From fe4c7ea4b07da4e477f815d4b368ecbb4489086e Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 3 Feb 2025 15:04:39 +0000 Subject: [PATCH] Auto-Update: 2025-02-03T15:01:14.870455+00:00 --- CVE-2018/CVE-2018-93xx/CVE-2018-9389.json | 34 ++- CVE-2021/CVE-2021-17xx/CVE-2021-1782.json | 32 ++- CVE-2021/CVE-2021-212xx/CVE-2021-21206.json | 34 ++- CVE-2021/CVE-2021-212xx/CVE-2021-21220.json | 34 ++- CVE-2021/CVE-2021-305xx/CVE-2021-30533.json | 34 ++- CVE-2021/CVE-2021-305xx/CVE-2021-30554.json | 34 ++- CVE-2021/CVE-2021-306xx/CVE-2021-30663.json | 32 ++- CVE-2021/CVE-2021-308xx/CVE-2021-30860.json | 32 ++- CVE-2021/CVE-2021-379xx/CVE-2021-37973.json | 32 ++- CVE-2021/CVE-2021-470xx/CVE-2021-47091.json | 127 ++++++++++- CVE-2021/CVE-2021-470xx/CVE-2021-47098.json | 110 +++++++++- CVE-2021/CVE-2021-471xx/CVE-2021-47100.json | 161 ++++++++++++-- CVE-2021/CVE-2021-471xx/CVE-2021-47101.json | 110 +++++++++- CVE-2022/CVE-2022-22xx/CVE-2022-2294.json | 32 ++- CVE-2022/CVE-2022-30xx/CVE-2022-3075.json | 32 ++- CVE-2022/CVE-2022-37xx/CVE-2022-3723.json | 32 ++- CVE-2022/CVE-2022-41xx/CVE-2022-4135.json | 32 ++- CVE-2022/CVE-2022-486xx/CVE-2022-48630.json | 188 ++++++++++++++-- CVE-2023/CVE-2023-237xx/CVE-2023-23715.json | 47 +++- CVE-2023/CVE-2023-282xx/CVE-2023-28204.json | 32 ++- CVE-2023/CVE-2023-323xx/CVE-2023-32373.json | 32 ++- CVE-2023/CVE-2023-324xx/CVE-2023-32434.json | 34 ++- CVE-2023/CVE-2023-324xx/CVE-2023-32439.json | 38 +++- CVE-2023/CVE-2023-374xx/CVE-2023-37450.json | 24 ++- CVE-2023/CVE-2023-410xx/CVE-2023-41064.json | 34 ++- CVE-2023/CVE-2023-419xx/CVE-2023-41990.json | 24 ++- CVE-2023/CVE-2023-419xx/CVE-2023-41991.json | 34 ++- CVE-2023/CVE-2023-419xx/CVE-2023-41992.json | 34 ++- CVE-2023/CVE-2023-422xx/CVE-2023-42234.json | 39 +++- CVE-2023/CVE-2023-428xx/CVE-2023-42824.json | 24 ++- CVE-2023/CVE-2023-429xx/CVE-2023-42917.json | 37 +++- CVE-2023/CVE-2023-48xx/CVE-2023-4863.json | 50 ++++- CVE-2023/CVE-2023-525xx/CVE-2023-52583.json | 206 ++++++++++++++++-- CVE-2023/CVE-2023-52xx/CVE-2023-5217.json | 34 ++- CVE-2023/CVE-2023-63xx/CVE-2023-6345.json | 34 ++- CVE-2023/CVE-2023-70xx/CVE-2023-7024.json | 34 ++- CVE-2024/CVE-2024-114xx/CVE-2024-11420.json | 54 ++++- CVE-2024/CVE-2024-232xx/CVE-2024-23222.json | 24 ++- CVE-2024/CVE-2024-266xx/CVE-2024-26654.json | 224 ++++++++++++++++++-- CVE-2024/CVE-2024-289xx/CVE-2024-28973.json | 123 ++++++++++- CVE-2024/CVE-2024-370xx/CVE-2024-37052.json | 64 +++++- CVE-2024/CVE-2024-370xx/CVE-2024-37053.json | 64 +++++- CVE-2024/CVE-2024-370xx/CVE-2024-37054.json | 64 +++++- CVE-2024/CVE-2024-370xx/CVE-2024-37055.json | 64 +++++- CVE-2024/CVE-2024-370xx/CVE-2024-37056.json | 64 +++++- CVE-2024/CVE-2024-370xx/CVE-2024-37057.json | 64 +++++- CVE-2024/CVE-2024-370xx/CVE-2024-37058.json | 64 +++++- CVE-2024/CVE-2024-370xx/CVE-2024-37059.json | 64 +++++- CVE-2024/CVE-2024-370xx/CVE-2024-37060.json | 64 +++++- CVE-2024/CVE-2024-370xx/CVE-2024-37061.json | 64 +++++- CVE-2024/CVE-2024-424xx/CVE-2024-42422.json | 54 ++++- CVE-2024/CVE-2024-474xx/CVE-2024-47476.json | 46 +++- CVE-2024/CVE-2024-538xx/CVE-2024-53802.json | 47 +++- CVE-2024/CVE-2024-538xx/CVE-2024-53816.json | 47 +++- CVE-2024/CVE-2024-542xx/CVE-2024-54212.json | 47 +++- CVE-2024/CVE-2024-575xx/CVE-2024-57522.json | 21 ++ CVE-2024/CVE-2024-577xx/CVE-2024-57798.json | 102 ++++++++- CVE-2024/CVE-2024-578xx/CVE-2024-57874.json | 123 ++++++++++- CVE-2024/CVE-2024-578xx/CVE-2024-57877.json | 75 ++++++- CVE-2024/CVE-2024-578xx/CVE-2024-57878.json | 75 ++++++- CVE-2024/CVE-2024-579xx/CVE-2024-57910.json | 167 ++++++++++++++- CVE-2024/CVE-2024-579xx/CVE-2024-57911.json | 160 +++++++++++++- CVE-2024/CVE-2024-579xx/CVE-2024-57934.json | 95 ++++++++- CVE-2025/CVE-2025-216xx/CVE-2025-21634.json | 100 ++++++++- CVE-2025/CVE-2025-216xx/CVE-2025-21652.json | 112 +++++++++- README.md | 38 +++- _state.csv | 133 ++++++------ 67 files changed, 4068 insertions(+), 352 deletions(-) create mode 100644 CVE-2024/CVE-2024-575xx/CVE-2024-57522.json diff --git a/CVE-2018/CVE-2018-93xx/CVE-2018-9389.json b/CVE-2018/CVE-2018-93xx/CVE-2018-9389.json index 61468d804ea..91770ce1455 100644 --- a/CVE-2018/CVE-2018-93xx/CVE-2018-9389.json +++ b/CVE-2018/CVE-2018-93xx/CVE-2018-9389.json @@ -2,8 +2,8 @@ "id": "CVE-2018-9389", "sourceIdentifier": "security@android.com", "published": "2025-01-18T00:15:24.600", - "lastModified": "2025-01-23T19:56:32.087", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-03T14:15:29.937", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 2.5 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-17xx/CVE-2021-1782.json b/CVE-2021/CVE-2021-17xx/CVE-2021-1782.json index 35dd84e52f4..77bf6ec295d 100644 --- a/CVE-2021/CVE-2021-17xx/CVE-2021-1782.json +++ b/CVE-2021/CVE-2021-17xx/CVE-2021-1782.json @@ -2,7 +2,7 @@ "id": "CVE-2021-1782", "sourceIdentifier": "product-security@apple.com", "published": "2021-04-02T18:15:21.373", - "lastModified": "2024-11-21T05:45:06.107", + "lastModified": "2025-02-03T14:15:30.590", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-667" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-212xx/CVE-2021-21206.json b/CVE-2021/CVE-2021-212xx/CVE-2021-21206.json index 0571befe06e..47966f4cb8f 100644 --- a/CVE-2021/CVE-2021-212xx/CVE-2021-21206.json +++ b/CVE-2021/CVE-2021-212xx/CVE-2021-21206.json @@ -2,8 +2,8 @@ "id": "CVE-2021-21206", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2021-04-26T17:15:08.213", - "lastModified": "2024-11-21T05:47:46.503", - "vulnStatus": "Modified", + "lastModified": "2025-02-03T14:15:30.827", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-212xx/CVE-2021-21220.json b/CVE-2021/CVE-2021-212xx/CVE-2021-21220.json index b8b9f66fa30..0165fdc03b9 100644 --- a/CVE-2021/CVE-2021-212xx/CVE-2021-21220.json +++ b/CVE-2021/CVE-2021-212xx/CVE-2021-21220.json @@ -2,8 +2,8 @@ "id": "CVE-2021-21220", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2021-04-26T17:15:08.593", - "lastModified": "2024-11-21T05:47:48.220", - "vulnStatus": "Modified", + "lastModified": "2025-02-03T14:15:31.120", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-305xx/CVE-2021-30533.json b/CVE-2021/CVE-2021-305xx/CVE-2021-30533.json index 7325e50fd06..109e8614f0f 100644 --- a/CVE-2021/CVE-2021-305xx/CVE-2021-30533.json +++ b/CVE-2021/CVE-2021-305xx/CVE-2021-30533.json @@ -2,8 +2,8 @@ "id": "CVE-2021-30533", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2021-06-07T20:15:08.730", - "lastModified": "2024-11-21T06:04:07.483", - "vulnStatus": "Modified", + "lastModified": "2025-02-03T14:15:31.373", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-305xx/CVE-2021-30554.json b/CVE-2021/CVE-2021-305xx/CVE-2021-30554.json index b957b85f37c..5ddb610ff26 100644 --- a/CVE-2021/CVE-2021-305xx/CVE-2021-30554.json +++ b/CVE-2021/CVE-2021-305xx/CVE-2021-30554.json @@ -2,8 +2,8 @@ "id": "CVE-2021-30554", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2021-07-02T19:15:07.893", - "lastModified": "2024-11-21T06:04:10.270", - "vulnStatus": "Modified", + "lastModified": "2025-02-03T14:15:31.783", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-306xx/CVE-2021-30663.json b/CVE-2021/CVE-2021-306xx/CVE-2021-30663.json index c7de373cd8d..6d7e17cfe13 100644 --- a/CVE-2021/CVE-2021-306xx/CVE-2021-30663.json +++ b/CVE-2021/CVE-2021-306xx/CVE-2021-30663.json @@ -2,7 +2,7 @@ "id": "CVE-2021-30663", "sourceIdentifier": "product-security@apple.com", "published": "2021-09-08T15:15:13.413", - "lastModified": "2024-11-21T06:04:23.317", + "lastModified": "2025-02-03T14:15:32.100", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-308xx/CVE-2021-30860.json b/CVE-2021/CVE-2021-308xx/CVE-2021-30860.json index 1cd369a9512..af21bbaf931 100644 --- a/CVE-2021/CVE-2021-308xx/CVE-2021-30860.json +++ b/CVE-2021/CVE-2021-308xx/CVE-2021-30860.json @@ -2,7 +2,7 @@ "id": "CVE-2021-30860", "sourceIdentifier": "product-security@apple.com", "published": "2021-08-24T19:15:14.370", - "lastModified": "2024-11-21T06:04:51.633", + "lastModified": "2025-02-03T14:15:32.323", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-379xx/CVE-2021-37973.json b/CVE-2021/CVE-2021-379xx/CVE-2021-37973.json index c2f7f3d99fb..c7c7f11f36f 100644 --- a/CVE-2021/CVE-2021-379xx/CVE-2021-37973.json +++ b/CVE-2021/CVE-2021-379xx/CVE-2021-37973.json @@ -2,7 +2,7 @@ "id": "CVE-2021-37973", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2021-10-08T22:15:08.287", - "lastModified": "2024-11-21T06:16:09.937", + "lastModified": "2025-02-03T14:15:32.667", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47091.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47091.json index 07d9588c305..3c99a12f6bc 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47091.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47091.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47091", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-04T18:15:07.670", - "lastModified": "2024-11-21T06:35:22.760", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T13:42:00.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,140 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mac80211: corrige el bloqueo en la ruta de error ieee80211_start_ap Necesitamos mantener local->mtx para liberar el contexto del canal, incluso codificado por lockdep_assert_held() all\u00ed. Arreglalo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10", + "versionEndExcluding": "5.10.89", + "matchCriteriaId": "205A941A-BAE7-4625-8AE4-C40185E63375" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.12", + "matchCriteriaId": "732BA914-7B3B-43CD-857F-8119106F6F71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*", + "matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*", + "matchCriteriaId": "A73429BA-C2D9-4D0C-A75F-06A1CA8B3983" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F621B5E3-E99D-49E7-90B9-EC3B77C95383" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*", + "matchCriteriaId": "F7BFDCAA-1650-49AA-8462-407DD593F94F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*", + "matchCriteriaId": "6EC9882F-866D-4ACB-8FBC-213D8D8436C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8A0915FE-A4AA-4C94-B783-CF29D81E7E54" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/87a270625a89fc841f1a7e21aae6176543d8385c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ac61b9c6c0549aaeb98194cf429d93c41bfe5f79", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c1d1ec4db5f7264cfc21993e59e8f2dcecf4b44f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/87a270625a89fc841f1a7e21aae6176543d8385c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ac61b9c6c0549aaeb98194cf429d93c41bfe5f79", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c1d1ec4db5f7264cfc21993e59e8f2dcecf4b44f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47098.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47098.json index b00dcdb7e5c..7255df7de0f 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47098.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47098.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47098", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-04T18:15:08.090", - "lastModified": "2024-11-21T06:35:23.650", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T13:49:30.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,119 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: hwmon: (lm90) Previene el desbordamiento/desbordamiento insuficiente de enteros en los c\u00e1lculos de hist\u00e9resis del commit b50aa49638c7 (\"hwmon: (lm90) Evita el desbordamiento insuficiente de enteros en los c\u00e1lculos de temperatura\") abord\u00f3 una serie de situaciones de desbordamiento insuficiente al escribir. l\u00edmites de temperatura. Sin embargo, omiti\u00f3 una situaci\u00f3n, vista cuando se intenta establecer el valor de hist\u00e9resis en MAX_LONG y el l\u00edmite de temperatura cr\u00edtica es negativo. Utilice abrazadera_val() al configurar la temperatura de hist\u00e9resis para garantizar que el valor proporcionado nunca pueda desbordarse o subestimarse." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.14", + "versionEndExcluding": "5.15.2", + "matchCriteriaId": "83C305E4-14E2-4D1F-A9DF-39339AF95300" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*", + "matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*", + "matchCriteriaId": "A73429BA-C2D9-4D0C-A75F-06A1CA8B3983" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F621B5E3-E99D-49E7-90B9-EC3B77C95383" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*", + "matchCriteriaId": "F7BFDCAA-1650-49AA-8462-407DD593F94F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*", + "matchCriteriaId": "6EC9882F-866D-4ACB-8FBC-213D8D8436C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8A0915FE-A4AA-4C94-B783-CF29D81E7E54" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/55840b9eae5367b5d5b29619dc2fb7e4596dba46", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d105f30bea9104c590a9e5b495cb8a49bdfe405f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/55840b9eae5367b5d5b29619dc2fb7e4596dba46", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d105f30bea9104c590a9e5b495cb8a49bdfe405f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47100.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47100.json index 9e39761d5fe..0324d253cc3 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47100.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47100.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47100", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-04T18:15:08.267", - "lastModified": "2024-11-21T06:35:23.917", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T13:51:24.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,182 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ipmi: corrige UAF al desinstalar los m\u00f3dulos ipmi_si e ipmi_msghandler Hola. Al probar la instalaci\u00f3n y desinstalaci\u00f3n de ipmi_si.ko e ipmi_msghandler.ko, el sistema fall\u00f3. El registro es el siguiente: [141.087026] ERROR: no se puede manejar la solicitud de paginaci\u00f3n del kernel en ffffffffc09b3a5a [141.087241] PGD 8fe4c0d067 P4D 8fe4c0d067 PUD 8fe4c0f067 PMD 103ad89067 PTE 0 [141.087464] Vaya s: 0010 [#1] SMP NOPTI [ 141.087580] CPU: 67 PID : 668 Comm: kworker/67:1 Kdump: cargado No contaminado 4.18.0.x86_64 #47 [ 141.088009] Cola de trabajo: eventos 0xffffffffc09b3a40 [ 141.088009] RIP: 0010:0xffffffffc09b3a5a [ 141.088009] C\u00f3digo: Valor RIP incorrecto. [ 141.088009] RSP: 0018:ffffb9094e2c3e88 EFLAGS: 00010246 [ 141.088009] RAX: 00000000000000000 RBX: ffff9abfdb1f04a0 RCX: 0000000000000000 [ 14 1.088009] RDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246 [ 141.088009] RBP: 000000000000000000 R08: ffff9abfffee3cb8 R09: 00 000000000002e1 [141.088009] R10: ffffb9094cb73d90 R11: 00000000000f4240 R12: ffff9abfffee8700 [ 141.088009] R13: 00000000000000000 R14: ffff9abfdb1f04a0 R15: ffff9abfdb1f04a8 [ 141.088009] FS: 0000000000000000(0000) GS:ffff9abfffec0000(0000) knlGS:0000000000000000 [ 141.088009] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 141.088009] CR2: ffffffffc09b3a30 CR3: 0000008fe4c0a001 CR4: 00000000007606e0 [ 141.088009] DR0: 00000000000000 00 DR1: 0000000000000000 DR2: 00000000000000000 [ 141.088009] DR3: 0000000000000000 DR6: 00000000ffe0ff0 DR7: 0000000000000400 [ 141.088009] PKRU: 55555554 [ 141.088009] Llamar Seguimiento: [141.088009]? proceso_one_work+0x195/0x390 [141.088009]? hilo_trabajador+0x30/0x390 [141.088009]? proceso_one_work+0x390/0x390 [141.088009]? kthread+0x10d/0x130 [141.088009]? kthread_flush_work_fn+0x10/0x10 [141.088009]? ret_from_fork+0x35/0x40] ERROR: no se puede manejar la solicitud de paginaci\u00f3n del kernel en ffffffffc0b28a5a [200.223240] PGD 97fe00d067 P4D 97fe00d067 PUD 97fe00f067 PMD a580cbf067 PTE 0 [200.223464] Vaya : 0010 [#1] SMP NOPTI [ 200.223579] CPU: 63 PID: 664 Comm: kworker/63:1 Kdump: cargado No contaminado 4.18.0.x86_64 #46 [200.224008] Cola de trabajo: eventos 0xffffffffc0b28a40 [200.224008] RIP: 0010:0xffffffffc0b28a5a [200.224008] C\u00f3digo: RIP incorrecto valor. [ 200.224008] RSP: 0018:ffffbf3c8e2a3e88 EFLAGS: 00010246 [ 200.224008] RAX: 00000000000000000 RBX: ffffa0799ad6bca0 RCX: 0000000000000000 [ 200 .224008] RDX: 0000000000000000 RSI: 00000000000000246 RDI: 0000000000000246 [ 200.224008] RBP: 00000000000000000 R08: ffff9fe43fde3cb8 R09: 00 000000000000d5 [200.224008] R10: fffffbf3c8cb53d90 R11: 00000000000f4240 R12: ffff9fe43fde8700 [ 200.224008] R13: 00000000000000000 R14: ffffa0799ad6bca0 R15: ffffa0799ad6bca8 [ 200.224008] FS: 0000000000000000(0000) GS:ffff9fe43fdc0000(0000) knlGS:00000000000000000 [ 200.224008] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 200.224008] CR2: ffffffffc0b28a30 CR3: 00000097fe00a002 CR4: 00000000007606e0 [ 200.224008] DR0: 00000000000000 00 DR1: 0000000000000000 DR2: 00000000000000000 [ 200.224008] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 200.224008] PKRU: 55555554 [ 200.224008] Llamar Seguimiento: [200.224008] ? proceso_one_work+0x195/0x390 [200.224008]? hilo_trabajador+0x30/0x390 [200.224008]? proceso_one_work+0x390/0x390 [200.224008]? kthread+0x10d/0x130 [200.224008]? kthread_flush_work_fn+0x10/0x10 [200.224008]? ret_from_fork+0x35/0x40 [200.224008] Notificaci\u00f3n de falla del kernel (0x1) que comienza en la CPU 63 [200.224008] Notificaci\u00f3n de falla del kernel (0x1) finalizada en la CPU 63 [200.224008] CR2: ffffffffc0b28a5a [200.224008] ---[ end trace c82a41 2d93f57412 ]-- - El motivo es el siguiente: T1: rmmod ipmi_si. ->ipmi_unregister_smi() -> ipmi_bmc_unregister() -> __ipmi_bmc_unregister() -> kref_put(&bmc->usecount, cleanup_bmc_device); -> programar_trabajo(&bmc->remove_work); T2: rmmod ipmi_msghandl" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.223", + "matchCriteriaId": "5C88C05D-FA25-4086-A781-7092BAF56D64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.169", + "matchCriteriaId": "BDD2EE60-3484-4845-AC26-6AB31C278192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.89", + "matchCriteriaId": "2A2152BA-053D-4847-B29B-68F543546AB3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.12", + "matchCriteriaId": "732BA914-7B3B-43CD-857F-8119106F6F71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*", + "matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*", + "matchCriteriaId": "A73429BA-C2D9-4D0C-A75F-06A1CA8B3983" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F621B5E3-E99D-49E7-90B9-EC3B77C95383" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*", + "matchCriteriaId": "F7BFDCAA-1650-49AA-8462-407DD593F94F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*", + "matchCriteriaId": "6EC9882F-866D-4ACB-8FBC-213D8D8436C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8A0915FE-A4AA-4C94-B783-CF29D81E7E54" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47101.