Auto-Update: 2025-02-18T15:01:16.063065+00:00

This commit is contained in:
cad-safe-bot 2025-02-18 15:04:44 +00:00
parent 78928c15d2
commit f8f767ade5
37 changed files with 1904 additions and 248 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-1631",
"sourceIdentifier": "sirt@juniper.net",
"published": "2020-05-04T10:15:10.890",
"lastModified": "2024-11-21T05:11:02.493",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-18T14:59:06.660",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-1906",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2021-05-07T09:15:08.280",
"lastModified": "2024-11-21T05:45:23.897",
"vulnStatus": "Modified",
"lastModified": "2025-02-18T14:58:38.243",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -95,7 +95,7 @@
"description": [
{
"lang": "en",
"value": "CWE-755"
"value": "NVD-CWE-Other"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-32648",
"sourceIdentifier": "security-advisories@github.com",
"published": "2021-08-26T19:15:07.230",
"lastModified": "2024-11-21T06:07:27.300",
"vulnStatus": "Modified",
"lastModified": "2025-02-18T14:48:55.537",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -117,19 +117,17 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.471",
"versionEndExcluding": "1.0.472",
"matchCriteriaId": "32CA477B-7437-4DB8-891D-05E1297E36FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.1.1",
"versionEndExcluding": "1.1.5",
"matchCriteriaId": "2E79163B-046D-4BA9-82C9-70AB3A000D69"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:octobercms:october:1.0.471:*:*:*:*:*:*:*",
"matchCriteriaId": "1C626BDE-022E-4AEE-A189-6AB7EBEDD80F"
}
]
}
@ -141,16 +139,14 @@
"url": "https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374",
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
"Patch"
]
},
{
"url": "https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9",
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
"Patch"
]
},
{
@ -158,23 +154,21 @@
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
"Vendor Advisory"
]
},
{
"url": "https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
"Patch"
]
},
{
"url": "https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
"Patch"
]
},
{
@ -182,7 +176,7 @@
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
"Vendor Advisory"
]
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-39144",
"sourceIdentifier": "security-advisories@github.com",
"published": "2021-08-23T18:15:12.087",
"lastModified": "2024-11-21T06:18:41.480",
"vulnStatus": "Modified",
"lastModified": "2025-02-18T14:47:16.960",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-39226",
"sourceIdentifier": "security-advisories@github.com",
"published": "2021-10-05T18:15:07.947",
"lastModified": "2024-11-21T06:18:57.193",
"vulnStatus": "Modified",
"lastModified": "2025-02-18T14:53:42.247",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -105,7 +105,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "CWE-862"
}
]
}
@ -176,6 +176,7 @@
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Mitigation",
"Vendor Advisory"
]
},
@ -234,6 +235,7 @@
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mitigation",
"Vendor Advisory"
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-41277",
"sourceIdentifier": "security-advisories@github.com",
"published": "2021-11-17T20:15:10.587",
"lastModified": "2024-11-21T06:25:56.970",
"vulnStatus": "Modified",
"lastModified": "2025-02-18T14:44:41.687",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-24816",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-04-13T21:15:07.683",
"lastModified": "2024-11-21T06:51:09.730",
"vulnStatus": "Modified",
"lastModified": "2025-02-18T14:50:35.940",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,20 +42,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
"impactScore": 6.0
}
],
"cvssMetricV2": [
@ -91,6 +91,16 @@
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-2856",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2022-09-26T16:15:11.207",
"lastModified": "2024-11-21T07:01:48.987",
"vulnStatus": "Modified",
"lastModified": "2025-02-18T14:43:46.130",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "NVD-CWE-noinfo"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-46169",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-12-05T21:15:10.527",
"lastModified": "2024-11-21T07:30:14.963",
"vulnStatus": "Modified",
"lastModified": "2025-02-18T14:51:04.277",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50167",
"sourceIdentifier": "security@pega.com",
"published": "2024-03-06T18:15:46.133",
"lastModified": "2024-11-21T08:36:35.927",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-18T13:43:27.293",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,16 +69,56 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pega:pega_platform:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.1.7",
"versionEndExcluding": "8.8.5",
"matchCriteriaId": "A5EA8AFB-67D6-4EA3-80B7-7B547CF4481B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pega:pega_platform:23.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6E4BE3C3-BCBC-4E12-9967-3E01A44AAC71"
}
]
}
]
}
],
"references": [
{
"url": "https://support.pega.com/support-doc/pega-security-advisory-i23-vulnerability-remediation-note",
"source": "security@pega.com"
"source": "security@pega.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.pega.com/support-doc/pega-security-advisory-i23-vulnerability-remediation-note",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12797",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2025-02-11T16:15:38.827",
"lastModified": "2025-02-15T01:15:10.250",
"lastModified": "2025-02-18T14:15:27.107",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -22,19 +22,19 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1696",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-03-11T17:15:46.007",
"lastModified": "2024-11-21T08:51:06.550",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-18T13:43:18.590",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -51,14 +71,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:santesoft:fft_imaging:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.4.2",
"matchCriteriaId": "A718BF3B-0247-49E7-B3D5-DDE14C75869A"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-065-01",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-065-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22011",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-03-11T19:15:47.413",
"lastModified": "2024-11-21T08:55:23.190",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-18T13:42:57.540",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,73 @@
"value": "En ss_ProcessRejectComponent de ss_MmConManagement.c, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
"source": "dsap-vuln-management@google.com"
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24275",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-05T23:15:07.520",
"lastModified": "2024-11-21T08:59:05.800",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-18T13:44:28.043",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,89 @@
"value": "Vulnerabilidad de cross-site scripting en el cliente de escritorio Teamwire Windows v.2.0.1 a v.2.4.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulada para la funci\u00f3n de b\u00fasqueda global."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:teamwire:teamwire:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.1",
"versionEndExcluding": "2.4.0",
"matchCriteriaId": "D8A9C09E-EA10-47EA-90D5-B87443B8DB2A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://research.hisolutions.com/2020/08/web-vulnerabilities-are-coming-to-the-desktop-again-rces-and-other-vulnerabilities-in-teamwire/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://research.hisolutions.com/2020/08/web-vulnerabilities-are-coming-to-the-desktop-again-rces-and-other-vulnerabilities-in-teamwire/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24276",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-05T23:15:07.583",
"lastModified": "2024-11-21T08:59:05.947",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-18T13:44:14.953",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,77 @@
"value": "Vulnerabilidad de cross-site scripting (XSS) en el cliente de escritorio Teamwire Windows v.2.0.1 a v.2.4.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulada para los componentes de nombre de chat, vista previa de mensaje, nombre de usuario y nombre de grupo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:teamwire:teamwire:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.1",
"versionEndExcluding": "2.3.0",
"matchCriteriaId": "85919ABE-B6AE-4FD8-8825-81EF4EB8C9C1"
}
]
}
]
}
],
"references": [
{
"url": "https://research.hisolutions.com/2020/08/web-vulnerabilities-are-coming-to-the-desktop-again-rces-and-other-vulnerabilities-in-teamwire/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://research.hisolutions.com/2020/08/web-vulnerabilities-are-coming-to-the-desktop-again-rces-and-other-vulnerabilities-in-teamwire/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27218",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-03-11T19:15:48.380",
"lastModified": "2024-11-21T09:04:07.573",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-18T13:42:34.137",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,73 @@
"value": "En update_freq_data de TBD, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
"source": "dsap-vuln-management@google.com"
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27227",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-03-11T19:15:48.783",
"lastModified": "2024-11-21T09:04:09.160",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-18T13:42:12.110",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,73 @@
"value": "El kernel de Android permite la ejecuci\u00f3n remota de c\u00f3digo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
"source": "dsap-vuln-management@google.com"
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27229",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-03-11T19:15:48.873",
"lastModified": "2024-11-21T09:04:09.467",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-18T13:42:04.037",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,73 @@
"value": "En ss_SendCallBarringPwdRequiredIndMsg de ss_CallBarring.c, hay una posible desviaci\u00f3n de puntero nulo debido a que falta una verificaci\u00f3n nula. Esto podr\u00eda provocar una denegaci\u00f3n remota de servicio sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
"source": "dsap-vuln-management@google.com"
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27237",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-03-11T19:15:49.143",
"lastModified": "2024-11-21T09:04:10.700",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-18T13:41:56.553",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,73 @@
"value": "En clean_ns_memory de nsmemwipe.c, existe un posible c\u00e1lculo de tama\u00f1o incorrecto debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-131"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
"source": "dsap-vuln-management@google.com"
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://source.android.com/security/bulletin/pixel/2024-03-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-37601",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-13T23:15:10.113",
"lastModified": "2025-02-14T21:15:15.440",
"lastModified": "2025-02-18T14:15:27.900",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Mercedes Benz NTG (New Telematics Generation) 6. A possible heap buffer overflow exists in the user data import/export function of NTG 6 head units. To perform this attack, local access to the USB interface of the car is needed. With prepared data, an attacker can cause the User-Data service to fail. The failed service instance will restart automatically."
},
{
"lang": "es",
"value": "Se ha descubierto un problema en Mercedes Benz NTG (New Telematics Generation) 6. Existe un posible desbordamiento del b\u00fafer de pila en la funci\u00f3n de importaci\u00f3n/exportaci\u00f3n de datos de usuario de las unidades principales NTG 6. Para realizar este ataque, se necesita acceso local a la interfaz USB del autom\u00f3vil. Con los datos preparados, un atacante puede provocar que el servicio User-Data falle. La instancia de servicio fallida se reiniciar\u00e1 autom\u00e1ticamente."
}
],
"metrics": {
@ -18,20 +22,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.1,
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 2.5
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
]
},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-37603",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-13T23:15:10.313",
"lastModified": "2025-02-14T21:15:15.637",
"lastModified": "2025-02-18T14:15:28.070",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Mercedes Benz NTG (New Telematics Generation) 6. A possible type confusion exists in the user data import/export function of NTG 6 head units. To perform this attack, local access to the USB interface of the car is needed. With prepared data, an attacker can cause the User-Data service to fail. The failed service instance will restart automatically."
},
{
"lang": "es",
"value": "Se ha descubierto un problema en Mercedes Benz NTG (New Telematics Generation) 6. Existe una posible confusi\u00f3n de tipos en la funci\u00f3n de importaci\u00f3n/exportaci\u00f3n de datos de usuario de las unidades principales NTG 6. Para realizar este ataque, se necesita acceso local a la interfaz USB del autom\u00f3vil. Con los datos preparados, un atacante puede provocar que el servicio User-Data falle. La instancia de servicio fallida se reiniciar\u00e1 autom\u00e1ticamente."
