Auto-Update: 2025-02-03T15:01:14.870455+00:00

This commit is contained in:
cad-safe-bot 2025-02-03 15:04:39 +00:00
parent e9cd5db875
commit fe4c7ea4b0
67 changed files with 4068 additions and 352 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-9389",
"sourceIdentifier": "security@android.com",
"published": "2025-01-18T00:15:24.600",
"lastModified": "2025-01-23T19:56:32.087",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-03T14:15:29.937",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 2.5
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-1782",
"sourceIdentifier": "product-security@apple.com",
"published": "2021-04-02T18:15:21.373",
"lastModified": "2024-11-21T05:45:06.107",
"lastModified": "2025-02-03T14:15:30.590",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -78,6 +98,16 @@
"value": "CWE-667"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-21206",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2021-04-26T17:15:08.213",
"lastModified": "2024-11-21T05:47:46.503",
"vulnStatus": "Modified",
"lastModified": "2025-02-03T14:15:30.827",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -78,6 +98,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-21220",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2021-04-26T17:15:08.593",
"lastModified": "2024-11-21T05:47:48.220",
"vulnStatus": "Modified",
"lastModified": "2025-02-03T14:15:31.120",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -78,6 +98,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-30533",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2021-06-07T20:15:08.730",
"lastModified": "2024-11-21T06:04:07.483",
"vulnStatus": "Modified",
"lastModified": "2025-02-03T14:15:31.373",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -78,6 +98,16 @@
"value": "CWE-863"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-30554",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2021-07-02T19:15:07.893",
"lastModified": "2024-11-21T06:04:10.270",
"vulnStatus": "Modified",
"lastModified": "2025-02-03T14:15:31.783",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -78,6 +98,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-30663",
"sourceIdentifier": "product-security@apple.com",
"published": "2021-09-08T15:15:13.413",
"lastModified": "2024-11-21T06:04:23.317",
"lastModified": "2025-02-03T14:15:32.100",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -78,6 +98,16 @@
"value": "CWE-190"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-30860",
"sourceIdentifier": "product-security@apple.com",
"published": "2021-08-24T19:15:14.370",
"lastModified": "2024-11-21T06:04:51.633",
"lastModified": "2025-02-03T14:15:32.323",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -78,6 +98,16 @@
"value": "CWE-190"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-37973",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2021-10-08T22:15:08.287",
"lastModified": "2024-11-21T06:16:09.937",
"lastModified": "2025-02-03T14:15:32.667",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
],
"cvssMetricV2": [
@ -78,6 +98,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47091",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-04T18:15:07.670",
"lastModified": "2024-11-21T06:35:22.760",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T13:42:00.400",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,140 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mac80211: corrige el bloqueo en la ruta de error ieee80211_start_ap Necesitamos mantener local->mtx para liberar el contexto del canal, incluso codificado por lockdep_assert_held() all\u00ed. Arreglalo."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/87a270625a89fc841f1a7e21aae6176543d8385c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/ac61b9c6c0549aaeb98194cf429d93c41bfe5f79",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/c1d1ec4db5f7264cfc21993e59e8f2dcecf4b44f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/87a270625a89fc841f1a7e21aae6176543d8385c",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/ac61b9c6c0549aaeb98194cf429d93c41bfe5f79",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/c1d1ec4db5f7264cfc21993e59e8f2dcecf4b44f",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10",
"versionEndExcluding": "5.10.89",
"matchCriteriaId": "205A941A-BAE7-4625-8AE4-C40185E63375"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.12",
"matchCriteriaId": "732BA914-7B3B-43CD-857F-8119106F6F71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*",
"matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*",
"matchCriteriaId": "A73429BA-C2D9-4D0C-A75F-06A1CA8B3983"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F621B5E3-E99D-49E7-90B9-EC3B77C95383"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*",
"matchCriteriaId": "F7BFDCAA-1650-49AA-8462-407DD593F94F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*",
"matchCriteriaId": "6EC9882F-866D-4ACB-8FBC-213D8D8436C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8A0915FE-A4AA-4C94-B783-CF29D81E7E54"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/87a270625a89fc841f1a7e21aae6176543d8385c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ac61b9c6c0549aaeb98194cf429d93c41bfe5f79",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c1d1ec4db5f7264cfc21993e59e8f2dcecf4b44f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/87a270625a89fc841f1a7e21aae6176543d8385c",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ac61b9c6c0549aaeb98194cf429d93c41bfe5f79",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c1d1ec4db5f7264cfc21993e59e8f2dcecf4b44f",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47098",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-04T18:15:08.090",
"lastModified": "2024-11-21T06:35:23.650",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T13:49:30.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,119 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: hwmon: (lm90) Previene el desbordamiento/desbordamiento insuficiente de enteros en los c\u00e1lculos de hist\u00e9resis del commit b50aa49638c7 (\"hwmon: (lm90) Evita el desbordamiento insuficiente de enteros en los c\u00e1lculos de temperatura\") abord\u00f3 una serie de situaciones de desbordamiento insuficiente al escribir. l\u00edmites de temperatura. Sin embargo, omiti\u00f3 una situaci\u00f3n, vista cuando se intenta establecer el valor de hist\u00e9resis en MAX_LONG y el l\u00edmite de temperatura cr\u00edtica es negativo. Utilice abrazadera_val() al configurar la temperatura de hist\u00e9resis para garantizar que el valor proporcionado nunca pueda desbordarse o subestimarse."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/55840b9eae5367b5d5b29619dc2fb7e4596dba46",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/d105f30bea9104c590a9e5b495cb8a49bdfe405f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/55840b9eae5367b5d5b29619dc2fb7e4596dba46",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/d105f30bea9104c590a9e5b495cb8a49bdfe405f",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.14",
"versionEndExcluding": "5.15.2",
"matchCriteriaId": "83C305E4-14E2-4D1F-A9DF-39339AF95300"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*",
"matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*",
"matchCriteriaId": "A73429BA-C2D9-4D0C-A75F-06A1CA8B3983"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F621B5E3-E99D-49E7-90B9-EC3B77C95383"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*",
"matchCriteriaId": "F7BFDCAA-1650-49AA-8462-407DD593F94F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*",
"matchCriteriaId": "6EC9882F-866D-4ACB-8FBC-213D8D8436C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8A0915FE-A4AA-4C94-B783-CF29D81E7E54"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/55840b9eae5367b5d5b29619dc2fb7e4596dba46",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d105f30bea9104c590a9e5b495cb8a49bdfe405f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/55840b9eae5367b5d5b29619dc2fb7e4596dba46",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d105f30bea9104c590a9e5b495cb8a49bdfe405f",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47100",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-04T18:15:08.267",
"lastModified": "2024-11-21T06:35:23.917",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T13:51:24.110",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,47 +15,182 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ipmi: corrige UAF al desinstalar los m\u00f3dulos ipmi_si e ipmi_msghandler Hola. Al probar la instalaci\u00f3n y desinstalaci\u00f3n de ipmi_si.ko e ipmi_msghandler.ko, el sistema fall\u00f3. El registro es el siguiente: [141.087026] ERROR: no se puede manejar la solicitud de paginaci\u00f3n del kernel en ffffffffc09b3a5a [141.087241] PGD 8fe4c0d067 P4D 8fe4c0d067 PUD 8fe4c0f067 PMD 103ad89067 PTE 0 [141.087464] Vaya s: 0010 [#1] SMP NOPTI [ 141.087580] CPU: 67 PID : 668 Comm: kworker/67:1 Kdump: cargado No contaminado 4.18.0.x86_64 #47 [ 141.088009] Cola de trabajo: eventos 0xffffffffc09b3a40 [ 141.088009] RIP: 0010:0xffffffffc09b3a5a [ 141.088009] C\u00f3digo: Valor RIP incorrecto. [ 141.088009] RSP: 0018:ffffb9094e2c3e88 EFLAGS: 00010246 [ 141.088009] RAX: 00000000000000000 RBX: ffff9abfdb1f04a0 RCX: 0000000000000000 [ 14 1.088009] RDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246 [ 141.088009] RBP: 000000000000000000 R08: ffff9abfffee3cb8 R09: 00 000000000002e1 [141.088009] R10: ffffb9094cb73d90 R11: 00000000000f4240 R12: ffff9abfffee8700 [ 141.088009] R13: 00000000000000000 R14: ffff9abfdb1f04a0 R15: ffff9abfdb1f04a8 [ 141.088009] FS: 0000000000000000(0000) GS:ffff9abfffec0000(0000) knlGS:0000000000000000 [ 141.088009] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 141.088009] CR2: ffffffffc09b3a30 CR3: 0000008fe4c0a001 CR4: 00000000007606e0 [ 141.088009] DR0: 00000000000000 00 DR1: 0000000000000000 DR2: 00000000000000000 [ 141.088009] DR3: 0000000000000000 DR6: 00000000ffe0ff0 DR7: 0000000000000400 [ 141.088009] PKRU: 55555554 [ 141.088009] Llamar Seguimiento: [141.088009]? proceso_one_work+0x195/0x390 [141.088009]? hilo_trabajador+0x30/0x390 [141.088009]? proceso_one_work+0x390/0x390 [141.088009]? kthread+0x10d/0x130 [141.088009]? kthread_flush_work_fn+0x10/0x10 [141.088009]? ret_from_fork+0x35/0x40] ERROR: no se puede manejar la solicitud de paginaci\u00f3n del kernel en ffffffffc0b28a5a [200.223240] PGD 97fe00d067 P4D 97fe00d067 PUD 97fe00f067 PMD a580cbf067 PTE 0 [200.223464] Vaya : 0010 [#1] SMP NOPTI [ 200.223579] CPU: 63 PID: 664 Comm: kworker/63:1 Kdump: cargado No contaminado 4.18.0.x86_64 #46 [200.224008] Cola de trabajo: eventos 0xffffffffc0b28a40 [200.224008] RIP: 0010:0xffffffffc0b28a5a [200.224008] C\u00f3digo: RIP incorrecto valor. [ 200.224008] RSP: 0018:ffffbf3c8e2a3e88 EFLAGS: 00010246 [ 200.224008] RAX: 00000000000000000 RBX: ffffa0799ad6bca0 RCX: 0000000000000000 [ 200 .224008] RDX: 0000000000000000 RSI: 00000000000000246 RDI: 0000000000000246 [ 200.224008] RBP: 00000000000000000 R08: ffff9fe43fde3cb8 R09: 00 000000000000d5 [200.224008] R10: fffffbf3c8cb53d90 R11: 00000000000f4240 R12: ffff9fe43fde8700 [ 200.224008] R13: 00000000000000000 R14: ffffa0799ad6bca0 R15: ffffa0799ad6bca8 [ 200.224008] FS: 0000000000000000(0000) GS:ffff9fe43fdc0000(0000) knlGS:00000000000000000 [ 200.224008] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 200.224008] CR2: ffffffffc0b28a30 CR3: 00000097fe00a002 CR4: 00000000007606e0 [ 200.224008] DR0: 00000000000000 00 DR1: 0000000000000000 DR2: 00000000000000000 [ 200.224008] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 200.224008] PKRU: 55555554 [ 200.224008] Llamar Seguimiento: [200.224008] ? proceso_one_work+0x195/0x390 [200.224008]? hilo_trabajador+0x30/0x390 [200.224008]? proceso_one_work+0x390/0x390 [200.224008]? kthread+0x10d/0x130 [200.224008]? kthread_flush_work_fn+0x10/0x10 [200.224008]? ret_from_fork+0x35/0x40 [200.224008] Notificaci\u00f3n de falla del kernel (0x1) que comienza en la CPU 63 [200.224008] Notificaci\u00f3n de falla del kernel (0x1) finalizada en la CPU 63 [200.224008] CR2: ffffffffc0b28a5a [200.224008] ---[ end trace c82a41 2d93f57412 ]-- - El motivo es el siguiente: T1: rmmod ipmi_si. ->ipmi_unregister_smi() -> ipmi_bmc_unregister() -> __ipmi_bmc_unregister() -> kref_put(&bmc->usecount, cleanup_bmc_device); -> programar_trabajo(&bmc->remove_work); T2: rmmod ipmi_msghandl"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.223",
"matchCriteriaId": "5C88C05D-FA25-4086-A781-7092BAF56D64"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.169",
"matchCriteriaId": "BDD2EE60-3484-4845-AC26-6AB31C278192"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.89",
"matchCriteriaId": "2A2152BA-053D-4847-B29B-68F543546AB3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.12",
"matchCriteriaId": "732BA914-7B3B-43CD-857F-8119106F6F71"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*",
"matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*",
"matchCriteriaId": "A73429BA-C2D9-4D0C-A75F-06A1CA8B3983"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F621B5E3-E99D-49E7-90B9-EC3B77C95383"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*",
"matchCriteriaId": "F7BFDCAA-1650-49AA-8462-407DD593F94F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*",
"matchCriteriaId": "6EC9882F-866D-4ACB-8FBC-213D8D8436C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8A0915FE-A4AA-4C94-B783-CF29D81E7E54"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-47101",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-04T18:15:08.450",
"lastModified": "2024-11-21T06:35:24.037",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:02:18.480",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,119 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: asix: corrige el valor uninit en asix_mdio_read() asix_read_cmd() puede leer menos que sizeof(smsr) bytes y en este caso smsr no estar\u00e1 inicializado. Registro de errores: ERROR: KMSAN: valor uninit en asix_check_host_enable drivers/net/usb/asix_common.c:82 [en l\u00ednea] ERROR: KMSAN: valor uninit en asix_check_host_enable drivers/net/usb/asix_common.c:82 controladores [en l\u00ednea] /net/usb/asix_common.c:497 ERROR: KMSAN: valor uninit en asix_mdio_read+0x3c1/0xb00 drivers/net/usb/asix_common.c:497 drivers/net/usb/asix_common.c:497 asix_check_host_enable drivers/net/ usb/asix_common.c:82 [en l\u00ednea] controladores asix_check_host_enable/net/usb/asix_common.c:82 [en l\u00ednea] controladores/net/usb/asix_common.c:497 controladores asix_mdio_read+0x3c1/0xb00/net/usb/asix_common.c :497 controladores/net/usb/asix_common.c:497"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/8035b1a2a37a29d8c717ef84fca8fe7278bc9f03",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/d259f621c85949f30cc578cac813b82bb5169f56",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/8035b1a2a37a29d8c717ef84fca8fe7278bc9f03",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/d259f621c85949f30cc578cac813b82bb5169f56",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-908"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.9",
"versionEndExcluding": "5.15.12",
"matchCriteriaId": "9C86D33C-E1B6-41AB-BEF8-29F8D745A138"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*",
"matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*",
"matchCriteriaId": "A73429BA-C2D9-4D0C-A75F-06A1CA8B3983"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*",
"matchCriteriaId": "F621B5E3-E99D-49E7-90B9-EC3B77C95383"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*",
