08-4F6F-83CD-0DFD7D00948D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/025c6643a81564f066d8381b9e2f4603e0f8438f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5124a344983e1b9670dae7add0e4d00d589aabcd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6bb107332db28a0e9256c2d36a0902b85307612c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c06577a80485511b894cb688e881ef0bc2d1d296", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fe1ce680560d4f0049ffa0c687de17567421c1ec", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47651.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47651.json index 54ac3919ef9..7dd8157960e 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47651.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47651.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47651", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:06.880", - "lastModified": "2025-02-26T06:37:06.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:10:27.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,131 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: soc: qcom: rpmpd: Verificar el retorno nulo de devm_kcalloc Debido al posible fallo de la asignaci\u00f3n, data->domains podr\u00eda ser un puntero NULL y provocar\u00e1 la desreferencia del puntero NULL m\u00e1s adelante. Por lo tanto, podr\u00eda ser mejor verificarlo y devolver directamente -ENOMEM sin liberar los datos manualmente si falla, porque el comentario de devm_kmalloc() dice \"La memoria asignada con esta funci\u00f3n se libera autom\u00e1ticamente al desconectar el controlador\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1", + "versionEndExcluding": "5.4.189", + "matchCriteriaId": "20548D34-DDDF-49E1-9708-FE7FA4FB8C21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.110", + "matchCriteriaId": "91D3BFD0-D3F3-4018-957C-96CCBF357D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/31b5124d742969ea8bf7a1360596f548ca23e770", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5a811126d38f9767a20cc271b34db7c8efc5a46c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/724376c30af5a57686b223dbcd6188e07d2a1de2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/755dbc3d73789ac9f0017c729abf5e4b153bf799", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/84b89fa877ad576e9ee8130f412cfd592f274508", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b5d6eba71997b6d661935d2b15094ac7f9f6132d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47652.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47652.json index bb2e4d3c9fa..ccfd691179e 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47652.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47652.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47652", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T06:37:06.973", - "lastModified": "2025-02-26T06:37:06.973", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:10:43.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,173 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: video: fbdev: smscufx: Corregir null-ptr-deref en ufx_usb_probe() Recib\u00ed un informe de null-ptr-deref: ERROR: desreferencia de puntero NULL del kernel, direcci\u00f3n: 0000000000000000 ... RIP: 0010:fb_destroy_modelist+0x38/0x100 ... Seguimiento de llamadas: ufx_usb_probe.cold+0x2b5/0xac1 [smscufx] usb_probe_interface+0x1aa/0x3c0 [usbcore] really_probe+0x167/0x460 ... ret_from_fork+0x1f/0x30 Si fb_alloc_cmap() falla en ufx_usb_probe(), fb_destroy_modelist() Se llamar\u00e1 a modelist para destruirlo en la ruta de manejo de errores. Pero modelist a\u00fan no se ha inicializado, por lo que dar\u00e1 como resultado null-ptr-deref. Inicialice modelist antes de llamar a fb_alloc_cmap() para corregir este error." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.2", + "versionEndExcluding": "4.9.311", + "matchCriteriaId": "91A60DD7-6C23-4025-B18F-3CE419A63086" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.276", + "matchCriteriaId": "6D9B028C-6313-47F9-94B7-5F8122345E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.238", + "matchCriteriaId": "FA28527A-11D3-41D2-9C4C-ECAC0D6A4A2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.189", + "matchCriteriaId": "8CB6E8F5-C2B1-46F3-A807-0F6104AC340F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.110", + "matchCriteriaId": "91D3BFD0-D3F3-4018-957C-96CCBF357D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0fd28daec73525382e5c992db8743bf76e42cd5c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1791f487f877a9e83d81c8677bd3e7b259e7cb27", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/64ec3e678d76419f207b9cdd338dda438ca10b1c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9280ef235b05e8f19f8bc6d547b992f0a0ef398d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c420b540db4b5d69de0a36d8b9d9a6a79a04f05a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d1b6a1f0c23b7164250479bf92e2893291dca539", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d396c651e2b508b6179bb678cc029f3becbf5170", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/da8b269cc0a2526ebeaccbe2484c999eb0f822cf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dd3a6cc7385b89ec2303f39dfc3bafa4e24cec4b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-387xx/CVE-2022-38714.json b/CVE-2022/CVE-2022-387xx/CVE-2022-38714.json index 13d88c8140e..0c4f56e9be5 100644 --- a/CVE-2022/CVE-2022-387xx/CVE-2022-38714.json +++ b/CVE-2022/CVE-2022-387xx/CVE-2022-38714.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38714", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-12T18:15:08.057", - "lastModified": "2024-11-21T07:16:58.977", + "lastModified": "2025-03-18T20:15:16.603", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-522" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-388xx/CVE-2022-38867.json b/CVE-2022/CVE-2022-388xx/CVE-2022-38867.json index 9bb3e667d25..3d8a73962cb 100644 --- a/CVE-2022/CVE-2022-388xx/CVE-2022-38867.json +++ b/CVE-2022/CVE-2022-388xx/CVE-2022-38867.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38867", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-15T22:15:11.650", - "lastModified": "2024-11-21T07:17:12.370", + "lastModified": "2025-03-18T19:15:40.333", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4645.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4645.json index cb075533f11..010893ad1e7 100644 --- a/CVE-2022/CVE-2022-46xx/CVE-2022-4645.json +++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4645.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4645", "sourceIdentifier": "cve@gitlab.com", "published": "2023-03-03T16:15:09.777", - "lastModified": "2024-11-21T07:35:39.713", - "vulnStatus": "Modified", + "lastModified": "2025-03-18T20:27:08.320", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -68,6 +68,31 @@ } ], "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", + "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] + }, { "nodes": [ { @@ -77,8 +102,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.5.1", "versionEndIncluding": "4.4.0", - "matchCriteriaId": "6E0B7DC1-7265-4D0F-9400-1559C3378D18" + "matchCriteriaId": "E05D8B0C-6AE1-497D-96BF-374E0D63321A" } ] } @@ -111,19 +137,31 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20230331-0001/", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4645.json", @@ -150,19 +188,31 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZTFA6GGOKFPIQNHDBMXYUR4XUXUJESE/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BA6GRCAQ7NR2OK5N44UQRGUJBIYKWJJH/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OLM763GGZVVOAXIQXG6YGTYJ5VFYNECQ/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20230331-0001/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ], "evaluatorComment": "n" diff --git a/CVE-2022/CVE-2022-483xx/CVE-2022-48327.json b/CVE-2022/CVE-2022-483xx/CVE-2022-48327.json index c5035c18d5b..ffdceeac75d 100644 --- a/CVE-2022/CVE-2022-483xx/CVE-2022-48327.json +++ b/CVE-2022/CVE-2022-483xx/CVE-2022-48327.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48327", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-16T21:15:14.183", - "lastModified": "2024-11-21T07:33:10.457", + "lastModified": "2025-03-18T19:15:40.513", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49055.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49055.json index d4e7f445534..306abf2a485 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49055.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49055.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49055", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:42.760", - "lastModified": "2025-02-26T07:00:42.760", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:02:42.010", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,163 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdkfd: comprobar si kmalloc_array() puede devolver un valor nulo. Como kmalloc_array() puede devolver un valor nulo, 'event_waiters[i].wait' provocar\u00eda una desreferencia de puntero nulo. Por lo tanto, es mejor comprobar el valor de retorno de kmalloc_array() para evitar esta confusi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.9.311", + "matchCriteriaId": "C86EFD13-93D4-4385-83E8-C665BE8F570F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.276", + "matchCriteriaId": "6D9B028C-6313-47F9-94B7-5F8122345E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.239", + "matchCriteriaId": "712D9B45-4B53-4563-94B5-F758AFBBFB0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.190", + "matchCriteriaId": "E0ADBA6D-47D8-4518-8D10-9B9196DE680B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.112", + "matchCriteriaId": "0460A5D2-3024-497A-B799-23E025B91972" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.35", + "matchCriteriaId": "05ABCC3F-88A9-47F9-9D40-8665747B2E43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.4", + "matchCriteriaId": "E22C86CB-06CD-4D16-AB2A-F21EE8199262" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*", + "matchCriteriaId": "6AD94161-84BB-42E6-9882-4FC0C42E9FC1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0a692c625e373fef692ffbc7fc41f8a025f01cb7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1d7a5aae884ca727d41c7ed15d4c82fdb67c040c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/32cf90a521dcc0f136db7ee5ba32bfe5f79e460e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/40bf32dbfef866c83a3e74800b81d79e52b6d20b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/94869bb0de69a812f70231b0eb480bb2f7ae73a6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c7a268b33882d5feaafd29c1734456f41ba41396", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ebbb7bb9e80305820dc2328a371c1b35679f2667", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f2658d5966bcee8c3eb487875f459756d4f7cdfc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49058.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49058.json index 3afe0170798..597ba0e55d6 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49058.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49058.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49058", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:43.047", - "lastModified": "2025-02-26T07:00:43.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:08:08.200", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,169 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: desbordamiento de b\u00fafer potencial al manejar enlaces simb\u00f3licos Smatch imprimi\u00f3 una advertencia: arch/x86/crypto/poly1305_glue.c:198 poly1305_update_arch() error: __memcpy() 'dctx->buf' demasiado peque\u00f1o (16 vs u32max) Esto se debe a que Smatch marca 'link_len' como no confiable ya que proviene de sscanf(). Agregue una verificaci\u00f3n para asegurarse de que 'link_len' no sea m\u00e1s grande que el tama\u00f1o del b\u00fafer 'link_str'." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.37", + "versionEndExcluding": "4.9.311", + "matchCriteriaId": "4ECFAA1B-4193-4D30-B7CA-C57E2AFD1132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.276", + "matchCriteriaId": "6D9B028C-6313-47F9-94B7-5F8122345E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.239", + "matchCriteriaId": "712D9B45-4B53-4563-94B5-F758AFBBFB0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.190", + "matchCriteriaId": "E0ADBA6D-47D8-4518-8D10-9B9196DE680B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.112", + "matchCriteriaId": "0460A5D2-3024-497A-B799-23E025B91972" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.35", + "matchCriteriaId": "05ABCC3F-88A9-47F9-9D40-8665747B2E43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.4", + "matchCriteriaId": "E22C86CB-06CD-4D16-AB2A-F21EE8199262" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*", + "matchCriteriaId": "6AD94161-84BB-42E6-9882-4FC0C42E9FC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*", + "matchCriteriaId": "7AB06DDF-3C2B-416D-B448-E990D8FF67A9" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1316c28569a80ab3596eeab05bf5e01991e7e739", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/22d658c6c5affed10c8907e67160cef0b6c92186", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3e582749e742e662a8e9bb37cffac62dccaaa1e2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4e166a41180be2f1e66bbb6d46448e80a9a5ec05", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/515e7ba11ef043d6febe69389949c8ef5f25e9d0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/64c4a37ac04eeb43c42d272f6e6c8c12bfcf4304", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9901b07ba42b39266b34a888e48d7306fd707bee", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eb5f51756944735ac70cd8bb38637cc202e29c91", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-491xx/CVE-2022-49190.json b/CVE-2022/CVE-2022-491xx/CVE-2022-49190.json index 6e55afa6c3f..821f748cad1 100644 --- a/CVE-2022/CVE-2022-491xx/CVE-2022-49190.json +++ b/CVE-2022/CVE-2022-491xx/CVE-2022-49190.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49190", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:56.090", - "lastModified": "2025-02-26T07:00:56.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-18T20:12:35.920", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: kernel/resource: fix kfree() of bootmem memory again Desde el commit ebff7d8f270d (\"mem hotunplug: fix kfree() of bootmem memory\"), podr\u00edamos obtener un recurso asignado durante el arranque a trav\u00e9s de alloc_resource(). Y es necesario liberar el recurso utilizando free_resource(). Sin embargo, muchas personas utilizan kfree directamente, lo que dar\u00e1 como resultado un ERROR del kernel. Para solucionar esto sin reparar cada sitio de llamada, simplemente filtre un par de bytes en ese caso especial." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.10", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "F1BE9A95-C2D3-4ED4-B570-6DACA61136E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0cbcc92917c5de80f15c24d033566539ad696892", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a9e88c2618d228d7a4e7e515cf30dc0d0d813f27", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ab86020070999e758ce2e60c4348f20bf7ddba56", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d7faa04a44a0c37ac3d222fa8e0bdcbfcee9c0c8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49201.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49201.json index 88aa5011b3b..83082b27871 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49201.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49201.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49201", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:57.160", - "lastModified": "2025-02-26T07:00:57.160", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T20:12:27.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,107 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ibmvnic: se corrige la ejecuci\u00f3n entre xmit y reset Existe una ejecuci\u00f3n entre reset y las rutas de transmisi\u00f3n que puede provocar que ibmvnic_xmit() acceda a un scrq despu\u00e9s de que se haya liberado en la ruta de reset. Puede provocar un bloqueo como: El kernel intent\u00f3 leer la p\u00e1gina del usuario (0): \u00bfintento de explotaci\u00f3n? (uid: 0) ERROR: Desreferencia de puntero NULL del kernel en lectura en 0x00000000 Direcci\u00f3n de instrucci\u00f3n con error: 0xc0080000016189f8 Oops: Acceso del kernel al \u00e1rea defectuosa, sig: 11 [#1] ... NIP [c0080000016189f8] ibmvnic_xmit+0x60/0xb60 [ibmvnic] LR [c000000000c0046c] dev_hard_start_xmit+0x11c/0x280 Rastreo de llamadas: [c008000001618f08] ibmvnic_xmit+0x570/0xb60 [ibmvnic] (no confiable) [c000000000c0046c] dev_hard_start_xmit+0x11c/0x280 [c000000000c9cfcc] sch_direct_xmit+0xec/0x330 [c000000000bfe640] __dev_xmit_skb+0x3a0/0x9d0 [c000000000c00ad4] __dev_queue_xmit+0x394/0x730 [c008000002db813c] __bond_start_xmit+0x254/0x450 [enlace] [c008000002db8378] bond_start_xmit+0x40/0xc0 [enlace] [c000000000c0046c] dev_hard_start_xmit+0x11c/0x280 [c000000000c00ca4] __dev_queue_xmit+0x564/0x730 [c000000000cf97e0] neigh_hh_output+0xd0/0x180 [c000000000cfa69c] ip_finish_output2+0x31c/0x5c0 [c000000000cfd244] __ip_queue_xmit+0x194/0x4f0 [c000000000d2a3c4] __tcp_transmit_skb+0x434/0x9b0 [c000000000d2d1e0] __tcp_retransmit_skb+0x1d0/0x6a0 [c000000000d2d984] tcp_retransmit_skb+0x34/0x130 [c000000000d310e8] tcp_retransmit_timer+0x388/0x6d0 [c000000000d315ec] tcp_write_timer_handler+0x1bc/0x330 [c000000000d317bc] tcp_write_timer+0x5c/0x200 [c000000000243270] call_timer_fn+0x50/0x1c0 [c000000000243704] __run_timers.part.0+0x324/0x460 [c000000000243894] run_timer_softirq+0x54/0xa0 [c000000000ea713c] __do_softirq+0x15c/0x3e0 [c000000000166258] __irq_exit_rcu+0x158/0x190 [c000000000166420] irq_exit+0x20/0x40 [c00000000002853c] timer_interrupt+0x14c/0x2b0 [c000000000009a00] decrementer_common_virt+0x210/0x220 --- interrupci\u00f3n: 900 La causa inmediata del bloqueo es el acceso a tx_scrq en el siguiente fragmento durante un reinicio, donde tx_scrq puede ser NULL o una direcci\u00f3n que pronto ser\u00e1 inv\u00e1lida: ibmvnic_xmit() { ... tx_scrq = adaptador->tx_scrq[queue_num]; txq = netdev_get_tx_queue(netdev, queue_num); ind_bufp = &tx_scrq->ind_buf; if (test_bit(0, &adapter->resetting)) { ... } Pero m\u00e1s all\u00e1 de eso, la llamada a ibmvnic_xmit() en s\u00ed no es segura durante un reinicio y la ruta de reinicio intenta evitar esto deteniendo la cola en ibmvnic_cleanup(). Sin embargo, justo despu\u00e9s de que se detuviera la cola, una ibmvnic_complete_tx() en curso podr\u00eda haber reiniciado la cola incluso mientras el reinicio estaba en progreso. Dado que la cola se reinici\u00f3, podr\u00edamos recibir una llamada a ibmvnic_xmit() que luego puede acceder al tx_scrq incorrecto (u otros campos). Sin embargo, no podemos simplemente hacer que ibmvnic_complete_tx() verifique el bit ->resetting y omita el inicio de la cola. Esto puede funcionar en el \"back-end\" de un reinicio correcto que simplemente reinici\u00f3 la cola pero a\u00fan no borr\u00f3 el bit ->resetting. Si omitimos el reinicio de la cola debido a que ->resetting es verdadero, la cola permanecer\u00eda detenida indefinidamente, lo que podr\u00eda provocar tiempos de espera de transmisi\u00f3n. IOW ->resetting es demasiado amplio para este prop\u00f3sito. En su lugar, use un nuevo indicador que indique si las colas est\u00e1n activas o no. Solo las rutas de apertura/reinicio controlan cu\u00e1ndo est\u00e1n activas las colas. ibmvnic_complete_tx() y otros activan la cola solo si la cola est\u00e1 marcada como activa. Por lo tanto, tendremos: A. restablecer/abrir subproceso en ibmvnic_cleanup() y __ibmvnic_open() ->resetting = true ->tx_queues_active = false deshabilitar colas de transmisi\u00f3n ... ->tx_queues_active = true iniciar colas de transmisi\u00f3n B. Interrupci\u00f3n de transmisi\u00f3n en ibmvnic_complete_tx(): if (->tx_queues_active) netif_wake_subqueue(); Para garantizar que ->tx_queues_active y el estado de las colas sean cons ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + }, + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "6B796901-86B9-450D-BE47-916285FBDF61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1bd58abf595b6cf1ba6dd47ec887c4c009155fc9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4219196d1f662cb10a462eb9e076633a3fc31a15", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/475f9cce98b63bc145b4efa66fa51175d4cb345f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8507c6ade73cdbbbda5c3d31d67f52f2e1cf03fe", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49203.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49203.json index 7665c3aff7f..06bff21d712 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49203.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49203.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49203", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:57.357", - "lastModified": "2025-02-26T07:00:57.357", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T20:12:03.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Arreglar doble liberaci\u00f3n durante el reinicio de la GPU en flujos de DC [Por qu\u00e9] El problema solo ocurre durante la ruta del c\u00f3digo de reinicio de la GPU. Primero hacemos una copia de seguridad del estado actual antes de confirmar 0 flujos internamente desde DM a DC. Esta copia de seguridad del estado contiene asignaciones de codificador de enlace v\u00e1lidas. DC borrar\u00e1 las asignaciones de codificador de enlace como parte del estado actual (pero no la copia de seguridad, ya que se copi\u00f3 antes de el commit) y liberar\u00e1 la referencia de flujo adicional que ten\u00eda. DC requiere que las asignaciones de codificador de enlace permanezcan borradas/inv\u00e1lidas antes de el commit. Dado que la copia de seguridad a\u00fan tiene asignaciones v\u00e1lidas, llamamos a la interfaz post reset para borrarlas. Esta rutina tambi\u00e9n libera la referencia adicional que ten\u00eda la interfaz de codificador de enlace, lo que da como resultado una doble liberaci\u00f3n (y eventualmente una desreferencia de puntero NULL). [C\u00f3mo] Tendremos que hacer una confirmaci\u00f3n de DC completa de todos modos despu\u00e9s de reiniciar la GPU porque el conteo de transmisiones anteriormente lleg\u00f3 a 0. No necesitamos conservar la asignaci\u00f3n que hab\u00edamos respaldado, as\u00ed que simplemente copiamos la asignaci\u00f3n del estado actual ahora limpio despu\u00e9s de que se haya producido el reinicio con la nueva interfaz link_enc_cfg_copy()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/32685b32d825ca08c5dec826477332df886c4743", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bbfcdd6289ba6f00f0cd7d496946dce9f6c600ac", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49206.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49206.json index 2032b52ac1f..14d4b8fe3d7 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49206.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49206.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49206", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:57.723", - "lastModified": "2025-02-26T07:00:57.723", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-18T20:11:49.133", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,131 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/mlx5: Se corrige la p\u00e9rdida de memoria en el flujo de error para la rutina de evento de suscripci\u00f3n. En caso de que falle el segundo xa_insert(), no se libera el obj_event. Corrija el flujo de desenrollado de error para liberar esa memoria y evitar una p\u00e9rdida de memoria." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3", + "versionEndExcluding": "5.4.189", + "matchCriteriaId": "464BC777-8489-4690-B4AE-BD7E95E9A4C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.110", + "matchCriteriaId": "91D3BFD0-D3F3-4018-957C-96CCBF357D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0174a89663a5ef83617da15bf24c0af2f62b6c7f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/087f9c3f2309ed183f7e4b85ae57121d8663224d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/414b4e8738484379f18d6c4e780787c80dbf8a2c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8dd392e352d3269938fea32061a74655a613f929", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c98d903ff9e79c210beddea4e6bc15ac38e25aa5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d66498507801fd9a20307a15a0814a0a016c3cde", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49207.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49207.json index 523b30b022c..ff132240223 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49207.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49207.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49207", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:57.817", - "lastModified": "2025-02-26T07:00:57.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-18T20:11:31.573", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf, sockmap: Corregir p\u00e9rdida de memoria en sk_psock_queue_msg Si tcp_bpf_sendmsg se est\u00e1 ejecutando durante una operaci\u00f3n de desmontaje, podemos poner en cola datos en la cola de mensajes de entrada mientras el desmontaje intenta liberarlos. sk1 (redireccionar sk2) sk2 ------------------- --------------- tcp_bpf_sendmsg() tcp_bpf_send_verdict() tcp_bpf_sendmsg_redir() bpf_tcp_ingress() sock_map_close() lock_sock() lock_sock() ... bloqueando sk_psock_stop sk_psock_clear_state(psock, SK_PSOCK_TX_ENABLED); release_sock(sk); lock_sock() sk_mem_charge() get_page() sk_psock_queue_msg() sk_psock_test_state(psock, SK_PSOCK_TX_ENABLED); drop_sk_msg() release_sock() Mientras se usa drop_sk_msg(), el mensaje ha cargado la memoria del formulario sk mediante sk_mem_charge y tiene p\u00e1ginas sg que se deben colocar. Para solucionarlo, usamos sk_msg_free() y luego kfee() msg. Este problema puede causar la siguiente informaci\u00f3n: ADVERTENCIA: CPU: 0 PID: 9202 en net/core/stream.c:205 sk_stream_kill_queues+0xc8/0xe0 Rastreo de llamadas: inet_csk_destroy_sock+0x55/0x110 tcp_rcv_state_process+0xe5f/0xe90 ? sk_filter_trim_cap+0x10d/0x230 ? tcp_v4_do_rcv+0x161/0x250 tcp_v4_do_rcv+0x161/0x250 tcp_v4_rcv+0xc3a/0xce0 ip_protocol_deliver_rcu+0x3d/0x230 ip_local_deliver_finish+0x54/0x60 ip_local_deliver+0xfd/0x110 ? ip_protocol_deliver_rcu+0x230/0x230 ip_rcv+0xd6/0x100 ? ip_local_deliver+0x110/0x110 __netif_receive_skb_one_core+0x85/0xa0 process_backlog+0xa4/0x160 __napi_poll+0x29/0x1b0 net_rx_action+0x287/0x300 __do_softirq+0xff/0x2fc do_softirq+0x79/0x90 WARNING: CPU: 0 PID: 531 at net/ipv4/af_inet.c:154 inet_sock_destruct+0x175/0x1b0 Call Trace: __sk_destruct+0x24/0x1f0 sk_psock_destroy+0x19b/0x1c0 process_one_work+0x1b3/0x3c0 ? process_one_work+0x3c0/0x3c0 worker_thread+0x30/0x350 ? process_one_work+0x3c0/0x3c0 kthread+0xe6/0x110 ? kthread_complete_and_exit+0x20/0x20 ret_from_fork+0x22/0x30 " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.14", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "FB1C7FD1-C89E-4955-B265-456A9F757302" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/03948ed6553960db62f1c33bec29e64d7c191a3f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4dd2e947d3be13a4de3b3028859b9a6497266bcf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/938d3480b92fa5e454b7734294f12a7b75126f09", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ef9785f429794567792561a584901faa9291d3ee", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49208.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49208.json index 4264ef4f14e..a59154089da 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49208.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49208.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49208", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:57.910", - "lastModified": "2025-02-26T07:00:57.910", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-18T20:11:17.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/irdma: Evitar algunos desbordamientos de enteros Mi verificador est\u00e1tico se queja de que: drivers/infiniband/hw/irdma/ctrl.c:3605 irdma_sc_ceq_init() warn: can subtract underflow 'info->dev->hmc_fpm_misc.max_ceqs'? Parece que \"info->dev->hmc_fpm_misc.max_ceqs\" proviene del firmware en irdma_sc_parse_fpm_query_buf() as\u00ed que, s\u00ed, existe la posibilidad de que sea cero. Incluso si confiamos en el firmware, es bastante f\u00e1cil cambiar la condici\u00f3n como una medida de endurecimiento." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.14", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "FB1C7FD1-C89E-4955-B265-456A9F757302" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/6f6dbb819dfc1a35bcb8b709b5c83a3ea8beff75", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7340c3675d7ac946f4019b84cd7c64ed542dfe4c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d52dab6e03550f9c97121b0c11c0a3ed78ee76a4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f21056f15bbeacab7b4b87af232f5599d1f2bff1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49209.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49209.json index 95480da0fad..73f2c539afe 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49209.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49209.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49209", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:58.007", - "lastModified": "2025-02-26T07:00:58.007", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-18T20:10:46.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,131 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf, sockmap: Se corrige la p\u00e9rdida de memoria en tcp_bpf_sendmsg mientras sk msg est\u00e1 lleno Si tcp_bpf_sendmsg() se est\u00e1 ejecutando mientras sk msg est\u00e1 lleno. Cuando sk_msg_alloc() devuelve el error -ENOMEM, tcp_bpf_sendmsg() va a wait_for_memory. Si sk_msg_alloc() ha asignado memoria parcial, es decir, msg_tx->sg.size es mayor que osize despu\u00e9s de sk_msg_alloc(), se produce una p\u00e9rdida de memoria. Para solucionarlo, utilizamos sk_msg_trim() para liberar la memoria asignada y luego vamos a esperar memoria. Otras rutas de llamada de sk_msg_alloc() tienen un problema similar, como tls_sw_sendmsg(), as\u00ed que maneje la l\u00f3gica de sk_msg_trim dentro de sk_msg_alloc(), como sugiri\u00f3 Cong Wang. Este problema puede generar la siguiente informaci\u00f3n: ADVERTENCIA: CPU: 3 PID: 7950 en net/core/stream.c:208 sk_stream_kill_queues+0xd4/0x1a0 Seguimiento de llamadas: inet_csk_destroy_sock+0x55/0x110 __tcp_close+0x279/0x470 tcp_close+0x1f/0x60 inet_release+0x3f/0x80 __sock_release+0x3d/0xb0 sock_close+0x11/0x20 __fput+0x92/0x250 task_work_run+0x6a/0xa0 do_exit+0x33b/0xb60 do_group_exit+0x2f/0xa0 get_signal+0xb6/0x950 arch_do_signal_or_restart+0xac/0x2a0 exit_to_user_mode_prepare+0xa9/0x200 syscall_exit_to_user_mode+0x12/0x30 do_syscall_64+0x46/0x80 entry_SYSCALL_64_after_hwframe+0x44/0xae ADVERTENCIA: CPU: 3 PID: 2094 en net/ipv4/af_inet.c:155 inet_sock_destruct+0x13c/0x260 Rastreo de llamadas: __sk_destruct+0x24/0x1f0 sk_psock_destroy+0x19b/0x1c0 process_one_work+0x1b3/0x3c0 kthread+0xe6/0x110 ret_from_fork+0x22/0x30 " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.189", + "matchCriteriaId": "8CB6E8F5-C2B1-46F3-A807-0F6104AC340F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.110", + "matchCriteriaId": "91D3BFD0-D3F3-4018-957C-96CCBF357D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/6d03722c34d9603df325f67c6d30dc1b7b3c6067", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9c34e38c4a870eb30b13f42f5b44f42e9d19ccb8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bec34a91eba3483e1830c02bdd36f8f968642047", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d0b85dfc6f01d26808e2576c6537c131b590e270", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/de3a8d8fab0710186f7864ec812836d8d70da3c9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f677328f05f52d535cbdc15cb04476db49477eb4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49210.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49210.json index c6707579c08..c796bdc2f66 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49210.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49210.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49210", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:58.107", - "lastModified": "2025-02-26T07:00:58.107", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-18T20:10:37.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: MIPS: pgalloc: reparar p\u00e9rdida de memoria causada por pgd_free() La p\u00e1gina pgd es liberada por la implementaci\u00f3n gen\u00e9rica pgd_free() desde el commit f9cb654cb550 (\"asm-generic: pgalloc: proporcionar pgd_free() gen\u00e9rico\"), sin embargo, hay escenarios en los que el sistema usa m\u00e1s de una p\u00e1gina como la tabla pgd, en tales casos la implementaci\u00f3n gen\u00e9rica pgd_free() ya no ser\u00e1 aplicable. Por ejemplo, cuando PAGE_SIZE_4KB est\u00e1 habilitado y MIPS_VA_BITS_48 no est\u00e1 habilitado en un sistema de 64 bits, la macro \"PGD_ORDER\" se establecer\u00e1 como \"1\", lo que provocar\u00e1 la asignaci\u00f3n de dos p\u00e1ginas como la tabla pgd. Bueno, al mismo tiempo, la implementaci\u00f3n gen\u00e9rica pgd_free() solo libera una p\u00e1gina pgd, lo que provocar\u00e1 la p\u00e9rdida de memoria. La p\u00e9rdida de memoria se puede detectar f\u00e1cilmente ejecutando el comando de shell: \"while true; do ls > /dev/null; grep MemFree /proc/meminfo; done\"" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.9", + "versionEndExcluding": "5.10.110", + "matchCriteriaId": "2F97CB26-001B-4811-8A9D-40FE3DB060DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1bf0d78c8cc3cf615a6e7bf33ada70b73592f0a1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2bc5bab9a763d520937e4f3fe8df51c6a1eceb97", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5a8501d34b261906e4c76ec9da679f2cb4d309ed", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d29cda15cab086d82d692de016f7249545d4b6b4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fa3d44424579972cc7c4fac3d9cf227798ebdfa0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49211.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49211.json index 3882a10d743..e2bc0f2d82f 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49211.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49211.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49211", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:58.200", - "lastModified": "2025-02-26T07:00:58.200", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-18T20:10:12.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mips: cdmm: Se corrige la p\u00e9rdida de recuento de referencias en mips_cdmm_phys_base La funci\u00f3n of_find_compatible_node() devuelve un puntero de nodo con el recuento de referencias incrementado. Deber\u00edamos usar of_node_put() en \u00e9l cuando termine. Agregue el of_node_put() faltante para liberar el recuento de referencias." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.9", + "versionEndExcluding": "5.10.110", + "matchCriteriaId": "2F97CB26-001B-4811-8A9D-40FE3DB060DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4528668ca331f7ce5999b7746657b46db5b3b785", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4680c2ac9aabda82acd23ebbd1f900fb6a889cd3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/69155dc2e04777aa94207a73a8b10f12b8428a68", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/721ab4be20d4448dd04c2cc8ed99cd4f3e45f765", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ef1728e3cb9e43f38ed10cde705a7ba2b4ad2d35", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49212.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49212.json index 4ebe4371085..51fda79b3f4 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49212.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49212.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49212", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:58.293", - "lastModified": "2025-02-26T07:00:58.293", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-18T19:31:39.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,159 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mtd: rawnand: atmel: soluciona el problema de recuento de referencias en atmel_nand_controller_init El problema de recuento de referencias ocurre en varias rutas de manejo de errores en un objeto con recuento de referencias \"nc->dmac\". En estas rutas, la funci\u00f3n simplemente devuelve el c\u00f3digo de error, olvidando equilibrar el recuento de referencias de \"nc->dmac\", aumentado anteriormente por dma_request_channel(), lo que puede causar fugas de recuento de referencias. Arr\u00e9glelo disminuyendo el recuento de referencias de un objeto espec\u00edfico en esas rutas de error." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.12", + "versionEndExcluding": "4.14.276", + "matchCriteriaId": "76EDAF8B-A61C-4220-A866-7A0A933212D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.238", + "matchCriteriaId": "FA28527A-11D3-41D2-9C4C-ECAC0D6A4A2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.189", + "matchCriteriaId": "8CB6E8F5-C2B1-46F3-A807-0F6104AC340F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.110", + "matchCriteriaId": "91D3BFD0-D3F3-4018-957C-96CCBF357D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0856bf27057561f42b37df111603cf5a0d040294", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8baea2b96fa90af8d0f937caf4cf2105ee094d93", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9843c9c98f26c6ad843260b19bfdaa2598f2ae1e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9b08d211db4c447eb1a07df65e45e0aa772e0fa6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a3587259ae553e41d1ce8c7435351a5d6b299a11", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f1694169f3674cdf7553aed06864254635679878", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fe0e2ce5c87e9c0b9485ff566362030aa55972cf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fecbd4a317c95d73c849648c406bcf1b6a0ec1cf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49213.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49213.json index 7d476fb9ea2..214704644e8 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49213.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49213.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49213", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:58.397", - "lastModified": "2025-02-26T07:00:58.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-18T19:32:04.063", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ath10k: Se ha corregido la gesti\u00f3n de errores en ath10k_setup_msa_resources El puntero device_node es devuelto por of_parse_phandle() con refcount incrementado. Deber\u00edamos usar of_node_put() en \u00e9l cuando haya terminado. Esta funci\u00f3n solo llama a of_node_put() en la ruta normal. Y provocar\u00e1 una fuga de refcount en la ruta de error." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.8", + "versionEndExcluding": "5.10.110", + "matchCriteriaId": "552AD555-63DB-4D57-BBAA-86EA26658508" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/315772133a4b960859e4f5efe0e738e347188cdc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/32939187f254171a5666badc058bc3787fe454af", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4ed37d611ea5d222c3ecb3549e4c2d34b8f3c335", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/74b1d41e1b6410eed5c76d00eedb262036e9eff5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9747a78d5f758a5284751a10aee13c30d02bd5f1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49215.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49215.json index 78673d1bc7c..caf5cb92e69 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49215.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49215.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49215", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:58.590", - "lastModified": "2025-02-26T07:00:58.590", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:32:25.