}
],
"metrics": {
@ -18,20 +22,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.1,
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 2.5
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-57241",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-11T22:15:29.233",
"lastModified": "2025-02-14T21:15:15.833",
"lastModified": "2025-02-18T14:15:28.237",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -22,10 +22,10 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.1,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
@ -34,7 +34,7 @@
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57905",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T12:15:24.710",
"lastModified": "2025-01-19T12:15:24.710",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-18T13:40:32.897",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,105 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: adc: ti-ads1119: se corrige la fuga de informaci\u00f3n en el b\u00fafer activado La estructura local 'scan' se usa para enviar datos al espacio de usuario desde un b\u00fafer activado, pero tiene un agujero entre la muestra (unsigned int) y la marca de tiempo. Este agujero nunca se inicializa. Inicialice la estructura a cero antes de usarla para evitar enviar informaci\u00f3n no inicializada al espacio de usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.12.10",
"matchCriteriaId": "AD20F8BA-D1BC-4584-8C68-17E958381157"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*",
"matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2f1687cca911a2f294313c762e0646cd9e7be8cc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/75f339d3ecd38cb1ce05357d647189d4a7f7ed08",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57906",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T12:15:24.800",
"lastModified": "2025-02-02T11:15:12.710",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-18T13:40:18.470",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,182 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: adc: ti-ads8688: se corrige la fuga de informaci\u00f3n en el b\u00fafer activado La matriz local 'buffer' se utiliza para enviar datos al espacio de usuario desde un b\u00fafer activado, pero no establece valores para canales inactivos, ya que solo utiliza iio_for_each_active_channel() para asignar nuevos valores. Inicialice la matriz a cero antes de usarla para evitar enviar informaci\u00f3n no inicializada al espacio de usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.19.198",
"versionEndExcluding": "4.20",
"matchCriteriaId": "F228E3AB-50DA-4EA0-A4ED-7B1CC0F448AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4.132",
"versionEndExcluding": "5.5",
"matchCriteriaId": "22471CC2-D881-43BA-B396-8537A87318DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10.50",
"versionEndExcluding": "5.11",
"matchCriteriaId": "0EA15E0D-757C-4542-81E8-C9BFD7B5059D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12.17",
"versionEndExcluding": "5.13",
"matchCriteriaId": "CDB1D52E-21AB-4ECE-9119-6594F8FF3B3A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.13.2",
"versionEndExcluding": "6.1.125",
"matchCriteriaId": "5505137F-873F-4081-8495-7B9BD9DFFB09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.72",
"matchCriteriaId": "33E12097-C88A-45B4-9677-2A961A08DD3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.10",
"matchCriteriaId": "02D604F6-10D1-4F7B-A022-0888406A1121"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*",
"matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1c80a0985a9a14f33dbf63cd703ca010f094f878",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2a7377ccfd940cd6e9201756aff1e7852c266e69",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3bf8d1e87939b8a19c9b738564fddf5b73322f2f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/455df95eb8f24a37abc549d6738fc8ee07eb623b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/485570ed82b7a6bb109fa1d0a79998e21f7f4c73",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/aae96738006840533cf147ffd5f41830987f21c5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ebe2672bc42a0dfe31bb539f8ce79d024aa7e46d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57907",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T12:15:24.897",
"lastModified": "2025-02-02T11:15:12.887",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-18T13:40:05.290",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,140 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: adc: rockchip_saradc: corrige p\u00e9rdida de informaci\u00f3n en b\u00fafer activado La estructura local 'data' se usa para enviar datos al espacio de usuario desde un b\u00fafer activado, pero no establece valores para canales inactivos, ya que solo usa iio_for_each_active_channel() para asignar nuevos valores. Inicialice la estructura a cero antes de usarla para evitar enviar informaci\u00f3n no inicializada al espacio de usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.9",
"versionEndExcluding": "6.6.72",
"matchCriteriaId": "FA3C66F8-143F-4897-962F-C1A8BDDD46CD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.10",
"matchCriteriaId": "02D604F6-10D1-4F7B-A022-0888406A1121"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*",
"matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/38724591364e1e3b278b4053f102b49ea06ee17c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5a95fbbecec7a34bbad5dcc3156700b8711d53c4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/64b79afdca7b27a768c7d3716b7f4deb1d6b955c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7a07fb80ea886e9134284a27d0155cca7649e293",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8193941bc4fe7247ff13233f328aea709f574554",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/85a9c98a5e0f22d911b00077d751e34fff1401aa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57908",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T12:15:24.990",
"lastModified": "2025-02-02T11:15:13.003",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-18T13:39:42.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,154 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: imu: kmx61: se corrige la fuga de informaci\u00f3n en el b\u00fafer activado La matriz local 'buffer' se utiliza para enviar datos al espacio del usuario desde un b\u00fafer activado, pero no establece valores para canales inactivos, ya que solo utiliza iio_for_each_active_channel() para asignar nuevos valores. Inicialice la matriz a cero antes de usarla para evitar enviar informaci\u00f3n no inicializada al espacio del usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0",
"versionEndExcluding": "6.1.125",
"matchCriteriaId": "6D6948D1-57E9-4708-A678-1AE52ACEC1AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.72",
"matchCriteriaId": "33E12097-C88A-45B4-9677-2A961A08DD3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.10",
"matchCriteriaId": "02D604F6-10D1-4F7B-A022-0888406A1121"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*",
"matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0871eb8d700b33dd7fa86c80630d62ddaef58c2c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/565814cbbaa674d2901428796801de49a611e59d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6985ba4467e4b15b809043fa7740d1fb23a1897b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6ae053113f6a226a2303caa4936a4c37f3bfff7b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a07f698084412a3ef5e950fcac1d6b0f53289efd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a386d9d2dc6635f2ec210b8199cfb3acf4d31305",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cde312e257b59ecaa0fad3af9ec7e2370bb24639",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57909",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T12:15:25.083",
"lastModified": "2025-01-19T12:15:25.083",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-18T13:39:06.190",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,105 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: light: bh1745: se corrige la fuga de informaci\u00f3n en el b\u00fafer activado La estructura local 'scan' se utiliza para enviar datos al espacio del usuario desde un b\u00fafer activado, pero no establece valores para canales inactivos, ya que solo utiliza iio_for_each_active_channel() para asignar nuevos valores. Inicialice la estructura a cero antes de usarla para evitar enviar informaci\u00f3n no inicializada al espacio del usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.12",
"versionEndExcluding": "6.12.10",
"matchCriteriaId": "CAA666EC-CF76-46C6-AE86-951E128D4C0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*",
"matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1cca2a666e099aa018e5ab385f0a6e01a3053629",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b62fbe3b8eedd3cf3c9ad0b7cb9f72c3f40815f0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57912",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T12:15:25.380",