"matchCriteriaId": "F7BFDCAA-1650-49AA-8462-407DD593F94F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*",
"matchCriteriaId": "6EC9882F-866D-4ACB-8FBC-213D8D8436C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8A0915FE-A4AA-4C94-B783-CF29D81E7E54"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/8035b1a2a37a29d8c717ef84fca8fe7278bc9f03",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d259f621c85949f30cc578cac813b82bb5169f56",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8035b1a2a37a29d8c717ef84fca8fe7278bc9f03",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d259f621c85949f30cc578cac813b82bb5169f56",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-2294",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2022-07-28T02:15:07.797",
"lastModified": "2024-11-21T07:00:42.523",
"lastModified": "2025-02-03T14:15:33.053",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -53,6 +73,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3075",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2022-09-26T16:15:13.463",
"lastModified": "2024-11-21T07:18:46.293",
"lastModified": "2025-02-03T14:15:33.320",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
@ -53,6 +73,16 @@
"value": "CWE-20"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3723",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2022-11-01T23:15:19.710",
"lastModified": "2024-11-21T07:20:06.520",
"lastModified": "2025-02-03T14:15:33.637",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -53,6 +73,16 @@
"value": "CWE-843"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4135",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2022-11-25T01:15:09.957",
"lastModified": "2024-11-21T07:34:38.600",
"lastModified": "2025-02-03T14:15:33.897",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
@ -53,6 +73,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48630",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-05T12:15:45.780",
"lastModified": "2024-11-21T07:33:38.930",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:09:55.317",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,55 +15,213 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: crypto: qcom-rng: corrige el bucle infinito en solicitudes que no sean m\u00faltiples de WORD_SZ. El commit a la que se hace referencia en la etiqueta Fixes elimin\u00f3 la 'ruptura' de la rama else en qcom_rng_read(), lo que provoc\u00f3 una bucle infinito siempre que 'max' no sea un m\u00faltiplo de WORD_SZ. Esto se puede reproducir, por ejemplo, ejecutando: kcapi-rng -b 67 >/dev/null Hay muchas formas de solucionar este problema sin volver a agregar el 'descanso', pero todas parecen m\u00e1s inc\u00f3modas que simplemente volver a agregarlo, as\u00ed que hazlo. Probado en una m\u00e1quina con procesador Qualcomm Amberwing."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/05d4d17475d8d094c519bb51658bc47899c175e3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/16287397ec5c08aa58db6acf7dbc55470d78087d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/233a3cc60e7a8fe0be8cf9934ae7b67ba25a866c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/71a89789552b7faf3ef27969b9bc783fa0df3550",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8a06f25f5941c145773204f2f7abef95b4ffb8ce",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8be06f62b426801dba43ddf8893952a0e62ab6ae",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/05d4d17475d8d094c519bb51658bc47899c175e3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/16287397ec5c08aa58db6acf7dbc55470d78087d",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/233a3cc60e7a8fe0be8cf9934ae7b67ba25a866c",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/71a89789552b7faf3ef27969b9bc783fa0df3550",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/8a06f25f5941c145773204f2f7abef95b4ffb8ce",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/8be06f62b426801dba43ddf8893952a0e62ab6ae",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-835"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.19.236",
"versionEndExcluding": "4.19.245",
"matchCriteriaId": "90CA0C29-659F-4285-B5C0-F4F9303CCA02"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4.187",
"versionEndExcluding": "5.4.196",
"matchCriteriaId": "EA59FE65-870A-4BF7-8624-F76F50276DD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10.108",
"versionEndExcluding": "5.10.118",
"matchCriteriaId": "563451EB-38D3-4F95-81D0-5AE1AF7490E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.15.31",
"versionEndExcluding": "5.15.42",
"matchCriteriaId": "525F7F2B-3F39-4BF6-841B-313E80A92E89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.17",
"versionEndExcluding": "5.17.10",
"matchCriteriaId": "D634AA3E-A052-40C6-A749-5B2BE8652ABC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*",
"matchCriteriaId": "6AD94161-84BB-42E6-9882-4FC0C42E9FC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*",
"matchCriteriaId": "7AB06DDF-3C2B-416D-B448-E990D8FF67A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc3:*:*:*:*:*:*",
"matchCriteriaId": "EAE6C6C5-4D21-4C04-897C-70CBBB3D7B91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc4:*:*:*:*:*:*",
"matchCriteriaId": "DA5F085D-52F3-4EE2-8353-455D1A6FE073"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc5:*:*:*:*:*:*",
"matchCriteriaId": "D6EE5B78-0D83-4715-893C-ABD69B49E7FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc6:*:*:*:*:*:*",
"matchCriteriaId": "EE723F14-047B-4FCF-B109-E0542EDFB063"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc7:*:*:*:*:*:*",
"matchCriteriaId": "2FCFCE58-5118-4D05-864E-C82CF20EABE5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc9:*:*:*:*:*:*",
"matchCriteriaId": "9C3E5BC9-613C-4362-BF02-153A5BBFFB2F"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/05d4d17475d8d094c519bb51658bc47899c175e3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/16287397ec5c08aa58db6acf7dbc55470d78087d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/233a3cc60e7a8fe0be8cf9934ae7b67ba25a866c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/71a89789552b7faf3ef27969b9bc783fa0df3550",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8a06f25f5941c145773204f2f7abef95b4ffb8ce",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8be06f62b426801dba43ddf8893952a0e62ab6ae",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/05d4d17475d8d094c519bb51658bc47899c175e3",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/16287397ec5c08aa58db6acf7dbc55470d78087d",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/233a3cc60e7a8fe0be8cf9934ae7b67ba25a866c",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/71a89789552b7faf3ef27969b9bc783fa0df3550",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8a06f25f5941c145773204f2f7abef95b4ffb8ce",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8be06f62b426801dba43ddf8893952a0e62ab6ae",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23715",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-09T13:15:20.390",
"lastModified": "2024-12-09T13:15:20.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-03T14:32:10.613",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.9,
"impactScore": 4.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/jobboardwp/vulnerability/wordpress-jobboardwp-job-board-listings-and-submissions-plugin-1-2-2-idor-leading-to-job-removal-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ultimatemember:jobboardwp:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.2.2",
"matchCriteriaId": "B434A92A-AC23-4BF7-AEC2-B1E0C3839800"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/jobboardwp/vulnerability/wordpress-jobboardwp-job-board-listings-and-submissions-plugin-1-2-2-idor-leading-to-job-removal-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28204",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-06-23T18:15:11.333",
"lastModified": "2024-11-21T07:54:35.760",
"lastModified": "2025-02-03T14:15:34.167",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-32373",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-06-23T18:15:12.007",
"lastModified": "2024-11-21T08:03:13.570",
"lastModified": "2025-02-03T14:15:34.500",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32434",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-06-23T18:15:13.720",
"lastModified": "2025-01-23T16:53:39.523",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-03T14:15:34.723",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-190"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32439",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-06-23T18:15:13.813",
"lastModified": "2025-01-23T16:36:05.110",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-03T14:15:34.930",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-843"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"configurations": [
@ -183,6 +213,7 @@
"url": "https://support.apple.com/en-us/HT213811",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
@ -190,6 +221,7 @@
"url": "https://support.apple.com/en-us/HT213813",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
@ -197,6 +229,7 @@
"url": "https://support.apple.com/en-us/HT213814",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
@ -204,6 +237,7 @@
"url": "https://support.apple.com/en-us/HT213816",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37450",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-07-27T00:15:15.497",
"lastModified": "2025-01-23T16:36:38.280",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-03T14:15:35.167",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41064",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-09-07T18:15:07.727",
"lastModified": "2024-11-29T14:30:06.457",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-03T14:15:35.367",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -53,6 +73,16 @@
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41990",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-09-12T00:15:09.463",
"lastModified": "2024-11-29T14:39:00.893",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-03T14:15:35.587",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41991",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-09-21T19:15:11.283",
"lastModified": "2024-11-29T14:41:00.430",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-03T14:15:35.770",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -53,6 +73,16 @@
"value": "CWE-295"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41992",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-09-21T19:15:11.520",
"lastModified": "2024-11-29T14:41:50.523",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-03T14:15:35.983",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -53,6 +73,16 @@
"value": "CWE-754"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-754"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-42234",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-13T22:15:11.593",
"lastModified": "2025-01-13T22:15:11.593",
"lastModified": "2025-02-03T14:15:36.287",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 es vulnerable a Cross Site Request Forgery (CSRF) a trav\u00e9s de la funci\u00f3n WSCView."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://gitlab.com/daniele_m/cve-list/-/blob/main/README.md",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42824",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-10-04T19:15:10.490",
"lastModified": "2024-11-29T14:58:56.110",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-03T14:15:36.527",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42917",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-11-30T23:15:07.280",
"lastModified": "2025-01-23T16:37:02.693",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-03T14:15:36.743",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -53,6 +73,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
@ -443,7 +473,8 @@
"url": "https://www.debian.org/security/2023/dsa-5575",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4863",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-12T15:15:24.327",
"lastModified": "2024-12-20T19:00:21.050",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-03T14:15:37.023",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -53,6 +73,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
@ -417,21 +447,24 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html",
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html",
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html",
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{
@ -575,6 +608,7 @@
"url": "https://www.debian.org/security/2023/dsa-5498",
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
@ -820,7 +854,8 @@
"url": "https://news.ycombinator.com/item?id=37478403",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
"Exploit",
"Third Party Advisory"
]
},
{
@ -899,7 +934,8 @@
"url": "https://www.debian.org/security/2023/dsa-5498",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
"Mailing List",
"Third Party Advisory"
]
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52583",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-06T07:15:06.553",
"lastModified": "2024-11-21T08:40:07.307",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:18:13.147",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,79 +15,243 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ceph: corrige el punto muerto o el c\u00f3digo muerto por uso incorrecto de dget() El orden de bloqueo es incorrecto entre denty y su padre, siempre debemos asegurarnos de que el padre obtenga el bloqueo primero. Pero dado que este c\u00f3digo muerto nunca se usa y el directorio principal siempre ser\u00e1 configurado por quienes llaman, simplemente elimin\u00e9moslo."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/196b87e5c00ce021e164a5de0f0d04f4116a9160",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/6ab4fd508fad942f1f1ba940492f2735e078e980",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/76cb2aa3421fee4fde706dec41b1344bc0a9ad67",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/7f2649c94264d00df6b6ac27161e9f4372a3450e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/a9c15d6e8aee074fae66c04d114f20b84274fcca",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b493ad718b1f0357394d2cdecbf00a44a36fa085",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e016e358461b89b231626fcf78c5c38e35c44fd3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/196b87e5c00ce021e164a5de0f0d04f4116a9160",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/6ab4fd508fad942f1f1ba940492f2735e078e980",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/76cb2aa3421fee4fde706dec41b1344bc0a9ad67",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/7f2649c94264d00df6b6ac27161e9f4372a3450e",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/a9c15d6e8aee074fae66c04d114f20b84274fcca",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/b493ad718b1f0357394d2cdecbf00a44a36fa085",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/e016e358461b89b231626fcf78c5c38e35c44fd3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.19.307",
"matchCriteriaId": "4B4E1A83-9957-4265-94C0-516374C8CCFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.269",
"matchCriteriaId": "319545F3-D56C-4751-BEBF-0505478BBAE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.210",