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47101.json index 775a7929a04..d60c4bddc74 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47101.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47101.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47101", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-04T18:15:08.450", - "lastModified": "2024-11-21T06:35:24.037", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:02:18.480", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,119 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: asix: corrige el valor uninit en asix_mdio_read() asix_read_cmd() puede leer menos que sizeof(smsr) bytes y en este caso smsr no estar\u00e1 inicializado. Registro de errores: ERROR: KMSAN: valor uninit en asix_check_host_enable drivers/net/usb/asix_common.c:82 [en l\u00ednea] ERROR: KMSAN: valor uninit en asix_check_host_enable drivers/net/usb/asix_common.c:82 controladores [en l\u00ednea] /net/usb/asix_common.c:497 ERROR: KMSAN: valor uninit en asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497 asix_check_host_enable drivers/net/ usb/asix_common.c:82 [en l\u00ednea] controladores asix_check_host_enable/net/usb/asix_common.c:82 [en l\u00ednea] controladores/net/usb/asix_common.c:497 controladores asix_mdio_read+0x3c1/0xb00/net/usb/asix_common.c :497 controladores/net/usb/asix_common.c:497" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.9", + "versionEndExcluding": "5.15.12", + "matchCriteriaId": "9C86D33C-E1B6-41AB-BEF8-29F8D745A138" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*", + "matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*", + "matchCriteriaId": "A73429BA-C2D9-4D0C-A75F-06A1CA8B3983" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*", + "matchCriteriaId": "F621B5E3-E99D-49E7-90B9-EC3B77C95383" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*", + "matchCriteriaId": "F7BFDCAA-1650-49AA-8462-407DD593F94F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*", + "matchCriteriaId": "6EC9882F-866D-4ACB-8FBC-213D8D8436C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8A0915FE-A4AA-4C94-B783-CF29D81E7E54" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/8035b1a2a37a29d8c717ef84fca8fe7278bc9f03", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d259f621c85949f30cc578cac813b82bb5169f56", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8035b1a2a37a29d8c717ef84fca8fe7278bc9f03", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d259f621c85949f30cc578cac813b82bb5169f56", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-22xx/CVE-2022-2294.json b/CVE-2022/CVE-2022-22xx/CVE-2022-2294.json index 982429ff34b..fa6e41a186b 100644 --- a/CVE-2022/CVE-2022-22xx/CVE-2022-2294.json +++ b/CVE-2022/CVE-2022-22xx/CVE-2022-2294.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2294", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-07-28T02:15:07.797", - "lastModified": "2024-11-21T07:00:42.523", + "lastModified": "2025-02-03T14:15:33.053", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-30xx/CVE-2022-3075.json b/CVE-2022/CVE-2022-30xx/CVE-2022-3075.json index a06dadcc2b6..1ee650e78dc 100644 --- a/CVE-2022/CVE-2022-30xx/CVE-2022-3075.json +++ b/CVE-2022/CVE-2022-30xx/CVE-2022-3075.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3075", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-09-26T16:15:13.463", - "lastModified": "2024-11-21T07:18:46.293", + "lastModified": "2025-02-03T14:15:33.320", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-37xx/CVE-2022-3723.json b/CVE-2022/CVE-2022-37xx/CVE-2022-3723.json index 66e60b84d49..1d8b4a87287 100644 --- a/CVE-2022/CVE-2022-37xx/CVE-2022-3723.json +++ b/CVE-2022/CVE-2022-37xx/CVE-2022-3723.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3723", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-11-01T23:15:19.710", - "lastModified": "2024-11-21T07:20:06.520", + "lastModified": "2025-02-03T14:15:33.637", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-41xx/CVE-2022-4135.json b/CVE-2022/CVE-2022-41xx/CVE-2022-4135.json index 132aedda953..df181c346db 100644 --- a/CVE-2022/CVE-2022-41xx/CVE-2022-4135.json +++ b/CVE-2022/CVE-2022-41xx/CVE-2022-4135.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4135", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-11-25T01:15:09.957", - "lastModified": "2024-11-21T07:34:38.600", + "lastModified": "2025-02-03T14:15:33.897", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48630.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48630.json index 79acdcb210f..33a1ab5d269 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48630.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48630.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48630", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-05T12:15:45.780", - "lastModified": "2024-11-21T07:33:38.930", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:09:55.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,55 +15,213 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: crypto: qcom-rng: corrige el bucle infinito en solicitudes que no sean m\u00faltiples de WORD_SZ. El commit a la que se hace referencia en la etiqueta Fixes elimin\u00f3 la 'ruptura' de la rama else en qcom_rng_read(), lo que provoc\u00f3 una bucle infinito siempre que 'max' no sea un m\u00faltiplo de WORD_SZ. Esto se puede reproducir, por ejemplo, ejecutando: kcapi-rng -b 67 >/dev/null Hay muchas formas de solucionar este problema sin volver a agregar el 'descanso', pero todas parecen m\u00e1s inc\u00f3modas que simplemente volver a agregarlo, as\u00ed que hazlo. Probado en una m\u00e1quina con procesador Qualcomm Amberwing." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.236", + "versionEndExcluding": "4.19.245", + "matchCriteriaId": "90CA0C29-659F-4285-B5C0-F4F9303CCA02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.187", + "versionEndExcluding": "5.4.196", + "matchCriteriaId": "EA59FE65-870A-4BF7-8624-F76F50276DD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.108", + "versionEndExcluding": "5.10.118", + "matchCriteriaId": "563451EB-38D3-4F95-81D0-5AE1AF7490E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.31", + "versionEndExcluding": "5.15.42", + "matchCriteriaId": "525F7F2B-3F39-4BF6-841B-313E80A92E89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.10", + "matchCriteriaId": "D634AA3E-A052-40C6-A749-5B2BE8652ABC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*", + "matchCriteriaId": "6AD94161-84BB-42E6-9882-4FC0C42E9FC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*", + "matchCriteriaId": "7AB06DDF-3C2B-416D-B448-E990D8FF67A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc3:*:*:*:*:*:*", + "matchCriteriaId": "EAE6C6C5-4D21-4C04-897C-70CBBB3D7B91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc4:*:*:*:*:*:*", + "matchCriteriaId": "DA5F085D-52F3-4EE2-8353-455D1A6FE073" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc5:*:*:*:*:*:*", + "matchCriteriaId": "D6EE5B78-0D83-4715-893C-ABD69B49E7FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc6:*:*:*:*:*:*", + "matchCriteriaId": "EE723F14-047B-4FCF-B109-E0542EDFB063" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc7:*:*:*:*:*:*", + "matchCriteriaId": "2FCFCE58-5118-4D05-864E-C82CF20EABE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc9:*:*:*:*:*:*", + "matchCriteriaId": "9C3E5BC9-613C-4362-BF02-153A5BBFFB2F" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/05d4d17475d8d094c519bb51658bc47899c175e3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/16287397ec5c08aa58db6acf7dbc55470d78087d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/233a3cc60e7a8fe0be8cf9934ae7b67ba25a866c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/71a89789552b7faf3ef27969b9bc783fa0df3550", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8a06f25f5941c145773204f2f7abef95b4ffb8ce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8be06f62b426801dba43ddf8893952a0e62ab6ae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/05d4d17475d8d094c519bb51658bc47899c175e3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/16287397ec5c08aa58db6acf7dbc55470d78087d", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/233a3cc60e7a8fe0be8cf9934ae7b67ba25a866c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/71a89789552b7faf3ef27969b9bc783fa0df3550", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8a06f25f5941c145773204f2f7abef95b4ffb8ce", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8be06f62b426801dba43ddf8893952a0e62ab6ae", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23715.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23715.json index 61b2859af1b..e9aa3d9993f 100644 --- a/CVE-2023/CVE-2023-237xx/CVE-2023-23715.json +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23715.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23715", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-09T13:15:20.390", - "lastModified": "2024-12-09T13:15:20.390", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-03T14:32:10.613", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ultimatemember:jobboardwp:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.2.2", + "matchCriteriaId": "B434A92A-AC23-4BF7-AEC2-B1E0C3839800" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/jobboardwp/vulnerability/wordpress-jobboardwp-job-board-listings-and-submissions-plugin-1-2-2-idor-leading-to-job-removal-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28204.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28204.json index 2acf57f8332..6f6e6dfbe4d 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28204.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28204.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28204", "sourceIdentifier": "product-security@apple.com", "published": "2023-06-23T18:15:11.333", - "lastModified": "2024-11-21T07:54:35.760", + "lastModified": "2025-02-03T14:15:34.167", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32373.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32373.json index fe3492f2156..d3406cb6b70 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32373.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32373.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32373", "sourceIdentifier": "product-security@apple.com", "published": "2023-06-23T18:15:12.007", - "lastModified": "2024-11-21T08:03:13.570", + "lastModified": "2025-02-03T14:15:34.500", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32434.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32434.json index f9cc4a7cbfe..20c93f7e5fb 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32434.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32434.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32434", "sourceIdentifier": "product-security@apple.com", "published": "2023-06-23T18:15:13.720", - "lastModified": "2025-01-23T16:53:39.523", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-03T14:15:34.723", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32439.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32439.json index 810a4558726..b2026a58eae 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32439.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32439.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32439", "sourceIdentifier": "product-security@apple.com", "published": "2023-06-23T18:15:13.813", - "lastModified": "2025-01-23T16:36:05.110", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-03T14:15:34.930", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ @@ -183,6 +213,7 @@ "url": "https://support.apple.com/en-us/HT213811", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Release Notes", "Vendor Advisory" ] }, @@ -190,6 +221,7 @@ "url": "https://support.apple.com/en-us/HT213813", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Release Notes", "Vendor Advisory" ] }, @@ -197,6 +229,7 @@ "url": "https://support.apple.com/en-us/HT213814", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Release Notes", "Vendor Advisory" ] }, @@ -204,6 +237,7 @@ "url": "https://support.apple.com/en-us/HT213816", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Release Notes", "Vendor Advisory" ] }, diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37450.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37450.json index 25b019c1866..aaa2c33e28a 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37450.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37450.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37450", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-27T00:15:15.497", - "lastModified": "2025-01-23T16:36:38.280", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-03T14:15:35.167", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41064.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41064.json index 53188562d5d..d291604a276 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41064.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41064.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41064", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-07T18:15:07.727", - "lastModified": "2024-11-29T14:30:06.457", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-03T14:15:35.367", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41990.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41990.json index a1990f64988..856b68b4a2f 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41990.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41990.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41990", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-12T00:15:09.463", - "lastModified": "2024-11-29T14:39:00.893", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-03T14:15:35.587", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41991.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41991.json index e8bb3a50115..908ce0125d1 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41991.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41991.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41991", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-21T19:15:11.283", - "lastModified": "2024-11-29T14:41:00.430", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-03T14:15:35.770", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-295" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41992.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41992.json index 0e33fcdcc8c..74c3fa36a32 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41992.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41992.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41992", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-21T19:15:11.520", - "lastModified": "2024-11-29T14:41:50.523", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-03T14:15:35.983", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-754" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42234.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42234.json index dc7579df734..c307407b88d 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42234.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42234.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42234", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-13T22:15:11.593", - "lastModified": "2025-01-13T22:15:11.593", + "lastModified": "2025-02-03T14:15:36.287", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 es vulnerable a Cross Site Request Forgery (CSRF) a trav\u00e9s de la funci\u00f3n WSCView." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md", diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42824.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42824.json index b788149c373..944f847dd54 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42824.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42824.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42824", "sourceIdentifier": "product-security@apple.com", "published": "2023-10-04T19:15:10.490", - "lastModified": "2024-11-29T14:58:56.110", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-03T14:15:36.527", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42917.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42917.json index 0359a76fe02..466c154f672 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42917.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42917.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42917", "sourceIdentifier": "product-security@apple.com", "published": "2023-11-30T23:15:07.280", - "lastModified": "2025-01-23T16:37:02.693", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-03T14:15:36.743", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ @@ -443,7 +473,8 @@ "url": "https://www.debian.org/security/2023/dsa-5575", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mailing List" + "Mailing List", + "Third Party Advisory" ] } ] diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json index 4c8b1ca416e..6b129bcf99d 100644 --- a/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4863.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4863", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-09-12T15:15:24.327", - "lastModified": "2024-12-20T19:00:21.050", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-03T14:15:37.023", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ @@ -417,21 +447,24 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html", "source": "chrome-cve-admin@google.com", "tags": [ - "Mailing List" + "Mailing List", + "Third Party Advisory" ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html", "source": "chrome-cve-admin@google.com", "tags": [ - "Mailing List" + "Mailing List", + "Third Party Advisory" ] }, { "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html", "source": "chrome-cve-admin@google.com", "tags": [ - "Mailing List" + "Mailing List", + "Third Party Advisory" ] }, { @@ -575,6 +608,7 @@ "url": "https://www.debian.org/security/2023/dsa-5498", "source": "chrome-cve-admin@google.