"lastModified": "2025-02-02T11:15:13.627",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-18T13:38:39.953",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,154 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: pressure: zpa2326: fix information leak in triggered buffer La estructura local 'sample' se usa para enviar datos al espacio de usuario desde un b\u00fafer activado, pero tiene un agujero entre la temperatura y la marca de tiempo (presi\u00f3n u32, temperatura u16, GAP, marca de tiempo u64). Este agujero nunca se inicializa. Inicialice la estructura a cero antes de usarla para evitar enviar informaci\u00f3n no inicializada al espacio de usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.9",
"versionEndExcluding": "6.1.125",
"matchCriteriaId": "8ECFA604-48FC-4809-ADAC-3CFE89BA821F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.72",
"matchCriteriaId": "33E12097-C88A-45B4-9677-2A961A08DD3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.10",
"matchCriteriaId": "02D604F6-10D1-4F7B-A022-0888406A1121"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*",
"matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/6007d10c5262f6f71479627c1216899ea7f09073",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/64a989aa7475b8e76e69b9ec86819ea293e53bab",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9629ff1a86823269b12fb1ba9ca4efa945906287",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/979a0db76ceda8fe1f2f85a116bfe97620ebbadf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b7849f62e61242e0e02c776e1109eb81e59c567c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d25f1fc273670271412a52a1efbdaf5dcf274ed8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fefb88a4da961a0b9c2473cbdcfce1a942fcfa9a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57916",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T12:15:25.763",
"lastModified": "2025-01-19T12:15:25.763",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-18T13:38:31.347",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,133 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: misc: microchip: pci1xxxx: Resuelve el p\u00e1nico del kernel durante la gesti\u00f3n de IRQ GPIO Resuelve el p\u00e1nico del kernel causado por la gesti\u00f3n incorrecta de IRQ mientras se accede a valores GPIO. Esto se hace reemplazando generic_handle_irq con handle_nested_irq."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1",
"versionEndExcluding": "6.1.125",
"matchCriteriaId": "44CA08BE-AA91-4D79-9DC6-9ADFFD6C0C4D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.72",
"matchCriteriaId": "33E12097-C88A-45B4-9677-2A961A08DD3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.10",
"matchCriteriaId": "02D604F6-10D1-4F7B-A022-0888406A1121"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*",
"matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/194f9f94a5169547d682e9bbcc5ae6d18a564735",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/25692750c0259c5b65afec467d97201a485e8a00",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/47d3749ec0cb56b7b98917c190a8c10cb54216fd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/79aef6187e16b2d32307c8ff610e9e04f7f86e1f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57919",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T12:15:26.053",
"lastModified": "2025-01-19T12:15:26.053",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-18T13:38:22.377",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,105 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: se corrige el error de divisi\u00f3n en los c\u00e1lculos de escala del plano DM dm_get_plane_scale no tiene en cuenta el tama\u00f1o de escala del plano igual a cero, lo que genera un error en el kernel debido a la divisi\u00f3n por cero. Se soluciona estableciendo el tama\u00f1o de escala exterior como cero cuando el tama\u00f1o de dst es cero, de forma similar a lo que hace drm_calc_scale(). Este problema comenz\u00f3 con la introducci\u00f3n del modo de superposici\u00f3n del cursor que utiliza esta funci\u00f3n para evaluar los cambios del modo del cursor a trav\u00e9s de dm_crtc_get_cursor_mode() antes de verificar el estado del plano. [Dec17 17:14] Ups: error de divisi\u00f3n: 0000 [#1] PREEMPT SMP NOPTI [ +0.000018] CPU: 5 PID: 1660 Comm: surface-DP-1 No contaminado 6.10.0+ #231 [ +0.000007] Nombre del hardware: Valve Jupiter/Jupiter, BIOS F7A0131 30/01/2024 [ +0.000004] RIP: 0010:dm_get_plane_scale+0x3f/0x60 [amdgpu] [ +0.000553] C\u00f3digo: 44 0f b7 41 3a 44 0f b7 49 3e 83 e0 0f 48 0f a3 c2 73 21 69 41 28 e8 03 00 00 31 d2 41 f7 f1 31 d2 89 06 69 41 2c e8 03 00 00 <41> f7 f0 89 07 e9 d7 d8 7e e9 44 89 c8 45 89 c1 41 89 c0 eb d4 66 [ +0.000005] RSP: 0018:ffffa8df0de6b8a0 EFLAGS: 00010246 [ +0.000006] RAX: 00000000000003e8 RBX: ffff9ac65c1f6e00 RCX: ffff9ac65d055500 [ +0,000003] RDX: 0000000000000000 RSI: ffffa8df0de6b8b0 RDI: ffffa8df0de6b8b4 [ +0.000004] RBP: ffff9ac64e7a5800 R08: 000000000000000 R09: 0000000000000a00 [ +0.000003] R10: 0000000000000ff R11: 0000000000000054 R12: ffff9ac6d0700010 [ +0.000003] R13: ffff9ac65d054f00 R14: ffff9ac65d055500 R15: ffff9ac64e7a60a0 [ +0.000004] FS: 00007f869ea00640(0000) GS:ffff9ac970080000(0000) knlGS:0000000000000000 [ +0.000004] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ +0.000003] CR2: 000055ca701becd0 CR3: 000000010e7f2000 CR4: 0000000000350ef0 [ +0.000004] Rastreo de llamadas: [ +0.000007] [ +0.000006] ? __die_body.cold+0x19/0x27 [ +0.000009] ? die+0x2e/0x50 [ +0.000007] ? do_trap+0xca/0x110 [ +0.000007] ? do_error_trap+0x6a/0x90 [ +0.000006] ? dm_get_plane_scale+0x3f/0x60 [amdgpu] [ +0.000504] ? exc_divide_error+0x38/0x50 [ +0.000005] ? dm_get_plane_scale+0x3f/0x60 [amdgpu] [ +0.000488] ? [+0.000050] \u00bf __pfx_drm_mode_atomic_ioctl+0x10/0x10 [drm] [ +0.000047] drm_ioctl_kernel+0xb3/0x100 [drm] [ +0.000062] drm_ioctl+0x27a/0x4f0 [drm] [ +0.000049] ? __pfx_drm_mode_atomic_ioctl+0x10/0x10 [drm] [ +0.000055] amdgpu_drm_ioctl+0x4e/0x90 [amdgpu] [ +0.000360] __x64_sys_ioctl+0x97/0xd0 [ +0.000010] do_syscall_64+0x82/0x190 [ +0.000008] ? __pfx_drm_mode_createblob_ioctl+0x10/0x10 [drm] [ +0.000044] ? srso_return_thunk+0x5/0x5f [ +0.000006] ? drm_ioctl_kernel+0xb3/0x100 [drm] [ +0.000040] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? __check_object_size+0x50/0x220 [ +0.000007] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? drm_ioctl+0x2a4/0x4f0 [drm] [ +0.000039] ? __pfx_drm_mode_createblob_ioctl+0x10/0x10 [drm] [ +0.000043] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? __pm_runtime_suspend+0x69/0xc0 [ +0.000006] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? amdgpu_drm_ioctl+0x71/0x90 [amdgpu] [ +0.000366] ? srso_return_thunk+0x5/0x5f [ +0.000006] ? syscall_salir_al_modo_usuario+0x77/0x210 [ +0.000007] ? srso_return_thunk+0x5/0x5f [ +0.000005] ? do_syscall_64+0x8e/0x190 [ +0.000006] ? srso_return_thunk+0x5/0x5f [ +0.000006] ? do_syscall_64+0x8e/0x190 [ +0.000006] ? srso_return_thunk+0x5/0x5f [ +0.000007] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ +0.000008] RIP: 0033:0x55bb7cd962bc [ +0.000007] C\u00f3digo: 4c 89 6c 24 18 4c 89 64 24 20 4c 89 74 24 28 0f 57 c0 0f 11 44 24 30 89 c7 48 8d 54 24 08 b8 10 00 00 00 be bc 64 ---truncado---"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-369"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.12.10",
"matchCriteriaId": "AD20F8BA-D1BC-4584-8C68-17E958381157"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*",
"matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/5225fd2a26211d012533acf98a6ad3f983885817",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c2eaa73bd542b0168a0519e4a1c6e94bc121ec3d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-1269",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2025-02-18T14:15:28.513",
"lastModified": "2025-02-18T14:15:28.513",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in HAVELSAN Liman MYS allows Cross-Site Flashing.This issue affects Liman MYS: before 2.1.1 - 1010."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:L",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://github.com/limanmys/core/releases/tag/release.master.1010",
"source": "iletisim@usom.gov.tr"
},
{
"url": "https://www.usom.gov.tr/bildirim/tr-25-0038",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-1414",
"sourceIdentifier": "security@mozilla.org",
"published": "2025-02-18T14:15:28.670",
"lastModified": "2025-02-18T14:15:28.670",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Memory safety bugs present in Firefox 135. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 135.0.1."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1943179",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2025-12/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-24032",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-10T16:15:39.153",
"lastModified": "2025-02-10T16:15:39.153",
"lastModified": "2025-02-18T14:15:28.770",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -64,7 +64,7 @@