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,107 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: xsk: Corregir ejecuci\u00f3n en el desmontaje del socket Corrige una ejecuci\u00f3n en el c\u00f3digo de desmontaje del socket xsk que puede provocar un splat de desreferencia de puntero NULL. El c\u00f3digo de desvinculaci\u00f3n xsk actual en xsk_unbind_dev() comienza estableciendo xs->state en XSK_UNBOUND, establece xs->dev en NULL y luego espera a que finalice cualquier procesamiento NAPI utilizandosynchronous_net(). Despu\u00e9s de eso, el c\u00f3digo de lanzamiento comienza a desmantelar el estado del socket y a liberar la memoria asignada. ERROR: desreferencia de puntero NULL del n\u00facleo, direcci\u00f3n: 00000000000000c0 PGD 8000000932469067 P4D 8000000932469067 PUD 0 Oops: 0000 [#1] PREEMPT SMP PTI CPU: 25 PID: 69132 Comm: grpcpp_sync_ser Contaminado: GI 5.16.0+ #2 Nombre del hardware: Dell Inc. PowerEdge R730/0599V5, BIOS 1.2.10 09/03/2015 RIP: 0010:__xsk_sendmsg+0x2c/0x690 [...] RSP: 0018:ffffa2348bd13d50 EFLAGS: 00010246 RAX: 00000000000000000 RBX: 00000000000000040 RCX: ffff8d5fc632d258 RDX: 0000000000400000 RSI: ffffa2348bd13e10 RDI: ffff8d5fc5489800 RBP: ffffa2348bd13db0 R08: 000000000000000 R09: 00007ffffffff000 R10: 0000000000000000 R11: 0000000000000000 R12: ffff8d5fc5489800 R13: ffff8d5fcb0f5140 R14: ffff8d5fcb0f5140 R15: 0000000000000000 FS: 00007f991cff9400(0000) GS:ffff8d6f1f700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000c0 CR3: 0000000114888005 CR4: 00000000001706e0 Seguimiento de llamadas: ? aa_sk_perm+0x43/0x1b0 xsk_sendmsg+0xf0/0x110 sock_sendmsg+0x65/0x70 __sys_sendto+0x113/0x190 ? debug_smp_processor_id+0x17/0x20 ? fpregs_assert_state_consistent+0x23/0x50 ? exit_to_user_mode_prepare+0xa5/0x1d0 __x64_sys_sendto+0x29/0x30 do_syscall_64+0x3b/0xc0 entry_SYSCALL_64_after_hwframe+0x44/0xae Hay dos problemas con el c\u00f3digo actual. Primero, establecer xs->dev en NULL antes de esperar a que todos los usuarios dejen de usar el socket no es correcto. La entrada a las funciones del plano de datos xsk_poll(), xsk_sendmsg() y xsk_recvmsg() est\u00e1n todas protegidas por una prueba de que xs->state est\u00e1 en el estado XSK_BOUND y, si no, regresa de inmediato. Pero un proceso podr\u00eda haber pasado esta prueba pero a\u00fan no haber llegado al punto en el que usa xs->dev en el c\u00f3digo. Mientras tanto, un segundo proceso que ejecuta xsk_unbind_dev() podr\u00eda haber establecido xs->dev en NULL, lo que provocar\u00e1 un bloqueo para el primer proceso. La soluci\u00f3n aqu\u00ed es simplemente deshacerse de esta asignaci\u00f3n NULL ya que ya no se usa. Antes de el commit 42fddcc7c64b (\"xsk: usar miembro de estado para sincronizaci\u00f3n de socket\"), xs->dev era el guardi\u00e1n para admitir procesos en las funciones del plano de datos, pero fue reemplazado por la variable de estado xs->state en el commit mencionada anteriormente. El segundo problema es quesynchronous_net() no espera a que se complete ning\u00fan proceso en xsk_poll(), xsk_sendmsg() o xsk_recvmsg(), lo que significa que el estado en el que se basan podr\u00eda limpiarse prematuramente. Esto puede suceder cuando se llama al notificador (por ejemplo, al descargar el controlador) ya que utiliza xsk_unbind_dev(). Resuelva esto extendiendo la regi\u00f3n cr\u00edtica de RCU desde solo ndo_xsk_wakeup a todas las funciones mencionadas anteriormente, de modo que tanto la prueba de xs->state == XSK_BOUND como el \u00faltimo uso de cualquier miembro de xs est\u00e9n cubiertos por la secci\u00f3n cr\u00edtica de RCU. Esto garantizar\u00e1 que cuando se completesynchronous_net(), no habr\u00e1 procesos restantes ejecutando xsk_poll(), xsk_sendmsg() o xsk_recvmsg() y el estado se puede limpiar de forma segura. Tenga en cuenta que debemos eliminar el bloqueo de RCU para la ruta de transmisi\u00f3n de skb, ya que utiliza funciones que podr\u00edan estar inactivas. Debido a esto, tenemos que volver a probar xs->state despu\u00e9s de obtener el mutex que protege el c\u00f3digo xmit de skb de, entre varias cosas, un xsk_unbind_dev() que se ejecuta desde el notificador al mismo tiempo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + }, + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "6B796901-86B9-450D-BE47-916285FBDF61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/18b1ab7aa76bde181bdb1ab19a87fa9523c32f21", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8a2dea162b92c322f3e42eae0c4a74b8d20aa7a9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ad7219cd8751bd258b9d1e69ae0654ec00f71875", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d1579253ffce39986e7a6ab757ac93b2680a665f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49216.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49216.json index 7bd482b57d3..34596484e8a 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49216.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49216.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49216", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:58.687", - "lastModified": "2025-02-26T07:00:58.687", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:32:55.723", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,173 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/tegra: Se corrige la p\u00e9rdida de referencia en tegra_dsi_ganged_probe La referencia tomada por 'of_find_device_by_node()' debe liberarse cuando ya no se necesita. Agregue la llamada put_device() para corregir esto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.19", + "versionEndExcluding": "4.9.311", + "matchCriteriaId": "FA5195CC-9137-4570-812F-16F11DEA3646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.276", + "matchCriteriaId": "6D9B028C-6313-47F9-94B7-5F8122345E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.238", + "matchCriteriaId": "FA28527A-11D3-41D2-9C4C-ECAC0D6A4A2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.189", + "matchCriteriaId": "8CB6E8F5-C2B1-46F3-A807-0F6104AC340F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.110", + "matchCriteriaId": "91D3BFD0-D3F3-4018-957C-96CCBF357D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0e2f4e434e71dffd1085c3dccd676514bd71d316", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1e06710c43a090f14bb67714265a01cd1d7a37c5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/221e3638feb8bc42143833c9a704fa89b6c366bb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2d6ae8b747fe55f54de4a4441d636974aa53f56a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5e8fdb6392d945d33fef959eab73f8c34bc0a63b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/852c1f5f3119a38ee68e319bab10277fc1ab06b7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a725070701883fe62266ee6d2f31d67e6cdd31df", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cd78b74031cbc94133965f1017deb822657fc1a6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f3c99c686e098300c246e5e8a1474133e3dacb05", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49218.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49218.json index 31bbbc2a476..ab1f93e5cd0 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49218.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49218.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49218", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:58.890", - "lastModified": "2025-02-26T07:00:58.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:33:07.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/dp: Se corrige la lectura OOB al manejar el registro Post Cursor2 La matriz link_status no era lo suficientemente grande para leer el registro Post Cursor2 de solicitud de ajuste, por lo que se debe eliminar la funci\u00f3n auxiliar com\u00fan para evitar una lectura OOB, que se encontr\u00f3 con una compilaci\u00f3n -Warray-bounds: drivers/gpu/drm/drm_dp_helper.c: En la funci\u00f3n 'drm_dp_get_adjust_request_post_cursor': drivers/gpu/drm/drm_dp_helper.c:59:27: error: el sub\u00edndice 10 de la matriz est\u00e1 fuera de los l\u00edmites de la matriz 'const u8[6]' {tambi\u00e9n conocido como 'const unsigned char[6]'} [-Werror=array-bounds] 59 | ~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~ drivers/gpu/drm/drm_dp_helper.c:147:51: nota: al hacer referencia a 'link_status' 147 | u8 drm_dp_get_adjust_request_post_cursor(const u8 link_status[DP_LINK_STATUS_SIZE], | ~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Reemplace el \u00fanico usuario del ayudante con una b\u00fasqueda y decodificaci\u00f3n de c\u00f3digo abierto, similar a drivers/gpu/drm/amd/display/dc/core/dc_link_dp.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "88FA4E2D-4337-4268-BDC0-75FB6658B219" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/a2151490cc6c57b368d7974ffd447a8b36ade639", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aeaed9a9fe694f8b1462fb81e2d33298c929180b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49219.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49219.json index f04a8e73c6e..53e1af12535 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49219.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49219.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49219", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:58.977", - "lastModified": "2025-02-26T07:00:58.977", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:33:24.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vfio/pci: se corrige la p\u00e9rdida de memoria durante la transici\u00f3n de D3hot a D0 Si se establece 'vfio_pci_core_device::needs_pm_restore' (el dispositivo PCI no tiene el bit No_Soft_Reset establecido en su registro de configuraci\u00f3n PMCSR), entonces el estado PCI actual se guardar\u00e1 localmente en 'vfio_pci_core_device::pm_save' durante la transici\u00f3n de D0 a D3hot y el mismo se restaurar\u00e1 durante la transici\u00f3n de D3hot a D0. Para guardar el estado PCI localmente, se utiliza pci_store_saved_state() y pci_load_and_free_saved_state() liberar\u00e1 la memoria asignada. Pero para los IOCTL relacionados con el reinicio, el controlador vfio llama a las API relacionadas con el reinicio de PCI que cambiar\u00e1n internamente el estado de energ\u00eda de PCI a D0. Por lo tanto, cuando el invitado se reanude, obtendr\u00e1 el estado actual como D0 y omitir\u00e1 la llamada a vfio_pci_set_power_state() para cambiar el estado de energ\u00eda a D0 expl\u00edcitamente. En este caso, la memoria apuntada por 'pm_save' nunca se liberar\u00e1. En una secuencia maliciosa, el cambio de estado a D3hot seguido de VFIO_DEVICE_RESET/VFIO_DEVICE_PCI_HOT_RESET se puede ejecutar en un bucle y puede causar una situaci\u00f3n de OOM. Este parche libera primero la memoria asignada anteriormente antes de sobrescribir 'pm_save' para evitar la p\u00e9rdida de memoria mencionada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "C5B0B00D-6DCA-4714-B384-1EB7C214ABBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/26ddd196e9eb264da8e1bdc4df8a94d62581c8b5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4319f17fb8264ba39352b611dfa913a4d8c1d1a0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c8a1f8bd586ee31020614b8d48b702ece3e2ae44", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eadf88ecf6ac7d6a9f47a76c6055d9a1987a8991", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49221.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49221.json index 671d4a15566..ec149a537f8 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49221.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49221.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49221", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:59.167", - "lastModified": "2025-02-26T07:00:59.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:33:38.933", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,124 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/msm/dp: rellenar el conector de struct dp_panel DP CTS caso de prueba 4.2.2.6 tiene un edid v\u00e1lido con suma de comprobaci\u00f3n incorrecta a prop\u00f3sito y espera que la fuente DP devuelva la suma de comprobaci\u00f3n correcta. Durante la lectura del edid de drm, se calcula la suma de comprobaci\u00f3n del edid correcta y se almacena en connector::real_edid_checksum. El problema es que struct dp_panel::connector nunca se asigna, en su lugar el conector se almacena en struct msm_dp::connector. Cuando ejecutamos el caso de prueba de prueba de cumplimiento 4.2.2.6 dp_panel_handle_sink_request() no tendr\u00e1 un edid v\u00e1lido establecido en struct dp_panel::edid, por lo que intentaremos usar el conector real_edid_checksum y nos encontraremos con un error de desreferencia de puntero NULL porque el puntero del conector nunca se asigna. Cambios en V2: -- rellenar el conector del panel en msm_dp_modeset_init() en lugar de en dp_panel_read_sink_caps() Cambios en V3: -- eliminar el texto de confirmaci\u00f3n de seguimiento de fallos del n\u00facleo que no es de ayuda -- eliminar el cambio de nombre del par\u00e1metro dp_display a dp Cambios en V4: -- a\u00f1adir m\u00e1s detalles al texto de confirmaci\u00f3n Cambios en v10: -- agrupar en una serie Cambios en v11: -- eliminar drm/msm/dp: dp_link_parse_sink_count() retorna inmediatamente si se lee aux. Firmado por: Kuogee Hsieh " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.67", + "versionEndExcluding": "5.10.110", + "matchCriteriaId": "E35E629A-08A5-4AA5-AAD3-0327AB394504" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.13.19", + "versionEndExcluding": "5.14", + "matchCriteriaId": "097A0850-FAA6-4FFF-88C2-F5B49B5CE740" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.14.6", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "44ED6312-668B-40E9-985A-5399C9E479F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/104074ebc0c3f358dd1ee944fbcde92c6e5a21dd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/413c62697b61226a236c8b1f5cd64dcf42bcc12f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5e602f5156910c7b19661699896cb6e3fb94fab9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9525b8bcae8b99188990b56484799cf4b1b43786", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fbba600f432a360b42452fee79d1fb35d3aa8aeb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49224.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49224.json index 954e146744f..f7cc63ba6e0 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49224.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49224.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49224", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:59.457", - "lastModified": "2025-02-26T07:00:59.457", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:33:58.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,173 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: power: supply: ab8500: Se corrige la p\u00e9rdida de memoria en ab8500_fg_sysfs_init kobject_init_and_add() toma la referencia incluso cuando falla. Seg\u00fan la documentaci\u00f3n de kobject_init_and_add(): Si esta funci\u00f3n devuelve un error, se debe llamar a kobject_put() para limpiar correctamente la memoria asociada con el objeto. Corrija la p\u00e9rdida de memoria llamando a kobject_put()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.9", + "versionEndExcluding": "4.9.311", + "matchCriteriaId": "66BCE8B6-D07A-4643-9325-D11035393721" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.276", + "matchCriteriaId": "6D9B028C-6313-47F9-94B7-5F8122345E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.238", + "matchCriteriaId": "FA28527A-11D3-41D2-9C4C-ECAC0D6A4A2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.189", + "matchCriteriaId": "8CB6E8F5-C2B1-46F3-A807-0F6104AC340F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.110", + "matchCriteriaId": "91D3BFD0-D3F3-4018-957C-96CCBF357D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/19aa3c98ed7b2616e105946cec804f897837ab84", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/261041097ab3470f1120b7733cbf472712304d1e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/31cdf7897dba1f096b74f69d840f0575b8cdb9ae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/41ed61364285ff38bbbe9ca8a45c8372ba72921d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6a4760463dbc6b603690938c468839985189ce0a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/879356a6a05559582b0a7895d86d2d4359745c08", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c32f6b6196b6efc1c68990dfeaac36fb8eb3b8e1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/db3a61ef8e6aef3b888baa6a85926c2230c2cc56", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ffb8e92b4cef92bd25563cf3d8b4489eb22bc61f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49225.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49225.json index 354df126ede..94ffbdd3144 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49225.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49225.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49225", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:00:59.563", - "lastModified": "2025-02-26T07:00:59.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:26:19.173", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mt76: mt7921s: corrige una posible p\u00e9rdida de memoria en mt7921_load_patch. Siempre libera datos de firmware al final de la rutina mt7921_load_patch." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/11005b18f453aa192d035d410c11d07edcba5a45", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b301043384c5c2447357952be9a536c2026d8ad0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49230.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49230.json index 62fb47ab974..3ac30902317 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49230.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49230.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49230", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:00.037", - "lastModified": "2025-02-26T07:01:00.037", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:26:28.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mt76: mt7915: corrige una posible p\u00e9rdida de memoria en mt7915_mcu_add_sta. Libera skb asignado en la rutina mt7915_mcu_add_sta en caso de fallo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/a43736cd12d82913102eb49cb56787a5553e028f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b334a245ff1d76b1e97af8cea648ea6798b9eb87", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/daf02c7e3c3dc82ffa925999597bd455cf799551", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49231.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49231.json index 5bbd84d1b93..2410f0d0932 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49231.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49231.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49231", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:00.130", - "lastModified": "2025-02-26T07:01:00.130", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:26:40.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: rtw88: se corrige el desbordamiento de memoria y la p\u00e9rdida de memoria durante hw_scan Anteriormente, asign\u00e1bamos menos memoria de la que realmente se requer\u00eda, la sobrescritura en el b\u00fafer hace que el m\u00f3dulo mm se queje y genere fallos de violaci\u00f3n de acceso. Junto con posibles p\u00e9rdidas de memoria cuando se devuelve antes. Solucione estos problemas pasando el tama\u00f1o correcto y el flujo de deinit adecuado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/d95984b5580dcb8b1c0036577c52b609990a1dab", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ec5da191bfcd5fd22b95459b623694f66c1cc10b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49232.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49232.json index 438ce677b81..d8eec8ba6e3 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49232.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49232.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49232", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:00.217", - "lastModified": "2025-02-26T07:01:00.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:26:49.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,145 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Corrige una desreferencia de puntero NULL en amdgpu_dm_connector_add_common_modes() En amdgpu_dm_connector_add_common_modes(), amdgpu_dm_create_common_mode() se asigna a mode y se pasa a drm_mode_probed_add() directamente despu\u00e9s de eso. drm_mode_probed_add() pasa &mode->head a list_add_tail(), y hay una desreferencia de este en list_add_tail() sin recuperaciones, lo que podr\u00eda provocar una desreferencia de puntero NULL en caso de fallo de amdgpu_dm_create_common_mode(). Corrige esto agregando una comprobaci\u00f3n NULL de mode. Este error fue encontrado por un analizador est\u00e1tico. Las compilaciones con 'make allyesconfig' no muestran nuevas advertencias y nuestro analizador est\u00e1tico ya no advierte sobre este c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.238", + "matchCriteriaId": "FA28527A-11D3-41D2-9C4C-ECAC0D6A4A2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.189", + "matchCriteriaId": "8CB6E8F5-C2B1-46F3-A807-0F6104AC340F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.110", + "matchCriteriaId": "91D3BFD0-D3F3-4018-957C-96CCBF357D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/19a7eba284790cfbba2945deb2363cf03ce41648", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2c729dec8c1e3e2892fde5ce8181553860914e74", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/57f4ad5e286fe4599c8fc63cf89f85f9eec7f9c9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/588a70177df3b1777484267584ef38ab2ca899a2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/639b3b9def0a6a3f316a195d705d14113236e89c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bdc7429708a0772d90c208975694f7c2133b1202", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f4eaa999fec78dec2a9c2d797438e05cbffb125b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49233.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49233.json index becee9fba11..e786a6f0178 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49233.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49233.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49233", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:00.317", - "lastModified": "2025-02-26T07:01:00.317", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:27:09.697", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Llamar a dc_stream_release para eliminar la asignaci\u00f3n de enc de enlace [Por qu\u00e9] Un error de portabilidad provoc\u00f3 que la asignaci\u00f3n de flujo para el enlace se mantuviera sin liberarse: una p\u00e9rdida de memoria. [C\u00f3mo] Corrija el error de portabilidad agregando nuevamente dc_stream_release() previsto como parte del parche original." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/a28b7b6a0c827ce672edcdb5b2b5916b0beebe03", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f2bde8349c35d01d7c50456ea06a5c7d5e0e5ed0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49235.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49235.json index 85981c5a044..49071b20ae4 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49235.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49235.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49235", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:00.500", - "lastModified": "2025-02-26T07:01:00.500", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:27:57.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,173 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ath9k_htc: corregir errores de valores no inicializados Syzbot inform\u00f3 de 2 errores de KMSAN en ath9k. Todos ellos son causados por la falta de inicializaci\u00f3n de campos. En htc_connect_service(), svc_meta_len y pad no se inicializan. Seg\u00fan el c\u00f3digo, parece que en el skb actual no hay datos de servicio, por lo que simplemente inicialice svc_meta_len a 0. htc_issue_send() no inicializa la matriz htc_frame_hdr::control. Basado en el c\u00f3digo del firmware, lo inicializar\u00e1 por s\u00ed mismo, as\u00ed que simplemente ponga a cero toda la matriz para que KMSAN est\u00e9 contento Registros de errores: ERROR: KMSAN: kernel-usb-infoleak en usb_submit_urb+0x6c1/0x2aa0 drivers/usb/core/urb.c:430 usb_submit_urb+0x6c1/0x2aa0 drivers/usb/core/urb.c:430 hif_usb_send_regout drivers/net/wireless/ath/ath9k/hif_usb.c:127 [en l\u00ednea] hif_usb_send+0x5f0/0x16f0 drivers/net/wireless/ath/ath9k/hif_usb.c:479 htc_issue_send drivers/net/wireless/ath/ath9k/htc_hst.c:34 [en l\u00ednea] htc_connect_service+0x143e/0x1960 drivers/net/wireless/ath/ath9k/htc_hst.c:275 ... Uninit se cre\u00f3 en: slab_post_alloc_hook mm/slab.h:524 [en l\u00ednea] slab_alloc_node mm/slub.c:3251 [en l\u00ednea] __kmalloc_node_track_caller+0xe0c/0x1510 mm/slub.c:4974 kmalloc_reserve net/core/skbuff.c:354 [en l\u00ednea] __alloc_skb+0x545/0xf90 net/core/skbuff.c:426 alloc_skb include/linux/skbuff.h:1126 [en l\u00ednea] htc_connect_service+0x1029/0x1960 drivers/net/wireless/ath/ath9k/htc_hst.c:258 ... Los bytes 4-7 de 18 no est\u00e1n inicializados El acceso a la memoria de tama\u00f1o 18 comienza en ffff888027377e00 ERROR: KMSAN: kernel-usb-infoleak en usb_submit_urb+0x6c1/0x2aa0 drivers/usb/core/urb.c:430 usb_submit_urb+0x6c1/0x2aa0 drivers/usb/core/urb.c:430 hif_usb_send_regout drivers/net/wireless/ath/ath9k/hif_usb.c:127 [en l\u00ednea] hif_usb_send+0x5f0/0x16f0 drivers/net/wireless/ath/ath9k/hif_usb.c:479 htc_issue_send drivers/net/wireless/ath/ath9k/htc_hst.c:34 [en l\u00ednea] htc_connect_service+0x143e/0x1960 drivers/net/wireless/ath/ath9k/htc_hst.c:275 ... Uninit se cre\u00f3 en: slab_post_alloc_hook mm/slab.h:524 [en l\u00ednea] slab_alloc_node mm/slub.c:3251 [en l\u00ednea] __kmalloc_node_track_caller+0xe0c/0x1510 mm/slub.c:4974 kmalloc_reserve net/core/skbuff.c:354 [en l\u00ednea] __alloc_skb+0x545/0xf90 net/core/skbuff.c:426 alloc_skb include/linux/skbuff.h:1126 [en l\u00ednea] htc_connect_service+0x1029/0x1960 drivers/net/wireless/ath/ath9k/htc_hst.c:258 ... Los bytes 16-17 de 18 no est\u00e1n inicializados. El acceso a la memoria de tama\u00f1o 18 comienza en ffff888027377e00" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.35", + "versionEndExcluding": "4.9.311", + "matchCriteriaId": "AF88BCDF-8B1F-4DB2-A7C2-8831EFD200E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.276", + "matchCriteriaId": "6D9B028C-6313-47F9-94B7-5F8122345E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.238", + "matchCriteriaId": "FA28527A-11D3-41D2-9C4C-ECAC0D6A4A2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.189", + "matchCriteriaId": "8CB6E8F5-C2B1-46F3-A807-0F6104AC340F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.110", + "matchCriteriaId": "91D3BFD0-D3F3-4018-957C-96CCBF357D79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0b700f7d06492de34964b6f414120043364f8191", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/11f11ac281f0c0b363d2940204f28bae0422ed71", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4d244b731188e0b63fc40a9d2dec72e9181fb37c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5abf2b761b998063f5e2bae93fd4ab10e2a80f10", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5c2a6a8daa17a3f65b38b9a5574bb362c13fa1d9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7da6169b6ebb75816b57be3beb829afa74f3b4b6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d1e0df1c57bd30871dd1c855742a7c346dbca853", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e352acdd378e9263cc4c6018e588f2dac7161d07", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ee4222052a76559c20e821bc3519cefb58b6d3e9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49237.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49237.json index 9032c91eac8..cd644edd111 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49237.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49237.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49237", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:00.700", - "lastModified": "2025-02-26T07:01:00.700", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:28:13.427", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ath11k: agregar la funci\u00f3n of_node_put() faltante para evitar fugas El puntero de nodo es devuelto por of_find_node_by_type() o por of_parse_phandle() con refcount incrementado. Llamar a of_node_put() para evitar la fuga de refcount." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3d38faef0de1756994b3d95e47b2302842f729e2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7d51cb010b20d70b16dc6e4341bf29d6c5b32564", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-492xx/CVE-2022-49239.json b/CVE-2022/CVE-2022-492xx/CVE-2022-49239.json index 1a6bb18eaa4..75e82dce772 100644 --- a/CVE-2022/CVE-2022-492xx/CVE-2022-49239.json +++ b/CVE-2022/CVE-2022-492xx/CVE-2022-49239.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49239", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-26T07:01:00.887", - "lastModified": "2025-02-26T07:01:00.887", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T19:28:26.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: codecs: wcd934x: Agregar la falta de of_node_put() en wcd934x_codec_parse_data El puntero device_node es devuelto por of_parse_phandle() con refcount incrementado. Deber\u00edamos usar of_node_put() en \u00e9l cuando haya terminado. Esto es similar a el commit 64b92de9603f (\"ASoC: wcd9335: corregir una referencia filtrada agregando la falta de of_node_put\")" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.6", + "versionEndExcluding": "5.10.110", + "matchCriteriaId": "05F0A158-8722-4B5A-BEC5-245BC5E3EA9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.33", + "matchCriteriaId": "27C42AE8-B387-43E2-938A-E1C8B40BE6D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.19", + "matchCriteriaId": "20C43679-0439-405A-B97F-685BEE50613B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.2", + "matchCriteriaId": "210C679C-CF84-44A3-8939-E629C87E54BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1f24716e38220fc9e52e208d20591d2bc9b7f020", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2f44eca78cc6d4e1779eb95765ec79e433accab4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9531a631379169d57756b2411178c6238655df88", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f3793eeb7b94a5eeed6f5c7a44bce403c6681a12", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f8e89d84ea83c51ba3ba97ff154f7aa679326760", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1195.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1195.json index 10cbba348f1..4c1a043ad5b 100644 --- a/CVE-2023/CVE-2023-11xx/CVE-2023-1195.json +++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1195.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1195", "sourceIdentifier": "secalert@redhat.com", "published": "2023-05-18T22:15:09.373", - "lastModified": "2024-11-21T07:38:39.007", + "lastModified": "2025-03-18T19:15:40.697", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1859.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1859.json index 2cb9a7d5d7d..58f31620faf 100644 --- a/CVE-2023/CVE-2023-18xx/CVE-2023-1859.json +++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1859.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1859", "sourceIdentifier": "secalert@redhat.com", "published": "2023-05-17T23:15:09.100", - "lastModified": "2024-11-21T07:40:02.217", + "lastModified": "2025-03-18T19:15:40.903", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20578.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20578.json index 7001d5c3e37..c5a7f5ea1d9 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20578.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20578.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20578", "sourceIdentifier": "psirt@amd.com", "published": "2024-08-13T17:15:19.510", - "lastModified": "2024-10-02T17:35:44.117", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T20:15:17.357", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2019.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2019.json index b1091ffb9b9..c8cae83482d 100644 --- a/CVE-2023/CVE-2023-20xx/CVE-2023-2019.json +++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2019.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2019", "sourceIdentifier": "secalert@redhat.com", "published": "2023-04-24T21:15:09.347", - "lastModified": "2024-11-21T07:57:46.253", + "lastModified": "2025-03-18T20:15:19.093", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2177.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2177.json index f22970d6e9a..8d43d5b5fe8 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2177.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2177.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2177", "sourceIdentifier": "secalert@redhat.com", "published": "2023-04-20T21:15:08.997", - "lastModified": "2024-11-21T07:58:05.267", + "lastModified": "2025-03-18T20:15:19.293", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-230xx/CVE-2023-23064.json b/CVE-2023/CVE-2023-230xx/CVE-2023-23064.json index 21ad3fb91ff..95d864c9acf 100644 --- a/CVE-2023/CVE-2023-230xx/CVE-2023-23064.json +++ b/CVE-2023/CVE-2023-230xx/CVE-2023-23064.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23064", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-17T22:15:14.353", - "lastModified": "2024-11-21T07:45:49.720", + "lastModified": "2025-03-18T20:15:17.623", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23848.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23848.json index b1d765235b7..4d9e9d350c4 100644 --- a/CVE-2023/CVE-2023-238xx/CVE-2023-23848.json +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23848.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23848", "sourceIdentifier": "disclosure@synopsys.com", "published": "2023-02-15T19:15:13.150", - "lastModified": "2024-11-21T07:46:57.003", + "lastModified": "2025-03-18T20:15:17.810", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -55,6 +75,16 @@ "value": "CWE-276" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23850.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23850.json index 0b13add8622..d7d58634878 100644 --- a/CVE-2023/CVE-2023-238xx/CVE-2023-23850.json +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23850.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23850", "sourceIdentifier": "disclosure@synopsys.com", "published": "2023-02-15T19:15:13.217", - "lastModified": "2024-11-21T07:46:57.227", + "lastModified": "2025-03-18T20:15:17.997", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -55,6 +75,16 @@ "value": "CWE-276" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-240xx/CVE-2023-24062.json b/CVE-2023/CVE-2023-240xx/CVE-2023-24062.json index 55486b26ebb..391c69db329 100644 --- a/CVE-2023/CVE-2023-240xx/CVE-2023-24062.json +++ b/CVE-2023/CVE-2023-240xx/CVE-2023-24062.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24062", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-08T18:15:09.317", - "lastModified": "2024-08-19T19:05:06.027", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T19:15:41.127", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-242xx/CVE-2023-24236.json b/CVE-2023/CVE-2023-242xx/CVE-2023-24236.json index a664a86511c..11f38f4e67f 100644 --- a/CVE-2023/CVE-2023-242xx/CVE-2023-24236.json +++ b/CVE-2023/CVE-2023-242xx/CVE-2023-24236.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24236", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-16T15:15:18.980", - "lastModified": "2024-11-21T07:47:37.187", + "lastModified": "2025-03-18T20:15:18.160", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-242xx/CVE-2023-24238.json b/CVE-2023/CVE-2023-242xx/CVE-2023-24238.json index 864d1f04718..9981a044325 100644 --- a/CVE-2023/CVE-2023-242xx/CVE-2023-24238.json +++ b/CVE-2023/CVE-2023-242xx/CVE-2023-24238.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24238", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-16T15:15:19.193", - "lastModified": "2024-11-21T07:47:37.340", + "lastModified": "2025-03-18T20:15:18.333", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24483.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24483.json index bb1e5051020..a762bab7414 100644 --- a/CVE-2023/CVE-2023-244xx/CVE-2023-24483.json +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24483.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24483", "sourceIdentifier": "secure@citrix.com", "published": "2023-02-16T18:15:11.613", - "lastModified": "2024-11-21T07:47:57.073", + "lastModified": "2025-03-18T20:15:18.483", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -55,6 +75,16 @@ "value": "CWE-269" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24484.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24484.json index d2eead03e39..976751ad958 100644 --- a/CVE-2023/CVE-2023-244xx/CVE-2023-24484.json +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24484.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24484", "sourceIdentifier": "secure@citrix.com", "published": "2023-02-16T18:15:11.900", - "lastModified": "2024-11-21T07:47:57.203", + "lastModified": "2025-03-18T20:15:18.673", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24580.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24580.json index c642e79c997..8dd54aa27e5 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24580.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24580.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24580", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-15T01:15:10.687", - "lastModified": "2024-11-21T07:48:10.217", + "lastModified": "2025-03-18T20:15:18.837", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2938.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2938.json index 62b2207a3fa..b5e12e4df66 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2938.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2938.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2938", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-05-30T22:15:10.433", - "lastModified": "2024-11-21T07:59:36.437", + "lastModified": "2025-03-18T19:15:41.333", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-451" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31084.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31084.json index 3d486a37189..8c67cffc25e 100644 --- a/CVE-2023/CVE-2023-310xx/CVE-2023-31084.json +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31084.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31084", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-24T06:15:07.997", - "lastModified": "2024-11-21T08:01:22.970", + "lastModified": "2025-03-18T20:15:19.503", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-833" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33250.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33250.json index 7a37848ddba..36141e08d81 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33250.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33250.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33250", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-21T21:15:08.737", - "lastModified": "2024-11-21T08:05:15.727", + "lastModified": "2025-03-18T19:15:41.573", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33288.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33288.json index bd7843efcb4..34d104017cf 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33288.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33288.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33288", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-22T03:15:09.797", - "lastModified": "2024-11-21T08:05:20.497", + "lastModified": "2025-03-18T19:15:41.793", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34400.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34400.json index b8dd0d51960..2c0b2acac3b 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34400.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34400.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34400", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T22:15:10.847", - "lastModified": "2025-02-18T18:15:15.043", + "lastModified": "2025-03-18T20:15:19.913", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La unidad principal Mercedes-Benz NTG6 contiene funciones para importar o exportar configuraciones de perfil a trav\u00e9s de USB. En caso de analizar un archivo, el servicio intenta definir el encabezado dentro del archivo y lo convierte en una cadena con terminaci\u00f3n nula. Si falta alg\u00fan car\u00e1cter, devolver\u00e1 un puntero nulo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://securelist.com/mercedes-benz-head-unit-security-research/115218/", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37022.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37022.json index 0d93b548332..0865218f07b 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37022.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37022.json @@ -2,7 +2,7 @@ "id": "CVE-2023-37022", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-22T15:15:11.817", - "lastModified": "2025-02-18T20:15:17.057", + "lastModified": "2025-03-18T19:15:42.000", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n alcanzable en el controlador de paquetes `UE Context Release Request`. Un paquete que contiene un campo `MME_UE_S1AP_ID` ??no v\u00e1lido hace que Open5gs se bloquee; un atacante puede enviar repetidamente dichos paquetes para provocar una denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37027.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37027.json index c686be67430..26d0b187e3b 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37027.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37027.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37027", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:09.880", - "lastModified": "2025-03-03T15:31:04.120", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T20:15:20.130", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37058.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37058.json index 42ecaa52dcb..178b8d2b916 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37058.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37058.json @@ -2,7 +2,7 @@ "id": "CVE-2023-37058", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T21:15:50.503", - "lastModified": "2024-11-21T08:11:01.153", + "lastModified": "2025-03-18T20:15:20.283", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-407xx/CVE-2023-40747.json b/CVE-2023/CVE-2023-407xx/CVE-2023-40747.json index e44f47a1f0f..fccd96d9221 100644 --- a/CVE-2023/CVE-2023-407xx/CVE-2023-40747.json +++ b/CVE-2023/CVE-2023-407xx/CVE-2023-40747.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40747", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-03-18T01:15:48.440", - "lastModified": "2024-11-21T08:20:03.600", + "lastModified": "2025-03-18T20:15:20.477", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://akisoftware.com/Vulnerability202301.html", diff --git a/CVE-2023/CVE-2023-438xx/CVE-2023-43850.json b/CVE-2023/CVE-2023-438xx/CVE-2023-43850.json index 389ca6380f1..941e1651d3b 100644 --- a/CVE-2023/CVE-2023-438xx/CVE-2023-43850.json +++ b/CVE-2023/CVE-2023-438xx/CVE-2023-43850.