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, @@ -820,7 +854,8 @@ "url": "https://news.ycombinator.com/item?id=37478403", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Exploit" + "Exploit", + "Third Party Advisory" ] }, { @@ -899,7 +934,8 @@ "url": "https://www.debian.org/security/2023/dsa-5498", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mailing List" + "Mailing List", + "Third Party Advisory" ] }, { diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52583.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52583.json index 505a4029e33..e31aa6e89c1 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52583.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52583.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52583", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-06T07:15:06.553", - "lastModified": "2024-11-21T08:40:07.307", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:18:13.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,79 +15,243 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ceph: corrige el punto muerto o el c\u00f3digo muerto por uso incorrecto de dget() El orden de bloqueo es incorrecto entre denty y su padre, siempre debemos asegurarnos de que el padre obtenga el bloqueo primero. Pero dado que este c\u00f3digo muerto nunca se usa y el directorio principal siempre ser\u00e1 configurado por quienes llaman, simplemente elimin\u00e9moslo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.19.307", + "matchCriteriaId": "4B4E1A83-9957-4265-94C0-516374C8CCFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.269", + "matchCriteriaId": "319545F3-D56C-4751-BEBF-0505478BBAE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.210", + "matchCriteriaId": "F5CB4CA6-A9A0-4AFD-9102-8CF94D708170" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.149", + "matchCriteriaId": "0D0465BB-4053-4E15-9137-6696EBAE90FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.77", + "matchCriteriaId": "0FA28946-970D-4F4D-B759-4E77B28809B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.16", + "matchCriteriaId": "A5007D6A-4B58-423A-8A3A-A1A656A263C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.4", + "matchCriteriaId": "848BC44C-9D25-4557-A50A-4B8BF310FA78" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/196b87e5c00ce021e164a5de0f0d04f4116a9160", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6ab4fd508fad942f1f1ba940492f2735e078e980", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/76cb2aa3421fee4fde706dec41b1344bc0a9ad67", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7f2649c94264d00df6b6ac27161e9f4372a3450e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a9c15d6e8aee074fae66c04d114f20b84274fcca", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b493ad718b1f0357394d2cdecbf00a44a36fa085", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e016e358461b89b231626fcf78c5c38e35c44fd3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/196b87e5c00ce021e164a5de0f0d04f4116a9160", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6ab4fd508fad942f1f1ba940492f2735e078e980", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/76cb2aa3421fee4fde706dec41b1344bc0a9ad67", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7f2649c94264d00df6b6ac27161e9f4372a3450e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a9c15d6e8aee074fae66c04d114f20b84274fcca", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b493ad718b1f0357394d2cdecbf00a44a36fa085", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e016e358461b89b231626fcf78c5c38e35c44fd3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5217.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5217.json index afb8a42d084..5e5d666adf4 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5217.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5217.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5217", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-09-28T16:15:10.980", - "lastModified": "2024-12-20T19:01:23.347", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-03T14:15:37.370", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6345.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6345.json index 8022e4ef505..27dcd91dafd 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6345.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6345.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6345", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-11-29T12:15:07.077", - "lastModified": "2024-12-20T19:00:58.223", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-03T14:15:37.710", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7024.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7024.json index c82cd4d5470..ce8f9634c35 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7024.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7024.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7024", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-12-21T23:15:11.213", - "lastModified": "2024-12-20T19:01:40.967", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-03T14:15:37.920", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-114xx/CVE-2024-11420.json b/CVE-2024/CVE-2024-114xx/CVE-2024-11420.json index 34497ad0a05..64dc48e6c37 100644 --- a/CVE-2024/CVE-2024-114xx/CVE-2024-11420.json +++ b/CVE-2024/CVE-2024-114xx/CVE-2024-11420.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11420", "sourceIdentifier": "security@wordfence.com", "published": "2024-12-05T10:31:39.750", - "lastModified": "2024-12-05T10:31:39.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-03T14:39:02.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:creativethemes:blocksy:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.78", + "matchCriteriaId": "18E3F328-4F1D-446D-A87B-5E1860094BF3" + } + ] + } + ] + } + ], "references": [ { "url": "https://themes.trac.wordpress.org/changeset/249744/blocksy/2.0.78/inc/components/contacts-box.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/02ad47d5-f011-4e0a-af29-088852d1e886?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json index 335589307b7..36201dd4f36 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23222.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23222", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-23T01:15:11.500", - "lastModified": "2024-11-29T15:05:53.577", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-03T14:15:38.223", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26654.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26654.json index ee01fd3c664..591721f6591 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26654.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26654.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26654", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-01T09:15:51.063", - "lastModified": "2024-11-21T09:02:46.457", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:32:27.763", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,83 +15,263 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: sh: aica: reordenar operaciones de limpieza para evitar errores UAF. El dreamcastcard->timer podr\u00eda programar el spu_dma_work y el spu_dma_work tambi\u00e9n podr\u00eda armar el dreamcastcard->timer. Cuando se cierre snd_pcm_substream, se desasignar\u00e1 aica_channel. Pero a\u00fan se podr\u00eda eliminar la referencia en el hilo del trabajador. La raz\u00f3n es que del_timer() regresar\u00e1 directamente independientemente de si el controlador del temporizador se est\u00e1 ejecutando o no y el trabajador podr\u00eda reprogramarse en el controlador del temporizador. Como resultado, se producir\u00e1 el error UAF. La situaci\u00f3n picante se muestra a continuaci\u00f3n: (Thread 1) | (Thread 2) snd_aicapcm_pcm_close() | ... | run_spu_dma() //worker | mod_timer() flush_work() | del_timer() | aica_period_elapsed() //timer kfree(dreamcastcard->channel) | schedule_work() | run_spu_dma() //worker ... | dreamcastcard->channel-> //USE Para mitigar este error y otros posibles casos extremos, llame a mod_timer() condicionalmente en run_spu_dma(), luego implemente la operaci\u00f3n PCM sync_stop para cancelar tanto el temporizador como el trabajador. La operaci\u00f3n sync_stop se llamar\u00e1 desde el n\u00facleo PCM de forma adecuada cuando sea necesario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.23", + "versionEndExcluding": "4.19.312", + "matchCriteriaId": "5FCC9944-2B27-4800-9B5A-6C9508FEAA0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.274", + "matchCriteriaId": "F45A0F3C-C16D-49C4-86D6-D021C3D4B834" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.215", + "matchCriteriaId": "9CD5894E-58E9-4B4A-B0F4-3E6BC134B8F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.154", + "matchCriteriaId": "577E212E-7E95-4A71-9B5C-F1D1A3AFFF46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.84", + "matchCriteriaId": "834D9BD5-42A6-4D74-979E-4D6D93F630FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.24", + "matchCriteriaId": "8018C1D0-0A5F-48D0-BC72-A2B33FDDA693" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.7.12", + "matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.8.3", + "matchCriteriaId": "4C59BBC3-6495-4A77-9C82-55EC7CDF5E02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", + "matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/051e0840ffa8ab25554d6b14b62c9ab9e4901457", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3c907bf56905de7d27b329afaf59c2fb35d17b04", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4206ad65a0ee76920041a755bd3c17c6ba59bba2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/61d4787692c1fccdc268ffa7a891f9c149f50901", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8c990221681688da34295d6d76cc2f5b963e83f5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9d66ae0e7bb78b54e1e0525456c6b54e1d132046", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aa39e6878f61f50892ee2dd9d2176f72020be845", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e955e8a7f38a856fc6534ba4e6bffd4d5cc80ac3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eeb2a2ca0b8de7e1c66afaf719529154e7dc60b2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/051e0840ffa8ab25554d6b14b62c9ab9e4901457", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3c907bf56905de7d27b329afaf59c2fb35d17b04", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4206ad65a0ee76920041a755bd3c17c6ba59bba2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/61d4787692c1fccdc268ffa7a891f9c149f50901", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8c990221681688da34295d6d76cc2f5b963e83f5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9d66ae0e7bb78b54e1e0525456c6b54e1d132046", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aa39e6878f61f50892ee2dd9d2176f72020be845", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e955e8a7f38a856fc6534ba4e6bffd4d5cc80ac3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/eeb2a2ca0b8de7e1c66afaf719529154e7dc60b2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28973.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28973.json index 5e45b8450cb..db044a4febd 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28973.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28973.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28973", "sourceIdentifier": "security_alert@emc.com", "published": "2024-06-26T03:15:09.640", - "lastModified": "2024-11-21T09:07:18.133", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:59:08.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -51,14 +71,109 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:data_domain_operating_system:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0", + "versionEndIncluding": "7.13", + "matchCriteriaId": "51B3D8A3-950B-4D4E-9E4D-7D1ADE791C93" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:dd9410:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F820D2BB-4773-4B2F-BC50-9474B44DB8F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:dd9910:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84F58819-777E-43C1-B1EA-FFD7CDF79234" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:data_domain_operating_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.16.0.0", + "matchCriteriaId": "D655A40E-7358-4E29-BDC6-8CC2E8BA1D63" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:dm5500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B15806F-F6F1-4B26-921C-FE7620B3539F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37052.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37052.json index 5681e29f700..ee9e4e260c2 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37052.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37052.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37052", "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", "published": "2024-06-04T12:15:10.413", - "lastModified": "2024-11-21T09:23:06.550", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:35:02.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,52 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.1.0", + "matchCriteriaId": "13C996BA-41B9-44D0-8E47-B21DD510FAAA" + } + ] + } + ] } ], "references": [ { "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", - "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37053.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37053.json index 8fb5613b850..0f12380d85d 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37053.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37053.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37053", "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", "published": "2024-06-04T12:15:10.957", - "lastModified": "2024-11-21T09:23:06.690", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:35:07.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,52 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.1.0", + "matchCriteriaId": "13C996BA-41B9-44D0-8E47-B21DD510FAAA" + } + ] + } + ] } ], "references": [ { "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", - "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37054.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37054.json index 26b03dfb77a..bd3ac6add76 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37054.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37054.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37054", "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", "published": "2024-06-04T12:15:11.190", - "lastModified": "2024-11-21T09:23:06.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:40:37.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,52 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.9.0", + "matchCriteriaId": "E10BF8AE-F58F-44F2-9BDB-B74DD0B9F651" + } + ] + } + ] } ], "references": [ { "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", - "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37055.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37055.json index b344edb469c..8583d070aa6 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37055.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37055.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37055", "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", "published": "2024-06-04T12:15:11.397", - "lastModified": "2024-11-21T09:23:06.957", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:44:39.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,52 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.24.0", + "matchCriteriaId": "775B6F3C-5DCE-4A7D-AA00-F48D1E2D7BBB" + } + ] + } + ] } ], "references": [ { "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", - "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37056.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37056.json index 3e0abd11fa3..7c66d5c5ffe 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37056.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37056.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37056", "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", "published": "2024-06-04T12:15:11.593", - "lastModified": "2024-11-21T09:23:07.080", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:45:07.183", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,52 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.23.0", + "matchCriteriaId": "E256784A-86A3-4D97-9C4E-6964FBCD0B70" + } + ] + } + ] } ], "references": [ { "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", - "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37057.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37057.json index af2e6add7f7..5bfbdba62c3 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37057.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37057.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37057", "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", "published": "2024-06-04T12:15:11.800", - "lastModified": "2024-11-21T09:23:07.260", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:45:23.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,52 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "matchCriteriaId": "E9F5521A-2CCF-4B25-926F-DE7660BF7741" + } + ] + } + ] } ], "references": [ { "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", - "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37058.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37058.json index 529f255f1e9..072178f34a2 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37058.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37058.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37058", "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", "published": "2024-06-04T12:15:12.023", - "lastModified": "2024-11-21T09:23:07.470", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:46:16.247", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,52 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.5.0", + "matchCriteriaId": "0D1D1BBC-51F8-4197-9CA0-22EBE4AE9AA1" + } + ] + } + ] } ], "references": [ { "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", - "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37059.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37059.json index 6832ba86b0f..9723c1af8fb 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37059.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37059.