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -93,6 +93,10 @@
{
"url": "https://github.com/OpenSC/pam_pkcs11/security/advisories/GHSA-8r8p-7mgp-vf56",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00021.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25898",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-13T16:16:49.867",
"lastModified": "2025-02-14T17:15:20.917",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-18T14:59:38.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:tl-wr841nd_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60843636-698C-4000-84CB-9D441601EDE2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:tl-wr841nd:v11:*:*:*:*:*:*:*",
"matchCriteriaId": "0B6B17A5-94C4-4B4C-998A-B0B7B7FADB21"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/2664521593/mycve/blob/main/TP-Link/BOF_in_TP-Link_TL-WR841ND-V11_1.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-25901",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-13T16:16:50.180",
"lastModified": "2025-02-13T16:16:50.180",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-18T14:57:24.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,79 @@
"value": "Se ha descubierto una vulnerabilidad de desbordamiento de buffer en TP-Link TL-WR841ND V11, causada por los par\u00e1metros dnsserver1 y dnsserver2 en /userRpm/WanSlaacCfgRpm.htm. Esta vulnerabilidad permite a los atacantes ocasionar una denegaci\u00f3n de servicio (DoS) mediante un paquete manipulado.\n"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:tl-wr841nd_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "60843636-698C-4000-84CB-9D441601EDE2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:tl-wr841nd:v11:*:*:*:*:*:*:*",
"matchCriteriaId": "0B6B17A5-94C4-4B4C-998A-B0B7B7FADB21"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/2664521593/mycve/blob/main/TP-Link/BOF_in_TP-Link_TL-WR841ND-V11_5.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-02-18T13:02:54.058198+00:00
2025-02-18T15:01:16.063065+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-02-18T12:15:16.087000+00:00
2025-02-18T14:59:38.510000+00:00
```
### Last Data Feed Release
@ -33,32 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
281634
281636
```
### CVEs added in the last Commit
Recently added CVEs: `9`
Recently added CVEs: `2`
- [CVE-2024-13636](CVE-2024/CVE-2024-136xx/CVE-2024-13636.json) (`2025-02-18T11:15:10.143`)
- [CVE-2024-13667](CVE-2024/CVE-2024-136xx/CVE-2024-13667.json) (`2025-02-18T11:15:11.090`)
- [CVE-2024-13681](CVE-2024/CVE-2024-136xx/CVE-2024-13681.json) (`2025-02-18T11:15:11.270`)
- [CVE-2024-13691](CVE-2024/CVE-2024-136xx/CVE-2024-13691.json) (`2025-02-18T11:15:11.430`)
- [CVE-2024-13783](CVE-2024/CVE-2024-137xx/CVE-2024-13783.json) (`2025-02-18T11:15:11.600`)
- [CVE-2024-13797](CVE-2024/CVE-2024-137xx/CVE-2024-13797.json) (`2025-02-18T11:15:11.753`)
- [CVE-2025-0521](CVE-2025/CVE-2025-05xx/CVE-2025-0521.json) (`2025-02-18T11:15:12.740`)
- [CVE-2025-0817](CVE-2025/CVE-2025-08xx/CVE-2025-0817.json) (`2025-02-18T11:15:12.893`)
- [CVE-2025-1035](CVE-2025/CVE-2025-10xx/CVE-2025-1035.json) (`2025-02-18T12:15:16.087`)
- [CVE-2025-1269](CVE-2025/CVE-2025-12xx/CVE-2025-1269.json) (`2025-02-18T14:15:28.513`)
- [CVE-2025-1414](CVE-2025/CVE-2025-14xx/CVE-2025-1414.json) (`2025-02-18T14:15:28.670`)
### CVEs modified in the last Commit
Recently modified CVEs: `4`
Recently modified CVEs: `33`
- [CVE-2024-1062](CVE-2024/CVE-2024-10xx/CVE-2024-1062.json) (`2025-02-18T11:15:11.903`)
- [CVE-2024-2199](CVE-2024/CVE-2024-21xx/CVE-2024-2199.json) (`2025-02-18T11:15:12.273`)
- [CVE-2024-3657](CVE-2024/CVE-2024-36xx/CVE-2024-3657.json) (`2025-02-18T11:15:12.433`)
- [CVE-2024-5953](CVE-2024/CVE-2024-59xx/CVE-2024-5953.json) (`2025-02-18T11:15:12.583`)
- [CVE-2022-46169](CVE-2022/CVE-2022-461xx/CVE-2022-46169.json) (`2025-02-18T14:51:04.277`)
- [CVE-2023-50167](CVE-2023/CVE-2023-501xx/CVE-2023-50167.json) (`2025-02-18T13:43:27.293`)
- [CVE-2024-12797](CVE-2024/CVE-2024-127xx/CVE-2024-12797.json) (`2025-02-18T14:15:27.107`)
- [CVE-2024-1696](CVE-2024/CVE-2024-16xx/CVE-2024-1696.json) (`2025-02-18T13:43:18.590`)
- [CVE-2024-22011](CVE-2024/CVE-2024-220xx/CVE-2024-22011.json) (`2025-02-18T13:42:57.540`)
- [CVE-2024-24275](CVE-2024/CVE-2024-242xx/CVE-2024-24275.json) (`2025-02-18T13:44:28.043`)
- [CVE-2024-24276](CVE-2024/CVE-2024-242xx/CVE-2024-24276.json) (`2025-02-18T13:44:14.953`)
- [CVE-2024-27218](CVE-2024/CVE-2024-272xx/CVE-2024-27218.json) (`2025-02-18T13:42:34.137`)
- [CVE-2024-27227](CVE-2024/CVE-2024-272xx/CVE-2024-27227.json) (`2025-02-18T13:42:12.110`)
- [CVE-2024-27229](CVE-2024/CVE-2024-272xx/CVE-2024-27229.json) (`2025-02-18T13:42:04.037`)
- [CVE-2024-27237](CVE-2024/CVE-2024-272xx/CVE-2024-27237.json) (`2025-02-18T13:41:56.553`)
- [CVE-2024-37601](CVE-2024/CVE-2024-376xx/CVE-2024-37601.json) (`2025-02-18T14:15:27.900`)
- [CVE-2024-37603](CVE-2024/CVE-2024-376xx/CVE-2024-37603.json) (`2025-02-18T14:15:28.070`)
- [CVE-2024-57241](CVE-2024/CVE-2024-572xx/CVE-2024-57241.json) (`2025-02-18T14:15:28.237`)
- [CVE-2024-57905](CVE-2024/CVE-2024-579xx/CVE-2024-57905.json) (`2025-02-18T13:40:32.897`)
- [CVE-2024-57906](CVE-2024/CVE-2024-579xx/CVE-2024-57906.json) (`2025-02-18T13:40:18.470`)
- [CVE-2024-57907](CVE-2024/CVE-2024-579xx/CVE-2024-57907.json) (`2025-02-18T13:40:05.290`)
- [CVE-2024-57908](CVE-2024/CVE-2024-579xx/CVE-2024-57908.json) (`2025-02-18T13:39:42.783`)
- [CVE-2024-57909](CVE-2024/CVE-2024-579xx/CVE-2024-57909.json) (`2025-02-18T13:39:06.190`)
- [CVE-2024-57912](CVE-2024/CVE-2024-579xx/CVE-2024-57912.json) (`2025-02-18T13:38:39.953`)
- [CVE-2024-57916](CVE-2024/CVE-2024-579xx/CVE-2024-57916.json) (`2025-02-18T13:38:31.347`)
- [CVE-2024-57919](CVE-2024/CVE-2024-579xx/CVE-2024-57919.json) (`2025-02-18T13:38:22.377`)
- [CVE-2025-24032](CVE-2025/CVE-2025-240xx/CVE-2025-24032.json) (`2025-02-18T14:15:28.770`)
- [CVE-2025-25898](CVE-2025/CVE-2025-258xx/CVE-2025-25898.json) (`2025-02-18T14:59:38.510`)
- [CVE-2025-25901](CVE-2025/CVE-2025-259xx/CVE-2025-25901.json) (`2025-02-18T14:57:24.510`)
## Download and Usage

View File

@ -151187,7 +151187,7 @@ CVE-2020-16306,0,0,3233b6147a505da27746f4a780af25be6c5775b185dccf805f17869c6d486
CVE-2020-16307,0,0,906010918ff0850051577978de90c20a14d44237732b35efca66371c292d3a7f,2024-11-21T05:07:09.237000
CVE-2020-16308,0,0,3c7a8b43105d832158ec3830eee12125cdf5f91f8246c6f7551233190e1a4a50,2024-11-21T05:07:09.393000
CVE-2020-16309,0,0,ff7ea3d61683514ad0ab3015c05b199b45add138e38e430eb46fb4e16ae8116c,2024-11-21T05:07:09.543000
CVE-2020-1631,0,0,451a7b2411a128b3b860c824a1399cf8c45f17392884902469b8b74ae9b0a79e,2024-11-21T05:11:02.493000
CVE-2020-1631,0,1,199632964333578737f6cee0cb69696ac403c5882fc31d3e767776c973555131,2025-02-18T14:59:06.660000
CVE-2020-16310,0,0,12e2025a2688c34de3d74cab5125780b6cb8f1b79f2a6da42ce3ec0b8f469b52,2024-11-21T05:07:09.697000
CVE-2020-1632,0,0,fd0c48a346d41dbf0fb5f3e5aedc97dd61bdc0c8156f7a2a29fe512af0d36440,2024-11-21T05:11:02.687000
CVE-2020-1633,0,0,5785256e47c495316522942ae01cc6f822d34b04d5b40e21349533ac5f5e9c55,2024-11-21T05:11:02.837000
@ -166537,7 +166537,7 @@ CVE-2021-1901,0,0,b4e439599e636bd2af3f4917af437f418f3102e0c7a63069310a81adcf8a4e
CVE-2021-1903,0,0,d39f8f46801673020c5fbf3ea01fae62f95ab502fce8796c85a54991fed2fd38,2024-11-21T05:45:22.487000
CVE-2021-1904,0,0,736c70e50ad0301f8658a558129e85f2c3820d51a12d0cb07c0e689d67b51d07,2024-11-21T05:45:22.860000
CVE-2021-1905,0,0,372125f83a874275be00c1ffa8da76d54507cb820495157f0730c4f460e930e9,2025-01-29T20:15:27.953000
CVE-2021-1906,0,0,9b3a01b9efc2f2440352c641555cacc0123c7ee1786c0b365709eb048843d4c9,2024-11-21T05:45:23.897000
CVE-2021-1906,0,1,f1d0547a62f7facb3a112f19302d470e01e5a89418134d75f46f7d2868390f53,2025-02-18T14:58:38.243000
CVE-2021-1907,0,0,8faafa9970a3672f067ece059b551bd2adc47cbf8ba4f75421ae6f6b8c30f6d5,2024-11-21T05:45:24.550000
CVE-2021-1909,0,0,09b73ecdef2f380acd80f25a5da214cc33c77d1e8af71d49aad377ad62e8a0d2,2024-11-21T05:45:24.763000
CVE-2021-1910,0,0,a6374620334700cdcae2f54d499d65ec2bbdf4b8d8dd71d334a216c6c2c176fe,2024-11-21T05:45:25.270000
@ -176565,7 +176565,7 @@ CVE-2021-32644,0,0,48326864e3c31b32f0a2a40c894f4c5b136a56d07940984e0dd5cc5d1fc98
CVE-2021-32645,0,0,9ccb448ef4de54166b4a9bb78f7bf78b88ec7ed02e5d39b6aaf9d53721c1c7e6,2024-11-21T06:07:26.863000
CVE-2021-32646,0,0,8b20a03ce7ae582704f08e6c885ebaac0c533a1c8e4c47c8c7120f9c4abe2385,2024-11-21T06:07:26.993000
CVE-2021-32647,0,0,c99a9247f5a69d1d18fc3868b9feddd2d5c1cfa057b7d5e9eeb861f20cdb1970,2024-11-21T06:07:27.147000
CVE-2021-32648,0,0,df521eddeed51bc771cefcde15b150e58ec651e1713a6b975c21391f32c7919b,2024-11-21T06:07:27.300000
CVE-2021-32648,0,1,2dcd533b2d5dfae53b2d1b298491b864e44d73017248a7387cc4137926632b0c,2025-02-18T14:48:55.537000
CVE-2021-32649,0,0,ec6446253c3390080ce76cfe06ab7e81e042190c48d349c3bbe41d3582775742,2024-11-21T06:07:27.430000
CVE-2021-32650,0,0,d5f4ce6dfd3368853beb539f2091f1046487c5cbc12b94f90a4301791365a1eb,2024-11-21T06:07:27.550000