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43850", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T19:15:09.713", - "lastModified": "2025-02-10T23:15:11.437", + "lastModified": "2025-03-18T19:15:42.163", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "La validaci\u00f3n de entrada incorrecta en la funci\u00f3n de administraci\u00f3n de usuarios de la interfaz web en Aten PE6208 2.3.228 y 2.4.232 permite a los usuarios autenticados remotamente provocar una DoS parcial de la interfaz web a trav\u00e9s de una solicitud HTTP POST." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50804.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50804.json index 8acb8efe2db..ba402125482 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50804.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50804.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50804", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-05T19:15:11.900", - "lastModified": "2024-11-21T08:37:19.220", + "lastModified": "2025-03-18T20:15:20.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12577.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12577.json index 95a62863e48..e72a6baa815 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12577.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12577.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12577", "sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce", "published": "2025-02-22T15:15:10.227", - "lastModified": "2025-02-22T15:15:10.227", + "lastModified": "2025-03-18T20:15:20.827", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El software del kernel instalado y ejecut\u00e1ndose dentro de una m\u00e1quina virtual invitada puede explotar la memoria compartida con el firmware de la GPU para escribir datos fuera de la memoria de la GPU virtualizada del invitado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 4.7 + } + ] + }, "weaknesses": [ { "source": "367425dc-4d06-4041-9650-c2dc6aaa27ce", diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21164.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21164.json index 9b414e8817c..229e4578e81 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21164.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21164.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21164", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:19.490", - "lastModified": "2024-11-21T08:53:54.513", + "lastModified": "2025-03-18T19:15:42.340", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N", @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22102.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22102.json index 18645e2e95f..5906cdae874 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22102.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22102.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22102", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-02T15:15:11.070", - "lastModified": "2024-11-21T08:55:35.143", + "lastModified": "2025-03-18T20:15:21.000", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-230xx/CVE-2024-23091.json b/CVE-2024/CVE-2024-230xx/CVE-2024-23091.json index 77fa653eddc..3e6386370a1 100644 --- a/CVE-2024/CVE-2024-230xx/CVE-2024-23091.json +++ b/CVE-2024/CVE-2024-230xx/CVE-2024-23091.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23091", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-30T14:15:02.730", - "lastModified": "2024-11-21T08:56:56.073", + "lastModified": "2025-03-18T20:15:21.267", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-916" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-916" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-234xx/CVE-2024-23486.json b/CVE-2024/CVE-2024-234xx/CVE-2024-23486.json index 2ca790eedbd..4ab3f15ae92 100644 --- a/CVE-2024/CVE-2024-234xx/CVE-2024-23486.json +++ b/CVE-2024/CVE-2024-234xx/CVE-2024-23486.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23486", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-04-15T11:15:07.820", - "lastModified": "2024-11-21T08:57:48.630", + "lastModified": "2025-03-18T20:15:21.460", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-256" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN58236836/", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23762.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23762.json index c55823aeb16..3b56237c089 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23762.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23762.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23762", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-12T22:15:08.307", - "lastModified": "2024-11-21T08:58:20.780", + "lastModified": "2025-03-18T20:15:21.623", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23929.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23929.json index b92d1ac60d8..252eae0412f 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23929.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23929.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23929", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2025-01-31T01:15:09.697", - "lastModified": "2025-02-18T19:15:14.883", + "lastModified": "2025-03-18T20:15:21.787", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Esta vulnerabilidad permite a los atacantes adyacentes a la red crear archivos arbitrarios en las instalaciones afectadas de los dispositivos Pioneer DMH-WT7600NEX. Aunque se requiere autenticaci\u00f3n para explotar esta vulnerabilidad, se puede eludir el mecanismo de autenticaci\u00f3n existente. La falla espec\u00edfica existe dentro de la funcionalidad telem\u00e1tica. El problema es el resultado de la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones con archivos. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto de la ra\u00edz." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1044/", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24423.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24423.json index 5a5cc464d78..be8dbb9c282 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24423.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24423.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24423", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:12.407", - "lastModified": "2025-02-18T21:15:21.310", + "lastModified": "2025-03-18T19:15:42.503", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-264xx/CVE-2024-26495.json b/CVE-2024/CVE-2024-264xx/CVE-2024-26495.json index 41a202a2c4a..bf59afad5c5 100644 --- a/CVE-2024/CVE-2024-264xx/CVE-2024-26495.json +++ b/CVE-2024/CVE-2024-264xx/CVE-2024-26495.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26495", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-03T03:15:09.533", - "lastModified": "2024-11-21T09:02:30.907", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-03-18T20:15:21.933", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de Cross Site Scripting (XSS) en las versiones de Friendica posteriores a la v.2023.12 permite a un atacante remoto ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de las etiquetas BBCode en el contenido de la publicaci\u00f3n y en la funci\u00f3n de comentarios de la publicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/friendica/friendica/issues/13884", diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27383.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27383.json index 083f5921131..8b8d4ea4632 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27383.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27383.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27383", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-09T20:15:04.570", - "lastModified": "2024-09-11T15:25:24.303", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T20:15:22.130", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38477.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38477.json index 7a2f59434f3..34735442dbf 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38477.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38477.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38477", "sourceIdentifier": "security@apache.org", "published": "2024-07-01T19:15:05.083", - "lastModified": "2024-11-21T09:26:03.687", + "lastModified": "2025-03-18T19:15:42.683", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39241.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39241.json index 79c96d8af31..6eba2e7207f 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39241.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39241.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39241", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T20:15:16.447", - "lastModified": "2024-11-21T09:27:21.467", + "lastModified": "2025-03-18T19:15:42.903", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39924.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39924.json index 2dbdc357c18..f5f7c4165c8 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39924.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39924.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39924", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-13T18:15:03.810", - "lastModified": "2025-01-09T18:15:27.987", + "lastModified": "2025-03-18T20:15:22.283", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Vaultwarden (anteriormente Bitwarden_RS) 1.30.3. Se identific\u00f3 una vulnerabilidad en el proceso de autenticaci\u00f3n y autorizaci\u00f3n del endpoint responsable de alterar los metadatos de un acceso de emergencia. Permite que un atacante con acceso de emergencia concedido escale sus privilegios cambiando el nivel de acceso y modificando el tiempo de espera. En consecuencia, el atacante puede obtener control total sobre la b\u00f3veda (cuando solo se pretende que tenga acceso de lectura) mientras se salta el per\u00edodo de espera necesario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://github.com/dani-garcia/vaultwarden/blob/1.30.3/src/api/core/emergency_access.rs#L115-L148", diff --git a/CVE-2024/CVE-2024-399xx/CVE-2024-39926.json b/CVE-2024/CVE-2024-399xx/CVE-2024-39926.json index 800cf1b65f8..776484d004e 100644 --- a/CVE-2024/CVE-2024-399xx/CVE-2024-39926.json +++ b/CVE-2024/CVE-2024-399xx/CVE-2024-39926.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39926", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-13T18:15:04.013", - "lastModified": "2025-01-09T18:15:28.220", + "lastModified": "2025-03-18T19:15:43.093", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Vaultwarden (anteriormente Bitwarden_RS) 1.30.3. Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n de HTML o de Cross-site Scripting (XSS) almacenado, debido a la CSP predeterminada, en el panel de control del administrador. Esto potencialmente permite que un atacante autenticado inyecte c\u00f3digo malicioso en el panel de control, que luego se ejecuta o se muestra en el contexto del navegador de un administrador al visualizar el contenido inyectado. Sin embargo, es importante tener en cuenta que la Pol\u00edtica de seguridad de contenido (CSP) predeterminada de la aplicaci\u00f3n bloquea la mayor\u00eda de las rutas de explotaci\u00f3n, lo que mitiga significativamente el impacto potencial." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/dani-garcia/vaultwarden/blob/1.30.3/src/static/scripts/admin_users.js#L201", diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40393.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40393.json index cbc593b0826..efede95c7ec 100644 --- a/CVE-2024/CVE-2024-403xx/CVE-2024-40393.json +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40393.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40393", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-16T19:15:12.873", - "lastModified": "2024-11-21T09:31:02.303", + "lastModified": "2025-03-18T20:15:22.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40604.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40604.json index 9e9951b3368..f9fc50674ba 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40604.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40604.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40604", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-07T00:15:10.690", - "lastModified": "2024-11-21T09:31:22.187", + "lastModified": "2025-03-18T19:15:43.277", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40842.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40842.json index 3568644903e..6f4440c241d 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40842.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40842.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40842", "sourceIdentifier": "product-security@apple.com", "published": "2024-09-17T00:15:49.013", - "lastModified": "2024-09-24T14:56:30.320", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T20:15:22.593", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40857.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40857.json index 94d11fb6375..2e38eb8906a 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40857.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40857.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40857", "sourceIdentifier": "product-security@apple.com", "published": "2024-09-17T00:15:49.537", - "lastModified": "2024-09-25T13:41:41.843", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T19:15:43.453", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41310.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41310.json index 0f70aa28a8e..9086a045f97 100644 --- a/CVE-2024/CVE-2024-413xx/CVE-2024-41310.json +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41310.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41310", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-02T17:16:38.763", - "lastModified": "2024-08-28T17:42:01.190", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T20:15:22.757", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-415xx/CVE-2024-41572.json b/CVE-2024/CVE-2024-415xx/CVE-2024-41572.json index f745f41adb5..1395b489883 100644 --- a/CVE-2024/CVE-2024-415xx/CVE-2024-41572.json +++ b/CVE-2024/CVE-2024-415xx/CVE-2024-41572.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41572", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-21T19:15:13.380", - "lastModified": "2024-09-11T14:15:13.380", + "lastModified": "2025-03-18T19:15:43.633", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41614.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41614.json index 5dab2575100..943681daf30 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41614.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41614.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41614", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-13T17:15:24.013", - "lastModified": "2024-08-14T18:14:16.073", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T20:15:22.933", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41924.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41924.json index 0ce1c382aa7..13fc77197a2 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41924.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41924.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41924", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-30T09:15:05.203", - "lastModified": "2024-11-21T09:33:17.350", + "lastModified": "2025-03-18T19:15:43.833", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-349" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN48324254/", diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4180.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4180.json index 298785cbd2b..05bd009537d 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4180.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4180.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4180", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-04T06:15:10.820", - "lastModified": "2024-11-21T09:42:20.530", + "lastModified": "2025-03-18T19:15:45.633", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Events Calendar de WordPres anterior a 6.4.0.1 no sanitiza adecuadamente el contenido enviado por el usuario al representar algunas vistas a trav\u00e9s de AJAX." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/b2a92316-e404-4a5e-8426-f88df6e87550/", diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42006.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42006.json index 86904a5ed7d..d67f71ba3b4 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42006.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42006.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42006", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T14:15:09.540", - "lastModified": "2024-08-21T13:26:54.577", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T20:15:23.103", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42698.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42698.json index dd4a63ebe33..9831cf038ee 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42698.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42698.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42698", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-28T16:15:09.210", - "lastModified": "2024-09-19T16:29:51.217", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T19:15:44.043", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-129" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44154.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44154.json index f6220d8a63c..a21817fd07c 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44154.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44154.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44154", "sourceIdentifier": "product-security@apple.com", "published": "2024-09-17T00:15:50.860", - "lastModified": "2024-09-24T16:16:39.947", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T19:15:44.260", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44155.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44155.json index 93b565dcce4..4769d574db3 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44155.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44155.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44155", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.460", - "lastModified": "2024-10-29T17:34:16.487", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T19:15:44.467", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44176.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44176.json index cffd1769b60..b3bf4608214 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44176.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44176.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44176", "sourceIdentifier": "product-security@apple.com", "published": "2024-09-17T00:15:51.573", - "lastModified": "2024-09-25T13:27:13.333", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T20:15:23.277", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44186.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44186.json index 5625df91af5..0615d8b42bb 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44186.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44186.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44186", "sourceIdentifier": "product-security@apple.com", "published": "2024-09-17T00:15:51.987", - "lastModified": "2024-09-24T18:03:45.513", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T19:15:44.663", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-445xx/CVE-2024-44552.json b/CVE-2024/CVE-2024-445xx/CVE-2024-44552.json index 2405568612d..f1005ec239c 100644 --- a/CVE-2024/CVE-2024-445xx/CVE-2024-44552.json +++ b/CVE-2024/CVE-2024-445xx/CVE-2024-44552.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44552", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-26T16:15:10.490", - "lastModified": "2024-08-27T14:29:35.297", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T20:15:23.460", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46581.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46581.json index 5dc60478d50..4fb17e07549 100644 --- a/CVE-2024/CVE-2024-465xx/CVE-2024-46581.json +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46581.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46581", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T15:15:17.630", - "lastModified": "2024-09-24T16:41:36.533", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T19:15:44.870", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46592.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46592.json index 0c07faf1c30..991afdae5d1 100644 --- a/CVE-2024/CVE-2024-465xx/CVE-2024-46592.json +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46592.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46592", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T15:15:18.170", - "lastModified": "2024-09-24T16:41:00.260", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T20:15:23.633", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47049.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47049.json index c551140105b..431cfd981e7 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47049.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47049.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47049", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-17T14:15:17.877", - "lastModified": "2024-09-27T17:09:46.980", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T20:15:23.800", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 } ] }, @@ -53,6 +73,20 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + }, + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47857.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47857.json index 154f60ba6a8..a24e29f839b 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47857.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47857.json @@ -2,7 +2,7 @@ "id": "CVE-2024-47857", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-31T17:15:14.530", - "lastModified": "2025-02-18T19:15:16.700", + "lastModified": "2025-03-18T20:15:24.030", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "SSH Communication Security PrivX las versiones entre 18.0 y 36.0 implementan una validaci\u00f3n insuficiente en las firmas de clave p\u00fablica cuando se utilizan conexiones SSH nativas a trav\u00e9s de un puerto proxy. Esto permite que una \"cuenta A\" de PrivX existente se haga pasar por otra \"cuenta B\" de PrivX existente y obtenga acceso a los hosts de destino SSH a los que la \"cuenta B\" tiene acceso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://info.ssh.com/impersonation-vulnerability-privx", diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47899.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47899.json index 50434757627..ae599c0d7e9 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47899.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47899.json @@ -2,7 +2,7 @@ "id": "CVE-2024-47899", "sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce", "published": "2025-01-31T04:15:08.800", - "lastModified": "2025-02-18T19:15:17.117", + "lastModified": "2025-03-18T20:15:24.170", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El software instalado y ejecutado como un usuario sin privilegios puede realizar llamadas de GPU sistema incorrectas para activar excepciones de kernel use-after-free." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "367425dc-4d06-4041-9650-c2dc6aaa27ce", diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48822.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48822.json index 73884766c09..cd0b9559670 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48822.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48822.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48822", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-14T21:15:11.813", - "lastModified": "2024-10-15T15:35:21.887", + "lastModified": "2025-03-18T19:15:45.140", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://daly.wtf/multiple-vulnerabilities-discovered-in-automatic-systems-software/", diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json index d2b54482146..b213e1a22fa 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48955", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T18:15:05.690", - "lastModified": "2025-01-09T18:15:29.147", + "lastModified": "2025-03-18T19:15:45.317", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " En NetAdmin 4.0.30319, un atacante puede robar una cookie de sesi\u00f3n v\u00e1lida e inyectarla en otro dispositivo, lo que le otorga acceso no autorizado. Este tipo de ataque se conoce com\u00fanmente como secuestro de sesi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/BrotherOfJhonny/CVE-2024-48955_Overview", diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49744.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49744.json index 11bef8e0872..681604e355d 100644 --- a/CVE-2024/CVE-2024-497xx/CVE-2024-49744.json +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49744.json @@ -2,7 +2,7 @@ "id": "CVE-2024-49744", "sourceIdentifier": "security@android.com", "published": "2025-01-21T23:15:14.880", - "lastModified": "2025-02-18T20:15:20.720", + "lastModified": "2025-03-18T19:15:45.477", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En checkKeyIntentParceledCorrectly de AccountManagerService.java, existe una forma posible de evitar la mitigaci\u00f3n de la falta de coincidencia de paquetes debido a una deserializaci\u00f3n insegura. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2025-01-01", diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50945.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50945.json index 808646d960d..fa5db95835e 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50945.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50945.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50945", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-27T19:15:08.963", - "lastModified": "2025-02-18T22:15:12.093", + "lastModified": "2025-03-18T19:15:45.810", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe una vulnerabilidad de control de acceso indebido en SimplCommerce en el commit 230310c8d7a0408569b292c5a805c459d47a1d8f, que permite a los usuarios enviar rese\u00f1as sin verificar si han comprado el producto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/AbdullahAlmutawa/CVE-2024-50945", diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51163.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51163.json index 4c2625314c7..bdf9b965d44 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51163.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51163.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51163", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-20T17:15:18.417", - "lastModified": "2025-01-09T22:15:28.897", + "lastModified": "2025-03-18T19:15:45.977", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inclusi\u00f3n de archivos locales en Vegam Solutions Vegam 4i v.6.3.47.0 y versiones anteriores permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n de etiquetado de impresi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/Henkel-CyberVM/CVEs/tree/main/CVE-2024-51163", diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52943.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52943.json index 750e7d136bf..2f8f3126919 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52943.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52943.json @@ -2,7 +2,7 @@ "id": "CVE-2024-52943", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-18T06:15:05.793", - "lastModified": "2024-12-11T15:15:16.507", + "lastModified": "2025-03-18T20:15:24.340", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://www.veritas.com/support/en_US/security/VTS24-013", diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53584.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53584.json index 69204ba867d..df09c76155a 100644 --- a/CVE-2024/CVE-2024-535xx/CVE-2024-53584.json +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53584.json @@ -2,7 +2,7 @@ "id": "CVE-2024-53584", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-31T17:15:15.890", - "lastModified": "2025-02-18T19:15:18.377", + "lastModified": "2025-03-18T19:15:46.150", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que OpenPanel v0.3.4 conten\u00eda una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo a trav\u00e9s del par\u00e1metro de zona horaria." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://openpanel.com/docs/changelog/0.3.5/#%EF%B8%8F-security-fixes", diff --git a/CVE-2024/CVE-2024-544xx/CVE-2024-54478.json b/CVE-2024/CVE-2024-544xx/CVE-2024-54478.json index 86bea0e5f90..6c3e3a36b89 100644 --- a/CVE-2024/CVE-2024-544xx/CVE-2024-54478.json +++ b/CVE-2024/CVE-2024-544xx/CVE-2024-54478.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54478", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:12.377", - "lastModified": "2025-03-04T15:57:53.127", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T20:15:24.467", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,12 +36,42 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [ { @@ -118,56 +148,56 @@ "url": "https://support.apple.com/en-us/121837", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory", - "Release Notes" + "Release Notes", + "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/121839", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory", - "Release Notes" + "Release Notes", + "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/121840", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory", - "Release Notes" + "Release Notes", + "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/121843", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory", - "Release Notes" + "Release Notes", + "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/121844", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory", - "Release Notes" + "Release Notes", + "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/121845", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory", - "Release Notes" + "Release Notes", + "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/122067", "source": "product-security@apple.com", "tags": [ - "Vendor Advisory", - "Release Notes" + "Release Notes", + "Vendor Advisory" ] } ] diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57019.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57019.json index f83628577ac..d6b953ec70b 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57019.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57019.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57019", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.797", - "lastModified": "2025-03-10T17:24:31.533", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T20:15:24.637", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57020.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57020.json index a1047ea0027..5636c9a16f5 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57020.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57020.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57020", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T17:15:17.890", - "lastModified": "2025-03-10T17:26:39.417", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T19:15:46.330", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57098.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57098.json index 45b6bfae9bc..897a725e916 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57098.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57098.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57098", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T20:15:34.013", - "lastModified": "2025-02-18T19:15:21.480", + "lastModified": "2025-03-18T19:15:46.517", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La versi\u00f3n v0.1.3 de Moss tiene una vulnerabilidad de inyecci\u00f3n SQL que permite a los atacantes inyectar payloads cuidadosamente dise\u00f1ados en el par\u00e1metro de pedido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/deep-project/moss/issues/13", diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57433.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57433.json index 98e1f19933b..ebc42b266a6 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57433.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57433.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57433", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-31T22:15:12.383", - "lastModified": "2025-02-18T19:15:21.827", + "lastModified": "2025-03-18T19:15:46.680", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "macrozheng mall-tiny 1.0.1 es vulnerable a un control de acceso incorrecto a trav\u00e9s de la funci\u00f3n de cierre de sesi\u00f3n. Despu\u00e9s de que un usuario cierra sesi\u00f3n, su token sigue estando disponible y recupera informaci\u00f3n en el estado de inicio de sesi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://github.com/peccc/restful_vul/blob/main/mall_tiny_logout_failed/mall_tiny_logout_failed.md", diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57580.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57580.json index 579310c0d61..63cb1096904 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57580.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57580.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57580", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T21:15:17.223", - "lastModified": "2025-03-06T12:45:57.383", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T19:15:46.850", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57581.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57581.json index ccf278f8163..ace639d0b86 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57581.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57581.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57581", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T21:15:17.437", - "lastModified": "2025-03-06T12:45:43.120", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T19:15:47.037", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57655.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57655.json index 2c52d32804e..f682f277a50 100644 --- a/CVE-2024/CVE-2024-576xx/CVE-2024-57655.json +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57655.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57655", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-14T01:15:14.317", - "lastModified": "2025-02-18T22:15:15.390", + "lastModified": "2025-03-18T19:15:47.213", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Un problema en el componente dfe_n_in_order de openlink virtuoso-opensource v7.2.11 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de declaraciones SQL manipuladas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://github.com/openlink/virtuoso-opensource/issues/1216", diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57721.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57721.json index ad324a66c55..f39664234ff 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57721.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57721.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57721", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-23T01:15:26.990", - "lastModified": "2025-02-18T20:15:22.773", + "lastModified": "2025-03-18T20:15:24.810", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que lunasvg v3.0.0 conten\u00eda una violaci\u00f3n de segmentaci\u00f3n a trav\u00e9s del componente plutovg_path_add_path." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-653" + } + ] + } + ], "references": [ { "url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0", diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7527.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7527.json index 7e9313d8277..ae0e446e669 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7527.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7527.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7527", "sourceIdentifier": "security@mozilla.org", "published": "2024-08-06T13:15:57.543", - "lastModified": "2024-08-12T16:08:06.493", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T19:15:47.403", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -69,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7713.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7713.json index 1190a32449c..fbf9046647f 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7713.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7713.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7713", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-27T06:15:11.327", - "lastModified": "2024-10-04T17:28:45.807", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T20:15:24.980", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9398.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9398.json index 822bcebd359..48ffeb0694f 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9398.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9398.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9398", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-01T16:15:10.913", - "lastModified": "2024-10-30T18:35:22.757", + "lastModified": "2025-03-18T20:15:25.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0436.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0436.json index 8bbe2066811..0484b481f47 100644 --- a/CVE-2025/CVE-2025-04xx/CVE-2025-0436.json +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0436.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0436", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-01-15T11:15:09.673", - "lastModified": "2025-02-18T22:15:16.627", + "lastModified": "2025-03-18T20:15:25.330", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " Un desbordamiento de enteros en Skia en Google Chrome anterior a la versi\u00f3n 132.0.6834.83 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -26,6 +49,16 @@ "value": "CWE-472" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-472" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-206xx/CVE-2025-20633.json b/CVE-2025/CVE-2025-206xx/CVE-2025-20633.json index dade9a48e86..204d9a3d8d7 100644 --- a/CVE-2025/CVE-2025-206xx/CVE-2025-20633.json +++ b/CVE-2025/CVE-2025-206xx/CVE-2025-20633.json @@ -2,7 +2,7 @@ "id": "CVE-2025-20633", "sourceIdentifier": "security@mediatek.com", "published": "2025-02-03T04:15:08.307", - "lastModified": "2025-02-18T19:15:24.563", + "lastModified": "2025-03-18T19:15:47.673", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21532.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21532.json index b75ea4d77b4..1778dd7219d 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21532.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21532.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21532", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:19.107", - "lastModified": "2025-02-18T21:15:25.820", + "lastModified": "2025-03-18T20:15:25.563", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21547.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21547.json index 8203ca4d431..a49aaaaaf67 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21547.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21547.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21547", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:21.110", - "lastModified": "2025-02-18T21:15:26.180", + "lastModified": "2025-03-18T19:15:47.860", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21619.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21619.json new file mode 100644 index 00000000000..f9199e1260c --- /dev/null +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21619.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-21619", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-18T19:15:47.997", + "lastModified": "2025-03-18T19:15:47.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GLPI is a free asset and IT management software package. An administrator user can perfom a SQL injection through the rules configuration forms. This vulnerability is fixed in 10.0.18." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-pcmc-xv3g-hjxv", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22918.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22918.json index c311174e53d..c5bdf0fcb77 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22918.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22918.json @@ -2,7 +2,7 @@ "id": "CVE-2025-22918", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T21:15:15.400", - "lastModified": "2025-02-18T19:15:26.700", + "lastModified": "2025-03-18T19:15:48.183", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Polycom RealPresence Group 500 <=20 tiene permisos inseguros debido a la carga autom\u00e1tica de cookies. Esto permite el uso de funciones de administrador, lo que da como resultado la filtraci\u00f3n de informaci\u00f3n confidencial del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://github.com/MinggongKs/Polycom/blob/main/README.md", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24115.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24115.json index 913055e5c64..c358e6bc726 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24115.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24115.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24115", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:16.713", - "lastModified": "2025-03-04T15:15:15.310", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T19:15:48.330", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,19 +36,49 @@ }, "exploitabilityScore": 1.8, "impactScore": 4.