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37059", "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", "published": "2024-06-04T12:15:12.227", - "lastModified": "2024-11-21T09:23:07.600", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:46:23.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,52 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.5.0", + "matchCriteriaId": "133E0FDE-6C06-4CEE-A7B0-11A4E4980846" + } + ] + } + ] } ], "references": [ { "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", - "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37060.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37060.json index cbf5c8f2264..1af61f6b0db 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37060.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37060.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37060", "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", "published": "2024-06-04T12:15:12.463", - "lastModified": "2024-11-21T09:23:07.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:46:31.613", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,52 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.27.0", + "matchCriteriaId": "4241DDBF-AB24-44C5-B4D4-8E5655ABB0B6" + } + ] + } + ] } ], "references": [ { "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", - "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37061.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37061.json index 8590e021915..f5a5aa60cdf 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37061.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37061.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37061", "sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", "published": "2024-06-04T12:15:12.703", - "lastModified": "2024-11-21T09:23:07.847", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:48:37.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,52 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.11.0", + "matchCriteriaId": "0F94208E-BA82-4716-A308-9DF1B8751069" + } + ] + } + ] } ], "references": [ { "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", - "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c" + "source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42422.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42422.json index aeda98633fb..45d5981ecb2 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42422.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42422.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42422", "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-03T13:15:04.987", - "lastModified": "2024-12-03T13:15:04.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:40:15.143", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -51,10 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:networker:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.10.0.6", + "matchCriteriaId": "124F9A33-D975-45CC-B2D7-DA3D06BD1DA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:networker:*:*:*:*:*:*:*:*", + "versionStartIncluding": "19.11", + "versionEndExcluding": "19.11.0.3", + "matchCriteriaId": "B40F40DF-55D2-4738-8DBA-E01689612A33" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000255892/dsa-2024-478-security-update-for-dell-networker-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47476.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47476.json index 8dee8879d90..fede9dccba4 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47476.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47476.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47476", "sourceIdentifier": "security_alert@emc.com", "published": "2024-12-03T10:15:05.883", - "lastModified": "2024-12-03T10:15:05.883", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:48:29.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:networker_management_console:8.0.22:*:*:*:*:*:*:*", + "matchCriteriaId": "50351F3C-674A-4812-83D8-884A80CD49C7" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000255884/dsa-2024-477-security-update-for-dell-networker-runtime-environment-nre-multiple-component-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53802.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53802.json index d57d04fb980..bc0e746b5cc 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53802.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53802.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53802", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-06T14:15:22.430", - "lastModified": "2024-12-06T14:15:22.430", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-03T14:36:22.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:futuriowp:futurio_extra:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.15", + "matchCriteriaId": "C435AFFB-6813-4B0A-B961-B5AB6D10C93F" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/futurio-extra/vulnerability/wordpress-futurio-extra-plugin-2-0-14-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53816.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53816.json index 1a92e8c71bd..12f50770d80 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53816.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53816.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53816", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-09T13:15:41.060", - "lastModified": "2024-12-09T13:15:41.060", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-03T14:12:47.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themeum:tutor_lms_elementor_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.6", + "matchCriteriaId": "21A4EC5C-7679-4408-AD79-C9681D9501C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/tutor-lms-elementor-addons/vulnerability/wordpress-tutor-lms-elementor-addons-plugin-2-1-5-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-542xx/CVE-2024-54212.json b/CVE-2024/CVE-2024-542xx/CVE-2024-54212.json index bdc25984539..37786f2bd04 100644 --- a/CVE-2024/CVE-2024-542xx/CVE-2024-54212.json +++ b/CVE-2024/CVE-2024-542xx/CVE-2024-54212.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54212", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-06T14:15:26.223", - "lastModified": "2024-12-06T14:15:26.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-03T14:33:05.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpthemespace:magical_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.2.6", + "matchCriteriaId": "4AC655FD-47A4-45F6-9DA1-E2DEFE77FDE3" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/magical-addons-for-elementor/vulnerability/wordpress-magical-addons-for-elementor-plugin-1-2-6-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57522.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57522.json new file mode 100644 index 00000000000..def2aa5e6a8 --- /dev/null +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57522.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-57522", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-03T13:15:21.660", + "lastModified": "2025-02-03T13:15:21.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SourceCodester Packers and Movers Management System v1.0 is vulnerable to Cross Site Scripting (XSS) in Users.php. An attacker can inject a malicious script into the username or name field during user creation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/HackWidMaddy/CVE-2024-57522", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57798.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57798.json index eb5c8e0366c..081de5fe2a1 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57798.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57798.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57798", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:29.743", - "lastModified": "2025-01-11T13:15:29.743", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:53:23.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,111 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/dp_mst: garantizar que el puntero mst_primary sea v\u00e1lido en drm_dp_mst_handle_up_req() Al recibir un mensaje de solicitud de activaci\u00f3n de MST de un hilo en drm_dp_mst_handle_up_req(), la topolog\u00eda de MST podr\u00eda eliminarse de otro hilo mediante drm_dp_mst_topology_mgr_set_mst(false), liberando mst_primary y estableciendo drm_dp_mst_topology_mgr::mst_primary en NULL. Esto podr\u00eda conducir a una desreferencia/use after free de NULL de mst_primary en drm_dp_mst_handle_up_req(). Evite lo anterior manteniendo una referencia para mst_primary en drm_dp_mst_handle_up_req() mientras se usa. v2: Se soluciona el problema de liberar la solicitud si falla la obtenci\u00f3n de una referencia mst_primary." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + }, + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.1.123", + "matchCriteriaId": "23D99EE1-5930-489B-A260-CFCD6BE66A9B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.69", + "matchCriteriaId": "EF18E3CB-058C-4836-B36D-8073F1C09977" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.8", + "matchCriteriaId": "E79883DD-75BE-4DA9-B4EC-AC6DE63BD438" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/9735d40f5fde9970aa46e828ecc85c32571d58a2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ce55818b2d3a999f886af91679589e4644ff1dc8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e54b00086f7473dbda1a7d6fc47720ced157c6a8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f61b2e5e7821f868d6afc22382a66a30ee780ba0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57874.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57874.json index d41e88dc422..c010c79a40c 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57874.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57874.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57874", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T15:15:07.680", - "lastModified": "2025-01-11T15:15:07.680", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:55:54.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,136 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: ptrace: arreglo de SETREGSET parcial para NT_ARM_TAGGED_ADDR_CTRL Actualmente, tagged_addr_ctrl_set() no inicializa la variable temporal 'ctrl', y una llamada a SETREGSET con una longitud de cero la dejar\u00e1 sin inicializar. En consecuencia, tagged_addr_ctrl_set() consumir\u00e1 un valor arbitrario, lo que potencialmente filtrar\u00e1 hasta 64 bits de memoria de la pila del kernel. La lectura est\u00e1 limitada a una ranura espec\u00edfica en la pila, y el problema no proporciona un mecanismo de escritura. Como set_tagged_addr_ctrl() solo acepta valores donde los bits [63:4] sean cero y rechaza otros valores, un intento de SETREGSET parcial tendr\u00e1 \u00e9xito o fallar\u00e1 aleatoriamente dependiendo del valor del valor no inicializado, y la exposici\u00f3n es significativamente limitada. Solucione esto inicializando el valor temporal antes de copiar el conjunto de registros desde el espacio de usuario, como para otros conjuntos de registros (por ejemplo, NT_PRSTATUS, NT_PRFPREG, NT_ARM_SYSTEM_CALL). En el caso de una escritura de longitud cero, se conservar\u00e1 el valor existente de la direcci\u00f3n etiquetada ctrl. El conjunto de registros NT_ARM_TAGGED_ADDR_CTRL solo es visible en la vista user_aarch64_view utilizada por una tarea nativa de AArch64 para manipular otra tarea nativa de AArch64. Como get_tagged_addr_ctrl() solo devuelve un valor de error cuando se llama para una tarea de compatibilidad, tagged_addr_ctrl_get() y tagged_addr_ctrl_set() nunca deben observar un valor de error de get_tagged_addr_ctrl(). Agregue un WARN_ON_ONCE() a ambos para indicar que dicho error ser\u00eda inesperado y que la gesti\u00f3n de errores no falta en ninguno de los casos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10", + "versionEndExcluding": "5.10.231", + "matchCriteriaId": "99B1CA0C-8181-4898-83DA-D6AC222C2236" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.174", + "matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.120", + "matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.66", + "matchCriteriaId": "29A976AD-B9AB-4A95-9F08-7669F8847EB9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.5", + "matchCriteriaId": "9501D045-7A94-42CA-8B03-821BE94A65B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1152dd13845efde5554f80c7e1233bae1d26bd3e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1370cf3eb5495d70e00547598583a4cd45b40b99", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1c176f5155ee6161fee6f416b64aa50394d3f220", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/96035c0093db258975b8887676afe59a64c34a72", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/abd614bbfcee73247495bd9472da8f85ac83546e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ca62d90085f4af36de745883faab9f8a7cbb45d3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57877.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57877.json index cecc425f50c..dc7ae040a91 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57877.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57877.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57877", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T15:15:08.063", - "lastModified": "2025-01-11T15:15:08.063", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:57:09.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,80 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: ptrace: correcci\u00f3n de SETREGSET parcial para NT_ARM_POE Actualmente, poe_set() no inicializa la variable temporal 'ctrl', y una llamada a SETREGSET con una longitud de cero la dejar\u00e1 sin inicializar. En consecuencia, se volver\u00e1 a escribir un valor arbitrario en target->thread.por_el0, lo que podr\u00eda provocar una fuga de hasta 64 bits de memoria de la pila del kernel. La lectura est\u00e1 limitada a una ranura espec\u00edfica en la pila, y el problema no proporciona un mecanismo de escritura. Corrija esto inicializando el valor temporal antes de copiar el conjunto de registros desde el espacio de usuario, como para otros conjuntos de registros (por ejemplo, NT_PRSTATUS, NT_PRFPREG, NT_ARM_SYSTEM_CALL). En el caso de una escritura de longitud cero, se conservar\u00e1n los contenidos existentes de POR_EL1. Antes de este parche: | # ./poe-test | Intentando escribir NT_ARM_POE::por_el0 = 0x900d900d900d900d | SETREGSET(nt=0x40f, len=8) escribi\u00f3 8 bytes | | Intentando leer NT_ARM_POE::por_el0 | GETREGSET(nt=0x40f, len=8) ley\u00f3 8 bytes | Le\u00eddo NT_ARM_POE::por_el0 = 0x900d900d900d900d | | Intentando escribir NT_ARM_POE (longitud cero) | SETREGSET(nt=0x40f, len=0) escribi\u00f3 0 bytes | | Intentando leer NT_ARM_POE::por_el0 | GETREGSET(nt=0x40f, len=8) ley\u00f3 8 bytes | Leer NT_ARM_POE::por_el0 = 0xffff8000839c3d50 Despu\u00e9s de este parche: | # ./poe-test | Intentando escribir NT_ARM_POE::por_el0 = 0x900d900d900d900d | SETREGSET(nt=0x40f, len=8) escribi\u00f3 8 bytes | | Intentando leer NT_ARM_POE::por_el0 | GETREGSET(nt=0x40f, len=8) ley\u00f3 8 bytes | Leer NT_ARM_POE::por_el0 = 0x900d900d900d900d | | Intentando escribir NT_ARM_POE (longitud cero) | SETREGSET(nt=0x40f, len=0) escribi\u00f3 0 bytes | | Intentando leer NT_ARM_POE::por_el0 | GETREGSET(nt=0x40f, len=8) leer 8 bytes | Leer NT_ARM_POE::por_el0 = 0x900d900d900d900d" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.5", + "matchCriteriaId": "2AF25791-E5D9-498F-AEA3-261AE0D30C3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4105dd76bc8ad6529d47157ef0565cb84ca6676c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/594bfc4947c4fcabba1318d8384c61a29a6b89fb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-578xx/CVE-2024-57878.json b/CVE-2024/CVE-2024-578xx/CVE-2024-57878.json index 252b5c811d4..daf8bd96e13 100644 --- a/CVE-2024/CVE-2024-578xx/CVE-2024-57878.json +++ b/CVE-2024/CVE-2024-578xx/CVE-2024-57878.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57878", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T15:15:08.190", - "lastModified": "2025-01-11T15:15:08.190", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:58:14.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,80 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: ptrace: correcci\u00f3n de SETREGSET parcial para NT_ARM_FPMR Actualmente, fpmr_set() no inicializa la variable temporal 'fpmr', y una llamada a SETREGSET con una longitud de cero la dejar\u00e1 sin inicializar. En consecuencia, se volver\u00e1 a escribir un valor arbitrario en target->thread.uw.fpmr, lo que podr\u00eda provocar una p\u00e9rdida de hasta 64 bits de memoria de la pila del kernel. La lectura est\u00e1 limitada a una ranura espec\u00edfica en la pila, y el problema no proporciona un mecanismo de escritura. Corrija esto inicializando el valor temporal antes de copiar el conjunto de registros desde el espacio de usuario, como para otros conjuntos de registros (por ejemplo, NT_PRSTATUS, NT_PRFPREG, NT_ARM_SYSTEM_CALL). En el caso de una escritura de longitud cero, se conservar\u00e1n los contenidos existentes de FPMR. Antes de este parche: | # ./fpmr-test | Intentando escribir NT_ARM_FPMR::fpmr = 0x900d900d900d900d | SETREGSET(nt=0x40e, len=8) escribi\u00f3 8 bytes | | Intentando leer NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) ley\u00f3 8 bytes | Le\u00eddo NT_ARM_FPMR::fpmr = 0x900d900d900d900d | | Intentando escribir NT_ARM_FPMR (longitud cero) | SETREGSET(nt=0x40e, len=0) escribi\u00f3 0 bytes | | Intentando leer NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) ley\u00f3 8 bytes | Leer NT_ARM_FPMR::fpmr = 0xffff800083963d50 Despu\u00e9s de este parche: | # ./fpmr-test | Intentando escribir NT_ARM_FPMR::fpmr = 0x900d900d900d900d | SETREGSET(nt=0x40e, len=8) escribi\u00f3 8 bytes | | Intentando leer NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) ley\u00f3 8 bytes | Leer NT_ARM_FPMR::fpmr = 0x900d900d900d900d | | Intentando escribir NT_ARM_FPMR (longitud cero) | SETREGSET(nt=0x40e, len=0) escribi\u00f3 0 bytes | | Intentando leer NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) leer 8 bytes | Leer NT_ARM_FPMR::fpmr = 0x900d900d900d900d" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.12.5", + "matchCriteriaId": "EF8BDA69-3016-4248-8055-EA7662336040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/8ab73c34e3c5b580721696665eabd799346bc50b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f5d71291841aecfe5d8435da2dfa7f58ccd18bc8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57910.