CVE-2021-32651,0,0,cbadacd8e821828cc3ee8a01abf2792bbd8d05e094c35e440cf4cdd8ff657d70,2024-11-21T06:07:27.657000
@ -181494,7 +181494,7 @@ CVE-2021-3914,0,0,587d3c5496a3894f3bee9050cac22e88e23c870c5f08774001d16b01d73514
CVE-2021-39140,0,0,0d9122e27f2e8ed15d337a2299d703bde300b1bfc5641e6a2d94398671530bde,2024-11-21T06:18:40.777000
CVE-2021-39141,0,0,308173be0e42d3b05e3159d40259ea4c33203fe28aebec15c3e70290187fba0a,2024-11-21T06:18:41.053000
CVE-2021-39143,0,0,ffd9d8fa28b7e55b36ad11f211caff12c1dd3699acec6a9366db77a7d01be1df,2024-11-21T06:18:41.313000
CVE-2021-39144,0,0,267579ecbbd4d8577d9f612ad7cba7e483f35d072d5d78ca4e5167ab68b09cc5,2024-11-21T06:18:41.480000
CVE-2021-39144,0,1,c07818c89b74aa188807fe5a9ff0259cd764d6c6dd17d0bf936fee7a941edb65,2025-02-18T14:47:16.960000
CVE-2021-39145,0,0,9062191979151d36b337ca921b5d90e49dc062b4974dde4e6e8076a6ae806f74,2024-11-21T06:18:41.880000
CVE-2021-39146,0,0,a68f99bfb9c34ab239930244698e1dfe09b229ea585fcfca9e82690b53f706d2,2024-11-21T06:18:42.123000
CVE-2021-39147,0,0,c59b801126c107f7229606315684ca5bddd626cafdf34772e7610770cf359be9,2024-11-21T06:18:42.353000
@ -181583,7 +181583,7 @@ CVE-2021-39222,0,0,71610020ce9e67dc6940837aefe504acf8a8d9fdb64ff351427e97a92ab7a
CVE-2021-39223,0,0,5c82a3350e48ddcff666b93be9d4046e000db4dacdb95c195e7d0a6ac4994a66,2024-11-21T06:18:56.700000
CVE-2021-39224,0,0,0dbf7b0b7c0bfb5a2d9503d6d8b25452b69229fa68d356a1f3ea08c1eb5c6037,2024-11-21T06:18:56.860000
CVE-2021-39225,0,0,0657e7f09b5d865111d8be38a777e243b614f6eb04392640f272b6c40ad1c8e4,2024-11-21T06:18:57.023000
CVE-2021-39226,0,0,5d24d6fed5999ea4ee1b2259e9bb2f20a49cdfb7257cbea1d423dfa8f3bd9fd5,2024-11-21T06:18:57.193000
CVE-2021-39226,0,1,8f5b383c5a1b4edaefcf29c875a1af7a57ef26e606fb88396216b3f688a78c9b,2025-02-18T14:53:42.247000
CVE-2021-39227,0,0,b565dd80d12e5fc792bf53c83afbb0df18396a7f4bd06f4abb75f6be489edf81,2024-11-21T06:18:57.397000
CVE-2021-39228,0,0,f36eb8db813850239f055aaec343d16d3f88b3e91fadb62dd009ee0ffa13b3fe,2024-11-21T06:18:57.560000
CVE-2021-39229,0,0,19d99295ac275c3a2907f9ccafd6f9fcd679acf6e78619f479c455440e3594c8,2024-11-21T06:18:57.723000
@ -183276,7 +183276,7 @@ CVE-2021-41273,0,0,99397a929c92479c9f01da437507d101a5bf50eb4f748f5c7c67a12a6baaa
CVE-2021-41274,0,0,7158857e7d9becd3b84392aa0da7e34d2226b9ffe9aeee343c59c3868ee024e3,2024-11-21T06:25:56.540000
CVE-2021-41275,0,0,3a49ec4bc6781140610890599c8c13b510fa22785ea728e600da8381edd2a293,2024-11-21T06:25:56.670000
CVE-2021-41276,0,0,77b0bd73bf0cb70e85934ea984c04179674e78ac11807816d660704623492517,2024-11-21T06:25:56.823000
CVE-2021-41277,0,0,7a9bd7263f18595040ab44d916b953bf2e9b478e1860f3093c6dda56e8b9ce0b,2024-11-21T06:25:56.970000
CVE-2021-41277,0,1,e4746b3101fd550dfe9277a8558b6273afecba8bc38256e2836b1747212860bc,2025-02-18T14:44:41.687000
CVE-2021-41278,0,0,12082549d8e21ddc5cfe62e6f0a9abd13e7d3cdf0888335bc0d75510b76033a0,2024-11-21T06:25:57.203000
CVE-2021-41279,0,0,08dbaadaa38da000bb5a66fa4874a7c1582995ca6d179537b3e54f5f561379fd,2024-11-21T06:25:57.340000
CVE-2021-4128,0,0,a7ff56c7d35e301b0a6c7f5571b37ed5026ab961314fd66e1ee36016b813b933,2024-11-21T06:36:57.697000
@ -194265,7 +194265,7 @@ CVE-2022-24812,0,0,ba1810f3f8f684688400e185ebc7233835c3ff6495510564b8dac490202d0
CVE-2022-24813,0,0,877de67ab2140b2965630d6b87135eaf6ace0d62798d255eaaad903269f6f716,2024-11-21T06:51:09.340000
CVE-2022-24814,0,0,842db0f91ff63ac21bda327b9c3901d7b44f013aad2b3062d150a0c3eda475d7,2024-11-21T06:51:09.463000
CVE-2022-24815,0,0,27e7266001f871c48274f931037b93d1533250e699e309d319783ba507b69571,2024-11-21T06:51:09.587000
CVE-2022-24816,0,0,80d4b63f30809f6b5675544b5ebe7cd62cc8691be08f7b87abdc112bf6b6b6a6,2024-11-21T06:51:09.730000
CVE-2022-24816,0,1,548394469212ab8dd5d5a99accfa84c02b97d8208378247e330ae82c106d4eae,2025-02-18T14:50:35.940000
CVE-2022-24817,0,0,a9b66571183a48bb0e197f3de17073db6b3e8acb18975114b7691755a44c848d,2024-11-21T06:51:09.863000
CVE-2022-24818,0,0,a1ec3bb9985bb733a04420f18fd769587d8bdd5026fd3de5f563672d821e2f49,2024-11-21T06:51:09.987000
CVE-2022-24819,0,0,2c88a72c04bc40dc0e3ecd356f74d1b49fc751aa38ec58544ec9cfabe9b06b80,2024-11-21T06:51:10.110000
@ -197267,7 +197267,7 @@ CVE-2022-28550,0,0,d61aae6d6abf9b6a8a86235902813f696840ff6a6a4b80d0018dbdfdb7131
CVE-2022-28552,0,0,bf6b5f3af9c90093dcbe6a1e6758e74be069a7d6a399928ec5c61d8d6a467586,2024-11-21T06:57:30.483000
CVE-2022-28556,0,0,0507dc57a0de99a07253c9db2a03990e18b0a50af78ad25d1f7cd400d397b6ee,2024-11-21T06:57:30.647000
CVE-2022-28557,0,0,4926cd7b8eadd04d6c5fc52348cef453ebb742155b50f1e177062444932a671a,2024-11-21T06:57:30.793000
CVE-2022-2856,0,0,b84ccce006d6462b614d737c34cd37214778de96a599175a0e80459edae5ee51,2024-11-21T07:01:48.987000
CVE-2022-2856,0,1,854658bea9df630851fc34fdf92df0c3500c0944d8a2cdb7300480bf99d3ef64,2025-02-18T14:43:46.130000
CVE-2022-28560,0,0,e4b562b74d9cdbf01bd96ffaeba2fe191d5510688ed63ab34991480eb886b49c,2024-11-21T06:57:30.927000
CVE-2022-28561,0,0,518c19fe66b4e09bc9800bc1acea302b3504c0f43ee73ab2e30472e903ec5797,2024-11-21T06:57:31.067000
CVE-2022-28568,0,0,beb032e0c658d78fbcbcb904731866c4eac85eb53ad4d016a962c9ad42c8eec9,2024-11-21T06:57:31.207000
@ -210983,7 +210983,7 @@ CVE-2022-46165,0,0,b52f4e59ab87d9ef826d1b1aa91e6a7d2ddf200190d4f26766b76124199a2
CVE-2022-46166,0,0,12dbb8116693845af5bad0761e01ce8e5a1e7215ce1813d4f82e11aaf281dd95,2024-11-21T07:30:14.600000
CVE-2022-46167,0,0,9fbc7368e3aa4e77dec66e0cd263dbe6cd1e49e34d7c4d09dd2bdc23ec0be5dd,2024-11-21T07:30:14.737000
CVE-2022-46168,0,0,cfb90e24d3dcc101412afd836697be794033b1f4d9d566f7537a84c49dad0fbf,2024-11-21T07:30:14.850000
CVE-2022-46169,0,0,32b03597dd8fa3719598f0afc2cbaa868385343552ad83ea80fe25b1bb00f8fc,2024-11-21T07:30:14.963000
CVE-2022-46169,0,1,cc6863e9c9f18d1f46be0c3464d80c247423311d32e3951d519550cc252696a0,2025-02-18T14:51:04.277000
CVE-2022-4617,0,0,8ebdc24048b2debd57a0848e54b1493c0fac1e5b4a06e75da5ac8ae75c06b81d,2024-11-21T07:35:36.497000
CVE-2022-46170,0,0,7d0728aad33cc4004748812cc2b8df0d4850c877dc0ccd5269efed0d41cc4c76,2024-11-21T07:30:15.103000
CVE-2022-46171,0,0,b44f4ea344bc0e6f16aab325e032b48c286c83d7bf551fdc6b86ced5865dcaba,2024-11-21T07:30:15.227000
@ -238623,7 +238623,7 @@ CVE-2023-50162,0,0,5dfe10d61702489d0fe770232e2bd40333b6e078026813bfcffc569401e1c
CVE-2023-50164,0,0,8287e2c775d003ea8c29bab77ea8774ab6378fa22173ac3c8e2b13cc1c7db123,2025-02-13T18:15:49.103000
CVE-2023-50165,0,0,f0f9c7ccf1e457e83f559bc213e758a4620263a795313eb97cd9fa622da413fe,2024-11-21T08:36:35.660000
CVE-2023-50166,0,0,0dcbea6361437caef094634aee7c12a95fcd6fe10938ebb89131abbf42b409e6,2024-11-21T08:36:35.803000
CVE-2023-50167,0,0,0d0dede05e4c03dcbcab9dc79f70bcf8ddf382f7f0da43067c571eb115842d20,2024-11-21T08:36:35.927000
CVE-2023-50167,0,1,ccd6c241106be26cb9b4d66bcbf303ef2afb42ac4c132eb3aae0f40c4896e64d,2025-02-18T13:43:27.293000
CVE-2023-50168,0,0,60c753e6d9fd36b5cbfba1d153ccf65b95f4faa13dcf59a244a5f02f851df528,2024-11-21T08:36:36.050000
CVE-2023-5017,0,0,71c6d4356e7fa788acf558b2e295dd7c9023f504871cad9a613399738594215d,2024-11-21T08:40:53.930000
CVE-2023-50170,0,0,35e958ca9e1e87a9a58954076b33cef095d0c7756fd04b778caa16ac161183d0,2024-02-14T18:15:46.610000
@ -244023,7 +244023,7 @@ CVE-2024-10616,0,0,9f20ea65efb8dfda7223bacba97b30c279c1d4b567d2392dfb095dad2d91b
CVE-2024-10617,0,0,9716e9909b1963761532dbdeddb02df8dc76024997ef46c92363f00fe38665be,2024-11-04T16:44:40.280000
CVE-2024-10618,0,0,f6ca69c9af73cdc0a5243c2eaf4419f95aafc639742259d0677010e595b53afc,2024-11-04T15:11:29.697000
CVE-2024-10619,0,0,fc49d071a4ef7dabac9b358961edaed3ee7ae1ad0d8ad00999d5bcf739685ba8,2024-11-04T15:11:44.627000
CVE-2024-1062,0,1,93332fe60f068e9cb056d0d2b6b480126af8205d38ab14ad34922652d0234049,2025-02-18T11:15:11.903000
CVE-2024-1062,0,0,93332fe60f068e9cb056d0d2b6b480126af8205d38ab14ad34922652d0234049,2025-02-18T11:15:11.903000
CVE-2024-10620,0,0,49a621fbed7cb9d28dafe4c2e61b1330b978fe18eddd8c84f23a8045a537a566,2024-11-01T12:57:03.417000
CVE-2024-10621,0,0,e653f9c261d51ef748d8caf5df8f99c49516cc3db939e790a4d7a4778b35fb6f,2024-11-08T19:01:03.880000
CVE-2024-10623,0,0,6e237096fbd094bbf3471247b87238053c5a778164061b5929cdb16711f26aa3,2024-11-21T13:57:24.187000
@ -245978,7 +245978,7 @@ CVE-2024-12791,0,0,ca87ba886f5289e1e8c19015d3d8fc3c978db86f9d300a7f44c7143ee4b7a
CVE-2024-12792,0,0,2f49d07cb189e8abf573658d63830eb2a6eac4f064c5f29dff915dff35ec0407,2025-01-06T15:28:27.857000
CVE-2024-12793,0,0,2902a16bfecddc21a8d8d04e8f0997250ef373c3635003ef32f9127592c72540,2025-01-06T15:16:15.037000
CVE-2024-12794,0,0,1f45437b8b28f90cd480ff6b28049ee2f0d50b6e09b9de7825840b2430eeb83b,2025-01-06T14:40:23.127000
CVE-2024-12797,0,0,8e4767f11287b706d346667cace5e4f10fd798d075ca9e4849b5e77077862f85,2025-02-15T01:15:10.250000
CVE-2024-12797,0,1,37d94d86ee2d2a854a82f8f41be43eae56989884a8c784c7ddde1cdee47aa139,2025-02-18T14:15:27.107000
CVE-2024-12798,0,0,5bd2c8c2d17a4f0af35e3d86ea1aab510b9864bd24d1725787e693a4849fe677,2025-01-03T14:15:24.370000
CVE-2024-12801,0,0,0e0d6365f891eca7b68a17e99dee519237772ad2d2b9b95e05e08c492aa73c2f,2025-01-03T14:15:24.500000
CVE-2024-12802,0,0,8f19e7a7cb329c26f5998e730d7f453cd46482968ebb674eef2b4e7f0f5bf48e,2025-01-09T15:15:14.683000