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24130.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24130.json index 90001b65ce2..0a0106b730e 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24130.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24130.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24130", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:17.977", - "lastModified": "2025-03-04T14:52:14.533", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T19:15:48.507", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24146.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24146.json index 9846ae6538f..7d1cfc7f6e3 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24146.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24146.json @@ -2,7 +2,7 @@ "id": "CVE-2025-24146", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:19.077", - "lastModified": "2025-02-18T20:15:30.620", + "lastModified": "2025-03-18T19:15:48.683", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Este problema se solucion\u00f3 con una redacci\u00f3n mejorada de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sequoia 15.3 y macOS Sonoma 14.7.3. Eliminar una conversaci\u00f3n en Mensajes puede exponer la informaci\u00f3n de contacto del usuario en el registro sistema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122068", diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24154.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24154.json index 0b3a5feac72..ff7e1728e6b 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24154.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24154.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24154", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:19.620", - "lastModified": "2025-03-03T22:51:48.667", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T20:15:25.680", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,19 +36,49 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-757" + } + ] } ], "configurations": [ diff --git a/CVE-2025/CVE-2025-241xx/CVE-2025-24163.json b/CVE-2025/CVE-2025-241xx/CVE-2025-24163.json index 997b6fed276..fdb350f6867 100644 --- a/CVE-2025/CVE-2025-241xx/CVE-2025-24163.json +++ b/CVE-2025/CVE-2025-241xx/CVE-2025-24163.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24163", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:20.267", - "lastModified": "2025-03-03T22:48:32.503", - "vulnStatus": "Analyzed", + "lastModified": "2025-03-18T20:15:25.850", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24799.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24799.json new file mode 100644 index 00000000000..4e9e37ec307 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24799.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24799", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-18T19:15:48.927", + "lastModified": "2025-03-18T19:15:48.927", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GLPI is a free asset and IT management software package. An unauthenticated user can perform a SQL injection through the inventory endpoint. This vulnerability is fixed in 10.0.18." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-jv89-g7f7-jwfg", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24801.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24801.json new file mode 100644 index 00000000000..c2727278874 --- /dev/null +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24801.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24801", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-18T19:15:49.110", + "lastModified": "2025-03-18T19:15:49.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GLPI is a free asset and IT management software package. An authenticated user can upload and force the execution of *.php files located on the GLPI server. This vulnerability is fixed in 10.0.18." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-g2p3-33ff-r555", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25040.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25040.json new file mode 100644 index 00000000000..3b7b192839b --- /dev/null +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25040.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-25040", + "sourceIdentifier": "security-alert@hpe.com", + "published": "2025-03-18T19:15:49.290", + "lastModified": "2025-03-18T20:15:26.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in the port ACL functionality of AOS-CX software running on the HPE Aruba Networking CX 9300 Switch Series only and affects: \n\n - AOS-CX 10.14.xxxx : All patches\n - AOS-CX 10.15.xxxx : 10.15.1000 and below \nThe vulnerability is specific to traffic originated by the CX 9300 switch platform and could allow an attacker to bypass ACL rules applied to routed ports on egress. As a result, port ACLs are not correctly enforced, which could lead to unauthorized traffic flow and violations of security policies. Egress VLAN ACLs and Routed VLAN ACLs are not affected by this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04818en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25042.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25042.json new file mode 100644 index 00000000000..3211a3ee235 --- /dev/null +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25042.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-25042", + "sourceIdentifier": "security-alert@hpe.com", + "published": "2025-03-18T19:15:49.447", + "lastModified": "2025-03-18T20:15:26.177", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the AOS-CX REST interface could allow an authenticated remote attacker with low privileges to view sensitive information. Successful exploitation could allow an attacker to read encrypted credentials of other users on the switch, potentially leading to further unauthorized access or data breaches." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-359" + } + ] + } + ], + "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04818en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-264xx/CVE-2025-26410.json b/CVE-2025/CVE-2025-264xx/CVE-2025-26410.json index 8d6f05c0fdf..ced41b8d3ed 100644 --- a/CVE-2025/CVE-2025-264xx/CVE-2025-26410.json +++ b/CVE-2025/CVE-2025-264xx/CVE-2025-26410.json @@ -2,7 +2,7 @@ "id": "CVE-2025-26410", "sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf", "published": "2025-02-11T10:15:09.863", - "lastModified": "2025-02-18T18:15:36.357", + "lastModified": "2025-03-18T19:15:50.450", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El firmware de todos los dispositivos Wattsense Bridge contiene las mismas credenciales de usuario y ra\u00edz codificadas. La contrase\u00f1a de usuario se puede recuperar f\u00e1cilmente mediante intentos de descifrado de contrase\u00f1as. Las credenciales recuperadas se pueden utilizar para iniciar sesi\u00f3n en el dispositivo a trav\u00e9s del shell de inicio de sesi\u00f3n que est\u00e1 expuesto por la interfaz serial. El usuario de puerta trasera se ha eliminado en el firmware BSP >= 6.4.1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "551230f0-3615-47bd-b7cc-93e92e730bbf", diff --git a/CVE-2025/CVE-2025-270xx/CVE-2025-27080.json b/CVE-2025/CVE-2025-270xx/CVE-2025-27080.json new file mode 100644 index 00000000000..c97b0c2f6bf --- /dev/null +++ b/CVE-2025/CVE-2025-270xx/CVE-2025-27080.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-27080", + "sourceIdentifier": "security-alert@hpe.com", + "published": "2025-03-18T19:15:50.680", + "lastModified": "2025-03-18T20:15:26.300", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vulnerabilities in the command line interface of AOS-CX could allow an authenticated remote attacker to expose sensitive information. Successful exploitation could allow an attacker to gain unauthorized access to services outside of the impacted switch, potentially leading to lateral movement involving those services." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.5, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-359" + } + ] + } + ], + "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04818en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28867.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28867.json index 5f00d15c951..a740696be1b 100644 --- a/CVE-2025/CVE-2025-288xx/CVE-2025-28867.json +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28867.json @@ -2,8 +2,8 @@ "id": "CVE-2025-28867", "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-11T21:15:44.127", - "lastModified": "2025-03-11T21:15:44.127", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-18T20:43:40.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:stesvis:frontpage_category_filter:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.2", + "matchCriteriaId": "E16BEC3A-7F3E-4CC9-8EFB-631A03129D95" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/frontpage-category-filter/vulnerability/wordpress-frontpage-category-filter-plugin-1-0-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-288xx/CVE-2025-28870.json b/CVE-2025/CVE-2025-288xx/CVE-2025-28870.json index 36a42851e7a..2c19cbd9cad 100644 --- a/CVE-2025/CVE-2025-288xx/CVE-2025-28870.json +++ b/CVE-2025/CVE-2025-288xx/CVE-2025-28870.json @@ -2,8 +2,8 @@ "id": "CVE-2025-28870", "sourceIdentifier": "audit@patchstack.com", "published": "2025-03-11T21:15:44.440", - "lastModified": "2025-03-11T21:15:44.440", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-03-18T20:29:41.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amocrm:amocrm:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.1", + "matchCriteriaId": "EDF7DA30-ED7C-4CDA-9DEA-73D7CE16D894" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/amocrm-webform/vulnerability/wordpress-amocrm-webform-plugin-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-297xx/CVE-2025-29790.json b/CVE-2025/CVE-2025-297xx/CVE-2025-29790.json new file mode 100644 index 00000000000..efa8ce02324 --- /dev/null +++ b/CVE-2025/CVE-2025-297xx/CVE-2025-29790.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-29790", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-18T19:15:50.813", + "lastModified": "2025-03-18T19:15:50.813", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Contao is an Open Source CMS. Users can upload SVG files with malicious code, which is then executed in the back end and/or front end. This vulnerability is fixed in Contao 4.13.54, 5.3.30, or 5.5.6." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "ACTIVE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "LOW", + "subIntegrityImpact": "LOW", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://contao.org/en/security-advisories/cross-site-scripting-through-svg-uploads", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/contao/contao/security/advisories/GHSA-vqqr-fgmh-f626", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29907.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29907.json new file mode 100644 index 00000000000..a550a64326c --- /dev/null +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29907.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-29907", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-18T19:15:51.197", + "lastModified": "2025-03-18T19:15:51.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "jsPDF is a library to generate PDFs in JavaScript. Prior to 3.0.1, user control of the first argument of the addImage method results in CPU utilization and denial of service. If given the possibility to pass unsanitised image urls to the addImage method, a user can provide a harmful data-url that results in high CPU utilization and denial of service. Other affected methods are html and addSvgAsImage. The vulnerability was fixed in jsPDF 3.0.1." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "NONE", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + }, + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/parallax/jsPDF/commit/b167c43c27c466eb914b927885b06073708338df", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/parallax/jsPDF/security/advisories/GHSA-w532-jxjh-hjhj", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-299xx/CVE-2025-29930.json b/CVE-2025/CVE-2025-299xx/CVE-2025-29930.json new file mode 100644 index 00000000000..d97185c9cbc --- /dev/null +++ b/CVE-2025/CVE-2025-299xx/CVE-2025-29930.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-29930", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-03-18T19:15:51.340", + "lastModified": "2025-03-18T19:15:51.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "imFAQ is an advanced questions and answers management system for ImpressCMS. Prior to 1.0.1, if the $_GET['seoOp'] parameter is manipulated to include malicious input (e.g., seoOp=php://filter/read=convert.base64-encode/resource=/var/www/html/config.php), the application could allow an attacker to read sensitive files on the server (Local File Inclusion, LFI). The $_GET['seoOp'] and $_GET['seoArg'] parameters are directly used without sanitization or validation. This is partly mitigated by the fact that the ImpressCMS sensitive files are stored outside the web root, in a folder with a randomized name. The issue has been resolved in imFaq 1.0.1." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ImpressModules/imfaq/commit/63dedd30a8f196db7b340740adf667a39c26a4ac", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/ImpressModules/imfaq/security/advisories/GHSA-vrr3-54vc-vwg3", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30137.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30137.json new file mode 100644 index 00000000000..4f4c02b88ef --- /dev/null +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30137.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-30137", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T20:15:26.407", + "lastModified": "2025-03-18T20:15:26.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in the G-Net GNET APK 2.6.2. Hardcoded credentials exist in in APK for ports 9091 and 9092. The GNET mobile application contains hardcoded credentials that provide unauthorized access to the dashcam's API endpoints on ports 9091 and 9092. Once the GNET SSID is connected to, the attacker sends a crafted authentication command with TibetList and 000000 to list settings of the dashcam at port 9091. There's a separate set of credentials for port 9092 (stream) that is also exposed in cleartext: admin + tibet. For settings, the required credentials are adim + 000000." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/geo-chen/GNET", + "source": "cve@mitre.org" + }, + { + "url": "https://www.gnetsystem.com/eng/product/list?viewMode=view&idx=246&ca_id=0201", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30138.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30138.json new file mode 100644 index 00000000000..dfef4561f85 --- /dev/null +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30138.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-30138", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T20:15:26.507", + "lastModified": "2025-03-18T20:15:26.507", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on G-Net Dashcam BB GONX devices. Managing Settings and Obtaining Sensitive Data and Sabotaging Car Battery can be performed by unauthorized persons. It allows unauthorized users to modify critical system settings once connected to its network. Attackers can extract sensitive car and driver information, mute dashcam alerts to prevent detection, disable recording functionality, or even factory reset the device. Additionally, they can disable battery protection, causing the dashcam to drain the car battery when left on overnight. These actions not only compromise privacy but also pose potential physical harm by rendering the dashcam non-functional or causing vehicle battery failure." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/geo-chen/GNET", + "source": "cve@mitre.org" + }, + { + "url": "https://www.gnetsystem.com/eng/product/list?viewMode=view&idx=246&ca_id=0201", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30139.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30139.json new file mode 100644 index 00000000000..315d44aef8c --- /dev/null +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30139.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-30139", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T20:15:26.597", + "lastModified": "2025-03-18T20:15:26.597", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on G-Net Dashcam BB GONX devices. Default credentials for SSID cannot be changed. It broadcasts a fixed SSID with default credentials that cannot be changed. This allows any nearby attacker to connect to the dashcam's network without restriction. Once connected, an attacker can sniff on connected devices such as the user's smartphone. The SSID is also always broadcasted." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/geo-chen/GNET", + "source": "cve@mitre.org" + }, + { + "url": "https://www.gnetsystem.com/eng/product/list?viewMode=view&idx=246&ca_id=0201", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30141.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30141.json new file mode 100644 index 00000000000..53ee1af4c05 --- /dev/null +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30141.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-30141", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T20:15:26.693", + "lastModified": "2025-03-18T20:15:26.693", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on G-Net Dashcam BB GONX devices. One can Remotely Dump Video Footage and the Live Video Stream. It exposes API endpoints on ports 9091 and 9092 that allow remote access to recorded and live video feeds. An attacker who connects to the dashcam's network can retrieve all stored recordings and convert them from JDR format to MP4. Additionally, port 9092's RTSP stream can be accessed remotely, allowing real-time video feeds to be extracted without the owner's knowledge." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/geo-chen/GNET", + "source": "cve@mitre.org" + }, + { + "url": "https://www.gnetsystem.com/eng/product/list?viewMode=view&idx=246&ca_id=0201", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-301xx/CVE-2025-30142.json b/CVE-2025/CVE-2025-301xx/CVE-2025-30142.json new file mode 100644 index 00000000000..1133f95350c --- /dev/null +++ b/CVE-2025/CVE-2025-301xx/CVE-2025-30142.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-30142", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-03-18T20:15:26.777", + "lastModified": "2025-03-18T20:15:26.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered on G-Net Dashcam BB GONX devices. Bypassing of Device Pairing can occur. It uses MAC address verification as the sole mechanism for recognizing paired devices, allowing attackers to bypass authentication. By capturing the MAC address of an already-paired device through ARP scanning or other means, an attacker can spoof the MAC address and connect to the dashcam without going through the pairing process. This enables full access to the device." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/geo-chen/GNET", + "source": "cve@mitre.org" + }, + { + "url": "https://www.gnetsystem.com/eng/product/list?viewMode=view&idx=246&ca_id=0201", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 11ab248a40c..1f0ba6890b5 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-18T19:00:20.831495+00:00 +2025-03-18T21:00:19.783526+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-18T18:53:16.010000+00:00 +2025-03-18T20:43:40.300000+00:00 ``` ### Last Data Feed Release @@ -33,50 +33,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -285623 +285637 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `14` -- [CVE-2024-56346](CVE-2024/CVE-2024-563xx/CVE-2024-56346.json) (`2025-03-18T17:15:44.173`) -- [CVE-2024-56347](CVE-2024/CVE-2024-563xx/CVE-2024-56347.json) (`2025-03-18T17:15:44.470`) -- [CVE-2025-2487](CVE-2025/CVE-2025-24xx/CVE-2025-2487.json) (`2025-03-18T17:15:48.883`) -- [CVE-2025-25595](CVE-2025/CVE-2025-255xx/CVE-2025-25595.json) (`2025-03-18T17:15:46.203`) -- [CVE-2025-26137](CVE-2025/CVE-2025-261xx/CVE-2025-26137.json) (`2025-03-18T17:15:46.503`) -- [CVE-2025-26138](CVE-2025/CVE-2025-261xx/CVE-2025-26138.json) (`2025-03-18T17:15:46.670`) +- [CVE-2025-21619](CVE-2025/CVE-2025-216xx/CVE-2025-21619.json) (`2025-03-18T19:15:47.997`) +- [CVE-2025-24799](CVE-2025/CVE-2025-247xx/CVE-2025-24799.json) (`2025-03-18T19:15:48.927`) +- [CVE-2025-24801](CVE-2025/CVE-2025-248xx/CVE-2025-24801.json) (`2025-03-18T19:15:49.110`) +- [CVE-2025-25040](CVE-2025/CVE-2025-250xx/CVE-2025-25040.json) (`2025-03-18T19:15:49.290`) +- [CVE-2025-25042](CVE-2025/CVE-2025-250xx/CVE-2025-25042.json) (`2025-03-18T19:15:49.447`) +- [CVE-2025-27080](CVE-2025/CVE-2025-270xx/CVE-2025-27080.json) (`2025-03-18T19:15:50.680`) +- [CVE-2025-29790](CVE-2025/CVE-2025-297xx/CVE-2025-29790.json) (`2025-03-18T19:15:50.813`) +- [CVE-2025-29907](CVE-2025/CVE-2025-299xx/CVE-2025-29907.json) (`2025-03-18T19:15:51.197`) +- [CVE-2025-29930](CVE-2025/CVE-2025-299xx/CVE-2025-29930.json) (`2025-03-18T19:15:51.340`) +- [CVE-2025-30137](CVE-2025/CVE-2025-301xx/CVE-2025-30137.json) (`2025-03-18T20:15:26.407`) +- [CVE-2025-30138](CVE-2025/CVE-2025-301xx/CVE-2025-30138.json) (`2025-03-18T20:15:26.507`) +- [CVE-2025-30139](CVE-2025/CVE-2025-301xx/CVE-2025-30139.json) (`2025-03-18T20:15:26.597`) +- [CVE-2025-30141](CVE-2025/CVE-2025-301xx/CVE-2025-30141.json) (`2025-03-18T20:15:26.693`) +- [CVE-2025-30142](CVE-2025/CVE-2025-301xx/CVE-2025-30142.json) (`2025-03-18T20:15:26.777`) ### CVEs modified in the last Commit -Recently modified CVEs: `70` +Recently modified CVEs: `149` -- [CVE-2024-36426](CVE-2024/CVE-2024-364xx/CVE-2024-36426.json) (`2025-03-18T18:15:26.930`) -- [CVE-2024-41256](CVE-2024/CVE-2024-412xx/CVE-2024-41256.json) (`2025-03-18T18:15:27.097`) -- [CVE-2024-44128](CVE-2024/CVE-2024-441xx/CVE-2024-44128.json) (`2025-03-18T18:15:27.323`) -- [CVE-2024-44129](CVE-2024/CVE-2024-441xx/CVE-2024-44129.json) (`2025-03-18T18:15:27.523`) -- [CVE-2024-46259](CVE-2024/CVE-2024-462xx/CVE-2024-46259.json) (`2025-03-18T17:15:42.877`) -- [CVE-2024-46559](CVE-2024/CVE-2024-465xx/CVE-2024-46559.json) (`2025-03-18T17:15:43.193`) -- [CVE-2024-48761](CVE-2024/CVE-2024-487xx/CVE-2024-48761.json) (`2025-03-18T17:15:43.510`) -- [CVE-2024-54539](CVE-2024/CVE-2024-545xx/CVE-2024-54539.json) (`2025-03-18T18:15:27.703`) -- [CVE-2024-57035](CVE-2024/CVE-2024-570xx/CVE-2024-57035.json) (`2025-03-18T18:15:27.960`) -- [CVE-2024-57480](CVE-2024/CVE-2024-574xx/CVE-2024-57480.json) (`2025-03-18T18:15:28.130`) -- [CVE-2024-8927](CVE-2024/CVE-2024-89xx/CVE-2024-8927.json) (`2025-03-18T17:15:44.707`) -- [CVE-2025-0526](CVE-2025/CVE-2025-05xx/CVE-2025-0526.json) (`2025-03-18T18:15:28.290`) -- [CVE-2025-0665](CVE-2025/CVE-2025-06xx/CVE-2025-0665.json) (`2025-03-18T18:15:28.427`) -- [CVE-2025-1635](CVE-2025/CVE-2025-16xx/CVE-2025-1635.json) (`2025-03-18T17:15:45.017`) -- [CVE-2025-1636](CVE-2025/CVE-2025-16xx/CVE-2025-1636.json) (`2025-03-18T17:15:45.263`) -- [CVE-2025-2277](CVE-2025/CVE-2025-22xx/CVE-2025-2277.json) (`2025-03-18T17:15:47.460`) -- [CVE-2025-2278](CVE-2025/CVE-2025-22xx/CVE-2025-2278.json) (`2025-03-18T17:15:47.670`) -- [CVE-2025-2280](CVE-2025/CVE-2025-22xx/CVE-2025-2280.json) (`2025-03-18T17:15:47.873`) -- [CVE-2025-22870](CVE-2025/CVE-2025-228xx/CVE-2025-22870.json) (`2025-03-18T17:15:45.467`) -- [CVE-2025-23006](CVE-2025/CVE-2025-230xx/CVE-2025-23006.json) (`2025-03-18T18:15:28.613`) -- [CVE-2025-24813](CVE-2025/CVE-2025-248xx/CVE-2025-24813.json) (`2025-03-18T17:19:03.810`) -- [CVE-2025-25192](CVE-2025/CVE-2025-251xx/CVE-2025-25192.json) (`2025-03-18T17:15:45.720`) -- [CVE-2025-25225](CVE-2025/CVE-2025-252xx/CVE-2025-25225.json) (`2025-03-18T17:15:45.920`) -- [CVE-2025-25625](CVE-2025/CVE-2025-256xx/CVE-2025-25625.json) (`2025-03-18T17:15:46.357`) -- [CVE-2025-29029](CVE-2025/CVE-2025-290xx/CVE-2025-29029.json) (`2025-03-18T18:15:28.817`) +- [CVE-2024-54478](CVE-2024/CVE-2024-544xx/CVE-2024-54478.json) (`2025-03-18T20:15:24.467`) +- [CVE-2024-57019](CVE-2024/CVE-2024-570xx/CVE-2024-57019.json) (`2025-03-18T20:15:24.637`) +- [CVE-2024-57020](CVE-2024/CVE-2024-570xx/CVE-2024-57020.json) (`2025-03-18T19:15:46.330`) +- [CVE-2024-57098](CVE-2024/CVE-2024-570xx/CVE-2024-57098.json) (`2025-03-18T19:15:46.517`) +- [CVE-2024-57433](CVE-2024/CVE-2024-574xx/CVE-2024-57433.json) (`2025-03-18T19:15:46.680`) +- [CVE-2024-57580](CVE-2024/CVE-2024-575xx/CVE-2024-57580.json) (`2025-03-18T19:15:46.850`) +- [CVE-2024-57581](CVE-2024/CVE-2024-575xx/CVE-2024-57581.json) (`2025-03-18T19:15:47.037`) +- [CVE-2024-57655](CVE-2024/CVE-2024-576xx/CVE-2024-57655.json) (`2025-03-18T19:15:47.213`) +- [CVE-2024-57721](CVE-2024/CVE-2024-577xx/CVE-2024-57721.json) (`2025-03-18T20:15:24.810`) +- [CVE-2024-7527](CVE-2024/CVE-2024-75xx/CVE-2024-7527.json) (`2025-03-18T19:15:47.403`) +- [CVE-2024-7713](CVE-2024/CVE-2024-77xx/CVE-2024-7713.json) (`2025-03-18T20:15:24.980`) +- [CVE-2024-9398](CVE-2024/CVE-2024-93xx/CVE-2024-9398.json) (`2025-03-18T20:15:25.150`) +- [CVE-2025-0436](CVE-2025/CVE-2025-04xx/CVE-2025-0436.json) (`2025-03-18T20:15:25.330`) +- [CVE-2025-20633](CVE-2025/CVE-2025-206xx/CVE-2025-20633.json) (`2025-03-18T19:15:47.673`) +- [CVE-2025-21532](CVE-2025/CVE-2025-215xx/CVE-2025-21532.json) (`2025-03-18T20:15:25.563`) +- [CVE-2025-21547](CVE-2025/CVE-2025-215xx/CVE-2025-21547.json) (`2025-03-18T19:15:47.860`) +- [CVE-2025-22918](CVE-2025/CVE-2025-229xx/CVE-2025-22918.json) (`2025-03-18T19:15:48.183`) +- [CVE-2025-24115](CVE-2025/CVE-2025-241xx/CVE-2025-24115.json) (`2025-03-18T19:15:48.330`) +- [CVE-2025-24130](CVE-2025/CVE-2025-241xx/CVE-2025-24130.json) (`2025-03-18T19:15:48.507`) +- [CVE-2025-24146](CVE-2025/CVE-2025-241xx/CVE-2025-24146.json) (`2025-03-18T19:15:48.683`) +- [CVE-2025-24154](CVE-2025/CVE-2025-241xx/CVE-2025-24154.json) (`2025-03-18T20:15:25.680`) +- [CVE-2025-24163](CVE-2025/CVE-2025-241xx/CVE-2025-24163.json) (`2025-03-18T20:15:25.850`) +- [CVE-2025-26410](CVE-2025/CVE-2025-264xx/CVE-2025-26410.json) (`2025-03-18T19:15:50.450`) +- [CVE-2025-28867](CVE-2025/CVE-2025-288xx/CVE-2025-28867.json) (`2025-03-18T20:43:40.300`) +- [CVE-2025-28870](CVE-2025/CVE-2025-288xx/CVE-2025-28870.json) (`2025-03-18T20:29:41.383`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 7e89767ea4a..4281a5dadaf 100644 --- a/_state.csv +++ b/_state.csv @@ -100816,7 +100816,7 @@ CVE-2017-17502,0,0,9d6178d2326dbe0fb7ca52003642e043176d75a034ba60db590692cd114e4 CVE-2017-17503,0,0,bc18f9ea3ac4f445a3a75449d737c0869cd50cc09578ba7de90e6446f5d40c47,2024-11-21T03:18:02.700000 CVE-2017-17504,0,0,e562b0a9a0d4b22cdc494407caa988fcc0c007efbcc65cfc3553afd856fa378f,2024-11-21T03:18:02.867000 CVE-2017-17505,0,0,5841bda8a6f9fab40c0f2d0bd6a5bcc4dc1cc865eb6a8e74c101f3606bfcdfe5,2024-11-21T03:18:03.033000 -CVE-2017-17506,0,0,5040425423d3548767ef0e37308119ca0f12a4cde1e48ee0b8abc46aba4dbe0c,2024-11-21T03:18:03.183000 +CVE-2017-17506,0,1,e975b16c8a8b5ffe9d1cbefd56fae5681817681b15b52ca314ff18a2d965ea47,2025-03-18T20:25:10.330000 CVE-2017-17507,0,0,f6df9bd676ac175669a0df71c5181f6f12db17c1152a4f7946742daafb6c5431,2024-11-21T03:18:03.323000 CVE-2017-17508,0,0,f4d8a99aa8b9762104b0bc887f936640868efb9e0266f07e17ba5e21661ddb65,2024-11-21T03:18:03.463000 CVE-2017-17509,0,0,1967f53956d10491c513dc5bcace416fbdb7a3cafef46f8dc0c41a4831d641df,2024-11-21T03:18:03.647000 @@ -114752,7 +114752,7 @@ CVE-2018-1387,0,0,1a656fa74ea913b89950e218c2d958efedfeac8ae5b9a357b1bae7adc2a505 CVE-2018-13870,0,0,6ce24e14b064237dc85acd8c465e42d1c139ac48418d8046ca0515a936bde035,2024-11-21T03:48:13.567000 CVE-2018-13871,0,0,59a43bca4b3eb0b3806e5352314434c221bfc7915ef4ddef412654a6aeb07b19,2024-11-21T03:48:13.710000 CVE-2018-13872,0,0,7a51111a48e59071e8cb424aab95ea6d447e54cc293af12bd6b7a8d90637746a,2024-11-21T03:48:13.863000 -CVE-2018-13873,0,0,f541b043d5a7c3de19effaffa82a5328dc8718fd7cc292b976245adf0d60e8b9,2024-11-21T03:48:14.007000 +CVE-2018-13873,0,1,ee5645e473215368bb3703aaf0d7bd74bb73c691d30033f47108f0e58fb080d9,2025-03-18T20:24:50.670000 CVE-2018-13874,0,0,3ee208a5f3d89ed3d83fa0ddbb967cf021ccb99022c9ecd3d0686e6ad270bbe0,2024-11-21T03:48:14.153000 CVE-2018-13875,0,0,da357a103ef1e637a1d43ca39b4500067638bb3172a47ab09c7913463dc470f4,2024-11-21T03:48:14.297000 CVE-2018-13876,0,0,a0b6dbe35ff5e9ce2f533bc912c03a36b67d87f8b0acd566b4371dfe1f956fc0,2024-11-21T03:48:14.437000 @@ -114897,7 +114897,7 @@ CVE-2018-14010,0,0,bd554e2f62088531bd8a647518b350339a0d7a3ecb1bfec16670581662ecb CVE-2018-14012,0,0,21cfacf77d9a0d48ac2164060c64c0768ec75fa7df7d4fc72c88d0eb692051c1,2024-11-21T03:48:26.657000 CVE-2018-14013,0,0,47f24aa747512d146b5a1b40aa2bb41216b135601afb1aa1796ad9888b408937,2024-11-21T03:48:26.807000 CVE-2018-14014,0,0,974f5fd347dbe2d342c7cfc95b81d58433731e989988b13405768d3203fcc9c5,2024-11-21T03:48:26.970000 -CVE-2018-14015,0,0,f70b1d24a3f0ccf14c38fb742945e3c780643e24e8892cedcc63ae4c2f296dbf,2024-11-21T03:48:27.123000 +CVE-2018-14015,0,1,192821951048cc531b5adb558e35cfdbed85e682f8c87f49748da8012f676fb2,2025-03-18T20:25:23.660000 CVE-2018-14016,0,0,273c106f98022f18d7a692376b02dfb2edce9edec0ed10333a84baebcee7b54d,2024-11-21T03:48:27.270000 CVE-2018-14017,0,0,2e353b433719858fa0b7a957660cef1b7a586f5f33b4e935df9b54c7158d1a12,2024-11-21T03:48:27.423000 CVE-2018-14020,0,0,bd21c077f59316d9956f4ff59b5b4a07d6f1d5c2e83eac735f2622e2be31e8a9,2024-11-21T03:48:27.577000 @@ -134461,7 +134461,7 @@ CVE-2019-1660,0,0,ef994d20a1dc70ae7ea78faf670052d70d8a3d80f1e10d058942cf6f4ef07e CVE-2019-1661,0,0,8856120d96e32172e71a36204ebdcd07fe42c557bb89fe1f3544c755107a2161,2024-11-21T04:37:02.400000 CVE-2019-1662,0,0,a52164da59f6918e2a18751518cf7c2abc0dd3152ea8331d99f9739fd6f7f41a,2024-11-21T04:37:02.537000 CVE-2019-1663,0,0,858182e694bb1c6fa350a7299f64b90ea7b008a5edffac5e8e0ecf5c81a305c3,2024-11-21T04:37:02.680000 -CVE-2019-16638,0,0,3797d6a3cea8623d5d2aace426c14a79b68b81fa4668cfbacc6cb62515828345,2024-11-21T04:30:51.497000 +CVE-2019-16638,0,1,ea18a41432e27cc05a45ed97b4d86a5d1975f9b7ea3ea2eb4793c7f44fd0b555,2025-03-18T20:15:16.020000 CVE-2019-16639,0,0,2ea5e4f9b64c86b85952eda9eb2f66346e5abd2b25a1ba8688058dec5e5f76e6,2024-11-21T04:30:51.677000 CVE-2019-1664,0,0,ea1f41e02e9700a19837e4ce1e3b4122fc7b7bb1dcbbdda5af10155b7e87b4a3,2024-11-21T04:37:02.840000 CVE-2019-16640,0,0,dc41c5c5a11878d8b9fa7842e9185364645c72389f27f988fa3f9b7f37c49a76,2024-11-21T04:30:51.883000 @@ -151195,7 +151195,7 @@ CVE-2020-16292,0,0,7a601c2d8cac81f5f64da0942c11dda7fd07665897264f7a9660a4aec99ee CVE-2020-16293,0,0,8bf4d6b7b3cd01d4d68ec7cdc6c807e18da7791704bce6aa13c5b369543816c0,2024-11-21T05:07:06.963000 CVE-2020-16294,0,0,730ad86bc9f044428f72830dbd6577c72f23e23613e4f836d84d893142d6a39f,2024-11-21T05:07:07.123000 CVE-2020-16295,0,0,277b0569456b5ee990a95a66ef959372dc8bd258ef48635800915a1285c4c997,2024-11-21T05:07:07.280000 -CVE-2020-16296,0,0,16ce964ec3ad178950659680ce17d2559b452c257c07c4bfdbe1c5f34f293ac9,2024-11-21T05:07:07.440000 +CVE-2020-16296,0,1,17efa44480d258406e4046aa926dfabc6caa7f8061e4e0bedf1d4e16b5c004e3,2025-03-18T20:25:57.440000 CVE-2020-16297,0,0,447ecba1abd31f209d4288ac7a5d6cf6229e0fc7196e6d4d8a66bebfdf897c41,2025-03-14T18:27:17.997000 CVE-2020-16298,0,0,7fb0cec13cbdba3c8a7cb7650986cc836cdc89f6d665f07282e2b62746258cb9,2024-11-21T05:07:07.773000 CVE-2020-16299,0,0,494bec4da61991784c1f8f627af330c2c2c4729e77aed4a9a1c41485a049eb90,2024-11-21T05:07:07.940000 @@ -151988,7 +151988,7 @@ CVE-2020-17534,0,0,6eb487ddb312db2f69f8ebdfc9a76b0572648245213340f9c9fcf4da10a47 CVE-2020-17535,0,0,76173fce53c1045df851cdb4cbde8ff77bf69e568756911616608b094001a76a,2023-11-07T03:19:14.017000 CVE-2020-17536,0,0,a2b6f8c29648cdc4a5f916c25a5eee2375907f0fca6b6ed4d8f65e8082dc7091,2023-11-07T03:19:14.287000 CVE-2020-17537,0,0,c6c5ccac5bdbdf12d18b76abe490ff4bac6abeeb88728d464fce28e824a59adb,2023-11-07T03:19:14.530000 -CVE-2020-17538,0,0,92081badbba6e7102cd73b464e68b3d746e594b3a182663423159e8bc24c2448,2024-11-21T05:08:19.363000 +CVE-2020-17538,0,1,33240612c21f11f49ef2f6a413bc3dd80dce421684587fe8b5d5318b5eb698f9,2025-03-18T20:26:51.890000 CVE-2020-1754,0,0,54dbc6c18bf1195fabc12972d3e35ffa1a80561d02c63a1976bf0b73427aacf0,2024-11-21T05:11:18.953000 CVE-2020-17541,0,0,fcb939fb6710a780f7d93308fa67dc87cf266d6d51b2c5c3eec77dbdde6ff295,2024-11-21T05:08:19.537000 CVE-2020-17542,0,0,632bfe4fce157e60853473258699ca0fd660da938d0c74267704a08b75dd17d4,2024-11-21T05:08:19.703000 @@ -176339,7 +176339,7 @@ CVE-2021-32159,0,0,52a6f7b30f47b37d7f67df29da1b03828b095018df7c9011db947b64b33b1 CVE-2021-32160,0,0,d6f91743b02f62c22d30130da046b23e2195ae9f3e08d1369aefe5013ed5d10d,2024-11-21T06:06:53.277000 CVE-2021-32161,0,0,ab3d51edd2d465820acef839e090067bd86287475419c045e4b4e1515fb06514,2024-11-21T06:06:53.413000 CVE-2021-32162,0,0,97a60e194f1ac938da750b343cd2533b7ce3bd7490be3b4effc958a81d5dad5c,2024-11-21T06:06:53.547000 -CVE-2021-32163,0,0,574d475a930c70f0e0c90f10807075494f56829bdc02c29364fe4402fae6d4bc,2024-11-21T06:06:53.683000 +CVE-2021-32163,0,1,678e87341ad74c71222a497f0b0b7e96036bab379080ce5a9cabfae066946399,2025-03-18T20:15:16.247000 CVE-2021-32172,0,0,f5385016848d0c6a823c690a647788761911f61a0ca345caf4f2ecdd6cf548f2,2024-11-21T06:06:53.823000 CVE-2021-32198,0,0,05ff4d362205bad61cd17ef1abd83a0f6b35dd9aaa3cf1ab037656c2326ea013,2024-11-21T06:06:53.980000 CVE-2021-32202,0,0,e540188ece82bf650d441e4186899ad323288dedea6e4a8c9574073055539e17,2024-11-21T06:06:54.120000 @@ -176390,7 +176390,7 @@ CVE-2021-32399,0,0,db159d6885d19b2e43865931737efbad828185f3031c36038324732ddb3fa CVE-2021-32402,0,0,d4e74057d74a21c9788d7c66bc0a73c9f344a9e89e9be574bcac7f8e7d30b4e0,2024-11-21T06:06:59.810000 CVE-2021-32403,0,0,f840fc64fcfb816e2f09f7cae19752fe98865ae12fb8e5ebb5571d8443cef885,2024-11-21T06:06:59.950000 CVE-2021-32415,0,0,6850bf86b7819adace455e2861880a0b7deee776aa2a5a9a282273d567f63bea,2024-11-21T06:07:00.093000 -CVE-2021-32419,0,0,324e5fe6e42e1ea06e33fd2b92661799e765d91739bb9aa48877c51f7b8e2bcc,2024-11-21T06:07:00.247000 +CVE-2021-32419,0,1,4e92804a2819bdd492360480a8535d2f8b1ce9dfe501c49b1413ece57d754cc9,2025-03-18T20:15:16.413000 CVE-2021-3242,0,0,76383404096a0949c91eebe2b1c4daa6ebd1fa854c07a3dc74708e5c0441f394,2024-11-21T06:21:09.510000 CVE-2021-32420,0,0,a7575ea9d2d43abaa95602199279c58d392c8615af2adefe771964be7b6f6555,2024-11-21T06:07:00.390000 CVE-2021-32421,0,0,cda072ff26b5f38693b2bfc48816ecdd856c063a6fa5edf96546e5b7e375a152,2024-11-21T06:07:00.547000 @@ -177178,7 +177178,7 @@ CVE-2021-33220,0,0,a86035ba652a33a3ddede37455f61edc151503af3e6096cf1c2452386d9dd CVE-2021-33221,0,0,dc94b8cd0446bf51fc9d77e59119618065f216969148668b430ac1ab69270e9b,2024-11-21T06:08:33.120000 CVE-2021-33223,0,0,ac58865458f50e91dcd3d776b9d55b8cb1043e19d97d9092f5d74b3b02371b76,2024-11-21T06:08:33.287000 CVE-2021-33224,0,0,826b27bad8cc1fb494de0596dec556e5f7cc2dd77f99db868866aa9c8a3885ed,2024-11-21T06:08:33.453000 -CVE-2021-33226,0,0,1d55161de4bcb6e6ce78e1f7d010c8f05fc276fac4837b963051d970e15fbbdc,2024-11-21T06:08:33.643000 +CVE-2021-33226,0,1,58f8ca2f09282b1a5d01ef4dfbb7b3c1d81e69f61e355a13dcf1778f125d8fb0,2025-03-18T19:15:38.633000 CVE-2021-3323,0,0,01ca3c5fbe7ca16c4465b14334517461bc911068663a8f6692bf9b9d47c5b294,2024-11-21T06:21:17.553000 CVE-2021-33231,0,0,d11e7bab303302b584f6d6c72a3a6093195fc89fef2e9d4b38a7cafa816d6f98,2024-11-21T06:08:33.817000 CVE-2021-33235,0,0,f6b88f5c8a66508b6ef156410be8f4674fb46775af3cda4ddf8ec3cb5c7e2fdf,2024-05-06T22:15:08.107000 @@ -177261,7 +177261,7 @@ CVE-2021-33387,0,0,697b29ae5d4aaed3a7399c8646d581a402f16e09f0c0c42e99a4df2422132 CVE-2021-33388,0,0,c04249fd9c3857399a784d26d8f42f0a259c06bb0c638f91db5951b39859e6a4,2024-11-21T06:08:47.173000 CVE-2021-3339,0,0,b80da59fee86f2e40b3cd721122adc0d7f79eea63d6cabd06ed9ce562295dd00,2024-11-21T06:21:19.727000 CVE-2021-33390,0,0,9debe9cd8884108b647eb049f4fb7299548c130868eb233a25694100121854ca,2024-11-21T06:08:47.317000 -CVE-2021-33391,0,0,f58f03082dd58391ba25765fa556c017a90ea7199d583af2582eb183382f8bed,2024-11-21T06:08:47.487000 +CVE-2021-33391,0,1,f6b277d645b4fc48d0578a577390e64936b9f2b495f1308e66e32bd09d3dfe8d,2025-03-18T19:15:39.667000 CVE-2021-33393,0,0,2398a32e024043a67e8b4594658ebb58fb8ab1b6b1e4bdd1ce14c5cfd0d649cf,2024-11-21T06:08:47.673000 CVE-2021-33394,0,0,6587515c1ed1bbb42da475b143eaeb8fd140105c9052bee581eadc3f967a5950,2024-11-21T06:08:47.850000 CVE-2021-33396,0,0,c0b8e5cdb15aa941d2c15a75d37be1e32b85badb00a4d50490f5fcb8cab81c8a,2024-11-21T06:08:47.997000 @@ -177685,10 +177685,10 @@ CVE-2021-33930,0,0,ee993ea804082a531afbd0179ad976aef8c363012ce20194700ad3bfa5c93 CVE-2021-33938,0,0,588aa5883c71ef4aba5577ae4c9611cd352e37bad7416aeb1cfad6436289958e,2024-11-21T06:09:47.407000 CVE-2021-3394,0,0,00b881ced0ccfe619e0353e2213bdcdedaa769c4e2720cfc6805904a801b4490,2024-11-21T06:21:24.357000 CVE-2021-33945,0,0,0ce7afe93d67649471f24cdb163a6755ee11635df2d2f88c6992a661da6703c0,2024-11-21T06:09:47.557000 -CVE-2021-33948,0,0,5264b2a988b5a127a91621ec1c06de0df770650b0d9171fc8fc55e03610b2ab9,2024-11-21T06:09:47.800000 -CVE-2021-33949,0,0,de152858f848f38f3eb1fe858b1abd78eb41ecd725aaa8528f825e0426e5eac9,2024-11-21T06:09:47.950000 +CVE-2021-33948,0,1,5128df0fd4ae7e48bd8645b40b752f4223f95ae28703a2628ab278a18d2811ef,2025-03-18T19:15:39.840000 +CVE-2021-33949,0,1,d2d79d7484c3de384acb9724006901320c6d8a655a934ff80f89da980ddd5cc2,2025-03-18T19:15:40 CVE-2021-3395,0,0,530bc40971a9ab46eff78d9d9e312912779de37b7102dd3d0686b19073239a5c,2024-11-21T06:21:24.537000 -CVE-2021-33950,0,0,625aadac6bc5e342ced1e37d2aa3cf336e53a5ed339ec66078b8fd78ad7659dd,2024-11-21T06:09:48.117000 +CVE-2021-33950,0,1,d2ee920a1cc643c7fb92c5453fe8e200fb126c6c3d145884225e25452bc037c4,2025-03-18T19:15:40.160000 CVE-2021-33959,0,0,a622cbcde3dbe31fac69d4430135ce898b16a59f3c6955fce6dd91afbc9a5f8b,2024-11-21T06:09:48.277000 CVE-2021-3396,0,0,90698fa326d5fdd8e8dc54e1e7bcb6d1e581f1ba3ffca20d3b993bf72ccd11f7,2024-11-21T06:21:24.703000 CVE-2021-33961,0,0,9927d3d7c06766828cb94a032d3f024741359810fc41a936de207d05e198bd97,2024-11-21T06:09:48.443000 @@ -177706,7 +177706,7 @@ CVE-2021-33975,0,0,e11e23a06b0bd6a7cbf6a6b9ba00dd95692dc5a01e87a17dfdeac9e031a87 CVE-2021-3398,0,0,b391ffef680ab3d1905a68d8f8aecb236461bb9918cd6106beee89927d9b4de8,2024-11-21T06:21:24.870000 CVE-2021-33981,0,0,e1a376d67ed045fff4ddc87e8da805c3289fac28b1e753c252da3bf96e4082cf,2024-11-21T06:09:50.533000 CVE-2021-33982,0,0,73ee637a13a25d30906d76f31b7a03a5e635870553587c3bfe929fd8a9bffe1b,2024-11-21T06:09:50.697000 -CVE-2021-33983,0,1,c75eec87f40052eab17994187b68d49cc2858ebddcea0664cf067ec26cef4a12,2025-03-18T17:15:37.453000 +CVE-2021-33983,0,0,c75eec87f40052eab17994187b68d49cc2858ebddcea0664cf067ec26cef4a12,2025-03-18T17:15:37.453000 CVE-2021-33988,0,0,ce3c9c6f48e56f206e19cd2a9b5dbae1bd50fab614bff8dd1776afbf5810f801,2024-11-21T06:09:51.003000 CVE-2021-33990,0,0,773da22a36370000bc5f0fc6b1599ac31291d0a99dd96c73c33f0ba2543b5c6a,2024-11-21T06:09:51.160000 CVE-2021-3401,0,0,3aa53366493f7b3aea4e71e1a4c09fa23a347858fbe21d871ae9322e6c979595,2024-11-21T06:21:25.030000 @@ -177765,7 +177765,7 @@ CVE-2021-34148,0,0,e422491b834b6a5fffe2d955be0b563100346aeb5d8b49dffde0b1f49f495 CVE-2021-34149,0,0,22db992bdf031d613f3c643f0b77b51f6d971d22a6593d3f04e24a30b4924f06,2024-11-21T06:09:57.597000 CVE-2021-34150,0,0,d8c565ef7ae788c1eae2d03fdd799a2c634bcb9f0d10afe83bf8ba55ef4ed8d2,2024-11-21T06:09:57.763000 CVE-2021-3416,0,0,e8a9d78a49c6edafa9b2835f723f8f9d7f5778a828c2a8817ef0eff1b424a80c,2024-11-21T06:21:27.260000 -CVE-2021-34164,0,1,939ef4785a8431e4fbd343c1a39ff081ec62249106383ad2313055bf93c57d6f,2025-03-18T17:15:38.467000 +CVE-2021-34164,0,0,939ef4785a8431e4fbd343c1a39ff081ec62249106383ad2313055bf93c57d6f,2025-03-18T17:15:38.467000 CVE-2021-34165,0,0,1752d6e7d52dca950ea605367684ec714b67cab63390dbd5d07b63dffb642d5a,2024-11-21T06:09:58.087000 CVE-2021-34166,0,0,493c7f09ddc29082c810909efba1f3453b21f045e3787efee176875638edbf9d,2024-11-21T06:09:58.253000 CVE-2021-34167,0,0,d0aca37e7ad48509e35f643c4a35f09f813fa958adca30c3302c880506902b86,2025-03-12T16:15:16.717000 @@ -177775,7 +177775,7 @@ CVE-2021-34173,0,0,1a23192c557091fd8168f3a7a484f556bc53d29397f66d2a244f44941f372 CVE-2021-34174,0,0,8ab497096a2e29212a7765c2746254ab4e1cb4a4f344481a538b319689a42ab7,2024-11-21T06:09:58.917000 CVE-2021-3418,0,0,c2cffa0e77fb4e2318ff7aee5e7820f9fce0270aba524e373436ff553d52e5b0,2024-11-21T06:21:27.597000 CVE-2021-34181,0,0,9fc2be6207cab8c1cec944be99c604609591358aa9b8fb0312b60f73edc33ae0,2024-11-21T06:09:59.110000 -CVE-2021-34182,0,1,0d187599ca88e8430b464cb6cfac7f3b3f7b4ba58b0a3dded6ed263dcf91a228,2025-03-18T17:15:38.750000 +CVE-2021-34182,0,0,0d187599ca88e8430b464cb6cfac7f3b3f7b4ba58b0a3dded6ed263dcf91a228,2025-03-18T17:15:38.750000 CVE-2021-34183,0,0,c4cc2bbb317b84790280bb617f9d94293f00ebd2069c8be7a1e58c289039dc80,2023-11-07T03:35:56.957000 CVE-2021-34184,0,0,10feab407ffb64cdc225e1db7c72ade21929802fcaf86b7d4bbfdf416db0edae,2024-11-21T06:09:59.507000 CVE-2021-34185,0,0,c0cfc73c267d516cb65ceeb686bbb5b5f81ac621fac35545dfddafce94cb6c10,2024-11-21T06:09:59.670000 @@ -178741,7 +178741,7 @@ CVE-2021-35251,0,0,4f337b233ad2642e289a3f1ce704e0f92a26455a088003e60fc9ad40d2794 CVE-2021-35252,0,0,9bfffe96677f7ac4a608c029994765407c9b99dd2d703d171d3cf932677927b0,2024-11-21T06:12:09.607000 CVE-2021-35254,0,0,5f975ca47cea507ca1a26653bd8bcdf69d75a7ca2baa22e531e691b1b075cad4,2024-11-21T06:12:09.747000 CVE-2021-3526,0,0,52519e75f26c4028f7855cacb1cf095d1f6b136fd723e678e75067d00217a299,2023-11-07T03:38:04.737000 -CVE-2021-35261,0,1,44ac87e68344eb2f10cd5507a1b0fa33d895731b8913546f55e7b18b6f15efb4,2025-03-18T17:15:39.027000 +CVE-2021-35261,0,0,44ac87e68344eb2f10cd5507a1b0fa33d895731b8913546f55e7b18b6f15efb4,2025-03-18T17:15:39.027000 CVE-2021-35265,0,0,23908084cd6473029fcf0b7da6ccbf5e5416fe80aa382ade9ac816279c7d7c2f,2024-11-21T06:12:10.037000 CVE-2021-35266,0,0,9fba0dc34e2d931f28fe422c0e32060f61b4f5f4a7442591d2dfd409a03a1869,2024-11-21T06:12:10.197000 