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57910.json index 5dd592dceb5..75ebc9c685f 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57910.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57910.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57910", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-19T12:15:25.187", - "lastModified": "2025-02-02T11:15:13.133", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:48:35.543", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,182 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: light: vcnl4035: corrige la fuga de informaci\u00f3n en el b\u00fafer activado La matriz local 'buffer' se utiliza para enviar datos al espacio de usuario desde un b\u00fafer activado, pero no establece un valor inicial para el elemento de datos \u00fanico, que es un u16 alineado a 8 bytes. Eso deja al menos 4 bytes sin inicializar incluso despu\u00e9s de escribir un valor entero con regmap_read(). Inicialice la matriz a cero antes de usarla para evitar enviar informaci\u00f3n no inicializada al espacio de usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.132", + "versionEndExcluding": "5.4.290", + "matchCriteriaId": "3B7B901A-B165-4F6D-A0E4-53E55844237B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.50", + "versionEndExcluding": "5.10.234", + "matchCriteriaId": "B1BC1525-2653-4F6D-A91A-BEC8BCEE91F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12.17", + "versionEndExcluding": "5.13", + "matchCriteriaId": "CDB1D52E-21AB-4ECE-9119-6594F8FF3B3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.13.2", + "versionEndExcluding": "5.15.177", + "matchCriteriaId": "5558918F-A82F-4284-B020-B0CC58BE951C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.125", + "matchCriteriaId": "9AFD566B-ECC6-46F1-92F7-12A615D5685F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.72", + "matchCriteriaId": "33E12097-C88A-45B4-9677-2A961A08DD3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.10", + "matchCriteriaId": "02D604F6-10D1-4F7B-A022-0888406A1121" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/13e56229fc81051a42731046e200493c4a7c28ff", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/47b43e53c0a0edf5578d5d12f5fc71c019649279", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/47d245be86492974db3aeb048609542167f56518", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a15ea87d4337479c9446b5d71616f4668337afed", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b0e9c11c762e4286732d80e66c08c2cb3157b06b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cb488706cdec0d6d13f2895bcdf0c32b283a7cc7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f6fb1c59776b4263634c472a5be8204c906ffc2c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57911.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57911.json index 4b9ddf9b979..ddceb0e6663 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57911.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57911.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57911", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-19T12:15:25.277", - "lastModified": "2025-02-02T11:15:13.363", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:51:30.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,175 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: dummy: iio_simply_dummy_buffer: corrige la fuga de informaci\u00f3n en el b\u00fafer activado La matriz 'data' se asigna a trav\u00e9s de kmalloc() y se utiliza para enviar datos al espacio del usuario desde un b\u00fafer activado, pero no establece valores para canales inactivos, ya que solo utiliza iio_for_each_active_channel() para asignar nuevos valores. Utilice kzalloc para la asignaci\u00f3n de memoria para evitar enviar informaci\u00f3n no inicializada al espacio del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "5.4.290", + "matchCriteriaId": "883EB1F5-86A8-4974-BB9F-ED2573E9796E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.234", + "matchCriteriaId": "F732162B-ED7E-4367-A5C2-B24FD9B0D33B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.177", + "matchCriteriaId": "71A3AFDC-A3CA-454F-8917-E998BBDE36F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.125", + "matchCriteriaId": "9AFD566B-ECC6-46F1-92F7-12A615D5685F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.72", + "matchCriteriaId": "33E12097-C88A-45B4-9677-2A961A08DD3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.10", + "matchCriteriaId": "02D604F6-10D1-4F7B-A022-0888406A1121" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/006073761888a632c5d6f93e47c41760fa627f77", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/03fa47621bf8fcbf5994c5716021527853f9af3d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/333be433ee908a53f283beb95585dfc14c8ffb46", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/74058395b2c63c8a438cf199d09094b640f8c7f4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b0642d9c871aea1f28eb02cd84d60434df594f67", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e1c1e8c05010103c9c9ea3e9c4304b0b7e2c8e4a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ea703cda36da0dacb9a2fd876370003197d8a019", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57934.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57934.json index 6dbfa884f7f..47bee404738 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57934.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57934.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57934", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-21T12:15:27.047", - "lastModified": "2025-01-21T12:15:27.047", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:52:40.740", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,100 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fgraph: Agregar READ_ONCE() al acceder a fgraph_array[] En __ftrace_return_to_handler(), un bucle itera sobre los elementos fgraph_array[], que son fgraph_ops. El bucle comprueba si un elemento es un fgraph_stub para evitar usar un fgraph_stub despu\u00e9s. Sin embargo, si el compilador vuelve a cargar fgraph_array[] despu\u00e9s de esta comprobaci\u00f3n, podr\u00eda competir con una actualizaci\u00f3n a fgraph_array[] que introduce un fgraph_stub. Esto podr\u00eda dar como resultado que se procese el stub, pero que este contenga un campo \"func_hash\" nulo, lo que lleva a una desreferencia de puntero NULL. Para garantizar que los gops comparados con fgraph_stub coincidan con los gops procesados ??m\u00e1s tarde, agregue un READ_ONCE(). Un parche similar aparece en el commit 63a8dfb (\"function_graph: Agregar READ_ONCE() al acceder a fgraph_array[]\")." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.12.9", + "matchCriteriaId": "4FB6342D-DEC7-4104-8674-8073B3B3BEE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/b68b2a3fbacc7be720ef589d489bcacdd05c6d38", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d65474033740ded0a4fe9a097fce72328655b41d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21634.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21634.json index c1d73136a7f..63a20b01a56 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21634.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21634.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21634", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-19T11:15:08.890", - "lastModified": "2025-01-19T11:15:08.890", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:42:29.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,105 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cgroup/cpuset: eliminar kernfs active break Se encontr\u00f3 una advertencia: ADVERTENCIA: CPU: 10 PID: 3486953 en fs/kernfs/file.c:828 CPU: 10 PID: 3486953 Comm: rmdir Kdump: cargado Tainted: G RIP: 0010:kernfs_should_drain_open_files+0x1a1/0x1b0 RSP: 0018:ffff8881107ef9e0 EFLAGS: 00010202 RAX: 0000000080000002 RBX: ffff888154738c00 RCX: dffffc0000000000 RDX: 00000000000000007 RSI: 0000000000000004 RDI: ffff888154738c04 RBP: ffff888154738c04 R08: ffffffffaf27fa15 R09: ffffed102a8e7180 R10: ffff888154738c07 R11: 0000000000000000 R12: ffff888154738c08 R13: ffff888750f8c000 R14: ffff888750f8c0e8 R15: ffff888154738ca0 FS: 00007f84cd0be740(0000) GS:ffff8887ddc00000(0000) knlGS:00000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555f9fbe00c8 CR3: 0000000153eec001 CR4: 0000000000370ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: GS:ffff8887ddc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555f9fbe00c8 CR3: 0000000153eec001 CR4: 0000000000370ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: kernfs_drain+0x15e/0x2f0 __kernfs_remove+0x165/0x300 kernfs_remove_by_name_ns+0x7b/0xc0 cgroup_rm_file+0x154/0x1c0 cgroup_addrm_files+0x1c2/0x1f0 css_clear_dir+0x77/0x110 kill_css+0x4c/0x1b0 cgroup_destroy_locked+0x194/0x380 cgroup_rmdir+0x2a/0x140 Se puede explicar por: rmdir echo 1 > cpuset.cpus kernfs_fop_write_iter // active=0 cgroup_rm_file kernfs_remove_by_name_ns kernfs_get_active // ??activo=1 __kernfs_remove // ??activo=0x80000002 kernfs_drain cpuset_write_resmask wait_event //esperando (activo == 0x80000001) kernfs_break_active_protection // activo = 0x80000001 // continuar kernfs_unbreak_active_protection // activo = 0x80000002 ... kernfs_should_drain_open_files // se produce una advertencia kernfs_put_active Esta advertencia es causada por 'kernfs_break_active_protection' cuando est\u00e1 escribiendo en cpuset.cpus y el cgroup se elimina simult\u00e1neamente. El commit 3a5a6d0c2b03 (\"cpuset: no anide cgroup_mutex dentro de get_online_cpus()\") hizo que cpuset_hotplug_workfn sea as\u00edncrono. Este cambio implica llamar a flush_work(), que puede crear una dependencia de bloqueo circular de m\u00faltiples procesos que involucran a cgroup_mutex, lo que puede llevar a un bloqueo. Para evitarlo, el commit 76bb5ab8f6e3 (\"cpuset: interrumpa la protecci\u00f3n activa de kernfs en cpuset_write_resmask()\") agreg\u00f3 'kernfs_break_active_protection' en cpuset_write_resmask. Esto podr\u00eda llevar a esta advertencia. Despu\u00e9s de el commit 2125c0034c5d (\"cgroup/cpuset: haga que el procesamiento de hotplug de cpuset sea sincr\u00f3nico\"), cpuset_write_resmask ya no necesita esperar a que finalice el hotplug, lo que significa que las operaciones de hotplug y cpuset concurrentes ya no son posibles. Por lo tanto, el bloqueo ya no existe y ya no es necesario \"interrumpir la protecci\u00f3n activa\". Para solucionar esta advertencia, simplemente elimine la operaci\u00f3n kernfs_break_active_protection en \"cpuset_write_resmask\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.16", + "versionEndExcluding": "6.12.10", + "matchCriteriaId": "8F9CB506-FF99-4655-9CE3-3F7E0FEC94A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/11cb1d643a74665a4e14749414f48f82cbc15c64", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3cb97a927fffe443e1e7e8eddbfebfdb062e86ed", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21652.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21652.json index ea4f9d47d6f..1445c42d7b6 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21652.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21652.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21652", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-19T11:15:10.830", - "lastModified": "2025-01-19T11:15:10.830", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-03T14:43:11.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,119 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipvlan: Se ha corregido el error use-after-free en ipvlan_get_iflink(). syzbot present\u00f3 un informe de error use-after-free [0] sobre ipvlan y linkwatch. ipvlan no contiene un refcnt del dispositivo inferior a diferencia de vlan y macvlan. Si se activa el trabajo de linkwatch para el dispositivo ipvlan dev, es posible que el dispositivo inferior ya se haya liberado, lo que da como resultado un UAF de ipvlan->phy_dev en ipvlan_get_iflink(). Podemos retrasar la anulaci\u00f3n del registro del dispositivo inferior como vlan y macvlan al retener el refcnt del dispositivo inferior en dev->netdev_ops->ndo_init() y liberarlo en dev->priv_destructor(). Jakub se\u00f1al\u00f3 que llamar a .ndo_XXX despu\u00e9s de que unregister_netdevice() haya regresado es propenso a errores y sugiri\u00f3 [1] abordar este UAF en el n\u00facleo llevando m\u00e1s all\u00e1 el commit 750e51603395 (\"net: evitar un UAF potencial en default_operstate()\"). Supongamos que se cancela el registro de dispositivos y usemos la protecci\u00f3n RCU en default_operstate() para no competir con la cancelaci\u00f3n del registro del dispositivo. [0]: ERROR: KASAN: slab-use-after-free in ipvlan_get_iflink+0x84/0x88 drivers/net/ipvlan/ipvlan_main.c:353 Read of size 4 at addr ffff0000d768c0e0 by task kworker/u8:35/6944 CPU: 0 UID: 0 PID: 6944 Comm: kworker/u8:35 Not tainted 6.13.0-rc2-g9bc5c9515b48 #12 4c3cb9e8b4565456f6a355f312ff91f4f29b3c47 Hardware name: linux,dummy-virt (DT) Workqueue: events_unbound linkwatch_event Call trace: show_stack+0x38/0x50 arch/arm64/kernel/stacktrace.c:484 (C) __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0xbc/0x108 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x16c/0x6f0 mm/kasan/report.c:489 kasan_report+0xc0/0x120 mm/kasan/report.c:602 __asan_report_load4_noabort+0x20/0x30 mm/kasan/report_generic.c:380 ipvlan_get_iflink+0x84/0x88 drivers/net/ipvlan/ipvlan_main.c:353 dev_get_iflink+0x7c/0xd8 net/core/dev.c:674 default_operstate net/core/link_watch.c:45 [inline] rfc2863_policy+0x144/0x360 net/core/link_watch.c:72 linkwatch_do_dev+0x60/0x228 net/core/link_watch.c:175 __linkwatch_run_queue+0x2f4/0x5b8 net/core/link_watch.c:239 linkwatch_event+0x64/0xa8 net/core/link_watch.c:282 process_one_work+0x700/0x1398 kernel/workqueue.c:3229 process_scheduled_works kernel/workqueue.c:3310 [inline] worker_thread+0x8c4/0xe10 kernel/workqueue.c:3391 kthread+0x2b0/0x360 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862 Allocated by task 9303: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x30/0x68 mm/kasan/common.c:68 kasan_save_alloc_info+0x44/0x58 mm/kasan/generic.c:568 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0x84/0xa0 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __do_kmalloc_node mm/slub.c:4283 [inline] __kmalloc_node_noprof+0x2a0/0x560 mm/slub.c:4289 __kvmalloc_node_noprof+0x9c/0x230 mm/util.c:650 alloc_netdev_mqs+0xb4/0x1118 net/core/dev.c:11209 rtnl_create_link+0x2b8/0xb60 net/core/rtnetlink.c:3595 rtnl_newlink_create+0x19c/0x868 net/core/rtnetlink.c:3771 __rtnl_newlink net/core/rtnetlink.c:3896 [inline] rtnl_newlink+0x122c/0x15c0 net/core/rtnetlink.c:4011 rtnetlink_rcv_msg+0x61c/0x918 net/core/rtnetlink.c:6901 netlink_rcv_skb+0x1dc/0x398 net/netlink/af_netlink.c:2542 rtnetlink_rcv+0x34/0x50 net/core/rtnetlink.c:6928 netlink_unicast_kernel net/netlink/af_netlink.c:1321 [inline] netlink_unicast+0x618/0x838 net/netlink/af_netlink.c:1347 netlink_sendmsg+0x5fc/0x8b0 net/netlink/af_netlink.c:1891 sock_sendmsg_nosec net/socket.c:711 [inline] __sock_sendmsg net/socket.c:726 [inline] __sys_sendto+0x2ec/0x438 net/socket.c:2197 __do_sys_sendto net/socket.c:2204 [inline] __se_sys_sendto net/socket.c:2200 [inline] __arm64_sys_sendto+0xe4/0x110 net/socket.c:2200 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x90/0x278 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x13c/0x250 arch/arm64/kernel/syscall.c:132 do_el0_svc+0x54/0x---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.72", + "matchCriteriaId": "33E12097-C88A-45B4-9677-2A961A08DD3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.12.10", + "matchCriteriaId": "02D604F6-10D1-4F7B-A022-0888406A1121" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", + "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", + "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", + "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", + "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*", + "matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/52a24538d569f48e79d1a169a5d359d384152950", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ba9f7c16ec879c83bb4f80406773a911aace8267", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cb358ff94154774d031159b018adf45e17673941", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 6eb201e5973..3e2e7236c8d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-03T13:00:34.856374+00:00 +2025-02-03T15:01:14.870455+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-03T11:15:09.807000+00:00 +2025-02-03T14:59:08.020000+00:00 ``` ### Last Data Feed Release @@ -33,21 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -279790 +279791 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `1` -- [CVE-2024-6790](CVE-2024/CVE-2024-67xx/CVE-2024-6790.json) (`2025-02-03T11:15:09.583`) -- [CVE-2025-0015](CVE-2025/CVE-2025-00xx/CVE-2025-0015.json) (`2025-02-03T11:15:09.807`) +- [CVE-2024-57522](CVE-2024/CVE-2024-575xx/CVE-2024-57522.json) (`2025-02-03T13:15:21.660`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `64` +- [CVE-2024-28973](CVE-2024/CVE-2024-289xx/CVE-2024-28973.json) (`2025-02-03T14:59:08.020`) +- [CVE-2024-37052](CVE-2024/CVE-2024-370xx/CVE-2024-37052.json) (`2025-02-03T14:35:02.407`) +- [CVE-2024-37053](CVE-2024/CVE-2024-370xx/CVE-2024-37053.json) (`2025-02-03T14:35:07.880`) +- [CVE-2024-37054](CVE-2024/CVE-2024-370xx/CVE-2024-37054.json) (`2025-02-03T14:40:37.527`) +- [CVE-2024-37055](CVE-2024/CVE-2024-370xx/CVE-2024-37055.json) (`2025-02-03T14:44:39.397`) +- [CVE-2024-37056](CVE-2024/CVE-2024-370xx/CVE-2024-37056.json) (`2025-02-03T14:45:07.183`) +- [CVE-2024-37057](CVE-2024/CVE-2024-370xx/CVE-2024-37057.json) (`2025-02-03T14:45:23.600`) +- [CVE-2024-37058](CVE-2024/CVE-2024-370xx/CVE-2024-37058.json) (`2025-02-03T14:46:16.247`) +- [CVE-2024-37059](CVE-2024/CVE-2024-370xx/CVE-2024-37059.json) (`2025-02-03T14:46:23.250`) +- [CVE-2024-37060](CVE-2024/CVE-2024-370xx/CVE-2024-37060.json) (`2025-02-03T14:46:31.613`) +- [CVE-2024-37061](CVE-2024/CVE-2024-370xx/CVE-2024-37061.json) (`2025-02-03T14:48:37.123`) +- [CVE-2024-42422](CVE-2024/CVE-2024-424xx/CVE-2024-42422.json) (`2025-02-03T14:40:15.143`) +- [CVE-2024-47476](CVE-2024/CVE-2024-474xx/CVE-2024-47476.json) (`2025-02-03T14:48:29.350`) +- [CVE-2024-53802](CVE-2024/CVE-2024-538xx/CVE-2024-53802.json) (`2025-02-03T14:36:22.700`) +- [CVE-2024-53816](CVE-2024/CVE-2024-538xx/CVE-2024-53816.json) (`2025-02-03T14:12:47.460`) +- [CVE-2024-54212](CVE-2024/CVE-2024-542xx/CVE-2024-54212.json) (`2025-02-03T14:33:05.887`) +- [CVE-2024-57798](CVE-2024/CVE-2024-577xx/CVE-2024-57798.json) (`2025-02-03T14:53:23.433`) +- [CVE-2024-57874](CVE-2024/CVE-2024-578xx/CVE-2024-57874.json) (`2025-02-03T14:55:54.650`) +- [CVE-2024-57877](CVE-2024/CVE-2024-578xx/CVE-2024-57877.json) (`2025-02-03T14:57:09.220`) +- [CVE-2024-57878](CVE-2024/CVE-2024-578xx/CVE-2024-57878.json) (`2025-02-03T14:58:14.423`) +- [CVE-2024-57910](CVE-2024/CVE-2024-579xx/CVE-2024-57910.json) (`2025-02-03T14:48:35.543`) +- [CVE-2024-57911](CVE-2024/CVE-2024-579xx/CVE-2024-57911.json) (`2025-02-03T14:51:30.527`) +- [CVE-2024-57934](CVE-2024/CVE-2024-579xx/CVE-2024-57934.json) (`2025-02-03T14:52:40.740`) +- [CVE-2025-21634](CVE-2025/CVE-2025-216xx/CVE-2025-21634.json) (`2025-02-03T14:42:29.407`) +- [CVE-2025-21652](CVE-2025/CVE-2025-216xx/CVE-2025-21652.json) (`2025-02-03T14:43:11.690`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 