@ -246677,7 +246677,7 @@ CVE-2024-13625,0,0,13fe8a9d23e71af19d049c26713d37681ab17ff9be556309bc6aff2602f29
CVE-2024-13626,0,0,ed2b03a934796ec0d9dda4598897fce51405472dd7901847b82ba4dfaac12a2b,2025-02-17T06:15:11.940000
CVE-2024-13627,0,0,091818d37bd994aab1b6b18bae211dee9546cb2e17475bf34984a23caeb51798,2025-02-17T06:15:12.047000
CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000
CVE-2024-13636,1,1,c685b1a09dc1c258e65b547dde9c2237c56f30935eb20290c56e8541aa2b245e,2025-02-18T11:15:10.143000
CVE-2024-13636,0,0,c685b1a09dc1c258e65b547dde9c2237c56f30935eb20290c56e8541aa2b245e,2025-02-18T11:15:10.143000
CVE-2024-13639,0,0,2fa3cbcf0e6974db61fb65364ec620ba817caf77aea64fecbbfef94d3304d5da,2025-02-13T09:15:07.273000
CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000
CVE-2024-13641,0,0,40196144b6370d50846f27868b94418a681b195f3122e85e15112c8a0d9b0dea,2025-02-14T06:15:19.957000
@ -246698,19 +246698,19 @@ CVE-2024-13661,0,0,3be24e05b81fe01b8fbf6ee3a938c303c059e6983fd80a8d451cf6089d020
CVE-2024-13662,0,0,56f3ccc8e33600f927bf8694da0271aa04060815d9c0913215c0208ea29f19b6,2025-01-31T16:15:33.593000
CVE-2024-13664,0,0,473217716deb2aa13e14c1c50fc37141e04baa642fdc5cb480a274dd2f0bc069,2025-01-31T17:58:11.783000
CVE-2024-13665,0,0,18a0fb900dfdb3589ce932f5ee4cb2705e9546782c74f6ed6faf4400a1ef2d61,2025-02-12T05:15:12.483000
CVE-2024-13667,1,1,7a7967e05d1d5b5042b47255b9bffaf2e69713cc939fb41aa3c2d040ad9766d9,2025-02-18T11:15:11.090000
CVE-2024-13667,0,0,7a7967e05d1d5b5042b47255b9bffaf2e69713cc939fb41aa3c2d040ad9766d9,2025-02-18T11:15:11.090000
CVE-2024-1367,0,0,3f60d63c26ab9e28e6dceb27e57632b2e7fb2cc7ac1eb4673458558449b3c5c8,2024-11-21T08:50:25.600000
CVE-2024-13670,0,0,690ebcbb95d3f98eab9f8ee4f1517c6db5063e5d1de1041c36e188175dd1fa04,2025-01-31T17:56:17.183000
CVE-2024-13671,0,0,ae3f820669c60d968ca7475f09981b5aa31ebc6a060e50869f9d2043fe693b44,2025-01-31T17:50:24.757000
CVE-2024-13677,0,0,8c3dbbbad614c82756be5f87314c06d94f2c3bdc57d66eee8a7cfa5797e10d79,2025-02-18T05:15:17.893000
CVE-2024-1368,0,0,bdafec7323bf6060c2602bb232f81dd53afd410b7ab713f1778c3940b8b89a37,2025-02-11T19:44:46.867000
CVE-2024-13680,0,0,74b46f50e9e8190b451f914492933fe4a5d6196724bd1fb0611ec5e03b0be866,2025-02-05T17:37:37.827000
CVE-2024-13681,1,1,be24051b53da6911bff00c852db57b208df86bc968babb1536de5487be5312bf,2025-02-18T11:15:11.270000
CVE-2024-13681,0,0,be24051b53da6911bff00c852db57b208df86bc968babb1536de5487be5312bf,2025-02-18T11:15:11.270000
CVE-2024-13683,0,0,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000
CVE-2024-13684,0,0,40f905038d5fa7555de5181028fa41153678ad0c3f5a58f630a868dcfb14cb33,2025-02-18T05:15:18.050000
CVE-2024-13687,0,0,0bb37ef6a8e3ccf2122a39c9ab998f2d6a038a6c8ba655818034cfc1a0dd838f,2025-02-18T05:15:18.273000
CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4fa,2024-11-21T08:50:25.857000
CVE-2024-13691,1,1,dbaddf29c695a5aecaf0a1e812721c1de01d2629eac9277f2ffc1cf7addc558f,2025-02-18T11:15:11.430000
CVE-2024-13691,0,0,dbaddf29c695a5aecaf0a1e812721c1de01d2629eac9277f2ffc1cf7addc558f,2025-02-18T11:15:11.430000
CVE-2024-13692,0,0,c15da23d6ed0ab7d3c8d65227d9f5ae572ff0b187eacb9c29e601068c08e9870,2025-02-14T06:15:20.140000
CVE-2024-13694,0,0,f76307657ffe1cf961458e88374ab5be6334165284f8bcf86e9ac130fdc702fd,2025-02-04T18:47:41.800000
CVE-2024-13696,0,0,ddda7d8ee3b5db6631ae21ebb6abc15e9b483b8978d4e9a66c9fc1507010682e,2025-01-29T08:15:19.677000
@ -246755,12 +246755,12 @@ CVE-2024-1377,0,0,76446229d1bded69224cd2e98212f244bd2380b3470adb0152ce2b85f9216c
CVE-2024-13770,0,0,a44f66c1dcb1ed45bbd56efa11122dee804aa0389e710164fb7a159776bdc27c,2025-02-13T05:15:14.177000
CVE-2024-13775,0,0,89d1ec6a71cec12ef8d6fda55cf89bde1f18738024bb28bd682eafe6ee6a6e20,2025-02-01T13:15:22.847000
CVE-2024-1378,0,0,041aa523b6aa5691bc95edbf2c3845e6125399d35aa90aa412089416e101b866,2024-11-21T08:50:26.997000
CVE-2024-13783,1,1,ac9bfe0bdafe91bcdd1a8a8c9fc20390084611c0cb7ca54a0c41211f48373302,2025-02-18T11:15:11.600000
CVE-2024-13783,0,0,ac9bfe0bdafe91bcdd1a8a8c9fc20390084611c0cb7ca54a0c41211f48373302,2025-02-18T11:15:11.600000
CVE-2024-1379,0,0,d57d063aae1fbcb792bd04eccc73dc16507c20c6267e19d5bea5a4e5413062c5,2024-11-21T08:50:27.157000
CVE-2024-13791,0,0,e8f3bd70e313cf86e3514fe881c4b6e7c79dc2453560333d0bb8ba37212823df,2025-02-14T11:15:09.320000
CVE-2024-13794,0,0,6f5cfea229e5d029358c5daefcebc44ce458400ca82e6dd1a7b59d94adccdac4,2025-02-12T15:15:14.040000
CVE-2024-13795,0,0,5ff186d2b18ebdd910aed1b17c910f62f178a43b9b5396d894a01eab3d2cf2bf,2025-02-18T08:15:09.980000
CVE-2024-13797,1,1,fe09b7061fe6273763b2c8668b8146404830403c0458cc4116f6d91c5b5628d2,2025-02-18T11:15:11.753000
CVE-2024-13797,0,0,fe09b7061fe6273763b2c8668b8146404830403c0458cc4116f6d91c5b5628d2,2025-02-18T11:15:11.753000
CVE-2024-1380,0,0,189ef0e7c99b94999bf853d72512eb8cc5fd5c5f665b06c2b0baa188813ae89d,2025-01-31T13:26:51.163000
CVE-2024-13800,0,0,f8189949096d0fbf1e64f83c4f4243db2d6cd8eee32b0c9aa4085efbf0645426,2025-02-12T05:15:12.810000
CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000
@ -247071,7 +247071,7 @@ CVE-2024-1692,0,0,5fa0283571cfae8981e25dc13b8f934367b33cb6ea11e8e0322c3f47d4b7ac
CVE-2024-1693,0,0,85dfb1783111a4af6d6e255e664bea0a4079aa4a5e8289750dc03e9681499a21,2024-11-21T08:51:06.053000
CVE-2024-1694,0,0,1ad1c113a0675747298a00caec017307a26a01e7bc61dba367bdee9ea6f88f87,2024-12-26T16:09:24.467000
CVE-2024-1695,0,0,1c5d560e9ce5c3fae0cb5230e680f68a2aeca2413e77781d5be99ab374e41559,2024-11-21T08:51:06.360000
CVE-2024-1696,0,0,96c8303e535001c6c5d3b6e14d30079b9651c70dc730972b738df81a8696b09e,2024-11-21T08:51:06.550000
CVE-2024-1696,0,1,b8fc89b73f740d8c7dfc648b26251e8328585557d3aa9d517b3eb14bcbcc97d2,2025-02-18T13:43:18.590000
CVE-2024-1697,0,0,f131d35e4f7611988b22435f02c9fc35e30a8eef8e240c6cd7db41a7ee40e06c,2025-02-13T16:48:38.990000
CVE-2024-1698,0,0,a3817713801dcdd2b6948f039ebd5bf82047ee39d455ae9db40460bcb81f0e4a,2024-11-21T08:51:06.797000
CVE-2024-1700,0,0,8f0d5e25a0ed37b6b76a334cde88576835fdff98665e5fcb2bc1cf5f764f3feb,2025-02-12T16:58:29.373000
@ -249146,7 +249146,7 @@ CVE-2024-21985,0,0,63520fa4ce7e029aa7afb7a06539a8fcc598f88e49929e619949a1f3683b4
CVE-2024-21987,0,0,d85b3fb5542f16b18141f4b484fe4fe5ba713fa828d101cd5609224cc2267582,2024-12-16T22:26:25.610000
CVE-2024-21988,0,0,55386eaddbe790c0c8f4791da8d917ba72db26c9496e2de58c929fb47d6a62a1,2024-12-13T17:26:35.453000
CVE-2024-21989,0,0,ec1f8c6759f34204336860d28f718a39448a2b2bdb75835c73d2b79957701208,2025-02-10T19:27:49.223000
CVE-2024-2199,0,1,a6786599a4a5820775f4602d7a9bafaa90979aefe397312c660cd19b04d55fde,2025-02-18T11:15:12.273000
CVE-2024-2199,0,0,a6786599a4a5820775f4602d7a9bafaa90979aefe397312c660cd19b04d55fde,2025-02-18T11:15:12.273000
CVE-2024-21990,0,0,9eb0662307f97fc6d2796dd1976a11e5da5b34d0ec169039cd848c0a3cb7b1ef,2025-02-10T19:29:29.260000
CVE-2024-21993,0,0,2667da6a83620bbdf6c064071c782ead828538a1f130072d020adf2efaaf4bdf,2024-11-22T15:12:38.550000
CVE-2024-21994,0,0,dfa944ce6140f880318b48048b89b590252448e31249ca7189b297298d6f9934,2024-11-12T13:56:54.483000
@ -249160,7 +249160,7 @@ CVE-2024-22008,0,0,aa29cf9cc02bfddd9d70a5ca3303a493c82c32aece5905ff426753d2df23c
CVE-2024-22009,0,0,356c7b90ddcb01019496a7866c880a1ee380480011d91dbf0c14c877bad8c3ed,2024-11-21T08:55:22.223000
CVE-2024-2201,0,0,26eadb7aa2f5722f347c0f2e386bd97079dbdb8be46da7a582f3531a892ffe48,2025-01-09T17:15:12.423000
CVE-2024-22010,0,0,24c05b548507772309ac4d10c2109cc2ada2f5baf0cb1151b04e10f65fa40a11,2024-11-21T08:55:22.450000
CVE-2024-22011,0,0,d82bce95d9a57da4eb5cf6d66a8bf1abb544ebef2a691e896b0fec8f38f6dcb4,2024-11-21T08:55:23.190000
CVE-2024-22011,0,1,9bc18b453be47e216401d6af1ed57ea87c0e9782fda2337bb2c19d4945951174,2025-02-18T13:42:57.540000
CVE-2024-22012,0,0,7eaf97c43b8b09cc15e070e27a86dff00382532a39ca334b0b4081cfb62c637a,2024-11-21T08:55:23.300000
CVE-2024-22013,0,0,a1461319ead98423ad6fc0d646b9a33f399dadfb288cdf43b0101e5946e736ce,2024-11-06T21:35:02.500000
CVE-2024-22014,0,0,4cfec9b3d2520e43390c367346e4fcec3fa28706e41a48543905fc5c1d8c3d45,2024-11-21T08:55:23.560000
@ -250818,8 +250818,8 @@ CVE-2024-24266,0,0,b01052a1d09473422313197c1d95155ec7dc292e2d5aa99b904a2b4b6a5b2
CVE-2024-24267,0,0,b362a573ae53d8b792a146f9eedf896751146ced822e7e1d5dd56d0a6c4993bf,2024-11-21T08:59:05.483000
CVE-2024-2427,0,0,1004d0a0def7c6cef3083eef72f06901103dddd8dc2669fb276e8dd287d1d79d,2025-01-31T15:41:57.463000
CVE-2024-24272,0,0,5864839a910b3cf34f75bdf7fd1f937bb6e6ec5b97bf46e24e0cf397dc23313c,2024-11-21T08:59:05.650000
CVE-2024-24275,0,0,bff899221792788008cea5183e97c21cd0fac0b9fb306798436d4d5ed9d8e53f,2024-11-21T08:59:05.800000
CVE-2024-24276,0,0,061bf146868f07bcda0348cae54330a699b55d48f7a6f3e50594dab1944bd9e1,2024-11-21T08:59:05.947000
CVE-2024-24275,0,1,85f5f76d7e951dd3ac871aa39ada852d2b9d4f9859dbe692fdf3826cf400b8e3,2025-02-18T13:44:28.043000
CVE-2024-24276,0,1,f3a2e533b91285f6b58821f0074c07a3597320547cc12da610308b69c50c7577,2025-02-18T13:44:14.953000
CVE-2024-24278,0,0,62e4079d8511e44535a226dec446bd678ad9a0c3d8dc7ab8542623f0eb72e8b1,2024-11-21T08:59:06.080000
CVE-2024-24279,0,0,3c4f04c26cb85f0333fe6d1f13856ff9faa25dcc02100f20c125ebce26e32793,2024-11-21T08:59:06.313000