CVE-2021-35267,0,0,b7426b05893e270b3e3c62303e3c316f15cbd69f54fc893fd47aea570e29a97b,2024-11-21T06:12:10.370000 @@ -185705,7 +185705,7 @@ CVE-2021-44526,0,0,7ea3241da3c4b98a7ec39e7167eeb0e7907c4a19b0d89197fa337d186f61f CVE-2021-44527,0,0,7319922d1be00e495135202ffea66439e6defe836e4fe697b546a514590436aa,2024-11-21T06:31:09.933000 CVE-2021-44528,0,0,d1b06b895f167c9432839ddbbbf028b094b0f18def21b7f3343fa88e5359c944,2024-11-21T06:31:10.060000 CVE-2021-44529,0,0,00362fbfdfb2c479c3d67c3b473ffc976ea097fb37eb8b7b0725a03d668faf74,2025-03-13T19:55:19.903000 -CVE-2021-4453,0,1,9adebc7dd0b3663790464e983a4721fe643fd790da8152092d5d049e382d00df,2025-03-18T18:52:26.330000 +CVE-2021-4453,0,0,9adebc7dd0b3663790464e983a4721fe643fd790da8152092d5d049e382d00df,2025-03-18T18:52:26.330000 CVE-2021-44530,0,0,50dd50139f6db9cec4390a2fe08291ecb15c33442e808b321adfda099dd59322,2024-11-21T06:31:10.440000 CVE-2021-44531,0,0,e72c46aef544c16b9b7d45ce9edf39451e4c154a1afe49b24a4148b3cccb1819,2024-11-21T06:31:10.550000 CVE-2021-44532,0,0,24351336b904bc34f340cbe67f0e8f8f158ccb31b0ba4c0d06bec574c2e4c906,2024-11-21T06:31:10.750000 @@ -185932,7 +185932,7 @@ CVE-2021-44919,0,0,788b79fed034a4d3f1d0532769d4dd6885045302bd07587c6077026c89beb CVE-2021-44920,0,0,dc2b2699b4298ffa348a62401dab834273e0bb9c2e1d933188e305250a2785c0,2024-11-21T06:31:42.340000 CVE-2021-44921,0,0,590244b95a46f44314a0bcc2d6600720e488e94012788f2095b1e9275f1bc891,2024-11-21T06:31:42.477000 CVE-2021-44922,0,0,d4c18d957c47aaef13343d1f94f6be8f78d7fde19e73f363abb8c748212f0705,2024-11-21T06:31:42.613000 -CVE-2021-44923,0,0,1a2216621256f8d52bcc4b1abba203d56544f52f0d565bf84108419b52d036c5,2024-11-21T06:31:42.747000 +CVE-2021-44923,0,1,9669b1aad0476cd2911fd03090e4f65b771567c1acaa0ccd7452b1011c169d9b,2025-03-18T20:27:28.367000 CVE-2021-44924,0,0,d95360ea04ebc26cf69ca2d7b2411bd4c30c6c1aab3e9bd9a922c6d579e91d46,2024-11-21T06:31:42.877000 CVE-2021-44925,0,0,38ec5bfd4d14b12b57bad87f584da39d53dc3320c27c727e6ed0d4bc819e095f,2024-11-21T06:31:43.010000 CVE-2021-44926,0,0,2588aaf518e289e4ac1d53c745d7e8ffe0f83d9f33b07b5e2d4f9cbc2e64c3ca,2024-11-21T06:31:43.140000 @@ -187506,7 +187506,7 @@ CVE-2021-47212,0,0,6a45e3dd8ea67cd6bd96a1783c03eb0d0cb9dd577cd77e8c7f9bbd0ae288d CVE-2021-47213,0,0,245ac7a9225a365f5c662ae6caf0adb8cd59aebebb5b4d7c789ce306b6d785a3,2024-04-15T09:15:07.570000 CVE-2021-47214,0,0,0f59d9eb8ddd0de137bac6f9a3bbd8e6a9a2c091edb7603b11c134ce165d7562,2024-11-21T06:35:38.583000 CVE-2021-47215,0,0,cfdefaf9b029543f16aac32420ba933dec7095dbd6f0caf21f6b7dae971c2b10,2024-11-21T06:35:38.693000 -CVE-2021-47216,0,1,7b28f4a443e8cdf94e80536f7a879b2105949aecec684610de3f50e588e6c23c,2025-03-18T17:01:47.293000 +CVE-2021-47216,0,0,7b28f4a443e8cdf94e80536f7a879b2105949aecec684610de3f50e588e6c23c,2025-03-18T17:01:47.293000 CVE-2021-47217,0,0,0a489705239b1608b1dac0f9ef137450310d629ac310e04d5fbc0878960cf64a,2025-01-14T14:44:11.917000 CVE-2021-47218,0,0,cdeb5c7e6dbdcca4a12e7f3fd8c0c1023ff2d2f036ea1b66236860ff4b09a050,2025-01-14T14:44:55.610000 CVE-2021-47219,0,0,f1060243806af51a0cc03e0e16dca07d32d1e07bba999e0882caec8301729d0f,2025-03-04T15:29:21.270000 @@ -187915,36 +187915,36 @@ CVE-2021-47621,0,0,cc65e3006cebbde43642e9fbd2d8cfabb01079eb7c90b09b8a7980eb912b1 CVE-2021-47622,0,0,3f7658486b916d46d507738eba465babaa2980cfbdc235eebc36198bd63c2e16,2024-11-21T06:36:41.647000 CVE-2021-47623,0,0,91986677d2b927797b5966fc0ca5a89d3af7a7e6c7265115b11848398ade465a,2024-11-21T06:36:41.780000 CVE-2021-47624,0,0,592282086cd10fb104528f56f6839241d592ee1a02779ba76fa63df4227294fb,2024-11-21T06:36:41.900000 -CVE-2021-47631,0,0,a69d3b8feec8746ceedc9c0873cbc733b9a0285ea16987e69528560a61aea823,2025-02-26T06:37:04.400000 -CVE-2021-47632,0,0,fa407140b5ad0a8aaa6702cf5050bbd27f77c7c72bb7046ea59c3ba4fbf39d56,2025-02-26T06:37:04.943000 +CVE-2021-47631,0,1,b52967bd60754be64862258b30756172286d199e9c09e242eb1a779a07aa8e23,2025-03-18T19:35:26.410000 +CVE-2021-47632,0,1,65d8d825492c286fdf91e07f98d4de7f94a565f18f2b696990c2f26a09d9197a,2025-03-18T19:35:06.943000 CVE-2021-47633,0,0,29d448f0c317b41f3342e5eb405bb07bf79a194244d026ff16156d24f6e10448,2025-02-26T06:37:05.060000 CVE-2021-47634,0,0,c16b0ce76a2d010b61ed014053a29ba5220dfc23ae6ec82ea3a575019415753b,2025-02-27T19:15:40.623000 CVE-2021-47635,0,0,786e1e6f465fc33fbc134f3af050e2dd8dfd8b7646e7ac88fe4fef0ef83ed199,2025-02-26T06:37:05.280000 -CVE-2021-47636,0,0,ca7da47faf0426c55f1486432f8b6f2a548392bccceb631d81d2b0aa69bf3e63,2025-02-26T06:37:05.377000 -CVE-2021-47637,0,0,8a4b2bb08baa6417bf47a716a2079f00c4fe45f1537e3450215f49b7b23f8a18,2025-02-26T06:37:05.477000 -CVE-2021-47638,0,0,5b76f057e440ca6147e1f36c21aec3744ab0a725fe75606049cc88d555dbb718,2025-02-26T06:37:05.580000 +CVE-2021-47636,0,1,13cc77fef691527667c0a9bd87f0f4000d1eec8832bcbc0fb16ed2bbb774c5d5,2025-03-18T19:29:55.410000 +CVE-2021-47637,0,1,b24309011131bb8ab8d9ab8ef8aa49dff38957f29b57cecb4d18f83a7770497d,2025-03-18T19:30:11.170000 +CVE-2021-47638,0,1,328d4af2b2dcc0d10a2377103d3139de5fd193d85443970151486275152f22eb,2025-03-18T19:08:37.783000 CVE-2021-47639,0,0,11f8f9d6d59539a955b9ce12106f585044a875b4b127ad574201c0d9e72e8ceb,2025-02-27T19:15:40.773000 -CVE-2021-47640,0,0,eeae88b95e0e57051eacbf3fdb36c1de6dc526f28c0d9f6d5a8ff91f5d30c5ea,2025-02-26T06:37:05.780000 -CVE-2021-47641,0,0,857a1465bce116085f77a8b6929c98b4aa906b08be55067c5f7922899c6ff83d,2025-02-26T06:37:05.883000 +CVE-2021-47640,0,1,266309ad7d448878e8c9af9f4777d27015b4c5183cc64c96bf3671908d5bae89,2025-03-18T19:09:21.717000 +CVE-2021-47641,0,1,4804f32a9d2cd2d11e40efb8037fe6501b9284830eed637bf08501fe8fb158d5,2025-03-18T19:09:26.503000 CVE-2021-47642,0,0,9c61dd6599dbed18fa3fcffb6878092289bc6f69fc714d1d9d2b1bff03791f52,2025-02-26T06:37:05.993000 CVE-2021-47643,0,0,ee3b4e2c1dc026d9b2fd21cb2c9265e6b329d9c5fe2fc5d7d8975c28a18c9bb5,2025-02-26T06:37:06.097000 -CVE-2021-47644,0,0,cb7dc2b6764d2f8b2fce89d94c3834b9cd527debe037c0f771a20f99b9cc4671,2025-02-26T06:37:06.197000 -CVE-2021-47645,0,0,ca262dcaad637102fc9d23c55e982672fa42e8119f92c71c4d177c3d9f99fa84,2025-02-26T06:37:06.293000 +CVE-2021-47644,0,1,c366176b1eb4af33e89fcb4212020d510a59bb4efedbc5b8dba86ef646527d34,2025-03-18T19:09:34.307000 +CVE-2021-47645,0,1,ae2f8c7b76ecb2a7cc9190bc961222ee49eb7b01baf667df314eb69df14bbd43,2025-03-18T19:09:58.003000 CVE-2021-47646,0,0,54eb9e8231fc6e7ca7824cbc089c5100708ea0e6b8a5c7025d75b7c700560410,2025-02-27T18:15:22.093000 CVE-2021-47647,0,0,a38a8ff6df99d807de0756888b084b9cdcd858ca2df57c632bac2264930e650d,2025-02-26T06:37:06.490000 -CVE-2021-47648,0,0,3c20f008532e9edfeaf2dd52e877fcc8a80cc5b6789eb8e94911c21eaf3edf60,2025-02-26T06:37:06.597000 +CVE-2021-47648,0,1,6fc2dded120d4f029435a611b12ae0e6be1c39bbaa8aa7cdc95860b631995363,2025-03-18T19:10:10.993000 CVE-2021-47649,0,0,ceb66deced6f57e135b75497731259594622df709415d60b69f0fb280b2e9fbb,2025-02-26T06:37:06.687000 CVE-2021-47650,0,0,2f549aa21a9cc180f0689454d9257c4d9bac0304042ff7265313b449546179cc,2025-02-26T06:37:06.780000 -CVE-2021-47651,0,0,2d00261f5f9683550641dedf4b96a83527befe8297ccf74ee352445b67fc960b,2025-02-26T06:37:06.880000 -CVE-2021-47652,0,0,b6e733509cc5d4118c48bfb055f0c79c7c0612f8ac58b02f98cef31c72b65a8b,2025-02-26T06:37:06.973000 +CVE-2021-47651,0,1,7f64a2fd4d47e16ee8acbbbe6cb8d35f16d9362b62a0eadd3bfe892f5df3139c,2025-03-18T19:10:27.733000 +CVE-2021-47652,0,1,4b3eafea869df491f218d93f05569d7ad4acd58ca002d661dc144de49bc97a69,2025-03-18T19:10:43.653000 CVE-2021-47653,0,0,f8f0815ccd4812ab349d22fae35ff7abc16548b72de4dd39d48d789005b67a97,2025-02-27T19:15:40.917000 -CVE-2021-47654,0,1,a53b9e68b944006c4b9015b169bd934f31fb260c38950b507f719f336651ffbd,2025-03-18T18:49:52.790000 -CVE-2021-47655,0,1,f5d4791ca16a11a0b52df05b7665e0d46eb1853bc8c7948286a95288413acef1,2025-03-18T18:50:02.227000 +CVE-2021-47654,0,0,a53b9e68b944006c4b9015b169bd934f31fb260c38950b507f719f336651ffbd,2025-03-18T18:49:52.790000 +CVE-2021-47655,0,0,f5d4791ca16a11a0b52df05b7665e0d46eb1853bc8c7948286a95288413acef1,2025-03-18T18:50:02.227000 CVE-2021-47656,0,0,32bc830182c9b0abfa20daa0282ac8c484ddcde84b79cfdd235679a29e2a63e9,2025-02-27T18:15:23.133000 -CVE-2021-47657,0,1,e7b773ff5c57ebd68c588a4b48c0e5eb233dc82beaa2f144ae46a979b8e0e60e,2025-03-18T18:50:28.090000 +CVE-2021-47657,0,0,e7b773ff5c57ebd68c588a4b48c0e5eb233dc82beaa2f144ae46a979b8e0e60e,2025-03-18T18:50:28.090000 CVE-2021-47658,0,0,40cee62fe59cbcad55bfa583a2a783321bfe2aa50e6ba27a98aa5e5272260471,2025-02-26T06:37:07.557000 CVE-2021-47659,0,0,5aa899f756953f035092f7b1fe4153c0d3304e0ff38c8b4cdec0e8f319d19fd3,2025-02-26T06:37:07.640000 -CVE-2021-47660,0,1,e59321e11599e4443f5093be84e3c1ac718be1209a0746e320294c82fef27666,2025-03-18T18:50:52.930000 +CVE-2021-47660,0,0,e59321e11599e4443f5093be84e3c1ac718be1209a0746e320294c82fef27666,2025-03-18T18:50:52.930000 CVE-2022-0001,0,0,d630d65d043af9b84ecc9398947f34a2295c0c4d0361b3aeea445eb7fd5fee61,2024-11-21T06:37:45.587000 CVE-2022-0002,0,0,8109a7e42c2476389a26f4b576e048bf54a0f7b87a24a41ab958cd97937ab177,2024-11-21T06:37:45.933000 CVE-2022-0004,0,0,76e2034631db671c6d78b8f053274466d56a4afd5cff5cbbea3a9413334df9ae,2024-11-21T06:37:46.137000 @@ -201136,7 +201136,7 @@ CVE-2022-32969,0,0,610e70141b1b66861787ed3b3eb73cb612fe56d492bc0c8b93b1add16aa93 CVE-2022-3297,0,0,10b9298a5841ef3fa32146324a397448f763b5d9d36ada82f8b33827476532fd,2024-11-21T07:19:14.617000 CVE-2022-32970,0,0,0e90383f69fefae39b03ed24b7fa7ffd19767f402dcc91bf442141882cccebf1,2024-11-21T07:07:20.220000 CVE-2022-32971,0,0,75a1e91b9aa6c013b50c4f1b81d10a60fb9d59af7abe542d7c5e4b7bb4bcb753,2024-11-21T07:07:20.367000 -CVE-2022-32972,0,1,d4ce4468a193b2606a62005e87dda0b3284aa24a00260c0396c928820322387d,2025-03-18T17:15:39.310000 +CVE-2022-32972,0,0,d4ce4468a193b2606a62005e87dda0b3284aa24a00260c0396c928820322387d,2025-03-18T17:15:39.310000 CVE-2022-32973,0,0,af9ddc2bee0e64446ef0cfcdd3594c717428164b815cb91472d32a58e20be349,2024-11-21T07:07:20.640000 CVE-2022-32974,0,0,03490316cb5f2152e59de872279c7a01eea318c493a07511159e02abda1ce9f0,2024-11-21T07:07:20.763000 CVE-2022-32978,0,0,120ec7c3fe6916d5585046d5915fb94ea7e7ac263a6ef892db83ba808eab81f7,2024-11-21T07:07:20.887000 @@ -203080,7 +203080,7 @@ CVE-2022-35569,0,0,46dbfde11e602995fe63c9cff3b89b162998751976dcc7a041105a316ad19 CVE-2022-35572,0,0,e5d95e9f09f143affd13b4097606c0f5a97b20c6f18bc4fca512d2fbce33564e,2024-11-21T07:11:20.740000 CVE-2022-3558,0,0,d1869b1a070a4f140668c54fcaee07ae10418631bc055deaa5a305d3f3f0cb7e,2024-11-21T07:19:45.827000 CVE-2022-35582,0,0,851a4677ae8cee47bf049ce03956eeeffe5381244611708fc7140a9876efb5f6,2024-11-21T07:11:20.903000 -CVE-2022-35583,0,1,104e140e7e50813c17c6743d2480c6be57bbf50f09ffa8a2bb685e5543833882,2025-03-18T18:42:23.757000 +CVE-2022-35583,0,0,104e140e7e50813c17c6743d2480c6be57bbf50f09ffa8a2bb685e5543833882,2025-03-18T18:42:23.757000 CVE-2022-35585,0,0,397582c6a1ffa62254617c234e9f56d46fbfd92be79c2d9b6adad3271a69a0a4,2024-11-21T07:11:21.227000 CVE-2022-35587,0,0,ff16b90bb03bae726b243cdd857e3ac154cf233525edab0165f2d48dec858d8f,2024-11-21T07:11:21.380000 CVE-2022-35589,0,0,1dc295b967320ab58d5715230b6c3e0e3525d7c0910e633aceab160fd168ed81,2024-11-21T07:11:21.533000 @@ -205572,7 +205572,7 @@ CVE-2022-38708,0,0,f7112b10d6492d4af6514c0a9f684cb37e31ff0abf47ebc60ccc72c847624 CVE-2022-38709,0,0,834feda04c8d7f7ff0e5f41326f75981240e1fa4202288ce913bb8f0ae2ed6c1,2024-11-21T07:16:58.517000 CVE-2022-38710,0,0,54b92477ebcd1ea1f4e436a5ff89972ddb0f2f4a08ee2add5f7ee30dec62a367,2024-11-21T07:16:58.650000 CVE-2022-38712,0,0,da2bfde2d97a4aa09239f46d0c781de841e8df1dbb03ed863f88dfec91496bda,2024-11-21T07:16:58.857000 -CVE-2022-38714,0,0,219fa394926dd7657d734e7432dcb0c4b76f6f30c0977e2becb16bec735c0e14,2024-11-21T07:16:58.977000 +CVE-2022-38714,0,1,1a9b1ecd5ee816c30fe3f96f63791c6af4e69bac1bc3ba0ac1886f2f0cb34059,2025-03-18T20:15:16.603000 CVE-2022-38715,0,0,32c95eb50ef56a9871e7e7dd43ebf7ad3d62483d462d12d92da3e2883a88603a,2024-11-21T07:16:59.117000 CVE-2022-38716,0,0,2befc1985d6f3707af7a5205c016220638f8fdc2ffcdd2205c62c7acbc4ba9b6,2024-11-21T07:16:59.253000 CVE-2022-3872,0,0,6ec2c6467f550b633eee81ea4454655c04d39c57a8de8e6ef11519fefc91372a,2024-11-21T07:20:24.477000 @@ -205682,7 +205682,7 @@ CVE-2022-38863,0,0,3066f8a0cc61b5ec847fba66f0865ea81f02a07f14cacf8ad8d82478b6104 CVE-2022-38864,0,0,23454ec5150aef4bd1bbf50be4b8ae615e16bc7b89f814340dbc35c5672dd98e,2024-11-21T07:17:11.877000 CVE-2022-38865,0,0,ca7868c6e33cfb4994360666952707212ca0d9cc39250c17b2465a2f1d9d30e5,2024-11-21T07:17:12.040000 CVE-2022-38866,0,0,b4bdbdddf7a428983c00cf65d4ed7171e814c0565e4e4091351dfd65c1a97c28,2024-11-21T07:17:12.203000 -CVE-2022-38867,0,0,6c00c85b5d62f877fdcbdd20d667e27c0615c3c288434bb56a8bfa87806df880,2024-11-21T07:17:12.370000 +CVE-2022-38867,0,1,11f65a20895a9a7c0d1ae7ae11e215507ccd2c7f8181f46ab3685fd197296401,2025-03-18T19:15:40.333000 CVE-2022-38868,0,0,c009e5a533f97b32aba01ce99f2e2593933b71897e88faa5b92a24593a69b9dc,2024-11-21T07:17:12.523000 CVE-2022-3887,0,0,06c658cfbdd81eef4d6500a637650189da6a52b1e7f7631d7ae6ba5ec9938709,2024-11-21T07:20:26.720000 CVE-2022-38870,0,0,e70b6b96c4141983a674b240e16125c6a6a7f9ff2f0a05dd5d6b5a6c0a0c5ece,2024-11-21T07:17:12.687000 @@ -206440,7 +206440,7 @@ CVE-2022-40010,0,0,dabcc1ad0e808ef11676ea91f191a06230ba454073d4ae4419b68944ea253 CVE-2022-40011,0,0,afde86f05caa85423e96a915d5e6f15a12e9fb2250dec80f61842c792bc02776,2024-11-21T07:20:43.840000 CVE-2022-40016,0,0,148f17349134c7ad234c0980fa881dadee24cddca737a492a8cefec03bcd2344,2024-11-21T07:20:44.003000 CVE-2022-4002,0,0,03ff78a7f3bf72b254b65f244d7ab9ecbd438043995767e6c6c4a3facc300bed,2024-08-13T15:23:51.097000 -CVE-2022-40021,0,1,7c39516cdd288184e582fc0863677682d76c7162f5872be1d2184272623c3009,2025-03-18T17:15:39.603000 +CVE-2022-40021,0,0,7c39516cdd288184e582fc0863677682d76c7162f5872be1d2184272623c3009,2025-03-18T17:15:39.603000 CVE-2022-40022,0,0,fe8acd9171464928f69c7a6bc926435df55ddc16dfe0530de6f9463c8ea485b2,2024-11-21T07:20:44.307000 CVE-2022-40023,0,0,1969d9a6fdd882f53e50f36591b8d0a8013170838af37568bd463fa48a30fb96,2024-11-21T07:20:44.470000 CVE-2022-40026,0,0,30ef48259babebdbdbd481d6ea398709bdb66fdc575765a5e753c0cbe3b5e711,2024-11-21T07:20:44.637000 @@ -211313,7 +211313,7 @@ CVE-2022-46440,0,0,5e9f025b62b475de280b45d71c727fff77b65691cda61d6d9fb615377c4e7 CVE-2022-46442,0,0,5607e0afd5331d7d18da25088ff7c3720f45c51f8cff9a7f36738e37e0436985,2024-11-21T07:30:35.803000 CVE-2022-46443,0,0,55a7c896ac0c0497c368be2c3b16324841fa8a1208a8cd554b930b672ebe23b6,2024-11-21T07:30:35.950000 CVE-2022-46449,0,0,f563e5acb48d87b841fb7453b135978d89b5707e55d8580b5c57a1b7ecb2138c,2024-11-21T07:30:36.090000 -CVE-2022-4645,0,0,91b5a42655e48970da40b32a23c1dda29b2838709527085da1b70427bb515fbe,2024-11-21T07:35:39.713000 +CVE-2022-4645,0,1,485d685e6a64431bd6c5d2670b1b80d1289850bd50fc74fcd90ccbbac4ff286f,2025-03-18T20:27:08.320000 CVE-2022-46456,0,0,2c2c6fedbb9b02ae9da118c17ec4ed4a526bfee03e61073666ea235c56438c9e,2024-11-21T07:30:36.237000 CVE-2022-46457,0,0,f45c84fe84be1205789d0d0b58f9696dbb0dc771ad9963c01d279a314b91f9a3,2024-11-21T07:30:36.390000 CVE-2022-4646,0,0,32360f8f79849a91095b93ecff3a7dbe390ee1ff4655dabde3d1ec6a359e9583,2024-11-21T07:35:39.850000 @@ -212202,7 +212202,7 @@ CVE-2022-47699,0,0,f8c9fd742f17d3e9707fdf6f122cfbc7471077f9c1a22a759581ba6801a44 CVE-2022-4770,0,0,bfd3b6c4f33757f6336e311372b02202386421c8f00d94be9b4682081cb2b063,2024-11-21T07:35:54.500000 CVE-2022-47700,0,0,33a057ff12229e4ce2628ca487f2e621d33845081ee2c820e4701599cb36a9d0,2024-11-21T07:32:21.550000 CVE-2022-47701,0,0,287c31ec248e323a555b2f31135cff20be1300a59e8173325c3eb04fb931ca26,2024-11-21T07:32:21.687000 -CVE-2022-47703,0,1,a55c659867e2d34a991b621ad114fa6c7e603e2becf5aecf4ef1e4e7827cff63,2025-03-18T18:15:25.850000 +CVE-2022-47703,0,0,a55c659867e2d34a991b621ad114fa6c7e603e2becf5aecf4ef1e4e7827cff63,2025-03-18T18:15:25.850000 CVE-2022-4771,0,0,0a6e040f2037b39a643e9bb30c967b114be955a2fea6c26c84f023d4ef6b2eea,2024-11-21T07:35:54.627000 CVE-2022-47714,0,0,f5a922943f3637c49b57ed7d65d7c96151b5ee8068dd1991b51407b0748e673b,2024-11-21T07:32:21.963000 CVE-2022-47715,0,0,e44193fd121020724a5ed2ef1ed781720e9d774d9e6dc01bed5bd76ff58fad21,2024-11-21T07:32:22.117000 @@ -212522,7 +212522,7 @@ CVE-2022-48323,0,0,a4fe572e6255e86a21f9c102a511c27e80ccb72b49c4284b02e3e11f583ca CVE-2022-48324,0,0,026081d9bed56b2d9099a6d9ef8925bb55801e36d6cd7c9f17db5b09a8451dd9,2024-11-21T07:33:09.997000 CVE-2022-48325,0,0,821ba8cc369b5ed33317db3b64b95a83170165cbc402c12aff5e8190f61a6475,2024-11-21T07:33:10.147000 CVE-2022-48326,0,0,8c83c2686cee6bb45d662eab9356be2dd72d81ea932ee3e3f416f1a1692a1027,2024-11-21T07:33:10.300000 -CVE-2022-48327,0,0,12c4344fd4c4aa1af24d2a49216757a0f7a51529dcfcb52b3ea56753b5104ae0,2024-11-21T07:33:10.457000 +CVE-2022-48327,0,1,fffd2cc33c6b92b01eb6cd63ef825bbed74ab4ebdd5d95c380c19c04fea31d8c,2025-03-18T19:15:40.513000 CVE-2022-48328,0,0,7af5fde39d252e4062d2019ffaf8c5797159ea934eb48b4bdd2009ebf71b8355,2024-11-21T07:33:10.613000 CVE-2022-48329,0,0,84bb8fbcffdb9c182f5c48840cf114cb6b9b6df0383eab7e3eae359284a37b20,2025-03-18T16:15:14.440000 CVE-2022-4833,0,0,3c60921c07f972d9dce9b0934da234081280df0ca1840ba48feb2901ab38f84c,2024-11-21T07:36:02.213000 @@ -213222,7 +213222,7 @@ CVE-2022-49041,0,0,a98f649e96ac9b0759657a1878fe20db3a57b93d993dafffc5b04e911a2c6 CVE-2022-49043,0,0,7174066d58537267d7d2a315cb17b3519790e5764e973f2a3d77df9ee2584f26,2025-01-26T06:15:21 CVE-2022-49044,0,0,6ed32926adedba89f126484c75e18cfdf819ac2c1ea9dd886f1ccc61fd4776c5,2025-02-26T07:00:41.680000 CVE-2022-49045,0,0,22b344a7121cb72fa2f5cfafcc1e2e6a7a43841d65552a779c8562575cc2777e,2025-03-02T15:15:11.130000 -CVE-2022-49046,0,1,e14bb62bb5c4ef922ca02ea14695ac830a3e2d90d9aecaae6883187fbe14dc14,2025-03-18T18:53:16.010000 +CVE-2022-49046,0,0,e14bb62bb5c4ef922ca02ea14695ac830a3e2d90d9aecaae6883187fbe14dc14,2025-03-18T18:53:16.010000 CVE-2022-49047,0,0,8343bca271b17d5976324c6c5cc1454199c28b2a0adf5e994957517365c5f838,2025-02-27T18:15:23.557000 CVE-2022-49048,0,0,6b0293b39167cefced476c56c5a719f8c6f3031bdc41a90b543af091df2cd564,2025-02-26T07:00:42.073000 CVE-2022-49049,0,0,a0e2a6e75b995dc29c6db9bafbfc88733666b9ff79fe3f9825a45d83ef498b65,2025-02-26T07:00:42.170000 @@ -213232,25 +213232,25 @@ CVE-2022-49051,0,0,cb43140b092e07e1d1e08fd40e8d1e6723561d814d0dca64fbd37ea8c67bd CVE-2022-49052,0,0,cdf2fc81f660b7f7b3a723cdea9f8859bf23d7cde38aec70ef0f6ca101ccb94a,2025-02-26T07:00:42.463000 CVE-2022-49053,0,0,e6196f61161513d4b0e645a295b1e0139bd4138b962688b902635facc3103686,2025-02-27T18:15:23.733000 CVE-2022-49054,0,0,679c44903bbbe010db59866d81777676e7f8c21f4de04a3b06c32a954173da90,2025-02-26T07:00:42.667000 -CVE-2022-49055,0,0,ff43301fa5164f8141d54f583f4f862025338a9da417a4ff72d915e0e5bc7c2f,2025-02-26T07:00:42.760000 +CVE-2022-49055,0,1,c4d6f898a71b035eda6c5340a2f09b07491198407bbe1159a583f56282dd99b1,2025-03-18T19:02:42.010000 CVE-2022-49056,0,0,fed64502dc27bb1de8303e848b7450268568790cee1869dc1c89b6131d3540a3,2025-02-26T07:00:42.863000 CVE-2022-49057,0,0,de32aeecbb24bf5500247582d7bf028e3ba28cb6e3180566051705509e9bba0b,2025-02-26T07:00:42.957000 -CVE-2022-49058,0,0,00d2b2de2acfb26c002e206b9cb40cf76e0b14c7de6b10995a36208ee0e1c727,2025-02-26T07:00:43.047000 +CVE-2022-49058,0,1,91d6f4a50b8680a78f2469b1c07dd23b2d17dc8384fbd0b9004baad4525c9d7d,2025-03-18T19:08:08.200000 CVE-2022-49059,0,0,8dfc37fbb3bff68dd057b25bbde7fe9273f5148200ab1a0b89def00d6c36afb9,2025-02-27T18:15:23.913000 CVE-2022-4906,0,0,a823b4bbfbbc923f2df028a42581e18917821bc8c8d60008f8440a61828e4ecc,2024-11-21T07:36:13.207000 -CVE-2022-49060,0,1,acfcd7f48c8a91b814124712117cee9004f1c83060d598f839d66e50ade6f80c,2025-03-18T18:15:10.113000 -CVE-2022-49061,0,1,4bbcc0bd92627f9f5cf7e74dd9b331783ad2cb997fe92c340a942f6e29983dc9,2025-03-18T18:27:09.130000 -CVE-2022-49062,0,1,7acfc578836558dd590d9f3b4cd27e42e3a2e80496df397228fcff3036430bbe,2025-03-18T18:32:22.413000 +CVE-2022-49060,0,0,acfcd7f48c8a91b814124712117cee9004f1c83060d598f839d66e50ade6f80c,2025-03-18T18:15:10.113000 +CVE-2022-49061,0,0,4bbcc0bd92627f9f5cf7e74dd9b331783ad2cb997fe92c340a942f6e29983dc9,2025-03-18T18:27:09.130000 +CVE-2022-49062,0,0,7acfc578836558dd590d9f3b4cd27e42e3a2e80496df397228fcff3036430bbe,2025-03-18T18:32:22.413000 CVE-2022-49063,0,0,b565e3045e5ba5441ceeb92ef03a52d5fef74829c67c76d217f84c12c8cf8b96,2025-02-27T19:15:41.070000 CVE-2022-49064,0,0,7db35e2188f9d0c1f0ef7fcb7f262240667782c20fb0c4b8464d2083b4af498f,2025-02-26T07:00:43.637000 -CVE-2022-49065,0,1,5368e1914309f490f08f7c26d51f1d1fc918f7cd2e401a82d81f2b925e9fb667,2025-03-18T18:45:18.623000 +CVE-2022-49065,0,0,5368e1914309f490f08f7c26d51f1d1fc918f7cd2e401a82d81f2b925e9fb667,2025-03-18T18:45:18.623000 CVE-2022-49066,0,0,1d2ad6081ff8a9bca47b57172c754cbf231fc57b746aa17f2831fd618104a426,2025-02-26T07:00:43.820000 CVE-2022-49067,0,0,a8f2f882eba49e1063e17a541dda6968eeb1be91f46062d34abe2f03ea3843d7,2025-02-26T07:00:43.927000 CVE-2022-49068,0,0,446b28b3b2ea102e283c0aa8ba949756e1390f5d27c0d16227c31aa6b658651f,2025-02-26T07:00:44.027000 CVE-2022-49069,0,0,4f628b68533f7eef6b59a775ac7375fdffd486af5334ab23841d74b13dcd97cf,2025-02-26T07:00:44.120000 CVE-2022-4907,0,0,0196061cf6e3e0458ba6dde85cf42a89e1110c92e69c62feca2776c69370599d,2024-11-21T07:36:13.317000 -CVE-2022-49070,0,1,2cfd5a997421a8327ad16877f6f4da2d6a0e5a7659d23c36dde1921675b6dd44,2025-03-18T18:47:17.543000 -CVE-2022-49071,0,1,1d2c55166acdf9aee9b80a23c175583dbcf97fc37df8a4efb574529204ae1143,2025-03-18T18:47:30.713000 +CVE-2022-49070,0,0,2cfd5a997421a8327ad16877f6f4da2d6a0e5a7659d23c36dde1921675b6dd44,2025-03-18T18:47:17.543000 +CVE-2022-49071,0,0,1d2c55166acdf9aee9b80a23c175583dbcf97fc37df8a4efb574529204ae1143,2025-03-18T18:47:30.713000 CVE-2022-49072,0,0,055b7bab4edfd6238cbf3b5ecb69bb6118f17b2ebd5e3970390f8bd3c1934b20,2025-02-26T07:00:44.423000 CVE-2022-49073,0,0,fdfd2d8e79228f94bb41d988713691482bed424c1397c9745971f237aec65573,2025-02-26T07:00:44.647000 CVE-2022-49074,0,0,76421d6902e397a51d31434b832460afbd8898e1b2c84222cb9ccdc7e1eb3537,2025-02-26T07:00:44.750000 @@ -213381,7 +213381,7 @@ CVE-2022-49187,0,0,b03dd9775906b13e66d6da0c7a6709a8d02cbb3616dd5eb1319bd4b4fea91 CVE-2022-49188,0,0,05eaaa0fbfec280a18d3a9263bd1d8d373df323af9da6ae0212951f63568884e,2025-02-26T07:00:55.897000 CVE-2022-49189,0,0,6d21206609d284d9be89faf6badc9489928bab546ffb8dd9b914dfe044f1f19b,2025-02-26T07:00:55.990000 CVE-2022-4919,0,0,98cb93515b7aa4f8c3b1d5996b5569b16bc03402364c91cf633e9a3eefb9bd48,2024-11-21T07:36:14.903000 -CVE-2022-49190,0,0,99c566123fc2cd1eb315fd99a4b8a7dde8912d20a74a28525994dc6a1933ece7,2025-02-26T07:00:56.090000 +CVE-2022-49190,0,1,be4a88ff9119a6ef753ec41d6d0076d47c7b564ef2f457aca41b22e4c9f6a1c2,2025-03-18T20:12:35.920000 CVE-2022-49191,0,0,5db8c34e08a9244164731b1be489e233dec1042715f9481ae6886d56397b831b,2025-02-26T07:00:56.183000 CVE-2022-49192,0,0,c5cc15311110742b3423959e5ab8b3544ab5fef8f28ae5f9dcd69faea23b7a33,2025-02-26T07:00:56.287000 CVE-2022-49193,0,0,6da02f2068a6fd8fd315443624adb972d9dea58ac5b58526b0b03159a82d2a09,2025-02-26T07:00:56.383000 @@ -213393,48 +213393,48 @@ CVE-2022-49198,0,0,7ad2dce146837f424c2220192bcc20d4e5219672c8b6fe8ef03306d099eb6 CVE-2022-49199,0,0,8cae6cfe82f17813337b88ee17bb74790d7df5d44ccbf22b7659cce61888bba5,2025-02-26T07:00:56.970000 CVE-2022-4920,0,0,6d91084fa28049e94d0212ded35971c929fba3ddd5aefbde0fa3ce59a47f5d1c,2024-11-21T07:36:15.140000 CVE-2022-49200,0,0,b7145d48d9b31a33fa88caead27fe123ef8165915097d5d0bfe6239fe6b8688c,2025-02-26T07:00:57.067000 -CVE-2022-49201,0,0,a3b37c517cb153e02a7178ea9b9d19e48f188168df361b526099b6612102000a,2025-02-26T07:00:57.160000 +CVE-2022-49201,0,1,f1f061d998829048b7925709e370e790a1095190cd54e3b519f8a85f6edfeb9f,2025-03-18T20:12:27.870000 CVE-2022-49202,0,0,e32c4cd1087a4c8ffbadb6fdbd6faf3bd63f0333eb0038fd4edfa049d237a82d,2025-02-26T07:00:57.260000 -CVE-2022-49203,0,0,54ffa9f9d7c16a07f8a3c242a5292a8d3400f3e4b37d70a606fda310e30ab5a3,2025-02-26T07:00:57.357000 +CVE-2022-49203,0,1,92b523d07222ade244647fa40857e9590901fadaaa87b6322bc6c2ce2ba11823,2025-03-18T20:12:03.890000 CVE-2022-49204,0,0,c67d3c569022038ea3e9a7fee3f53b25e31b55e9df154fead0c5b263179c18e3,2025-02-26T07:00:57.480000 CVE-2022-49205,0,0,fb71f1ab9bcde1c6d1d1bbe21aaeef96cbfc437965a476ea7a0405a7f2ec0c6c,2025-02-26T07:00:57.620000 -CVE-2022-49206,0,0,ffd90b813de902b6b4f3735ce3759bc70622d5a3abd3802a6d946bd65cd1a849,2025-02-26T07:00:57.723000 -CVE-2022-49207,0,0,ed11a00df8084c3e6a3b5fd3d0dec90f2e6b960e18814ddd274ee4c2a14f0d68,2025-02-26T07:00:57.817000 -CVE-2022-49208,0,0,56f64c22b539adaa6ead0665f2f23e149d8dd338a8228527b1676504022df12e,2025-02-26T07:00:57.910000 -CVE-2022-49209,0,0,e6a9a929118b616d891317a486586aab10066e00ef0b795c720fae22d3298eea,2025-02-26T07:00:58.007000 +CVE-2022-49206,0,1,797e140fff810f4c9db2c88781fe7ea6689ab5150fde13f4f3c063a951051b60,2025-03-18T20:11:49.133000 +CVE-2022-49207,0,1,53b5712138d8995b67c24c8027919bbbb6ed6c6ab40c4a34d2fc9c14d41971b1,2025-03-18T20:11:31.573000 +CVE-2022-49208,0,1,c6e1251a4a22c67af43c85ab4dd317e51c2ceb0af00d9f40f00230803e41294f,2025-03-18T20:11:17.900000 +CVE-2022-49209,0,1,9010406dc7804f886afc84dd5f94bfe2a884c52666f23db35b4f23853a771f30,2025-03-18T20:10:46.370000 CVE-2022-4921,0,0,abb8970108be08849e8b46c4d5bb6d517f02615a1ad9856e3cef3142736ec36e,2024-11-21T07:36:15.330000 -CVE-2022-49210,0,0,77a2bf091a5220d4739c74d072679b0c08f1c70058f64be63012f4f52ed09409,2025-02-26T07:00:58.107000 -CVE-2022-49211,0,0,5f800d10d224e18bdb50baae6344052b063f43073ac05c60669ec9e30a55c88b,2025-02-26T07:00:58.200000 -CVE-2022-49212,0,0,23228576ad808625621874c4ba7e21bcd47257f6ae0d0c02aeceefbcb4fc7427,2025-02-26T07:00:58.293000 -CVE-2022-49213,0,0,d01c6e55b35468c62ee8269e523a8cb0ebac47f3113958e4cec015f465361120,2025-02-26T07:00:58.397000 +CVE-2022-49210,0,1,e2e1498b4a5db5eff3c785bac876c6a54846d4ad8fced61933172c9736ae00b3,2025-03-18T20:10:37.433000 +CVE-2022-49211,0,1,05329c347c03a27d40174b2744be735c8dca35af99fd1697e5ac31c109d9c977,2025-03-18T20:10:12.477000 +CVE-2022-49212,0,1,d15efe1d7a7ed5491a60c909963c61271ec2b0abe4baaa076f4f8c9750dbcaa8,2025-03-18T19:31:39.623000 +CVE-2022-49213,0,1,4b0ee92957e0edbf2fb912a50a40b900befc681cae2b92c40e3b7f9bca34a9a6,2025-03-18T19:32:04.063000 CVE-2022-49214,0,0,1fd7b7a4c4f4cfdd5b2336ab57575883e05b81a7e797d93abee1d5b5eb2a9001,2025-02-26T07:00:58.490000 -CVE-2022-49215,0,0,7334b8938fab577133b1a8f590256577c1c3f458a449f2c8e9a495ac731bfd1a,2025-02-26T07:00:58.590000 -CVE-2022-49216,0,0,c1c84449535a886c5cf51f1d508633ad48e5a117abe2d8df56bcd0a5a64133e8,2025-02-26T07:00:58.687000 +CVE-2022-49215,0,1,c00014187bfa14d501026cdee9311544100291d5c22ca43ffe01fb6648e72be8,2025-03-18T19:32:25.867000 +CVE-2022-49216,0,1,56c9de16d1b6efaa104d867b49e5d14eef08b8721376d3824088a782e99148a3,2025-03-18T19:32:55.723000 CVE-2022-49217,0,0,3fafc1f3740f31a3e33ceccfbc11ed5cac8b9a4e90bfd5a0e3ec4d856bdfcb1d,2025-02-26T07:00:58.787000 -CVE-2022-49218,0,0,515a020a27360c62521e7779bc4e1bf3dbfe2ba08a2a9b138d0df81e148318f9,2025-02-26T07:00:58.890000 -CVE-2022-49219,0,0,580ba9f75ddc7b94bd799685f8de2d25b81da5099e83b19a25804f0b66ca3e59,2025-02-26T07:00:58.977000 +CVE-2022-49218,0,1,0cac1cadaf04abf0633d9219a4d04eeb8ca5709ee2eac6118135a6c9b706b505,2025-03-18T19:33:07.647000 +CVE-2022-49219,0,1,b8256a892da6b7ea3e04293b76047d8268a5c00e69b3d52a46959ea3d9915ecc,2025-03-18T19:33:24.627000 CVE-2022-4922,0,0,845ac042dcd4b5ec74159a973e2efc3ff642abc4a48ec290dcd8ade6154e85ef,2024-11-21T07:36:15.513000 CVE-2022-49220,0,0,88165699fae73b6a3da1d78aa3c50cf1c52f7a1ae5e11459d80fdb98f6c93f82,2025-02-26T07:00:59.070000 -CVE-2022-49221,0,0,1f5e0f498e4ac4e10a5060b31c194dcbfa45221b80a62fda8812f4ea5d5be0c4,2025-02-26T07:00:59.167000 +CVE-2022-49221,0,1,bcb4ae3cc50dfdced7d730952034252f9f3f2d971202b333fa26b3e425c74fd8,2025-03-18T19:33:38.933000 CVE-2022-49222,0,0,0285758520dc11c8bf1e234cca1543eced4ec0f14b382628cf2d20007112c17f,2025-02-26T07:00:59.260000 CVE-2022-49223,0,0,4d7a4a94ce3f1479d17f615bc9d73ed9d5fa019820d95eb36c0bb37a5e892d39,2025-02-27T19:15:42.473000 -CVE-2022-49224,0,0,d712078c0a7c024b544195752145e84a31d2e1dcb41b32f1cbdc45507676658d,2025-02-26T07:00:59.457000 -CVE-2022-49225,0,0,51feb559dee5358bba52f2af1f7a290ac0282164e4bffed4b4a7645b0daf97c9,2025-02-26T07:00:59.563000 +CVE-2022-49224,0,1,d75e1e264f16d3f88d8552c02eeb2b91858a0434f0d1d58dac1c3adf47b42e9b,2025-03-18T19:33:58.430000 +CVE-2022-49225,0,1,f2b1fadb5ab917361da737f5129d84674c82631c56ace5f681d6de0b40ae1d2f,2025-03-18T19:26:19.173000 CVE-2022-49226,0,0,cf0a71052eda333aeabcc4ec842bdbebce73b6970ab06a15f035253d92584385,2025-02-26T07:00:59.650000 CVE-2022-49227,0,0,8997d726839f2d1ef56103bec67b0d40ebbc8b4c42fc385f013fcd46b9216e05,2025-02-26T07:00:59.747000 CVE-2022-49228,0,0,6ee75e48e0de59ecb55e13a30cc9192916a6844d951ac87a4596396e737c2827,2025-02-26T07:00:59.840000 CVE-2022-49229,0,0,9d956a60b7a30bfb6484b355f4da2e305fd49c54e674eedb3def2a6818757cd6,2025-02-26T07:00:59.943000 CVE-2022-4923,0,0,41664ac8b2df2573b9f33a9b7990a9913a2c441bb6eccf7450f8a6f553a54573,2024-11-21T07:36:15.623000 -CVE-2022-49230,0,0,2841f872c21698a6ba868bdeeb2002945f8d40f164807d0813f9e64b22dff66a,2025-02-26T07:01:00.037000 -CVE-2022-49231,0,0,e0d658818382986cc9d4eeae67e75204e79cf83edc5e464a5fe092f915c6b0b2,2025-02-26T07:01:00.130000 -CVE-2022-49232,0,0,176b81f9b7fee311991b08da7b80d3d8bd5b71eb46543fcd6fe93678ddd12376,2025-02-26T07:01:00.217000 -CVE-2022-49233,0,0,4e11768e814920db62265129f89a3bd21fe1c60d998d8e2373ad2de6d56fb26f,2025-02-26T07:01:00.317000 +CVE-2022-49230,0,1,1c205719297ae85fe342025af8a9d713bff86eb071cc8f68868217831ca11637,2025-03-18T19:26:28.347000 +CVE-2022-49231,0,1,9e4c977309171de1d4db14ca193e95abf6b0e4c3de36d5aeae4f828a15f5d60f,2025-03-18T19:26:40.123000 +CVE-2022-49232,0,1,560a646e6a84c70cac868760963364acee6737f3ce6fe9a210458d9f1ba141b2,2025-03-18T19:26:49.880000 +CVE-2022-49233,0,1,50d64ab215e42a4ba4d0498968cef814ad77e7dd1bb53cb08c843d24d6374eb7,2025-03-18T19:27:09.697000 CVE-2022-49234,0,0,e7a182f5d1698fd791aad9c170df973e0ebad3984b6507ef619a7d2b4d04b42b,2025-02-26T07:01:00.407000 -CVE-2022-49235,0,0,0dd7a8b83e74ba4b4a61b77433b16031121219a436b4fdae96691012ae8797ca,2025-02-26T07:01:00.500000 +CVE-2022-49235,0,1,2ab6f10153d00e61d79fbff7c7ede9bfcd9025b74e2989b063e15c9501743129,2025-03-18T19:27:57.093000 CVE-2022-49236,0,0,f5796beefedea654847809046849165e9ce63a42d8f4393a85d1470594d7b6ee,2025-02-27T18:15:24.803000 -CVE-2022-49237,0,0,77f54b0e4a33faf8ec28f4115929621b05e879fd836912fdce263019e85a315f,2025-02-26T07:01:00.700000 +CVE-2022-49237,0,1,10cb3415d6f1cc6f246579476f0889acbfc5a11c8f636f481019607fd12da7ab,2025-03-18T19:28:13.427000 CVE-2022-49238,0,0,0ebfc3d3a1acf7a52e2c7f7f92fb614ea9fb35f824ab6e88c1c07a2c42b347f5,2025-02-27T19:15:42.610000 -CVE-2022-49239,0,0,f75d26905bc913ac5211f5e021b2b5086d1bfe74858c6a9c98e08c3f490e7004,2025-02-26T07:01:00.887000 +CVE-2022-49239,0,1,74cdad40929781259242537b4ccc463f959e7d4be02624923f965b8c98d8d97f,2025-03-18T19:28:26.167000 CVE-2022-4924,0,0,478cd65cc39d1a4a12365dd984816c2000e169260e72489e81fdf56aab2bfb16,2024-11-21T07:36:15.747000 CVE-2022-49240,0,0,fb0fb5cf6081d6d15067bc0bbd6b12978e10327f9e740f5974d7a73201a34933,2025-03-17T19:58:26.160000 CVE-2022-49241,0,0,886f936560eab5c6f0167be038a97d7e7d615c2146e523545b8129c0079cb037,2025-03-17T19:58:19.520000 @@ -215127,7 +215127,7 @@ CVE-2023-1191,0,0,9d0a9a7523041486f7833fdfacdb5a5869d7eb6b1d33adf405d51270d67b5d CVE-2023-1192,0,0,bfa8f5268ba2ac1bf29c3a44f8e698ecb3c10e88265d80473e4f4f400a814adf,2024-11-21T07:38:38.570000 CVE-2023-1193,0,0,e26a2390b19d99c4af76bf87860e924ddae19e1846826c12b2553b6dbfbe934f,2024-11-21T07:38:38.710000 CVE-2023-1194,0,0,a3a167ec6ec18467d49939065dc9917ca334ddcbfd29c1e1c186b3ce608a1bbd,2024-11-21T07:38:38.847000 -CVE-2023-1195,0,0,b678d5607b985ba032a4a1965ad90bccdae593e8264afd26c6fc50484822d431,2024-11-21T07:38:39.007000 +CVE-2023-1195,0,1,29b38929299f0897a484042f918afd5cf90c7a0ac17260d6cb404e604cb89b2b,2025-03-18T19:15:40.697000 CVE-2023-1196,0,0,c8f5779968326d7d81a300e6402c218f9d3653bdc1028fe84c7e3255af4de629,2025-01-30T15:15:12.527000 CVE-2023-1197,0,0,86832f5d8e3d2f19e25d554307cda0a38f9c96d8816c29ad3985ff0868049cfb,2024-11-21T07:38:39.223000 CVE-2023-1198,0,0,007352a77f8be86abc9014a5228157699faa100b2d96c0aa11fbfdebb3b2fd1f,2024-11-21T07:38:39.327000 @@ -215757,7 +215757,7 @@ CVE-2023-1855,0,0,a64a2ebfa7264eafd94e32382791f28346056726a93ae7e51f3bec555345fe CVE-2023-1856,0,0,f9af566e702d56338edf59b53bb8cfdccbf57fc3c827d54a91dde61961df4300,2024-11-21T07:40:01.847000 CVE-2023-1857,0,0,55cb03a7a1032c1834395536b9eba3913167eecde95bdd4c2ae2f2b93e3dcf21,2024-11-21T07:40:01.977000 CVE-2023-1858,0,0,df7325c01a486bc312639bb1f615f6ac0a26c25e7b26e6a183a5620e96094aac,2024-11-21T07:40:02.093000 -CVE-2023-1859,0,0,23899e3cee21603963a4dafc4a10f02b1c783b8c627a4a20610ef8a5cd3a5d4a,2024-11-21T07:40:02.217000 +CVE-2023-1859,0,1,a00a509b30fd7e49e9d6221d52ff3cc97ba84d70219f3dfe84fded6033cbb20d,2025-03-18T19:15:40.903000 CVE-2023-1860,0,0,0fa30f56f993b09a5dbcdfce5c677412e754808a246c33f2484aec39e502cdb7,2024-11-21T07:40:02.317000 CVE-2023-1861,0,0,8c35216364c24b1fb1c93283a7f8f196219f3c0b44aac8a320b953b081ca1db2,2025-01-30T15:15:14.450000 CVE-2023-1862,0,0,9dd720dc34f84918e06a8028dfd464c845d03b0a153324e5c97106c0863423d2,2024-11-21T07:40:02.547000 @@ -216094,7 +216094,7 @@ CVE-2023-20186,0,0,45c2304de2650eda7503e7a5b6b812a97b558834c3d018ac11886acddaa1b CVE-2023-20187,0,0,06b2c4e61b7276271878d38db6ba08df36b3b38576a4d8e473bde6e45ac0cc16,2024-11-21T07:40:46.903000 CVE-2023-20188,0,0,545b68b23be4c353efe520203f69c8b83261dc6b6e151a294dacf3fc7c4b753d,2024-11-21T07:40:47.090000 CVE-2023-20189,0,0,50acee98d8717370bb8e583c4209e09a8a04e9cee95ec3b7c765936d4e37a024,2024-11-21T07:40:47.317000 -CVE-2023-2019,0,0,9492433170f0b8020b1e60be0dc8024181769d8bda2f7350ede2746abce20bfb,2024-11-21T07:57:46.253000 +CVE-2023-2019,0,1,8ef19068182317d1b648a5e44af9847c6e0f49c1b90f938cf2e13fea86d9ab47,2025-03-18T20:15:19.093000 CVE-2023-20190,0,0,3be939bb463580cda9689f89da8faf4e1cdbf4189dd7f02827578d16945d46d1,2024-11-21T07:40:47.653000 CVE-2023-20191,0,0,9b40334d6789988a56a6a35e5f94692d0188765cd5eb7386b2b178920ec17316,2024-11-21T07:40:47.793000 CVE-2023-20192,0,0,a9d4ad7aa88497e22b4fe994c3cf9ded0bb87f6cd69181588c91746a800e6e65,2024-11-21T07:40:47.917000 @@ -216259,7 +216259,7 @@ CVE-2023-20570,0,0,7c7bd8c102f3da17973fb41ed490782475d32e06863503f8cc726b6eecea1 CVE-2023-20571,0,0,124885a17b0594fd83dce4569d7fca5fe444643e548995c0e909a74c3e042d42,2024-11-21T07:41:09 CVE-2023-20573,0,0,c1228e58cf6c75c55f40924878fd7ef9a08a1744efdfa2fdc877544f49aedfe3,2024-11-21T07:41:09.177000 CVE-2023-20575,0,0,d454030d808802a4dcec640f81d272aa7c4135f2a2dc62f9cf54b366e4182643,2024-11-27T16:15:08.010000 -CVE-2023-20578,0,0,9b8af10cec1c65e7b623d2fea748b48798ccfbff74512f4401b8ab239c3ed071,2024-10-02T17:35:44.117000 +CVE-2023-20578,0,1,3829c320d11f603cbabaaf92d3b7222149153a3212361ea85ba046ce99bbd65f,2025-03-18T20:15:17.357000 CVE-2023-20579,0,0,6b45e084a0bc069fc533d5ca6efbb65974bc1216057ff6644d4e1961a8d3006e,2025-03-14T18:15:25.980000 CVE-2023-2058,0,0,7c9f16a001fa3b7ff2c114c664cc89e8e9dfec7cc9be872f90e7d915d6b66f28,2024-11-21T07:57:51.337000 CVE-2023-20581,0,0,0d26a3a212c9195160f72441dc1cda72f2c39cbbed9f7448d94bcac034ce6e67,2025-02-11T22:15:26.223000 @@ -217468,7 +217468,7 @@ CVE-2023-21766,0,0,3ae78d62c4a120a7a0d3c73ed26f87e68abdb1fde3dc73c26047c0a3e52be CVE-2023-21767,0,0,adec4fd3947a70d0d838cad74c7e8dd688899131ee5acdb70152dac3a243b9ec,2024-11-21T07:43:36.557000 CVE-2023-21768,0,0,5728348bde56f12be5eaef217a5a6282eaeb75d1d9cf5e45d9f1176e6c1ed727,2024-11-21T07:43:36.690000 CVE-2023-21769,0,0,295e5d37a2848d42458aa7c5db7bf6dd0524079786ff8a4cb345313bf99af0cb,2025-01-01T02:15:12.437000 -CVE-2023-2177,0,0,8c83e5915e3f7edb7fd22f31b99af9df44194d4021bbd405188a0984f3d08f7b,2024-11-21T07:58:05.267000 +CVE-2023-2177,0,1,85f1a9688cd7cf2959d532a430c04b3d1bfa29cb5824a34a9442c78f1299ee68,2025-03-18T20:15:19.293000 CVE-2023-21771,0,0,55ae2e0105e274985b2b5825f7918198244413a0af92c9e4a09ae15fc0508917,2024-11-21T07:43:36.957000 CVE-2023-21772,0,0,1f96a6aa9c59106b93baea567d329fc2056f8ac58937da85c0b7cf13be2ec2e4,2024-11-21T07:43:37.080000 CVE-2023-21773,0,0,b4887ef24fc7b4b0f101c7a33ee9d8de515838ee475e5301eba330d71388b7c5,2024-11-21T07:43:37.223000 @@ -218155,7 +218155,7 @@ CVE-2023-2251,0,0,7074e1cc6f181fe6e60c053fdd1b25d246d4630a51626bbe6a34476d298278 CVE-2023-22510,0,0,38d30730c5e8469e4213ddc4af4d979fe2b3cf6dc59d9fd49be1de40d36686cc,2024-01-16T18:15:09.080000 CVE-2023-22512,0,0,ba0bd32f68e0c8c2646636c9a790e3a4c0accd96e92ab42d5276b645d75e88f6,2025-03-17T23:15:16.143000 CVE-2023-22513,0,0,d1d5d1b202ce20d05345e39cea416a9fec7a297999b594a85af13f30835d0912,2025-03-06T16:15:40.103000 -CVE-2023-22514,0,1,0eb1be4fdd4a492a29b2dbea0294f78eb2555be5d640d4f7ae55630cc2b7eaed,2025-03-18T17:15:39.890000 +CVE-2023-22514,0,0,0eb1be4fdd4a492a29b2dbea0294f78eb2555be5d640d4f7ae55630cc2b7eaed,2025-03-18T17:15:39.890000 CVE-2023-22515,0,0,e1b3a5c24dec069d33c73f20bc1e55691c01a674db9c1c72e0df3398fa55e1d8,2025-02-09T20:49:55.073000 CVE-2023-22516,0,0,001864230f9bc370fdca0f79ab8ffe9d7082f111d6a1d9cf3af59d82a0bf4574,2024-11-21T07:44:58.067000 CVE-2023-22518,0,0,ffd5fb533725d5d514e6c5e19fe2c7a3ae793b884c40ee98301804be4b645b91,2025-02-10T17:57:38.567000 @@ -218588,7 +218588,7 @@ CVE-2023-2305,0,0,1438d5ed530dd6219b22c7def7a07031fc3fff38a38616401f44dee6fa0961 CVE-2023-23059,0,0,1f624aea414c00a18a2f5433d1306a116282c00eafe35483f5f09852db7bb620,2025-01-29T21:15:14.287000 CVE-2023-2306,0,0,e519eb5ae1a83153c44621cf5b4155d0d8813a16c39bd6028f59106cac4b868b,2024-11-21T07:58:21.180000 CVE-2023-23063,0,0,43aa15072441bc89fd431cdf7407e1ac8d9b74ab71148d28df097b2a8da3c3a4,2024-11-21T07:45:49.580000 -CVE-2023-23064,0,0,9467a5ec1dbc9a0cb0893083eec67676bafbae391f2d5ce3198d2eff22f06ac8,2024-11-21T07:45:49.720000 +CVE-2023-23064,0,1,d1f3fea3eb7be0ba8dfd8ab1597971392a294625e93ade4e51ba8c62c7d11850,2025-03-18T20:15:17.623000 CVE-2023-2307,0,0,22fe7765f0e6b6df18f740cbc563f03c6ca9a2a0d18a5ae0d78df2138561ac7e,2024-11-21T07:58:21.303000 CVE-2023-23073,0,0,a86f554926b9a4949d43f477e4ae02f66846d21f4da02d2d71f564b8630b52d2,2024-11-21T07:45:49.867000 CVE-2023-23074,0,0,918ee1c70467c7370807681743b912546c445d8325f80ba924c6f3c804f3e3de,2024-11-21T07:45:50.013000 @@ -218651,7 +218651,7 @@ CVE-2023-2325,0,0,6b17c0ebfa7b6296765787fde14c7c7e6c85e9eebfc37ad27e761ab282978c CVE-2023-2326,0,0,bbb01619f8f653e3bd97d1463da769fc8e3ea841483d59aed1b397bd3ab74111,2024-11-21T07:58:23.600000 CVE-2023-2327,0,0,162ac3bf38a86341ad8e0cde599c35a379c9ebf9cc00eb10ff414ae50dbcc061,2024-11-21T07:58:23.703000 CVE-2023-23277,0,0,05e111fbb14188bdff6c1bc7da2a438f2eb92c2ae2c4d335f06831939a0537fd,2025-02-11T16:15:31.527000 -CVE-2023-23279,0,1,85c5d845373a22780bf8bbea7180902ae20e5ac23558d12974ee3194cd60159d,2025-03-18T17:15:40.070000 +CVE-2023-23279,0,0,85c5d845373a22780bf8bbea7180902ae20e5ac23558d12974ee3194cd60159d,2025-03-18T17:15:40.070000 CVE-2023-2328,0,0,03506c2feb18d84bab601a7efeccc6023d3bf215ccfe015f986213838be1a5b9,2024-11-21T07:58:23.813000 CVE-2023-23286,0,0,e037118deb76ba498d34ac5f758cd8040cd3bc74afb04b11cd4d0c086bd4fbb3,2024-11-21T07:45:56.273000 CVE-2023-2329,0,0,5c61c63ef576e4dc4699a72f4a941e5a31920ed0a13b3c88e3908e43bbeaace0,2024-11-21T07:58:23.923000 @@ -219181,10 +219181,10 @@ CVE-2023-23844,0,0,2b2a38ea406866a7507bf6e8f1cfc0e86b0d6782e11fddc94baf5b6bcac30 CVE-2023-23845,0,0,491604b562982aaf621f85510509e172321e2e4a04b7667299885371afb49d9d,2024-11-21T07:46:56.610000 CVE-2023-23846,0,0,fbaa1b74ddd1dbb4069c6e8ed67ad0661893fcaba5be4c3a76e3050fdb380652,2024-11-21T07:46:56.763000 CVE-2023-23847,0,0,be1a2891ef958c3272db19ccf431f476f21fd901ac08b16412632a9aa389b87a,2024-11-21T07:46:56.887000 -CVE-2023-23848,0,0,209a8c7a9bfd343f0ee1322aa968639f30365c941a02ca8bf8c5273df1922fe1,2024-11-21T07:46:57.003000 +CVE-2023-23848,0,1,664e5af6e0b296efb8df6fb8e33e3de3a0b0a6939c735eea91a93c929af4c4e9,2025-03-18T20:15:17.810000 CVE-2023-23849,0,0,720a624c76e17e1e0372878af703a43e837cc89f225303a525df2f76d93b3d6c,2024-11-21T07:46:57.117000 CVE-2023-2385,0,0,dc5469d68a3172fb570f91a363d6e6bd2152cd469b0e96b4fe447555269bf355,2024-11-21T07:58:30.647000 -CVE-2023-23850,0,0,f141c0c8be9a0c7e61bdcc9f74531c73e6df39b7b26e7418eee48cb1e26c5cb6,2024-11-21T07:46:57.227000 +CVE-2023-23850,0,1,731d47718ced4f558d61b30c898e746e5b5cc35c645b6e59ddb14faeefd584e6,2025-03-18T20:15:17.997000 CVE-2023-23851,0,0,51c4aa24ae705afff6b607f1e422eb07b0b3da68cc16b8a6b20a166a9ae3e5a6,2024-11-21T07:46:57.347000 CVE-2023-23852,0,0,1fe3e35d9cdc682b68a3c25d308c950486ae1a6b55f523c47ff5f2f1c49a473b,2024-11-21T07:46:57.473000 CVE-2023-23853,0,0,2df84d6b9217edd691a2c0c1e121ae4171360eda729f449203a4ee32307e0b97,2024-11-21T07:46:57.600000 @@ -219393,7 +219393,7 @@ CVE-2023-24058,0,0,6d5e32e79e025fb393a1a293275112f3a5bc7d674573e2a138e60bfb55fb6 CVE-2023-24059,0,0,95b2954083591b890387cff80611929ced52d21b8bd0dd3a4ee38ad4c8bbaa77,2024-11-21T07:47:21.137000 CVE-2023-2406,0,0,1c8d9123ea28fc718e69f3085d16c1bbc9aa6c6acfd323d97cfe54ffc11168fe,2024-11-21T07:58:33.177000 CVE-2023-24060,0,0,3837a223cb4a96d1405a6bb49934d30cc2300cff9f0250c3979375922e8eefe3,2024-11-21T07:47:21.273000 -CVE-2023-24062,0,0,ecabbee2f2f872da1ceef80f9bdb2cac65457fd159b25a5fc010bcba89b2166b,2024-08-19T19:05:06.027000 +CVE-2023-24062,0,1,d2f5a93bf7dc1e49a8b689f32f43e7d262343479e601f04db90b39ed876f6972,2025-03-18T19:15:41.127000 CVE-2023-24063,0,0,4711e6282887e98e6672b2e8f5ef66ba8152444ab57c852db74260230e3b508a,2024-08-19T19:04:47.293000 CVE-2023-24064,0,0,7bdb354760226c2d2e74a93d79fcc6ec58b75f5bfa6556fb6667234425e37981,2024-08-19T19:04:26.627000 CVE-2023-24065,0,0,cb099ee14dce3065aef0c7c9fe48e200772c06486a273cdfe68fcc3de01a35be,2024-11-21T07:47:21.830000 @@ -219401,7 +219401,7 @@ CVE-2023-24068,0,0,2e516df1b4b1b39772e4e8d62fbb86f0faca45f73328ec51c080d671538a0 CVE-2023-24069,0,0,81a8009b0b22b98c947d85c300ecd5c78146ee947647e31f35d100536fd0bfae,2024-11-21T07:47:22.200000 CVE-2023-2407,0,0,705817cabb12168e6445a8c22a885a979c3dcf89a4793f3af82096ac1cf0e4cf,2024-11-21T07:58:33.300000 CVE-2023-24070,0,0,94dcd179078edc9e96470ddec2daf46fc6f001965f8419e7a3fcf514e96c516d,2024-11-21T07:47:22.360000 -CVE-2023-24078,0,1,7ad7c381a1a04eb8a6e3305cb9af6a47dea1de0f375cf294e0e7614d9bf48639,2025-03-18T17:15:40.340000 +CVE-2023-24078,0,0,7ad7c381a1a04eb8a6e3305cb9af6a47dea1de0f375cf294e0e7614d9bf48639,2025-03-18T17:15:40.340000 CVE-2023-2408,0,0,4327a73dff1b9aa7f82e7566c308ae7469a89567d6761ae9d6900e6d62d0c56f,2024-11-21T07:58:33.420000 CVE-2023-24080,0,0,a471498b29675c0c16ff80ed94c25050d7ec52651a80f452e0816f67c6d2ef03,2025-03-14T19:15:41.250000 