"matchCriteriaId": "F5CB4CA6-A9A0-4AFD-9102-8CF94D708170"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.149",
"matchCriteriaId": "0D0465BB-4053-4E15-9137-6696EBAE90FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.77",
"matchCriteriaId": "0FA28946-970D-4F4D-B759-4E77B28809B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.16",
"matchCriteriaId": "A5007D6A-4B58-423A-8A3A-A1A656A263C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.4",
"matchCriteriaId": "848BC44C-9D25-4557-A50A-4B8BF310FA78"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/196b87e5c00ce021e164a5de0f0d04f4116a9160",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6ab4fd508fad942f1f1ba940492f2735e078e980",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/76cb2aa3421fee4fde706dec41b1344bc0a9ad67",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7f2649c94264d00df6b6ac27161e9f4372a3450e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a9c15d6e8aee074fae66c04d114f20b84274fcca",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b493ad718b1f0357394d2cdecbf00a44a36fa085",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e016e358461b89b231626fcf78c5c38e35c44fd3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/196b87e5c00ce021e164a5de0f0d04f4116a9160",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6ab4fd508fad942f1f1ba940492f2735e078e980",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/76cb2aa3421fee4fde706dec41b1344bc0a9ad67",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7f2649c94264d00df6b6ac27161e9f4372a3450e",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a9c15d6e8aee074fae66c04d114f20b84274fcca",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b493ad718b1f0357394d2cdecbf00a44a36fa085",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e016e358461b89b231626fcf78c5c38e35c44fd3",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5217",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-28T16:15:10.980",
"lastModified": "2024-12-20T19:01:23.347",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-03T14:15:37.370",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -53,6 +73,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6345",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-29T12:15:07.077",
"lastModified": "2024-12-20T19:00:58.223",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-03T14:15:37.710",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
@ -53,6 +73,16 @@
"value": "CWE-190"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7024",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-12-21T23:15:11.213",
"lastModified": "2024-12-20T19:01:40.967",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-03T14:15:37.920",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -53,6 +73,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11420",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-05T10:31:39.750",
"lastModified": "2024-12-05T10:31:39.750",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-03T14:39:02.507",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://themes.trac.wordpress.org/changeset/249744/blocksy/2.0.78/inc/components/contacts-box.php",
"source": "security@wordfence.com"
},
"nodes": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/02ad47d5-f011-4e0a-af29-088852d1e886?source=cve",
"source": "security@wordfence.com"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:creativethemes:blocksy:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.0.78",
"matchCriteriaId": "18E3F328-4F1D-446D-A87B-5E1860094BF3"
}
]
}
]
}
],
"references": [
{
"url": "https://themes.trac.wordpress.org/changeset/249744/blocksy/2.0.78/inc/components/contacts-box.php",
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/02ad47d5-f011-4e0a-af29-088852d1e886?source=cve",
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23222",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-23T01:15:11.500",
"lastModified": "2024-11-29T15:05:53.577",
"vulnStatus": "Analyzed",
"lastModified": "2025-02-03T14:15:38.223",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26654",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-01T09:15:51.063",
"lastModified": "2024-11-21T09:02:46.457",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:32:27.763",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,83 +15,263 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: sh: aica: reordenar operaciones de limpieza para evitar errores UAF. El dreamcastcard->timer podr\u00eda programar el spu_dma_work y el spu_dma_work tambi\u00e9n podr\u00eda armar el dreamcastcard->timer. Cuando se cierre snd_pcm_substream, se desasignar\u00e1 aica_channel. Pero a\u00fan se podr\u00eda eliminar la referencia en el hilo del trabajador. La raz\u00f3n es que del_timer() regresar\u00e1 directamente independientemente de si el controlador del temporizador se est\u00e1 ejecutando o no y el trabajador podr\u00eda reprogramarse en el controlador del temporizador. Como resultado, se producir\u00e1 el error UAF. La situaci\u00f3n picante se muestra a continuaci\u00f3n: (Thread 1) | (Thread 2) snd_aicapcm_pcm_close() | ... | run_spu_dma() //worker | mod_timer() flush_work() | del_timer() | aica_period_elapsed() //timer kfree(dreamcastcard->channel) | schedule_work() | run_spu_dma() //worker ... | dreamcastcard->channel-> //USE Para mitigar este error y otros posibles casos extremos, llame a mod_timer() condicionalmente en run_spu_dma(), luego implemente la operaci\u00f3n PCM sync_stop para cancelar tanto el temporizador como el trabajador. La operaci\u00f3n sync_stop se llamar\u00e1 desde el n\u00facleo PCM de forma adecuada cuando sea necesario."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/051e0840ffa8ab25554d6b14b62c9ab9e4901457",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/3c907bf56905de7d27b329afaf59c2fb35d17b04",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/4206ad65a0ee76920041a755bd3c17c6ba59bba2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/61d4787692c1fccdc268ffa7a891f9c149f50901",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/8c990221681688da34295d6d76cc2f5b963e83f5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/9d66ae0e7bb78b54e1e0525456c6b54e1d132046",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/aa39e6878f61f50892ee2dd9d2176f72020be845",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e955e8a7f38a856fc6534ba4e6bffd4d5cc80ac3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/eeb2a2ca0b8de7e1c66afaf719529154e7dc60b2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/051e0840ffa8ab25554d6b14b62c9ab9e4901457",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/3c907bf56905de7d27b329afaf59c2fb35d17b04",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/4206ad65a0ee76920041a755bd3c17c6ba59bba2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/61d4787692c1fccdc268ffa7a891f9c149f50901",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/8c990221681688da34295d6d76cc2f5b963e83f5",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/9d66ae0e7bb78b54e1e0525456c6b54e1d132046",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/aa39e6878f61f50892ee2dd9d2176f72020be845",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/e955e8a7f38a856fc6534ba4e6bffd4d5cc80ac3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/eeb2a2ca0b8de7e1c66afaf719529154e7dc60b2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.6.23",
"versionEndExcluding": "4.19.312",
"matchCriteriaId": "5FCC9944-2B27-4800-9B5A-6C9508FEAA0D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.274",
"matchCriteriaId": "F45A0F3C-C16D-49C4-86D6-D021C3D4B834"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.215",
"matchCriteriaId": "9CD5894E-58E9-4B4A-B0F4-3E6BC134B8F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.154",
"matchCriteriaId": "577E212E-7E95-4A71-9B5C-F1D1A3AFFF46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.84",
"matchCriteriaId": "834D9BD5-42A6-4D74-979E-4D6D93F630FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.24",
"matchCriteriaId": "8018C1D0-0A5F-48D0-BC72-A2B33FDDA693"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.7.12",
"matchCriteriaId": "6BE9771A-BAFD-4624-95F9-58D536540C53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.8",
"versionEndExcluding": "6.8.3",
"matchCriteriaId": "4C59BBC3-6495-4A77-9C82-55EC7CDF5E02"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "22BEDD49-2C6D-402D-9DBF-6646F6ECD10B"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/051e0840ffa8ab25554d6b14b62c9ab9e4901457",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3c907bf56905de7d27b329afaf59c2fb35d17b04",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4206ad65a0ee76920041a755bd3c17c6ba59bba2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/61d4787692c1fccdc268ffa7a891f9c149f50901",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8c990221681688da34295d6d76cc2f5b963e83f5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9d66ae0e7bb78b54e1e0525456c6b54e1d132046",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/aa39e6878f61f50892ee2dd9d2176f72020be845",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e955e8a7f38a856fc6534ba4e6bffd4d5cc80ac3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/eeb2a2ca0b8de7e1c66afaf719529154e7dc60b2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/051e0840ffa8ab25554d6b14b62c9ab9e4901457",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3c907bf56905de7d27b329afaf59c2fb35d17b04",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4206ad65a0ee76920041a755bd3c17c6ba59bba2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/61d4787692c1fccdc268ffa7a891f9c149f50901",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8c990221681688da34295d6d76cc2f5b963e83f5",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9d66ae0e7bb78b54e1e0525456c6b54e1d132046",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/aa39e6878f61f50892ee2dd9d2176f72020be845",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e955e8a7f38a856fc6534ba4e6bffd4d5cc80ac3",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/eeb2a2ca0b8de7e1c66afaf719529154e7dc60b2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28973",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-06-26T03:15:09.640",
"lastModified": "2024-11-21T09:07:18.133",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:59:08.020",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
@ -51,14 +71,109 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities",
"source": "security_alert@emc.com"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:data_domain_operating_system:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0",
"versionEndIncluding": "7.13",
"matchCriteriaId": "51B3D8A3-950B-4D4E-9E4D-7D1ADE791C93"
}
]
},
{
"url": "https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:dd3300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA4D9616-4482-4173-9507-6B8EC15F3521"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:dd6400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A81372F-E8DC-49AB-AC12-700F76D4C2C6"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:dd6900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5525030D-2AA9-4AB6-8B15-D09214C1834E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:dd9400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C08E46D-6795-46DB-BA6C-548D7B8EBFA5"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:dd9410:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F820D2BB-4773-4B2F-BC50-9474B44DB8F6"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:dd9900:-:*:*:*:*:*:*:*",
"matchCriteriaId": "105F8F20-3EB3-49E7-82BE-3A5742EAA51E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:dd9910:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84F58819-777E-43C1-B1EA-FFD7CDF79234"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:data_domain_operating_system:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.16.0.0",
"matchCriteriaId": "D655A40E-7358-4E29-BDC6-8CC2E8BA1D63"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:dm5500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B15806F-F6F1-4B26-921C-FE7620B3539F"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities",
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.dell.com/support/kbdoc/en-us/000226148/dsa-2024-219-dell-technologies-powerprotect-dd-security-update-for-multiple-security-vulnerabilities",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37052",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:10.413",
"lastModified": "2024-11-21T09:23:06.550",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:35:02.407",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,52 @@
"value": "CWE-502"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.1.0",
"matchCriteriaId": "13C996BA-41B9-44D0-8E47-B21DD510FAAA"
}
]
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37053",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:10.957",
"lastModified": "2024-11-21T09:23:06.690",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:35:07.880",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,52 @@
"value": "CWE-502"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.1.0",
"matchCriteriaId": "13C996BA-41B9-44D0-8E47-B21DD510FAAA"
}
]
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37054",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:11.190",
"lastModified": "2024-11-21T09:23:06.817",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:40:37.527",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,52 @@
"value": "CWE-502"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.9.0",
"matchCriteriaId": "E10BF8AE-F58F-44F2-9BDB-B74DD0B9F651"
}
]
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37055",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:11.397",
"lastModified": "2024-11-21T09:23:06.957",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:44:39.397",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,52 @@
"value": "CWE-502"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.24.0",
"matchCriteriaId": "775B6F3C-5DCE-4A7D-AA00-F48D1E2D7BBB"
}
]
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37056",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:11.593",
"lastModified": "2024-11-21T09:23:07.080",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:45:07.183",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,52 @@
"value": "CWE-502"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.23.0",
"matchCriteriaId": "E256784A-86A3-4D97-9C4E-6964FBCD0B70"
}
]
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37057",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:11.800",
"lastModified": "2024-11-21T09:23:07.260",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:45:23.600",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,52 @@
"value": "CWE-502"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"matchCriteriaId": "E9F5521A-2CCF-4B25-926F-DE7660BF7741"
}
]
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37058",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:12.023",
"lastModified": "2024-11-21T09:23:07.470",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:46:16.247",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,52 @@
"value": "CWE-502"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.5.0",
"matchCriteriaId": "0D1D1BBC-51F8-4197-9CA0-22EBE4AE9AA1"
}
]
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37059",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:12.227",