CVE-2024-2428,0,0,2471580c23f3bb37c64f9417f5557d913d5acf37363d1d2bcff51f8dd06d13f6,2024-11-21T09:09:44.007000
@ -253119,7 +253119,7 @@ CVE-2024-27212,0,0,ba6ac2978608ea5e95e94f7932eca5276e492bf0fcda3b79f7be081479dfa
CVE-2024-27213,0,0,bb511fb44d4483a7707788f536ad64bdc9a8594fdee0dce6ab02d022f44ae314,2024-11-21T09:04:07.233000
CVE-2024-27215,0,0,60ef065eae63cf58718fd9a5d80dfa62c007813e270493517bc98a19fcefe594,2024-02-21T18:15:52.060000
CVE-2024-27217,0,0,76d41e0e3916c24a8c24a0421c8f0968b4192e387bc204f8fff17479f7e3e830,2025-01-02T19:06:49.003000
CVE-2024-27218,0,0,a6afd710b1815d5aade34dbd13f31bcc4ed06ca89b8c78421e6b3ddd9c0670f7,2024-11-21T09:04:07.573000
CVE-2024-27218,0,1,c0b38b5dbd20812da47d5d97dba90b30a82e78f00e080d8f2e3dc9bad44346a4,2025-02-18T13:42:34.137000
CVE-2024-27219,0,0,64fc14d2c6214ae020a4c11c5e324b56f94237d828a38470eb29489f4c925efb,2024-11-21T09:04:07.683000
CVE-2024-2722,0,0,7b34b92b1820e8907773aa608ebf1b7330f60309554be8d7fc4928ec6e6f3d0d,2024-11-21T09:10:22.503000
CVE-2024-27220,0,0,4ee101d4577b781f601dfca4d5026ead710e942a600f8f26b9599978224cc5ac,2024-11-21T09:04:07.860000
@ -253129,9 +253129,9 @@ CVE-2024-27223,0,0,283aa61b55edbc74ad1b108ccc338916be832878191513c86027a30e87f58
CVE-2024-27224,0,0,f785a013141b3d88fe26f11eac326de71e5d58c27726e6d6328a3f861f1bfcdb,2024-11-21T09:04:08.610000
CVE-2024-27225,0,0,09e49698c9a5c022210712dd10e1d0392406285f87c4d4a3f5574c148892ac7e,2024-11-21T09:04:08.790000
CVE-2024-27226,0,0,a5963d92e9ea85b556096a52b0a9289d918ed9fee8ba2ef854c2a1108a6a54c0,2024-11-21T09:04:08.973000
CVE-2024-27227,0,0,dcca2367d57d4397f48fa9870727f94190cbfda537f6d6f20e882fb121acdbe0,2024-11-21T09:04:09.160000
CVE-2024-27227,0,1,77e2a1b627b3a876149a8ff85ff382b736360e43652d5fdceb4239bbe0ea7a2c,2025-02-18T13:42:12.110000
CVE-2024-27228,0,0,b015f77b7ec0412dfb6dba543414b6afdc595b6c02c5d40e9d5be360ead7b9ea,2024-11-21T09:04:09.280000
CVE-2024-27229,0,0,7a8f40ae8d535da86b6dc895564969026db17e2e4974efbbbc79049db376c4f4,2024-11-21T09:04:09.467000
CVE-2024-27229,0,1,841bc7dfbb4cad247276c26e9c35d972ce7b9730d58ac8950f4804ee624e235a,2025-02-18T13:42:04.037000
CVE-2024-2723,0,0,ae749859053deab54f1af8cf5abbdefb6fa5ba1e20954b45c5715c5f7d42fb41,2024-11-21T09:10:22.623000
CVE-2024-27230,0,0,78e9bd9e2c0907ca1c981c8beba804336d022bca05746a737f5416b2b442320c,2024-11-21T09:04:09.573000
CVE-2024-27231,0,0,19d5ac148910226bb4bbd48296cc9f834a38fa4de11caec34b12e61952df2cce,2024-11-25T16:15:12.423000
@ -253140,7 +253140,7 @@ CVE-2024-27233,0,0,619ec8955cdc02f44102a12e814b0558d5d674c6696f24a4298c3a1d2ebf1
CVE-2024-27234,0,0,7ad82767be5d7562c531c72087745b5f3d61bf551f09b828a0cb7c43f3329dd4,2024-12-06T18:15:24.243000
CVE-2024-27235,0,0,3e083ba47672f5a9a66e2f592f80e1bde1f776f355cb98370a18d600a4e49510,2024-11-21T09:04:10.320000
CVE-2024-27236,0,0,083d53dc8fe91cd487b10aeb9c6da4a6bdeee728f3cc27aa3cf72f5eca128aa7,2024-11-21T09:04:10.503000
CVE-2024-27237,0,0,4a46ea8a7e5b91cb490eaca4902ef1482cd25a65e6ab90099f7d88c855e3b694,2024-11-21T09:04:10.700000
CVE-2024-27237,0,1,ac0400b6ee9ea5955b25e431a177f0fc97c4b8a0248ca5fc2a4deff582e27a93,2025-02-18T13:41:56.553000
CVE-2024-27238,0,0,fe88808798faeacf6f7100006a129c0a58c7fb8fbcd6919e990121b7aef0f8e9,2024-11-21T09:04:10.813000
CVE-2024-2724,0,0,f551676e299f586d67b27ce123cbe8352eb7a13a032292943b2fee5618827406,2024-11-21T09:10:22.760000
CVE-2024-27240,0,0,d650a7e06f4d6460cad71c00b429cb1a64a7e40765adeb3308fca39f292601fc,2024-11-21T09:04:10.943000
@ -260229,7 +260229,7 @@ CVE-2024-36558,0,0,3eef99d7f2f1ab45215ec1d530d0754399299d75641595c2e163c4da0384b
CVE-2024-3656,0,0,cc6741c2183e9b71634bb4ef1d35a6085988e0cc98193d8f3bcaf2ac00dfb710,2024-12-23T14:15:05.553000
CVE-2024-36568,0,0,4dc3650ba5db2618f853f2d8a4fc5d941192ca1d82f4f78ca0f379bf1740efe1,2024-11-21T09:22:24.367000
CVE-2024-36569,0,0,237834c9de6e90d428bcfe4a628116c726e8895e63611649f26cb41fa5adc5f6,2024-11-21T09:22:24.610000
CVE-2024-3657,0,1,65371cb4ec0560a092094bc7ca0286719e773d0feaf30ac7df11d20585c946f7,2025-02-18T11:15:12.433000
CVE-2024-3657,0,0,65371cb4ec0560a092094bc7ca0286719e773d0feaf30ac7df11d20585c946f7,2025-02-18T11:15:12.433000
CVE-2024-36572,0,0,02acea4131ba4ced8c9d2c27f6e617000aadbd5a25e6fdc9a8033330ee9a5a90,2024-11-21T09:22:24.843000
CVE-2024-36573,0,0,d87d175fe9382bcadec22d28685b368889b641612b84c819cf92c06630288f26,2024-11-21T09:22:25.083000
CVE-2024-36574,0,0,d68d635dd3f24ff9c6b0ca38f06ae05b2e77100c9b5acc1aa810bfa6f9172104,2024-11-21T09:22:25.310000
@ -261074,9 +261074,9 @@ CVE-2024-3758,0,0,1181488ec82078110f1699579a12bafb88b2d59c08c0cadc1f8d0743c817c9
CVE-2024-3759,0,0,46624cef16e7230998500889df497f9ac3c7ef0f50d3eb513c1782b48bf6fa49,2025-01-02T19:03:20.700000
CVE-2024-3760,0,0,1d331199efa43ca30991198616569b583e4d5745c28ba3fbbb6d72d78d13e12a,2024-11-18T22:02:15.053000
CVE-2024-37600,0,0,ddbcae7fbc14a550ac4bc4a22e786b186115bf006884f2010b7cd244187382eb,2025-02-14T21:15:15.253000
CVE-2024-37601,0,0,f230969139cb0db1c29edc663e7a6bcf2a5122a62e631bc192f90df5a5bf5dc6,2025-02-14T21:15:15.440000
CVE-2024-37601,0,1,9758513d4834e753d56226c5e1cacdab7d0f74df736599d38c2f6e920a2f613c,2025-02-18T14:15:27.900000
CVE-2024-37602,0,0,934094d1652387cd6cb593774a29211d0c4504a54d153666b3c5ff6e041950ec,2025-02-14T17:15:15.447000
CVE-2024-37603,0,0,fa43c5369171a454f76936d53f2f011e443e635e5dd34777dab9f532908923fe,2025-02-14T21:15:15.637000
CVE-2024-37603,0,1,7b1644f9379e1f6ace8c13ff278b5cde8bb3d3b7fdf7427518fb549d8f47232c,2025-02-18T14:15:28.070000
CVE-2024-37605,0,0,fb11c6ec5c9451d0fce3b495eefe0ce37a1a8006db99445feeb56f6a0d8feffd,2024-12-17T18:15:22.377000
CVE-2024-37606,0,0,c23e13fa4f81bf586aa65db6e3fff01a9663acc134fa0dd95dc5e03eb97a040f,2024-12-17T18:15:23.083000
CVE-2024-37607,0,0,8deda97648c5ef6da6da35c94a7a01dc1d7b58245833491e93a1544a6a0717f3,2024-12-17T18:15:23.343000
@ -274656,7 +274656,7 @@ CVE-2024-5723,0,0,e9a9bfbb365da81a3cbb0381b41b1530e9a21124d15e20f7ac8fec3dc25c5b
CVE-2024-57237,0,0,10a0a055ff6114ab5c31b296696f6a71ea30e20eb63b78fcf8047450271df36f,2025-02-12T20:15:35.483000
CVE-2024-57238,0,0,a6b3be788c3bc4fc051e3d4d8b4703fb53567dec95099f9b84b95f6aa023a077,2025-02-12T20:15:35.620000
CVE-2024-5724,0,0,3819aa5efba8f524b2e05daa0542d560ece04ca1ec3f26079bc1135d63d2a09c,2024-11-21T09:48:13.843000
CVE-2024-57241,0,0,f88252f93812dfd93d00fb4d7b494f823afd7db94b241dc55a38faafcfb5ae78,2025-02-14T21:15:15.833000
CVE-2024-57241,0,1,8994dec25d800da5e0c31df7a39443f7369494e97fd5d505a6f1c683c830876d,2025-02-18T14:15:28.237000
CVE-2024-57248,0,0,fb61bd5f2cf829e3e9949d68a4efd231804cc252fcca96074ac9da52c6e827ed,2025-02-10T18:15:32.563000
CVE-2024-57249,0,0,8fcbb1cd0dac9099c77da0f7019c7d58aadbbe52552dc9898297ef492ac8f84f,2025-02-11T16:15:48.463000
CVE-2024-5725,0,0,c649d3a3b164c68e5675a9e5f51a3b560f73c348498c25b726ca2d6433b89d96,2024-11-26T02:18:06.927000
@ -274977,22 +274977,22 @@ CVE-2024-57901,0,0,012acb0ab56cc61cb0a7817e0eee65ff7532b8e18ae1a7773ea269400d685
CVE-2024-57902,0,0,746e8d9a9ea49c354baeba85ccf563446e433549d54a4b087d31671d2185f287,2025-01-15T13:15:14.867000
CVE-2024-57903,0,0,50052b64b55d2c4762de701d92d82de00114bebd2de7c535247b43c4bcdb95f1,2025-01-15T13:15:14.973000
CVE-2024-57904,0,0,3262ecb3c3c103f98db3569e7c85310fc4e16d9aea58056b578ccd75d9f62d99,2025-02-02T11:15:12.590000
CVE-2024-57905,0,0,5e024729d9663e05b8d838553a39e64f4fdb461909e95216d52b10d2b1616dfd,2025-01-19T12:15:24.710000
CVE-2024-57906,0,0,e24c60843962d8e4a1862e99f92081f350cbdcaa6bcd2463c5d63481bd29331e,2025-02-02T11:15:12.710000
CVE-2024-57907,0,0,4f3a58345855b99d521f31233fad0f3fdb094fcc8e7c017ee3db22a1196059d4,2025-02-02T11:15:12.887000
CVE-2024-57908,0,0,b2ccd594c2600b9fa0f2c4123bd91fa737883ad64c9536ea76cb151c6932eec8,2025-02-02T11:15:13.003000
CVE-2024-57909,0,0,ae18a7f484593d9d8f60ee64eea22f35aef4d7728fe0680162e49c2c9c950cdb,2025-01-19T12:15:25.083000
CVE-2024-57905,0,1,f2afd28499ba77d78d6161b9dc86205d9b013f5c063eb3a0fb31b7b050ac1772,2025-02-18T13:40:32.897000
CVE-2024-57906,0,1,1c82c39362aa54ac7ded96d3affeb3f600b57be3199ebe50578c90e46414f30b,2025-02-18T13:40:18.470000
CVE-2024-57907,0,1,14fc15d2d8a4886ac02d6a926289ee27d35ba482e0b2a7ef1a4ad5e89411d941,2025-02-18T13:40:05.290000
CVE-2024-57908,0,1,f5a6cf31cde370a07311bca688e839555e8a2f6a361c59c9fbf062fe0a19faf6,2025-02-18T13:39:42.783000
CVE-2024-57909,0,1,12e8190174f6a0552d498937d8f65055272a396a0ee2cbc25a50408a9d03019f,2025-02-18T13:39:06.190000
CVE-2024-5791,0,0,c186795f1b9cb5c37849e995a8b3a0b74da1832637d3182b3a656dc9e7491fd6,2024-11-21T09:48:20.453000
CVE-2024-57910,0,0,8608ac6abfac8f417ccdafd980c9b6946bd5a88dadccafd52a7ad793d4fd3d91,2025-02-03T14:48:35.543000
CVE-2024-57911,0,0,1bd58cba4dcc3e15e3e807eeffd494022f72a8e294782de7f37752bb8026d96a,2025-02-03T14:51:30.527000
CVE-2024-57912,0,0,be11335be8bfa68d409a4f4804aa8268272390f1c397b2c8c2e88ef78a024412,2025-02-02T11:15:13.627000
CVE-2024-57912,0,1,ff54a5a6a7eb1c97fe4ff28d89ed5aa0d755e3ea6a30f1a7403fc0c4ef28f573,2025-02-18T13:38:39.953000
CVE-2024-57913,0,0,f4c7a2492e587f9186e7f660b6755e3565a9bbd1bab88284bedc36464601cafd,2025-02-02T11:15:13.780000