CVE-2023-24081,0,0,c2d4e62ecfbc2e474eba9a7a49dcf78b437fd167abe00618c70eaf7b184436ad,2025-03-14T19:15:41.457000 @@ -219504,10 +219504,10 @@ CVE-2023-24206,0,0,1310fb09ce0c4cda9ce2bdbcac5f1a9ec9920a42d3e0c500b1575f9b32b60 CVE-2023-2421,0,0,8f4fc0034461ba52140e725f322e05d42e5936a4a45aba6986bcd6f88240cd22,2024-11-21T07:58:35.207000 CVE-2023-24212,0,0,e8dff44e8ab6d6b38732058cf1f796ef55c95527725784b31ee7e5500c6df448,2024-11-21T07:47:35.590000 CVE-2023-24217,0,0,b64bfd855a843ec2af7a699e7a41f531519aafff975e1f9b539f63a470716202,2025-03-06T22:15:34.497000 -CVE-2023-24219,0,1,69320a07b4da26ec4e683ce85a370b1b94d694aaa6e6d097c318d98159db0bc5,2025-03-18T17:15:40.837000 +CVE-2023-24219,0,0,69320a07b4da26ec4e683ce85a370b1b94d694aaa6e6d097c318d98159db0bc5,2025-03-18T17:15:40.837000 CVE-2023-2422,0,0,cdaa7a3c1d75ec6cc29c973b7051396a2bcf76a546a57bf5578bccba671b1335,2024-11-21T07:58:35.333000 -CVE-2023-24220,0,1,6ec08cf9a6b545eaaba7e55b0e65ace047ca3a7d0e35b1fc3e4163d998e6195d,2025-03-18T17:15:41.153000 -CVE-2023-24221,0,1,c4d6223fa9e06f5286acdcaee1852a58c19de8f426fe4e5005c23024865709ba,2025-03-18T17:15:41.430000 +CVE-2023-24220,0,0,6ec08cf9a6b545eaaba7e55b0e65ace047ca3a7d0e35b1fc3e4163d998e6195d,2025-03-18T17:15:41.153000 +CVE-2023-24221,0,0,c4d6223fa9e06f5286acdcaee1852a58c19de8f426fe4e5005c23024865709ba,2025-03-18T17:15:41.430000 CVE-2023-24229,0,0,cb2329f18a07f557c3ec2361cc5499e392f8d6aa55e2755f91c8c2e268fb4e10,2024-11-21T07:47:36.267000 CVE-2023-2423,0,0,b0aceeccf9918ba4134fcf0994d1e932b2bc2e7e34c0c0487f244901d0fd5386,2024-11-21T07:58:35.487000 CVE-2023-24230,0,0,fceeeac70c5f94ceb1d710f1d16fab57be1681255a826a33ddc124aade8d79a1,2024-11-21T07:47:36.487000 @@ -219515,8 +219515,8 @@ CVE-2023-24231,0,0,0f70e4ee8f938417d2450d4423a3bc413afba027804f186bc37661ea0d227 CVE-2023-24232,0,0,73544b8fbba877ab07d56f1fac8e55a711c2e27c125cd6915b45ca02de7a23c5,2024-11-21T07:47:36.770000 CVE-2023-24233,0,0,41c36165e563209729860af8bc408df31d43f14facc8e323ea9328b4339fb13b,2024-11-21T07:47:36.910000 CVE-2023-24234,0,0,6877ae5347fe0470f2cb179846a10fa6a967db658032820a039bfe9a7ff3fba9,2024-11-21T07:47:37.047000 -CVE-2023-24236,0,0,501daaa575b647484104607a96cc6dfa0dc2f193a652ca16174f108eb8044861,2024-11-21T07:47:37.187000 -CVE-2023-24238,0,0,242604f39d0b406cc6a5df57dd7c308d6a74c897ae28ca10d879e661e69121aa,2024-11-21T07:47:37.340000 +CVE-2023-24236,0,1,42d8e5ee4037886a9a9d433d50a128b15cad009d9a07c7667602281160230be2,2025-03-18T20:15:18.160000 +CVE-2023-24238,0,1,5dcf0ce275e37d6f172c8352749211b5172e69f929c0193dfe1944e29cea940a,2025-03-18T20:15:18.333000 CVE-2023-2424,0,0,de84e07149d399778643be6f6225095f082abe95f0fdf3826920beeae67fe8cb,2024-11-21T07:58:35.607000 CVE-2023-24241,0,0,d0a0431e351ad97a33f585790896c503627ac2b2500b33cde6718bb3dcab82a9,2024-11-21T07:47:37.510000 CVE-2023-24243,0,0,36fc21aa35395ba8b69e82d1e54379e77da7b0a1c569c6a09489059931c26638,2024-12-12T17:15:07.160000 @@ -219546,7 +219546,7 @@ CVE-2023-24317,0,0,e29969d3a23798cc443209fa7bb8c1eb64c8e7198066188a12f9c9059c158 CVE-2023-24320,0,0,a06ccb76b8359ddd026951d4c9f01aa1a570483368fbe3d654e83c19584d026f,2025-03-18T15:15:45.527000 CVE-2023-24322,0,0,aa2662241a351491e188599a93af1e72b85d820e46364a5ca410d2e1a0359aa6,2024-11-21T07:47:40.347000 CVE-2023-24323,0,0,8f65038f7feb34c5457f95aee0c1af72cd7780fcd174203cb004f42698c639de,2024-11-21T07:47:40.493000 -CVE-2023-24329,0,1,25ba4789fe083679ad4b0a10b95846feba2d5d3fcdb36e9bca0c5421ab98fd7b,2025-03-18T17:15:41.693000 +CVE-2023-24329,0,0,25ba4789fe083679ad4b0a10b95846feba2d5d3fcdb36e9bca0c5421ab98fd7b,2025-03-18T17:15:41.693000 CVE-2023-2433,0,0,e113a16badcc026aece5d41578ff5dd6199cec7c1a167f20161ed060e708b134,2024-11-21T07:58:36.573000 CVE-2023-24330,0,0,c0cc8f934a8beebcc3b20685583621b8b1a9753c26c039f5ca1fe7b6b383227a,2024-11-21T07:47:40.873000 CVE-2023-24331,0,0,e833adb1475e0e7527410f88e20f5e9e3f1227816e11695a963eaf43b235f597,2024-11-21T07:47:41.093000 @@ -219692,8 +219692,8 @@ CVE-2023-2448,0,0,598165d6264bdb057fc916211307605903168f4e4088b3a169f9a377b74fbf CVE-2023-24480,0,0,1886a51484d317c1d5906db126c181751fb1f482c1984ac434e31c7e76343f5d,2024-11-21T07:47:56.683000 CVE-2023-24481,0,0,20aafeaf7847f345c8542218664d1ca6505440d68b5c32bad9c306daeecb7dc6,2024-11-21T07:47:56.813000 CVE-2023-24482,0,0,9b707045f5289f365bd82ea8aabf048723d1b1f4309417b3bc373f210fbb1dce,2024-11-21T07:47:56.933000 -CVE-2023-24483,0,0,4c3b2e2905b29c4cf54642fdf24c1e5d62e8340785f51b1490407023bd9cfc52,2024-11-21T07:47:57.073000 -CVE-2023-24484,0,0,7eb37e207c2788d9163f8562637a18edb997c1ce6d7886bde6767952e5521b2a,2024-11-21T07:47:57.203000 +CVE-2023-24483,0,1,e32c225452706b4c21161d66f7a2c2ec630fc6fbe081c3014ad7cab480a835a3,2025-03-18T20:15:18.483000 +CVE-2023-24484,0,1,739c89d5037a3cba8634fd7f52680d03b827bebf958aad062137eea376583b16,2025-03-18T20:15:18.673000 CVE-2023-24485,0,0,a1f78a9aeb46bd80edc18bd4f7df772eccb0b8c91e380c8773f01fdc3d2b9c9c,2024-11-21T07:47:57.330000 CVE-2023-24486,0,0,d1eaef9d284962f2b1a35e417d9f83cee51845bfa411d276337a5a14b6b8f59c,2024-11-21T07:47:57.447000 CVE-2023-24487,0,0,f076fe05680277699cd8b502958fda2633af942fdee3a028a75401060a1abb13,2024-11-21T07:47:57.637000 @@ -219795,7 +219795,7 @@ CVE-2023-24577,0,0,803baab130dbdc11a6b4e0f96cdb5af9daec1cf31a749f2b8962bd4f494ec CVE-2023-24578,0,0,c302894c4fd5cfb331d56dd39844a9a73aae21da5075773c14ad158a1a974300,2025-02-27T21:15:18.077000 CVE-2023-24579,0,0,a23f96f93e220a78c285fa96dd65a2e6528af93236a37a41a753b56fefda5fe5,2025-03-03T20:15:37.980000 CVE-2023-2458,0,0,acfd5b885282c7e6afaed8740faec1aba3e88deca34c847707a023b5c339bd38,2024-11-21T07:58:39.313000 -CVE-2023-24580,0,0,4bbcbd678f42c51c370d13c219f4be0d8a8bf73b9a4a92a6ff7b907001e19952,2024-11-21T07:48:10.217000 +CVE-2023-24580,0,1,0e14bdd9324f924a5c50c99b4307d3bb986f68f4e30012de91acebab01cdd1ef,2025-03-18T20:15:18.837000 CVE-2023-24581,0,0,0d4eb66e34d1d1440ef98f57748e218ee16ff9cb194d51ca5529fab59db71e58,2024-11-21T07:48:10.390000 CVE-2023-24582,0,0,30a0c61419bb9a4c1447518f5b7252c86e2ba4d52a1c7be132bdc03f3b5d4cb3,2024-11-21T07:48:10.520000 CVE-2023-24583,0,0,9752b96da8d4a11b508b6d3d3fc4f5f2ca2ddc50efdd58c21b0e2586505f1055,2024-11-21T07:48:10.653000 @@ -221224,7 +221224,7 @@ CVE-2023-26309,0,0,61093b011c98723dc8364f656a18bab946f022a555ea61235ca31ae8e3d55 CVE-2023-2631,0,0,df8bd88a8e0f72471e805cbb0d3ee8a3e995f576d0b0cfcfff26991804be3bb7,2024-11-21T07:58:58.073000 CVE-2023-26310,0,0,9029115159a101e98a49525849647bc6cb27802b7c36329b34458bf4450a4ccc,2024-11-21T07:51:06.170000 CVE-2023-26311,0,0,479f4f634a844608e090406d4e0dd07e280952515c6dc8d7d8803cccba0d9db0,2024-11-21T07:51:06.317000 -CVE-2023-26314,0,1,183d40dd4049d2e3c229b0799edfe99e978e8205179e0b3297c240d0ab4c1363,2025-03-18T17:15:42.133000 +CVE-2023-26314,0,0,183d40dd4049d2e3c229b0799edfe99e978e8205179e0b3297c240d0ab4c1363,2025-03-18T17:15:42.133000 CVE-2023-26315,0,0,3f09140cbbf36bb90f39e0c9074ac3895a74279b625067b718d4bfafe0006248,2024-10-08T10:15:03.300000 CVE-2023-26316,0,0,abfb056b78f65acc405620682a982d8ae82b9e5d72030364560940b122776626,2024-11-21T07:51:06.657000 CVE-2023-26317,0,0,a50fc32d8011b97cc737e872f81fb2b86fff457be93c37ba85d4334efac1864f,2024-11-21T07:51:06.780000 @@ -221775,7 +221775,7 @@ CVE-2023-27107,0,0,e6a869423647989ad9390778f105dad2522c4f74ded7838327e13ca780866 CVE-2023-27108,0,0,1099d4cf449e520df3fbd66a5a4e50d6e79831543c9ea6178d1d6936cf0cdbc4,2025-01-30T17:15:13.723000 CVE-2023-2711,0,0,c43472a8c20d741979b439e3bc102f5f9559519492c61f60f11a183488cbe254,2024-11-21T07:59:08.223000 CVE-2023-27112,0,0,5c5c4d20697cffb0c2396d8d9309e3c7c0dabc04e28e147a972e2e61a0355fde,2025-03-13T21:15:37.520000 -CVE-2023-27113,0,1,69f951e5cf56a8ec96ccc8d77042164302255a7fe0df2bb41e8fc95199ed918d,2025-03-18T18:15:26.300000 +CVE-2023-27113,0,0,69f951e5cf56a8ec96ccc8d77042164302255a7fe0df2bb41e8fc95199ed918d,2025-03-18T18:15:26.300000 CVE-2023-27114,0,0,6d20106e26ce386d27e886e8c6bae4f20477e5dbadcd54bcb5e95825090db29d,2025-02-28T17:15:14.700000 CVE-2023-27115,0,0,b589180853fba8be593b3bbd8cb52a4af90c189fa4d468f80d19f72bb70c37b9,2025-02-28T17:15:14.880000 CVE-2023-27116,0,0,7d525dcb4562516f5c4677c4ad00b6ccdf54bca9cd52069a24c21acf3c3cdd6d,2024-11-21T07:52:21.647000 @@ -223822,7 +223822,7 @@ CVE-2023-29373,0,0,270d476731a85cd63c291e58603c75d0ed7fc1e9b98fefc1fc724cd6a3e37 CVE-2023-29374,0,0,05d9e7e4f9a15a1d0bedeea80fd7b3b538c7a3c199bea8839e3893e83404870f,2025-02-12T17:15:18.260000 CVE-2023-29375,0,0,c36a87ce03fed844189ada2f3d0d0b6776ce936ef348695cd06b1bb92f6222f0,2025-02-12T15:15:11.883000 CVE-2023-29376,0,0,ad99879985d5998c49f5d61784393df470a8be95a8f9d2de7f2e1321481e5789,2025-02-11T16:15:38.160000 -CVE-2023-2938,0,0,ae1b1490f8e930d6c1e06430e6b60a57af33e3a4cef078f1253795138e4d4a5b,2024-11-21T07:59:36.437000 +CVE-2023-2938,0,1,73bd83dc6c8a8d3ef89f2a0ab1d072d6c00417d96e37ffc39c9b7405fa5e78cc,2025-03-18T19:15:41.333000 CVE-2023-29380,0,0,0711eb7be4f03fd1502a0ae9c381550f4ab3a7750f4aa9a76c30fe001c8d1f3c,2025-01-13T22:15:10.087000 CVE-2023-29381,0,0,c629825ebceb6ac148ee623ca740247d071ad5fa60f244426c9cfb890242d000,2024-11-21T07:56:57.990000 CVE-2023-29382,0,0,7a13d1f0dedb5446ebc1fb5d9b9fac4d5b50aa76a25aca939baf3114814c3d8e,2024-11-21T07:56:58.210000 @@ -225025,7 +225025,7 @@ CVE-2023-31080,0,0,39a26574f36ed8dd0c9fd3a387a9dd657d7d5ad3d809d3e00a3a74a4b19ef CVE-2023-31081,0,0,d13875ba401a922862d07e377f4731883ace7ec34bcc115717207fa57c36fae4,2025-02-04T20:15:48.993000 CVE-2023-31082,0,0,622eb9692074f84ebebf1f6ccc63dfc5594b511731b33469e7c3fc69ecbf8e80,2024-11-21T08:01:22.690000 CVE-2023-31083,0,0,3261d84141eaade63cf05fc623c1810c9dc607b021d6caf0d4004db1cce5adb8,2024-11-21T08:01:22.833000 -CVE-2023-31084,0,0,2e8b15c0de406f2dbf7d7f9d2cd0b643d760ceac5dc426cca675a5100111ca51,2024-11-21T08:01:22.970000 +CVE-2023-31084,0,1,c78d7ed347a3cfe6f55c63a9d759ec33d7ecc4fd667ebe44b7c32f0b3d9ff5c5,2025-03-18T20:15:19.503000 CVE-2023-31085,0,0,cf6753305021fc68f489b3412a5c9cc2c76f2f94b3a4f04bd946e455240391f2,2024-11-21T08:01:23.170000 CVE-2023-31086,0,0,79834d2e469e9e19c28219e58bff5bf50dc1697b213a89a1e5045c043ce07650,2024-11-21T08:01:23.310000 CVE-2023-31087,0,0,b21cb6ea1662dc000d52a1f3d395f431da26df974532991d646b813d116bfc14,2024-11-21T08:01:23.423000 @@ -226816,7 +226816,7 @@ CVE-2023-33246,0,0,e0e1074e039e492ac8b05c907dece4a2a221f948b1dbdf7cc9a00460cd7a5 CVE-2023-33247,0,0,28e3bb5766ab12affc427d3366ffd23fb9c14a844b84b4947c8ef44e558c8843,2025-01-16T16:15:29.437000 CVE-2023-33248,0,0,e14495edb77049f2c89ed0c54ad4447d666394f95d323f14cd348a126ba1d6bb,2025-01-16T16:15:29.630000 CVE-2023-3325,0,0,7efdbd196c90142bd5bd8f5c064614d6c4e96a5dcdb6f4c022ddfa4dae0b97ac,2024-11-21T08:17:01.167000 -CVE-2023-33250,0,0,eb61d77835057b442e830c5c7e9bf889618033fc786a0dc98aa2177edc1a394e,2024-11-21T08:05:15.727000 +CVE-2023-33250,0,1,d3b42881cae49eb2a99b3d6c0466f926cc2595d0ed07bf2270c06c60df955c7a,2025-03-18T19:15:41.573000 CVE-2023-33251,0,0,ac0a509818d0e51ec2f13f988ec2b36be8e317dde0c87640a6ebfdadb4f27fca,2025-01-31T16:15:29.970000 CVE-2023-33252,0,0,df5bdae2bc2b4b06d6c84383e28e19282ea433580918135677d72a650cccd2f8,2025-01-21T17:15:13.617000 CVE-2023-33253,0,0,4a593ab7b70d2464d3eb85991e7f64274fa7eb8500a3d2ed4be96f94a2764a25,2024-11-21T08:05:16.260000 @@ -226847,7 +226847,7 @@ CVE-2023-33283,0,0,e3c0431f01e27d85457d31c72e20d8bfd74006a2c83ee61b994e55fb29b64 CVE-2023-33284,0,0,d0da5008a48df8a13ca95a55afa039e69b1f0015e97eafe62f93398991b7e5f0,2025-01-07T16:15:30.170000 CVE-2023-33285,0,0,30741f1677c923d9321a174f24cbcfbb45d70b7fa16adbecc164042f72c69993,2024-11-21T08:05:20.157000 CVE-2023-33287,0,0,4589690dfbbc05dbf65975779ea5f06e069047b263db7ad14eeef921b27b9778,2025-01-10T16:15:26.393000 -CVE-2023-33288,0,0,26838f7327104c1b47d024f5db0a9eb1c2668da883675bbf3c61e6d3c54ee2da,2024-11-21T08:05:20.497000 +CVE-2023-33288,0,1,7cb759f595a305db9436ae63536dc1f304c9b36b0daa032f96a18e8b3f18cd34,2025-03-18T19:15:41.793000 CVE-2023-33289,0,0,f7fa52dcf4815a7bc1f7607ba8a52d04f13067851cb6faf3eeaff67eb8b78efb,2025-03-08T16:15:34.550000 CVE-2023-3329,0,0,3e639db55d9b83618de638ac73b22a875829db310a8f87faef030071a6e573a8,2024-11-21T08:17:01.620000 CVE-2023-33290,0,0,bc6a69010fb5c4656505a017a49e45680fe2923b4184f220645c15aeaaf633ad,2024-11-21T08:05:20.870000 @@ -227735,13 +227735,13 @@ CVE-2023-34394,0,0,5024dd48b5a3dae7028cef62d61893803441cad1bf0497670d85da6b8c674 CVE-2023-34395,0,0,6b27da8fd46729cf8e00b5b710b84600fc46a48029d9eace73be2c1175bddefe,2024-11-21T08:07:10.127000 CVE-2023-34396,0,0,cabb805a02df64f428d581ac19cc4a5993ad0b37fa13e2c2b635c0e2751edd5c,2025-02-13T17:16:36.117000 CVE-2023-34397,0,0,1d943979cf5579247fa772a6ac32f44fec357e0b814011be37a21816a4101434,2025-02-18T18:15:14.710000 -CVE-2023-34398,0,1,2b874fc1698690c359223ec692ee5d1dd0b476c300de9cd48710973b676e5698,2025-03-18T18:15:26.457000 +CVE-2023-34398,0,0,2b874fc1698690c359223ec692ee5d1dd0b476c300de9cd48710973b676e5698,2025-03-18T18:15:26.457000 CVE-2023-34399,0,0,74b2b0691c171ae39f96d97caeb3a894d04d1c3b7d5650834d472fd56796ab54,2025-02-18T18:15:14.933000 CVE-2023-3440,0,0,c3a148f8bda83f5626794fbc68f98a1dc6c64d7bea5c4682462694a567b20fe9,2024-11-21T08:17:16.337000 -CVE-2023-34400,0,0,37db130192f08f6dcbb2d615cfc31c4237e0ea5e7fbac9d725832b4d1b0cd355,2025-02-18T18:15:15.043000 +CVE-2023-34400,0,1,d815205188c397b19bff0bcb4a1d4c64d706226063d57f6141ebabe43c406748,2025-03-18T20:15:19.913000 CVE-2023-34401,0,0,ab81635347d28735eac8d098569dae3fde7ef9c7481f02f774c73c812933749e,2025-03-18T16:15:19.893000 CVE-2023-34402,0,0,24a9d51756ef54ad82e66adff02724a6e51706ca15efbc51e7291ba30bdb2e17,2025-03-14T18:15:26.363000 -CVE-2023-34403,0,1,a216696a0e1058e036112655d5e320bd27379f159451f020c82fdc5e8aae8aad,2025-03-18T17:15:42.447000 +CVE-2023-34403,0,0,a216696a0e1058e036112655d5e320bd27379f159451f020c82fdc5e8aae8aad,2025-03-18T17:15:42.447000 CVE-2023-34404,0,0,07c8cf483499a62ad9c421829ca19bb311da173aa05ab9b5c82f0534ddb106b5,2025-03-17T19:15:20.573000 CVE-2023-34406,0,0,9b6888848e3b4a7c09ba80692e12064715ce0e36a902a3a5bcb1e05ef364ae95,2025-03-17T19:15:20.787000 CVE-2023-34407,0,0,feb0cd99a613c0605481c85d03f4038aed84545414c9a8173ba7dd7d0782d2cd,2025-01-08T17:15:13.003000 @@ -229523,12 +229523,12 @@ CVE-2023-37018,0,0,8f77c0ecd95c5d8d12253d6e8e688c2ed6a5f2a0e2c4252db0343baa2403a CVE-2023-37019,0,0,bcb6fca22eb20d93dbe0ed3f965b31a2f608bc4b64914471f0d3fd09827b3d33,2025-02-06T22:15:36.743000 CVE-2023-37020,0,0,33b6c9b931d31b797e658d571ef8a6ca688f33fbb706d4af9923099a60bb8051,2025-02-06T22:15:36.887000 CVE-2023-37021,0,0,614b26c9dbf16d69560ec2488cf9420ce2338ee5379c9d4cbb265ec52e178561,2025-02-06T22:15:37.020000 -CVE-2023-37022,0,0,d66ad21bb13a58e9544c9d3a66c2f26f054e308d3e7db44423dbd440289fbcdb,2025-02-18T20:15:17.057000 +CVE-2023-37022,0,1,56dc2116ec18cca4bbc887c63800a998d24a1305f1b4d33108e03d511c92e8de,2025-03-18T19:15:42 CVE-2023-37023,0,0,95d76efa35f99ef0d2baae13dadad518ac193033703ef87fb99d07dd7638ad47,2025-02-06T22:15:37.160000 CVE-2023-37024,0,0,28967aac55fbd7b222ed455a0d456ee948c80a50d1756dd7a2e45a44c9f7945e,2025-03-03T15:45:33.793000 CVE-2023-37025,0,0,77c1294c5aa8a4943ae1a86efbaa17b2b041458d7c5ba1e0b2c03a4773357001,2025-03-03T15:35:21.507000 CVE-2023-37026,0,0,8eab3a5e5adc721abaa78110785c0482be7212f7f8300b747c28ffc8050c90cc,2025-03-03T15:33:16.297000 -CVE-2023-37027,0,0,c36b42843ce19e588d1e4e58735698ff3038099b16cf4d264e8daf0abd9f8a52,2025-03-03T15:31:04.120000 +CVE-2023-37027,0,1,01c615a5df36913e23bebbff6f3031f342d672dc70c9ed5077d2f050ca8b615f,2025-03-18T20:15:20.130000 CVE-2023-37028,0,0,7c76ac86b3b448f9ad876118d0475e4da13bb6b986ab50edecfc9655d6ee78b3,2025-03-13T20:15:15.103000 CVE-2023-37029,0,0,20555aa0e429f62fcc758a828ad1093a7dcae95378abc0a82b9d5583c33dcd36,2025-01-27T14:39:48.927000 CVE-2023-3703,0,0,e793c1538a953443cfd9717dd4892eed9653e7e0e15a19f28233b00c03531ba9,2024-11-21T08:17:52.740000 @@ -229546,7 +229546,7 @@ CVE-2023-3704,0,0,f6e670c2d83474f0123d0af7a87775cbeb898fda49a9a2d86b14ac103d6732 CVE-2023-37049,0,0,a50fac4cd820db018d62b9574142c1c91225888e27f635ecbb9c39f9da56db63,2024-11-21T08:11:00.767000 CVE-2023-3705,0,0,23dfb658d5461b0c5cf9acca3f38c99662f0d860aba88f7cd6064100050ddcda,2024-11-21T08:17:53.087000 CVE-2023-37057,0,0,c8229322c4edeb01490a83f15b36de0847266e7dd63b98a3543907215d1dc5a2,2025-03-14T20:15:12.080000 -CVE-2023-37058,0,0,30e98892f4af15e92872a2eba222ea7d2848439ec3b292638870b72827d41390,2024-11-21T08:11:01.153000 +CVE-2023-37058,0,1,7c855f3f5be1c7182901e2cfbdc88f95586fecfcf2025efd3e9db9bb77ed36d1,2025-03-18T20:15:20.283000 CVE-2023-3706,0,0,5f5d72873f4f2d401a70cc405ade542598fce76c730db1532343687332221a1f,2024-11-21T08:17:53.240000 CVE-2023-37061,0,0,24542ed2f0e9c1def4b6ad5c5c43f38015688762df80453af6e23ff749304b74,2024-11-21T08:11:01.330000 CVE-2023-37062,0,0,f79a24a1ada95b6d57031d70540764766206906a82e69ff050f285631c6a2d28,2024-11-21T08:11:01.500000 @@ -232636,7 +232636,7 @@ CVE-2023-4074,0,0,2d4744c0f8caf0075ffb1edd26feec64bacf9fefe7fc56453d847bcb12658a CVE-2023-40743,0,0,b25223a8b0d1b9dac19333058c77608cbb322cdf4b0ea18243a08af616b72526,2025-02-13T17:17:05.030000 CVE-2023-40744,0,0,bd2ca97004f8ab866b5a6f1be3d1e9b3c291466120a8c648383110306df29689,2023-11-07T04:20:21.733000 CVE-2023-40745,0,0,371d35ce6bbae9cfdd9f82b97f8f76ad4b4c094b123b8abebb2a82aebc63e9e2,2024-11-21T08:20:03.463000 -CVE-2023-40747,0,0,3ea4d0e9bd81112435ca2f6bbb46fd509583fd7d61006fb681ee64a1de208310,2024-11-21T08:20:03.600000 +CVE-2023-40747,0,1,5197f8b2ec01fc78c41e89fb190110bef531ae4a50b304a7cbeebff8e9b827c7,2025-03-18T20:15:20.477000 CVE-2023-40748,0,0,88a151f8a8a4dc2019b3c2cc858f7476f5f0769aeba7148828a20c100334d881,2024-11-21T08:20:03.783000 CVE-2023-40749,0,0,c1c24c52c2d9a8c89109da6bbc34a30c027066177f4b0f964ba1c948f5aaf0bb,2024-11-21T08:20:03.967000 CVE-2023-4075,0,0,fcb6c63d36e853a302b66443a768c38022d694bdc756902c3dcdb42444a234b9,2024-11-21T08:34:21.327000 @@ -232691,7 +232691,7 @@ CVE-2023-40826,0,0,e9f4d7f9d2fd695a201cd2f395175740b22b40a49f04635dd7b6d0b086c96 CVE-2023-40827,0,0,0b43787a91771288fab4ff1d27afdd33f352ce2fb508316c4dc60f3f9cebb467,2024-11-21T08:20:10.930000 CVE-2023-40828,0,0,7134f4f2b9bdffbd4a315544686187b89420e3af6d1bad0e04b608e0d177b44d,2024-11-21T08:20:11.070000 CVE-2023-40829,0,0,c85c637fc7d47ff6c8a52d81c422c8822461720dd029a50aa31b7aa1732d6102,2024-11-21T08:20:11.227000 -CVE-2023-40830,0,1,026e7b637abe7104626c82754f929bbb4aa8362ea3331c75a7cd5f9470f038bf,2025-03-18T18:15:26.607000 +CVE-2023-40830,0,0,026e7b637abe7104626c82754f929bbb4aa8362ea3331c75a7cd5f9470f038bf,2025-03-18T18:15:26.607000 CVE-2023-40833,0,0,6a631053bfe80224c8f3df334d8d7fed00a502e7dadbe50344e421bdee1ca55a,2024-11-21T08:20:11.523000 CVE-2023-40834,0,0,4c374e01ee47093cb6b7e0c445c6141c5286933fa88755b17baab98d0ed61068,2024-11-21T08:20:11.673000 CVE-2023-40837,0,0,af0d918a8985c447f3a2fd2c5efc7b96a3e10ad8d077a50d12f5e97298a07b34,2024-11-21T08:20:11.830000 @@ -234896,7 +234896,7 @@ CVE-2023-43847,0,0,788f48db17c9e7d90446b84fbb431f0eec33e4bc06f65e99d7d1fad657981 CVE-2023-43848,0,0,6f24e2e1c67ef687dd6cdb598f5fa0b2e297c6a047082773cfac2b0755c03cde,2024-11-21T08:24:53.433000 CVE-2023-43849,0,0,cbe0932bd7f85d0e50434c6538afbc2a43672e762f308e3ab85b9e5026700a44,2024-11-21T08:24:53.620000 CVE-2023-4385,0,0,651b47d9b510c0a2bda1b759e47b7d009e2cd378a07932979b0865965adb2231,2024-11-21T08:34:58.953000 -CVE-2023-43850,0,0,487819f9a4107d571ce2bf601300c8ac91e43295246e0b3bd951c85a568383e7,2025-02-10T23:15:11.437000 +CVE-2023-43850,0,1,b48ea3d02d13ae35d5398edd3fe6706d5e7847724a8254787975b3bad9093d8f,2025-03-18T19:15:42.163000 CVE-2023-43851,0,0,03ca69ff19b0ef9dcd7bf74c0d9de932b636210386a8111c5b45b97a8dd753d9,2023-12-26T18:15:07.987000 CVE-2023-43856,0,0,83799cd53898983eaafae74ad599753af397c399a9ff1c50e69765769cd6c4fb,2024-11-21T08:24:53.960000 CVE-2023-43857,0,0,b162616367c195d6e726df46bb96723720a427d94af78907e9f59c2073b7b375,2024-11-21T08:24:54.103000 @@ -238694,7 +238694,7 @@ CVE-2023-49105,0,0,57ea19ba2757cb0204c2ecac3a330f28472b520b37e1e16a099f8ba9ee500 CVE-2023-49106,0,0,af1d530882fae69f2f5601e08d91b3477b2e86275ef0f5d38e8ffbb551764592,2024-11-21T08:32:50.420000 CVE-2023-49107,0,0,15c6c78af987ac1a6fd2af8dde2078bdc1b6490a345e2093e4f040090109db7c,2024-11-21T08:32:50.550000 CVE-2023-49108,0,0,13fce593a34fb8b794d3785a1e07d4047563aba128c4a14dfb0063d6834d5fe3,2024-11-21T08:32:50.673000 -CVE-2023-49109,0,1,4e3fcac55647a0d8458b7ce0fedc17d893d94138b01ce3be63ca7bd3a380ee56,2025-03-18T17:37:00.060000 +CVE-2023-49109,0,0,4e3fcac55647a0d8458b7ce0fedc17d893d94138b01ce3be63ca7bd3a380ee56,2025-03-18T17:37:00.060000 CVE-2023-4911,0,0,8c7d09f1688a467d8fb9e5ce9f82cfd37b0f6673c8f041439a6fa24021dc3309,2025-01-27T21:45:46.857000 CVE-2023-49110,0,0,a1bbb45f4a96757275295f97a0674fb7c93e72998d5eb9340d7f0c83127b7f17,2024-11-21T08:32:50.980000 CVE-2023-49111,0,0,5d69d06a2c7e1a6f756073bf456e5d1dbac3d4b05a2908316cf5f6c8ca69aebb,2024-11-21T08:32:51.160000 @@ -238826,7 +238826,7 @@ CVE-2023-49246,0,0,a39e889fb2e93e91d6cc9821c6251558ccba6271a430edb7d19e90cb5f12a CVE-2023-49247,0,0,220538fab1017fc8798a6caffcfc69f4183b72999c8a79565731864e550bcf8e,2024-11-21T08:33:06.907000 CVE-2023-49248,0,0,65b743e0f24105ad4b6172550010e188c63e389f083561a3e29f7bbe8866fa7f,2024-11-21T08:33:07.037000 CVE-2023-4925,0,0,4eefaffa5744795223d19816c967470168d0e5c49509550a492fd496681c7eb2,2024-11-21T08:36:16.843000 -CVE-2023-49250,0,1,03eeeadb21eed30cc92cac40097cf560d1ad23000fe85bd5156a232e8a4ef350,2025-03-18T17:37:50.467000 +CVE-2023-49250,0,0,03eeeadb21eed30cc92cac40097cf560d1ad23000fe85bd5156a232e8a4ef350,2025-03-18T17:37:50.467000 CVE-2023-49251,0,0,01ca2beaf55c18d1be789df49fc505c84be3a39a54948a0d4102115385e1af49,2024-11-21T08:33:07.323000 CVE-2023-49252,0,0,31d6e12391faa1705447ae9df7eec645cf78cd359e8def8e22dbaae5739e95f1,2024-11-21T08:33:07.477000 CVE-2023-49253,0,0,6bcc1caa4fe1d5c3fb930e1e6d020cd5af57d2e223b7cbb7cd40bd8b4d0fed53,2024-11-21T08:33:07.623000 @@ -239544,7 +239544,7 @@ CVE-2023-50267,0,0,36863b37e2acd610822d4f35a8b9d5abcdb3a22c51b9b84ab7daf9ec2e976 CVE-2023-50268,0,0,50f7c522c5f8c148dff99ae2bcad7f2381407b298265ac102c5d6de84771a495,2024-11-21T08:36:47.253000 CVE-2023-50269,0,0,0e1957df039a56b0ade1988387baae8647e791ecdaa172e7a29f2e50d1816b94,2024-11-21T08:36:47.383000 CVE-2023-5027,0,0,1fe824df54b01e2336a5564d1b7eeafa86f4d4f9b0e9ece2e763d1cf23e9856d,2024-11-21T08:40:55.287000 -CVE-2023-50270,0,1,875447c471c85ea667c05d53eff0239c3c8049b5a59818290545525411158c8c,2025-03-18T17:38:29.743000 +CVE-2023-50270,0,0,875447c471c85ea667c05d53eff0239c3c8049b5a59818290545525411158c8c,2025-03-18T17:38:29.743000 CVE-2023-50271,0,0,5411a8317341660a0eb368d135720a62f340415b2935e8ff756b4fafb91dbe6d,2024-11-21T08:36:47.757000 CVE-2023-50272,0,0,cdc5b7cb0e03ef1a3c99a0370b439be2fd3bd1242223f4d0ecd35ebf66189001,2024-11-21T08:36:47.940000 CVE-2023-50274,0,0,e3968a6d9eae1df1f36f3b86f2d2d9bf4ad16d5427ae8ace26bdd39fc44c01fe,2024-11-21T08:36:48.087000 @@ -239808,7 +239808,7 @@ CVE-2023-50785,0,0,04d09dececbdc3b8babc46de7b6d85787f302133d45e1225dfdddd4d21f84 CVE-2023-5079,0,0,4d36ea6ee96620d3a4c4792c8036fe077bb40efeb13eab11aaf850251e9ea8d3,2024-11-21T08:41:01.513000 CVE-2023-5080,0,0,02339a01b1b6ff5fdf4d2ffb54b376d5f6ec3116879991b7f4f1d96a4548d024,2024-11-21T08:41:01.643000 CVE-2023-50803,0,0,266d81a4d6d4530ab8237d281ecc5bf2ca4948455b03314c272985e31769da35,2024-11-21T08:37:19.013000 -CVE-2023-50804,0,0,cbe7cb6c008e29d9a96e72f75fa201d45c85ee960df45650a3d47f1ea42bde8e,2024-11-21T08:37:19.220000 +CVE-2023-50804,0,1,e4f3123dbbed0601dedc44ea4a38bcfdae8ae1fab265aead6230d76b5b679419,2025-03-18T20:15:20.650000 CVE-2023-50805,0,0,1937615f50f51f5e2beafe571f41c71b6bc529f2c28f6d3f6af88cd98641ef3a,2024-11-25T16:15:11.600000 CVE-2023-50806,0,0,4eeab4e937336f4a2140e70a813130add934a7ec394e21b7b1cf058fbd51517f,2024-11-21T08:37:19.560000 CVE-2023-50807,0,0,b0b9757e298c26dd0e1c686ea742ae48c8c7dc71b11e740a02b88f6dd5f16b48,2024-11-21T08:37:19.730000 @@ -246753,7 +246753,7 @@ CVE-2024-12571,0,0,4f61ab2b24612e0b1a75d43cf9d9be2b77f4416d126de6e970d9338abb76a CVE-2024-12572,0,0,b5830ae1a3c6182c738f484a7555b2d49502aecd75946e90268f33cb1f4e6fca,2024-12-13T04:15:05.233000 CVE-2024-12574,0,0,22d90c2cfc66a6e55649293fae24817d92e89a03bfa8e0d56af714629ad6f2a8,2024-12-13T05:15:07.310000 CVE-2024-12576,0,0,48cdf4e9bf26ffb9d751f7f8fea321a136b4a6a053294ac8b3c1430f985a70ff,2025-03-07T20:15:36.903000 -CVE-2024-12577,0,0,edfb4431135d326072be676db873f219de9a03f818b983cea16c73c5ae5345e3,2025-02-22T15:15:10.227000 +CVE-2024-12577,0,1,29779c21c3bcd2f4456130ed77e5700184f9b6ea87e020d0399ec01eaf8fe9c6,2025-03-18T20:15:20.827000 CVE-2024-12578,0,0,9683da78c95f4de0afe4f169763bacae0c8e4e48d594e85dbc7c32bda1c6eab5,2024-12-14T05:15:12 CVE-2024-12579,0,0,6b066a632ed42755872bfe12897131044e41b00627589546ab36be31d813b6f2,2024-12-13T05:15:07.473000 CVE-2024-1258,0,0,36d421eec5fc7cce6382fad9fd3a9a8780da80fcb6e09fc8e5e480709b2e6caa,2024-11-21T08:50:10.573000 @@ -249576,7 +249576,7 @@ CVE-2024-21160,0,0,682b113f0ab5e67f54e6f9c1540a647f198391e8c03fe35135f65b3d3e0f3 CVE-2024-21161,0,0,373b5050fd44a995656dcf00f8ca1a8ae44fb30dde422db248bfe709d6c07d21,2024-11-21T08:53:54.160000 CVE-2024-21162,0,0,b167ca3f5e6eb1d829a66671152027eba0422ffba46e59b6bf288eebefc30ee8,2024-11-21T08:53:54.277000 CVE-2024-21163,0,0,3f9ff522a7e3208378a5962b8a62ba6fa5d09a853a4c6f834c9415a809343380,2025-03-17T19:15:21.793000 -CVE-2024-21164,0,0,0223054a02dab4fd1a7cc1f19db848cc375a1df6ad53852756cd92b6fad7c00c,2024-11-21T08:53:54.513000 +CVE-2024-21164,0,1,60ed2ad5154234319e608909d6aa6b8df5a629e4fa60a5cff387bbe8786b34cc,2025-03-18T19:15:42.340000 CVE-2024-21165,0,0,417344df57040d35891dff84c166bd2e20a64c611f463e5d4283fcdf4d5dd6e6,2024-11-21T08:53:54.637000 CVE-2024-21166,0,0,a6bd0bb0f14f87d2cb260b91d37d1eb7d306bf89d70257e59bc4b4cc9def75a6,2024-11-21T08:53:54.760000 CVE-2024-21167,0,0,432ec591febd00b127b82a752135eda1c54e57e24bfd3147b2b0c6e5e2008ae0,2024-12-05T21:40:35.573000 @@ -250433,7 +250433,7 @@ CVE-2024-22098,0,0,aa82bbcfcdad7de5e03fc60fafc6844d23ca04b30a801f37c32f229b85434 CVE-2024-22099,0,0,75ad05582a518a6415fee06854acce0c6394538f81aa2b280a37411acaf025a1,2025-02-13T18:16:46.170000 CVE-2024-2210,0,0,da1521e1cef2111f87a1a3b2fe9e61bbb71577442f9c284d3c4d916ad34e1b56,2025-01-28T20:21:57.503000 CVE-2024-22100,0,0,8e4bf8ca413a69b45d89e2ddf6698ba231727ef741ee4383338cb60f29a6f0b6,2025-03-06T19:29:28.210000 -CVE-2024-22102,0,0,84892b7b6e5d83a9d6c16f8dffd5e79d322057a8d97be177a66169a0e45abea6,2024-11-21T08:55:35.143000 +CVE-2024-22102,0,1,ec26d378e04faf63d88a776649bd4e6f0ea387017dc802f7c5a1cebed4ee3f33,2025-03-18T20:15:21 CVE-2024-22103,0,0,21b0d01eb857ccfc96a63302f1d9c85525df74135dcbdd1b5b1e8e0e0ba5b800,2024-11-21T08:55:35.383000 CVE-2024-22104,0,0,f7ff32e7e1e96b051122bb26df5e27628d7f5d0c5085d81ea1aacc226d401b3c,2024-11-21T08:55:35.653000 CVE-2024-22105,0,0,c3e49e4e5daf52387190128b0def861d8bea08f1b064bab66990fc03aabb7dbd,2025-03-13T20:15:17.547000 @@ -251036,7 +251036,7 @@ CVE-2024-23084,0,0,57dcee85b27ce9ed8cd7baa959eea8645979790b952aebb9618ae26f5e791 CVE-2024-23085,0,0,d8b4ac64601667eedf47541915e319241fd36a7e223ec76d12fbe9a4e8432472,2024-11-21T08:56:55.593000 CVE-2024-23086,0,0,aa8172f2fa31bcb749c80ff482b6ade320d9247c77116222dcb7ed48290c2b5c,2024-11-21T08:56:55.857000 CVE-2024-2309,0,0,00482dd6afa1bb3f23be13a11652136705874165a9938d56801a99d93396d16b,2024-11-21T09:09:28.643000 -CVE-2024-23091,0,0,ac809bd19f7e627635a79d83b5695bf1c2fb09ece061006c0f1815b6022ecf36,2024-11-21T08:56:56.073000 +CVE-2024-23091,0,1,e6588c9e92047609783bddfe3adf4d120902bd35bbcac1736998ed4617bc248b,2025-03-18T20:15:21.267000 CVE-2024-23094,0,0,39856c4da401f038553ce13c83297dd603ae7bf5ca4cf6ae32992dbd89dce5ce,2024-11-21T08:56:56.250000 CVE-2024-2310,0,0,b6f8a00e8715d4b3b60be0214b575fc22e21dc1cce049eb25d1bfde853925611,2024-11-21T09:09:28.823000 CVE-2024-23105,0,0,cc92d5b7f0e64822efb2303bf788a510716bf4a22d1dd8fe4f1ced2ca7c2db73,2024-11-21T08:56:56.483000 @@ -251255,7 +251255,7 @@ CVE-2024-23316,0,0,77a5a935cbef327acd67ebc87bd460467d5092bf8f49de3609b9191364fdf CVE-2024-23317,0,0,e6b9da68990e4912ca91ef806a26a48f43c274564774fe76fbd2dacd1f40fbb3,2024-11-21T08:57:29.543000 CVE-2024-23319,0,0,cb939b1af27706b0b9d965b80fff3b0b48221e1917b0fb384d70e0953046b7a0,2024-11-21T08:57:29.683000 CVE-2024-2332,0,0,22fcecd0efe7e826547c745f5884287caa655cdd7bc975f499fc3e660dc05509,2025-02-18T16:17:02.050000 -CVE-2024-23320,0,1,e437be687e7a5d5e86d2b8ca088612dd9f61e21ae48eef83d92e7b867559e026,2025-03-18T17:54:12.460000 +CVE-2024-23320,0,0,e437be687e7a5d5e86d2b8ca088612dd9f61e21ae48eef83d92e7b867559e026,2025-03-18T17:54:12.460000 CVE-2024-23321,0,0,7682ed0399d43e472433618b8bab56c7d3c04a20e5f559c1c72b10263abb2d72,2025-02-13T18:17:02.573000 CVE-2024-23322,0,0,0cedd9112f57f1ccea80b0ceb4198f638a5950e1d187eb161d7d108eeb3da784,2024-11-21T08:57:30.260000 CVE-2024-23323,0,0,ba97bb697e26525e45b3b714d850c601b8e32f1ccf14321eb1ab6389c067b4f9,2024-11-21T08:57:30.403000 @@ -251428,7 +251428,7 @@ CVE-2024-23480,0,0,025c7eb2d6c89195d1224a785fb401b3f275526740ca573220e73be3418a8 CVE-2024-23482,0,0,4b389b98a808a2c0d010bfe0434e5630a4beaa7e23d705f0b8e0cfd92924ef60,2024-11-21T08:57:48.240000 CVE-2024-23483,0,0,35765b9f4b356e15e6e9871c794545e74df2d881a1951513f786aedadb918849,2024-08-07T21:23:09.080000 CVE-2024-23485,0,0,404b0dd0c57a14646a247c565360895178a1dd9620d1a334ace32f573a870cc9,2024-11-21T08:57:48.497000 -CVE-2024-23486,0,0,17fd313f6701c516294ce7a750a27ded8ac5ba56a30197c75d7299cbaabe23a3,2024-11-21T08:57:48.630000 +CVE-2024-23486,0,1,ed2598e2f88fe49bf0218fd40605c2630c4c1564567e0e253034614797833dfe,2025-03-18T20:15:21.460000 CVE-2024-23487,0,0,a6c554adaa70f1b163226eaee0b255fa9779c4866103e57e83bfc3ddafbf5afe,2024-11-21T08:57:48.820000 CVE-2024-23488,0,0,3d64aa440499d35f614198bd6e8c86d15311f90ac0c0cafd2949318f5e0ae3ab,2024-11-21T08:57:48.947000 CVE-2024-23489,0,0,2c1f41bfc06e937495a00039461f457ae70c5f16673b77f91a8eedeeed9812e7,2024-09-12T18:11:09.677000 @@ -251667,7 +251667,7 @@ CVE-2024-23759,0,0,d63ec419c4c029202f3754648f2eb7717042b9076ca63c1c1f631684b4092 CVE-2024-2376,0,0,8a8f23c5e61e7fd977ef7f7329d9a59314850c5761ba91c0a3b410fa76dda3a2,2024-11-21T09:09:37.133000 CVE-2024-23760,0,0,757386a76a0bdeecbd757aee3197b9c54f0fa0d0230b891441bc9ab589ba1f08,2024-11-21T08:58:20.380000 CVE-2024-23761,0,0,1b2283b5cc3be44129a8849531020d60314a5eafe8e9240dc27bf83b1d44f59c,2024-11-21T08:58:20.540000 -CVE-2024-23762,0,0,398f153b574209edd2c8610bf5c18d78742c152a5660efdd254cb3333d4c1e2a,2024-11-21T08:58:20.780000 +CVE-2024-23762,0,1,0df698d61985e934264bcdefde81895921402c4bbbad0df6877b10688fd7f894,2025-03-18T20:15:21.623000 CVE-2024-23763,0,0,165ae01a0723cf3b388bf8739a539bcd1c072e2735fdf7095bbffc870ae9865b,2024-11-21T08:58:20.930000 CVE-2024-23764,0,0,94fde96016e5732e6e16a10adf620f4dab64d9cccf933b193bff6f4b74a27707,2024-11-21T08:58:21.073000 CVE-2024-23765,0,0,1b21c24e6a41ee7b26769e9cd8dba3c39d5992a3eba810fe76e8de0c72fc54ac,2024-11-21T08:58:21.233000 @@ -251834,8 +251834,8 @@ CVE-2024-23921,0,0,692f17097dfddcd9bed2a9c610a61636c59b70850e7f3ecef876332bc741e CVE-2024-23922,0,0,2d559582d23c0b1aa77c5c48b51f0b0c564ebc51a759834728fd4f27625943e0,2024-09-30T15:37:28.453000 CVE-2024-23923,0,0,2b299af07539c6b04589d5f4cb78313212c713b14e6f4111f325ca8810b2cf16,2024-10-03T18:07:35.977000 CVE-2024-23924,0,0,465231a82fd4648306cddbdcd0ef7925a0538a8b613742d6302b13e6441b1caf,2024-10-03T18:06:54.180000 -CVE-2024-23928,0,1,982fb8a6dbe651d1e8122a611085aa648fb7582c092b635df6263ef266b4edaa,2025-03-18T18:15:26.757000 -CVE-2024-23929,0,0,e082798fa0bd13fc0cf1f3e8701facefad2a15d9a2db55de5d28ffbeac1458ab,2025-02-18T19:15:14.883000 +CVE-2024-23928,0,0,982fb8a6dbe651d1e8122a611085aa648fb7582c092b635df6263ef266b4edaa,2025-03-18T18:15:26.757000 +CVE-2024-23929,0,1,98b80cafdf8579552f2ad620406cc3dddef604972f2b6ea69a9701f8b351a1a9,2025-03-18T20:15:21.787000 CVE-2024-2393,0,0,e1f7416afb0d3dd6d4e614fbf7a14456c46925ea34c7eaf87ef76f8addbeb770,2025-02-18T16:20:38.263000 CVE-2024-23930,0,0,df289dfecd334ee530f5e32c563493e2769f96df68cc173a7e05a2e4c1e28769,2025-01-31T16:15:33.767000 CVE-2024-23933,0,0,6e0264d60bdca018c9852dbb20a796ffa59d13b4560a2a230bcb40ba87c1d7f2,2024-09-26T13:32:55.343000 @@ -252088,7 +252088,7 @@ CVE-2024-2442,0,0,253b87e62399d3a6af245d178e21fd710ca2545ac6e1dfd17779d2dcf3253a CVE-2024-24420,0,0,a9427fa07db4986b0d9c0e963da0c4c6a915285d7c2c249b528b587f5ffa804d,2025-02-18T21:15:20.800000 CVE-2024-24421,0,0,97a85089fd7991d19460b26cfacbebab9e686820dc534e03e0b00953674d1be4,2025-02-18T21:15:20.973000 CVE-2024-24422,0,0,880bfd6c9396281614ba81f8dd610f47d3689bbb0133e6a43850002af7027433,2025-02-18T21:15:21.150000 -CVE-2024-24423,0,0,6b6f834afc058c764916dc1d6b7a19e589483d459aa677f142f8038284074941,2025-02-18T21:15:21.310000 +CVE-2024-24423,0,1,2121b9c97716cc2d66ab960276b0a7ffe452fd6d2561b1b2c197696cdf4f4830,2025-03-18T19:15:42.503000 CVE-2024-24424,0,0,c7c1f65a8bf5b7819bfe95e7f58b682fa72633acefcfa8308066d9af4263deb3,2025-03-14T16:15:29.560000 CVE-2024-24425,0,0,f020647313a266e9b26d920d7b3ff0c5a70298ceb4b38f72086ac27d496b3748,2024-11-19T17:35:09.450000 CVE-2024-24426,0,0,1ba202c66d22ec01d9165c4229044ba2d8de45fa575e097063ba053bd7d0b3a7,2024-12-03T17:15:09.400000 @@ -253533,10 +253533,10 @@ CVE-2024-26307,0,0,7842c4c7922e6571f612e3612dac5d83a0697d8de4e909017d23fbf7e015d CVE-2024-26308,0,0,16c5a822939dda338e35525cb9f0065373dcf06f18a2e2eeb8c290b5eb87a157,2025-02-13T18:17:19.247000 CVE-2024-26309,0,0,f0d20806500c25706ef2ae572d4bafdc9424adb0b5a69862f56a97bd6975579b,2025-03-12T13:25:47.260000 CVE-2024-2631,0,0,4d5056918273db25c3d5b7f97c66de0ecfcd753023d114661f08ddf45d27fdda,2024-11-21T09:10:10.600000 -CVE-2024-26310,0,1,db7bae585cc08bc88730c602cbeb5ade74c1d55da6c344d4a8e2792b715f44b8,2025-03-18T17:39:03.147000 -CVE-2024-26311,0,1,b60c3d2cf87c565e6ea659f3eac2c902627ffc273a265d2d1cdc075a6a7d550e,2025-03-18T17:53:45.870000 -CVE-2024-26312,0,1,2b42f63cb7d89e78887441357745ae23cee8595ff5feaef85de121477cb073ba,2025-03-18T17:27:43.123000 -CVE-2024-26313,0,1,11fc5d7d77d205ac26b614b675f2b7c2d085311afdca284f024913b3325de426,2025-03-18T17:27:14.377000 +CVE-2024-26310,0,0,db7bae585cc08bc88730c602cbeb5ade74c1d55da6c344d4a8e2792b715f44b8,2025-03-18T17:39:03.147000 +CVE-2024-26311,0,0,b60c3d2cf87c565e6ea659f3eac2c902627ffc273a265d2d1cdc075a6a7d550e,2025-03-18T17:53:45.870000 +CVE-2024-26312,0,0,2b42f63cb7d89e78887441357745ae23cee8595ff5feaef85de121477cb073ba,2025-03-18T17:27:43.123000 +CVE-2024-26313,0,0,11fc5d7d77d205ac26b614b675f2b7c2d085311afdca284f024913b3325de426,2025-03-18T17:27:14.377000 CVE-2024-26314,0,0,16b14b790b204a9dce3861ce2b360799ee7dfafcd5ac190bba6e667b6569b4c3,2024-11-21T09:02:21.567000 CVE-2024-26317,0,0,1d8dd478405205f5413ee335572758a0bcbe89ffb7397dbf28481b9d00567bcd,2025-01-28T20:15:30.597000 CVE-2024-26318,0,0,2fe9ca9879a231b2a902c1dee6b7dafdd64d4c9534a8bb677db70557bdae5864,2025-02-13T17:13:39.187000 @@ -253601,7 +253601,7 @@ CVE-2024-2649,0,0,e43b84cba989fa0abf3c519960415eee06d835d3499e6540f75ffa391d3fb5 CVE-2024-26490,0,0,5d881f1c01fce0a8d045898f401c1fdce23d0fcbcfe7be54413530239baae4de,2024-11-21T09:02:30.263000 CVE-2024-26491,0,0,c21263bce7ab5e4914f382cea90ce616eec96f5c4ee3ce13ab73daf3ca946d29,2024-11-21T09:02:30.480000 CVE-2024-26492,0,0,9627b0f85e6c71953ddc8ad575684843b848841f59336ebddbc7ed81a95e3765,2024-11-21T09:02:30.693000 -CVE-2024-26495,0,0,1a3ef9413c39fd044d2faf5b27b039172ef94e2dc35c0a91bd7bc5a02c4f00e8,2024-11-21T09:02:30.907000 +CVE-2024-26495,0,1,0e19db6ecc89b5b02d2c5071b4725aa6df5ab6e88362cef91216197537a6015b,2025-03-18T20:15:21.933000 CVE-2024-2650,0,0,e734ec5659d61ffc4accf737956e73f738843d131d9ee7da9d67366df08b49d9,2025-01-08T20:06:29.560000 CVE-2024-26503,0,0,df7d61dcb7128154350761a771150cb0494b47d4aafbfd7f2024eef22b0ed39b,2024-11-21T09:02:31.040000 CVE-2024-26504,0,0,04368ca408cf828c52c9d21e0e159c77cba39aeb7ead3b77c45c5792276ceb5f,2024-11-21T09:02:31.240000 @@ -253884,7 +253884,7 @@ CVE-2024-26809,0,0,a4a9a09e393e0acfe48613693e84251badf0f4c63fc3e27b5189740b61995 CVE-2024-2681,0,0,fe19d4a48e04794b1df846922b4afbf5c3ad8918e56b51c5b75dfffb8b29b4a7,2025-02-19T18:17:19.687000 CVE-2024-26810,0,0,5b78c798ab699830f25c706791bc5869344bd655b9540ce5b00869b839745e17,2024-11-21T09:03:07.600000 CVE-2024-26811,0,0,1f1ab1f4a533bc19b5527c1709f6805320734fd6fcffd4a6683b114f73eec701,2024-11-21T09:03:07.800000 -CVE-2024-26812,0,1,902e8fe70f82a1cd9e6e81b66f93f93de8df5bc70a353813308c69ec229ef56b,2025-03-18T17:04:12.737000 +CVE-2024-26812,0,0,902e8fe70f82a1cd9e6e81b66f93f93de8df5bc70a353813308c69ec229ef56b,2025-03-18T17:04:12.737000 CVE-2024-26813,0,0,d5b7f2b6b4f59a7ab93dfaf0cce6b486b64b40821d4f07f5dc544253006ebf3d,2024-12-20T14:30:24.357000 CVE-2024-26814,0,0,20cd99fb6ad0608315657eb24897528fe729a92be5e948cde94223ad95db37dc,2024-11-21T09:03:08.187000 CVE-2024-26815,0,0,8a4780746051857bad12531bb9de34b73d4d4a9eae902bf0bf67a95ca36078a6,2024-11-21T09:03:08.313000 @@ -254483,7 +254483,7 @@ CVE-2024-2738,0,0,93b58d0b4b0867809b18d6b9219831b6a83c9f9bc044abfa6d93410bae4df0 CVE-2024-27380,0,0,fd67f29d4e726d7274d19c0bcf4177f4144236ebf19de60c64cc3610d19682c7,2024-11-21T09:04:29.500000 CVE-2024-27381,0,0,ed20d9c6d93f1b4012848624f333ea949a091c4c85f8d560821c7e4155fa2e90,2025-03-13T19:15:43.400000 CVE-2024-27382,0,0,441689058eb68e0538a8b198f737ed081cfc1f8e088f83163410e402ce6a5dd0,2025-03-18T16:15:21.107000 -CVE-2024-27383,0,0,72e70359f0f73aeb1e6b8c0368d83827211bcfc295c5402bfd5cfdee6cfd7908,2024-09-11T15:25:24.303000 +CVE-2024-27383,0,1,0c4413e8a4e7cc6b293b80ab129a095e97d53c3a8fd7c7daeec85e68fb677fe7,2025-03-18T20:15:22.130000 CVE-2024-27385,0,0,e1a41ce9dd72dcc7e74fb02b5b7a34d75ee1fd10edb45ea10c35a3afe68bad13,2024-11-21T09:04:30.110000 CVE-2024-27386,0,0,1b64d665730a7687a332bebc6b1e44f0548d458eb827204a2ee1cc939a731c55,2024-11-21T09:04:30.280000 CVE-2024-27387,0,0,f80b391b77c2a4e04325f2fd0a86e21edb07988c6c2cd77439241176d0ef14dd,2025-03-17T16:15:21.177000 @@ -259471,8 +259471,8 @@ CVE-2024-34085,0,0,31b5f1d8778cf0c791642cbcb9dac301680a6b89a7e3c57182e8b1e18eb53 CVE-2024-34086,0,0,b108412abe5a8a6d5628a5aa722308c0e2d3e7a2876c427581efbabd37e0e4ae,2024-11-21T09:18:03.770000 CVE-2024-34087,0,0,ad0eecbb0612f719db7e23c85ea2351d6bc1b74c0c7f2f45f413d40049f7b24d,2024-08-28T16:35:22.590000 CVE-2024-34088,0,0,29ed9bff3f7a8aac8372db6383813d7ff3a9c10604e1b9decbbfa535edc1d6bc,2024-11-21T09:18:04.130000 -CVE-2024-34089,0,1,bbc635fbc052455dc7cff78d0869066cb1ddd32400efd5cbc3acc15fedfa6cda,2025-03-18T17:30:05.407000 -CVE-2024-34090,0,1,ee2f9b95566c5274dcf7217ee8ff1013ced41abb90a811dfee9f6a6c140915b4,2025-03-18T17:30:14.290000 +CVE-2024-34089,0,0,bbc635fbc052455dc7cff78d0869066cb1ddd32400efd5cbc3acc15fedfa6cda,2025-03-18T17:30:05.407000 +CVE-2024-34090,0,0,ee2f9b95566c5274dcf7217ee8ff1013ced41abb90a811dfee9f6a6c140915b4,2025-03-18T17:30:14.290000 CVE-2024-34091,0,0,519e69cce22b8c1316311fb4d4cc72759f50566992d370704c56d265bc32e1e8,2025-03-18T14:54:25.830000 CVE-2024-34092,0,0,03028f4bf647fe60ff9dc41f22799f5b661424f6b2f14d3e49a20b51b70e0827,2025-03-18T15:22:43.557000 CVE-2024-34093,0,0,6c5685753d65dbac14a383343cdb5112393785fd3517688c38dfa7edfe0901da,2025-03-18T15:26:21.247000 @@ -261327,7 +261327,7 @@ CVE-2024-36421,0,0,d267f268e06861628ce4cf195620ef3b02fab520061b1f9c4a37c486b6a1d CVE-2024-36422,0,0,4424021964f01781bb66dfc811d5db67382928db5d0e7b4e49eb19dfb4887929,2024-11-21T09:22:08.960000 CVE-2024-36423,0,0,9101fa9de8d00849da4eff4d9f201e827b8102720e2840583ab9dee4750e2244,2024-11-21T09:22:09.100000 CVE-2024-36424,0,0,82093c1e45533285c943333ed988071368f9fe71d591ba7d461aacd6bd6bb266,2025-03-13T20:15:20.510000 -CVE-2024-36426,0,1,079fd022d9c28ebda7229ea9b89a68b0e2f85d0b05b89385e9554bc31456342c,2025-03-18T18:15:26.930000 +CVE-2024-36426,0,0,079fd022d9c28ebda7229ea9b89a68b0e2f85d0b05b89385e9554bc31456342c,2025-03-18T18:15:26.930000 CVE-2024-36427,0,0,f7e88348cd3fd323f1bae497ce6a56c1633a5e3ff2bec8ce71ac887e94169192,2024-11-21T09:22:09.557000 CVE-2024-36428,0,0,b36a502399a59ab805514939155f2b84f1f575bd6f48877d9512cd55ee0da241,2024-11-21T09:22:09.770000 CVE-2024-3643,0,0,ff27035feddaa0d74874cd70cd06bc0e8381a93691eb0b05de9bc03f435e7a50,2024-11-21T09:30:03.947000 @@ -263020,7 +263020,7 @@ CVE-2024-38473,0,0,bbb5e11b003247980ea92e43b9234c78ba249d78fc42472835f589d6b2f6e CVE-2024-38474,0,0,33f83d32be900704f414a67e25b6f09aabbb60ff9ab4fcefbd2470999ca02add,2024-11-21T09:26:02.947000 CVE-2024-38475,0,0,cffda6a953163d4e08000545cbd4d92ba2e5d3654b5efce5be8544cd35b12e88,2024-11-21T09:26:03.180000 CVE-2024-38476,0,0,96df90db5dbf5efcc1d36711d52981a73ed110b8dfbeaa5665e3f3feb3c366d0,2024-12-02T17:36:33.403000 -CVE-2024-38477,0,0,61c016535771a81220fcf93e40f52301771e6724b3cd648d2be13687108c8516,2024-11-21T09:26:03.687000 +CVE-2024-38477,0,1,4a424730069430bf103722b4487020936d441c65347ffcf0b7bfe70f711e69c5,2025-03-18T19:15:42.683000 CVE-2024-38479,0,0,c70847aedbd201cfc354e550e0b90cec56f97441e95e9c598b1abef167a9ff30,2024-11-15T13:58:08.913000 CVE-2024-3848,0,0,1bb91ee395c277a929aef5b89902a90b679e2d6a3388b7e9b3f685b088b1075c,2025-01-24T17:28:21.717000 CVE-2024-38480,0,0,8fa161912c0761a853152d1feac8fbf447a9a2c195060b213f1ea7b76eade0d8,2024-11-21T09:26:04.080000 @@ -263584,7 +263584,7 @@ CVE-2024-39229,0,0,0ba144b76379836690d752be3610500a97e8f48b21df7b8b41b34939068fe CVE-2024-3923,0,0,e5df35773bda20ed72d01c5fca237e586010813c9a75364a918eb66db931fa08,2025-01-08T18:43:59.440000 CVE-2024-39236,0,0,5e94994c95168f463ef8d7eb7fbdb134133f68838b3416c347f6229125283e73,2024-11-21T09:27:21.240000 CVE-2024-3924,0,0,a7d7d2f179b70fee660a7c5121a05bb1bfb909c2c19095cfe92531fde96543ed,2024-11-21T09:30:42.713000 -CVE-2024-39241,0,0,62f2aa86038a75db9f42650078b01738271c6f6139d6a16667450f1373f6b200,2024-11-21T09:27:21.467000 +CVE-2024-39241,0,1,3a8c87ae8015b39a69a37b5490c2dc0915304915915bdf6f89069803556bf101,2025-03-18T19:15:42.903000 CVE-2024-39242,0,0,43a91895e92bd720e6caad7b641764febae124befd54612aee776ab0a64abe13,2024-11-21T09:27:21.613000 CVE-2024-39243,0,0,8a71f18c951566d7879eb980241b0471ab0905142b0166e227a16eb2063f3a99,2024-11-21T09:27:21.760000 CVE-2024-39248,0,0,ef5bdeda9bf8b129f7fdf1bf335dbd2259ee8389ce9f4b740214a512856eaf82,2025-03-18T15:15:52.563000 @@ -264230,9 +264230,9 @@ CVE-2024-3992,0,0,9d0a83526969939eed159f705c3b354746b7a8d83202b0515f7bb495c21d5f CVE-2024-39920,0,0,2d0ffc6668fc09328c8963241ae091338acc28267b723bf4cce9dfe8a3e96d31,2024-11-21T09:28:34.183000 CVE-2024-39921,0,0,36bf5d750808c8cee840a08fb05bf4c020bb5eda7905a41156147b0de38b82b1,2025-03-13T14:15:29.073000 