"lastModified": "2024-11-21T09:23:07.600",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:46:23.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,52 @@
"value": "CWE-502"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.5.0",
"matchCriteriaId": "133E0FDE-6C06-4CEE-A7B0-11A4E4980846"
}
]
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37060",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:12.463",
"lastModified": "2024-11-21T09:23:07.720",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:46:31.613",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,52 @@
"value": "CWE-502"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.27.0",
"matchCriteriaId": "4241DDBF-AB24-44C5-B4D4-8E5655ABB0B6"
}
]
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37061",
"sourceIdentifier": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"published": "2024-06-04T12:15:12.703",
"lastModified": "2024-11-21T09:23:07.847",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:48:37.123",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,52 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.11.0",
"matchCriteriaId": "0F94208E-BA82-4716-A308-9DF1B8751069"
}
]
}
]
}
],
"references": [
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c"
"source": "6f8de1f0-f67e-45a6-b68f-98777fdb759c",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://hiddenlayer.com/sai-security-advisory/mlflow-june2024",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42422",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-12-03T13:15:04.987",
"lastModified": "2024-12-03T13:15:04.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:40:15.143",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -51,10 +71,38 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000255892/dsa-2024-478-security-update-for-dell-networker-vulnerabilities",
"source": "security_alert@emc.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:networker:*:*:*:*:*:*:*:*",
"versionEndExcluding": "19.10.0.6",
"matchCriteriaId": "124F9A33-D975-45CC-B2D7-DA3D06BD1DA8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:networker:*:*:*:*:*:*:*:*",
"versionStartIncluding": "19.11",
"versionEndExcluding": "19.11.0.3",
"matchCriteriaId": "B40F40DF-55D2-4738-8DBA-E01689612A33"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000255892/dsa-2024-478-security-update-for-dell-networker-vulnerabilities",
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47476",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-12-03T10:15:05.883",
"lastModified": "2024-12-03T10:15:05.883",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:48:29.350",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -51,10 +71,30 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000255884/dsa-2024-477-security-update-for-dell-networker-runtime-environment-nre-multiple-component-vulnerabilities",
"source": "security_alert@emc.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:networker_management_console:8.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "50351F3C-674A-4812-83D8-884A80CD49C7"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000255884/dsa-2024-477-security-update-for-dell-networker-runtime-environment-nre-multiple-component-vulnerabilities",
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-53802",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-06T14:15:22.430",
"lastModified": "2024-12-06T14:15:22.430",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-03T14:36:22.700",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/futurio-extra/vulnerability/wordpress-futurio-extra-plugin-2-0-14-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:futuriowp:futurio_extra:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.0.15",
"matchCriteriaId": "C435AFFB-6813-4B0A-B961-B5AB6D10C93F"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/futurio-extra/vulnerability/wordpress-futurio-extra-plugin-2-0-14-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-53816",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-09T13:15:41.060",
"lastModified": "2024-12-09T13:15:41.060",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-03T14:12:47.460",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/tutor-lms-elementor-addons/vulnerability/wordpress-tutor-lms-elementor-addons-plugin-2-1-5-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:themeum:tutor_lms_elementor_addons:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.1.6",
"matchCriteriaId": "21A4EC5C-7679-4408-AD79-C9681D9501C2"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/tutor-lms-elementor-addons/vulnerability/wordpress-tutor-lms-elementor-addons-plugin-2-1-5-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54212",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-06T14:15:26.223",
"lastModified": "2024-12-06T14:15:26.223",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-03T14:33:05.887",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,10 +71,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://patchstack.com/database/wordpress/plugin/magical-addons-for-elementor/vulnerability/wordpress-magical-addons-for-elementor-plugin-1-2-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpthemespace:magical_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.2.6",
"matchCriteriaId": "4AC655FD-47A4-45F6-9DA1-E2DEFE77FDE3"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/wordpress/plugin/magical-addons-for-elementor/vulnerability/wordpress-magical-addons-for-elementor-plugin-1-2-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-57522",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T13:15:21.660",
"lastModified": "2025-02-03T13:15:21.660",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SourceCodester Packers and Movers Management System v1.0 is vulnerable to Cross Site Scripting (XSS) in Users.php. An attacker can inject a malicious script into the username or name field during user creation."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/HackWidMaddy/CVE-2024-57522",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57798",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-11T13:15:29.743",
"lastModified": "2025-01-11T13:15:29.743",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:53:23.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,111 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/dp_mst: garantizar que el puntero mst_primary sea v\u00e1lido en drm_dp_mst_handle_up_req() Al recibir un mensaje de solicitud de activaci\u00f3n de MST de un hilo en drm_dp_mst_handle_up_req(), la topolog\u00eda de MST podr\u00eda eliminarse de otro hilo mediante drm_dp_mst_topology_mgr_set_mst(false), liberando mst_primary y estableciendo drm_dp_mst_topology_mgr::mst_primary en NULL. Esto podr\u00eda conducir a una desreferencia/use after free de NULL de mst_primary en drm_dp_mst_handle_up_req(). Evite lo anterior manteniendo una referencia para mst_primary en drm_dp_mst_handle_up_req() mientras se usa. v2: Se soluciona el problema de liberar la solicitud si falla la obtenci\u00f3n de una referencia mst_primary."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/9735d40f5fde9970aa46e828ecc85c32571d58a2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
},
{
"url": "https://git.kernel.org/stable/c/ce55818b2d3a999f886af91679589e4644ff1dc8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e54b00086f7473dbda1a7d6fc47720ced157c6a8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f61b2e5e7821f868d6afc22382a66a30ee780ba0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.123",
"matchCriteriaId": "23D99EE1-5930-489B-A260-CFCD6BE66A9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.69",
"matchCriteriaId": "EF18E3CB-058C-4836-B36D-8073F1C09977"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.8",
"matchCriteriaId": "E79883DD-75BE-4DA9-B4EC-AC6DE63BD438"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/9735d40f5fde9970aa46e828ecc85c32571d58a2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ce55818b2d3a999f886af91679589e4644ff1dc8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e54b00086f7473dbda1a7d6fc47720ced157c6a8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f61b2e5e7821f868d6afc22382a66a30ee780ba0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57874",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-11T15:15:07.680",
"lastModified": "2025-01-11T15:15:07.680",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:55:54.650",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,31 +15,136 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: ptrace: arreglo de SETREGSET parcial para NT_ARM_TAGGED_ADDR_CTRL Actualmente, tagged_addr_ctrl_set() no inicializa la variable temporal 'ctrl', y una llamada a SETREGSET con una longitud de cero la dejar\u00e1 sin inicializar. En consecuencia, tagged_addr_ctrl_set() consumir\u00e1 un valor arbitrario, lo que potencialmente filtrar\u00e1 hasta 64 bits de memoria de la pila del kernel. La lectura est\u00e1 limitada a una ranura espec\u00edfica en la pila, y el problema no proporciona un mecanismo de escritura. Como set_tagged_addr_ctrl() solo acepta valores donde los bits [63:4] sean cero y rechaza otros valores, un intento de SETREGSET parcial tendr\u00e1 \u00e9xito o fallar\u00e1 aleatoriamente dependiendo del valor del valor no inicializado, y la exposici\u00f3n es significativamente limitada. Solucione esto inicializando el valor temporal antes de copiar el conjunto de registros desde el espacio de usuario, como para otros conjuntos de registros (por ejemplo, NT_PRSTATUS, NT_PRFPREG, NT_ARM_SYSTEM_CALL). En el caso de una escritura de longitud cero, se conservar\u00e1 el valor existente de la direcci\u00f3n etiquetada ctrl. El conjunto de registros NT_ARM_TAGGED_ADDR_CTRL solo es visible en la vista user_aarch64_view utilizada por una tarea nativa de AArch64 para manipular otra tarea nativa de AArch64. Como get_tagged_addr_ctrl() solo devuelve un valor de error cuando se llama para una tarea de compatibilidad, tagged_addr_ctrl_get() y tagged_addr_ctrl_set() nunca deben observar un valor de error de get_tagged_addr_ctrl(). Agregue un WARN_ON_ONCE() a ambos para indicar que dicho error ser\u00eda inesperado y que la gesti\u00f3n de errores no falta en ninguno de los casos."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/1152dd13845efde5554f80c7e1233bae1d26bd3e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/1370cf3eb5495d70e00547598583a4cd45b40b99",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/1c176f5155ee6161fee6f416b64aa50394d3f220",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/96035c0093db258975b8887676afe59a64c34a72",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/abd614bbfcee73247495bd9472da8f85ac83546e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ca62d90085f4af36de745883faab9f8a7cbb45d3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-908"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10",
"versionEndExcluding": "5.10.231",
"matchCriteriaId": "99B1CA0C-8181-4898-83DA-D6AC222C2236"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.174",
"matchCriteriaId": "419FD073-1517-4FD5-8158-F94BC68A1E89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.120",
"matchCriteriaId": "09AC6122-E2A4-40FE-9D33-268A1B2EC265"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.66",
"matchCriteriaId": "29A976AD-B9AB-4A95-9F08-7669F8847EB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.5",
"matchCriteriaId": "9501D045-7A94-42CA-8B03-821BE94A65B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1152dd13845efde5554f80c7e1233bae1d26bd3e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1370cf3eb5495d70e00547598583a4cd45b40b99",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1c176f5155ee6161fee6f416b64aa50394d3f220",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/96035c0093db258975b8887676afe59a64c34a72",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/abd614bbfcee73247495bd9472da8f85ac83546e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ca62d90085f4af36de745883faab9f8a7cbb45d3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57877",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-11T15:15:08.063",
"lastModified": "2025-01-11T15:15:08.063",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:57:09.220",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,80 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: ptrace: correcci\u00f3n de SETREGSET parcial para NT_ARM_POE Actualmente, poe_set() no inicializa la variable temporal 'ctrl', y una llamada a SETREGSET con una longitud de cero la dejar\u00e1 sin inicializar. En consecuencia, se volver\u00e1 a escribir un valor arbitrario en target->thread.por_el0, lo que podr\u00eda provocar una fuga de hasta 64 bits de memoria de la pila del kernel. La lectura est\u00e1 limitada a una ranura espec\u00edfica en la pila, y el problema no proporciona un mecanismo de escritura. Corrija esto inicializando el valor temporal antes de copiar el conjunto de registros desde el espacio de usuario, como para otros conjuntos de registros (por ejemplo, NT_PRSTATUS, NT_PRFPREG, NT_ARM_SYSTEM_CALL). En el caso de una escritura de longitud cero, se conservar\u00e1n los contenidos existentes de POR_EL1. Antes de este parche: | # ./poe-test | Intentando escribir NT_ARM_POE::por_el0 = 0x900d900d900d900d | SETREGSET(nt=0x40f, len=8) escribi\u00f3 8 bytes | | Intentando leer NT_ARM_POE::por_el0 | GETREGSET(nt=0x40f, len=8) ley\u00f3 8 bytes | Le\u00eddo NT_ARM_POE::por_el0 = 0x900d900d900d900d | | Intentando escribir NT_ARM_POE (longitud cero) | SETREGSET(nt=0x40f, len=0) escribi\u00f3 0 bytes | | Intentando leer NT_ARM_POE::por_el0 | GETREGSET(nt=0x40f, len=8) ley\u00f3 8 bytes | Leer NT_ARM_POE::por_el0 = 0xffff8000839c3d50 Despu\u00e9s de este parche: | # ./poe-test | Intentando escribir NT_ARM_POE::por_el0 = 0x900d900d900d900d | SETREGSET(nt=0x40f, len=8) escribi\u00f3 8 bytes | | Intentando leer NT_ARM_POE::por_el0 | GETREGSET(nt=0x40f, len=8) ley\u00f3 8 bytes | Leer NT_ARM_POE::por_el0 = 0x900d900d900d900d | | Intentando escribir NT_ARM_POE (longitud cero) | SETREGSET(nt=0x40f, len=0) escribi\u00f3 0 bytes | | Intentando leer NT_ARM_POE::por_el0 | GETREGSET(nt=0x40f, len=8) leer 8 bytes | Leer NT_ARM_POE::por_el0 = 0x900d900d900d900d"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/4105dd76bc8ad6529d47157ef0565cb84ca6676c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/594bfc4947c4fcabba1318d8384c61a29a6b89fb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.12",
"versionEndExcluding": "6.12.5",
"matchCriteriaId": "2AF25791-E5D9-498F-AEA3-261AE0D30C3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/4105dd76bc8ad6529d47157ef0565cb84ca6676c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/594bfc4947c4fcabba1318d8384c61a29a6b89fb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57878",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-11T15:15:08.190",