98f6bf2a58f..cf91477d74f 100644 --- a/_state.csv +++ b/_state.csv @@ -126961,7 +126961,7 @@ CVE-2018-9385,0,0,963ab87aab004413f51f225df7125c38dada01fc62280d1b6b2d796be35cbf CVE-2018-9386,0,0,00c05564d802b59f0ce740fae1821c18eb3e04be32703f1b88fcf171f14e151d,2024-12-19T16:51:52.097000 CVE-2018-9387,0,0,c51536796064d725fddbe49fd9acb541c6f56006847a3e07d695cf21efa26d09,2025-01-21T16:15:11.453000 CVE-2018-9388,0,0,cd8b1868b6c78b44a87a461eb158bc8cba5eaf7d4a400099563232fceb850761,2024-12-19T16:50:58.733000 -CVE-2018-9389,0,0,25d19c8d4c7512c3bfbe9c683cd33e500035511aa3b62b8f393031869c3958a8,2025-01-23T19:56:32.087000 +CVE-2018-9389,0,1,20920278b1e547ff812bdfff37df968de30686e74d7d699bbac3b697c00aec35,2025-02-03T14:15:29.937000 CVE-2018-9390,0,0,03e5cf7608f8573a4867237edfa1da4ca8706d51cc54b5a571dacd98cdeb3ef7,2024-12-19T16:49:41.540000 CVE-2018-9391,0,0,2f48dbaafd251d76bace45bec48a6a6822d89b365841aa01441c3d6fab74da2a,2024-12-19T17:18:26.910000 CVE-2018-9392,0,0,a81398da058e04a84675f2ceb5ca20dc8d733a048fb3efe395ac35f304b71a06,2024-12-19T17:26:04.070000 @@ -166421,7 +166421,7 @@ CVE-2021-1778,0,0,8b826b7ae2ae17b8b9901d1f612230aee30d0fc68a265ebf3396e3ceebf943 CVE-2021-1779,0,0,64bb89c45d76f13f2d9fd67f86b95e7c100b655c340943ae93bf17b44851a0c9,2024-11-21T05:45:05.733000 CVE-2021-1780,0,0,23e85a6351e1b98f470ccb20f8ae4ad7e1ecfb25beb2334c601960dad2a662bf,2024-11-21T05:45:05.857000 CVE-2021-1781,0,0,8c1ef084f5ffd81b1dfb865bf625ce113bbf8db4f404f5f4818a50fc994e667a,2024-11-21T05:45:05.980000 -CVE-2021-1782,0,0,f24c0233c9d02681212a2ebdce38ebfa33afbcfb929f6989d47245512c8b2945,2024-11-21T05:45:06.107000 +CVE-2021-1782,0,1,9640394dec9240447d322c0fcc8c8fa12032706c604a8d898340500829c44c28,2025-02-03T14:15:30.590000 CVE-2021-1783,0,0,a629262b9c76bc864d84116a8a9a03cf0ee6646c816a5b730a6fbd198836526b,2024-11-21T05:45:06.240000 CVE-2021-1784,0,0,5dbd3fae571e03fbab98f6009778ed0be04756e7c33fd360175bd60500fa009e,2024-11-21T05:45:06.360000 CVE-2021-1785,0,0,f5c50d287644a4824d77890a58b7c0971d824c705a80905719d22378d0b6b379,2024-11-21T05:45:06.473000 @@ -167737,7 +167737,7 @@ CVE-2021-21202,0,0,471b7d0d787cfffa21250f8bd478f6e476d149959988a8717520350ed7fd4 CVE-2021-21203,0,0,218adc562c6e49d7bf165167499a46e5543a4af64c93b7f5c5d4520b3d1db45f,2024-11-21T05:47:46.137000 CVE-2021-21204,0,0,0a648d8f437259cb65e9ad90616562b55243e5d07f9d174443b74c183d81c4cb,2024-11-21T05:47:46.257000 CVE-2021-21205,0,0,febfec423966af73fe8b0b37c6f9833685d55c371df93c67a09b622533b6ef1e,2024-11-21T05:47:46.380000 -CVE-2021-21206,0,0,18abf9f923f89fdadc88c05c854395dcc9b28b9e8dba0f5918f0161375ccb588,2024-11-21T05:47:46.503000 +CVE-2021-21206,0,1,88f6933096fbaf99b945867188020ce473210777b54dc981ff2d03d5ad4c5420,2025-02-03T14:15:30.827000 CVE-2021-21207,0,0,545fc2028da8605efbae548a15dcbb9bf08651badcaa65e625db2125548e5578,2024-11-21T05:47:46.630000 CVE-2021-21208,0,0,5d347a10448e3dfefce138c98513c366e108ce51d255b1e1dd172db3713e5c91,2024-11-21T05:47:46.757000 CVE-2021-21209,0,0,d2b6b7c79bbb943e8ca63cb8a1f44b39eff670b161199e470afe11710623e123,2024-11-21T05:47:46.873000 @@ -167753,7 +167753,7 @@ CVE-2021-21217,0,0,76c79b20fbab1811bfca64364a630c443188029148fa88c11a8085facd6db CVE-2021-21218,0,0,610a81457ac9c3abcdbfed91def2b55bdb3cbc737c9e01990725971968d7a245,2024-11-21T05:47:47.980000 CVE-2021-21219,0,0,8a18867b98692c6581e261687a36a4792c07d2f1012d3b5ae66228f416ebaf87,2024-11-21T05:47:48.100000 CVE-2021-2122,0,0,a6fc57845c28ebd568c913e99302c46a0d53939800340fb0e42da3c94712a133,2024-11-21T06:02:25.717000 -CVE-2021-21220,0,0,49d74d1abe99efbcf37a63517020282d3ff4eebbae1a14090d68262b5392db64,2024-11-21T05:47:48.220000 +CVE-2021-21220,0,1,1b8896c8883bb002768b00dead504fdef24dc2410879fc5c44d5516c864dd0d9,2025-02-03T14:15:31.120000 CVE-2021-21221,0,0,0f97c072b68a63a8f2a94c62bec998f3979115aacf0ee23236c7f970b0eb47e5,2024-11-21T05:47:48.343000 CVE-2021-21222,0,0,fb6430680f870d8f1fb279ef559fdf9061e1771737d1ee98954121e1a539bbab,2024-11-21T05:47:48.470000 CVE-2021-21223,0,0,6f94843742f0001c285a029388dd0456ac00ec872863f41c6e9df32fa8580212,2024-11-21T05:47:48.583000 @@ -174904,7 +174904,7 @@ CVE-2021-3053,0,0,eae8acbe007ccf0e2f87daa89a8834977fb3ccc6097404557aed22eba4ad8b CVE-2021-30530,0,0,3c768c9ab03e8b8d0c95dcc2dd22ebf6a6ab0075f4f00b5b0bd58b38b1676d79,2024-11-21T06:04:07.040000 CVE-2021-30531,0,0,32329025cba06f04b0d9a26f89235599c80ad1d77968e77cc8ae5dfbb1be4328,2024-11-21T06:04:07.187000 CVE-2021-30532,0,0,4e60f096aa8ff27a50d2838d5dbe7a41001b4a5d0de9806ac6b9058c62b57a2b,2024-11-21T06:04:07.330000 -CVE-2021-30533,0,0,c6cca6979e0c2376e83614124df0939bbf568c8439d961b90b07bfab2d7e98ba,2024-11-21T06:04:07.483000 +CVE-2021-30533,0,1,88d4395bc6147885347e34e7c00ca86541af06b5fe4857d7642c6d4e73d937c1,2025-02-03T14:15:31.373000 CVE-2021-30534,0,0,923440384cf8d4ff9efac096d797d8a591d4e55b8a4b552804e871738abe297f,2024-11-21T06:04:07.637000 CVE-2021-30535,0,0,c0d6b8cb0a22c54bdc001d33204efd18b9613997ba88eb37850722a7a9e15ad5,2024-11-21T06:04:07.787000 CVE-2021-30536,0,0,4a34a41b0879049c6cbb8d62242b5a40f29909fb87f379ebe42e9188988c392e,2024-11-21T06:04:07.923000 @@ -174927,7 +174927,7 @@ CVE-2021-30550,0,0,74eee0834cf3f8c8b71935939c5937c50e4be880a3f3186227e9a01a3425f CVE-2021-30551,0,0,2b9ebdc6f34068cb229250f6f38d07d8b3129559546c5025222b986932994220,2025-01-29T17:15:13.843000 CVE-2021-30552,0,0,64694bd2cb5a29a5f271c82d2e028209d4d2211ecbb47b6db21a7c8a6f3529ae,2024-11-21T06:04:10.023000 CVE-2021-30553,0,0,e3e4b72bb4acdc3ca83b854051e0d236e7435425a4f625906307f37bdc941a5a,2024-11-21T06:04:10.147000 -CVE-2021-30554,0,0,88951c414a7a049ed7eb164a0273ec260646cea71fdfbea1ae9db46ff9a6765e,2024-11-21T06:04:10.270000 +CVE-2021-30554,0,1,4374a6339ed57c5dbd736f7219d2655f1da0c3b1a13cbc5e23d1917013d1d1fa,2025-02-03T14:15:31.783000 CVE-2021-30555,0,0,cef21144d62e876f041646588c1fc5b01be693ff85907faf6b93fcb5a9fdce16,2024-11-21T06:04:10.390000 CVE-2021-30556,0,0,0fb5acb73cef6327903959a8e9b8306517789c12718da39e0f4c6bc00fa80c01,2024-11-21T06:04:10.510000 CVE-2021-30557,0,0,36461e61e42beb4d1113ccb885ae837db09ea0887d37c0af53b24003790adedd,2024-11-21T06:04:10.650000 @@ -175036,7 +175036,7 @@ CVE-2021-30659,0,0,ab538d4b06ae94ebba36b98d58ee05bc2d9da4cbd8fd10f31cd6e39e35257 CVE-2021-30660,0,0,387f96a9e1e920b2eb249913b885544bc18948e904113099ea966317a9059876,2024-11-21T06:04:22.877000 CVE-2021-30661,0,0,0441a5ee2f1c64ac124688d9a4989971589017aaa8f192870617e176c24a7fb5,2025-01-29T18:15:40.407000 CVE-2021-30662,0,0,c4dfc7192dbb2ce4bea44d273c3ad0bccd8bce5f5b4b72ed9d54ec2ac3781f53,2024-11-21T06:04:23.160000 -CVE-2021-30663,0,0,c34af11b6511611ff439ee4f7fb904769496be9621e4a84ee0295312099fbed7,2024-11-21T06:04:23.317000 +CVE-2021-30663,0,1,01fddc43cb24486618c3c9e6d0042ec692f86994558aef57efdf67cf73338225,2025-02-03T14:15:32.100000 CVE-2021-30664,0,0,f2057936986b5b73e1cba58f4707641670b3cbaa1c2859e5b4b8f8a2a91dd529,2024-11-21T06:04:23.470000 CVE-2021-30665,0,0,7177f5183cb3e845bc6e7e0274f2c6ba2b866d04a6e42a99d1995a601ede60f3,2025-01-29T18:15:40.653000 CVE-2021-30666,0,0,c8d966b28ab2162bdc187e4ddd46551051c8e5d13b9608b658212a99ea3f4de2,2025-01-29T18:15:40.907000 @@ -175221,7 +175221,7 @@ CVE-2021-30856,0,0,4028362151dfe88b261706a9b8ef963301883669c4042f2c218a11fd252c5 CVE-2021-30857,0,0,c8428b63ca1bebf9fa818ce082b4d89c779a6d59395b2dd739773fc1972fb994,2024-11-21T06:04:51.203000 CVE-2021-30858,0,0,9c9062e43c93affa0a1f3fe578b8d93d6a679f5383b4b0fdc64f05368091d76b,2025-01-29T18:15:42.010000 CVE-2021-30859,0,0,79928aa1fc76be19d514fd1a0aef8ced1b3590b6c8bf97f1cc771858834aa0c7,2024-11-21T06:04:51.510000 -CVE-2021-30860,0,0,ef1ebee2e2f3ce5482536365c906b0d96b8aa83a874dc44e4df7d4591ff1cac1,2024-11-21T06:04:51.633000 +CVE-2021-30860,0,1,9c365da88502536f2ce59dfe0a59cfd31316b46e56c0900b5bdefecef6b8535e,2025-02-03T14:15:32.323000 CVE-2021-30861,0,0,232b0ad1e3dea8d63ec81ff309b82b7837d42bd76bec770782e0b180e8558511,2024-11-21T06:04:51.793000 CVE-2021-30862,0,0,3c72008ec327e7fff74a50782450111677f09acae9b330e081b445e113a71854,2024-11-21T06:04:51.903000 CVE-2021-30863,0,0,60a307d735a10950f82b97d466689dd2121238ffb9223dd3d0a76c19aab49f83,2024-11-21T06:04:52.007000 @@ -180560,7 +180560,7 @@ CVE-2021-3797,0,0,3590ccc3191e2443aa904ab7148349c901e0e747927462bce890749221ee59 CVE-2021-37970,0,0,c0c056a237b910ce0a2b98bc1f0a90deee2f6b7531b4ed711278e73bcf99c30c,2024-11-21T06:16:09.500000 CVE-2021-37971,0,0,6f98832cea8c6c41a2789df18ed7da8b96043e8ad22001c09eeddd714eb83e85,2024-11-21T06:16:09.643000 CVE-2021-37972,0,0,683e1a1fefcd3e6b35217c21fee5a5db7a833faf0db4a4cea8afec0b89d7f32c,2024-11-21T06:16:09.790000 -CVE-2021-37973,0,0,f14e66ce03f44fa07a324796be88d575dbf3ebd62fa2b39f4e1595e484ffe98a,2024-11-21T06:16:09.937000 +CVE-2021-37973,0,1,743719dc94941c0357e14c84302b60c64b1c9baa604633a5edeaa1f72511ddde,2025-02-03T14:15:32.667000 CVE-2021-37974,0,0,931558bac71f677090ea0b1907b8540ee5ebcd09055b5e5c0cdab44c71c9cd9c,2024-11-21T06:16:10.087000 CVE-2021-37975,0,0,27a501d134f6001da3addcb318d1e45fa010b5a9a1bf7b2d71dcfac0b5e8a639,2025-01-29T17:15:14.900000 CVE-2021-37976,0,0,a688ef197c2d29b70611dd79c03840483ff8e68d10b02af37ebae3027176db74,2025-01-29T17:15:15.167000 @@ -187319,17 +187319,17 @@ CVE-2021-47087,0,0,25c97ac4fda2e561b2af6c8de0608f442e35153284faacd0793809b281ff7 CVE-2021-47088,0,0,76bfcd61b1680f7de367b3e8bdf24a6e4259682774fc43d1348d11d3a1fcb41e,2025-01-16T17:20:45.687000 CVE-2021-47089,0,0,3c63067315f69f55d4d68a1f446b6c6645fe126c9efbab98d8eec1fa81d922df,2024-11-21T06:35:22.480000 CVE-2021-47090,0,0,6db0d43f1a2c9e72b0da19e5aaaad073fc89b530dc54a875e9bad79b12380136,2024-11-21T06:35:22.647000 -CVE-2021-47091,0,0,2b7390551c79ac8791250cf51c708e8111fa671f409cc1f72b589badd192734e,2024-11-21T06:35:22.760000 +CVE-2021-47091,0,1,efbeee9ac4a070f7c66218be3276705643cc8230c5872f22ea416a0c1b027a73,2025-02-03T13:42:00.400000 CVE-2021-47092,0,0,d6975da3bb883b2068192aa25e708d7bcd2cee4c428c25b242ef9266ba445f15,2024-11-21T06:35:22.863000 CVE-2021-47093,0,0,8c86f132e48c7ae0c8a813b0881f34bc3f4fef27c7ea0f854e16c78d88daf499,2025-01-14T15:39:17.157000 CVE-2021-47094,0,0,70c9a9987f608c1e0dea21a73ea19fe2b8d1a6f7e0c1e3046a1c2fcc811a4ae9,2024-11-21T06:35:23.090000 CVE-2021-47095,0,0,f1325d2319a8e87982889ff7e5d6ba5a22acc09a0f6caf76a80eb14b35abca9c,2025-01-07T20:15:00.280000 CVE-2021-47096,0,0,a7889cc1343f95b816f2f3dd00a5e6cba7d24215c4fc0bb99eabcd7da60665f6,2024-11-21T06:35:23.370000 CVE-2021-47097,0,0,bc6485d8fce602afec969ad73cb67c2487d0407728ebb5edcbf1c54474a627b6,2024-11-21T06:35:23.540000 -CVE-2021-47098,0,0,dfd0c29ccc12b98d6641d1aea12f9794d27334eb929e1acc9a6f1ea100020845,2024-11-21T06:35:23.650000 +CVE-2021-47098,0,1,cd9f021cee989f82426216619c90ea84dcc947abea3a8e202822c2cf2543de91,2025-02-03T13:49:30.867000 CVE-2021-47099,0,0,579f63a4674bb58b236e9da9fe1139af2ccf46e1503966a974004c88b3f1a826,2024-11-21T06:35:23.757000 -CVE-2021-47100,0,0,2090204a892f1033baaf033d4b6018189cb65502c2aef48312add873b07ba172,2024-11-21T06:35:23.917000 -CVE-2021-47101,0,0,2a510e44f5c8b96da090287960dfb564127a78824a174a014bcb231c08d29b9d,2024-11-21T06:35:24.037000 +CVE-2021-47100,0,1,8194feacb46324f3e5be3ab5253c95460b417d0a4e05733f9cd9aa9a457524d1,2025-02-03T13:51:24.110000 +CVE-2021-47101,0,1,de8fca709e54b370dde0ccee459a8070abf3ddba20b482ec049ee46d239f5948,2025-02-03T14:02:18.480000 CVE-2021-47102,0,0,e3d7ce077927f70cf04a6ee8106db62100f560b49e92f6f23722ec783869854a,2024-11-21T06:35:24.150000 CVE-2021-47103,0,0,db3e5e9d3ae7e807e359f19f747350aa2c349e7dc8e83b609a63a55c8d4eda05,2024-11-21T06:35:24.260000 CVE-2021-47104,0,0,106f2b5520760467943f47cb23329a1907137148a138d2cede6ef704d6e1962f,2025-01-07T17:32:24.537000 @@ -192555,7 +192555,7 @@ CVE-2022-22935,0,0,98e79f04342e021dd399effff093634f27373263128893588811ef5a12340 CVE-2022-22936,0,0,a98490811d9562919019c0ab8f25a2bb0689ef6f6e9f2acf66d396ebef68cbd9,2024-11-21T06:47:38.580000 CVE-2022-22938,0,0,32391ba44f848ae3418481e7a9dcedb095d5182ae073a727327303e553e7f838,2024-11-21T06:47:38.697000 CVE-2022-22939,0,0,e67ea6e930feae3b9ed16118cff8a79327a339cca7ca08b18d6fc9ebe4cf350c,2024-11-21T06:47:38.813000 -CVE-2022-2294,0,0,b5b476a7f293883b2aa7ef58a0ad2e06be21e3e6940d518cb2105e61dac4199e,2024-11-21T07:00:42.523000 +CVE-2022-2294,0,1,ae4c4b086cccbf7b936e579bac052917c6c0f18b086a8561638d2b50e4fabec4,2025-02-03T14:15:33.053000 CVE-2022-22941,0,0,081413763e3372839e5a9fb0333635a91079ce592b4d9366b47ce82b45360382,2024-11-21T06:47:38.927000 CVE-2022-22942,0,0,fb0f26222daa06550e95d97970a3a1a7fbd09e7f88cc1421df7701041ba3b0be,2024-11-21T06:47:39.040000 CVE-2022-22943,0,0,9720f4269abe961adef4aa98404ffed2482d4cdd530e2104566ba6ae245a1c80,2024-11-21T06:47:39.197000 @@ -199118,7 +199118,7 @@ CVE-2022-30746,0,0,c7e7a88b7eaeb284b9d95575c2b962f866dbb3935fb2bb0dfe8f8ebe4f5ec CVE-2022-30747,0,0,03dd23137a267ee330474b14833bc16c231f59e950725fa5de7196c64a53291f,2024-11-21T07:03:18.060000 CVE-2022-30748,0,0,89a3a2345f200905db84ec209c3362b205082d963beffaace9a42e5e913372b5,2024-11-21T07:03:18.177000 CVE-2022-30749,0,0,594470ce17cbfaf7e3d662f3ab944ab6113ec000c1a4dba09bb2d80cac3aad49,2024-11-21T07:03:18.290000 -CVE-2022-3075,0,0,6ca2c16f9fc432f1aeea2976115579b1c213f11313bae1743e576c3868d47f0d,2024-11-21T07:18:46.293000 +CVE-2022-3075,0,1,73d9369c37ecd79d1643ac386e4a3712dfe112e505ecec6b25302950005f8034,2025-02-03T14:15:33.320000 CVE-2022-30750,0,0,7727c4a050fab50e2cc3f857163cd21ef36a7edf7a466c191862ff0fddc4fc4e,2024-11-21T07:03:18.403000 CVE-2022-30751,0,0,d9514ed381aecdb3424b6ec22eb6886ea1e03fbf7af95b81f561d00486b4b5e2,2024-11-21T07:03:18.530000 CVE-2022-30752,0,0,3894c8352471b9e3ebe637c46e6b31bb88ee7fca58dcf7c9d863ec57831c9765,2024-11-21T07:03:18.653000 @@ -204406,7 +204406,7 @@ CVE-2022-37208,0,0,470f87d97669205c33ca7f6e7eaca56b9a8c38b846dcdc90ba8f444db5876 CVE-2022-37209,0,0,52c0dfaa7577479980b8877dc73c55c94fb57cffd5a795ff3c15186218d8ed94,2024-11-21T07:14:37.280000 CVE-2022-3721,0,0,ef27daf131c0ce1769e63ded90ec4f920769462bca2531e2972075401bdeb9b0,2024-11-21T07:20:06.387000 CVE-2022-37223,0,0,b91a7fe9c2b1f93e287eecfe3543d434e1acc1810e511319e4dd1bb708da2112,2024-11-21T07:14:37.430000 -CVE-2022-3723,0,0,dfb75f1f21fc4a8fa32fb7471bd1688fc4da21bca18c499486781fea61ca6d3a,2024-11-21T07:20:06.520000 +CVE-2022-3723,0,1,5fbdb58b18b555d7bb48ad381c0f33efa342886686cddd6af97c11b416a6535d,2025-02-03T14:15:33.637000 CVE-2022-37232,0,0,a7a656594ca018b6eeef345b2ecbc3158e4652aa7e8399b8d814f51c0ce20659,2024-11-21T07:14:37.573000 CVE-2022-37234,0,0,17cc763dc797d3a6162da15d8850dc676e42b955a9a39ee17b2c06c5b16900b3,2024-11-21T07:14:37.727000 CVE-2022-37235,0,0,251cc36b350fd6109aad547b7e03748cea898716d1f278fb274f3199d170caf3,2024-11-21T07:14:37.883000 @@ -207442,7 +207442,7 @@ CVE-2022-41343,0,0,d0ae95b40436fa24be988b15dd0d1de91272426bd16bd6d0a6ec7efe5f0c2 CVE-2022-41347,0,0,c1ae4e52909df12e3153c5905945c510bcde0625e0b07038ef7543fa563d23e9,2024-11-21T07:23:05.503000 CVE-2022-41348,0,0,46415c7cb21ab8defecca377846850e75cd15d2f1879f3b1c7404748495f9e64,2024-11-21T07:23:05.680000 CVE-2022-41349,0,0,f37e912a4b114c1184a1865bf9d5da62dec108ec18e1599ba0fc601bb7455233,2024-11-21T07:23:05.830000 -CVE-2022-4135,0,0,dd3b031e3be5f9b03a2eb884b87e7f424096665f3e7e17a2c9929a8c5ab3ef1a,2024-11-21T07:34:38.600000 +CVE-2022-4135,0,1,b855be7c691705b47a74bee35e6ede2f679288f324d7acc09844fc7c8bd89558,2025-02-03T14:15:33.897000 CVE-2022-41350,0,0,07c59b26e4298d985fa1356786d58d9eaea318e5fb01099dfd2f0c684cb7fb9c,2024-11-21T07:23:05.973000 CVE-2022-41351,0,0,0e738e1029fa2ba786b692581f7ba428943e32cc9bfd63b89b6f8436bd389f76,2024-11-21T07:23:06.113000 CVE-2022-41352,0,0,d568fc1a05c1060a356f7a1a8d9fe0622530655346a9b8a91468384355f230f2,2024-11-21T07:23:06.257000 @@ -212649,7 +212649,7 @@ CVE-2022-48627,0,0,450773013a86dee085659fbeb135aaa41eee00eb1f2d7ba0c46cf0fcba42a CVE-2022-48628,0,0,38c6820367758e57858643c90208981922cfb44dfdb56b80c9489f9ea4749b42,2025-01-13T18:26:13.343000 CVE-2022-48629,0,0,22ed839ae28d9bc6568331788266afa09b73a958ff038fb89be480fe23017988,2024-11-21T07:33:38.803000 CVE-2022-4863,0,0,d4d829a1beb8e4fd89587644cb89a6f79551c4f0525d6fe5f92668872dbe819d,2024-11-21T07:36:05.650000 -CVE-2022-48630,0,0,dc15df37109a92200e8dcf083ad95b672a8578020d9f60253ab82eddb8bf70c3,2024-11-21T07:33:38.930000 +CVE-2022-48630,0,1,c1c0b149824310772dd2a34eccec1464745f453029fe1e494c66edf69e66a0b2,2025-02-03T14:09:55.317000 CVE-2022-48631,0,0,07cfa709b2311dbd1149137d694e3cc56dbf7ee50a39f3e8764d7c810d0b445c,2024-11-21T07:33:39.040000 CVE-2022-48632,0,0,194d2477aaf7a3f918f02d2c60fa7be70f78b4de2da04eea3b6d1c9f3761e745,2024-11-21T07:33:39.170000 CVE-2022-48633,0,0,39061c44a5a7b00aadebb280c44e2a7295bff9ff4a64448f966add5f4258b8ef,2024-11-21T07:33:39.280000 @@ -218227,7 +218227,7 @@ CVE-2023-23711,0,0,a7d257a8ac7a60cf8b18f989f7bc28a441b2ad120e3423778cf70ca039502 CVE-2023-23712,0,0,cf5ae206e07cab2c53fd8a3fa0ad117b0636cd4aeed8586f58df45e3b6b30bea,2024-11-21T07:46:42.870000 CVE-2023-23713,0,0,aa78868f851e0c75d1e59b79dcf6c9e05a61ff930b93a4fea526e2f7ad46afdb,2024-11-21T07:46:42.993000 CVE-2023-23714,0,0,f9f4437b521b1dbed82b0bda47410baedfff9e15d088e234430b6f975546ce4d,2024-11-21T07:46:43.120000 -CVE-2023-23715,0,0,fcf8ba04d7c326f4eddc6d362c33c8bc21d0854cd2b4efdbe8c5a7eab6c9b011,2024-12-09T13:15:20.390000 +CVE-2023-23715,0,1,36bbcb5b989bb56bece7b42e9e9a821d1f21d6515af501278b6b0644a098efbb,2025-02-03T14:32:10.613000 CVE-2023-23716,0,0,ae7e88307a2d2f35bf86a4fef629654d1b4b6000bbefedc7adc0c7c446fdad71,2024-12-09T13:15:20.523000 CVE-2023-23717,0,0,088150048f4901ae8e91b73b39ec39091f5aa11c32a217d7b7cf7dae910773f1,2024-11-21T07:46:43.240000 