CVE-2024-57914,0,0,47047672b97dc7073c40b4f814317b314574d03739889bb553935924c13faf35,2025-01-31T15:19:21.703000
CVE-2024-57915,0,0,d04e2c0336358ae9a308504943da8fc42f1e8c30d5d5a9b94f788387892b4897,2025-02-13T16:16:43.287000
CVE-2024-57916,0,0,12a7bb608455922a6d14fb69d97d993b787974fabfa7435658a4922fe0472e61,2025-01-19T12:15:25.763000
CVE-2024-57916,0,1,c0b98cbfe9c39628ac30d26773ea7fd535890238bcb57e5b434e164f632debe0,2025-02-18T13:38:31.347000
CVE-2024-57917,0,0,b1167e5c425222d1e86557f7fbfade37e2c05b542cac17d0614dacc0faf5facb,2025-01-23T17:15:20.330000
CVE-2024-57918,0,0,51a0ae7790d69294b939f21a09ba710f5e4fba529bc7fb169229a8b80c38f093,2025-01-19T12:15:25.960000
CVE-2024-57919,0,0,5cbc59745d82fa4b3927b517294029f28a0b98501aaf7d89670e0f14c928e2bc,2025-01-19T12:15:26.053000
CVE-2024-57919,0,1,e1738bf3dfca2fdef7365aa48f1ce4c0aa5de667cd9d2a7db2f45a4ee2b8b3c7,2025-02-18T13:38:22.377000
CVE-2024-5792,0,0,50e11f463088247110774be144fbfaca02cb5ac823192aaf13a748fe05bdb47b,2024-11-21T09:48:20.570000
CVE-2024-57920,0,0,05c144fc213deb035ca56e5f20c83d1cd18bb751206c0c2a6034a93879334dc6,2025-01-19T12:15:26.150000
CVE-2024-57921,0,0,c7302d486dbfb4c3bec63ccb147bf84370f9dbf24a7b88cf2b3ffd88950eddd1,2025-01-19T12:15:26.247000
@ -275194,7 +275194,7 @@ CVE-2024-5949,0,0,fe5e2637150e272cf082537e0e3cefdb0d839b62c75d205d27884005afec17
CVE-2024-5950,0,0,a78d500e380a8683be6de1b6ede7696fb96614af4e886c1082dc67edbebdb180,2024-11-21T09:48:38.043000
CVE-2024-5951,0,0,6ca5ff3cd42fd08fff399488183cbf1951f9079ffd4d29e5f2b6b2af828d5de9,2024-11-21T09:48:38.163000
CVE-2024-5952,0,0,a190c9a9018a1f2ab58177f40637c06f330e66f62b7b6378f23916dd2d1714f0,2024-11-21T09:48:38.283000
CVE-2024-5953,0,1,aa4a50ea7577493ef9dcd7257a58de9a2e34c293141ccd6914bd12d0dc638726,2025-02-18T11:15:12.583000
CVE-2024-5953,0,0,aa4a50ea7577493ef9dcd7257a58de9a2e34c293141ccd6914bd12d0dc638726,2025-02-18T11:15:12.583000
CVE-2024-5955,0,0,507aeceb22df9806a088e192ead5b6d5ae63c1088b74893a0b3c7d743ea2b6e3,2024-12-20T06:15:22.943000
CVE-2024-5956,0,0,e9563f3d433df5f631aaa571a1b9eb69e01bff299de8e6814f8c22eb94c0eed5,2024-09-06T16:25:19.253000
CVE-2024-5957,0,0,0c96b582bddb8809e949513e2b3e6545ad729973e5974f8b12406a050d04a9ee,2024-09-06T16:24:23.317000
@ -278969,7 +278969,7 @@ CVE-2025-0515,0,0,5ac36c3cf0188576defc5041e4d2f1cb1b09ae44d7e3c5256fa040d2f88a47
CVE-2025-0516,0,0,54ab7a64b43a5bfec8dcc0561006b4b6d888b05cbf982c088d6e719e3d73b992,2025-02-12T16:15:42.883000
CVE-2025-0517,0,0,59a53be50b99baee653b756881cc0ee4d0832bd3c59bfa5e70566936733554ba,2025-02-08T22:15:28.823000
CVE-2025-0518,0,0,6d3c5b8ffb150f75c389bd7e05b7aa905d22be4fb895631f5a9526d167be6180,2025-01-16T17:15:12.577000
CVE-2025-0521,1,1,d141672158f3dd6b43e8362cbb49b94292957b9dc12c9c2a20a4b4cb911bea60,2025-02-18T11:15:12.740000
CVE-2025-0521,0,0,d141672158f3dd6b43e8362cbb49b94292957b9dc12c9c2a20a4b4cb911bea60,2025-02-18T11:15:12.740000
CVE-2025-0522,0,0,c8a0deca91ab7a70ac2596d161948276f43ea6a4ed62efff36cb1682db433422,2025-02-06T15:15:17.127000
CVE-2025-0525,0,0,babf1a33188acdd067666dc0ba0175c8755fd69045eceebc9e557709ce71228e,2025-02-11T15:15:19.370000
CVE-2025-0526,0,0,53dec4a6dd32d10587365e0ad07600d979649e21e792ed7853f6469f9e22a090,2025-02-11T15:15:19.520000
@ -279127,7 +279127,7 @@ CVE-2025-0809,0,0,886fb9b396d2aad5cff53c02349fc0fee570a4920d4c4e68da65e25a660a34
CVE-2025-0814,0,0,6e84b81253656a1d32a82ba911740347214b0ddf70b532a879c2dbfdc544f5dd,2025-02-13T07:15:10.973000
CVE-2025-0815,0,0,7de889e4d3bd0a2a91237ff690c09d713b31f9d5f2a51b5b2591129d680ff441,2025-02-13T07:15:11.160000
CVE-2025-0816,0,0,d15c54cfa7b84645defa8a62e6e50a00e104c593cdfd6c16c28c49b600c34291,2025-02-13T07:15:11.353000
CVE-2025-0817,1,1,fa85cbf919c0f1f78d80bbc9c45d6dbc7441179fd105aef6a72c7d08c87fad7f,2025-02-18T11:15:12.893000
CVE-2025-0817,0,0,fa85cbf919c0f1f78d80bbc9c45d6dbc7441179fd105aef6a72c7d08c87fad7f,2025-02-18T11:15:12.893000
CVE-2025-0821,0,0,eef623ecbc4f931b67c977737dbf8b956ec963ba6d7dfab149142eb36bc3e525,2025-02-14T11:15:10.230000
CVE-2025-0822,0,0,19eb63234ef431f63c50ebd89131653cdb608481cafa3dc46ad8d59b634f7d92,2025-02-15T13:15:28.847000
CVE-2025-0825,0,0,7f81ca19fb96d77c0731181ff23092e49d4e8a157f0a8fa4a0ca13f53bda7923,2025-02-04T15:15:19.420000
@ -279228,7 +279228,7 @@ CVE-2025-1023,0,0,39df3b4906147b7a327b7abf854deb2df3fce38458ba003b8ff0de0bf89476
CVE-2025-1025,0,0,88de3d5b0a73f8ebb31a09c003423921c8f28cb5c5fcc232fde8c177bdee9679,2025-02-05T20:15:45.593000
CVE-2025-1026,0,0,035fc1dc2474697a852e52233cc9d299f677e1a0207511b21278e18a7e117de5,2025-02-05T05:15:10.687000
CVE-2025-1028,0,0,7d86a6dffcd03cc50ed664d1f7c2b2eb464439e0b7dbc2e8aafa1f3f61bb44bb,2025-02-05T04:15:06.543000
CVE-2025-1035,1,1,d903f294151be8a3e62456157037514ca824f897e40f9739bb45f708f03b9002,2025-02-18T12:15:16.087000
CVE-2025-1035,0,0,d903f294151be8a3e62456157037514ca824f897e40f9739bb45f708f03b9002,2025-02-18T12:15:16.087000
CVE-2025-1042,0,0,e4600eb751c0559414826534607894ec791f03e01157094495f2034b236d6aad,2025-02-12T15:15:16.230000
CVE-2025-1044,0,0,c0ae396acdc4cb805f7c247ba80e9ae0bf74adcc41c3f7c47e03b883299d9f0b,2025-02-11T20:15:35.913000
CVE-2025-1052,0,0,aec20324a2d34b4ccc027cb34c73e0a932e87739ed38f2c72735848089a66235,2025-02-11T20:15:36.070000
@ -279352,6 +279352,7 @@ CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa
CVE-2025-1243,0,0,cc81de32b5d05e39147da539415b77f22c0d2f7ae5860780f62e8e275e3c2c4c,2025-02-12T01:15:09.073000
CVE-2025-1244,0,0,8584cc98578bbf80aa01c78299adca4034b401510d32b47a83477d34cdce15e7,2025-02-12T15:15:18.430000
CVE-2025-1247,0,0,e0153bae3362c83882a00e373f05f61681964ee52d16af66c9ce73b6be435d9c,2025-02-13T14:16:18.400000
CVE-2025-1269,1,1,55228bfdc527f8c0442ccb88e2c1b27ad63ccf245d0eb3acb1b2a3cadaa49d85,2025-02-18T14:15:28.513000
CVE-2025-1270,0,0,a0fba4bca59afda304bf8335640266a3acf6a1624640bee675db51d94e9fc436,2025-02-13T13:15:09.273000
CVE-2025-1271,0,0,0359319eae8a142a0720b34e58c3d3808902c47ddd06a524c0e8a18f2f2f366a,2025-02-13T13:15:09.433000
CVE-2025-1283,0,0,afbf73056779c2284deff120b8f7806be9c37e816574c79d2148aa8a36b813a0,2025-02-13T22:15:11.413000
@ -279397,6 +279398,7 @@ CVE-2025-1389,0,0,b6f1b0c672dbbad3874206b7be5adc417f88010255a18af2ae0024e0bb3a7b
CVE-2025-1390,0,0,02ff75a3058ee51af8713fa469c7bed94932b28a55e59655029e36f100f66a9a,2025-02-18T03:15:10.447000
CVE-2025-1391,0,0,a1f2e3a8ca093b8de620c0e72b50119acca7a6fd87679168958e3acea938ff79,2025-02-17T14:15:08.413000
CVE-2025-1392,0,0,381fc64763a47738c9a933c7e4bcfcc84ef66c73e4a81eacddf01751da768947,2025-02-17T16:15:16.120000
CVE-2025-1414,1,1,2f5bab9c20787a8cfb85d96fac71605946ccbe482a1c195e142f5a36ac57ff3b,2025-02-18T14:15:28.670000
CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000
@ -280925,7 +280927,7 @@ CVE-2025-24028,0,0,f1373528095a8b61c5fbceda214a71e8eed17ec39e3b1a5d2d9d5b3514d22
CVE-2025-24029,0,0,78ccc702bd5d12fe713f342eb01497f1004c6f35d754359834f77e673529d847,2025-02-03T22:15:28.320000
CVE-2025-24030,0,0,53ed9f8c2f1606c3ac2d0893d8b45d45add03d54f0c0cb325356c13a37ba8b27,2025-01-23T04:15:07.100000
CVE-2025-24031,0,0,ac426670a7f454f9f80ca805af4f67a5b59a95fceeff862c47fc81fa9e528f0c,2025-02-10T16:15:38.990000
CVE-2025-24032,0,0,7b65a1bdbe0761250b9026d009c67b62fd4a97ffbb0e14891aabfd53a479ecd8,2025-02-10T16:15:39.153000
CVE-2025-24032,0,1,72aa612ba55cd72261ee2e284e9cc841f431fd35eea91269dd2777977c0b2a63,2025-02-18T14:15:28.770000
CVE-2025-24033,0,0,5d43b3fda302d539504b19a83f0cc15d137062f506c15ff024403b0f87c197d4,2025-01-23T18:15:33.610000
CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c813e3,2025-01-23T18:15:33.793000
CVE-2025-24036,0,0,fd3c57cd706b96e46ede143d602a78012ec65a6099cd7b40520437f8a49a1d2e,2025-02-14T17:31:47.153000
@ -281513,10 +281515,10 @@ CVE-2025-25744,0,0,9d528b6c8981e3c3b88d0f5ae19eaefffd1ccd1634a805d0e82416c773527
CVE-2025-25745,0,0,264990220c6b904fe4d42f36b2ec67929db475383a425f47e66656ac1635944b,2025-02-14T16:15:37.010000
CVE-2025-25746,0,0,97cc4fafec6afdf30f54321fd0abbf6c4170d075b88c0daed02fb3f015fe5fe8,2025-02-12T17:15:24.500000
CVE-2025-25897,0,0,4c9ed8ee3da92100f9730c8381968442218abe4f4ba02bddc4f9615a38a665b8,2025-02-13T16:16:49.790000
CVE-2025-25898,0,0,ce3f5d0179ed4ddc6d491c3be6fbda7289ce3638f8b82677f1620f1da2e7683b,2025-02-14T17:15:20.917000
CVE-2025-25898,0,1,fc74d55de52024bc41ff8bda523e9e77a6f3aa249f295c0b9a1f80a670c8abea,2025-02-18T14:59:38.510000
CVE-2025-25899,0,0,98096043478a3b9132f54ded5050225abd5f7dd69864cd5bcfb5e9d82d93f188,2025-02-13T20:15:49.913000
CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03dec,2025-02-13T16:16:50.037000
CVE-2025-25901,0,0,4bb3318a426075afea20e3cd7e6ccc008d1508d9384b2eedc4349a3b069c9099,2025-02-13T16:16:50.180000
CVE-2025-25901,0,1,3d0f8edd50682ae64d3cb2fe331b3f075e5218ba4cab3ff5c4ac461a68bbd907,2025-02-18T14:57:24.510000
CVE-2025-25988,0,0,19dea6ab3561d4393aca964f7f08baf91ad8e25d3c5d8889e52ba302a8a3eb4a,2025-02-14T19:15:14.497000
CVE-2025-25990,0,0,6abcae9f945cc88810c38e3600b21685803f14ddc79a81671983226999ae8055,2025-02-14T21:15:16.913000
CVE-2025-25991,0,0,690955a0e4187b4bcaa0c4890a2801dcd88d67bbfdde2361a09f0f8cf1615e5c,2025-02-14T20:15:37.210000

Can't render this file because it is too large.