"lastModified": "2025-01-11T15:15:08.190",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:58:14.423",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,80 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: ptrace: correcci\u00f3n de SETREGSET parcial para NT_ARM_FPMR Actualmente, fpmr_set() no inicializa la variable temporal 'fpmr', y una llamada a SETREGSET con una longitud de cero la dejar\u00e1 sin inicializar. En consecuencia, se volver\u00e1 a escribir un valor arbitrario en target->thread.uw.fpmr, lo que podr\u00eda provocar una p\u00e9rdida de hasta 64 bits de memoria de la pila del kernel. La lectura est\u00e1 limitada a una ranura espec\u00edfica en la pila, y el problema no proporciona un mecanismo de escritura. Corrija esto inicializando el valor temporal antes de copiar el conjunto de registros desde el espacio de usuario, como para otros conjuntos de registros (por ejemplo, NT_PRSTATUS, NT_PRFPREG, NT_ARM_SYSTEM_CALL). En el caso de una escritura de longitud cero, se conservar\u00e1n los contenidos existentes de FPMR. Antes de este parche: | # ./fpmr-test | Intentando escribir NT_ARM_FPMR::fpmr = 0x900d900d900d900d | SETREGSET(nt=0x40e, len=8) escribi\u00f3 8 bytes | | Intentando leer NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) ley\u00f3 8 bytes | Le\u00eddo NT_ARM_FPMR::fpmr = 0x900d900d900d900d | | Intentando escribir NT_ARM_FPMR (longitud cero) | SETREGSET(nt=0x40e, len=0) escribi\u00f3 0 bytes | | Intentando leer NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) ley\u00f3 8 bytes | Leer NT_ARM_FPMR::fpmr = 0xffff800083963d50 Despu\u00e9s de este parche: | # ./fpmr-test | Intentando escribir NT_ARM_FPMR::fpmr = 0x900d900d900d900d | SETREGSET(nt=0x40e, len=8) escribi\u00f3 8 bytes | | Intentando leer NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) ley\u00f3 8 bytes | Leer NT_ARM_FPMR::fpmr = 0x900d900d900d900d | | Intentando escribir NT_ARM_FPMR (longitud cero) | SETREGSET(nt=0x40e, len=0) escribi\u00f3 0 bytes | | Intentando leer NT_ARM_FPMR::fpmr | GETREGSET(nt=0x40e, len=8) leer 8 bytes | Leer NT_ARM_FPMR::fpmr = 0x900d900d900d900d"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/8ab73c34e3c5b580721696665eabd799346bc50b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/f5d71291841aecfe5d8435da2dfa7f58ccd18bc8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.9",
"versionEndExcluding": "6.12.5",
"matchCriteriaId": "EF8BDA69-3016-4248-8055-EA7662336040"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/8ab73c34e3c5b580721696665eabd799346bc50b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f5d71291841aecfe5d8435da2dfa7f58ccd18bc8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57910",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T12:15:25.187",
"lastModified": "2025-02-02T11:15:13.133",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:48:35.543",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,182 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: light: vcnl4035: corrige la fuga de informaci\u00f3n en el b\u00fafer activado La matriz local 'buffer' se utiliza para enviar datos al espacio de usuario desde un b\u00fafer activado, pero no establece un valor inicial para el elemento de datos \u00fanico, que es un u16 alineado a 8 bytes. Eso deja al menos 4 bytes sin inicializar incluso despu\u00e9s de escribir un valor entero con regmap_read(). Inicialice la matriz a cero antes de usarla para evitar enviar informaci\u00f3n no inicializada al espacio de usuario."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/13e56229fc81051a42731046e200493c4a7c28ff",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/47b43e53c0a0edf5578d5d12f5fc71c019649279",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/47d245be86492974db3aeb048609542167f56518",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/a15ea87d4337479c9446b5d71616f4668337afed",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b0e9c11c762e4286732d80e66c08c2cb3157b06b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/cb488706cdec0d6d13f2895bcdf0c32b283a7cc7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/f6fb1c59776b4263634c472a5be8204c906ffc2c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-908"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4.132",
"versionEndExcluding": "5.4.290",
"matchCriteriaId": "3B7B901A-B165-4F6D-A0E4-53E55844237B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10.50",
"versionEndExcluding": "5.10.234",
"matchCriteriaId": "B1BC1525-2653-4F6D-A91A-BEC8BCEE91F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12.17",
"versionEndExcluding": "5.13",
"matchCriteriaId": "CDB1D52E-21AB-4ECE-9119-6594F8FF3B3A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.13.2",
"versionEndExcluding": "5.15.177",
"matchCriteriaId": "5558918F-A82F-4284-B020-B0CC58BE951C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.125",
"matchCriteriaId": "9AFD566B-ECC6-46F1-92F7-12A615D5685F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.72",
"matchCriteriaId": "33E12097-C88A-45B4-9677-2A961A08DD3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.10",
"matchCriteriaId": "02D604F6-10D1-4F7B-A022-0888406A1121"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*",
"matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/13e56229fc81051a42731046e200493c4a7c28ff",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/47b43e53c0a0edf5578d5d12f5fc71c019649279",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/47d245be86492974db3aeb048609542167f56518",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a15ea87d4337479c9446b5d71616f4668337afed",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b0e9c11c762e4286732d80e66c08c2cb3157b06b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cb488706cdec0d6d13f2895bcdf0c32b283a7cc7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f6fb1c59776b4263634c472a5be8204c906ffc2c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57911",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T12:15:25.277",
"lastModified": "2025-02-02T11:15:13.363",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:51:30.527",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,175 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: dummy: iio_simply_dummy_buffer: corrige la fuga de informaci\u00f3n en el b\u00fafer activado La matriz 'data' se asigna a trav\u00e9s de kmalloc() y se utiliza para enviar datos al espacio del usuario desde un b\u00fafer activado, pero no establece valores para canales inactivos, ya que solo utiliza iio_for_each_active_channel() para asignar nuevos valores. Utilice kzalloc para la asignaci\u00f3n de memoria para evitar enviar informaci\u00f3n no inicializada al espacio del usuario."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/006073761888a632c5d6f93e47c41760fa627f77",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/03fa47621bf8fcbf5994c5716021527853f9af3d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/333be433ee908a53f283beb95585dfc14c8ffb46",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"url": "https://git.kernel.org/stable/c/74058395b2c63c8a438cf199d09094b640f8c7f4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/b0642d9c871aea1f28eb02cd84d60434df594f67",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/e1c1e8c05010103c9c9ea3e9c4304b0b7e2c8e4a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/ea703cda36da0dacb9a2fd876370003197d8a019",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"lang": "en",
"value": "CWE-908"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.5",
"versionEndExcluding": "5.4.290",
"matchCriteriaId": "883EB1F5-86A8-4974-BB9F-ED2573E9796E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.234",
"matchCriteriaId": "F732162B-ED7E-4367-A5C2-B24FD9B0D33B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.177",
"matchCriteriaId": "71A3AFDC-A3CA-454F-8917-E998BBDE36F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.125",
"matchCriteriaId": "9AFD566B-ECC6-46F1-92F7-12A615D5685F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.72",
"matchCriteriaId": "33E12097-C88A-45B4-9677-2A961A08DD3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.10",
"matchCriteriaId": "02D604F6-10D1-4F7B-A022-0888406A1121"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*",
"matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/006073761888a632c5d6f93e47c41760fa627f77",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/03fa47621bf8fcbf5994c5716021527853f9af3d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/333be433ee908a53f283beb95585dfc14c8ffb46",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/74058395b2c63c8a438cf199d09094b640f8c7f4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b0642d9c871aea1f28eb02cd84d60434df594f67",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e1c1e8c05010103c9c9ea3e9c4304b0b7e2c8e4a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ea703cda36da0dacb9a2fd876370003197d8a019",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57934",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-21T12:15:27.047",
"lastModified": "2025-01-21T12:15:27.047",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:52:40.740",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,100 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fgraph: Agregar READ_ONCE() al acceder a fgraph_array[] En __ftrace_return_to_handler(), un bucle itera sobre los elementos fgraph_array[], que son fgraph_ops. El bucle comprueba si un elemento es un fgraph_stub para evitar usar un fgraph_stub despu\u00e9s. Sin embargo, si el compilador vuelve a cargar fgraph_array[] despu\u00e9s de esta comprobaci\u00f3n, podr\u00eda competir con una actualizaci\u00f3n a fgraph_array[] que introduce un fgraph_stub. Esto podr\u00eda dar como resultado que se procese el stub, pero que este contenga un campo \"func_hash\" nulo, lo que lleva a una desreferencia de puntero NULL. Para garantizar que los gops comparados con fgraph_stub coincidan con los gops procesados ??m\u00e1s tarde, agregue un READ_ONCE(). Un parche similar aparece en el commit 63a8dfb (\"function_graph: Agregar READ_ONCE() al acceder a fgraph_array[]\")."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/b68b2a3fbacc7be720ef589d489bcacdd05c6d38",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/d65474033740ded0a4fe9a097fce72328655b41d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.12.9",
"matchCriteriaId": "4FB6342D-DEC7-4104-8674-8073B3B3BEE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*",
"matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/b68b2a3fbacc7be720ef589d489bcacdd05c6d38",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d65474033740ded0a4fe9a097fce72328655b41d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21634",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T11:15:08.890",
"lastModified": "2025-01-19T11:15:08.890",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:42:29.407",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,105 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cgroup/cpuset: eliminar kernfs active break Se encontr\u00f3 una advertencia: ADVERTENCIA: CPU: 10 PID: 3486953 en fs/kernfs/file.c:828 CPU: 10 PID: 3486953 Comm: rmdir Kdump: cargado Tainted: G RIP: 0010:kernfs_should_drain_open_files+0x1a1/0x1b0 RSP: 0018:ffff8881107ef9e0 EFLAGS: 00010202 RAX: 0000000080000002 RBX: ffff888154738c00 RCX: dffffc0000000000 RDX: 00000000000000007 RSI: 0000000000000004 RDI: ffff888154738c04 RBP: ffff888154738c04 R08: ffffffffaf27fa15 R09: ffffed102a8e7180 R10: ffff888154738c07 R11: 0000000000000000 R12: ffff888154738c08 R13: ffff888750f8c000 R14: ffff888750f8c0e8 R15: ffff888154738ca0 FS: 00007f84cd0be740(0000) GS:ffff8887ddc00000(0000) knlGS:00000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555f9fbe00c8 CR3: 0000000153eec001 CR4: 0000000000370ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: GS:ffff8887ddc00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000555f9fbe00c8 CR3: 0000000153eec001 CR4: 0000000000370ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: kernfs_drain+0x15e/0x2f0 __kernfs_remove+0x165/0x300 kernfs_remove_by_name_ns+0x7b/0xc0 cgroup_rm_file+0x154/0x1c0 cgroup_addrm_files+0x1c2/0x1f0 css_clear_dir+0x77/0x110 kill_css+0x4c/0x1b0 cgroup_destroy_locked+0x194/0x380 cgroup_rmdir+0x2a/0x140 Se puede explicar por: rmdir echo 1 > cpuset.cpus kernfs_fop_write_iter // active=0 cgroup_rm_file kernfs_remove_by_name_ns kernfs_get_active // ??activo=1 __kernfs_remove // ??activo=0x80000002 kernfs_drain cpuset_write_resmask wait_event //esperando (activo == 0x80000001) kernfs_break_active_protection // activo = 0x80000001 // continuar kernfs_unbreak_active_protection // activo = 0x80000002 ... kernfs_should_drain_open_files // se produce una advertencia kernfs_put_active Esta advertencia es causada por 'kernfs_break_active_protection' cuando est\u00e1 escribiendo en cpuset.cpus y el cgroup se elimina simult\u00e1neamente. El commit 3a5a6d0c2b03 (\"cpuset: no anide cgroup_mutex dentro de get_online_cpus()\") hizo que cpuset_hotplug_workfn sea as\u00edncrono. Este cambio implica llamar a flush_work(), que puede crear una dependencia de bloqueo circular de m\u00faltiples procesos que involucran a cgroup_mutex, lo que puede llevar a un bloqueo. Para evitarlo, el commit 76bb5ab8f6e3 (\"cpuset: interrumpa la protecci\u00f3n activa de kernfs en cpuset_write_resmask()\") agreg\u00f3 'kernfs_break_active_protection' en cpuset_write_resmask. Esto podr\u00eda llevar a esta advertencia. Despu\u00e9s de el commit 2125c0034c5d (\"cgroup/cpuset: haga que el procesamiento de hotplug de cpuset sea sincr\u00f3nico\"), cpuset_write_resmask ya no necesita esperar a que finalice el hotplug, lo que significa que las operaciones de hotplug y cpuset concurrentes ya no son posibles. Por lo tanto, el bloqueo ya no existe y ya no es necesario \"interrumpir la protecci\u00f3n activa\". Para solucionar esta advertencia, simplemente elimine la operaci\u00f3n kernfs_break_active_protection en \"cpuset_write_resmask\"."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/11cb1d643a74665a4e14749414f48f82cbc15c64",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/3cb97a927fffe443e1e7e8eddbfebfdb062e86ed",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-667"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.16",
"versionEndExcluding": "6.12.10",
"matchCriteriaId": "8F9CB506-FF99-4655-9CE3-3F7E0FEC94A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*",
"matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/11cb1d643a74665a4e14749414f48f82cbc15c64",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3cb97a927fffe443e1e7e8eddbfebfdb062e86ed",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21652",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2025-01-19T11:15:10.830",