CVE-2023-23718,0,0,db18831cdfcc880135bea4e479738b3698329087db87571ec31f1655c541d6a4,2024-11-21T07:46:43.360000 @@ -221892,7 +221892,7 @@ CVE-2023-28200,0,0,90b2364c847846eba81dfb147336286e8c7916c6be1729687f3a054ae63f6 CVE-2023-28201,0,0,25cf76f2308bb8f683911400d2c731cacdbb3e4887ef863ecd6141f6625d6707,2025-01-29T19:15:16.087000 CVE-2023-28202,0,0,191014a0200c592d291fa5fba60b126bce7fe013f7105ee7dd188bda0cdcf7fe,2024-12-05T17:15:07.837000 CVE-2023-28203,0,0,4cb19dbc67823a1f2ef0f3a0d6b749db68c9403e1ae6273e5d0d612a7d2831a7,2024-11-21T07:54:35.627000 -CVE-2023-28204,0,0,d29b1bc8f2cad26e0d01ee6d8c1150ddfc2761a38a4996cd387e5b09f29ccca7,2024-11-21T07:54:35.760000 +CVE-2023-28204,0,1,056c57eda55633d77beec8bfe92e3d5a8b9dd4d512401142c6d0e3f282b09725,2025-02-03T14:15:34.167000 CVE-2023-28205,0,0,12484c8c390868a4b2e80fc3d5e2d1333ba0c493509776a9f6c24eeaf48c7cd4,2025-01-28T22:15:14.637000 CVE-2023-28206,0,0,666a3e14555d676a13efe3acbe928335c4d89b72343fe44661b875103c70a379,2025-01-28T17:15:12.633000 CVE-2023-28208,0,0,8fc033bc09b7b40815121b04865c55bdd349e84c32a87bcecfbf9bec0bf2a61e,2024-12-12T14:26:18.893000 @@ -225146,7 +225146,7 @@ CVE-2023-3237,0,0,71364c0269205ecd02331252875cc17dcbb3a3b361f1f83cffee43f697e80f CVE-2023-32370,0,0,8af836e3f0aa426ccaafc4eb19ecf9bb0673e0f04a6355f18fa9f37c80cdcb5b,2024-11-21T08:03:13.227000 CVE-2023-32371,0,0,2f4c4f84beaa5a69eb96316f215170b842018fba70a0460d227c16b6ae4ad731,2024-12-05T22:15:19.457000 CVE-2023-32372,0,0,3735b4d95466ee316c3a874d27abb685a259a2edfa2f44f9a0507c56a6f3dc1e,2024-12-05T22:15:19.630000 -CVE-2023-32373,0,0,54f30a5fbc80eddcf0e5e4adbc3b04977253637fffc94cacc0ab72b61fc545af,2024-11-21T08:03:13.570000 +CVE-2023-32373,0,1,384a9ff85ccf8a10d48c0d117a13f5b941b239e5c1f11c3f168fdd548dc2bbed,2025-02-03T14:15:34.500000 CVE-2023-32375,0,0,363d658b705a2905988a4381992e7e285988cfbbe26cd1b6b8bb78ee269b1a27,2024-12-05T22:15:19.837000 CVE-2023-32376,0,0,95a529e4063990411c2ca53ecf165580bab43c05d8c5d78dd3562ccd8e98cd87,2024-11-21T08:03:13.820000 CVE-2023-32377,0,0,ba36bd37b2f7c1e17d958e1f4d12ab4bfd5e2df22ada13420271f58cb2eaa905,2024-11-21T08:03:13.940000 @@ -225209,12 +225209,12 @@ CVE-2023-32429,0,0,e46e02f258d51635ab5ef8bab6d35855f35e56d76662f17aff3e32f728cfd CVE-2023-3243,0,0,f39d9207aa51a4f50a921684a93aa08e98ddf85594ad1964d7ef7666e323d0b4,2024-11-21T08:16:47.080000 CVE-2023-32432,0,0,71739248fbd9019ee6d1ece6530111937bb9544f2912c4f6af9b8290fb231108,2024-12-12T14:26:18.893000 CVE-2023-32433,0,0,3162dd87a2e4be71b01dab05d4d5586614c514c9e744874d06bf9242d1982a79,2024-11-21T08:03:20.587000 -CVE-2023-32434,0,0,fdc991e81611dc4b7a1f43fcd6dc9f1c198d6764b6b3832bbf7f1abf7af72d73,2025-01-23T16:53:39.523000 +CVE-2023-32434,0,1,a489d35e7cebbc22c80303f305c88936596ccdf3eef16bb8ebcf702c5dc728e5,2025-02-03T14:15:34.723000 CVE-2023-32435,0,0,daf2b1c2b3ed078f49d50583ccdcb859cdc35675e5eea44b5471538e85b4b8ce,2024-12-20T17:49:17.260000 CVE-2023-32436,0,0,b1838bad592f8061b6d9a4a9063867063ed3bb06a03b6ff3b7dfcbddf25b174f,2024-11-21T08:03:20.970000 CVE-2023-32437,0,0,34cb0d82da59eadf72e035d71ce27268fe5640e446349555ae0be1c644a830f4,2024-11-21T08:03:21.103000 CVE-2023-32438,0,0,a00014ad87ef16329a1ad28e21cf98311827d59fe3cfcc6d54ef64a64fea0ed4,2024-12-12T14:26:18.893000 -CVE-2023-32439,0,0,d33752892c92b9818540114cde8191bd225336da8d2380c953799691cd7c128e,2025-01-23T16:36:05.110000 +CVE-2023-32439,0,1,149938011bb859d072dd19e6d257a1f34f821b29a319e23232a41f40b2641f13,2025-02-03T14:15:34.930000 CVE-2023-3244,0,0,01470d499b32ea5cba53fbc6c2839f629c628a66441361005d09811a2b604954,2024-11-21T08:16:47.233000 CVE-2023-32441,0,0,aaaa4d579ed908d0b9e7528ac9c558ea7a2bc165ae2989c8a5559d52e290963e,2024-11-21T08:03:21.477000 CVE-2023-32442,0,0,98f289f358fe3d399579852388e283e7e5fc6845dcb9c9c6f3e95590d3822789,2024-11-21T08:03:21.610000 @@ -229013,7 +229013,7 @@ CVE-2023-37446,0,0,be821897afaefff3511ddbe99c1766d2aa99608bc19be9be22c2a6416daa5 CVE-2023-37447,0,0,15bd69699d2b2992e93ae4e14ad90f556204e72caa0bee115e5bfe633e0f527b,2024-11-21T08:11:43.753000 CVE-2023-37448,0,0,68bcc01a6fac47e3f732bd1cef7dc5013483e1f033183d8d9f34d5dcbd19793a,2024-11-21T08:11:43.893000 CVE-2023-3745,0,0,9144ad8cbe174bc79191569e1be593f42fa833e4e8289a4912c02fef5b3192ba,2024-11-21T08:17:58.043000 -CVE-2023-37450,0,0,e9defe8fab0bf6ee2a9418b818274f8476bd8d5d1f94e3eabafb123e117d187c,2025-01-23T16:36:38.280000 +CVE-2023-37450,0,1,a0d07216021fac676c29da12b6a065a313587fe92c3ab3317edc58b04b259b82,2025-02-03T14:15:35.167000 CVE-2023-37453,0,0,688beea879fba5f45b055ba0ddbbc6400f31db0bf5103255d2b19ec2de0ca61e,2024-11-21T08:11:44.167000 CVE-2023-37454,0,0,2f6e432da2269381eae5b8211281992618e37122fa5a7abc27d22a1db1174552,2024-11-21T08:11:44.337000 CVE-2023-37455,0,0,c6a24bb6c4f50c17800628cdf4a4ece5759bfe34b2075c554fcb668f4e286189,2024-11-21T08:11:44.510000 @@ -231961,7 +231961,7 @@ CVE-2023-4106,0,0,aee4575b6bdf6692cee5993128ee226194b0209efe034a12fe845e72b8e82b CVE-2023-41060,0,0,8acbf53c221aa8609455ec7009a2cfd1d896c4555480736ac3e300fbb5307d69,2024-11-21T08:20:28.793000 CVE-2023-41061,0,0,51f7d5bec3db4b4922f90bd9e41c0b71fc7a7ea6b11425d8b5b9bd5abb61bf60,2024-11-29T14:27:09.157000 CVE-2023-41063,0,0,201d4f1370e6bb557e49bc49102255275b7136fd46e104de566667668fcbf829,2024-11-21T08:20:29.117000 -CVE-2023-41064,0,0,72ac17b802b429a251f9356e21d9f3dc3e530be183aad4a4617d0e83003920f9,2024-11-29T14:30:06.457000 +CVE-2023-41064,0,1,500747e48ebd8bee1f4056044d76e76283841fab57d51f6226da5a1db89f5881,2025-02-03T14:15:35.367000 CVE-2023-41065,0,0,7c9d34b2be3b8ffcc8a5f9fefc26e5797a4e98ed595d93b611006a9fd40e1baf,2024-11-21T08:20:29.377000 CVE-2023-41066,0,0,7fcccf01dbe2851958d26144e25ca86168baf1325738da8944d134156bc88dfa,2024-11-21T08:20:29.540000 CVE-2023-41067,0,0,be7093ae210718b9259fde08f758542a3144a7d18833986a4c00347c1e05442c,2024-11-21T08:20:29.687000 @@ -232721,9 +232721,9 @@ CVE-2023-41987,0,0,63943d5aad6843ea1cd613c467c8126a79f0f1ada88a8e913e4ad95dde242 CVE-2023-41988,0,0,70f525e241ab930717b8bfe411a64eba2ac0b4dfa646efb4a8597395152abeff,2024-11-21T08:22:03.450000 CVE-2023-41989,0,0,f3b7543034092616a5ff14f6a1d09cd6e650b8198983509d896839f5a7c28656,2024-11-21T08:22:03.623000 CVE-2023-4199,0,0,83c42a8c59a768bdad748ced515fad50734472b131209c5d94d5c83b8e0e9b76,2024-11-21T08:34:36.470000 -CVE-2023-41990,0,0,a54b5680f267aa187518a44533cffb59647b3d00addec1efd53a07ee9ddd3ad3,2024-11-29T14:39:00.893000 -CVE-2023-41991,0,0,2fb2880aa40074b032d65ce6ac7506e6365b0b65aed846b5628a9026a23a0ffb,2024-11-29T14:41:00.430000 -CVE-2023-41992,0,0,9944f25da860c7fc53365c19a76d53290f304dd150b6360220b5f639ea3be66c,2024-11-29T14:41:50.523000 +CVE-2023-41990,0,1,987b85eb7dcebb9470d60d2d55830a1442edb1d0827efcd172cc595d47962d6e,2025-02-03T14:15:35.587000 +CVE-2023-41991,0,1,a165ea9f1697fb3eee0b8d97144061fdcb2362a519309e435e65c401bdb86eef,2025-02-03T14:15:35.770000 +CVE-2023-41992,0,1,e90ca128093204affd7d9b00fd43f7a16a0513b2a732c263d335c93baf2216cf,2025-02-03T14:15:35.983000 CVE-2023-41993,0,0,bd48d882a96810dfe23f61a5030d88b925d2e7f1533943705b9c74ec2cca8319,2024-11-29T14:43:20.857000 CVE-2023-41994,0,0,2c16cb2dff4d40cfd0c6698cc2693d650c7e7fcec66572d74492730d2c501f11,2024-11-21T08:22:04.450000 CVE-2023-41995,0,0,ed618071a15f3da77f98b982998e0fe23f4f20ff643e82d8b25f9d0148b39b7d,2024-11-21T08:22:04.573000 @@ -232897,7 +232897,7 @@ CVE-2023-42230,0,0,a27cd39883b0aa87ed9da74388e020439f1f705309294234881c5df5124a5 CVE-2023-42231,0,0,4f1f9fef9e80ae22acdfbc6add56780d88da483e465358ebb92145f0da58aaac,2025-01-23T17:15:12.523000 CVE-2023-42232,0,0,fa2d9124c7c65a485edd8978845f7b84ad24baa786bf8a8a20b9645de5b7810d,2025-01-23T17:15:12.693000 CVE-2023-42233,0,0,0ef765427d2c364bfe6113d71a0ecf990a7a966648b3ce549ce24f50c68a4a66,2025-01-14T15:15:12 -CVE-2023-42234,0,0,e33d66e45484b63183541ec4f20e75f5ecaef9c38c89933966683769779e6a81,2025-01-13T22:15:11.593000 +CVE-2023-42234,0,1,c0dc51cc0039010a8c12b5e5b547fe57f0f39a5f3877a3d854be3ca0f8196055,2025-02-03T14:15:36.287000 CVE-2023-42235,0,0,92233c5635fac4a80ca7c920ec3549a2b8f4c787ec74c75df0ad60a20977d8fe,2025-01-31T19:15:15.320000 CVE-2023-42236,0,0,1cb7200d71e5a2a678f2d005b05e2be575a7e3797c2aaa683390e01ff07d3cf4,2025-01-31T19:15:15.497000 CVE-2023-42237,0,0,50da78ef2c69b06622e097bf8c5854521f0af8d00206e662c197bb1d4fd4bf63,2025-01-31T19:15:15.673000 @@ -233337,7 +233337,7 @@ CVE-2023-42820,0,0,360f655e3f66c4c0cedc09cbcf22bb489087831aa4177c40aab6660494001 CVE-2023-42821,0,0,4ff1a7c6846cccc9f5711122de8292be7f6c8066fb02a3b8c0518241e43eacf7,2024-11-21T08:23:17.253000 CVE-2023-42822,0,0,3aff799e080177d4ae1b6054402a40b7eaf0d79432d42e5d1eaf6c4a018ac277,2024-11-21T08:23:17.400000 CVE-2023-42823,0,0,70dd7f6b5c8bc5a829a8a72c8db49652d99b172be25cab71e1ba63a6c349e42a,2024-12-06T14:10:33.737000 -CVE-2023-42824,0,0,fbab300b421eef9746a3064fce9bc8b6eeaaf600e6642ec0d3b5a6981e34e19e,2024-11-29T14:58:56.110000 +CVE-2023-42824,0,1,ebf80278ad9f848e260999553b1c3df339307501a2940cead18e71446a72d1c2,2025-02-03T14:15:36.527000 CVE-2023-42826,0,0,18c3f092c50325a7434f872ea53a0b6e051bdd304850f7e7d1728b663c8625b1,2024-11-21T08:23:17.873000 CVE-2023-42828,0,0,7dc273404c9d73cdc9817148a82a06ac9c6ab358e3afe28eb8eecd4dd3650dc5,2024-11-21T08:23:17.990000 CVE-2023-42829,0,0,ed6ced541e4937b8fd45903738fb6c679a366c4155f22cf3dcc5650154983d96,2024-11-21T08:23:18.103000 @@ -233423,7 +233423,7 @@ CVE-2023-42913,0,0,5818c393b5d92a4eb66f2c6d03629fd68ca311b60c9be586a1369817c61c6 CVE-2023-42914,0,0,fbb02939bd4a080ccbbaa419cfd9c0443a345ff12dacb4e05171bdc8d52fbae4,2024-11-21T08:23:30.140000 CVE-2023-42915,0,0,a491c801967ea665e6a1e7894d12e52fc0e3bc74c17c4ea7b2e5a98e97053fd8,2024-02-14T03:15:13.210000 CVE-2023-42916,0,0,c4f2d6fad88b2ab94029c8171644207bc7bb425f096dc8185d78b52adf2970af,2024-11-29T15:03:51.967000 -CVE-2023-42917,0,0,18178b24ce5a1ec8949f2c585a5be9d98aa4c54d0bbf65aa2ddaf7165e44f389,2025-01-23T16:37:02.693000 +CVE-2023-42917,0,1,4ea8b858fa6407ae16f711db6888c04c3dbe982da5e780ca881ac152490b6075,2025-02-03T14:15:36.743000 CVE-2023-42918,0,0,e66ebe9c2bed61829c0393c11e08cd7bec391609452471902134a42b7654cfd3,2024-12-09T21:28:58.763000 CVE-2023-42919,0,0,0c3c70bb5f2863412b2b2dd67082465102a85fe428dafa015ca9d7e89c5e148b,2024-11-21T08:23:30.927000 CVE-2023-4292,0,0,d9de54c2172d4a0bd9014f748290f40f3a2200aa50a679e4a1ee0d613f997768,2024-11-21T08:34:47.827000 @@ -237456,7 +237456,7 @@ CVE-2023-48626,0,0,2af153aa2d12e8bccbdcc3121e06d29ce06f8c611c78f3430bad9a335ad97 CVE-2023-48627,0,0,79a71ad4dd8c25d41f759d2ac0f7a7ff291cbf6f42b61906743acd6cdf3ca4c2,2024-11-21T08:32:08.093000 CVE-2023-48628,0,0,9d5070980366879f7378b90806bf1c27afee4829d2fc3740328643d68bf53451,2024-11-21T08:32:08.223000 CVE-2023-48629,0,0,3a4540b0c500bb6b13df10b315420e93bbca61d5e1ac06cc30182579f8c5e35d,2024-11-21T08:32:08.353000 -CVE-2023-4863,0,0,2a53abbac75949bf63e5c95c658a9b8754e230474394da72a1ba4f28e8539e56,2024-12-20T19:00:21.050000 +CVE-2023-4863,0,1,7908203f1d812dc0c32a875a82689f53ffe6f22582ec4075ec6101a2b1aaa0ff,2025-02-03T14:15:37.023000 CVE-2023-48630,0,0,323d466f78d66dde44369783936a935f801ed95b754aca894e70232a0011de21,2024-11-21T08:32:08.480000 CVE-2023-48631,0,0,5fc9ca6467e10ad9aee2039a339f1a64d3a2a8e2106834788969c7d345e5579e,2024-11-21T08:32:08.637000 CVE-2023-48632,0,0,6eb8c9a4a6fed16fcf4c60479b30c8f448167a4778b02eb7c40fd752478da1cb,2024-11-21T08:32:08.773000 @@ -239883,7 +239883,7 @@ CVE-2023-52161,0,0,cc2ca74d32bca44f3652e1f4e14ffd83723d50b42d0c6e13fc3025c9ba0c8 CVE-2023-52162,0,0,a69328f8fb5f7f70dd12cdd38f629353874332b1168b51730a7e4274bd411616,2024-11-21T08:39:18.893000 CVE-2023-52168,0,0,c7cd793d041918ccc6f2175c08a72a3489a14e0bb9eacde53b0b8fd2753e8f0d,2024-11-21T08:39:19.110000 CVE-2023-52169,0,0,9be3070ec5123d1f488bab859fcd5265610f3d610a72d91e6cf96799be93bcbb,2024-11-21T17:15:07.820000 -CVE-2023-5217,0,0,a23e352bd9b23a72748039bab84a9e1cc678d04587ba48d3cc49f775e2a2b4b5,2024-12-20T19:01:23.347000 +CVE-2023-5217,0,1,d44e1d2f72cb8b5db95a55c2054613a61b82f8a9115f7aa84863f6c0994e909d,2025-02-03T14:15:37.370000 CVE-2023-52173,0,0,ed376452139780a426e6fb1f246c87d0fc83b96168283628454105d358c3da2f,2024-11-21T08:39:19.490000 CVE-2023-52174,0,0,cddc1bb33013f601d307d8cfe53781cf69c2773c9e4269917e19651a324e2d2a,2024-11-21T08:39:19.660000 CVE-2023-52175,0,0,9ea7be8febb1e639e6a626e1a8f3065c69288fe48574a14ecc524f01efa6bee8,2024-11-21T08:39:19.813000 @@ -240252,7 +240252,7 @@ CVE-2023-5258,0,0,e7de433a5f8b0381668aa81c56f5663c687e057bf10b9164f07834413eaf9c CVE-2023-52580,0,0,be0a0e06ead2361ae48d45b0aa80d77f09800c6568f6ac2725bd6b1b9aefbeb8,2025-01-16T17:43:05.203000 CVE-2023-52581,0,0,c3e6d5af82028afac4a4ca1f703859e3b8715280d49e5b32567a0d2d07c327b8,2024-11-21T08:40:07.010000 CVE-2023-52582,0,0,f412b70c6b5d57415fcdb6864c794b98a72ed689a3f46467eda4aa933ef09985,2025-01-16T17:33:18.490000 -CVE-2023-52583,0,0,9d7df34918ccc0dedfe778740ea8fa6aae50f297274da9bc08d14940c75f6a3b,2024-11-21T08:40:07.307000 +CVE-2023-52583,0,1,e46a4554888ecc302b9234bbffc66d09b6f50262b0a49874d8de91ef5fc33ea2,2025-02-03T14:18:13.147000 CVE-2023-52584,0,0,5a522db273229117adff319e88be80a572f8d8a3e6725b090908b5d18b4058f9,2024-11-21T08:40:07.433000 CVE-2023-52585,0,0,db7e2649e543632d88de0ba5f9f4eb76dfbd693c00750d96eb1fd47af92129fb,2024-11-21T08:40:07.623000 CVE-2023-52586,0,0,fbdae8685964d88e3fe29d0c54b12509eef932eb716f6f2924afcd7a7247f4a5,2024-11-21T08:40:07.803000 @@ -241611,7 +241611,7 @@ CVE-2023-6341,0,0,8ecd43f865afd7caa5344b8fe17a3ea7a3522641beb80a8a947afe15992d37 CVE-2023-6342,0,0,2b3c455968258ed34c39ebb191327647c90e3e84685f08ccc9f067b0934df2c8,2024-11-21T08:43:39.507000 CVE-2023-6343,0,0,ed6f2c610ee4698d428e1242bb3c9253625355d55d76cd1ea75478ff32cde2fe,2024-11-21T08:43:39.670000 CVE-2023-6344,0,0,b19585bc4f92d839c4c31e3142088ddaef3492c596de4a6ec59addd057cb77ed,2024-11-21T08:43:39.823000 -CVE-2023-6345,0,0,9e61a60b51254ea9d792ed1e2112a7d7a8c61ca5d58a313503e137332acfee5a,2024-12-20T19:00:58.223000 +CVE-2023-6345,0,1,ec91a16b71fa4cadf2e2c00690ba802691a2d72b1f72f5aad4ab6170010d8493,2025-02-03T14:15:37.710000 CVE-2023-6346,0,0,69b9fa64118162df8c1ca3fabc04a7b924c72ea3fba2eb0b4d4a970f8597bdb2,2024-11-21T08:43:40.143000 CVE-2023-6347,0,0,b705c1c6a4a54e8880ddce8ea8d2a41c6f19a7013e8b35f73dde8f1f7fd7e6d5,2024-11-21T08:43:40.283000 CVE-2023-6348,0,0,0f7379de56995dc0b0c187185cf9e3fc0fabaf4d795f78271a10ca073a7614ff,2024-11-21T08:43:40.500000 @@ -242210,7 +242210,7 @@ CVE-2023-7020,0,0,197fd2fa8d1d4a18a6a4294ec49a94d748ef7ab3b8641e1f8788b50c52350f CVE-2023-7021,0,0,c90f0d59c2315eb60681259fead187f0526d5fbf18a87677fa680c04abf0c8f3,2024-11-21T08:45:03.430000 CVE-2023-7022,0,0,856fd34983e00eb10af7bbfa2b247782306c3cd9e203e98bbb5f4bce3117af9c,2024-11-21T08:45:03.637000 CVE-2023-7023,0,0,4e802c403a190e5bf3fbdeb4ce4568b9f0ede0742b2ccbd390feda6a6eb357cf,2024-11-21T08:45:03.803000 -CVE-2023-7024,0,0,a170fdf780e8fefcbcfa8b8fbdd2e1fcc20a297924bc4aceec4d585f25d7aa51,2024-12-20T19:01:40.967000 +CVE-2023-7024,0,1,79a30afe3007ff3b2540b6e89d5923ecfad9ffdd4fca27a2f59c45d361c6405e,2025-02-03T14:15:37.920000 CVE-2023-7025,0,0,145c0a7dc7eb75d64af8eb05c1d2d3dac33609c0032da4138aea95c3c490716a,2024-11-21T08:45:04.097000 CVE-2023-7026,0,0,98716ce8e87964958034bedfc875bd5c13b34d49f4803350e191e9f77d9640fe,2024-11-21T08:45:04.243000 CVE-2023-7027,0,0,1831de41a592a60eace373737109c08997b01ea4f32d34c6623fc7de027bd240,2024-11-21T08:45:04.383000 @@ -244600,7 +244600,7 @@ CVE-2024-11417,0,0,cf06fe8c782ce95e239bce3cfdc56c15512df782eb926cc63cc8c9c25319a CVE-2024-11418,0,0,535b692f50d805c4818cee62531f6352bfed10bac65a921339df0cdb31e46f30,2024-11-26T04:15:05.237000 CVE-2024-11419,0,0,e5014d0a20f8da57d3c2f2e9aca265f8c88437545b7df01014bb52b3f903da56,2024-12-12T04:15:05.467000 CVE-2024-1142,0,0,e15d337f366ba06849b1f848d8db9c587e5c183aee7e98313d369c15ae012a6d,2024-11-21T08:49:53.680000 -CVE-2024-11420,0,0,1711c7ba1ba8c097f09567c5d53d049cbf7bb1bf6f7b471b4caaac9c33673bbc,2024-12-05T10:31:39.750000 +CVE-2024-11420,0,1,d4dda4542ada6372d8ee5f14d387a2833f4db078214912e8d6efa098ff23acaa,2025-02-03T14:39:02.507000 CVE-2024-11422,0,0,d1cf88e38537f70de74fc8b64f9c3e65e73b4d811550436a72b14f9f7dc86b7d,2025-01-29T17:15:26.947000 CVE-2024-11423,0,0,5fd92d7acac7c9d9434b04e44769038fcd9ed45fc5418a964960dfeca17d19b3,2025-01-08T11:15:06.003000 CVE-2024-11424,0,0,d50ad6baffad28053a50f50d0d95ca3de9adf87a3fb1a59a3e023fabb9b6d399,2024-11-21T13:57:24.187000 @@ -249590,7 +249590,7 @@ CVE-2024-23218,0,0,0006a236dccd6d4040de501ecabab6df2a8d4ae9a8e9999585907fe0592c2 CVE-2024-23219,0,0,b081eba13aaeb24e29a434866a76e06908163fa30bca3b04413807e5b483dafb,2024-11-21T08:57:13.093000 CVE-2024-2322,0,0,b6a3f2a7272ccec85731db5e0c1d24de9d87c1f88cca07a2e8f931dd31cd1f77,2024-11-21T09:09:30.220000 CVE-2024-23220,0,0,56ec6c9a0c3f534e407a25990b76d9f9791ed14187a0ea0d7f9d644c10ee29ca,2024-12-05T16:36:26.020000 -CVE-2024-23222,0,0,234fbc8851ab910f53af22b06eaa70a751c876141fb023e6fa28056f96c7e426,2024-11-29T15:05:53.577000 +CVE-2024-23222,0,1,8a89efbca457c119f6fa737db7f2bcbd7d7ae874e824e9cafa7671f30cd61ab8,2025-02-03T14:15:38.223000 CVE-2024-23223,0,0,97ac05c5bd628f6060d7675906f33d1fe0db77305c0052816974d888e538e42e,2024-11-21T08:57:13.563000 CVE-2024-23224,0,0,3122876ced1cc8436d3e7eab9ff8a2d8aa1d77b5acc6cd7e0eb039ac24059a35,2024-11-21T08:57:13.717000 CVE-2024-23225,0,0,eb0782fbd39efc0814ff4369aa9a949dffdf3d310db982851067fe25e2177b43,2024-12-20T17:08:54.523000 @@ -252131,7 +252131,7 @@ CVE-2024-26650,0,0,c37b82afef74cba8f0a1b3081e8c53c80ac8f73689ed9f1c045183b9566d9 CVE-2024-26651,0,0,898711d0c00a026cf190f460e3b24d2751f2699fd4b1b6a25eb50a9711c0c7b9,2024-11-21T09:02:46.027000 CVE-2024-26652,0,0,105744a3326cfd97769655231f5141eceba4e2c7ae5c2e6279ca9167a71c0f9b,2024-11-21T09:02:46.153000 CVE-2024-26653,0,0,8866d2d1752b4fe3a78b08cd6c19a2f178b3cbc04d520bc84ae31c43b66dc51f,2025-01-14T15:37:45.440000 -CVE-2024-26654,0,0,8f93e16909bf805f9177d9a03ded410b38c7e34be332c9b83ccce69a3fc26ac7,2024-11-21T09:02:46.457000 +CVE-2024-26654,0,1,3b9733514348f22bc9a84fa3928369488859dc6099e0c8c0edcee02b3a089651,2025-02-03T14:32:27.763000 CVE-2024-26655,0,0,44c6fc1f60aa28c9bb65a03278297b88c473f78c7cccc5d35bc94149a1733e48,2025-01-07T17:19:13.987000 CVE-2024-26656,0,0,87294d191c345c70a4c471a87fe66eabdaba9c1d9c21608ca348166e40c96d44,2024-11-21T09:02:46.717000 CVE-2024-26657,0,0,5b20f2d67a13488a4561cdf1804b4d16bd412c492c2f8931f4259c8fdab78f08,2025-01-07T17:20:00.840000 @@ -253995,7 +253995,7 @@ CVE-2024-2897,0,0,3be50c7fb1beb72b37f347e1c0851ffd4301791d62380b3584870314fe24d1 CVE-2024-28970,0,0,40de7b82743a11a5ad6d4091afb1ee76e91a11478a88b6485d9e52873333afdf,2024-11-21T09:07:17.760000 CVE-2024-28971,0,0,f66f1681f508eec910c6120904031eb3e3b88e02cd01a61289866852e8315622,2025-01-27T18:43:23.280000 