CVE-2024-39922,0,0,fe52b48aabfd6b21ca5931e383040552b3df966bff80bf5d23fd885e311735af,2024-08-13T12:58:25.437000 -CVE-2024-39924,0,0,2a4f84bdece5ebd1f422a2fb884bfc5842ec713ad0f1b7b8cbc33e507dfb0a33,2025-01-09T18:15:27.987000 +CVE-2024-39924,0,1,775d84fe24787256203d85215326581603dd25a3938d9f3efe7e3d3d7a679dd8,2025-03-18T20:15:22.283000 CVE-2024-39925,0,0,9746dcc58fb8cecc9e1d89cf824e88cac8bc60fdcab25d7646a74784aca525c7,2025-01-09T18:15:28.117000 -CVE-2024-39926,0,0,4b5ea093d7330777157039117017f850139879a4c317f29d3725d66f7904f02a,2025-01-09T18:15:28.220000 +CVE-2024-39926,0,1,62755f8b10d8d8cd0280358f682aebb8f7ee34ebaeb719fb16dd73cfad42b335,2025-03-18T19:15:43.093000 CVE-2024-39927,0,0,d102506d349c6cd661c84f9625100fb5afa84e23351ca69840c038d426e26cb0,2024-11-21T09:28:35.253000 CVE-2024-39928,0,0,36746816d5a179f8dacaec6e67ea9b447cd0145aa354104fbfbe630b6bc05ce0,2024-11-21T09:28:35.457000 CVE-2024-39929,0,0,e05786a0bff8a717a9d0e29fd179f70720437e88c3451a4fe1017b9aa0163a85,2025-03-18T16:15:21.850000 @@ -264340,7 +264340,7 @@ CVE-2024-4038,0,0,569d358c6bfa348b9210b115f5928b1fde5041b5579f5485157a9cfdb142b1 CVE-2024-4039,0,0,c3aaf5874fe7003d1596a329b05f85f247b5e2632c127fe1794ae2f532f05959,2024-11-21T09:42:04.913000 CVE-2024-40391,0,0,cbd9b0d424ed91ca3ee4ca4e36de30c2faa4e7dbce8c14db1ebc2cfb4a2106b3,2024-12-03T22:15:04.740000 CVE-2024-40392,0,0,c0b77c26788071b7626fa98f4e81fdc538f14d2fb4ca29bf5074b6ada32cea0c,2024-11-21T09:31:02.083000 -CVE-2024-40393,0,0,3b44967cb25d23b8b23843ecd05fe5d68c3aaf1715aa83da6d262f0d8bd96461,2024-11-21T09:31:02.303000 +CVE-2024-40393,0,1,330bfd5064a63b1b0b62d0875fea686448d6b4662b2f8faacf64debb94ac258d,2025-03-18T20:15:22.430000 CVE-2024-40394,0,0,6a806ad13b0b957b004ff001266d3d838dbee3781b6df4b4ede2482e22f8910a,2024-11-21T09:31:02.443000 CVE-2024-40395,0,0,444181edd8fbdbfe2dad76fb4c605403f032cf53cc6f648e298d9707c22326f0,2024-08-30T14:35:38.087000 CVE-2024-4040,0,0,d38ec785e98441ff91237e81e981d9a49540c014ed0b0d7c075c012b69e8f310,2025-01-27T21:48:42.117000 @@ -264471,7 +264471,7 @@ CVE-2024-40600,0,0,22bd00008fcd431c4e4910f7a8db138543cfb6c9d0816ca29c16e279d88f6 CVE-2024-40601,0,0,0aa50b76ad7f2dcb34c436272c0e3e3d55010312a8dc26be4224bc6521d6accd,2024-11-21T09:31:21.660000 CVE-2024-40602,0,0,64d3f402d3f53289ad1ba6df8706a05bc3520d6f6cab664d62af31c1edeaa4e5,2025-03-14T18:15:29.110000 CVE-2024-40603,0,0,9b6684d222a7a0ec72b43842915255a57c21d1269fb8fee78413b94702508ca0,2025-03-17T22:15:12.950000 -CVE-2024-40604,0,0,89973d6255f60ea9c04c5a8c9cf7c9fe4181a5a9a407ba6376432e7802c0d164,2024-11-21T09:31:22.187000 +CVE-2024-40604,0,1,e77a737cdfb3cd35d797c9c67078a444af648fb1dd8498e14c02ff77f8f92075,2025-03-18T19:15:43.277000 CVE-2024-40605,0,0,ec0691a64f01599ac002394a6d8c51c45d9aaf6fc0e3b45509572cac28871ac4,2025-03-14T14:15:16.200000 CVE-2024-4061,0,0,4506e00c38fc7fcea3bfd4a74c8b0712c1883e34e528f694845a597cf23ba99b,2024-11-21T09:42:06.793000 CVE-2024-40614,0,0,7b470bc2eae0c988a1ba65e093b9ba66a6230d3405f5a4a45e19fcc08e4ff159,2024-11-21T17:15:14.190000 @@ -264680,7 +264680,7 @@ CVE-2024-40839,0,0,609233dfc15b706126c9bdee275db0bae9e0311dffcf12f1522f3b8df2901 CVE-2024-4084,0,0,a28b137c9c522b2744d2cc719744fd799a787e733e6ed4c14866cfffc6da3e36,2024-11-21T09:42:09.817000 CVE-2024-40840,0,0,14bdf19150fd7acf49468e39cdf6efc98838dab91ac000670442c80f0c1e00a7,2024-09-25T19:42:49.173000 CVE-2024-40841,0,0,4a95dd6a234443731d705e87950516814e31e11699249b315c7fa66892964954,2024-12-12T15:44:20.363000 -CVE-2024-40842,0,0,d97caac03d983e83f0a43de14b1f6084706969aaff86e517019fa27ed6e96997,2024-09-24T14:56:30.320000 +CVE-2024-40842,0,1,db2523caf221205dc10c3a414f106b2b11ae0a5ac1a11334c3597c355ad607ed,2025-03-18T20:15:22.593000 CVE-2024-40843,0,0,8829e3a23cccba1ae50f91356127ff0b529c10fe5f02005e5dcf2ce88d5f4ad0,2024-09-24T15:02:53.987000 CVE-2024-40844,0,0,913ad32f130ba48f710de944124bb663e932b9a1efef6f615196eef21a07dff4,2024-09-24T15:55:13.020000 CVE-2024-40845,0,0,ff022e47079c0e2640046a45a9238cfa77665c1eec1ab3ac2bfa695dbfb76ea1,2025-03-14T17:15:46.070000 @@ -264695,7 +264695,7 @@ CVE-2024-40853,0,0,dfc9fa03d8fda58ef712d436e720ae0f21a7fffb74fe4326b57538d3690d7 CVE-2024-40854,0,0,e98dab3f3cdbcfc8e79448e579c2cd0ac129ec15112de4872eb183095b123a3a,2025-03-14T13:46:57.020000 CVE-2024-40855,0,0,7c6a015a8df0c3902c0c5c429b62fdf8917463144cc33940de5fdcb1a0b9dbc7,2024-10-30T19:35:15.737000 CVE-2024-40856,0,0,3b5bf51664ee45ba68d50745d32de308dce65dbf1c8981b487e32ad3441090dc,2024-09-25T13:43:40.657000 -CVE-2024-40857,0,0,102892d8544ef4f8b8056a1e88dba88dbbcaf3abbcaa73be23c6e2ed59b0fb0a,2024-09-25T13:41:41.843000 +CVE-2024-40857,0,1,87c79aa89d3352fbd198241cc8c87f5d677634d29d9e3d7390f0e857384a9941,2025-03-18T19:15:43.453000 CVE-2024-40859,0,0,46749f00540a137f4fa073cd49e6c82184e33775d43533189720fd97419e33a7,2024-12-02T14:59:47.877000 CVE-2024-4086,0,0,38bacf71d8db8b80ea7fd2fd31e151a7e36bdb37eaa223270c2d1e1494f121d5,2024-11-21T09:42:10.067000 CVE-2024-40860,0,0,77f7b02bba9242e4a4a0897f592fe93da35de7ab5a76d5505e2e539396f764b8,2024-09-25T13:41:05.177000 @@ -265049,7 +265049,7 @@ CVE-2024-41252,0,0,54e8f86b6bd49027e06030ba2a50963dd74f7a96569da6552e78325726ff8 CVE-2024-41253,0,0,477e785a592ab5e200480d3eb2d6c59d53d0c6b434ec1895ff71d84351be6f7a,2024-08-01T13:58:25.153000 CVE-2024-41254,0,0,c71129adac2091d6eaf88d58fbbd26d8f231ae8fbec27ae4b4abadea694bef99,2024-10-29T21:35:11.897000 CVE-2024-41255,0,0,19795af5fae3fc0fd2a60f6c35cb6e112b40c6c7d67d4f94f8d8bc46524b9716,2024-08-01T15:35:18.570000 -CVE-2024-41256,0,1,027a742561cef9677a661ae853cc994b4c8062b01dd687b9c04d0b9656e413ef,2025-03-18T18:15:27.097000 +CVE-2024-41256,0,0,027a742561cef9677a661ae853cc994b4c8062b01dd687b9c04d0b9656e413ef,2025-03-18T18:15:27.097000 CVE-2024-41258,0,0,ebaa159113c3379b0af52ab15e3a2f0b6a8dac5759ffdb8e517bd5915a93bf41,2025-03-13T14:15:30.730000 CVE-2024-41259,0,0,26d47a43509cb425b1baadc04ac9bfec19d920ae999592001ec695e70fab53fc,2024-08-02T16:35:51.213000 CVE-2024-4126,0,0,b3a9fa664d61bbc1b68be3b9778da717cfaa742ecf92e393239428eb3506e3a3,2025-01-15T18:44:13.650000 @@ -265071,7 +265071,7 @@ CVE-2024-41305,0,0,0cf4565ec4f20024a53840eeb7cedb421a0de162e904a2b26bf34f8629d0b CVE-2024-41308,0,0,246da12aea3861cf0f31cc72fde3509dc23f9da5018b459fad63ff4358f27aa8,2024-08-08T15:04:28.510000 CVE-2024-41309,0,0,e0fd676cb9822aff90101d75eeadc774022c0635057955d2adf3a5b268980c3c,2024-08-08T15:35:19.553000 CVE-2024-4131,0,0,4dae8560917ba1dbb256e658dd81a89fe2669bff14a51ed3ec048f75ee1bc896,2024-10-17T19:40:47.187000 -CVE-2024-41310,0,0,f57f56f5ca19f88d6b6806f8ae4e3ea30258b3c0820f6e389286ec2ed5e6594a,2024-08-28T17:42:01.190000 +CVE-2024-41310,0,1,d1d49ccbac664e5009a1f1e845d00957a88a31261c986d0289baa9324bfd588d,2025-03-18T20:15:22.757000 CVE-2024-41311,0,0,5e8f22fc8f8c64fab572b01450b4c33433654d83403c546cb512aea17cc2c5f4,2024-11-21T09:32:30.190000 CVE-2024-41314,0,0,a1bbd0aeb1f582375ecb918b9c5cc43f281f2650baf6dfda1d036ddaf106874a,2024-11-21T09:32:30.427000 CVE-2024-41315,0,0,59ec2b072028032cef846dcd3457548b2ac7cee52888b2425478c874345efc09,2024-11-21T09:32:30.633000 @@ -265182,7 +265182,7 @@ CVE-2024-41564,0,0,24f60296f7995573baa861824a54d1622bd6248d719f1fa88e107bb7ee60a CVE-2024-41565,0,0,e90f9d0bec65bf131f69559e330499ee7d867ffa90ce21c920c44c5a44079338,2024-09-19T16:19:59.317000 CVE-2024-4157,0,0,29d22a0a757cca99ea487ddaea2d2e53381fd88b5244509866bd98027aec7fca,2025-02-06T18:36:20.893000 CVE-2024-41570,0,0,bc7c6440b2a67efc5463bb4c39b989d97eed435dea63e8e6c437acf558913c6d,2024-08-29T13:32:21.020000 -CVE-2024-41572,0,0,a9f0d828cc4e2bc36792fc456a6a868ace184f72abe54a0c002137b56b623f16,2024-09-11T14:15:13.380000 +CVE-2024-41572,0,1,dab2ff30f8ba7be83d4d6faf26edb5156583b8d1981aa8810923a876c5dc90c9,2025-03-18T19:15:43.633000 CVE-2024-41577,0,0,b1f882437231c85f732c91780240de4516b5d2682e39952346ec72953d56207b,2024-11-05T22:35:07.160000 CVE-2024-41579,0,0,00401f5a27bbe5068511cb2e589592e7d13e313ad7b023bdea7b8a4482f81c9a,2024-12-11T17:15:15.517000 CVE-2024-4158,0,0,6f5142212b7f11f746d09765245fdc596c1170b29be5ee204d7e191cb8d2cab0,2025-01-28T03:03:08.447000 @@ -265213,7 +265213,7 @@ CVE-2024-4161,0,0,1b6be13aebf10d87c0f4597f26cf874ea32ec0118ac42fcf6ef1f439dc2d67 CVE-2024-41610,0,0,ee52e88443b2f617e3925db264d751b2bb4fbceebf67245eca9aa7aa17900d82,2024-11-21T09:32:50.507000 CVE-2024-41611,0,0,d336e31da2e56f9dc99927877cda9dece32880476434433bac7111aed24f4268,2024-11-21T09:32:50.723000 CVE-2024-41613,0,0,b5839e9cf5e2defa3647c67fdf9f50fc087e41d0dad936c67d39705f8d63a28c,2024-08-14T18:13:25.017000 -CVE-2024-41614,0,0,cc5a80a7c660609b083f88780a7fb5a64759eaf3cedbb2c19630a011798bb465,2024-08-14T18:14:16.073000 +CVE-2024-41614,0,1,c5edadc00c4732a516ccbd852a3921e2e273d72cb2be327a0e5bf1a516caaaf8,2025-03-18T20:15:22.933000 CVE-2024-41616,0,0,3ee2ddea7188ed14ea049c8db48f6155a2d309aaf7a6b0e0dec7b77999cac168,2024-08-07T20:54:20.793000 CVE-2024-41617,0,0,b7279c14530053e84c8ae2dde5ca5664413abd2c25ff57a501e96303aaf37048,2024-10-29T17:35:07.133000 CVE-2024-41618,0,0,a49a66ff797e8b29b9281a96040de0847f16287b2ba629fa1721a5944dc64b86,2024-10-29T17:35:08.150000 @@ -265366,7 +265366,7 @@ CVE-2024-41785,0,0,c8540d1d43d0438fcf633df69d213201ae76d612d879b3fa5839154f3178e CVE-2024-41787,0,0,ca11b7c7cbae167fb879d0935e0fce76c280439ac257e0ea74c70f9235cbcc80,2025-01-10T14:15:28.947000 CVE-2024-41798,0,0,5fea74d6ad8cd06d69b9494512651a1267ba07a833ce4e1ec1687234e2029539,2024-10-10T12:56:30.817000 CVE-2024-41799,0,0,57e0652da6088d2f7ef1d8a480b502117a7d15daea77cec2467e2ce23d41e466,2024-11-21T09:33:05.673000 -CVE-2024-4180,0,0,64e0c8d8c66171063acccd720d31bd7075e5baef32bbca8d371983bbcc0987b5,2024-11-21T09:42:20.530000 +CVE-2024-4180,0,1,130ce42da83b499edbac947bfc94b4a1e3a54824ec3a8a8cb78c4eb65e7d425f,2025-03-18T19:15:45.633000 CVE-2024-41800,0,0,a5a962619eca6194d926729fb62bbb4d2afd9821ad2256ee8fbe5565147c3991,2024-11-21T09:33:05.817000 CVE-2024-41801,0,0,21a9d32e2b91d1c343d3151d8b263d0a07f4a4eac81155f366ea3d1bee08c0a2,2024-11-21T09:33:05.963000 CVE-2024-41802,0,0,734077976051bb7a0c928efa887e2356d38c87959ee8f59cc2dcd92d4d70739f,2024-11-21T09:33:06.117000 @@ -265480,7 +265480,7 @@ CVE-2024-41917,0,0,ac1bab0c90c6d904fbacbb0cc60bf50373983b6e1bed42d867549cf81c0d3 CVE-2024-41918,0,0,0025c02645b62e9a013f9a632cdf884d305e491a1529fcde2896b5f25d46b1f6,2024-08-30T16:05:23.737000 CVE-2024-4192,0,0,6f45d7ab3fa2e128e5ba0090b09e0efb99d62d4fa36ffa8103dd1a0f77ba887b,2024-11-21T09:42:21.737000 CVE-2024-41922,0,0,7e03c992eccbc90ea51a8983e0cf91681fc1323d95ecf135ada02c68d1fe41ab,2024-12-18T15:15:11.163000 -CVE-2024-41924,0,0,7f0f2dba0da77920bc169ff261d197e150c61a323fb8b37c94de1765d8092267,2024-11-21T09:33:17.350000 +CVE-2024-41924,0,1,314fccc571bcdd49ed5109306bfe61b72e8bd70ceafcb0546b2c857aa30d309b,2025-03-18T19:15:43.833000 CVE-2024-41925,0,0,a81f5c74d237d15179066a17f4e3108a18db6601148f03692e8d5ef83a6acbce,2024-10-04T13:50:43.727000 CVE-2024-41926,0,0,bf6164bec763886028fa43df40afb1056b64cffb366d4c2dd3441f5245ffe1ae,2024-09-04T16:55:35.570000 CVE-2024-41927,0,0,de924dce393fe6d121bba4ec13fa3bd5bfdf587d7abd00de739e73b209936bd8,2025-03-13T21:15:41.287000 @@ -265555,7 +265555,7 @@ CVE-2024-42000,0,0,2e5e6eba94260d1248a64e384ab7190b55ba9e666e827b568cb017e068a9a CVE-2024-42001,0,0,8819b2bd442e4ca6ca65bacd85bc6075941a5dd848ebdc67e005bd5f696ea6db,2024-08-20T16:37:05.447000 CVE-2024-42004,0,0,e93a1deb59f2930d0e4972e1d1a430142b595eaa321eb4aac784ccf58ce9ec5e,2024-12-19T17:15:09.120000 CVE-2024-42005,0,0,4b7a03a62388d79840f1dbc20489aec0bae7f52ed889bdc9e9f4ed295e447d04,2024-10-23T18:22:48.937000 -CVE-2024-42006,0,0,db719e10e8f2437035bfb372f689cb5ad1b3ba987ed59129a01e11cdd446ff43,2024-08-21T13:26:54.577000 +CVE-2024-42006,0,1,757a5058e2b20a07332e18e1715746958f2fc29b54fe8104fb4e99ba507aa82a,2025-03-18T20:15:23.103000 CVE-2024-42007,0,0,18023dc0188646143bd9484c36c6b41c6281c494fdb0237aba0cd6dd52e9a082,2024-11-21T09:33:24.887000 CVE-2024-42008,0,0,de59590c5b8ea2dcb20a78d933da654dd773353d185cc7aa221b80b9d6c81d30,2025-03-13T16:15:21.240000 CVE-2024-42009,0,0,5077fcd4de8bde6c882fe8ba9cf1a676a407121133b47066804fdf951a128533,2025-03-13T16:15:21.467000 @@ -266161,7 +266161,7 @@ CVE-2024-42680,0,0,e52c1af9293e13496b2c5e254cae5bdc01056bd2ed56e6c9da231dcc7aa55 CVE-2024-42681,0,0,6833e1284f21aff4cea3291d87abe85804de118f6260add0e7925ca0f2033651,2024-08-19T19:35:08.437000 CVE-2024-4269,0,0,bd7fc75d53cf98fd156bc2e6c8c500570e4fddf5651b9c7bab8314ba4ad020b2,2024-11-21T09:42:30.873000 CVE-2024-42697,0,0,362de23f2f8052625f6eec6570d781729ea23f898b9d22d3829caec51d414160,2024-09-26T13:32:55.343000 -CVE-2024-42698,0,0,356767363a925cbf4062672be9e8416d964020857c4a2fde17bff2c4873c5aa4,2024-09-19T16:29:51.217000 +CVE-2024-42698,0,1,dd4ca7fb95dd4b411a7b375b9d3e2b51afc3cbb6f0394f50d3862a96c3ec56e4,2025-03-18T19:15:44.043000 CVE-2024-4270,0,0,22c4c9c8340b0ae818c3604e06cef3a06794a2fdd8eea4d3c876fd29114fb712,2024-11-21T09:42:31.040000 CVE-2024-4271,0,0,e065884abd13d8703fdf835666ca9f47ea6581e787d0dfa6603568b9675ea1dc,2024-11-21T09:42:31.173000 CVE-2024-4272,0,0,c1b1d26587c061d52e11bbbc0453ffa7c1fd935bd8f85aa4d100c5e80dd23497,2024-11-21T09:42:31.353000 @@ -267389,8 +267389,8 @@ CVE-2024-44124,0,0,a9d97986e080d715e7948f2db3e5c53f7c38344b30162699d2ea9fa1650f7 CVE-2024-44125,0,0,a8620f37f3eff23976050916a02b8df16d65e78e80ce6fb822fb90ae91e4a7a8,2024-09-25T13:30:11.570000 CVE-2024-44126,0,0,3dee5b38c5c096a3375db2d1d885f92b53e52f46e048fb65b6f13dcea0cf6db8,2024-10-30T21:35:05.647000 CVE-2024-44127,0,0,4241606ee04b7d951119d4a990e2ed047a3ff5df08a00128e6348936e32c015c,2024-12-12T15:10:15.050000 -CVE-2024-44128,0,1,1923edbe0104e043c42717b18c5a911b61f7bb800098d25c5f996f0612e5d22e,2025-03-18T18:15:27.323000 -CVE-2024-44129,0,1,e9dde46c181ee593bb94e94bc0d226f8245589e2dd989ac84588dadc10659bf0,2025-03-18T18:15:27.523000 +CVE-2024-44128,0,0,1923edbe0104e043c42717b18c5a911b61f7bb800098d25c5f996f0612e5d22e,2025-03-18T18:15:27.323000 +CVE-2024-44129,0,0,e9dde46c181ee593bb94e94bc0d226f8245589e2dd989ac84588dadc10659bf0,2025-03-18T18:15:27.523000 CVE-2024-4413,0,0,3929a7afd8208746008d75913a87d5245f0d9190eb71d3ec2ee30adcb483c383,2024-11-21T09:42:47.267000 CVE-2024-44130,0,0,737a01684c269111b41b348f79f4cda5867281844854fbd094785012fad72f32,2024-09-24T18:49:47.557000 CVE-2024-44131,0,0,e72768239a302bf12add304835bf798472cba43ba251df49c563d86e855e9c0a,2024-09-24T19:01:55.470000 @@ -267412,8 +267412,8 @@ CVE-2024-44149,0,0,6eeeb205f0113be4e2296a27ada921710ab4d7c81a3e95e9aa805acec5d12 CVE-2024-44151,0,0,3adb3cc493ef9fc3cca2cec3a09f77a8995ed8befc9b50d495377265c5c0fed5,2025-03-18T14:15:40.260000 CVE-2024-44152,0,0,7550f779a958464ffd932d586cb89d009c0ca7eab9087769b3575744cdc01796,2024-09-24T15:55:06.100000 CVE-2024-44153,0,0,82097411ba307b5977c3f59bb78c96925324f15ed043a95bad15fc0eb0059c7f,2024-09-24T16:19:32.593000 -CVE-2024-44154,0,0,8eadcc80f1753ce98600c5eb27ec23345023d248570d997f1192f7f23aac15e0,2024-09-24T16:16:39.947000 -CVE-2024-44155,0,0,ee561f8aa93bfbaa8856e0f6bc5846736046c2942adce9a052dbd8bd21207ac7,2024-10-29T17:34:16.487000 +CVE-2024-44154,0,1,89a24bfbf234a70641ab7749eab7b5da9037b819fafebdffc1a16e298ce587bb,2025-03-18T19:15:44.260000 +CVE-2024-44155,0,1,dd8c2f2995ac2dd10c9ef39e8cc88034d185cb75998040610feb68362606bf0f,2025-03-18T19:15:44.467000 CVE-2024-44156,0,0,30bb3e4727e009d9939a8cca42bdaf942e4cab5d688e41bdaa81eb6c16a0884e,2024-10-30T19:35:17.447000 CVE-2024-44157,0,0,3055d7259896b15a222cecee8f7d4840c633fa65e904d2b19e2dbe9dfd5bfa62,2024-12-12T19:09:01.313000 CVE-2024-44158,0,0,c23a78d2892340d41579e0060c4f965b5c78c5e726497d60b2970a08b2ed1cd8,2024-09-24T15:50:25.083000 @@ -267434,7 +267434,7 @@ CVE-2024-44171,0,0,61d23c156cb013a8a8af9a10b8da0c4d43b13a26cab640993f3b36fb5e09e CVE-2024-44172,0,0,ad86e54f40018162f4a33be43f5104aefdfc21d2f3ab0a59b6fab28379acd0d0,2025-02-05T16:15:40.623000 CVE-2024-44174,0,0,9fef131a05569228953753a69bb54c67406d2be203d34e38f490d828de204009,2024-10-30T16:35:20.507000 CVE-2024-44175,0,0,21fd54203e8a328aa6ddadf60d944e0a0983b6a3a07be2abcb838cb48b12daa4,2024-10-30T17:14:55.127000 -CVE-2024-44176,0,0,02c607cc196a1e33eb632f0de9814806e6dc69c4ca8e95ed9cdb360698290492,2024-09-25T13:27:13.333000 +CVE-2024-44176,0,1,006ec9194c70728a5e2d1ad56f20f8afbe0767c2cf3f242696ae5316e66b3e7f,2025-03-18T20:15:23.277000 CVE-2024-44177,0,0,0086874e5f4389e06928db6b81db20629e71c2b6609f712738d0b53b5de5c4fc,2024-09-24T16:28:09.853000 CVE-2024-44178,0,0,52136cefe2d25f7e7593f3a1baf6ea17ef87911f72a4c46fe3c4d4132a742324,2025-03-15T16:15:13.397000 CVE-2024-44179,0,0,974c324437d0b47843308bfaa610ce0667fd15147952f788efc7cb0e89824d01,2025-03-11T03:15:37.160000 @@ -267445,7 +267445,7 @@ CVE-2024-44182,0,0,ac4e55d3d655660c84b73b56753bde7e522a5246e044351d25e0f2bf23fe9 CVE-2024-44183,0,0,4149bdff7c46674028b2ef646957f052460400a3fc47e7d2c1fa4e9e58758dd0,2024-09-24T19:04:51.030000 CVE-2024-44184,0,0,447a47e4658127a2837b0479ea9a5d05984bdae7b57e0cba1d6a39eb69a9e112,2025-03-14T17:15:47.083000 CVE-2024-44185,0,0,e79c7c7c64fe69058030fb9e5019d8c77d80d8475cec6554b7ce51ad3262c5d4,2024-11-04T22:35:07.400000 -CVE-2024-44186,0,0,516669f49da9f6d41c781c5b5376fdb78b6c539ea96504140dc2a1a5e58b152e,2024-09-24T18:03:45.513000 +CVE-2024-44186,0,1,392de0580a14e3e218314ef51754f84b54483972473fe53d8e1475ceb7c4c930,2025-03-18T19:15:44.663000 CVE-2024-44187,0,0,6e307fae7f39341ae1e3d2145100bc4c0d967c8f95d1fbcf9237dd6646d09b54,2025-03-14T16:15:35.167000 CVE-2024-44188,0,0,c8f2a4c522fb4771ddead88a10e0932d80644ae68f72790c2ad2ddab15746318,2024-09-24T20:38:27.090000 CVE-2024-44189,0,0,74bae7e0ea0e127ff0dd8bcfea5ffa0e13e07892dd1a7bf2df17de4205cd86d1,2024-09-24T18:33:02.477000 @@ -267628,7 +267628,7 @@ CVE-2024-44549,0,0,a5aaecd9ba75cc32cf841f25e868951de8e2b2b047d881486d13d5755c199 CVE-2024-4455,0,0,33f9fc924f1534b5f00b161ebac9f736193b59daf70d101982dde1e48af53125,2024-11-21T09:42:51.933000 CVE-2024-44550,0,0,6e5e7c90073553915c6cbf84e10c6c9591a0626baa58af3865b7686a30be241b,2024-08-27T14:29:02.370000 CVE-2024-44551,0,0,9fb91d9914e1830c178088aad3cca92cd401d25b5c686f11c1844700723ad378,2024-08-27T14:29:25.187000 -CVE-2024-44552,0,0,afb4e9daafc60f69d2cc9a7e99ac1885731cd333667d0c79bda4a07bd1f57933,2024-08-27T14:29:35.297000 +CVE-2024-44552,0,1,a087d6467b3cb42f42c6e6b84dd6f027e5da09823e0cbf8267d22b995bc21428,2025-03-18T20:15:23.460000 CVE-2024-44553,0,0,e25aff0bd26b5d6e90872f4157991e48f87fb9965b2893509ae5ad0fbc1d858b,2024-08-27T14:29:45.970000 CVE-2024-44555,0,0,9cbe3f7f481b21a7c163c6260b61fdd3d2c047302389ade1db80a9ae28343ba7,2024-08-27T14:29:56.177000 CVE-2024-44556,0,0,02df828e794fbf32ae5749e75c186a48f883386796d247fd3c788fda52b03d78,2024-08-27T14:28:03.540000 @@ -268695,7 +268695,7 @@ CVE-2024-4625,0,0,aad46a28d2c2f49a77b5936172e43c0dde451e0472cbbc7daa3b8775fd5ff0 CVE-2024-46256,0,0,e8ff1292d6b21c7ae8cc6b0452346dfd4818ec086d9a14227767a4b9e342f7b1,2024-10-24T17:15:16.690000 CVE-2024-46257,0,0,2e21e52a1504a13633477840dbd557e9ad05285ae3938c3634988f0489dcfd2d,2024-10-24T18:15:08.617000 CVE-2024-46258,0,0,f0370fbfdad86ce1dfd5697a2aae76d6a5956ed64072b68df4d04522255e7fe0,2025-03-14T16:15:35.750000 -CVE-2024-46259,0,1,a06e19335a00ccd45e6fb45880d0b8b0290c81e26923d63fcfc67e365dce9d63,2025-03-18T17:15:42.877000 +CVE-2024-46259,0,0,a06e19335a00ccd45e6fb45880d0b8b0290c81e26923d63fcfc67e365dce9d63,2025-03-18T17:15:42.877000 CVE-2024-4626,0,0,e6a81841b054989b62fde9d622901d07198d294f1608fb279a45bf1cc90a81a1,2024-11-21T09:43:14.590000 CVE-2024-46261,0,0,a63083e78a302200fa5c011996104c027553781607ce65625aeab1fca9bebe82,2025-03-17T15:15:41.780000 CVE-2024-46263,0,0,0d984d366ce7051a7a4d4011e27b0a0ad85aa749d21623f27c3d9c6b6680848c,2025-03-18T16:15:24.023000 @@ -268830,7 +268830,7 @@ CVE-2024-46555,0,0,93e25c9ff9d57ba2124171f562fb12c7a0e1eaa20175ee56b11074f938aaa CVE-2024-46556,0,0,74978fe720028839f26da81b38d6431324fa14c53d9892958a73460e49514d10,2025-03-18T15:15:54.877000 CVE-2024-46557,0,0,323b26a1d408e5772f94bbeb94adec7206ed84c340bd4d60f0299c78ea376d54,2025-03-13T18:15:44.340000 CVE-2024-46558,0,0,c7a5c991c0cc8c3b293f4659645e3fb16dc86228441930c52bace3fa4eec2443,2024-09-24T16:41:49.970000 -CVE-2024-46559,0,1,574bb782de67d3ca843eb7dadf7886c850048a085dbeb205a59363fd8a35f553,2025-03-18T17:15:43.193000 +CVE-2024-46559,0,0,574bb782de67d3ca843eb7dadf7886c850048a085dbeb205a59363fd8a35f553,2025-03-18T17:15:43.193000 CVE-2024-4656,0,0,6d241fc1cd2c4b7cf0efdf2dccdedfe28029ef7d9e8fd963203fc60e3122a942,2024-11-21T09:43:19.090000 CVE-2024-46560,0,0,a586c31a90480257b3b10d2df129325a006d5274100f26e7023a1ac0621f5b47,2025-03-14T16:15:35.920000 CVE-2024-46561,0,0,c25954c2fd9d3ad9e3b0bbe0be5d2cc787aa6e3078e6f23b1b9e5e3ce54e8b97,2024-09-24T16:41:54.337000 @@ -268843,7 +268843,7 @@ CVE-2024-4657,0,0,da1cc5f0f06e951757a7d9aa2ce7edd95b85064e3f725733e8932ef7a9a9ba CVE-2024-46571,0,0,d2aefd540d7a3f69a6c63893a70408e771411a89c3ea4f3a40ecac30e52b1a2a,2025-03-17T14:15:19.380000 CVE-2024-4658,0,0,8e8551e2dad8544932822e63f34e98151cdfa3d6ca2a97c2637382b0eddb6d52,2024-10-15T12:58:51.050000 CVE-2024-46580,0,0,57ce23079d22c520f558cf33d89b6b4b97b97ee6fc7acbd2cbcf182fb2bd3f83,2025-03-14T15:15:42.990000 -CVE-2024-46581,0,0,5462b101fb440bc501a98cc921603a2137f1839db74d9038e8e4ca66f70ebf73,2024-09-24T16:41:36.533000 +CVE-2024-46581,0,1,bef764acc8ccbce81fdcc479fb0a4cffd3facc8db69f19ccb3e0bbe19a3b3c25,2025-03-18T19:15:44.870000 CVE-2024-46582,0,0,866617c11a3fc07efe3a2534ae130fa8c5d8346f75b270945cef757d5c5a133b,2025-03-18T14:15:40.643000 CVE-2024-46583,0,0,17a20f25acc5d9bf41a52ba166de5210dfa2a4bc28de8f998c6eb5cb855bfd43,2025-03-18T15:15:55.090000 CVE-2024-46584,0,0,08f29613e1e223adeeb5f6aff9b13cd88155533380249640b96e771274344e9f,2025-03-14T16:15:36.087000 @@ -268853,7 +268853,7 @@ CVE-2024-46588,0,0,ee187a25ad0433069fae2e999c985d8a984d51cce26c5131cb4acdf3744f6 CVE-2024-46589,0,0,c8c4ed997bde83e782ce97e84f35739533cd523937539c1183a8f4a87e466600,2024-09-24T16:40:56.763000 CVE-2024-46590,0,0,2791d45e5179308ec7bd3f0e9d8907c875b9f3d6a41f40adeb97463fdb458d19,2025-03-18T15:15:55.303000 CVE-2024-46591,0,0,2700ef2facc9b89f7e985c81db4f09383407582d56f7c763e4776a6ab667d26f,2024-09-24T16:40:58.790000 -CVE-2024-46592,0,0,76629c413292a6e8bfffa287d4ed8e17ec868be559f837e0a989204ecf4464e8,2024-09-24T16:41:00.260000 +CVE-2024-46592,0,1,4ef6dc7291da4fd516866b0b42d4dbf8a48ada1234b72ff1e77bd23f5ef5f2d6,2025-03-18T20:15:23.633000 CVE-2024-46593,0,0,e27feee37d3b36b7b0adf0271561a5eecf1408b2b98ffac7d2de2274061a26ee,2025-03-17T18:15:18.413000 CVE-2024-46594,0,0,726673ce354474dc1c71192b73cf4514e62c6c6a841b99fd649b0c08b1ac5b51,2024-09-24T16:41:04.160000 CVE-2024-46595,0,0,5fa35ad3466891c938fe0f9ea0c762d223ab31c3f74722a9f8c158af604c27f5,2025-03-13T19:15:48.263000 @@ -269275,7 +269275,7 @@ CVE-2024-47045,0,0,0657652e435463f24842c95bfd3794a2b4734328367fc4112685852a971c2 CVE-2024-47046,0,0,38ff0cbe92ddeab67ccca0ef4d9e871715c7398a3c7a0cba348e5d2c467fe60d,2024-12-10T14:30:44.280000 CVE-2024-47047,0,0,1c34e54606c2eab1848cff96c6327ee01c896bfdb05096645ec8e67d294f53a3,2025-03-17T15:15:42.173000 CVE-2024-47048,0,0,425cce79ac1ff694ab4c7cef97a6df0f5610cb2bf223796f917dc53ac24edec5,2024-09-26T17:12:07.440000 -CVE-2024-47049,0,0,9435c3feeabad953f768be0dab3a8c5de1fda327c2cd4383c7019bbd8d92ff47,2024-09-27T17:09:46.980000 +CVE-2024-47049,0,1,ea1ab97498a7575381e5a85d4ced51685b87b0454f11364c00c1ffc93b1858ca,2025-03-18T20:15:23.800000 CVE-2024-4705,0,0,70c389ca67ab3379e01e7be3997ee96e6665f685a382d4b4294d25153d98d41e,2024-11-21T09:43:24.977000 CVE-2024-47050,0,0,0ecdbbebc96569da8fe90045f207bda8eb6f3c0a2e057e37f2da498fe1d2b9d9,2024-09-27T15:29:21.450000 CVE-2024-47051,0,0,8e2ce411fe0cf3a75b1eda25b4436060c8087d697bbc3dd5da89d378f203c539,2025-02-26T13:15:39.957000 @@ -270005,7 +270005,7 @@ CVE-2024-4785,0,0,6eab3e353a6724f0414217b6f01f95af472b3949bd6e2b068a62e0b94f58da CVE-2024-47850,0,0,441f3961f9e4e945afc3ba6c99275c3ca982a87349160ec46e09e3a7a38ca645,2024-11-21T09:40:13.580000 CVE-2024-47854,0,0,a9f09de7f0b5818799d7735e32fab0528117f290764772f98a3e102c722b0ab3,2024-11-26T16:15:15.850000 CVE-2024-47855,0,0,2488ce52c534b254c4fe75f30de0e6a94b0d61e1b79ce7021bafc48eccaf27dc,2024-11-07T20:35:11.733000 -CVE-2024-47857,0,0,ef905d282c0e5e3d21144a603d60e415ac9ee57fb573bffb51bc71d79903e100,2025-02-18T19:15:16.700000 +CVE-2024-47857,0,1,e8304cd253bb12f2461be2dee6165069c505e29b1c61f5cc73cc32309fe5e22f,2025-03-18T20:15:24.030000 CVE-2024-4786,0,0,5dd0f73d93c1de75f19479b5cea5e29a1ae9a8934feaf695496bbc3c8ecfd1b2,2024-11-21T09:43:36.490000 CVE-2024-47863,0,0,e6340b76eef305e4f9a2a18e9b3431d1240e5a81cf4fe7cadb463db9ca192b6e,2024-11-25T18:15:13.063000 CVE-2024-47864,0,0,52aac4bcab407e0e4f1685b7e56545d671e23ce3b47b685785663fde8a616877,2024-12-23T01:15:07.553000 @@ -270042,7 +270042,7 @@ CVE-2024-47895,0,0,3f8324ce2dbaf96facf113693c7520ff3a56a3e4203f9d7908ed4fe8545f1 CVE-2024-47896,0,0,ac5033b7967d89a6dc45f6be553bc426bd15426b07612c8d75a85a0162c10688,2025-03-05T17:15:13.293000 CVE-2024-47897,0,0,43de61f3d9732c029298f61d67d2b56903f91c6fc88a72bdb868652d4446e1a4,2025-01-13T18:15:19.310000 CVE-2024-47898,0,0,cce74231486c3ab80f60eacc0cea75369d5a573cb99e87ef432e0f8d422293db,2025-02-18T19:15:16.970000 -CVE-2024-47899,0,0,f9f806d8192d8d0f2624a3e2583fa5ff6207a910765e6fd3f29aa741332463b7,2025-02-18T19:15:17.117000 +CVE-2024-47899,0,1,77555423d1a2e6f3dc46df22e1b7f8b4f26ffdde5e87cd053f7d661d963d8c0d,2025-03-18T20:15:24.170000 CVE-2024-4790,0,0,e6ab049e313527641cb353c9f5a051f6a8fa09f2b5f72fbcc025478d5c28079d,2024-11-21T09:43:36.990000 CVE-2024-47900,0,0,54591eb3493a239f1dd6368b680394b611719eddac2cfef182f3e53a1dd5831d,2025-03-14T16:15:36.403000 CVE-2024-47901,0,0,bc6e68f4100c7fc7c2489e2b59be40a485aac52b0fd7227f9cd6752d9648a1e0,2024-10-30T15:39:47.430000 @@ -270443,7 +270443,7 @@ CVE-2024-4875,0,0,f48e0b6e0375081f13ac2ab83bf60baee7a813641861df2f5557466e3ab939 CVE-2024-48758,0,0,6d6595f4f9c5157363905a29de4e8aa05d9c595a5b50795bcb679a26374e8aff,2024-10-18T12:53:04.627000 CVE-2024-4876,0,0,65d8065cbe56070f462c8629050b655fbc478bb065b4ab8ba51acd1e3033dac7,2025-01-24T13:44:58.993000 CVE-2024-48760,0,0,2c515de9d3808545a7fdee77c025d0a4f76a44cfac1a6b1790d2a3a6eabc5e21,2025-01-23T17:15:13.713000 -CVE-2024-48761,0,1,e2a43fc751e08ddc3bc66083ed3029fa3322ed8f81e95468eb2b34ba606aa022,2025-03-18T17:15:43.510000 +CVE-2024-48761,0,0,e2a43fc751e08ddc3bc66083ed3029fa3322ed8f81e95468eb2b34ba606aa022,2025-03-18T17:15:43.510000 CVE-2024-48768,0,0,20dc94e5053f6f0d8d7caf706bf6fcb813042430158ff64dc7ecde51efb03a2d,2024-10-15T21:35:32.950000 CVE-2024-48769,0,0,881e0b4b29e63d860dc80c7571762519af749fe3f9ba6f317c2855a4a66d7008,2024-10-15T19:35:39.423000 CVE-2024-48770,0,0,3e66352e1521b9d6543412a56ab61f680bed31dc0a12a74770aeefc4f0bcda78,2024-10-15T17:35:07.440000 @@ -270483,7 +270483,7 @@ CVE-2024-48813,0,0,531834e27f6a6bc0c9381cd9781162753c49dc1f29a9e6d0b2f2fb460ee27 CVE-2024-48814,0,0,e0fd310be8f6c6c0398b3d476623ef8046cc307663b5065ef443208fabb22b0c,2025-01-03T20:15:27.807000 CVE-2024-4882,0,0,dc37469f83c6f76dd10a96e5c23a6af6fb8abe948d7498605d4e6a451db926c5,2024-11-21T09:43:47.037000 CVE-2024-48821,0,0,4896dd6ac80918ca5a6581c0f1374f01a9628402f48179089cf11ce291dadb67,2024-10-15T15:35:21.620000 -CVE-2024-48822,0,0,118b043493af5b9e81bfea3d9d49d263053f84c00f596289e418351e3f2a583f,2024-10-15T15:35:21.887000 +CVE-2024-48822,0,1,69f3cc78945ebd1f42b52e8f89d117d2566be2d6770d56a2268cf3b44c134d82,2025-03-18T19:15:45.140000 CVE-2024-48823,0,0,820531b706bf0ae61b396baa4f664ae0008d2999048381b1abb05d976c0f0ac0,2025-03-15T16:15:13.617000 CVE-2024-48824,0,0,ef0e492c00cab61971592279c200b5aa8363ba3f5e0c1c31feae3169bba9bda8,2024-10-15T15:35:22.403000 CVE-2024-48825,0,0,ab1a99bd861163f7408d15d580b43382540b10b1ee2468dd0be1ab11f71c2d49,2025-03-17T14:40:19.617000 @@ -270592,7 +270592,7 @@ CVE-2024-48951,0,0,9955e0a528c62a806e0f9a01557426333b92f2f1c309f49ea9b5a584817df CVE-2024-48952,0,0,63abb6d7c6cbe19516ecef34081aac5ecb1d40c537dba83cb235852186459c78,2024-11-08T19:01:03.880000 CVE-2024-48953,0,0,ac3302a48298a2fa902983e4973a1540afc2a7d3db14674d5f84dd13d808f0eb,2024-11-08T19:01:03.880000 CVE-2024-48954,0,0,ff9a31bf4829bfeb29bee0e4bfc2eb280078b0d07e27c4d23a3f5a4e5e4b0bcb,2024-11-08T19:01:03.880000 -CVE-2024-48955,0,0,a3108d376c8b903d220cbce5e7e8e91e6b2d3c44a8e39acb1ba1f4a9e9beae2b,2025-01-09T18:15:29.147000 +CVE-2024-48955,0,1,19c775ea3b757336a6086e73edf96e79ae6d9a6e16ed8a2368d3d453f420b994,2025-03-18T19:15:45.317000 CVE-2024-48956,0,0,9a1115047fe5f91c0b35a738e9d434eb676aac44fa3639e4e54df697b71fe710,2025-01-06T21:15:14.573000 CVE-2024-48957,0,0,5fcdfcbeaa463107575a01d5356d8785a9ae755870410379189773fce30e9e71,2024-12-02T14:58:55.063000 CVE-2024-48958,0,0,4bd7d702f5c7b44ad567fb715dd16e3f71bc515beb7581dcafc207e9d8028dfc,2024-12-02T14:58:37.067000 @@ -271207,7 +271207,7 @@ CVE-2024-49737,0,0,2f6456a9f22f2346277a02e29134a095f6eccf4b39f2349397f72512d5309 CVE-2024-49738,0,0,7ce66d89b5844ba38fe605f390e511e357367d07690c9220d86fbb73538d8167,2025-02-18T20:15:20.543000 CVE-2024-4974,0,0,1d9bd4071db4fba1455c875ceb689e947c4ee6c2af41f307cb1599a445ebc5d5,2025-02-18T18:41:36.180000 CVE-2024-49742,0,0,3c8ea0e80314a8acbdd42653f46a7083a0424366713a970835ba57a6d24efeca,2025-03-13T14:15:32.930000 -CVE-2024-49744,0,0,fdf222f2037b17a852e00287bd367289c1e17112249d40b0fa59d066982c2c2f,2025-02-18T20:15:20.720000 +CVE-2024-49744,0,1,7c567590f9786d42041e219ce1cdb9d490bbd50cf4590404c264de28b9460eeb,2025-03-18T19:15:45.477000 CVE-2024-49745,0,0,3f919f7aa199c54c2341d3074c8c5b46e0ba6fcf2550fbd12aba17e82162ffb2,2025-01-22T15:15:13.707000 CVE-2024-49747,0,0,64661a74e04161519a03376f9233f8f23700a190185ff50de8ceeafd58161799,2025-03-18T15:15:56.117000 CVE-2024-49748,0,0,9234639dd18e0fb6aa52dd2164c77c6468dfa4953a72026bde79f96e9a60f327,2025-03-17T16:15:23.360000 @@ -272227,7 +272227,7 @@ CVE-2024-50931,0,0,bfe4e69023fe06db8f71d2d6d60e3e4922b2fefb11f278f99af6208127c39 CVE-2024-5094,0,0,9131e4ec77705e1acd3c8c99a31bd8bc0b96ba6f078ccba5366f7e6891b69426,2025-02-10T14:40:20.827000 CVE-2024-50942,0,0,74bb27dcec6f641721fef2704da713b75046095ccb8aeb2b392b8ef1abb8cd71,2024-12-04T17:15:15.020000 CVE-2024-50944,0,0,b076fd8f2f10d50911c6afe5f96c302ad9e2ba9d556044ae62121186adbd1b23,2024-12-28T19:15:06.197000 -CVE-2024-50945,0,0,b1cd23c065a1ad0674d97ea2fcc710a2a46524088f30c58fc1afb1b81db7d856,2025-02-18T22:15:12.093000 +CVE-2024-50945,0,1,d74e329c0118fc5dbc595f38ed6a316a51a9ae41cfcc3639919c80ee7e59c918,2025-03-18T19:15:45.810000 CVE-2024-50947,0,0,b5c008650b1de4762f100f17a965e455e14b58a340b5da1077acb62ce0721971,2024-12-05T20:15:22.180000 CVE-2024-50948,0,0,a83a95d033c1f852658f7838a2af99f42aaba2f1b7026fbced6a0131c0382cea,2024-12-04T22:15:22.627000 CVE-2024-5095,0,0,18b4308f836a45ef93eb8dd3e5b61ffc05eba17456c204bd53a6a5094eca36bd,2024-11-21T09:46:57.340000 @@ -272346,7 +272346,7 @@ CVE-2024-51156,0,0,f6b77151c60afbaf8d53a59734fbafa7af1588cdd272b2836099779a91a2a CVE-2024-51157,0,0,bbafa78b8a50c8fb1e7d4159721fdaf4c3afe6250954e7dd9b5098d387a20e07,2024-11-18T15:35:13.060000 CVE-2024-5116,0,0,97d9473289980f5059782f77154334969f4be33ef111aeaaae73feb786442882,2025-02-10T13:54:20.543000 CVE-2024-51162,0,0,f7989da3f04acdeccd7ac3514256e7ada64944ea90830784c7f181e1b7a668f8,2025-03-17T15:15:42.383000 -CVE-2024-51163,0,0,04a49ec72bbad9c9080a0d5c95af33578e7ecb7dcdb1c839f7d8c08ddead1ef5,2025-01-09T22:15:28.897000 +CVE-2024-51163,0,1,8265e829e2344f7d7c5f73a82b08aadda352aa4cac2ac65fb619729ab1ada0ce,2025-03-18T19:15:45.977000 CVE-2024-51164,0,0,d940764ceb362d708d88f9f5a08c2c1f5532b8b37b034d71dff6267e64a0a937,2024-12-09T17:15:09.107000 CVE-2024-51165,0,0,fb13fc4e35d92e7921bbef9ce68653c7bfa08c0c1cb970241bfa8c45e1d3cd41,2024-12-11T15:15:15.067000 CVE-2024-5117,0,0,e5b115d5f444b4671643135a6d67b513824277d63f351d86914824db903d86f7,2025-02-10T14:35:26.263000 @@ -273606,7 +273606,7 @@ CVE-2024-5294,0,0,5f7ae00e9a959f94251bcb983ddc17250c36ab864c5296be765aa222fa5fa2 CVE-2024-52940,0,0,dada389fd604fabcf8cad162ee7439c1b0f0631b96a74ff2b430a8633c0d2fd5,2024-11-18T17:11:17.393000 CVE-2024-52941,0,0,54a69191187ab640d350b9c58a59b08396ee95fad6d8092cf6c6613e7f3eba21,2024-11-18T17:11:17.393000 CVE-2024-52942,0,0,6cf0c15b5ef83e2051f563ad012c7c2537d693f3e904a0a40513e3040d82563e,2024-11-18T17:11:17.393000 -CVE-2024-52943,0,0,c2ae483fc4ce3e1c290619e18b20c69f995bae6fd27b9673c6715432a67c3f36,2024-12-11T15:15:16.507000 +CVE-2024-52943,0,1,2194f04bffdb46a4ca879705eec2d98deb95c8f6b35fb9e7bdb9944c4be3f4d8,2025-03-18T20:15:24.340000 CVE-2024-52944,0,0,13f4728598a9169659ecc5ab8bdcbf29b2aee05592382aeebb2b7ebc79d90c2e,2024-11-19T16:35:19.310000 CVE-2024-52945,0,0,2be5483c630004e32670c1bf2df159c2fc165530e70f2dd74d5a6bc11ca631e4,2024-11-19T16:35:20.020000 CVE-2024-52946,0,0,4f1dfe8b6d1ba4959015bfa97e83493e2bb850117484cc15efcaa811c3e03c50,2024-11-21T18:15:13.120000 @@ -274045,7 +274045,7 @@ CVE-2024-53573,0,0,c3e20d8447ccfff87f007a16c3e4b4b7293cce35a180bc230bee89e192db7 CVE-2024-5358,0,0,83e445e1bb1013b59cd13c6236f1ab370fff5556d9976328321efe50ae33b70a,2025-02-21T19:47:18.300000 CVE-2024-53580,0,0,017091ad6343956d021513aaff57df30e0f57917f14c0dad11fd7549b9689d6e,2024-12-31T20:16:06.953000 CVE-2024-53582,0,0,cce1965e7b4052e02c06570940ab4f482ad0e70a57583dab150a15faf0f215a2,2025-02-18T19:15:18.237000 -CVE-2024-53584,0,0,bcb350d26d56fe53df443bee56193f85d9083ae3759dc9276e8dd5911bba2980,2025-02-18T19:15:18.377000 +CVE-2024-53584,0,1,7ba23112667b3f7675b9d0f4383b067aedf47db324f1184621b694602d01b58a,2025-03-18T19:15:46.150000 CVE-2024-53586,0,0,301d02093d38a6f54562884a5fff3b8994d8a5baf163448220588eedaadf08a2,2025-02-11T15:15:17.870000 CVE-2024-53588,0,0,fe48f7787c676ce29f21d914524d1d78fc3ff1010b5196171b6a8de109978dae,2025-01-24T22:15:33.520000 CVE-2024-53589,0,0,307fbb546d42ae682f4eb30c791fb75b252f0ed41906a0b6f6e04180cc8c106a,2025-03-14T10:15:15.130000 @@ -274806,7 +274806,7 @@ CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a CVE-2024-54475,0,0,0cd7a97f6a5bdf6c5f1dc2dac1b33d81bed5b2cba36df8e6c42e07dbd4eaeb23,2025-03-13T14:15:33.343000 CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000 CVE-2024-54477,0,0,214101ca192690cd0de3dcf911bea71815c143b3087e79543d2b05745eb4fbe2,2024-12-13T19:15:09.067000 -CVE-2024-54478,0,0,acfd4b939a455c15764397aea9a175ac0768b96426cddb8021235270b936aa93,2025-03-04T15:57:53.127000 +CVE-2024-54478,0,1,185e14ec4bc0005e07a006f4b7765b2e47771fcc7ed24b00f4e6f4ea2e62b20c,2025-03-18T20:15:24.467000 CVE-2024-54479,0,0,bcd74f535cd6ff4dd05141776c66e2cae8469ec75af86bbc030e3e4a250fca63,2024-12-20T19:15:07.707000 CVE-2024-5448,0,0,fb51af8aa43452e6336e86308a3b6b8f94eaece6d7d51fb1e15ce1d675c555ee,2024-11-21T09:47:42.227000 CVE-2024-54484,0,0,6d8d44a97a2da2b3786c6a98b981454364bb44396885bb6b7514efbff5689d25,2024-12-13T19:15:09.227000 @@ -274863,7 +274863,7 @@ CVE-2024-54535,0,0,93cfc2e3f7ef6acbc5dbb1cc184a51f7781d104271fc6b2624d565551722e CVE-2024-54536,0,0,c98f603f951680ba4768b8a781e9ee4b1b50a2e9974ad3ec2a10b1d650e3b438,2025-01-31T22:15:10.077000 CVE-2024-54537,0,0,c68a6744bda0bf69e01783e98c5c4c4076f531c7f9b134c973d8c4233177cb65,2025-03-18T15:15:56.877000 CVE-2024-54538,0,0,7edb6abe162912ee005c390ccfee8e5c4c4cb96a25890eec5d650424cab9c014,2025-01-06T15:11:09.817000 -CVE-2024-54539,0,1,fbc1a67c719ba87fc736f69c24d4eab37517dc4991e2f2a79cb780df28816a9c,2025-03-18T18:15:27.703000 +CVE-2024-54539,0,0,fbc1a67c719ba87fc736f69c24d4eab37517dc4991e2f2a79cb780df28816a9c,2025-03-18T18:15:27.703000 CVE-2024-54540,0,0,45cbf8d0efbe2b50a737f3ba5c71b070e28795ef3412a885891858b9f7aaea05,2025-03-04T15:42:52.453000 CVE-2024-54541,0,0,f19c7b13045c8627a2b5a1173512bbfb9d625759e2824642b40f1cbcb1e144d8,2025-03-18T16:15:24.763000 CVE-2024-54542,0,0,e5a094da59025f31a497ea83cee49e2f88eb5fa3b5158cbc7466b9e85c396b28,2025-03-17T17:15:34.087000 @@ -275637,8 +275637,8 @@ CVE-2024-56337,0,0,53003cbffc45df9623db82452361ba8a0a459ad2bf417245b4c8041b16113 CVE-2024-56338,0,0,01e037bbc8b65d4635d05d0353ed4970b0e9897df681ff3cdba81ada4cd47c0a,2025-03-11T17:16:17.120000 CVE-2024-5634,0,0,a3b1c7a96781d36c1038c26ab5a2d267e349913830cb93adfed7285bdb2a684b,2024-11-21T09:48:03.610000 CVE-2024-56340,0,0,9b453f173d43e3f7b37887ea91bdbb36629dfe55ccdad720659cf38188277eaa,2025-02-28T03:15:10.363000 -CVE-2024-56346,1,1,5525e6f669de8e06e8617c9a48a07e760996276ac54ead317d559633bae8a56c,2025-03-18T17:15:44.173000 -CVE-2024-56347,1,1,e7e4a18bfad82d754460816da23125eeb6554e99dcd0fef9f6d5a2d359bcf983,2025-03-18T17:15:44.470000 +CVE-2024-56346,0,0,5525e6f669de8e06e8617c9a48a07e760996276ac54ead317d559633bae8a56c,2025-03-18T17:15:44.173000 +CVE-2024-56347,0,0,e7e4a18bfad82d754460816da23125eeb6554e99dcd0fef9f6d5a2d359bcf983,2025-03-18T17:15:44.470000 CVE-2024-56348,0,0,8aaa2ba55d8fe9db8a92a2d0ab499d623c381253cc0adc64426705df2faaf22a,2025-01-02T18:51:41.037000 CVE-2024-56349,0,0,22da00bebf6ac64c6a8cff1b863000f36f191d4d1414cab4c6d24fb796c53539,2025-01-02T18:51:21.857000 CVE-2024-5635,0,0,3e593b36944d3daa10635d485b6255328e5b9c2075909640e67f1b2c84107c4a,2024-11-21T09:48:03.733000 @@ -276125,9 +276125,9 @@ CVE-2024-57015,0,0,559c1f41db4b07569fd8f34461ee4cc0ab9cf8abb8f4d26444e2fdab359ec CVE-2024-57016,0,0,850796e338f48f156536ab37f7c45119c2b091d349009a63d7b83d5a0edc22f7,2025-03-10T17:23:48.830000 CVE-2024-57017,0,0,54624e242a7ea72e546dbcbe3522ad91dfa297cefabac8b613307955396e3be0,2025-03-13T15:15:50.090000 CVE-2024-57018,0,0,88513ced169b42c06a35f5f3dad8af71ece115206cec42a161e21a49cc4393f2,2025-03-13T15:15:50.280000 -CVE-2024-57019,0,0,91276e630e3eb0ac60abeca9c32bffa24a7be55d26fbb709f91b89fb35cd978f,2025-03-10T17:24:31.533000 +CVE-2024-57019,0,1,51cc8b086b8447cea4ec896f4a4e59d09678a95b81b389fa4b6049d603cd1d19,2025-03-18T20:15:24.637000 CVE-2024-5702,0,0,0475f3c0e898a1e0fb13fcae8449da95e6752ec9b4d015e07dac4bfa56be1ef3,2024-11-21T09:48:12.273000 -CVE-2024-57020,0,0,d8a42631bda1ff90077cfda1f01b0a02d7365f592f48815df6f80383e38ce3e3,2025-03-10T17:26:39.417000 +CVE-2024-57020,0,1,9454e1c3b56fc45c0cf376ca86b2277ead569dba13637690be836b10ddc0b8da,2025-03-18T19:15:46.330000 CVE-2024-57021,0,0,0783ac9280f5195c94c82d43c182876342e5cdb245119e654e821d65ed0809e6,2025-03-10T17:26:48.597000 CVE-2024-57022,0,0,1356d2451b9537ddd5990de88e26abbbe2cccf3f2db031034069b49632d38abe,2025-03-10T17:27:02.037000 CVE-2024-57023,0,0,01de6489e57ac073c34548807079eb2db864fcfb3e5a1353732f75c9ed7380a6,2025-01-21T18:15:14.677000 @@ -276140,7 +276140,7 @@ CVE-2024-57031,0,0,0a7c9925fff76639e4a1e661e30eab9b6c16404f1dfb446824f6ca23e0521 CVE-2024-57032,0,0,180562cd11363beec2b6e490274cc6861546687d49d70a64dfd8f2c9d68614ce,2025-02-28T19:15:47.470000 CVE-2024-57033,0,0,b213e3eee22d5746b72c15bc18b2e100f2a7f8ef13f3a1ff51e93f85d64bfa75,2025-01-23T17:15:16.950000 CVE-2024-57034,0,0,f7b3013f55cfd21edbbb403e8e50ace95b494e7b749f8ed3f7d43b029f40fbbb,2025-03-14T18:15:30.897000 -CVE-2024-57035,0,1,fc128f708fa5ccc76197fcb36159086bf6daf8c8d85d358c9d8bafe0fb4b387d,2025-03-18T18:15:27.960000 +CVE-2024-57035,0,0,fc128f708fa5ccc76197fcb36159086bf6daf8c8d85d358c9d8bafe0fb4b387d,2025-03-18T18:15:27.960000 CVE-2024-57036,0,0,55b7f3d5f4d5a99be083f64a92e65d0a6b625216d85565aff3a03ccb780b5c92,2025-02-04T16:15:39.170000 CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954e3,2024-11-21T09:48:12.583000 CVE-2024-57040,0,0,5ea2e5622bbc48143f47b14e4e3255cd65f152b262337519628c8107ee7f9aba,2025-03-04T15:15:20.283000 @@ -276180,7 +276180,7 @@ CVE-2024-57086,0,0,135d1edb19b1262b9b20dbcd6b814388e529b0c3b7b36d652139ce6df6ff3 CVE-2024-5709,0,0,9e7f02d16313ead7a68864ca2ed2dc29106d9085227941350b2847c3e4c2a85b,2024-08-06T16:30:24.547000 CVE-2024-57095,0,0,feaabc133222d755bb64c81b7f48c86d504504845f631c6909ee10ad4152eadc,2025-02-05T17:15:21.720000 CVE-2024-57097,0,0,0aa8def038760d05af55113d0f7b35e5cb38896a4bdade8a82816b6ba1b36976,2025-02-03T21:15:14.450000 -CVE-2024-57098,0,0,bc3680b9ef406eedf80643c3028aa0657d8b120b7a86ad3161f314352db59a1c,2025-02-18T19:15:21.480000 +CVE-2024-57098,0,1,2b712ecd75902b364904d59bc4d39e198ac5a0459f01b499e717e99c867cfa45,2025-03-18T19:15:46.517000 CVE-2024-57099,0,0,3b8a33af29410432f45bb7f3462c572f4dae046b22018e3d8f168db74c2d74f0,2025-03-14T16:15:37.813000 CVE-2024-5710,0,0,9b8da5c1d380b97df0420ebc8886a7e69a937a7c44dad142b0c060e78b36a5bf,2024-11-21T09:48:12.877000 CVE-2024-5711,0,0,ee26b23352bc3eb492910cce0ac4d4e0fcc138593b5b885cf10639f27fe76384,2024-11-21T09:48:13.010000 @@ -276285,7 +276285,7 @@ CVE-2024-57429,0,0,297eba09be9a31d8bb32c44b886b7969c1338623d7293e3f2a83e9f444bf0 CVE-2024-5743,0,0,8df1bf94ad8183aa6e1d1e737442c566d99a7f0b2a8ad07fdc7acab75f5a831f,2025-01-13T18:15:19.517000 CVE-2024-57430,0,0,63a6a1ac0822bad0ab26c02299c744fb745170f033551fdbc088f42c0259357b,2025-02-06T22:15:39.493000 CVE-2024-57432,0,0,380d211416623b84511e89447189d47b0683a0b0ccc670e5ff43709b349e197a,2025-03-13T14:15:34.393000 -CVE-2024-57433,0,0,3ff41a92a203aedd51dea8ae35e4e00020c8ba9d03cb7c8ba922c476114a6561,2025-02-18T19:15:21.827000 +CVE-2024-57433,0,1,b091819444f61817a6c1132debb1b85d4dfb565b67e7cda9bab62bb3e1fa30f6,2025-03-18T19:15:46.680000 CVE-2024-57434,0,0,4cb782d653dc97e32efd3c538fcda0d8ae1d5de2464c175da5ed00584e2c5b3b,2025-02-03T21:15:14.600000 CVE-2024-57435,0,0,134ca1f67bc68a11fbb69f0a724e0c3096b5963737c85b95313876fa3bad9ab7,2025-02-03T21:15:14.747000 CVE-2024-57436,0,0,3d5f7a7afcf99c6d025cec3b59922304e5389dbde8d31acf382e0c8e658f02d2,2025-01-29T17:15:28.480000 @@ -276302,7 +276302,7 @@ CVE-2024-5747,0,0,b0a73052a2b0fb8e91ca0186eb03a0a139ee155bf24624c988c4f85a0b80da CVE-2024-57471,0,0,046199a988b5112e867977ad6d82bd57c13f52bc945d9be0e662c5b8b39ac509,2025-01-23T17:15:17.410000 CVE-2024-57473,0,0,d4deaefeb6fcbba59b8ce003fdeaebe59c96858a04f801a87a31eff516a545c7,2025-02-18T22:15:14.820000 CVE-2024-57479,0,0,a4fc4c04a4d0cd0e22b8fe1e9d84faf33bcfbb80c5a2b55e9ddb9daa820188a9,2025-03-18T15:15:58.493000 -CVE-2024-57480,0,1,8afd2f2509d24fb5fcd6d83f3abd7082d4bc0ce361a4921ced1cc67aa295a249,2025-03-18T18:15:28.130000 +CVE-2024-57480,0,0,8afd2f2509d24fb5fcd6d83f3abd7082d4bc0ce361a4921ced1cc67aa295a249,2025-03-18T18:15:28.130000 CVE-2024-57482,0,0,859c1ed6b53c872a2c976c747abee784c7f6cb88ac30b945b593d0bb4868f5bb,2025-01-23T17:15:17.677000 CVE-2024-57483,0,0,d80de86b8577cf6f4a0d95e5f2ea9968ae2b8769217aa4f6a37a72d077531697,2025-02-18T22:15:15.143000 CVE-2024-57487,0,0,7babb41ac17147ce892708b7e46321375976a25b6830def13d44a67b1829677d,2025-01-13T20:15:29.090000 @@ -276345,8 +276345,8 @@ CVE-2024-57577,0,0,c2ca740d64178d79e701f87d77435e5e110f6b93d81b486ce3155e5334b27 CVE-2024-57578,0,0,f6ee105c596cfeff44d60f047426016c918d26affb6df36e058606aadb7fa62f,2025-03-17T14:53:41.467000 CVE-2024-57579,0,0,71c6bf8bc720debc6717572f5f0e278cc46ae7a1f04604c3faa7d343c2cacead,2025-03-06T12:46:16.043000 CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee99e,2024-06-13T21:15:57.543000 -CVE-2024-57580,0,0,7495bb79fd515807d3ed5e4e5262cac6c1e65f01a20fd431ab96a8bc820fc828,2025-03-06T12:45:57.383000 -CVE-2024-57581,0,0,a477831ebbfeb20f66fb2e9badfb9cfd6af17c7f7c9efe7e9212428084db63e5,2025-03-06T12:45:43.120000 +CVE-2024-57580,0,1,ecfed55cf5b358c127e395a3e898c26702966c4825a41b3d33a695e34d0cb776,2025-03-18T19:15:46.850000 +CVE-2024-57581,0,1,4a3545198765c6460c9df2bbd8da1004daef02a4f94355754c92d51aeea05e63,2025-03-18T19:15:47.037000 CVE-2024-57582,0,0,7f0bdbfb20bee47b5db3337db07c31ce48f2668f9c89a58867304315f780738b,2025-03-06T12:45:04.363000 CVE-2024-57583,0,0,ccfb387ff3c30d35babb34dfb2c64006998b94ce941ed7ea8395016f8be83325,2025-02-04T15:15:18.557000 CVE-2024-57587,0,0,69e0c38068f525a5b86457cd182be111c6d82d7686ae8a5f6131539166579a3b,2025-02-07T17:15:30.453000 @@ -276411,7 +276411,7 @@ CVE-2024-57651,0,0,5e8dc54af74efb76238cdd0ddf66365828c5c6ae77832d24a8a6fc6b71203 CVE-2024-57652,0,0,d73e7be12017c8f1cd68a94beba6a947fa401580f763e064115069718c3a2579,2025-01-15T15:15:13.130000 CVE-2024-57653,0,0,42fd65211c7003dec5322ac0547672e4d3c8aab01cf5d3ed6c45ebb091bb68ec,2025-02-18T22:15:15.247000 CVE-2024-57654,0,0,7f766ad02bc18df38721852911dbcc4b021e73b25a35d8fd990c3fd3aec04d8e,2025-01-14T17:15:20.233000 -CVE-2024-57655,0,0,471e085f78e1b6f30bcb9460196e96f4328b50648c88f7355e9c3c588d5adb1f,2025-02-18T22:15:15.390000 +CVE-2024-57655,0,1,1be0c1177e28b1a1bb7b680ab7109b0c840777062bda07d33388651769ea2a54,2025-03-18T19:15:47.213000 CVE-2024-57656,0,0,09f0b8883074ef04a8cc8b0a0a6aed2bc5831dface16b2e7f31140043840c295,2025-02-18T22:15:15.500000 CVE-2024-57657,0,0,f0f36689ca3587fbebc743bb746b66a7a8e4cb410e6c287b794bba490f498c74,2025-02-18T22:15:15.610000 CVE-2024-57658,0,0,e12e2e5c80101e7e7b06d323b6720ff3675db1a8a27ec11343898fca21b6fc03,2025-02-18T22:15:15.713000 @@ -276452,7 +276452,7 @@ CVE-2024-57716,0,0,79da6b902a2967abf048782629438cae155ee0d179ea2083ddc6c325108a1 CVE-2024-57719,0,0,9af381064dc4b979246282f21dfbef1d0e1e6baf2733f304b6946b2054a0e999,2025-02-18T20:15:22.603000 CVE-2024-5772,0,0,a62834c0864387c3b698a85018242263bd7f240d52606a720f52cc14c8c47fba,2025-01-29T17:46:54.753000 CVE-2024-57720,0,0,c6ea7c04d1f31cae7cfb088d00930ccdd0afdbf506292dce573bf98c3a05537d,2025-03-14T16:15:37.977000 -CVE-2024-57721,0,0,97e85aac0ad051ce81fd749680f6dc63eb6314c55408b4a2a4a8184132a3a229,2025-02-18T20:15:22.773000 +CVE-2024-57721,0,1,c83b53b1f3da4e985aa3e8c6db4fa9cfaecd34c84a7a02eed4e5ae091c579b1b,2025-03-18T20:15:24.810000 CVE-2024-57722,0,0,fe5f4b3d273b2bf55fcc76e08e5390fbe140aa7e5c09f86912f960a4c7a9604f,2025-03-14T18:15:31.113000 CVE-2024-57723,0,0,8e59af0b5c33018d2e706542c7daa5581adf5d17448945c2a6faa9c3efc994be,2025-02-18T20:15:22.937000 CVE-2024-57724,0,0,43482da76e1d3664f5827ca7ff902585915c01a2cfee87e8119ace671edec575,2025-02-18T20:15:23.023000 @@ -278310,7 +278310,7 @@ CVE-2024-7523,0,0,f13e17fec7b712d2ff722ee60bc595616fefe0c060f612be303ed7abce377f CVE-2024-7524,0,0,1c33a78135a0348b5deb301eacd40951f93c35202649ed9fe973897b37a487b9,2024-08-29T17:35:34.820000 CVE-2024-7525,0,0,bf1c6b3357970632305c248d6f777d64dc59dd8b78c3b2f855aac892e3aceba8,2024-08-12T16:07:19.537000 CVE-2024-7526,0,0,bcf3be9f0b42ed990248632096ac5041cc95aefd5b836574a1cf1761b02ccb19,2024-09-17T19:15:28.857000 -CVE-2024-7527,0,0,dd88c9ffcf28642670e34bb7978d3fb89a5003d2fad7b9739e5ad2ee9c9f6561,2024-08-12T16:08:06.493000 +CVE-2024-7527,0,1,30315f5378e42ae6da25c368db25075ce23fca5d6f156e8209b791169b9cac64,2025-03-18T19:15:47.403000 CVE-2024-7528,0,0,c8bfe67385e374bd68c77b90ce45e720cd558cc2615f6ec792042b11d88d3bd5,2024-08-12T16:10:00.647000 CVE-2024-7529,0,0,4219b167d821320fa40a3e5584206ae6ca561f693fc32450d41f2afc84d0bc45,2024-08-12T16:09:09.390000 CVE-2024-7530,0,0,a94e3ed3fb0460188608bea4d31014e57ce73bb6b443d15ce385c34bdc2f9c16,2024-08-12T16:09:56.687000 @@ -278480,7 +278480,7 @@ CVE-2024-7707,0,0,25fc1818974e0e05de0a10e02bdc4a463d72de05087dced6f47f578b56deef CVE-2024-7709,0,0,3544082fd334d258e9d60d813b40437f4c812458c4bdd47758f069c64535df6d,2024-08-17T10:15:10.957000 CVE-2024-7711,0,0,a400df9ec02be1ae2bea5776219421b58d9046f221818f863722b0b2a899a648,2024-09-27T18:17:05.577000 CVE-2024-7712,0,0,0b5a8e9c5ba36af8bef340cc5ae017c9fa1ba3b9186fddf3fda3dcc554ec2462,2024-08-30T16:15:11.050000 -CVE-2024-7713,0,0,11338fff8043382ad58b11bb2f5f4ae6b2c0a4b0931babac7fb6a1896670dc65,2024-10-04T17:28:45.807000 +CVE-2024-7713,0,1,bda607b9b14ec40c21c63822850ad81e5a04a45ea2107cb90103f9145590b17b,2025-03-18T20:15:24.980000 CVE-2024-7714,0,0,01afb6cfa94d0af75cbbb9cdb172c38bfbe81db5d0bdb5ca7ce93867a3f895ab,2024-10-07T14:21:23.573000 CVE-2024-7715,0,0,014141eb3b0c7db31298e7b0a8e4dc857f8f21649dbfb905c2def570bedfb8f1,2024-08-15T15:15:22.690000 CVE-2024-7716,0,0,4c6dc1fc6dc83b911ca170128dcb950554d10dd63dce741ad1645c7e27404e05,2024-09-25T19:35:32.990000 @@ -279522,7 +279522,7 @@ CVE-2024-8923,0,0,48441981c92606209e58726fd8ebe6aa4293d8572dced7ca9fcd00364e9ba6 CVE-2024-8924,0,0,fa653b47436154676c3f1b541069065d978b00290a8ee89e15492973ea1ea94c,2024-11-27T19:32:01.823000 CVE-2024-8925,0,0,f8e6224c919b32dad944cbb3d7da3b4d7b30369cbcd1a2c103a12e6bb26c7138,2025-03-17T18:15:20.433000 CVE-2024-8926,0,0,0db6b70422e4c74e0e6e0922306ca8e484c13b8b2dbf5085c65680de40466219,2024-10-16T18:35:59.500000 -CVE-2024-8927,0,1,aafe8ef71dfcc052ecaa8fa4a1e0007cf5cf5ad740e9765835524ef8a42eab43,2025-03-18T17:15:44.707000 +CVE-2024-8927,0,0,aafe8ef71dfcc052ecaa8fa4a1e0007cf5cf5ad740e9765835524ef8a42eab43,2025-03-18T17:15:44.707000 CVE-2024-8929,0,0,ff6a045732aac1c81eaaf843b68c1293fe05ebd7ecf4460b6fec091ede522e48,2025-01-10T13:15:10.460000 CVE-2024-8932,0,0,c5fffc9638f172950dd3b0bc71a124092612a89bfe67c2c048ea6a2b2b43d457,2025-01-10T13:15:10.617000 CVE-2024-8933,0,0,e152f6df34730481cad628f83b188861c2c7c15e75dea66549d9b61f891274d1,2024-11-13T17:01:16.850000 @@ -279914,7 +279914,7 @@ CVE-2024-9394,0,0,958ce1f2261ebc7b18d0cf704e326091d699d7faaed1195d3dfa8998ffc300 CVE-2024-9395,0,0,2554a13607d564fd29a88bbed7fcbe8c28486d0f8a8445d3ed0f82d1c54dcb5f,2024-11-09T08:35:08.270000 CVE-2024-9396,0,0,c10a3e20decda098f06933d1de462ae3fa4f1a66fa91c3153629d4c02ece6dbd,2024-10-04T13:51:25.567000 CVE-2024-9397,0,0,e785e68637a9eb7f98955d1d3605a5e9bd0aa4ae19ce434a28489946af2f3e32,2025-03-18T16:15:26.400000 -CVE-2024-9398,0,0,7816fdd7397120327755103e2ff0ea3409cc166af2d1e6a5235c318b69a40392,2024-10-30T18:35:22.757000 +CVE-2024-9398,0,1,36e3149fe1fdc0528e9410f73ed17f167cbc70551f1fd789ccbf1a7cbb61fe91,2025-03-18T20:15:25.150000 CVE-2024-9399,0,0,d8e406ee1beab284cfa9cbeb45a0d2c953df97248a1bc9b6aef82180ed3da0a2,2025-03-14T16:15:39.400000 CVE-2024-9400,0,0,4e0eb218b5de55a15a4a85f62e9e541831946bea4c202524d5661f5eb345d7e0,2024-10-04T13:51:25.567000 CVE-2024-9401,0,0,96a7de06dd58c9c71f25b07ec603b05ba47f7dd964cd736693ec4ab35f2b79cc,2024-10-04T13:51:25.567000 @@ -280658,7 +280658,7 @@ CVE-2025-0432,0,0,be1a96ec1a155389d359c137e77a07190805d57ba524277b7183ba768a401b CVE-2025-0433,0,0,8176875a60ba9233cb301d8a0e9b4f4b8bcfe49da3dc80cfb0257115d68714b5,2025-03-04T20:38:54.387000 CVE-2025-0434,0,0,865677e7d723396f8f162183763a82d312d1d17bfef7ef19d82b8b00574da547,2025-03-14T16:15:39.610000 CVE-2025-0435,0,0,604058ef793e33435759746d46c23b90cc51452de4822b6472440608e3ab5958,2025-02-18T22:15:16.540000 -CVE-2025-0436,0,0,72789f2cd8147d5a86876c7b0b79e40e25dcd2c9396b81691e6fd199d1206765,2025-02-18T22:15:16.627000 +CVE-2025-0436,0,1,040db70870a9b4a1f4f472cb714947a73423d7303f229ed73ca1d249dd10a962,2025-03-18T20:15:25.330000 CVE-2025-0437,0,0,13fe255170db1ac9d25ee4d2027f7e4790c577c7c77e5e9506d3559bc1d4114a,2025-02-03T19:15:13.967000 CVE-2025-0438,0,0,8c7333aeb87f87a4f7e9edbefc8fc5ab12029c07bdaef09c154718d38cd9690f,2025-02-18T22:15:16.743000 CVE-2025-0439,0,0,101658db461148311c4db52613ef0d8a033b47ac11db7b69a0cae87e2b2f57c1,2025-03-17T16:15:24.267000 @@ -280733,7 +280733,7 @@ CVE-2025-0521,0,0,ae94a1fe73318139f9da2622de592c6e10d25105d56f65a8078c6428a35bf2 CVE-2025-0522,0,0,1e9e3755e68e2bbd69ce1d312099a265a0867df3b26961a22b4b204a4b714b47,2025-03-14T17:15:50.237000 CVE-2025-0524,0,0,37819c19da55dc60e3a3bfde06f3c5736bf650ef35aa39acb4440286af685285,2025-03-15T23:15:36.430000 CVE-2025-0525,0,0,a16c2b8ae85412f40af57db61a3c37ef6168842996c9a168770855b255640d23,2025-02-18T18:15:28.850000 -CVE-2025-0526,0,1,252c0bf19f01ed542cb3264d62837806fbe65d93a0162e46556666adf8c692d3,2025-03-18T18:15:28.290000 +CVE-2025-0526,0,0,252c0bf19f01ed542cb3264d62837806fbe65d93a0162e46556666adf8c692d3,2025-03-18T18:15:28.290000 CVE-2025-0527,0,0,874394a5c6c21d00a65fcc7eec3ac33172dbb0bfaffc55e755ec0459c5598a31,2025-03-03T15:57:02.860000 CVE-2025-0528,0,0,9a5ff48ddd9d71956228edb95dc0cb0945dc75209025b5720233df418ad510e7,2025-01-17T15:15:12.430000 CVE-2025-0529,0,0,2491e50ad07ed539d39ff7934a263957f131237fe31e5c871567cbe6fea67816,2025-03-03T17:42:45.550000 @@ -280823,7 +280823,7 @@ CVE-2025-0659,0,0,4fe159addabb5574c2c2f98c745f6aab39810c9877de9d524c91d168b8982c CVE-2025-0660,0,0,2f19aefbc1c75c0364e72feb29e1b4f1f08ec1e05080e6fe5457fb25f5393947,2025-03-10T21:15:40.110000 CVE-2025-0661,0,0,b1e3b3e01aec6a0429d6cfbed29279169cf9ca980f886cdc2d225d4899ed12e8,2025-02-24T17:10:16.007000 CVE-2025-0662,0,0,33daf52cdf419d482596718a6ca1d8792f8f25da15f58b8337c49907fcbd7414,2025-02-07T17:15:31.157000 -CVE-2025-0665,0,1,cb0bd9cf98484accede609d5aacb307ca092db3e8f950b5383edcf9901c2a4ad,2025-03-18T18:15:28.427000 +CVE-2025-0665,0,0,cb0bd9cf98484accede609d5aacb307ca092db3e8f950b5383edcf9901c2a4ad,2025-03-18T18:15:28.427000 CVE-2025-0674,0,0,6c39db7af62f37c0b44063680ba18af7d951adbde12586340e38d9aeb6048261,2025-02-07T00:15:27.017000 CVE-2025-0675,0,0,08dac668b15b1b323f36ad42590ad19042939b423a1bc201978135ab31be85b8,2025-02-07T00:15:28.030000 CVE-2025-0677,0,0,fc7fff60af52aedb8853b612fe5c7b8dfbe345cea75377cd46c5dc68fb745fa8,2025-02-19T19:15:15.280000 @@ -281434,8 +281434,8 @@ CVE-2025-1624,0,0,3d2d28437205c949e1e000c13ceddb227ed65ca0c37ababc2b252fbe1d724e CVE-2025-1629,0,0,98e40b68e5632eb91f4db527ca6594bcd0a0e66070641abd7d2f14eb9bdef0c3,2025-02-24T05:15:11.280000 CVE-2025-1632,0,0,28fe99b7a4053d94bf92a115fabddf2bf6f2fcf0d6264d4d013a0dc1f70735ec,2025-02-24T15:15:13.217000 CVE-2025-1634,0,0,765d25a71e7596e3d1f1f1f40fca8aaec5cc08e3158b2f39db981240c06c1630,2025-03-03T14:15:34.237000 -CVE-2025-1635,0,1,47aabed071498e67f6b790182bf107f39e0743498ccf0a7bbe6a278ecc424354,2025-03-18T17:15:45.017000 -CVE-2025-1636,0,1,5c3492630ae3406e3a5b69018aeb8c51fcf5010ce6bdb8f42c1a19106407dd65,2025-03-18T17:15:45.263000 +CVE-2025-1635,0,0,47aabed071498e67f6b790182bf107f39e0743498ccf0a7bbe6a278ecc424354,2025-03-18T17:15:45.017000 +CVE-2025-1636,0,0,5c3492630ae3406e3a5b69018aeb8c51fcf5010ce6bdb8f42c1a19106407dd65,2025-03-18T17:15:45.263000 CVE-2025-1638,0,0,627220f87bb0a3619d145b1fa74713ce7dfbc18460f28421739180b159028d87,2025-03-01T08:15:34.167000 CVE-2025-1639,0,0,da159a509ff0db0fc6859254884c97bbcb558323cbe73cc135353de09e900bc4,2025-03-05T16:42:35.967000 CVE-2025-1640,0,0,ba1070cfb95f1953dddd4c9b0d163f5480fe2b853bdc18f3b9a9da9de694a46b,2025-02-28T17:50:32.953000 @@ -281788,7 +281788,7 @@ CVE-2025-2063,0,0,038d4246ae8fa0373a417af84af0377292e57baedd6c7ae2e98ea265bc6bb5 CVE-2025-20630,0,0,0cb6d1c0b91807d74fd49faca2a027b3e775f1213907ee8f88e4e58cb3b78a59,2025-01-16T19:15:30.110000 CVE-2025-20631,0,0,eae48a24cdb26043896339096d80c579b21423122c0cfb7d1789d616416831f6,2025-02-18T19:15:24.347000 CVE-2025-20632,0,0,a969832868dfeb065ef85d46f111fa582b74e32bc8195140bed8e964787add5d,2025-02-18T19:15:24.460000 -CVE-2025-20633,0,0,38e2a030fd0d7f547703f3781e9e02df03269c9ee8f44017e895217aa066b8bb,2025-02-18T19:15:24.563000 +CVE-2025-20633,0,1,6bb11c096882f0fa2e53be93f073398b5914dda7109516b88148255d86708332,2025-03-18T19:15:47.673000 CVE-2025-20634,0,0,fc3c30b117b6bc8a9d8dd2703312cf2f61010370e7d8111081368f7b9b811b3c,2025-03-18T14:15:41.747000 CVE-2025-20635,0,0,8539c0947a7b8ea603fd19e11d259a5fccf8cdeabef5ef4676784c0a0d03499e,2025-03-13T20:15:25.597000 CVE-2025-20636,0,0,53b7c37fe38dde7172ef3ef0f4e80e1b55d45c79cbcdafad69f9ad23a7de5c5b,2025-02-18T19:15:24.960000 @@ -282241,7 +282241,7 @@ CVE-2025-21529,0,0,4c7a012163f04cc8de95049169013b919bfdfb658a06c133c7cff3a918912 CVE-2025-2153,0,0,0114cb6c24ec85d080a0ada30984016e9f148ff63e9c1959cf4aa96c851f0e4d,2025-03-13T18:17:10.693000 CVE-2025-21530,0,0,04f132e61df45530c2e28c300f4d1240182e9ad68786f1c2c52d6128bf7e5919,2025-03-14T17:15:50.977000 CVE-2025-21531,0,0,a10f6ce71dcae33c91ea0d30cb2042611ddc0c276623a2f99632cda89a3d9a70,2025-01-22T19:15:11.807000 -CVE-2025-21532,0,0,24d283ebf9e83eedc77bd765fab01c9d1c1c0ad92a193cdae6d8f4a7be52dad1,2025-02-18T21:15:25.820000 +CVE-2025-21532,0,1,ff62206288e1ce3e2eb346cc4f07db2099e0d4a0af5b22a41c25d9e7ed7c5c99,2025-03-18T20:15:25.563000 CVE-2025-21533,0,0,e0d626e9e9f9179bc48a13fd06aabe0dd1672abd415adb6c81ac669d8dab8c17,2025-01-22T19:15:11.927000 CVE-2025-21534,0,0,957db063f74a1abf6f9d153952f50284ceae37ec7e233084eac13cdf7340219f,2025-01-22T19:15:12.040000 CVE-2025-21535,0,0,a7f3f871fed6e33a9aaf79b197bf078d043485f7c9d493ffc9a8cebfcd7f4af7,2025-01-22T19:15:12.150000 @@ -282256,7 +282256,7 @@ CVE-2025-21543,0,0,53374fe0ecf629c278210d26d1681ca091ab0395a1fe0f57b870ba5811f37 CVE-2025-21544,0,0,980b23066e2438b2ca08079f7db43e8e73ce5aa9b8984f4251d41d219739f055,2025-01-22T18:15:20.993000 CVE-2025-21545,0,0,ae165462504507994171914dc95c399eec9b17a232b15512feb5d6c34ad5b418,2025-03-13T21:15:43.297000 CVE-2025-21546,0,0,1bc75ca469036c8c2de838e6459d5f4afe6abaec51522949c6e58c0c18f31efb,2025-03-18T14:15:41.940000 -CVE-2025-21547,0,0,017438336a031ecfeb419dddba734aad9917fddf073391ba67ba0a836c8e9c64,2025-02-18T21:15:26.180000 +CVE-2025-21547,0,1,5659e9dc8e4681ee7191f4b151d0347009e2c2397580a5555cd29c9f815830b8,2025-03-18T19:15:47.860000 CVE-2025-21548,0,0,2356141980923b17add14f81c695e4cf913f4da3b633ff33eaa98cfadd55cdd1,2025-03-18T14:15:42.087000 CVE-2025-21549,0,0,b2a50028e1bcc49830245cddba3f2301a2c50c551db0641ba7ec8ccc88064540,2025-03-13T19:15:51.240000 CVE-2025-21550,0,0,e5b6aaf4a7d686aaab6f9ee2b427fd22c3f2ad68b4a328f360cd3d2ca4ff7acb,2025-03-13T15:15:51.980000 @@ -282305,6 +282305,7 @@ CVE-2025-21615,0,0,cfb97692b989fd81bccccbf2f2ca2fbd2b4edb015e27dbadb4aef0a4db09e CVE-2025-21616,0,0,e559ef4ac5df61efe4cf0701da0053dbddf1460e9e7d82184184acca52d86c59,2025-01-07T16:15:40.390000 CVE-2025-21617,0,0,7b4d3cd409e247af145af2eb5a48d15c4b9f239c86e7d266f2a1e45e29cfe915,2025-01-06T20:15:39.453000 CVE-2025-21618,0,0,4425792278b201104db9f7fa71a6c17d2d2e26fd03424c47aa403a753e20877f,2025-01-06T17:15:47.660000 +CVE-2025-21619,1,1,29cb6c4a8457365a09c908cc8103d07286e474f53386689c0199a67acd560e79,2025-03-18T19:15:47.997000 CVE-2025-21620,0,0,aefab78f4e8b7a931e7536d08b17991e6afef83a4bc3ab5d14fb2e61be0949bd,2025-01-06T23:15:07.770000 CVE-2025-21622,0,0,f9b304c8cae09855d048ff95696b50613640a9fdc9c30a5aadd5c3b3ce64c9b7,2025-01-07T18:15:21.703000 CVE-2025-21623,0,0,11a3a4b165ac7ea35d006622a2c31920fdd49ec8509c7c0bc152edfb3b703f1b,2025-01-07T17:15:32.313000 @@ -282991,7 +282992,7 @@ CVE-2025-22765,0,0,05da1bdc9e7167edf5387de0586b61a1995a9741b623487d7015cbf79f0a6 CVE-2025-22766,0,0,343e87bbd358f52869bf43f77788e51e9a96e6bce59424af557599ac7a821c7c,2025-01-15T16:15:39.700000 CVE-2025-22768,0,0,d67e24e3bb095b6fc3cdd1ddf309e20d3ead32546acca77b1e796ad170199e1e,2025-01-23T16:15:37.403000 CVE-2025-22769,0,0,4e6d679e63f8fe706c18670ecdd89233f779b3c6dadefbabc9659ff336c0b4a9,2025-01-15T16:15:39.860000 -CVE-2025-2277,0,1,cf9ff4985b9ed26fd50a71c17f474b066305b0d2fd8d5ad5d89d1344cd28a585,2025-03-18T17:15:47.460000 +CVE-2025-2277,0,0,cf9ff4985b9ed26fd50a71c17f474b066305b0d2fd8d5ad5d89d1344cd28a585,2025-03-18T17:15:47.460000 CVE-2025-22772,0,0,a49a7641398a6c78abf7bdcb1538e84ecbf25664c0b69cb2fc2516de3178101d,2025-01-22T15:15:14.990000 CVE-2025-22773,0,0,fcf097b5a8bf8f017de7fe5f8a18a77369aacf0486c55459d6bb76d657f29d3d,2025-01-15T16:15:40.027000 CVE-2025-22775,0,0,7d2a06197d6a9d775e8fbcfc5379bbce7f2f443442e1d2178247e5bcb0b27213,2025-03-13T15:15:52.570000 @@ -282999,7 +283000,7 @@ CVE-2025-22776,0,0,3a44d2ed038c8fcf2a82ed573a85678c06e1f13008a49c36e4d4a59c650fa CVE-2025-22777,0,0,6e361a5228daa020e40ee58c141da823e7968148e70048924a6df32b9ceb16ce,2025-01-13T18:15:22 CVE-2025-22778,0,0,a2bc20469f55e874da32fca9be88da64c934748fc51c1927967277612aa1f61f,2025-01-15T16:15:40.350000 CVE-2025-22779,0,0,1dbe2ad312835dc346b83ea64bb7019d11586a48cc8d249ef5a6c76c895b3238,2025-01-15T16:15:40.510000 -CVE-2025-2278,0,1,561180bd46cf51d19a3cdbb94bf0249db283e0249df2bb035a2b96b1dc90d1f4,2025-03-18T17:15:47.670000 +CVE-2025-2278,0,0,561180bd46cf51d19a3cdbb94bf0249db283e0249df2bb035a2b96b1dc90d1f4,2025-03-18T17:15:47.670000 CVE-2025-22780,0,0,2d5a324e293c4c4f1be80441263a70eba23c271f2f2cb79bdaadc07dcabb9591,2025-01-15T16:15:40.660000 CVE-2025-22781,0,0,1afa1e21c86cac8ee7b1d1071985c89e8ee67ff99915e1b488521ef5a115afa5,2025-01-15T16:15:40.813000 CVE-2025-22782,0,0,4d4a57c4ca0b47080b236548a74a5ed3bac54edcb8336bdf840fd3b341ca7ef9,2025-01-15T16:15:40.973000 @@ -283014,7 +283015,7 @@ CVE-2025-22795,0,0,6ef875d457c8e19bcf577814595be38d790143627f91775ea895c88416ac9 CVE-2025-22797,0,0,bfb6494fa60ec5385c83095c381eb3d371c5ac04e9a0e3e98e9fb531b781c320,2025-01-15T16:15:42.200000 CVE-2025-22798,0,0,4bb5a9aaf24c54efe5fc5f3912b846eb9cce5d1ee04c046662973251c02694d2,2025-01-15T16:15:42.343000 CVE-2025-22799,0,0,6e8872882381d68d869db15147218f1df6746b9c043b33787660b5e87e5fc5e6,2025-01-15T16:15:42.490000 -CVE-2025-2280,0,1,c600ee299db6fbe4dea5dbc115e68093f4f6491d41513b4303a551f9be05f78f,2025-03-18T17:15:47.873000 +CVE-2025-2280,0,0,c600ee299db6fbe4dea5dbc115e68093f4f6491d41513b4303a551f9be05f78f,2025-03-18T17:15:47.873000 CVE-2025-22800,0,0,997e3835a4655649ba94b8ddeb47fb1ff239e42030c36467b8eb9689698fed1a,2025-01-13T14:15:13.067000 CVE-2025-22801,0,0,c83deac6a5c5c2cba0bd79ad3064ebb1b72b5ce6e25705a33f2e1f95b55a8ff2,2025-01-09T16:16:29.323000 CVE-2025-22802,0,0,4ee09a11670407cea09cb459dd4de4a2924f74334017dc53487f4f767d32ad7b,2025-01-09T16:16:29.470000 @@ -283054,7 +283055,7 @@ CVE-2025-22866,0,0,c708175c229fdd910b5da4acb829b622112b0d84eed2186edc0f9bf19e465 CVE-2025-22867,0,0,89eb6539ba2561e6ed2f62e1706818e853753182ae09675c0ce3557a15684ce3,2025-02-06T22:15:40.393000 CVE-2025-22868,0,0,e60277ea4cd9e8b52a0bc5998998d4b70d591016f1b5f98965efe1007387aa98,2025-02-26T15:15:24.993000 CVE-2025-22869,0,0,5fcceae088032b557e3959982bed74e41a764f7c84c3726bffbbd6756b1cca25,2025-02-26T15:15:25.160000 -CVE-2025-22870,0,1,5e2155600788a6616ffe365d219c4b2615228a685c5d4bcb3d43989a57212eec,2025-03-18T17:15:45.467000 +CVE-2025-22870,0,0,5e2155600788a6616ffe365d219c4b2615228a685c5d4bcb3d43989a57212eec,2025-03-18T17:15:45.467000 CVE-2025-22880,0,0,755860b5cb6bfe06dab2e3046cf933164388a1927143f657d932a4500aa42249,2025-02-07T08:15:28.737000 CVE-2025-22881,0,0,bac764bb844fd45fc50560c993c0edd1d8ed2c5159276215579d0cda943f98d6,2025-02-26T08:14:25.137000 CVE-2025-22888,0,0,83c67ff923e9645ec5fafd719e12957b03331dea9b9bd08e509c66897fdc51d1,2025-02-19T06:15:21.687000 @@ -283072,7 +283073,7 @@ CVE-2025-22912,0,0,bc13de059e2dac442bfb981cb719957ca16fc9db7927c792711a8a050a6d3 CVE-2025-22913,0,0,cd3c3aefe7c3a5669cde7a2ee1d89cefb3b13bfe1cdbf0f6d928668a7ec0e974,2025-02-18T21:15:27.790000 CVE-2025-22916,0,0,6c28d06c66a3a04473870372fc3d915bb705229b4ce4207a1272b25cfd8538c4,2025-02-18T21:15:27.950000 CVE-2025-22917,0,0,0d72f7ff6d66913d2820416ce95685d3bc853139131a9698fa080019dc84bb06,2025-01-29T16:15:43.907000 -CVE-2025-22918,0,0,2fd7b69a5783a0816fd30844977f8382a02d00bf28fb9a113c66c1ed7d87d02d,2025-02-18T19:15:26.700000 +CVE-2025-22918,0,1,34d0d301ce186de3a900525a1d20d1fc6818f460c83c7c8b34ef0ba83d9f1c2a,2025-03-18T19:15:48.183000 CVE-2025-22919,0,0,329e8b26e961cfd3a5f94c152403744377d574dcba7ab4dca039db01cbe65e83,2025-02-19T22:15:23.623000 CVE-2025-22920,0,0,90e7ff21ce793067aa456b5ccb84cf38ff13a7ab9f13a9d4f7138f20eaa66180,2025-02-19T22:15:23.810000 CVE-2025-22921,0,0,fc4d8d5f4bc002d31a8eab55216be4cd1b637344934aafdd7df2486b9762015c,2025-02-19T15:15:17.497000 @@ -283101,7 +283102,7 @@ CVE-2025-22994,0,0,82a19f803fc092043edd0b748f001df679276a70393f74dc553062174651b CVE-2025-22996,0,0,c50cf62284cf751584047e7a98111e31ae9d7e05423e0e28a6dfeca6772a6ab9,2025-01-15T17:15:21.837000 CVE-2025-22997,0,0,cbf89797792d4ad66a4f37050995306b66d6d3563ae5ce9db2b5b27779f4d42b,2025-01-15T17:15:22.193000 CVE-2025-23001,0,0,a661c9ff25c543dcf089dc4c4188fedb40f499aceeca183680e7eb66234e4f62,2025-02-21T17:15:14.103000 -CVE-2025-23006,0,1,85d3eb8a6cd7a895863210fc386b2b763ed49b703bb4f960bd8ede52b28a4e0a,2025-03-18T18:15:28.613000 +CVE-2025-23006,0,0,85d3eb8a6cd7a895863210fc386b2b763ed49b703bb4f960bd8ede52b28a4e0a,2025-03-18T18:15:28.613000 CVE-2025-23007,0,0,8755d54df92e87b37e4145f55351bcaff32866353888bcdbfad8a65ec70ebf2c,2025-02-18T19:15:27.263000 CVE-2025-23011,0,0,cefe33a46d0161bb6c6a24c1c3d6c06bd96db41dbbf7220897035ad8b05d8820,2025-02-03T20:15:36.823000 CVE-2025-23012,0,0,21902a51089bbb86496843888942542af88455b4e3e34d54286f2fa9da81320e,2025-02-03T20:15:36.977000 @@ -283935,7 +283936,7 @@ CVE-2025-24109,0,0,3a06e33059ab25d8437d67978eebded22edd06fe8c09a21c862e225782f2c CVE-2025-24112,0,0,00ac1ad70de7c95aa177469e4cbf1b6a59be3178c8668d42d9efaad7c292453f,2025-02-04T22:15:41.893000 CVE-2025-24113,0,0,dfb8fdeba08350f2d1ba047bdfca5272552cfc4b72a68de35cf8a6aa8ccbdc7b,2025-01-31T22:15:13.443000 CVE-2025-24114,0,0,060f1a53826cabb1840c2e97a20d5ed1dcd10135e4439b8b05507d5cf354517c,2025-02-04T22:15:42.030000 -CVE-2025-24115,0,0,15c49b282394a28d48f09f708393e8923948b48fe70b3e10a8d648cbaa5dc78b,2025-03-04T15:15:15.310000 +CVE-2025-24115,0,1,5f98888e2a9a7a5a5ec9b74719b10c29381f9e7a9dd8c82f8ba00dfb0b69122f,2025-03-18T19:15:48.330000 CVE-2025-24116,0,0,aa7cef2fc6e8a345ed4ea9323be2cbc80d7f94c26743a1007a2eda67ae73a859,2025-02-04T22:15:42.203000 CVE-2025-24117,0,0,33c92b99d6665d1cd4e31cf979ddcb83dff08f0221ebf8ab36bcd83194dfd5e1,2025-01-31T14:40:21.463000 CVE-2025-24118,0,0,231a8f647efccb698f2af26d75ca1326774dcd245b29e6b54409d56744ad43a7,2025-03-18T14:15:42.797000 @@ -283948,7 +283949,7 @@ CVE-2025-24126,0,0,93626dca5a2efcd9402a6fa0ef63a8a1935cafd987992c392cd02dfb12247 CVE-2025-24127,0,0,1d2b043a0b9d762748f03a2275d3e997d6427b918bf46a124cf4e281353abd3f,2025-02-05T16:15:42.163000 CVE-2025-24128,0,0,b692dd6c3705d2f67ed46ab7eedb7af0c180ec823dc1f4569da7249148d6fcf7,2025-01-31T22:15:13.607000 CVE-2025-24129,0,0,f1e90fe08a69d64c55e11da92a9b3bc28db0dd31ae84f052c11f85bf5bf81c15,2025-01-31T22:15:13.773000 -CVE-2025-24130,0,0,983c6deb154ce8a35ae00c6a2f8dd3d606cfe5eaff7003e09ddc8f996f7bfa50,2025-03-04T14:52:14.533000 +CVE-2025-24130,0,1,384a88a260917bb751e4469f9934ffe6157561048ae6a61b6433fe2d0b4730be,2025-03-18T19:15:48.507000 CVE-2025-24131,0,0,f5265dbc1bdd5800bab16b0ab9c1cc4d098fa33c0562961926c50521af2412fb,2025-02-05T16:15:42.357000 CVE-2025-24134,0,0,fda516d606ad65995b42b7ab165a21b96f17b14a8998f4a9dc5169cf0d4f2ca0,2025-03-13T19:15:51.817000 CVE-2025-24135,0,0,9868b7d98ec6921f52c4e208e308bf123d82a09ae8df5eca530d3d297ac21164,2025-03-04T14:55:07.030000 @@ -283960,20 +283961,20 @@ CVE-2025-24140,0,0,15468496fa0a9634917bba3f562f5643ce72b83581dd6dd6e92723a4017bc CVE-2025-24141,0,0,7fc396b14c28529aacc4a130c180a099971b0a3329c75121f4e1cc3751488bf3,2025-02-04T22:15:42.527000 CVE-2025-24143,0,0,d6b0dc9e7b05ff53033a444fff93575e464a6a2b7f6b588a53bde953edb8e039,2025-02-04T22:15:42.697000 CVE-2025-24145,0,0,b130f3a7f34dacbf8f60160fa62ed4f9e3a7c741eee662787d15d39ded800009,2025-02-04T22:15:42.877000 -CVE-2025-24146,0,0,cd551f11da7235765bf6b4b9acae15352e7ea84b6c0e91142c2339fc99851999,2025-02-18T20:15:30.620000 +CVE-2025-24146,0,1,633f538587a891e672e02622f117f83813055477e05032143e9910b03c6b569d,2025-03-18T19:15:48.683000 CVE-2025-24149,0,0,c100cf190f5efda2e90e018852f82a3aa484d97a70a3cdcc29b2f127c74d9748,2025-03-03T22:52:53.790000 CVE-2025-24150,0,0,b57965dad8218b33eb0f705e2c70a2d88ee1011a034996083539ca2cb700960b,2025-02-05T16:15:42.517000 CVE-2025-24151,0,0,99208d1276575064b3a15ad40cec432f393d8a0e89f91da2bae0e635f3a97d33,2025-03-13T20:15:25.943000 CVE-2025-24152,0,0,94cf03b83e0d0bbf2e2519ab1fb41ecec660385e6e18386a8bccf1cff0fd2172,2025-01-31T22:15:13.947000 CVE-2025-24153,0,0,a962e00376d57b532ea670dc465405ba54e446d5423d2019e225758957981f83,2025-02-04T21:15:28.390000 -CVE-2025-24154,0,0,c4350d61d4b4d522c1478e044f4f9ad7a03366edff5ec7246bf8c521006575c9,2025-03-03T22:51:48.667000 +CVE-2025-24154,0,1,2133416aad04106ad04753c0c4ad3643abc6a261600e1250147cb0b1c5f17046,2025-03-18T20:15:25.680000 CVE-2025-24156,0,0,8fa4c1a03f09991e5c2bed2e07959c1558a8892a2864cd53dcb29d166373a914,2025-01-30T16:43:39.593000 CVE-2025-24158,0,0,acc7809ab4701d1dee654bd85d3ea355491d3c160b1e018c6b17b635a2e8852d,2025-03-03T22:51:31.440000 CVE-2025-24159,0,0,3b398e5ec735d86e63a66bb20838217a4d8bb188393327507b8a692d20b032c8,2025-03-04T14:57:16.473000 CVE-2025-24160,0,0,ae6edae2205c08dd8b969920bf8cb3dc84d26eaf5297b5739349f27fb704a2f3,2025-01-28T16:15:44.003000 CVE-2025-24161,0,0,6d02f0f01530cc9b917612d04abebc1e6d67d88a440e864a6d1a14a27e3f4034,2025-02-04T22:15:43.057000 CVE-2025-24162,0,0,e7182d7278474afcab3466a5bca917be81e38e822e2649153160baaeab126f37,2025-03-18T15:15:59.527000 -CVE-2025-24163,0,0,41a251fbd8e3fd1ad37794819de1e745b68c6aee16567b6569d089e58ae56145,2025-03-03T22:48:32.503000 +CVE-2025-24163,0,1,e5dfd7fc25470d49a4e1465851f83d31b328f7f38425488eccdc7978762eee10,2025-03-18T20:15:25.850000 CVE-2025-24166,0,0,15edf859d475720db53f3f95ed8d575ade96a95f125f2377032600fe411e75ab,2025-01-28T22:15:17.080000 CVE-2025-24169,0,0,dc7fdf5a34ca171f91b452ca483098d6852ee04a0c9927ea185bfbd0220db78b,2025-01-31T22:15:14.117000 CVE-2025-24174,0,0,0904d4c28286c429cd94ca17762197a0f9f9874c511f730b1e00485e49f57ce4,2025-03-18T14:15:43.020000 @@ -284326,7 +284327,9 @@ CVE-2025-24793,0,0,e28f23f8765521f3c09231efc18389c18020ab59aed59a8a8b47cb836c195 CVE-2025-24794,0,0,c04b940ac82a2657417f797fe796501aa31f53e5a08053b008970823006b7cde,2025-01-29T21:15:21.397000 CVE-2025-24795,0,0,4e7d355e1e973178e45904614970e5915bed2547d76d074d93927fc694a1b13e,2025-01-29T21:15:21.533000 CVE-2025-24796,0,0,a9610c1be84a5c4d5741f879bb27b31db5774f479b1300b84fcf068018c2ff21,2025-03-06T19:15:26.953000 +CVE-2025-24799,1,1,de84e2ffeca97627c636e1e67e0f8d5c8a536e58faf38e3ad8ab702cd7a18a0f,2025-03-18T19:15:48.927000 CVE-2025-24800,0,0,7ed7267931cd5ab7815e3084be7a388ce38e4d4a267ef28098f1d5b3017953e4,2025-01-28T16:15:45.063000 +CVE-2025-24801,1,1,e526bcdde4c1d8c8abe9f2882687abddc9602eb37b409289035cc368e12f958b,2025-03-18T19:15:49.110000 CVE-2025-24802,0,0,7dd003e792c772d8d409000d77fae7f13160cda3e1a330b0895620a7fc320ad5,2025-01-30T20:15:51.010000 CVE-2025-24803,0,0,74eab822b1c3e68557671b88128107e72ab93a3fd5a52a629fe3462c9de889ad,2025-02-05T19:15:46.207000 CVE-2025-24804,0,0,f7d104b626bdf579e836087298c08c14a0ce3cc2eea658e65d733074620ffe12,2025-02-05T19:15:46.350000 @@ -284336,7 +284339,7 @@ CVE-2025-24807,0,0,a9342833f23aca9efb5658eaedc615b0791a1b8d97d1be177e79dcc0108d2 CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867e23,2025-01-28T05:15:11.413000 CVE-2025-24811,0,0,2da7e99907675b0c3b84fff601eb43c4c4c27c662d95c7205901bce5bb8705d8,2025-02-11T11:15:16.907000 CVE-2025-24812,0,0,3542fd62679fcd1754aabe0f38d924c5bd34578dfc13aa46aeaa150dd810a16a,2025-02-11T11:15:17.080000 -CVE-2025-24813,0,1,c5baaacea98fed4b5a9782b2cf6907b53bae19dce26a3909f6439c9074c67677,2025-03-18T17:19:03.810000 +CVE-2025-24813,0,0,c5baaacea98fed4b5a9782b2cf6907b53bae19dce26a3909f6439c9074c67677,2025-03-18T17:19:03.810000 CVE-2025-24814,0,0,778c51f4f444afc315901ebeb1d1515ad066d9ae9182f0d62b926c00ff924803,2025-02-15T01:15:11.157000 CVE-2025-24826,0,0,afc4a3c6aa0e8288830e8c91cc81c25b8636a1b49a80120ea49c59c3d903f3ac,2025-01-28T21:15:18.817000 CVE-2025-24827,0,0,9def413bdd8ee8b51fbd9a0d5033d038fbca6373f01b1c0b3f27d7c9c702b649,2025-02-18T19:15:27.587000 @@ -284361,7 +284364,7 @@ CVE-2025-24865,0,0,a84aad4d5bdb225f0618ad62f2ff1ffe2c161de1be6dfd9acc81d2401125c CVE-2025-24867,0,0,32b5b4cae9faa98375e2ec8191ee6bbac47790e6975c81218e81b4b72829e2de,2025-02-11T01:15:10.847000 CVE-2025-24868,0,0,3126f003c867405c437c9a5d233b2132fdf5dda635736a251e9443dc3f9770bc,2025-02-11T01:15:10.990000 CVE-2025-24869,0,0,7487e9b2ea994aa31a7eba56e36180a5b91aaa886297577734820094a1ac00ef,2025-02-18T18:15:33.810000 -CVE-2025-2487,1,1,2e1f15a3f11ad93df71e2269a97f6ae5cd913368880bc2c4ff46320d4033e45b,2025-03-18T17:15:48.883000 +CVE-2025-2487,0,0,2e1f15a3f11ad93df71e2269a97f6ae5cd913368880bc2c4ff46320d4033e45b,2025-03-18T17:15:48.883000 CVE-2025-24870,0,0,8a1955614ad6170098b2431ea0a7eb0095b1f9fad9151a39a2352145e24bee31,2025-02-18T18:15:33.987000 CVE-2025-24872,0,0,460fb0f0e5e82a28a5d26e696199083f7e4334d8b35fd8d559f4afda8c5269be,2025-02-18T18:15:34.153000 CVE-2025-24874,0,0,0fa59b45ae17306f198268603c8d0746966ec16b04ff40aaadafe786062552a3,2025-02-18T18:15:34.330000 @@ -284441,6 +284444,8 @@ CVE-2025-25003,0,0,81c7aaa0459bff03b421e5d180256f499147e53c41ab2bff8ad40b62fee74 CVE-2025-25008,0,0,dd0d6b1d65c4bc3e0a08b5500a49fa40b10c2ed4de56e853cd146dcf325a2884,2025-03-11T17:16:38.483000 CVE-2025-25015,0,0,517a5f794d9ef96e036d38106986c029ffdcb54286c093adebeb06454d8585d1,2025-03-05T10:15:20.160000 CVE-2025-25039,0,0,0813deff770f203e3046b12b8be008534814496b4b844d44f12a77231cb87b8b,2025-03-13T18:15:50.610000 +CVE-2025-25040,1,1,9aa342623320cb25b7aef006218815a621e0a84a14ab71ccca4fb4715f43c17b,2025-03-18T20:15:26.030000 +CVE-2025-25042,1,1,173240ef75cbc3876c445852de0562738a10b9cebfbe843338c88c026677e7b3,2025-03-18T20:15:26.177000 CVE-2025-25054,0,0,5be11f7aa8767f62986e873818aa7bafb83a58f1dfa102f5a36254246868acc6,2025-02-19T06:15:22.010000 CVE-2025-25055,0,0,715a07bb29b79c7fb7ed93b83baf8d9d3a9109839cf0cb0b13f9fa08d28e54fd,2025-02-18T00:15:21.277000 CVE-2025-25062,0,0,c25c343fff538b868333c18656ef24f68b7ac30942ec67bd9f1be9d92e00b2a9,2025-02-03T04:15:09.587000 @@ -284560,7 +284565,7 @@ CVE-2025-25188,0,0,2461474c8c359fbc15a8610b387ef0ac657a3108436b2e05cbe126ccfb293 CVE-2025-25189,0,0,f68ee5c586d07dec9a336fb2dbbfd3c5bd132d29662e9c4bc9ff1969295aaac8,2025-02-11T16:15:52.313000 CVE-2025-25190,0,0,96316be3801ea8e34db1f71f151e934e00015e5d1a34196dfd79e3e824fb1a50,2025-02-11T16:15:52.420000 CVE-2025-25191,0,0,ebaa2bdb1f2b2bf394317ef2b89f43fe1aabf1dfa6c9b80b2c9248cedeac6aa0,2025-03-06T19:15:27.113000 -CVE-2025-25192,0,1,5783eb8b8890bb3417a87f4556b52876901aba8094dc7d2d3a854512fed49412,2025-03-18T17:15:45.720000 +CVE-2025-25192,0,0,5783eb8b8890bb3417a87f4556b52876901aba8094dc7d2d3a854512fed49412,2025-03-18T17:15:45.720000 CVE-2025-25193,0,0,9c42e26d0a4f2052fdf43faa73fab75794f787f53e222117d45465e7383dd8fa,2025-02-21T18:15:37.253000 CVE-2025-25194,0,0,278bc98c8a0ffe0e8a7e96acea34ed9bc50825c485f6cab1eaf41889a2da8034,2025-02-10T23:15:16.067000 CVE-2025-25195,0,0,6422ab465e1e4500e1fe77efd7e4b259d61944cface94edb31eac51bdeddd22d,2025-02-13T22:15:13.100000 @@ -284579,7 +284584,7 @@ CVE-2025-25221,0,0,da7f39219236daa10c6a9a322f77562859face44f96d9c55ab9ddbe74ace6 CVE-2025-25222,0,0,c2ca7e3dc29f3574e03139c7399b4994d988797dae7ad6db23b85350baa3dcf1,2025-02-18T01:15:09.210000 CVE-2025-25223,0,0,a49bb693ef5024209af2cdf099d01934d199df8e6379e744ca5e733fcd788f54,2025-02-18T01:15:09.347000 CVE-2025-25224,0,0,a4f44e8389415111624e6d3b431cded203f069a8e58de6c5b5f4eb5c08d09e30,2025-02-18T01:15:09.473000 -CVE-2025-25225,0,1,50e1db0214d749384eee9692d10836c10107d4550447d640f020938a4553ed14,2025-03-18T17:15:45.920000 +CVE-2025-25225,0,0,50e1db0214d749384eee9692d10836c10107d4550447d640f020938a4553ed14,2025-03-18T17:15:45.920000 CVE-2025-25241,0,0,f70d628c4466ad6abe844cd65a2579f5c9e5af240d0c56eadc1f05ff31a52618,2025-02-18T18:15:34.967000 CVE-2025-25242,0,0,9434714e72888d1a52e5bad48430408baa107619f6e4dcba8f508d71d8cfd58f,2025-03-11T01:15:34.777000 CVE-2025-25243,0,0,906f44310c3cdd164cd7aafcd2415e522d55d23269db0ed5b7f0708c0da72aa0,2025-02-18T18:15:35.160000 @@ -284697,7 +284702,7 @@ CVE-2025-25585,0,0,80747c75020719441b1494270118cfe6daf65227a3f1c61a488d53873199d CVE-2025-25586,0,0,744a470f770a9515b6f7dfb52c66d60af37830e5dc13b1912db087fb3afacbc6,2025-03-18T16:15:27.047000 CVE-2025-25589,0,0,824725523e28132dad4cb2619d08cb50c773fd7753d8cafe5fb64b8961821ca3,2025-03-18T16:15:27.200000 CVE-2025-25590,0,0,0ad36cf80c5032a80ad0bf8eb00193fecda94b0782be77115fea9b1209b274e1,2025-03-18T15:16:00.373000 -CVE-2025-25595,1,1,fcc81d79cad074e1bddfc729b95a0032a9eb1c3955175115764d73587af47da7,2025-03-18T17:15:46.203000 +CVE-2025-25595,0,0,fcc81d79cad074e1bddfc729b95a0032a9eb1c3955175115764d73587af47da7,2025-03-18T17:15:46.203000 CVE-2025-25598,0,0,77f039cd06718093e1c276e16fe184c5d4efc61143dbb11eacdc3787cfa066aa,2025-03-13T18:15:50.857000 CVE-2025-25604,0,0,7a8cc3234dfcf2fd463e6a54d1695816511ffd986519d0bafcb53e4f83d303ac,2025-02-21T21:15:24.170000 CVE-2025-25605,0,0,c0858a3094cad59e4cf6248dc23b2aa0633fe28bfdda9aca36970755a7dbfbce,2025-02-21T21:15:24.317000 @@ -284711,7 +284716,7 @@ CVE-2025-25617,0,0,3f661497fa69da30bb91f642820b6cfcf05fca2c3dd7a67bf0915aa5050b4 CVE-2025-25618,0,0,a59200cf6979207293eab61a55518c85ddded4cce5635d0bc8c4d629e263afcb,2025-03-17T18:15:21.450000 CVE-2025-25620,0,0,2998f203d004ba2c3686a85bfd6e4a9c803d92001b76576bf7ced9c40410ee3c,2025-03-10T19:15:40.393000 CVE-2025-25621,0,0,fd8b30a620164f595d91d88f9a3c3e8c5abdc4c1cc2dd62089ef1c763915878e,2025-03-17T18:15:21.593000 -CVE-2025-25625,0,1,d0155325b3e459f1d8704dd617d4f9fd34a2eb2597101ec145da6343d3d2458a,2025-03-18T17:15:46.357000 +CVE-2025-25625,0,0,d0155325b3e459f1d8704dd617d4f9fd34a2eb2597101ec145da6343d3d2458a,2025-03-18T17:15:46.357000 CVE-2025-25632,0,0,1ceebf9a7f4f0a07c0d7243ce1a1b61926f60bcdd3649b2e6df48cfbf3246b4c,2025-03-06T15:15:17.770000 CVE-2025-25634,0,0,7d5efbb3a02c594499ed06a9a27e13e1f935c77ecfc5e148d76deae63172e1dc,2025-03-06T22:15:35.290000 CVE-2025-25635,0,0,0db247b70226e51b14344c6fcb3514df042659a07d0da107baaaba8517f711fd,2025-03-05T16:15:39.793000 @@ -284845,8 +284850,8 @@ CVE-2025-26091,0,0,0a53a3c2cb2d2c7caf4bc303bc2b91dad9caaf8869a6ee9842c32b5a6487c CVE-2025-26125,0,0,cb9f0af9314bc1a0135cd4d22a929194b4fbf294ee118f6d776e246fc6d4047f,2025-03-17T18:15:21.763000 CVE-2025-26127,0,0,f0bbdd88ca25844410b8ed9592279ac8eda69e5d3712a1dfd40b529f1190e71e,2025-03-17T18:15:21.860000 CVE-2025-26136,0,0,2adb34c79a3ec7fe584c4e7725e79c104805fdaa01d3b24e5975e14259ccd144,2025-03-05T17:15:16.017000 -CVE-2025-26137,1,1,236b4ab26ac447c6a5392e5c527b71bba3c1763ac59ec6eb68366a508f6c82e3,2025-03-18T17:15:46.503000 -CVE-2025-26138,1,1,67958587ce71674f791466aa1788d0155b47ffeef2106fd0688fbeeb275e6739,2025-03-18T17:15:46.670000 +CVE-2025-26137,0,0,236b4ab26ac447c6a5392e5c527b71bba3c1763ac59ec6eb68366a508f6c82e3,2025-03-18T17:15:46.503000 +CVE-2025-26138,0,0,67958587ce71674f791466aa1788d0155b47ffeef2106fd0688fbeeb275e6739,2025-03-18T17:15:46.670000 CVE-2025-26156,0,0,3c070f48ae01803cf4deab6e20453c0715f07513428e1a7ccf93241deeb274fe,2025-02-14T19:15:15.033000 CVE-2025-26157,0,0,59b5a4f935b691a0cfae6c8ea0b4bbb0d47e4814d1aa791e95c7dd113790e9fc,2025-02-14T20:15:37.543000 CVE-2025-26158,0,0,b94398759aa4427b7dc090483f4f088a5c44388e38d183da6dc19ae9b872cf91,2025-02-14T20:15:37.677000 @@ -284922,7 +284927,7 @@ CVE-2025-26378,0,0,ee2f1897a6683ea6c4c3e60750a42143f8a85d34ee7d0a636569caad0aaac CVE-2025-26393,0,0,0a56d68e056311c602cd521d02aa8a0c8475ada7ba02d263a955244f81b3c4c4,2025-03-17T20:15:14.140000 CVE-2025-26408,0,0,e45f7220dde0c01d1f86f33cd06eb34062f4e98e989de6c2a87bcb17b259ee6c,2025-02-18T18:15:36.097000 CVE-2025-26409,0,0,cdf29866235215f5068aacbcbdb6f999e9c9f7adf8baf249758a0e54e8048ba1,2025-03-17T17:15:39.723000 -CVE-2025-26410,0,0,36441b10bb87afc4c434a271b8839836d6ce7232b364d1eaf56804b3d996ac68,2025-02-18T18:15:36.357000 +CVE-2025-26410,0,1,e0a8c1ecc38adad5db47008cfe5d8287500ec3cbba2c1f9a4a60a8e1051c525e,2025-03-18T19:15:50.450000 CVE-2025-26411,0,0,3c8f066d5451ad6ef36a27d64d17719d6f654697fa56337f49dfc83e42e73333,2025-03-14T18:15:31.947000 CVE-2025-26465,0,0,305122a43f3140c85a4b4c03468e2fae692c04863ed3f0f25da2f320b5defd84,2025-03-06T17:20:00.520000 CVE-2025-26466,0,0,8c14c9c0652d2827f2d6411d6d80e391b9271119d08a75423892f7601f9b2e74,2025-03-06T16:53:50.833000 @@ -285175,6 +285180,7 @@ CVE-2025-27012,0,0,3a1893682864e642f849034c4092180dc7a4b18b7a6ad2f7375bac0e9841b CVE-2025-27013,0,0,9b9378b18f13319340e1f24d5072a99db201f1036e2a63d2b47d9e89c2a36e2e,2025-02-18T20:15:33.880000 CVE-2025-27016,0,0,f2c7dbbbe198c036189ea7e0294285906759c96b4b4fc3925b1ca597f8d458ee,2025-02-18T20:15:34.013000 CVE-2025-27017,0,0,487799b83e349646c0969a6714868b1c6a1e0d2f10d5e6737c1115cacdd0bce5,2025-03-12T17:15:50.327000 +CVE-2025-27080,1,1,dcd914ae09375ce77795feef8ad95fb4f30b82b0d28355bee32f7c0de8eb15be,2025-03-18T20:15:26.300000 CVE-2025-27088,0,0,fbdc36eed3cad3a0ad2022cbe7aca458560a9c5f707fbc00203d874cefc235d6,2025-02-21T22:15:13.673000 CVE-2025-27089,0,0,4c46df8a0eff7d16a653158eecc2014910418a0d0440d1d2334e56d23f56f25a,2025-02-27T20:31:27.267000 CVE-2025-27090,0,0,d649018651979639a7b1c8acf0eda3f6b93b0e44c8b2420240cdfb846024fd0b,2025-02-27T20:30:33.563000 @@ -285502,9 +285508,9 @@ CVE-2025-28862,0,0,498e18a442d30fb8e225f96e842cc7c3a56b99221a7a581ac6944ff55b2dd CVE-2025-28863,0,0,3800fe89a39973b6b1231d056a9a553d8b250263bbb47326e4368baee010353b,2025-03-11T21:15:43.647000 CVE-2025-28864,0,0,476816835ccebd5f68ac74b6072001d700dfb9d6006755533c883c8ada0f5cce,2025-03-11T21:15:43.810000 CVE-2025-28866,0,0,e6e8567798ae0e1def137ae8a79778279de6d299a623ad6b571a34e8fbecf55b,2025-03-11T21:15:43.970000 -CVE-2025-28867,0,0,586e8f46a4d3415fca5da79f021244d5aaaf92f56809afc1fd804ce8b7dbc28f,2025-03-11T21:15:44.127000 +CVE-2025-28867,0,1,4ca8db1ab3b6a1f94a88ba6b89b60f18839f31c5ac8e654bb73f4f011fc98a3c,2025-03-18T20:43:40.300000 CVE-2025-28868,0,0,09db76947750674e0f3b002c373925c37261fe218f54cb6c55eebe5eeb4518c8,2025-03-11T21:15:44.283000 -CVE-2025-28870,0,0,e4e8cb1354622044724d8dc68e9466127c560c039f774b6eca1d83710c4b7bb3,2025-03-11T21:15:44.440000 +CVE-2025-28870,0,1,e4153cd68c5e457e5fb1a3618dd0f3fc9e338446e1283f587e70001d5bee2ff3,2025-03-18T20:29:41.383000 CVE-2025-28871,0,0,96091a1c69b0d922d056c2a14a5d867c146a33cfc934a23b3119118821cf1523,2025-03-17T18:45:11.073000 CVE-2025-28872,0,0,f3b7d21384421d1eeb12498b153df5e281517aad4a4d3aff96a3e023ae3b23ad,2025-03-11T21:15:44.757000 CVE-2025-28874,0,0,5b1e3f881e3414f9e94dd8091c8ef20595070049cc3ec53a1b47a753e8c62b1d,2025-03-11T21:15:44.907000 @@ -285555,7 +285561,7 @@ CVE-2025-28938,0,0,d0b972cff3707558963cda7df0cb3176337d8e9d89978c6ecfdc3400da0cd CVE-2025-28940,0,0,04135ac8d9c1245669acb25f77e12e09d3c1430ccba901da70a0adf5146510b8,2025-03-11T21:15:51.887000 CVE-2025-28941,0,0,d1dc35fbe2a033c04e261359b97e6eb5a7f518fa1842a2a100fc7c3dd1630b83,2025-03-11T21:15:52.030000 CVE-2025-28943,0,0,f13533c6ec40779f6c4eb31c17c71b8bf7e67bb9305109da8899c164336e7b7c,2025-03-11T21:15:52.187000 -CVE-2025-29029,0,1,39541c2aec3ae7c63f9d62e0a3860448d6ebc46233cbb2f267704a4d9534c15a,2025-03-18T18:15:28.817000 +CVE-2025-29029,0,0,39541c2aec3ae7c63f9d62e0a3860448d6ebc46233cbb2f267704a4d9534c15a,2025-03-18T18:15:28.817000 CVE-2025-29030,0,0,4e09801817ed179e27143f656acce8aa3f03e44623f58d515baa1e0baf8fde36,2025-03-17T19:52:00.090000 CVE-2025-29031,0,0,fffc4c63de36e7f69f93e3c2f9c023f73b867ee2b0df20fdce411a824c8e33c2,2025-03-17T19:51:38.883000 CVE-2025-29032,0,0,0b6eab7e8f78d0b67802c042eb5a6a44e3fd4c503122d47536d1c3e4c08abc2b,2025-03-14T14:15:18.623000 @@ -285589,14 +285595,17 @@ CVE-2025-29782,0,0,a79518f63be9c881de8db0a0651ea1fe984913327462a61af7597165766c4 CVE-2025-29786,0,0,0c40fa5408515757638473e28641812347d31da5efea9c126f50ced0bd11d506,2025-03-17T14:15:22.237000 CVE-2025-29787,0,0,f2e861b6c4dbf868707fba7b3fb131d1b9814d3e4021455a52a8a2d5236bf0cb,2025-03-17T14:15:22.447000 CVE-2025-29788,0,0,e1a88fbf2eb4e52db6d664e73916facba347fa2e80c6c15ea20d2760d435bf11,2025-03-17T14:15:22.653000 +CVE-2025-29790,1,1,675222ea0eab8ae3f29f8b94428bcad2e1e1b41b05f6926d11004b88739188d2,2025-03-18T19:15:50.813000 CVE-2025-29891,0,0,19957216c682a927ada7fbe8d799bf8aa1337ea00af552d450ee80a227a50322,2025-03-13T09:15:14.860000 CVE-2025-29903,0,0,10c68e7ddaac62cfaf56fa2d0c36952343de94dcaf74d7de9700d239804e47d3,2025-03-12T13:15:37.823000 CVE-2025-29904,0,0,8151be9d68bba0e8c527ecea5490dd29fd8894724b2933080703a0ecee03e639,2025-03-12T13:15:38.050000 +CVE-2025-29907,1,1,cfa2108f203bb2d21cc6fdede35a67ff448b143468e6b33a2073415a2c48ea4c,2025-03-18T19:15:51.197000 CVE-2025-29909,0,0,763144943d5bc13d24b119de23c47602f4df0647e1341ddac3a9c1d2fe539cba,2025-03-18T14:15:43.803000 CVE-2025-29910,0,0,d918c1f18c48e000de1547503ce3f5501f2c110de54a5f25e6b09e52254e772e,2025-03-18T14:15:43.913000 CVE-2025-29911,0,0,9bc03ebbf6bc4f31bea7d0d71fc54bd0d8eb994dcf1544391515e13547c2c935,2025-03-18T14:15:44.023000 CVE-2025-29912,0,0,e23f6e141e6c7cfa4a10c629df5522bf78a6021bcef4d2d4cdf07cb70dadff0f,2025-03-17T23:15:18.450000 CVE-2025-29913,0,0,571420058b3a2fca2a2137cd48ed447ba4bf465242535c3a89f7b7aade97c032,2025-03-17T23:15:18.590000 +CVE-2025-29930,1,1,043c0e785a0aabbc6bfcf85120363cc130dd1f21008fcd0b8d28454bb9969779,2025-03-18T19:15:51.340000 CVE-2025-29994,0,0,5456b8a283efd1eb6eeaed0238e41032f545196d53f3be8a9a39b4dbb8a3918b,2025-03-13T12:15:13.660000 CVE-2025-29995,0,0,1eda4649249475136c84dfa6531f2cd362c980551d78393b70706d408af51d69,2025-03-13T12:15:13.830000 CVE-2025-29996,0,0,5a028c0824c2542a10ce116c608912fe4301f96b5ba2d38f7cdf305f3c1269bc,2025-03-13T12:15:13.980000 @@ -285621,4 +285630,9 @@ CVE-2025-30117,0,0,38b83939aec5f473f46b41f3ae77055e4239f111ef0fb1c68447277c0d7a7 CVE-2025-30122,0,0,8aaff3fe605a67598e8afe805ec5684a861743b811ec3556deec658e1b9448e9,2025-03-18T15:16:03.143000 CVE-2025-30123,0,0,2f87a320a7cec723f6fe28b26090f29e74b4451437f28fe37ac06edea9b92689,2025-03-18T15:16:03.293000 CVE-2025-30132,0,0,b29101e9bf34942e922481f880025e43d633483e2755910cf59b4b7362cff58c,2025-03-18T15:16:03.437000 +CVE-2025-30137,1,1,44ad438be3ce958f1a2d1f246aa8f12b812e0459b77a9123742141e84a2c7933,2025-03-18T20:15:26.407000 +CVE-2025-30138,1,1,373f1a1c15d8deeb6aa225adec44aa56d6557814bbc7f65582e2e0f04765d506,2025-03-18T20:15:26.507000 +CVE-2025-30139,1,1,0832c0b5c7524ee38d9a341e009880603b5b0d082a37429a6f43b9989e9c423c,2025-03-18T20:15:26.597000 +CVE-2025-30141,1,1,252e709d2e6aa67cd4af9318785831886180b187b447e983f6557f7321b4a96c,2025-03-18T20:15:26.693000 +CVE-2025-30142,1,1,1246264bea9c6b49f2b8a8ead65c653d20fb9d371284f26fdb2f1b190b75f495,2025-03-18T20:15:26.777000 CVE-2025-30143,0,0,dfaeb3eef5e72894446a00bc252dd02d40d218e0a77cd9256d63da4e0a89e02b,2025-03-17T16:15:28.643000