"lastModified": "2025-01-19T11:15:10.830",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T14:43:11.690",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,119 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipvlan: Se ha corregido el error use-after-free en ipvlan_get_iflink(). syzbot present\u00f3 un informe de error use-after-free [0] sobre ipvlan y linkwatch. ipvlan no contiene un refcnt del dispositivo inferior a diferencia de vlan y macvlan. Si se activa el trabajo de linkwatch para el dispositivo ipvlan dev, es posible que el dispositivo inferior ya se haya liberado, lo que da como resultado un UAF de ipvlan->phy_dev en ipvlan_get_iflink(). Podemos retrasar la anulaci\u00f3n del registro del dispositivo inferior como vlan y macvlan al retener el refcnt del dispositivo inferior en dev->netdev_ops->ndo_init() y liberarlo en dev->priv_destructor(). Jakub se\u00f1al\u00f3 que llamar a .ndo_XXX despu\u00e9s de que unregister_netdevice() haya regresado es propenso a errores y sugiri\u00f3 [1] abordar este UAF en el n\u00facleo llevando m\u00e1s all\u00e1 el commit 750e51603395 (\"net: evitar un UAF potencial en default_operstate()\"). Supongamos que se cancela el registro de dispositivos y usemos la protecci\u00f3n RCU en default_operstate() para no competir con la cancelaci\u00f3n del registro del dispositivo. [0]: ERROR: KASAN: slab-use-after-free in ipvlan_get_iflink+0x84/0x88 drivers/net/ipvlan/ipvlan_main.c:353 Read of size 4 at addr ffff0000d768c0e0 by task kworker/u8:35/6944 CPU: 0 UID: 0 PID: 6944 Comm: kworker/u8:35 Not tainted 6.13.0-rc2-g9bc5c9515b48 #12 4c3cb9e8b4565456f6a355f312ff91f4f29b3c47 Hardware name: linux,dummy-virt (DT) Workqueue: events_unbound linkwatch_event Call trace: show_stack+0x38/0x50 arch/arm64/kernel/stacktrace.c:484 (C) __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0xbc/0x108 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x16c/0x6f0 mm/kasan/report.c:489 kasan_report+0xc0/0x120 mm/kasan/report.c:602 __asan_report_load4_noabort+0x20/0x30 mm/kasan/report_generic.c:380 ipvlan_get_iflink+0x84/0x88 drivers/net/ipvlan/ipvlan_main.c:353 dev_get_iflink+0x7c/0xd8 net/core/dev.c:674 default_operstate net/core/link_watch.c:45 [inline] rfc2863_policy+0x144/0x360 net/core/link_watch.c:72 linkwatch_do_dev+0x60/0x228 net/core/link_watch.c:175 __linkwatch_run_queue+0x2f4/0x5b8 net/core/link_watch.c:239 linkwatch_event+0x64/0xa8 net/core/link_watch.c:282 process_one_work+0x700/0x1398 kernel/workqueue.c:3229 process_scheduled_works kernel/workqueue.c:3310 [inline] worker_thread+0x8c4/0xe10 kernel/workqueue.c:3391 kthread+0x2b0/0x360 kernel/kthread.c:389 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:862 Allocated by task 9303: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x30/0x68 mm/kasan/common.c:68 kasan_save_alloc_info+0x44/0x58 mm/kasan/generic.c:568 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0x84/0xa0 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __do_kmalloc_node mm/slub.c:4283 [inline] __kmalloc_node_noprof+0x2a0/0x560 mm/slub.c:4289 __kvmalloc_node_noprof+0x9c/0x230 mm/util.c:650 alloc_netdev_mqs+0xb4/0x1118 net/core/dev.c:11209 rtnl_create_link+0x2b8/0xb60 net/core/rtnetlink.c:3595 rtnl_newlink_create+0x19c/0x868 net/core/rtnetlink.c:3771 __rtnl_newlink net/core/rtnetlink.c:3896 [inline] rtnl_newlink+0x122c/0x15c0 net/core/rtnetlink.c:4011 rtnetlink_rcv_msg+0x61c/0x918 net/core/rtnetlink.c:6901 netlink_rcv_skb+0x1dc/0x398 net/netlink/af_netlink.c:2542 rtnetlink_rcv+0x34/0x50 net/core/rtnetlink.c:6928 netlink_unicast_kernel net/netlink/af_netlink.c:1321 [inline] netlink_unicast+0x618/0x838 net/netlink/af_netlink.c:1347 netlink_sendmsg+0x5fc/0x8b0 net/netlink/af_netlink.c:1891 sock_sendmsg_nosec net/socket.c:711 [inline] __sock_sendmsg net/socket.c:726 [inline] __sys_sendto+0x2ec/0x438 net/socket.c:2197 __do_sys_sendto net/socket.c:2204 [inline] __se_sys_sendto net/socket.c:2200 [inline] __arm64_sys_sendto+0xe4/0x110 net/socket.c:2200 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x90/0x278 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x13c/0x250 arch/arm64/kernel/syscall.c:132 do_el0_svc+0x54/0x---truncado---"
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://git.kernel.org/stable/c/52a24538d569f48e79d1a169a5d359d384152950",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
{
"url": "https://git.kernel.org/stable/c/ba9f7c16ec879c83bb4f80406773a911aace8267",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"url": "https://git.kernel.org/stable/c/cb358ff94154774d031159b018adf45e17673941",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.72",
"matchCriteriaId": "33E12097-C88A-45B4-9677-2A961A08DD3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.12.10",
"matchCriteriaId": "02D604F6-10D1-4F7B-A022-0888406A1121"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*",
"matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*",
"matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*",
"matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/52a24538d569f48e79d1a169a5d359d384152950",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ba9f7c16ec879c83bb4f80406773a911aace8267",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cb358ff94154774d031159b018adf45e17673941",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-02-03T13:00:34.856374+00:00
2025-02-03T15:01:14.870455+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-02-03T11:15:09.807000+00:00
2025-02-03T14:59:08.020000+00:00
```
### Last Data Feed Release
@ -33,21 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
279790
279791
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `1`
- [CVE-2024-6790](CVE-2024/CVE-2024-67xx/CVE-2024-6790.json) (`2025-02-03T11:15:09.583`)
- [CVE-2025-0015](CVE-2025/CVE-2025-00xx/CVE-2025-0015.json) (`2025-02-03T11:15:09.807`)
- [CVE-2024-57522](CVE-2024/CVE-2024-575xx/CVE-2024-57522.json) (`2025-02-03T13:15:21.660`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `64`
- [CVE-2024-28973](CVE-2024/CVE-2024-289xx/CVE-2024-28973.json) (`2025-02-03T14:59:08.020`)
- [CVE-2024-37052](CVE-2024/CVE-2024-370xx/CVE-2024-37052.json) (`2025-02-03T14:35:02.407`)
- [CVE-2024-37053](CVE-2024/CVE-2024-370xx/CVE-2024-37053.json) (`2025-02-03T14:35:07.880`)
- [CVE-2024-37054](CVE-2024/CVE-2024-370xx/CVE-2024-37054.json) (`2025-02-03T14:40:37.527`)
- [CVE-2024-37055](CVE-2024/CVE-2024-370xx/CVE-2024-37055.json) (`2025-02-03T14:44:39.397`)
- [CVE-2024-37056](CVE-2024/CVE-2024-370xx/CVE-2024-37056.json) (`2025-02-03T14:45:07.183`)
- [CVE-2024-37057](CVE-2024/CVE-2024-370xx/CVE-2024-37057.json) (`2025-02-03T14:45:23.600`)
- [CVE-2024-37058](CVE-2024/CVE-2024-370xx/CVE-2024-37058.json) (`2025-02-03T14:46:16.247`)
- [CVE-2024-37059](CVE-2024/CVE-2024-370xx/CVE-2024-37059.json) (`2025-02-03T14:46:23.250`)
- [CVE-2024-37060](CVE-2024/CVE-2024-370xx/CVE-2024-37060.json) (`2025-02-03T14:46:31.613`)
- [CVE-2024-37061](CVE-2024/CVE-2024-370xx/CVE-2024-37061.json) (`2025-02-03T14:48:37.123`)
- [CVE-2024-42422](CVE-2024/CVE-2024-424xx/CVE-2024-42422.json) (`2025-02-03T14:40:15.143`)
- [CVE-2024-47476](CVE-2024/CVE-2024-474xx/CVE-2024-47476.json) (`2025-02-03T14:48:29.350`)
- [CVE-2024-53802](CVE-2024/CVE-2024-538xx/CVE-2024-53802.json) (`2025-02-03T14:36:22.700`)
- [CVE-2024-53816](CVE-2024/CVE-2024-538xx/CVE-2024-53816.json) (`2025-02-03T14:12:47.460`)
- [CVE-2024-54212](CVE-2024/CVE-2024-542xx/CVE-2024-54212.json) (`2025-02-03T14:33:05.887`)
- [CVE-2024-57798](CVE-2024/CVE-2024-577xx/CVE-2024-57798.json) (`2025-02-03T14:53:23.433`)
- [CVE-2024-57874](CVE-2024/CVE-2024-578xx/CVE-2024-57874.json) (`2025-02-03T14:55:54.650`)
- [CVE-2024-57877](CVE-2024/CVE-2024-578xx/CVE-2024-57877.json) (`2025-02-03T14:57:09.220`)
- [CVE-2024-57878](CVE-2024/CVE-2024-578xx/CVE-2024-57878.json) (`2025-02-03T14:58:14.423`)
- [CVE-2024-57910](CVE-2024/CVE-2024-579xx/CVE-2024-57910.json) (`2025-02-03T14:48:35.543`)
- [CVE-2024-57911](CVE-2024/CVE-2024-579xx/CVE-2024-57911.json) (`2025-02-03T14:51:30.527`)
- [CVE-2024-57934](CVE-2024/CVE-2024-579xx/CVE-2024-57934.json) (`2025-02-03T14:52:40.740`)
- [CVE-2025-21634](CVE-2025/CVE-2025-216xx/CVE-2025-21634.json) (`2025-02-03T14:42:29.407`)
- [CVE-2025-21652](CVE-2025/CVE-2025-216xx/CVE-2025-21652.json) (`2025-02-03T14:43:11.690`)
## Download and Usage

View File

@ -126961,7 +126961,7 @@ CVE-2018-9385,0,0,963ab87aab004413f51f225df7125c38dada01fc62280d1b6b2d796be35cbf
CVE-2018-9386,0,0,00c05564d802b59f0ce740fae1821c18eb3e04be32703f1b88fcf171f14e151d,2024-12-19T16:51:52.097000
CVE-2018-9387,0,0,c51536796064d725fddbe49fd9acb541c6f56006847a3e07d695cf21efa26d09,2025-01-21T16:15:11.453000
CVE-2018-9388,0,0,cd8b1868b6c78b44a87a461eb158bc8cba5eaf7d4a400099563232fceb850761,2024-12-19T16:50:58.733000
CVE-2018-9389,0,0,25d19c8d4c7512c3bfbe9c683cd33e500035511aa3b62b8f393031869c3958a8,2025-01-23T19:56:32.087000
CVE-2018-9389,0,1,20920278b1e547ff812bdfff37df968de30686e74d7d699bbac3b697c00aec35,2025-02-03T14:15:29.937000
CVE-2018-9390,0,0,03e5cf7608f8573a4867237edfa1da4ca8706d51cc54b5a571dacd98cdeb3ef7,2024-12-19T16:49:41.540000
CVE-2018-9391,0,0,2f48dbaafd251d76bace45bec48a6a6822d89b365841aa01441c3d6fab74da2a,2024-12-19T17:18:26.910000
CVE-2018-9392,0,0,a81398da058e04a84675f2ceb5ca20dc8d733a048fb3efe395ac35f304b71a06,2024-12-19T17:26:04.070000
@ -166421,7 +166421,7 @@ CVE-2021-1778,0,0,8b826b7ae2ae17b8b9901d1f612230aee30d0fc68a265ebf3396e3ceebf943
CVE-2021-1779,0,0,64bb89c45d76f13f2d9fd67f86b95e7c100b655c340943ae93bf17b44851a0c9,2024-11-21T05:45:05.733000
CVE-2021-1780,0,0,23e85a6351e1b98f470ccb20f8ae4ad7e1ecfb25beb2334c601960dad2a662bf,2024-11-21T05:45:05.857000
CVE-2021-1781,0,0,8c1ef084f5ffd81b1dfb865bf625ce113bbf8db4f404f5f4818a50fc994e667a,2024-11-21T05:45:05.980000
CVE-2021-1782,0,0,f24c0233c9d02681212a2ebdce38ebfa33afbcfb929f6989d47245512c8b2945,2024-11-21T05:45:06.107000
CVE-2021-1782,0,1,9640394dec9240447d322c0fcc8c8fa12032706c604a8d898340500829c44c28,2025-02-03T14:15:30.590000
CVE-2021-1783,0,0,a629262b9c76bc864d84116a8a9a03cf0ee6646c816a5b730a6fbd198836526b,2024-11-21T05:45:06.240000
CVE-2021-1784,0,0,5dbd3fae571e03fbab98f6009778ed0be04756e7c33fd360175bd60500fa009e,2024-11-21T05:45:06.360000
CVE-2021-1785,0,0,f5c50d287644a4824d77890a58b7c0971d824c705a80905719d22378d0b6b379,2024-11-21T05:45:06.473000
@ -167737,7 +167737,7 @@ CVE-2021-21202,0,0,471b7d0d787cfffa21250f8bd478f6e476d149959988a8717520350ed7fd4
CVE-2021-21203,0,0,218adc562c6e49d7bf165167499a46e5543a4af64c93b7f5c5d4520b3d1db45f,2024-11-21T05:47:46.137000
CVE-2021-21204,0,0,0a648d8f437259cb65e9ad90616562b55243e5d07f9d174443b74c183d81c4cb,2024-11-21T05:47:46.257000
CVE-2021-21205,0,0,febfec423966af73fe8b0b37c6f9833685d55c371df93c67a09b622533b6ef1e,2024-11-21T05:47:46.380000
CVE-2021-21206,0,0,18abf9f923f89fdadc88c05c854395dcc9b28b9e8dba0f5918f0161375ccb588,2024-11-21T05:47:46.503000
CVE-2021-21206,0,1,88f6933096fbaf99b945867188020ce473210777b54dc981ff2d03d5ad4c5420,2025-02-03T14:15:30.827000
CVE-2021-21207,0,0,545fc2028da8605efbae548a15dcbb9bf08651badcaa65e625db2125548e5578,2024-11-21T05:47:46.630000
CVE-2021-21208,0,0,5d347a10448e3dfefce138c98513c366e108ce51d255b1e1dd172db3713e5c91,2024-11-21T05:47:46.757000
CVE-2021-21209,0,0,d2b6b7c79bbb943e8ca63cb8a1f44b39eff670b161199e470afe11710623e123,2024-11-21T05:47:46.873000
@ -167753,7 +167753,7 @@ CVE-2021-21217,0,0,76c79b20fbab1811bfca64364a630c443188029148fa88c11a8085facd6db
CVE-2021-21218,0,0,610a81457ac9c3abcdbfed91def2b55bdb3cbc737c9e01990725971968d7a245,2024-11-21T05:47:47.980000
CVE-2021-21219,0,0,8a18867b98692c6581e261687a36a4792c07d2f1012d3b5ae66228f416ebaf87,2024-11-21T05:47:48.100000
CVE-2021-2122,0,0,a6fc57845c28ebd568c913e99302c46a0d53939800340fb0e42da3c94712a133,2024-11-21T06:02:25.717000
CVE-2021-21220,0,0,49d74d1abe99efbcf37a63517020282d3ff4eebbae1a14090d68262b5392db64,2024-11-21T05:47:48.220000
CVE-2021-21220,0,1,1b8896c8883bb002768b00dead504fdef24dc2410879fc5c44d5516c864dd0d9,2025-02-03T14:15:31.120000
CVE-2021-21221,0,0,0f97c072b68a63a8f2a94c62bec998f3979115aacf0ee23236c7f970b0eb47e5,2024-11-21T05:47:48.343000
CVE-2021-21222,0,0,fb6430680f870d8f1fb279ef559fdf9061e1771737d1ee98954121e1a539bbab,2024-11-21T05:47:48.470000
CVE-2021-21223,0,0,6f94843742f0001c285a029388dd0456ac00ec872863f41c6e9df32fa8580212,2024-11-21T05:47:48.583000
@ -174904,7 +174904,7 @@ CVE-2021-3053,0,0,eae8acbe007ccf0e2f87daa89a8834977fb3ccc6097404557aed22eba4ad8b
CVE-2021-30530,0,0,3c768c9ab03e8b8d0c95dcc2dd22ebf6a6ab0075f4f00b5b0bd58b38b1676d79,2024-11-21T06:04:07.040000
CVE-2021-30531,0,0,32329025cba06f04b0d9a26f89235599c80ad1d77968e77cc8ae5dfbb1be4328,2024-11-21T06:04:07.187000
CVE-2021-30532,0,0,4e60f096aa8ff27a50d2838d5dbe7a41001b4a5d0de9806ac6b9058c62b57a2b,2024-11-21T06:04:07.330000
CVE-2021-30533,0,0,c6cca6979e0c2376e83614124df0939bbf568c8439d961b90b07bfab2d7e98ba,2024-11-21T06:04:07.483000
CVE-2021-30533,0,1,88d4395bc6147885347e34e7c00ca86541af06b5fe4857d7642c6d4e73d937c1,2025-02-03T14:15:31.373000
CVE-2021-30534,0,0,923440384cf8d4ff9efac096d797d8a591d4e55b8a4b552804e871738abe297f,2024-11-21T06:04:07.637000
CVE-2021-30535,0,0,c0d6b8cb0a22c54bdc001d33204efd18b9613997ba88eb37850722a7a9e15ad5,2024-11-21T06:04:07.787000
CVE-2021-30536,0,0,4a34a41b0879049c6cbb8d62242b5a40f29909fb87f379ebe42e9188988c392e,2024-11-21T06:04:07.923000
@ -174927,7 +174927,7 @@ CVE-2021-30550,0,0,74eee0834cf3f8c8b71935939c5937c50e4be880a3f3186227e9a01a3425f
CVE-2021-30551,0,0,2b9ebdc6f34068cb229250f6f38d07d8b3129559546c5025222b986932994220,2025-01-29T17:15:13.843000
CVE-2021-30552,0,0,64694bd2cb5a29a5f271c82d2e028209d4d2211ecbb47b6db21a7c8a6f3529ae,2024-11-21T06:04:10.023000
CVE-2021-30553,0,0,e3e4b72bb4acdc3ca83b854051e0d236e7435425a4f625906307f37bdc941a5a,2024-11-21T06:04:10.147000
CVE-2021-30554,0,0,88951c414a7a049ed7eb164a0273ec260646cea71fdfbea1ae9db46ff9a6765e,2024-11-21T06:04:10.270000
CVE-2021-30554,0,1,4374a6339ed57c5dbd736f7219d2655f1da0c3b1a13cbc5e23d1917013d1d1fa,2025-02-03T14:15:31.783000
CVE-2021-30555,0,0,cef21144d62e876f041646588c1fc5b01be693ff85907faf6b93fcb5a9fdce16,2024-11-21T06:04:10.390000
CVE-2021-30556,0,0,0fb5acb73cef6327903959a8e9b8306517789c12718da39e0f4c6bc00fa80c01,2024-11-21T06:04:10.510000
CVE-2021-30557,0,0,36461e61e42beb4d1113ccb885ae837db09ea0887d37c0af53b24003790adedd,2024-11-21T06:04:10.650000
@ -175036,7 +175036,7 @@ CVE-2021-30659,0,0,ab538d4b06ae94ebba36b98d58ee05bc2d9da4cbd8fd10f31cd6e39e35257
CVE-2021-30660,0,0,387f96a9e1e920b2eb249913b885544bc18948e904113099ea966317a9059876,2024-11-21T06:04:22.877000
CVE-2021-30661,0,0,0441a5ee2f1c64ac124688d9a4989971589017aaa8f192870617e176c24a7fb5,2025-01-29T18:15:40.407000
CVE-2021-30662,0,0,c4dfc7192dbb2ce4bea44d273c3ad0bccd8bce5f5b4b72ed9d54ec2ac3781f53,2024-11-21T06:04:23.160000
CVE-2021-30663,0,0,c34af11b6511611ff439ee4f7fb904769496be9621e4a84ee0295312099fbed7,2024-11-21T06:04:23.317000
CVE-2021-30663,0,1,01fddc43cb24486618c3c9e6d0042ec692f86994558aef57efdf67cf73338225,2025-02-03T14:15:32.100000
CVE-2021-30664,0,0,f2057936986b5b73e1cba58f4707641670b3cbaa1c2859e5b4b8f8a2a91dd529,2024-11-21T06:04:23.470000
CVE-2021-30665,0,0,7177f5183cb3e845bc6e7e0274f2c6ba2b866d04a6e42a99d1995a601ede60f3,2025-01-29T18:15:40.653000
CVE-2021-30666,0,0,c8d966b28ab2162bdc187e4ddd46551051c8e5d13b9608b658212a99ea3f4de2,2025-01-29T18:15:40.907000
@ -175221,7 +175221,7 @@ CVE-2021-30856,0,0,4028362151dfe88b261706a9b8ef963301883669c4042f2c218a11fd252c5
CVE-2021-30857,0,0,c8428b63ca1bebf9fa818ce082b4d89c779a6d59395b2dd739773fc1972fb994,2024-11-21T06:04:51.203000
CVE-2021-30858,0,0,9c9062e43c93affa0a1f3fe578b8d93d6a679f5383b4b0fdc64f05368091d76b,2025-01-29T18:15:42.010000
CVE-2021-30859,0,0,79928aa1fc76be19d514fd1a0aef8ced1b3590b6c8bf97f1cc771858834aa0c7,2024-11-21T06:04:51.510000
CVE-2021-30860,0,0,ef1ebee2e2f3ce5482536365c906b0d96b8aa83a874dc44e4df7d4591ff1cac1,2024-11-21T06:04:51.633000
CVE-2021-30860,0,1,9c365da88502536f2ce59dfe0a59cfd31316b46e56c0900b5bdefecef6b8535e,2025-02-03T14:15:32.323000
CVE-2021-30861,0,0,232b0ad1e3dea8d63ec81ff309b82b7837d42bd76bec770782e0b180e8558511,2024-11-21T06:04:51.793000
CVE-2021-30862,0,0,3c72008ec327e7fff74a50782450111677f09acae9b330e081b445e113a71854,2024-11-21T06:04:51.903000
CVE-2021-30863,0,0,60a307d735a10950f82b97d466689dd2121238ffb9223dd3d0a76c19aab49f83,2024-11-21T06:04:52.007000
@ -180560,7 +180560,7 @@ CVE-2021-3797,0,0,3590ccc3191e2443aa904ab7148349c901e0e747927462bce890749221ee59
CVE-2021-37970,0,0,c0c056a237b910ce0a2b98bc1f0a90deee2f6b7531b4ed711278e73bcf99c30c,2024-11-21T06:16:09.500000
CVE-2021-37971,0,0,6f98832cea8c6c41a2789df18ed7da8b96043e8ad22001c09eeddd714eb83e85,2024-11-21T06:16:09.643000
CVE-2021-37972,0,0,683e1a1fefcd3e6b35217c21fee5a5db7a833faf0db4a4cea8afec0b89d7f32c,2024-11-21T06:16:09.790000
CVE-2021-37973,0,0,f14e66ce03f44fa07a324796be88d575dbf3ebd62fa2b39f4e1595e484ffe98a,2024-11-21T06:16:09.937000