CVE-2024-28972,0,0,12c7e7efe1195c680c17aa2603704c5c29d6e9fd7636c8c8b733f1d9d5598f42,2024-08-23T16:59:11.070000 -CVE-2024-28973,0,0,86aa9cf0dc99bb53df773cc3bda088c9d09d4cc3e05322d984b9256344b8573b,2024-11-21T09:07:18.133000 +CVE-2024-28973,0,1,132aefb3ecaeed2d626d66154aba3183a480c5104b736657f552f51e72c3c256,2025-02-03T14:59:08.020000 CVE-2024-28974,0,0,cafa85cdf7b832ddfb2a161f172cc8bc805bce9ff25bc7836bd13d404481d6ec,2024-11-21T09:07:18.270000 CVE-2024-28976,0,0,caa8bfea0914d137c2be9fb5457606e9907ed9fa635d4e2043de70a7a5286800,2025-01-21T18:50:59.433000 CVE-2024-28977,0,0,08e5aa631d446df2875f7b417e5760d9e5fd3f4ccc9e4a23eb70ca460e37cb69,2025-01-21T18:47:57.500000 @@ -260108,17 +260108,17 @@ CVE-2024-37049,0,0,3faf1be2f8c30447cb981394fbe958b894b689bd637dd334455e8429dbe17 CVE-2024-3705,0,0,f21da8fc69aa938cfb790a9082e98081d18674f94a94a372588a67b21121d893,2024-11-21T09:30:12.947000 CVE-2024-37050,0,0,31ab888c9f9e34bbe83429d9c1d54e87c1daf97215182590687befdedffb4cbc,2024-11-22T16:15:24.150000 CVE-2024-37051,0,0,3ac6461a784c37c89e0f75dc3f38c5b19ec6cd9f75f2d6791fc8a776aa531611,2024-11-21T09:23:06.323000 -CVE-2024-37052,0,0,fb40af954706d7526971788523c19602f19ec6c9c52ea65e81509481644e6b67,2024-11-21T09:23:06.550000 -CVE-2024-37053,0,0,9962b7ec932bbd125baff1a72a5d165f77742d060fac92e436638b22769696c4,2024-11-21T09:23:06.690000 -CVE-2024-37054,0,0,3cfa3cad5db6297cd38ea99aef7dd3a618f8a19b62b99941109826b742464648,2024-11-21T09:23:06.817000 -CVE-2024-37055,0,0,56979aaacbda055ccd160b1cfc4e7e2bcfef0a62b445eeaba7d4f06cae5bd2be,2024-11-21T09:23:06.957000 -CVE-2024-37056,0,0,9ccc350820b34ce1c99c76f63480e7af82c232185dca4c4d1e1faa556277b040,2024-11-21T09:23:07.080000 -CVE-2024-37057,0,0,fff2526a78320bf328852973989afb4f4b4f69487679e499df80b3c254c434ab,2024-11-21T09:23:07.260000 -CVE-2024-37058,0,0,dce65b8946adf1dfb5d8df510682ff1155bf31d2b7855267243dd4471b63d24e,2024-11-21T09:23:07.470000 -CVE-2024-37059,0,0,43aa3214bbe3964262c627306e6c675f1d65afb2548a0884e943bd92c8517260,2024-11-21T09:23:07.600000 +CVE-2024-37052,0,1,835f667260879cf54dbbb83d03e67c421960e64a3c3bdf0999c5f66c51de95fa,2025-02-03T14:35:02.407000 +CVE-2024-37053,0,1,3143d9389340f5a62f6ba0625e46607425a401258fa3d4b5f5264473f80ddcc9,2025-02-03T14:35:07.880000 +CVE-2024-37054,0,1,29e7829f3e6428ba020385fd80a9b52d8d31697251e9ad4c20ca30078d54470b,2025-02-03T14:40:37.527000 +CVE-2024-37055,0,1,27775eae58b7579b15dcfff90b50e34c82cfc34439d6f37d1a8e9870cb301069,2025-02-03T14:44:39.397000 +CVE-2024-37056,0,1,caa33549f4d758a97badfd5a07ac9796d844825116401247ddf7c2cbf1ff4fca,2025-02-03T14:45:07.183000 +CVE-2024-37057,0,1,3eeb5fa46bd4828c000c97c3d7a0ab15d0ec06a904bbeeb820960a2483e8faec,2025-02-03T14:45:23.600000 +CVE-2024-37058,0,1,c857fd660b76c44288bdabb743f65a26f198b6f8dcf748e6642f30b96949ba5b,2025-02-03T14:46:16.247000 +CVE-2024-37059,0,1,bc49fbbf3574457f7622427c59788a70e80719b1b442b05a025895a966ad2830,2025-02-03T14:46:23.250000 CVE-2024-3706,0,0,94287a969919df14f6f8ee55764cc05cd6eef1cdab17f2ab6f382298a7e81c58,2024-11-21T09:30:13.087000 -CVE-2024-37060,0,0,c09c3257ef2d15d3b87fe3c7c9f692d1e5389a82e77f613bde5b6c810183477a,2024-11-21T09:23:07.720000 -CVE-2024-37061,0,0,fddab15d3094b68080b39d83c98d6db584da8d2da86cf9ea47766460f1e50633,2024-11-21T09:23:07.847000 +CVE-2024-37060,0,1,5530cc77d916f5374ff5d9f79a734127db904f6af8ce1cd5cca27895d7b6fa67,2025-02-03T14:46:31.613000 +CVE-2024-37061,0,1,b87d4d4a6e95c47fe61f0d64fcecf1fa7274fd2d8dc81fce6c508eb1e884cd88,2025-02-03T14:48:37.123000 CVE-2024-37062,0,0,2bd04abe4dde8ed6b271ce3f8eb2ef0510671250c19b463ea6a013f3d64b567a,2024-11-21T09:23:07.980000 CVE-2024-37063,0,0,37a6db4262065d47e765009bf8ac3ad355d6a0505389321e2acbe1de264b2767,2024-11-21T09:23:08.110000 CVE-2024-37064,0,0,78f6bdc3d8227ddbb7ed505f12626c0035377a32a1898870361365da42c04f85,2024-11-21T09:23:08.240000 @@ -264208,7 +264208,7 @@ CVE-2024-42417,0,0,f1c80c711a679210ceb5e01a64e3cd4fa77e11abf5bc2a3fb017e31ac06ea CVE-2024-42418,0,0,d8c279b34a2436c7978f2dd5ccc38b1a5c29d1a2243b3f21749da924dbafbcdc,2024-09-04T18:22:22.583000 CVE-2024-4242,0,0,4ff5a517ebe58f036a76713683ac8fcf9970f47f5a76e6ec9a8aba3ffb1d13d5,2025-01-27T18:29:46.497000 CVE-2024-42420,0,0,c141965d63744fc1061446ee1ae1162360d4790ebb601639ac109ac40f0d20d4,2024-11-05T19:39:31.913000 -CVE-2024-42422,0,0,8b09bff488c8dc8569c2dadccec15aa8251396e2acb2d7fe429e2fbb66fc669c,2024-12-03T13:15:04.987000 +CVE-2024-42422,0,1,a234770e7b65a5a9c7aeea5fe74966a3b1bb651be5713a21eeec2a7c5dc12323,2025-02-03T14:40:15.143000 CVE-2024-42423,0,0,8264e3551cb249dc1d0a50016c0beecba4be32a4ea61b5936f8d0d7397afda33,2024-09-20T19:42:20.417000 CVE-2024-42424,0,0,cdd20f106ec5d8232f1cf93d7c25f7e27225ced2de6387354bfbd69f26558307,2024-12-20T14:41:45.593000 CVE-2024-42425,0,0,4b136399741737f30b4c8074218caee04298fffe4ffb70bb1828268e47340c65,2024-09-16T15:46:03.110000 @@ -267780,7 +267780,7 @@ CVE-2024-47463,0,0,0dac3d7125bccc1a673d468378cc81c511268e1f45f55b3574b748f788c1f CVE-2024-47464,0,0,547614204d1f6cfc29d3faea8ceb0db89983ab29949fcfd3f158bcfa0ee8d9ec,2024-11-06T18:17:17.287000 CVE-2024-4747,0,0,dc86c3306ee43b541fd6b01412a7d057d47b79f0d0be13cb5d0ca8e311f58a48,2024-11-21T09:43:30.670000 CVE-2024-47475,0,0,bf0f8358bb387d27925e7e2bcc11679964bf5b3a92ce72f7eb49a3a11a0c2668,2025-01-09T16:04:01.680000 -CVE-2024-47476,0,0,4b2b06dd3edf6a50e3069588182cd49c842e9fd0ba0108e65c538bf5cf0a82d0,2024-12-03T10:15:05.883000 +CVE-2024-47476,0,1,6e990c853e692a8fd64c99a9ad1b15c530c423acd9421da07d1db5546a7d2cd5,2025-02-03T14:48:29.350000 CVE-2024-4748,0,0,0e1bf604cc16c6bb1a8683ee11cfaa8201b2be0b492e06be1984933dd6cedb52,2024-11-21T09:43:30.787000 CVE-2024-47480,0,0,44d73a6ff9ee57b8ad644b90b4f723a6a3c5019bc50da4f34acddcc6771b4046,2024-12-18T03:15:26.583000 CVE-2024-47481,0,0,71ea09e89917de5bc1b44200d74f1ffc8698bb7da082bd763134d649f33a6380,2024-10-31T00:01:40.487000 @@ -272156,7 +272156,7 @@ CVE-2024-53799,0,0,783da60a33ccbce78617be33a3c476d287119720767ee98d4405ce9d100a8 CVE-2024-5380,0,0,226318c98a74a19f1dd2a14061de91ef6b8613a700730137544bc16df39ee24e,2024-11-21T09:47:32.550000 CVE-2024-53800,0,0,56635e5542038d20a727e4d779e35bdd05d1d3369439d6f17b76b02c17fd3159,2025-01-07T16:15:35.883000 CVE-2024-53801,0,0,95df68651124aa797a705f7b5a5f6851e90e49bc961e22dbe8e54a1034ec1e08,2025-01-08T16:20:07.380000 -CVE-2024-53802,0,0,d38c12f04c4095c1a6ac4f4dc30d15b9305c85ea7eb04aa1ddfb5bdeec10087f,2024-12-06T14:15:22.430000 +CVE-2024-53802,0,1,198f0f2ee910fb32d3453aef55190d645dec3436b91338df8b11834a2bd89e9a,2025-02-03T14:36:22.700000 CVE-2024-53803,0,0,3ee8313ec2c5826e6c44093bf2e19288a4ab5e01b17ba7838c8e2683c5a34992,2024-12-06T14:15:22.567000 CVE-2024-53804,0,0,c64f2291c3e202809c8bf90598d4a2a0d324c8b22742806eb77826f9e995a47d,2024-12-06T14:15:22.697000 CVE-2024-53805,0,0,f6fbe145ee852ec5282c6eab9bdebf9592e6eef4e867082a6f67281833d0254b,2024-12-06T14:15:22.823000 @@ -272171,7 +272171,7 @@ CVE-2024-53812,0,0,3daf08a2a09bc066dcbaf09d8fe7037ca8d3aad09ed5b27510d438c07c36f CVE-2024-53813,0,0,fff049c64a845625087f0ccccc8384a6cbd15c3beb52f62a43074587995956c9,2024-12-06T14:15:23.947000 CVE-2024-53814,0,0,f3f7a69f3c8b1ec6cdad93b7f421d09ec0782bd66db55fd878b84c1dd722d05d,2024-12-09T14:15:12.003000 CVE-2024-53815,0,0,4d649361421c94a2195f0bfec7830320a88f0cec019558375308f4ec8e8bbdd2,2024-12-06T14:15:24.083000 -CVE-2024-53816,0,0,99904cb2b32863a09ffb83fcecab84b233dd0123de2e668a6b9e8f875d7155c5,2024-12-09T13:15:41.060000 +CVE-2024-53816,0,1,56a2fb8e9f949caf28f6abf3b6a5ef45c79650165ee5951ebe96e003666ac947,2025-02-03T14:12:47.460000 CVE-2024-53817,0,0,90dadaca22557b01c649832be6992774e89f6486e9de4656a58ebe6910c5afc1,2024-12-06T14:15:24.217000 CVE-2024-53818,0,0,e77e8a506c52957be59aac095173757c0fff872f1f8ab7e188f0f2ad8fbf7522,2024-12-09T13:15:41.193000 CVE-2024-53819,0,0,4859512c969bce904dd8523931b7e318bbd4def68fe027c569d392260932164d,2024-12-09T13:15:41.370000 @@ -272431,7 +272431,7 @@ CVE-2024-54209,0,0,63985ab9bc81167d6b4445b0fd25467b7cea6675e8cfc38804b37f47f7d14 CVE-2024-5421,0,0,beee81272dab093d85ed7cb0c64cbc71327279f125f7ca465458d45564ecfd3c,2024-11-21T09:47:37.330000 CVE-2024-54210,0,0,f83f30ee27a661d46c5111f7262e27c9f0414dc5f3f0a660c29ce543d494f75f,2024-12-06T14:15:25.940000 CVE-2024-54211,0,0,a0003d81fa664adaeafd319382b45028c00e98bcf6fdefd355db5bce1b24339a,2024-12-06T14:15:26.093000 -CVE-2024-54212,0,0,60d354c5b09cd00ebae59ef3487f7d2dcbdfd47360fa3c7281188702d2198526,2024-12-06T14:15:26.223000 +CVE-2024-54212,0,1,da37889d055399d33765c37e42d340a0af015f6364c0cac2ae31e2305a826bce,2025-02-03T14:33:05.887000 CVE-2024-54213,0,0,509cdc61113dccf0a4117c9f17cbb87e45d7a6efba5fb2b5bc372f73d2bbb0cd,2024-12-06T14:15:26.373000 CVE-2024-54214,0,0,6a0d19ffe7e7425aef813bcf3c1322b00952909677745d5ce26bafe4dfab7e84,2024-12-20T13:15:21.880000 CVE-2024-54215,0,0,4c4972e5b1b84bb58b882a741abdc0841c8379a0be8dc9634f570589683b55f7,2024-12-20T13:15:22.060000 @@ -274007,6 +274007,7 @@ CVE-2024-57510,0,0,ec7ce8a8989b60deefa19abfcbcbedaf5465f5a18359995efee0e693e74ae CVE-2024-57513,0,0,d9e89f7fd386462137067205c175126bd9ba80cb69a686ee45d8c4ed6a916b8c,2025-01-31T20:15:31.880000 CVE-2024-57514,0,0,13fe20ec02c985be4c4a4af0379f9e9b23030591a55f13ac002a7fb596a5977e,2025-01-29T16:15:43.533000 CVE-2024-57519,0,0,1a1af74905cce20abc5596e2722805c77bb23c1788056fac531228633dff1e0a,2025-01-29T15:15:17.483000 +CVE-2024-57522,1,1,3dcb53924a3312b5156e7d870fd94d38bff105719b045de754c15a06650ea5fc,2025-02-03T13:15:21.660000 CVE-2024-5753,0,0,35e5857965ec4fb8ff4da87da0ad57743fc77f757356d105b68f8e07a9b9291a,2024-11-21T09:48:16.923000 CVE-2024-57536,0,0,02e8c7373d9548e0be6ef2dd6f50d54d1dae50f3849a42bda8fca1e700f8b5b0,2025-01-22T21:15:10.100000 CVE-2024-57537,0,0,7a57264ee99ea2cf07d8beff99c09ac577ded2e5e2c43aa0cae71e5949ab6ad2,2025-01-22T21:15:10.287000 @@ -274158,7 +274159,7 @@ CVE-2024-57791,0,0,326f1a56f934ffc176ce7b6a2932ae3ce07749c9076db086eba2ded026e10 CVE-2024-57792,0,0,e53647b80dd687b9a2a0064a755fece6d3e4e026a6a0cb58d2d0e7aa75150018,2025-01-11T13:15:29.420000 CVE-2024-57793,0,0,e9b7a7fae892be6eee516cf000e8b375a33c60ab507666266d3a6f69d2535658,2025-01-11T13:15:29.593000 CVE-2024-57795,0,0,c27fd0f8d7d3c2986e45448963a7c33f5baa1cb6168473b82dcd9b787e8c4fce,2025-01-15T13:15:11.563000 -CVE-2024-57798,0,0,5ecefb8ce5c363e3b6e1f065c95e1c5fd48fb90a22c6cad7ab6ba67696ea9a04,2025-01-11T13:15:29.743000 +CVE-2024-57798,0,1,16d3561f254b9a67268e3fd1903675f3c6069d3999c68a99ddddb4bf962c6bef,2025-02-03T14:53:23.433000 CVE-2024-57799,0,0,629fd8bffc1c970081661553b3588a57b03911cce9c0036c62f31188e3006930,2025-01-16T15:19:18.117000 CVE-2024-5780,0,0,8f257920278f73ebde8da2f9da9c11fb9d019685aae47ae6d2026dc053194989,2024-06-12T08:15:51.300000 CVE-2024-57800,0,0,cba23954046252112d98695b858677ce05a5b64f43351feb6661ff0ff5118fe8,2025-01-11T13:15:30.073000 @@ -274188,11 +274189,11 @@ CVE-2024-57857,0,0,42661a463d36aadb20f3e64c41126783ca9e0b1df58ab33691cea597d9ac1 CVE-2024-5786,0,0,8f234ab6daf42312db402cec6a9780e6a0a03ed9070824749daf6f62affc4884,2024-11-21T09:48:19.897000 CVE-2024-5787,0,0,1d58b2484cfc2497ce3be8bc315153e4937b24852bc87d95aee088e2aedc7438,2024-11-21T09:48:20.010000 CVE-2024-57872,0,0,c3ffa0e155e2ac44fac8a82673746753e090198753fbd02da0ed8386c1ecfa6e,2025-01-16T15:19:51.637000 -CVE-2024-57874,0,0,2d4c37a9463f93298b5d531547be369d281ebe5f4242275dfbd63daa277981fe,2025-01-11T15:15:07.680000 +CVE-2024-57874,0,1,ccedb437ba56ade4509587c360aa295e43ac6f245768ab4ce06e5c2a50c611e4,2025-02-03T14:55:54.650000 CVE-2024-57875,0,0,3a16f7ba20f0485e3dd71d1132dd8a89eaffde288852f03ec6f11461188bba68,2025-01-11T15:15:07.803000 CVE-2024-57876,0,0,86fef3f8a5e8b98f66eadd24a1ef85fb6575aae013277463bce306740c013a1b,2025-01-11T15:15:07.930000 -CVE-2024-57877,0,0,58da0e92f9379adbf036a527c421ff8869e65a088cd080ee09a97294a6ec4529,2025-01-11T15:15:08.063000 -CVE-2024-57878,0,0,77d31b533956ee5b0b6de4e60e536ef561084c713e8193b62763d8b53ff374bf,2025-01-11T15:15:08.190000 +CVE-2024-57877,0,1,8f0461b7329696b353e666b26223a4a86f782d67e8ce099f2b03a4f0cf6907df,2025-02-03T14:57:09.220000 +CVE-2024-57878,0,1,eab5b2d1e2790bacea3afd0970e8367d772d893b4d3c95486d955221dbe5236e,2025-02-03T14:58:14.423000 CVE-2024-57879,0,0,5750ea5676872443c5ff1996ebeb6500e7c60dbaab10547ac7ff353f213a1b38,2025-01-11T15:15:08.317000 CVE-2024-5788,0,0,26eba16faf8bba170e4c4924cd3861a76450b8d63d3d592b315f9dc173dd2a7c,2024-11-21T09:48:20.137000 CVE-2024-57880,0,0,1164249640ccbae8f44ec0303ec00ce8897de783080074e0b0de1571b4e8f28b,2025-01-11T15:15:08.440000 @@ -274228,8 +274229,8 @@ CVE-2024-57907,0,0,5c2ea095f232c69c7c12886f1f388fe794a9a0374ba46030989a606b4fcd1 CVE-2024-57908,0,0,a6e69175fc6568336ca2705f1a2065a838c7de0d0aa111e2b34f781a4bb3477d,2025-02-02T11:15:13.003000 CVE-2024-57909,0,0,20beca3b55e8ba8e1792a65aa4f8efba94e31f5b40d511d1b8cdf5c3c80696ac,2025-01-19T12:15:25.083000 CVE-2024-5791,0,0,c186795f1b9cb5c37849e995a8b3a0b74da1832637d3182b3a656dc9e7491fd6,2024-11-21T09:48:20.453000 -CVE-2024-57910,0,0,b146aea04343b179597ed928611f8f144a04705d696e26cbc5617435856b0c05,2025-02-02T11:15:13.133000 -CVE-2024-57911,0,0,03add3eed066e5de16a42c107f6d6f3f9c055886f0c00ee52300a21eb1da1ad7,2025-02-02T11:15:13.363000 +CVE-2024-57910,0,1,8608ac6abfac8f417ccdafd980c9b6946bd5a88dadccafd52a7ad793d4fd3d91,2025-02-03T14:48:35.543000 +CVE-2024-57911,0,1,1bd58cba4dcc3e15e3e807eeffd494022f72a8e294782de7f37752bb8026d96a,2025-02-03T14:51:30.527000 CVE-2024-57912,0,0,44f7160a1a37bbda2c5c7fa8c6d77c8a6a0382eb187adc2a3d7d300f4cdcdf70,2025-02-02T11:15:13.627000 CVE-2024-57913,0,0,f4c7a2492e587f9186e7f660b6755e3565a9bbd1bab88284bedc36464601cafd,2025-02-02T11:15:13.780000 CVE-2024-57914,0,0,47047672b97dc7073c40b4f814317b314574d03739889bb553935924c13faf35,2025-01-31T15:19:21.703000 @@ -274254,7 +274255,7 @@ CVE-2024-57930,0,0,94a6cd36a388f60e55b904e5c2967fc93fc62a2c24f551093d7bc1fc6ebce CVE-2024-57931,0,0,850feebef8f5e99716b8aee53bc54bf61303831fdecae3825f24d2fe16e517cd,2025-01-21T12:15:26.713000 CVE-2024-57932,0,0,f682dbce85c95d101f3a39c1ce300ce214e215cf8183d2b35f730465c3db3f0d,2025-01-21T12:15:26.837000 CVE-2024-57933,0,0,c22748b6ba91edfdf32d27e38b78d85c8b997f8cd8d2f021e949514b0586a0fd,2025-01-31T15:21:36.207000 -CVE-2024-57934,0,0,4f2279d34e133614f4f1bf4c4614a3e308bf893c7f5d63bc29ecc550fe731435,2025-01-21T12:15:27.047000 +CVE-2024-57934,0,1,207962b461429675df7424e6a2844d824397eb4a52e2c1c3a3967dca26dd7879,2025-02-03T14:52:40.740000 CVE-2024-57935,0,0,8b3eb97b6b95c3fe9d0c269036f5d7d9ad4b4664482a4f748b3e7a6a9e25f371,2025-01-21T12:15:27.153000 CVE-2024-57936,0,0,76bb9a17847208e201d8a03062287095715af2de891728ec102a50fec66b64aa,2025-01-21T12:15:27.257000 CVE-2024-57937,0,0,f2713cfe55ce0b98723add19c398fbf3ee712c696fe715eebadbe1d21a06c1df,2025-01-22T13:15:20.400000 @@ -275178,7 +275179,7 @@ CVE-2024-6786,0,0,24b60530c6034531c77c2d1b48861d1803ea99b2f9c33031d04caaeed70b36 CVE-2024-6787,0,0,90cf15e57425c43b775634b4354b40060025f05d6eaf18a16dd08f964b080f1e,2024-09-30T18:02:51.080000 CVE-2024-6788,0,0,d8b0a1fa7769433e763a36830a142df8174d088944fec86d083b39a4d3db018a,2025-01-23T18:57:17.443000 CVE-2024-6789,0,0,4b9a8b21a7b8d3b3122250d144669cc58eda4febe37ff5f20b051cf858077c6c,2024-09-16T07:15:03.877000 -CVE-2024-6790,1,1,c9ba82118eb198dcab7bef258c9b51e7baba4ab494c959cbdc0eda80f665bed4,2025-02-03T11:15:09.583000 +CVE-2024-6790,0,0,c9ba82118eb198dcab7bef258c9b51e7baba4ab494c959cbdc0eda80f665bed4,2025-02-03T11:15:09.583000 CVE-2024-6791,0,0,e4d85f8fb40ccafaaf4e816bcb0b2f9bebe7794b5d079179e81702c8126cea44,2024-11-21T09:50:20.043000 CVE-2024-6792,0,0,2dec27d0d2b25a881ca7ccc36c231e588713f0bac92b84e46fea473abaf6d1e4,2024-09-06T13:35:02.020000 CVE-2024-6793,0,0,089acc836001f0515cb87092cae48bd40391064797e4f212fffbdb1dff2f2803,2024-11-21T09:50:20.327000 @@ -277886,7 +277887,7 @@ CVE-2024-9996,0,0,433ba4c226a5a6d2212e25ce0b55b45b5a0aaae59192553eedeafbaec42bc6 CVE-2024-9997,0,0,c951d1dfad7abcf434414a546a4fccad53052e3fa40c16bd73a8c37c97d5eba8,2024-11-01T16:27:34.960000 CVE-2024-9998,0,0,0419a3dad23ae850906f2650ca4d40b180999b4a5d360bcc1b838f8893ae2af5,2024-11-12T11:15:03.840000 CVE-2024-9999,0,0,cad7c92a380ae514b71a1dd06f3b79a139ea65cb773110d32be2b942d72ae5af,2024-11-13T17:01:58.603000 -CVE-2025-0015,1,1,6c32934e2662360f0aaf48ec9aead33ec5d7f507933dfb79b328ded43c444db8,2025-02-03T11:15:09.807000 +CVE-2025-0015,0,0,6c32934e2662360f0aaf48ec9aead33ec5d7f507933dfb79b328ded43c444db8,2025-02-03T11:15:09.807000 CVE-2025-0053,0,0,b8373307f8e7839c7035660b5035e0ad8594f9f834cb4c64706371a8c3a2ce31,2025-01-14T01:15:15.403000 CVE-2025-0055,0,0,0e89795bc87c51adbc679d78b37bf974fd01b97679ad0635934ee83322d4b078,2025-01-14T01:15:15.570000 CVE-2025-0056,0,0,be034bcd972f419ff8782984466cba082295f005cb1c5e6f9c99f15962645479,2025-01-14T01:15:15.730000 @@ -278608,7 +278609,7 @@ CVE-2025-21630,0,0,b687cde38a98e756a80e569a98743dbd03093e3308ce5058c13044fa43b51 CVE-2025-21631,0,0,951b6661489b5599322546106915b833076b58b2852a68f2ceeec40d618b9337,2025-01-23T17:15:24.477000 CVE-2025-21632,0,0,319c971763f332a963bcaca50f66216a12a2c5a0d07d26ccb015f5aed2bdc246,2025-01-19T11:15:08.650000 CVE-2025-21633,0,0,5feddd6b17cfde18f8f70d5415e3d187d491e0f9f4fddbbb10eb6daf6c6066de,2025-01-19T11:15:08.773000 -CVE-2025-21634,0,0,f59bdd6262754ea5a79c93a577da540e1b81f510d9d77d33f78b7c9778d600f6,2025-01-19T11:15:08.890000 +CVE-2025-21634,0,1,c8b95aca08c2b45c9dba95d6155aefb765f07edea9819768e8b59b392e1eaba1,2025-02-03T14:42:29.407000 CVE-2025-21635,0,0,f68693db8da33a37c51f7f5f67c2bc3befefae2a56081d367cd2c2267ce553f1,2025-01-19T11:15:09 CVE-2025-21636,0,0,6097ea20b833d9169f54205d90a302acd27d436dea66efcd6b9cee92a1babbe7,2025-01-23T17:15:24.790000 CVE-2025-21637,0,0,b7a8d56ddd50af1471a0f4d7cac298ed3a55c9230ac55675f7f04a67673d6a2d,2025-01-23T17:15:25.090000 @@ -278626,7 +278627,7 @@ CVE-2025-21648,0,0,1e28b61383e7660836dbbb26d762b1871cd28f2a60ea4ccb673beb9382150 CVE-2025-21649,0,0,83a08c42f448e1e2fb20d671a214f30c7bf25568b8e5958ef29572790d694059,2025-01-31T15:56:17.907000 CVE-2025-21650,0,0,5c2cc290747169083422e01affc4fe11f3615a46223fc7a7cd149465660494c6,2025-01-19T11:15:10.630000 CVE-2025-21651,0,0,d057ff764ce31c4ac7e93c37cb4ba424635250ef668040e2530ccd52f14e89f7,2025-01-19T11:15:10.733000 -CVE-2025-21652,0,0,1a1131cb46a3082eb5d5a1a681e28e180d58365a22bacacb5866276f192831ee,2025-01-19T11:15:10.830000 +CVE-2025-21652,0,1,8787e45f49ee4a2d43e3a94c956b2f9a8a26b431f0e0a34e8824bef5db26d32b,2025-02-03T14:43:11.690000 CVE-2025-21653,0,0,4054ad842aceda82766dc1a772620a2211cc9da6d0c6c3e3c2a1ffa9a7bf55f6,2025-02-02T11:15:15.557000 CVE-2025-21654,0,0,4ec90f1484bdb180e8872bd379989357ef5549f6f68655399ae0221a6a448c8e,2025-01-24T16:15:38.177000 CVE-2025-21655,0,0,1eabdf7a355ba98b3a0c06447e719ec81e53cba37d87ec4da3249b7fa751136f,2025-01-20T14:15:27.027000