CVE-2021-37973,0,1,743719dc94941c0357e14c84302b60c64b1c9baa604633a5edeaa1f72511ddde,2025-02-03T14:15:32.667000
CVE-2021-37974,0,0,931558bac71f677090ea0b1907b8540ee5ebcd09055b5e5c0cdab44c71c9cd9c,2024-11-21T06:16:10.087000
CVE-2021-37975,0,0,27a501d134f6001da3addcb318d1e45fa010b5a9a1bf7b2d71dcfac0b5e8a639,2025-01-29T17:15:14.900000
CVE-2021-37976,0,0,a688ef197c2d29b70611dd79c03840483ff8e68d10b02af37ebae3027176db74,2025-01-29T17:15:15.167000
@ -187319,17 +187319,17 @@ CVE-2021-47087,0,0,25c97ac4fda2e561b2af6c8de0608f442e35153284faacd0793809b281ff7
CVE-2021-47088,0,0,76bfcd61b1680f7de367b3e8bdf24a6e4259682774fc43d1348d11d3a1fcb41e,2025-01-16T17:20:45.687000
CVE-2021-47089,0,0,3c63067315f69f55d4d68a1f446b6c6645fe126c9efbab98d8eec1fa81d922df,2024-11-21T06:35:22.480000
CVE-2021-47090,0,0,6db0d43f1a2c9e72b0da19e5aaaad073fc89b530dc54a875e9bad79b12380136,2024-11-21T06:35:22.647000
CVE-2021-47091,0,0,2b7390551c79ac8791250cf51c708e8111fa671f409cc1f72b589badd192734e,2024-11-21T06:35:22.760000
CVE-2021-47091,0,1,efbeee9ac4a070f7c66218be3276705643cc8230c5872f22ea416a0c1b027a73,2025-02-03T13:42:00.400000
CVE-2021-47092,0,0,d6975da3bb883b2068192aa25e708d7bcd2cee4c428c25b242ef9266ba445f15,2024-11-21T06:35:22.863000
CVE-2021-47093,0,0,8c86f132e48c7ae0c8a813b0881f34bc3f4fef27c7ea0f854e16c78d88daf499,2025-01-14T15:39:17.157000
CVE-2021-47094,0,0,70c9a9987f608c1e0dea21a73ea19fe2b8d1a6f7e0c1e3046a1c2fcc811a4ae9,2024-11-21T06:35:23.090000
CVE-2021-47095,0,0,f1325d2319a8e87982889ff7e5d6ba5a22acc09a0f6caf76a80eb14b35abca9c,2025-01-07T20:15:00.280000
CVE-2021-47096,0,0,a7889cc1343f95b816f2f3dd00a5e6cba7d24215c4fc0bb99eabcd7da60665f6,2024-11-21T06:35:23.370000
CVE-2021-47097,0,0,bc6485d8fce602afec969ad73cb67c2487d0407728ebb5edcbf1c54474a627b6,2024-11-21T06:35:23.540000
CVE-2021-47098,0,0,dfd0c29ccc12b98d6641d1aea12f9794d27334eb929e1acc9a6f1ea100020845,2024-11-21T06:35:23.650000
CVE-2021-47098,0,1,cd9f021cee989f82426216619c90ea84dcc947abea3a8e202822c2cf2543de91,2025-02-03T13:49:30.867000
CVE-2021-47099,0,0,579f63a4674bb58b236e9da9fe1139af2ccf46e1503966a974004c88b3f1a826,2024-11-21T06:35:23.757000
CVE-2021-47100,0,0,2090204a892f1033baaf033d4b6018189cb65502c2aef48312add873b07ba172,2024-11-21T06:35:23.917000
CVE-2021-47101,0,0,2a510e44f5c8b96da090287960dfb564127a78824a174a014bcb231c08d29b9d,2024-11-21T06:35:24.037000
CVE-2021-47100,0,1,8194feacb46324f3e5be3ab5253c95460b417d0a4e05733f9cd9aa9a457524d1,2025-02-03T13:51:24.110000
CVE-2021-47101,0,1,de8fca709e54b370dde0ccee459a8070abf3ddba20b482ec049ee46d239f5948,2025-02-03T14:02:18.480000
CVE-2021-47102,0,0,e3d7ce077927f70cf04a6ee8106db62100f560b49e92f6f23722ec783869854a,2024-11-21T06:35:24.150000
CVE-2021-47103,0,0,db3e5e9d3ae7e807e359f19f747350aa2c349e7dc8e83b609a63a55c8d4eda05,2024-11-21T06:35:24.260000
CVE-2021-47104,0,0,106f2b5520760467943f47cb23329a1907137148a138d2cede6ef704d6e1962f,2025-01-07T17:32:24.537000
@ -192555,7 +192555,7 @@ CVE-2022-22935,0,0,98e79f04342e021dd399effff093634f27373263128893588811ef5a12340
CVE-2022-22936,0,0,a98490811d9562919019c0ab8f25a2bb0689ef6f6e9f2acf66d396ebef68cbd9,2024-11-21T06:47:38.580000
CVE-2022-22938,0,0,32391ba44f848ae3418481e7a9dcedb095d5182ae073a727327303e553e7f838,2024-11-21T06:47:38.697000
CVE-2022-22939,0,0,e67ea6e930feae3b9ed16118cff8a79327a339cca7ca08b18d6fc9ebe4cf350c,2024-11-21T06:47:38.813000
CVE-2022-2294,0,0,b5b476a7f293883b2aa7ef58a0ad2e06be21e3e6940d518cb2105e61dac4199e,2024-11-21T07:00:42.523000
CVE-2022-2294,0,1,ae4c4b086cccbf7b936e579bac052917c6c0f18b086a8561638d2b50e4fabec4,2025-02-03T14:15:33.053000
CVE-2022-22941,0,0,081413763e3372839e5a9fb0333635a91079ce592b4d9366b47ce82b45360382,2024-11-21T06:47:38.927000
CVE-2022-22942,0,0,fb0f26222daa06550e95d97970a3a1a7fbd09e7f88cc1421df7701041ba3b0be,2024-11-21T06:47:39.040000
CVE-2022-22943,0,0,9720f4269abe961adef4aa98404ffed2482d4cdd530e2104566ba6ae245a1c80,2024-11-21T06:47:39.197000
@ -199118,7 +199118,7 @@ CVE-2022-30746,0,0,c7e7a88b7eaeb284b9d95575c2b962f866dbb3935fb2bb0dfe8f8ebe4f5ec
CVE-2022-30747,0,0,03dd23137a267ee330474b14833bc16c231f59e950725fa5de7196c64a53291f,2024-11-21T07:03:18.060000
CVE-2022-30748,0,0,89a3a2345f200905db84ec209c3362b205082d963beffaace9a42e5e913372b5,2024-11-21T07:03:18.177000
CVE-2022-30749,0,0,594470ce17cbfaf7e3d662f3ab944ab6113ec000c1a4dba09bb2d80cac3aad49,2024-11-21T07:03:18.290000
CVE-2022-3075,0,0,6ca2c16f9fc432f1aeea2976115579b1c213f11313bae1743e576c3868d47f0d,2024-11-21T07:18:46.293000
CVE-2022-3075,0,1,73d9369c37ecd79d1643ac386e4a3712dfe112e505ecec6b25302950005f8034,2025-02-03T14:15:33.320000
CVE-2022-30750,0,0,7727c4a050fab50e2cc3f857163cd21ef36a7edf7a466c191862ff0fddc4fc4e,2024-11-21T07:03:18.403000
CVE-2022-30751,0,0,d9514ed381aecdb3424b6ec22eb6886ea1e03fbf7af95b81f561d00486b4b5e2,2024-11-21T07:03:18.530000
CVE-2022-30752,0,0,3894c8352471b9e3ebe637c46e6b31bb88ee7fca58dcf7c9d863ec57831c9765,2024-11-21T07:03:18.653000
@ -204406,7 +204406,7 @@ CVE-2022-37208,0,0,470f87d97669205c33ca7f6e7eaca56b9a8c38b846dcdc90ba8f444db5876
CVE-2022-37209,0,0,52c0dfaa7577479980b8877dc73c55c94fb57cffd5a795ff3c15186218d8ed94,2024-11-21T07:14:37.280000
CVE-2022-3721,0,0,ef27daf131c0ce1769e63ded90ec4f920769462bca2531e2972075401bdeb9b0,2024-11-21T07:20:06.387000
CVE-2022-37223,0,0,b91a7fe9c2b1f93e287eecfe3543d434e1acc1810e511319e4dd1bb708da2112,2024-11-21T07:14:37.430000
CVE-2022-3723,0,0,dfb75f1f21fc4a8fa32fb7471bd1688fc4da21bca18c499486781fea61ca6d3a,2024-11-21T07:20:06.520000
CVE-2022-3723,0,1,5fbdb58b18b555d7bb48ad381c0f33efa342886686cddd6af97c11b416a6535d,2025-02-03T14:15:33.637000
CVE-2022-37232,0,0,a7a656594ca018b6eeef345b2ecbc3158e4652aa7e8399b8d814f51c0ce20659,2024-11-21T07:14:37.573000
CVE-2022-37234,0,0,17cc763dc797d3a6162da15d8850dc676e42b955a9a39ee17b2c06c5b16900b3,2024-11-21T07:14:37.727000
CVE-2022-37235,0,0,251cc36b350fd6109aad547b7e03748cea898716d1f278fb274f3199d170caf3,2024-11-21T07:14:37.883000
@ -207442,7 +207442,7 @@ CVE-2022-41343,0,0,d0ae95b40436fa24be988b15dd0d1de91272426bd16bd6d0a6ec7efe5f0c2
CVE-2022-41347,0,0,c1ae4e52909df12e3153c5905945c510bcde0625e0b07038ef7543fa563d23e9,2024-11-21T07:23:05.503000
CVE-2022-41348,0,0,46415c7cb21ab8defecca377846850e75cd15d2f1879f3b1c7404748495f9e64,2024-11-21T07:23:05.680000
CVE-2022-41349,0,0,f37e912a4b114c1184a1865bf9d5da62dec108ec18e1599ba0fc601bb7455233,2024-11-21T07:23:05.830000
CVE-2022-4135,0,0,dd3b031e3be5f9b03a2eb884b87e7f424096665f3e7e17a2c9929a8c5ab3ef1a,2024-11-21T07:34:38.600000
CVE-2022-4135,0,1,b855be7c691705b47a74bee35e6ede2f679288f324d7acc09844fc7c8bd89558,2025-02-03T14:15:33.897000
CVE-2022-41350,0,0,07c59b26e4298d985fa1356786d58d9eaea318e5fb01099dfd2f0c684cb7fb9c,2024-11-21T07:23:05.973000
CVE-2022-41351,0,0,0e738e1029fa2ba786b692581f7ba428943e32cc9bfd63b89b6f8436bd389f76,2024-11-21T07:23:06.113000
CVE-2022-41352,0,0,d568fc1a05c1060a356f7a1a8d9fe0622530655346a9b8a91468384355f230f2,2024-11-21T07:23:06.257000
@ -212649,7 +212649,7 @@ CVE-2022-48627,0,0,450773013a86dee085659fbeb135aaa41eee00eb1f2d7ba0c46cf0fcba42a
CVE-2022-48628,0,0,38c6820367758e57858643c90208981922cfb44dfdb56b80c9489f9ea4749b42,2025-01-13T18:26:13.343000
CVE-2022-48629,0,0,22ed839ae28d9bc6568331788266afa09b73a958ff038fb89be480fe23017988,2024-11-21T07:33:38.803000
CVE-2022-4863,0,0,d4d829a1beb8e4fd89587644cb89a6f79551c4f0525d6fe5f92668872dbe819d,2024-11-21T07:36:05.650000
CVE-2022-48630,0,0,dc15df37109a92200e8dcf083ad95b672a8578020d9f60253ab82eddb8bf70c3,2024-11-21T07:33:38.930000
CVE-2022-48630,0,1,c1c0b149824310772dd2a34eccec1464745f453029fe1e494c66edf69e66a0b2,2025-02-03T14:09:55.317000
CVE-2022-48631,0,0,07cfa709b2311dbd1149137d694e3cc56dbf7ee50a39f3e8764d7c810d0b445c,2024-11-21T07:33:39.040000
CVE-2022-48632,0,0,194d2477aaf7a3f918f02d2c60fa7be70f78b4de2da04eea3b6d1c9f3761e745,2024-11-21T07:33:39.170000
CVE-2022-48633,0,0,39061c44a5a7b00aadebb280c44e2a7295bff9ff4a64448f966add5f4258b8ef,2024-11-21T07:33:39.280000
@ -218227,7 +218227,7 @@ CVE-2023-23711,0,0,a7d257a8ac7a60cf8b18f989f7bc28a441b2ad120e3423778cf70ca039502
CVE-2023-23712,0,0,cf5ae206e07cab2c53fd8a3fa0ad117b0636cd4aeed8586f58df45e3b6b30bea,2024-11-21T07:46:42.870000
CVE-2023-23713,0,0,aa78868f851e0c75d1e59b79dcf6c9e05a61ff930b93a4fea526e2f7ad46afdb,2024-11-21T07:46:42.993000
CVE-2023-23714,0,0,f9f4437b521b1dbed82b0bda47410baedfff9e15d088e234430b6f975546ce4d,2024-11-21T07:46:43.120000
CVE-2023-23715,0,0,fcf8ba04d7c326f4eddc6d362c33c8bc21d0854cd2b4efdbe8c5a7eab6c9b011,2024-12-09T13:15:20.390000
CVE-2023-23715,0,1,36bbcb5b989bb56bece7b42e9e9a821d1f21d6515af501278b6b0644a098efbb,2025-02-03T14:32:10.613000
CVE-2023-23716,0,0,ae7e88307a2d2f35bf86a4fef629654d1b4b6000bbefedc7adc0c7c446fdad71,2024-12-09T13:15:20.523000
CVE-2023-23717,0,0,088150048f4901ae8e91b73b39ec39091f5aa11c32a217d7b7cf7dae910773f1,2024-11-21T07:46:43.240000
CVE-2023-23718,0,0,db18831cdfcc880135bea4e479738b3698329087db87571ec31f1655c541d6a4,2024-11-21T07:46:43.360000
@ -221892,7 +221892,7 @@ CVE-2023-28200,0,0,90b2364c847846eba81dfb147336286e8c7916c6be1729687f3a054ae63f6
CVE-2023-28201,0,0,25cf76f2308bb8f683911400d2c731cacdbb3e4887ef863ecd6141f6625d6707,2025-01-29T19:15:16.087000
CVE-2023-28202,0,0,191014a0200c592d291fa5fba60b126bce7fe013f7105ee7dd188bda0cdcf7fe,2024-12-05T17:15:07.837000
CVE-2023-28203,0,0,4cb19dbc67823a1f2ef0f3a0d6b749db68c9403e1ae6273e5d0d612a7d2831a7,2024-11-21T07:54:35.627000
CVE-2023-28204,0,0,d29b1bc8f2cad26e0d01ee6d8c1150ddfc2761a38a4996cd387e5b09f29ccca7,2024-11-21T07:54:35.760000
CVE-2023-28204,0,1,056c57eda55633d77beec8bfe92e3d5a8b9dd4d512401142c6d0e3f282b09725,2025-02-03T14:15:34.167000
CVE-2023-28205,0,0,12484c8c390868a4b2e80fc3d5e2d1333ba0c493509776a9f6c24eeaf48c7cd4,2025-01-28T22:15:14.637000
CVE-2023-28206,0,0,666a3e14555d676a13efe3acbe928335c4d89b72343fe44661b875103c70a379,2025-01-28T17:15:12.633000
CVE-2023-28208,0,0,8fc033bc09b7b40815121b04865c55bdd349e84c32a87bcecfbf9bec0bf2a61e,2024-12-12T14:26:18.893000
@ -225146,7 +225146,7 @@ CVE-2023-3237,0,0,71364c0269205ecd02331252875cc17dcbb3a3b361f1f83cffee43f697e80f
CVE-2023-32370,0,0,8af836e3f0aa426ccaafc4eb19ecf9bb0673e0f04a6355f18fa9f37c80cdcb5b,2024-11-21T08:03:13.227000
CVE-2023-32371,0,0,2f4c4f84beaa5a69eb96316f215170b842018fba70a0460d227c16b6ae4ad731,2024-12-05T22:15:19.457000
CVE-2023-32372,0,0,3735b4d95466ee316c3a874d27abb685a259a2edfa2f44f9a0507c56a6f3dc1e,2024-12-05T22:15:19.630000
CVE-2023-32373,0,0,54f30a5fbc80eddcf0e5e4adbc3b04977253637fffc94cacc0ab72b61fc545af,2024-11-21T08:03:13.570000
CVE-2023-32373,0,1,384a9ff85ccf8a10d48c0d117a13f5b941b239e5c1f11c3f168fdd548dc2bbed,2025-02-03T14:15:34.500000
CVE-2023-32375,0,0,363d658b705a2905988a4381992e7e285988cfbbe26cd1b6b8bb78ee269b1a27,2024-12-05T22:15:19.837000
CVE-2023-32376,0,0,95a529e4063990411c2ca53ecf165580bab43c05d8c5d78dd3562ccd8e98cd87,2024-11-21T08:03:13.820000
CVE-2023-32377,0,0,ba36bd37b2f7c1e17d958e1f4d12ab4bfd5e2df22ada13420271f58cb2eaa905,2024-11-21T08:03:13.940000
@ -225209,12 +225209,12 @@ CVE-2023-32429,0,0,e46e02f258d51635ab5ef8bab6d35855f35e56d76662f17aff3e32f728cfd
CVE-2023-3243,0,0,f39d9207aa51a4f50a921684a93aa08e98ddf85594ad1964d7ef7666e323d0b4,2024-11-21T08:16:47.080000
CVE-2023-32432,0,0,71739248fbd9019ee6d1ece6530111937bb9544f2912c4f6af9b8290fb231108,2024-12-12T14:26:18.893000
CVE-2023-32433,0,0,3162dd87a2e4be71b01dab05d4d5586614c514c9e744874d06bf9242d1982a79,2024-11-21T08:03:20.587000
CVE-2023-32434,0,0,fdc991e81611dc4b7a1f43fcd6dc9f1c198d6764b6b3832bbf7f1abf7af72d73,2025-01-23T16:53:39.523000
CVE-2023-32434,0,1,a489d35e7cebbc22c80303f305c88936596ccdf3eef16bb8ebcf702c5dc728e5,2025-02-03T14:15:34.723000
CVE-2023-32435,0,0,daf2b1c2b3ed078f49d50583ccdcb859cdc35675e5eea44b5471538e85b4b8ce,2024-12-20T17:49:17.260000
CVE-2023-32436,0,0,b1838bad592f8061b6d9a4a9063867063ed3bb06a03b6ff3b7dfcbddf25b174f,2024-11-21T08:03:20.970000
CVE-2023-32437,0,0,34cb0d82da59eadf72e035d71ce27268fe5640e446349555ae0be1c644a830f4,2024-11-21T08:03:21.103000
CVE-2023-32438,0,0,a00014ad87ef16329a1ad28e21cf98311827d59fe3cfcc6d54ef64a64fea0ed4,2024-12-12T14:26:18.893000
CVE-2023-32439,0,0,d33752892c92b9818540114cde8191bd225336da8d2380c953799691cd7c128e,2025-01-23T16:36:05.110000
CVE-2023-32439,0,1,149938011bb859d072dd19e6d257a1f34f821b29a319e23232a41f40b2641f13,2025-02-03T14:15:34.930000
CVE-2023-3244,0,0,01470d499b32ea5cba53fbc6c2839f629c628a66441361005d09811a2b604954,2024-11-21T08:16:47.233000
CVE-2023-32441,0,0,aaaa4d579ed908d0b9e7528ac9c558ea7a2bc165ae2989c8a5559d52e290963e,2024-11-21T08:03:21.477000
CVE-2023-32442,0,0,98f289f358fe3d399579852388e283e7e5fc6845dcb9c9c6f3e95590d3822789,2024-11-21T08:03:21.610000
@ -229013,7 +229013,7 @@ CVE-2023-37446,0,0,be821897afaefff3511ddbe99c1766d2aa99608bc19be9be22c2a6416daa5
CVE-2023-37447,0,0,15bd69699d2b2992e93ae4e14ad90f556204e72caa0bee115e5bfe633e0f527b,2024-11-21T08:11:43.753000
CVE-2023-37448,0,0,68bcc01a6fac47e3f732bd1cef7dc5013483e1f033183d8d9f34d5dcbd19793a,2024-11-21T08:11:43.893000
CVE-2023-3745,0,0,9144ad8cbe174bc79191569e1be593f42fa833e4e8289a4912c02fef5b3192ba,2024-11-21T08:17:58.043000
CVE-2023-37450,0,0,e9defe8fab0bf6ee2a9418b818274f8476bd8d5d1f94e3eabafb123e117d187c,2025-01-23T16:36:38.280000
CVE-2023-37450,0,1,a0d07216021fac676c29da12b6a065a313587fe92c3ab3317edc58b04b259b82,2025-02-03T14:15:35.167000
CVE-2023-37453,0,0,688beea879fba5f45b055ba0ddbbc6400f31db0bf5103255d2b19ec2de0ca61e,2024-11-21T08:11:44.167000
CVE-2023-37454,0,0,2f6e432da2269381eae5b8211281992618e37122fa5a7abc27d22a1db1174552,2024-11-21T08:11:44.337000
CVE-2023-37455,0,0,c6a24bb6c4f50c17800628cdf4a4ece5759bfe34b2075c554fcb668f4e286189,2024-11-21T08:11:44.510000
@ -231961,7 +231961,7 @@ CVE-2023-4106,0,0,aee4575b6bdf6692cee5993128ee226194b0209efe034a12fe845e72b8e82b
CVE-2023-41060,0,0,8acbf53c221aa8609455ec7009a2cfd1d896c4555480736ac3e300fbb5307d69,2024-11-21T08:20:28.793000
CVE-2023-41061,0,0,51f7d5bec3db4b4922f90bd9e41c0b71fc7a7ea6b11425d8b5b9bd5abb61bf60,2024-11-29T14:27:09.157000
CVE-2023-41063,0,0,201d4f1370e6bb557e49bc49102255275b7136fd46e104de566667668fcbf829,2024-11-21T08:20:29.117000
CVE-2023-41064,0,0,72ac17b802b429a251f9356e21d9f3dc3e530be183aad4a4617d0e83003920f9,2024-11-29T14:30:06.457000
CVE-2023-41064,0,1,500747e48ebd8bee1f4056044d76e76283841fab57d51f6226da5a1db89f5881,2025-02-03T14:15:35.367000
CVE-2023-41065,0,0,7c9d34b2be3b8ffcc8a5f9fefc26e5797a4e98ed595d93b611006a9fd40e1baf,2024-11-21T08:20:29.377000
CVE-2023-41066,0,0,7fcccf01dbe2851958d26144e25ca86168baf1325738da8944d134156bc88dfa,2024-11-21T08:20:29.540000
CVE-2023-41067,0,0,be7093ae210718b9259fde08f758542a3144a7d18833986a4c00347c1e05442c,2024-11-21T08:20:29.687000
@ -232721,9 +232721,9 @@ CVE-2023-41987,0,0,63943d5aad6843ea1cd613c467c8126a79f0f1ada88a8e913e4ad95dde242
CVE-2023-41988,0,0,70f525e241ab930717b8bfe411a64eba2ac0b4dfa646efb4a8597395152abeff,2024-11-21T08:22:03.450000
CVE-2023-41989,0,0,f3b7543034092616a5ff14f6a1d09cd6e650b8198983509d896839f5a7c28656,2024-11-21T08:22:03.623000
CVE-2023-4199,0,0,83c42a8c59a768bdad748ced515fad50734472b131209c5d94d5c83b8e0e9b76,2024-11-21T08:34:36.470000
CVE-2023-41990,0,0,a54b5680f267aa187518a44533cffb59647b3d00addec1efd53a07ee9ddd3ad3,2024-11-29T14:39:00.893000
CVE-2023-41991,0,0,2fb2880aa40074b032d65ce6ac7506e6365b0b65aed846b5628a9026a23a0ffb,2024-11-29T14:41:00.430000
CVE-2023-41992,0,0,9944f25da860c7fc53365c19a76d53290f304dd150b6360220b5f639ea3be66c,2024-11-29T14:41:50.523000
CVE-2023-41990,0,1,987b85eb7dcebb9470d60d2d55830a1442edb1d0827efcd172cc595d47962d6e,2025-02-03T14:15:35.587000
CVE-2023-41991,0,1,a165ea9f1697fb3eee0b8d97144061fdcb2362a519309e435e65c401bdb86eef,2025-02-03T14:15:35.770000
CVE-2023-41992,0,1,e90ca128093204affd7d9b00fd43f7a16a0513b2a732c263d335c93baf2216cf,2025-02-03T14:15:35.983000
CVE-2023-41993,0,0,bd48d882a96810dfe23f61a5030d88b925d2e7f1533943705b9c74ec2cca8319,2024-11-29T14:43:20.857000
CVE-2023-41994,0,0,2c16cb2dff4d40cfd0c6698cc2693d650c7e7fcec66572d74492730d2c501f11,2024-11-21T08:22:04.450000
CVE-2023-41995,0,0,ed618071a15f3da77f98b982998e0fe23f4f20ff643e82d8b25f9d0148b39b7d,2024-11-21T08:22:04.573000
@ -232897,7 +232897,7 @@ CVE-2023-42230,0,0,a27cd39883b0aa87ed9da74388e020439f1f705309294234881c5df5124a5
CVE-2023-42231,0,0,4f1f9fef9e80ae22acdfbc6add56780d88da483e465358ebb92145f0da58aaac,2025-01-23T17:15:12.523000
CVE-2023-42232,0,0,fa2d9124c7c65a485edd8978845f7b84ad24baa786bf8a8a20b9645de5b7810d,2025-01-23T17:15:12.693000
CVE-2023-42233,0,0,0ef765427d2c364bfe6113d71a0ecf990a7a966648b3ce549ce24f50c68a4a66,2025-01-14T15:15:12
CVE-2023-42234,0,0,e33d66e45484b63183541ec4f20e75f5ecaef9c38c89933966683769779e6a81,2025-01-13T22:15:11.593000
CVE-2023-42234,0,1,c0dc51cc0039010a8c12b5e5b547fe57f0f39a5f3877a3d854be3ca0f8196055,2025-02-03T14:15:36.287000
CVE-2023-42235,0,0,92233c5635fac4a80ca7c920ec3549a2b8f4c787ec74c75df0ad60a20977d8fe,2025-01-31T19:15:15.320000
CVE-2023-42236,0,0,1cb7200d71e5a2a678f2d005b05e2be575a7e3797c2aaa683390e01ff07d3cf4,2025-01-31T19:15:15.497000
CVE-2023-42237,0,0,50da78ef2c69b06622e097bf8c5854521f0af8d00206e662c197bb1d4fd4bf63,2025-01-31T19:15:15.673000
@ -233337,7 +233337,7 @@ CVE-2023-42820,0,0,360f655e3f66c4c0cedc09cbcf22bb489087831aa4177c40aab6660494001
CVE-2023-42821,0,0,4ff1a7c6846cccc9f5711122de8292be7f6c8066fb02a3b8c0518241e43eacf7,2024-11-21T08:23:17.253000
CVE-2023-42822,0,0,3aff799e080177d4ae1b6054402a40b7eaf0d79432d42e5d1eaf6c4a018ac277,2024-11-21T08:23:17.400000
CVE-2023-42823,0,0,70dd7f6b5c8bc5a829a8a72c8db49652d99b172be25cab71e1ba63a6c349e42a,2024-12-06T14:10:33.737000
CVE-2023-42824,0,0,fbab300b421eef9746a3064fce9bc8b6eeaaf600e6642ec0d3b5a6981e34e19e,2024-11-29T14:58:56.110000
CVE-2023-42824,0,1,ebf80278ad9f848e260999553b1c3df339307501a2940cead18e71446a72d1c2,2025-02-03T14:15:36.527000
CVE-2023-42826,0,0,18c3f092c50325a7434f872ea53a0b6e051bdd304850f7e7d1728b663c8625b1,2024-11-21T08:23:17.873000
CVE-2023-42828,0,0,7dc273404c9d73cdc9817148a82a06ac9c6ab358e3afe28eb8eecd4dd3650dc5,2024-11-21T08:23:17.990000
CVE-2023-42829,0,0,ed6ced541e4937b8fd45903738fb6c679a366c4155f22cf3dcc5650154983d96,2024-11-21T08:23:18.103000
@ -233423,7 +233423,7 @@ CVE-2023-42913,0,0,5818c393b5d92a4eb66f2c6d03629fd68ca311b60c9be586a1369817c61c6
CVE-2023-42914,0,0,fbb02939bd4a080ccbbaa419cfd9c0443a345ff12dacb4e05171bdc8d52fbae4,2024-11-21T08:23:30.140000
CVE-2023-42915,0,0,a491c801967ea665e6a1e7894d12e52fc0e3bc74c17c4ea7b2e5a98e97053fd8,2024-02-14T03:15:13.210000
CVE-2023-42916,0,0,c4f2d6fad88b2ab94029c8171644207bc7bb425f096dc8185d78b52adf2970af,2024-11-29T15:03:51.967000
CVE-2023-42917,0,0,18178b24ce5a1ec8949f2c585a5be9d98aa4c54d0bbf65aa2ddaf7165e44f389,2025-01-23T16:37:02.693000
CVE-2023-42917,0,1,4ea8b858fa6407ae16f711db6888c04c3dbe982da5e780ca881ac152490b6075,2025-02-03T14:15:36.743000
CVE-2023-42918,0,0,e66ebe9c2bed61829c0393c11e08cd7bec391609452471902134a42b7654cfd3,2024-12-09T21:28:58.763000
CVE-2023-42919,0,0,0c3c70bb5f2863412b2b2dd67082465102a85fe428dafa015ca9d7e89c5e148b,2024-11-21T08:23:30.927000
CVE-2023-4292,0,0,d9de54c2172d4a0bd9014f748290f40f3a2200aa50a679e4a1ee0d613f997768,2024-11-21T08:34:47.827000
@ -237456,7 +237456,7 @@ CVE-2023-48626,0,0,2af153aa2d12e8bccbdcc3121e06d29ce06f8c611c78f3430bad9a335ad97
CVE-2023-48627,0,0,79a71ad4dd8c25d41f759d2ac0f7a7ff291cbf6f42b61906743acd6cdf3ca4c2,2024-11-21T08:32:08.093000
CVE-2023-48628,0,0,9d5070980366879f7378b90806bf1c27afee4829d2fc3740328643d68bf53451,2024-11-21T08:32:08.223000
CVE-2023-48629,0,0,3a4540b0c500bb6b13df10b315420e93bbca61d5e1ac06cc30182579f8c5e35d,2024-11-21T08:32:08.353000
CVE-2023-4863,0,0,2a53abbac75949bf63e5c95c658a9b8754e230474394da72a1ba4f28e8539e56,2024-12-20T19:00:21.050000
CVE-2023-4863,0,1,7908203f1d812dc0c32a875a82689f53ffe6f22582ec4075ec6101a2b1aaa0ff,2025-02-03T14:15:37.023000
CVE-2023-48630,0,0,323d466f78d66dde44369783936a935f801ed95b754aca894e70232a0011de21,2024-11-21T08:32:08.480000
CVE-2023-48631,0,0,5fc9ca6467e10ad9aee2039a339f1a64d3a2a8e2106834788969c7d345e5579e,2024-11-21T08:32:08.637000
CVE-2023-48632,0,0,6eb8c9a4a6fed16fcf4c60479b30c8f448167a4778b02eb7c40fd752478da1cb,2024-11-21T08:32:08.773000
@ -239883,7 +239883,7 @@ CVE-2023-52161,0,0,cc2ca74d32bca44f3652e1f4e14ffd83723d50b42d0c6e13fc3025c9ba0c8
CVE-2023-52162,0,0,a69328f8fb5f7f70dd12cdd38f629353874332b1168b51730a7e4274bd411616,2024-11-21T08:39:18.893000
CVE-2023-52168,0,0,c7cd793d041918ccc6f2175c08a72a3489a14e0bb9eacde53b0b8fd2753e8f0d,2024-11-21T08:39:19.110000
CVE-2023-52169,0,0,9be3070ec5123d1f488bab859fcd5265610f3d610a72d91e6cf96799be93bcbb,2024-11-21T17:15:07.820000
CVE-2023-5217,0,0,a23e352bd9b23a72748039bab84a9e1cc678d04587ba48d3cc49f775e2a2b4b5,2024-12-20T19:01:23.347000
CVE-2023-5217,0,1,d44e1d2f72cb8b5db95a55c2054613a61b82f8a9115f7aa84863f6c0994e909d,2025-02-03T14:15:37.370000
CVE-2023-52173,0,0,ed376452139780a426e6fb1f246c87d0fc83b96168283628454105d358c3da2f,2024-11-21T08:39:19.490000
CVE-2023-52174,0,0,cddc1bb33013f601d307d8cfe53781cf69c2773c9e4269917e19651a324e2d2a,2024-11-21T08:39:19.660000
CVE-2023-52175,0,0,9ea7be8febb1e639e6a626e1a8f3065c69288fe48574a14ecc524f01efa6bee8,2024-11-21T08:39:19.813000
@ -240252,7 +240252,7 @@ CVE-2023-5258,0,0,e7de433a5f8b0381668aa81c56f5663c687e057bf10b9164f07834413eaf9c
CVE-2023-52580,0,0,be0a0e06ead2361ae48d45b0aa80d77f09800c6568f6ac2725bd6b1b9aefbeb8,2025-01-16T17:43:05.203000
CVE-2023-52581,0,0,c3e6d5af82028afac4a4ca1f703859e3b8715280d49e5b32567a0d2d07c327b8,2024-11-21T08:40:07.010000
CVE-2023-52582,0,0,f412b70c6b5d57415fcdb6864c794b98a72ed689a3f46467eda4aa933ef09985,2025-01-16T17:33:18.490000
CVE-2023-52583,0,0,9d7df34918ccc0dedfe778740ea8fa6aae50f297274da9bc08d14940c75f6a3b,2024-11-21T08:40:07.307000
CVE-2023-52583,0,1,e46a4554888ecc302b9234bbffc66d09b6f50262b0a49874d8de91ef5fc33ea2,2025-02-03T14:18:13.147000
CVE-2023-52584,0,0,5a522db273229117adff319e88be80a572f8d8a3e6725b090908b5d18b4058f9,2024-11-21T08:40:07.433000
CVE-2023-52585,0,0,db7e2649e543632d88de0ba5f9f4eb76dfbd693c00750d96eb1fd47af92129fb,2024-11-21T08:40:07.623000
CVE-2023-52586,0,0,fbdae8685964d88e3fe29d0c54b12509eef932eb716f6f2924afcd7a7247f4a5,2024-11-21T08:40:07.803000
@ -241611,7 +241611,7 @@ CVE-2023-6341,0,0,8ecd43f865afd7caa5344b8fe17a3ea7a3522641beb80a8a947afe15992d37
CVE-2023-6342,0,0,2b3c455968258ed34c39ebb191327647c90e3e84685f08ccc9f067b0934df2c8,2024-11-21T08:43:39.507000
CVE-2023-6343,0,0,ed6f2c610ee4698d428e1242bb3c9253625355d55d76cd1ea75478ff32cde2fe,2024-11-21T08:43:39.670000
CVE-2023-6344,0,0,b19585bc4f92d839c4c31e3142088ddaef3492c596de4a6ec59addd057cb77ed,2024-11-21T08:43:39.823000
CVE-2023-6345,0,0,9e61a60b51254ea9d792ed1e2112a7d7a8c61ca5d58a313503e137332acfee5a,2024-12-20T19:00:58.223000
CVE-2023-6345,0,1,ec91a16b71fa4cadf2e2c00690ba802691a2d72b1f72f5aad4ab6170010d8493,2025-02-03T14:15:37.710000
CVE-2023-6346,0,0,69b9fa64118162df8c1ca3fabc04a7b924c72ea3fba2eb0b4d4a970f8597bdb2,2024-11-21T08:43:40.143000
CVE-2023-6347,0,0,b705c1c6a4a54e8880ddce8ea8d2a41c6f19a7013e8b35f73dde8f1f7fd7e6d5,2024-11-21T08:43:40.283000
CVE-2023-6348,0,0,0f7379de56995dc0b0c187185cf9e3fc0fabaf4d795f78271a10ca073a7614ff,2024-11-21T08:43:40.500000
@ -242210,7 +242210,7 @@ CVE-2023-7020,0,0,197fd2fa8d1d4a18a6a4294ec49a94d748ef7ab3b8641e1f8788b50c52350f
CVE-2023-7021,0,0,c90f0d59c2315eb60681259fead187f0526d5fbf18a87677fa680c04abf0c8f3,2024-11-21T08:45:03.430000
CVE-2023-7022,0,0,856fd34983e00eb10af7bbfa2b247782306c3cd9e203e98bbb5f4bce3117af9c,2024-11-21T08:45:03.637000
CVE-2023-7023,0,0,4e802c403a190e5bf3fbdeb4ce4568b9f0ede0742b2ccbd390feda6a6eb357cf,2024-11-21T08:45:03.803000
CVE-2023-7024,0,0,a170fdf780e8fefcbcfa8b8fbdd2e1fcc20a297924bc4aceec4d585f25d7aa51,2024-12-20T19:01:40.967000
CVE-2023-7024,0,1,79a30afe3007ff3b2540b6e89d5923ecfad9ffdd4fca27a2f59c45d361c6405e,2025-02-03T14:15:37.920000
CVE-2023-7025,0,0,145c0a7dc7eb75d64af8eb05c1d2d3dac33609c0032da4138aea95c3c490716a,2024-11-21T08:45:04.097000
CVE-2023-7026,0,0,98716ce8e87964958034bedfc875bd5c13b34d49f4803350e191e9f77d9640fe,2024-11-21T08:45:04.243000
CVE-2023-7027,0,0,1831de41a592a60eace373737109c08997b01ea4f32d34c6623fc7de027bd240,2024-11-21T08:45:04.383000
@ -244600,7 +244600,7 @@ CVE-2024-11417,0,0,cf06fe8c782ce95e239bce3cfdc56c15512df782eb926cc63cc8c9c25319a
CVE-2024-11418,0,0,535b692f50d805c4818cee62531f6352bfed10bac65a921339df0cdb31e46f30,2024-11-26T04:15:05.237000
CVE-2024-11419,0,0,e5014d0a20f8da57d3c2f2e9aca265f8c88437545b7df01014bb52b3f903da56,2024-12-12T04:15:05.467000
CVE-2024-1142,0,0,e15d337f366ba06849b1f848d8db9c587e5c183aee7e98313d369c15ae012a6d,2024-11-21T08:49:53.680000
CVE-2024-11420,0,0,1711c7ba1ba8c097f09567c5d53d049cbf7bb1bf6f7b471b4caaac9c33673bbc,2024-12-05T10:31:39.750000
CVE-2024-11420,0,1,d4dda4542ada6372d8ee5f14d387a2833f4db078214912e8d6efa098ff23acaa,2025-02-03T14:39:02.507000
CVE-2024-11422,0,0,d1cf88e38537f70de74fc8b64f9c3e65e73b4d811550436a72b14f9f7dc86b7d,2025-01-29T17:15:26.947000
CVE-2024-11423,0,0,5fd92d7acac7c9d9434b04e44769038fcd9ed45fc5418a964960dfeca17d19b3,2025-01-08T11:15:06.003000
CVE-2024-11424,0,0,d50ad6baffad28053a50f50d0d95ca3de9adf87a3fb1a59a3e023fabb9b6d399,2024-11-21T13:57:24.187000
@ -249590,7 +249590,7 @@ CVE-2024-23218,0,0,0006a236dccd6d4040de501ecabab6df2a8d4ae9a8e9999585907fe0592c2
CVE-2024-23219,0,0,b081eba13aaeb24e29a434866a76e06908163fa30bca3b04413807e5b483dafb,2024-11-21T08:57:13.093000
CVE-2024-2322,0,0,b6a3f2a7272ccec85731db5e0c1d24de9d87c1f88cca07a2e8f931dd31cd1f77,2024-11-21T09:09:30.220000
CVE-2024-23220,0,0,56ec6c9a0c3f534e407a25990b76d9f9791ed14187a0ea0d7f9d644c10ee29ca,2024-12-05T16:36:26.020000
CVE-2024-23222,0,0,234fbc8851ab910f53af22b06eaa70a751c876141fb023e6fa28056f96c7e426,2024-11-29T15:05:53.577000
CVE-2024-23222,0,1,8a89efbca457c119f6fa737db7f2bcbd7d7ae874e824e9cafa7671f30cd61ab8,2025-02-03T14:15:38.223000
CVE-2024-23223,0,0,97ac05c5bd628f6060d7675906f33d1fe0db77305c0052816974d888e538e42e,2024-11-21T08:57:13.563000
CVE-2024-23224,0,0,3122876ced1cc8436d3e7eab9ff8a2d8aa1d77b5acc6cd7e0eb039ac24059a35,2024-11-21T08:57:13.717000
CVE-2024-23225,0,0,eb0782fbd39efc0814ff4369aa9a949dffdf3d310db982851067fe25e2177b43,2024-12-20T17:08:54.523000
@ -252131,7 +252131,7 @@ CVE-2024-26650,0,0,c37b82afef74cba8f0a1b3081e8c53c80ac8f73689ed9f1c045183b9566d9
CVE-2024-26651,0,0,898711d0c00a026cf190f460e3b24d2751f2699fd4b1b6a25eb50a9711c0c7b9,2024-11-21T09:02:46.027000
CVE-2024-26652,0,0,105744a3326cfd97769655231f5141eceba4e2c7ae5c2e6279ca9167a71c0f9b,2024-11-21T09:02:46.153000
CVE-2024-26653,0,0,8866d2d1752b4fe3a78b08cd6c19a2f178b3cbc04d520bc84ae31c43b66dc51f,2025-01-14T15:37:45.440000
CVE-2024-26654,0,0,8f93e16909bf805f9177d9a03ded410b38c7e34be332c9b83ccce69a3fc26ac7,2024-11-21T09:02:46.457000
CVE-2024-26654,0,1,3b9733514348f22bc9a84fa3928369488859dc6099e0c8c0edcee02b3a089651,2025-02-03T14:32:27.763000
CVE-2024-26655,0,0,44c6fc1f60aa28c9bb65a03278297b88c473f78c7cccc5d35bc94149a1733e48,2025-01-07T17:19:13.987000
CVE-2024-26656,0,0,87294d191c345c70a4c471a87fe66eabdaba9c1d9c21608ca348166e40c96d44,2024-11-21T09:02:46.717000
CVE-2024-26657,0,0,5b20f2d67a13488a4561cdf1804b4d16bd412c492c2f8931f4259c8fdab78f08,2025-01-07T17:20:00.840000
@ -253995,7 +253995,7 @@ CVE-2024-2897,0,0,3be50c7fb1beb72b37f347e1c0851ffd4301791d62380b3584870314fe24d1
CVE-2024-28970,0,0,40de7b82743a11a5ad6d4091afb1ee76e91a11478a88b6485d9e52873333afdf,2024-11-21T09:07:17.760000
CVE-2024-28971,0,0,f66f1681f508eec910c6120904031eb3e3b88e02cd01a61289866852e8315622,2025-01-27T18:43:23.280000
CVE-2024-28972,0,0,12c7e7efe1195c680c17aa2603704c5c29d6e9fd7636c8c8b733f1d9d5598f42,2024-08-23T16:59:11.070000
CVE-2024-28973,0,0,86aa9cf0dc99bb53df773cc3bda088c9d09d4cc3e05322d984b9256344b8573b,2024-11-21T09:07:18.133000
CVE-2024-28973,0,1,132aefb3ecaeed2d626d66154aba3183a480c5104b736657f552f51e72c3c256,2025-02-03T14:59:08.020000
CVE-2024-28974,0,0,cafa85cdf7b832ddfb2a161f172cc8bc805bce9ff25bc7836bd13d404481d6ec,2024-11-21T09:07:18.270000
CVE-2024-28976,0,0,caa8bfea0914d137c2be9fb5457606e9907ed9fa635d4e2043de70a7a5286800,2025-01-21T18:50:59.433000
CVE-2024-28977,0,0,08e5aa631d446df2875f7b417e5760d9e5fd3f4ccc9e4a23eb70ca460e37cb69,2025-01-21T18:47:57.500000
@ -260108,17 +260108,17 @@ CVE-2024-37049,0,0,3faf1be2f8c30447cb981394fbe958b894b689bd637dd334455e8429dbe17
CVE-2024-3705,0,0,f21da8fc69aa938cfb790a9082e98081d18674f94a94a372588a67b21121d893,2024-11-21T09:30:12.947000
CVE-2024-37050,0,0,31ab888c9f9e34bbe83429d9c1d54e87c1daf97215182590687befdedffb4cbc,2024-11-22T16:15:24.150000
CVE-2024-37051,0,0,3ac6461a784c37c89e0f75dc3f38c5b19ec6cd9f75f2d6791fc8a776aa531611,2024-11-21T09:23:06.323000
CVE-2024-37052,0,0,fb40af954706d7526971788523c19602f19ec6c9c52ea65e81509481644e6b67,2024-11-21T09:23:06.550000
CVE-2024-37053,0,0,9962b7ec932bbd125baff1a72a5d165f77742d060fac92e436638b22769696c4,2024-11-21T09:23:06.690000
CVE-2024-37054,0,0,3cfa3cad5db6297cd38ea99aef7dd3a618f8a19b62b99941109826b742464648,2024-11-21T09:23:06.817000
CVE-2024-37055,0,0,56979aaacbda055ccd160b1cfc4e7e2bcfef0a62b445eeaba7d4f06cae5bd2be,2024-11-21T09:23:06.957000
CVE-2024-37056,0,0,9ccc350820b34ce1c99c76f63480e7af82c232185dca4c4d1e1faa556277b040,2024-11-21T09:23:07.080000
CVE-2024-37057,0,0,fff2526a78320bf328852973989afb4f4b4f69487679e499df80b3c254c434ab,2024-11-21T09:23:07.260000
CVE-2024-37058,0,0,dce65b8946adf1dfb5d8df510682ff1155bf31d2b7855267243dd4471b63d24e,2024-11-21T09:23:07.470000
CVE-2024-37059,0,0,43aa3214bbe3964262c627306e6c675f1d65afb2548a0884e943bd92c8517260,2024-11-21T09:23:07.600000
CVE-2024-37052,0,1,835f667260879cf54dbbb83d03e67c421960e64a3c3bdf0999c5f66c51de95fa,2025-02-03T14:35:02.407000
CVE-2024-37053,0,1,3143d9389340f5a62f6ba0625e46607425a401258fa3d4b5f5264473f80ddcc9,2025-02-03T14:35:07.880000
CVE-2024-37054,0,1,29e7829f3e6428ba020385fd80a9b52d8d31697251e9ad4c20ca30078d54470b,2025-02-03T14:40:37.527000
CVE-2024-37055,0,1,27775eae58b7579b15dcfff90b50e34c82cfc34439d6f37d1a8e9870cb301069,2025-02-03T14:44:39.397000
CVE-2024-37056,0,1,caa33549f4d758a97badfd5a07ac9796d844825116401247ddf7c2cbf1ff4fca,2025-02-03T14:45:07.183000
CVE-2024-37057,0,1,3eeb5fa46bd4828c000c97c3d7a0ab15d0ec06a904bbeeb820960a2483e8faec,2025-02-03T14:45:23.600000
CVE-2024-37058,0,1,c857fd660b76c44288bdabb743f65a26f198b6f8dcf748e6642f30b96949ba5b,2025-02-03T14:46:16.247000
CVE-2024-37059,0,1,bc49fbbf3574457f7622427c59788a70e80719b1b442b05a025895a966ad2830,2025-02-03T14:46:23.250000
CVE-2024-3706,0,0,94287a969919df14f6f8ee55764cc05cd6eef1cdab17f2ab6f382298a7e81c58,2024-11-21T09:30:13.087000
CVE-2024-37060,0,0,c09c3257ef2d15d3b87fe3c7c9f692d1e5389a82e77f613bde5b6c810183477a,2024-11-21T09:23:07.720000
CVE-2024-37061,0,0,fddab15d3094b68080b39d83c98d6db584da8d2da86cf9ea47766460f1e50633,2024-11-21T09:23:07.847000
CVE-2024-37060,0,1,5530cc77d916f5374ff5d9f79a734127db904f6af8ce1cd5cca27895d7b6fa67,2025-02-03T14:46:31.613000
CVE-2024-37061,0,1,b87d4d4a6e95c47fe61f0d64fcecf1fa7274fd2d8dc81fce6c508eb1e884cd88,2025-02-03T14:48:37.123000
CVE-2024-37062,0,0,2bd04abe4dde8ed6b271ce3f8eb2ef0510671250c19b463ea6a013f3d64b567a,2024-11-21T09:23:07.980000
CVE-2024-37063,0,0,37a6db4262065d47e765009bf8ac3ad355d6a0505389321e2acbe1de264b2767,2024-11-21T09:23:08.110000
CVE-2024-37064,0,0,78f6bdc3d8227ddbb7ed505f12626c0035377a32a1898870361365da42c04f85,2024-11-21T09:23:08.240000
@ -264208,7 +264208,7 @@ CVE-2024-42417,0,0,f1c80c711a679210ceb5e01a64e3cd4fa77e11abf5bc2a3fb017e31ac06ea
CVE-2024-42418,0,0,d8c279b34a2436c7978f2dd5ccc38b1a5c29d1a2243b3f21749da924dbafbcdc,2024-09-04T18:22:22.583000
CVE-2024-4242,0,0,4ff5a517ebe58f036a76713683ac8fcf9970f47f5a76e6ec9a8aba3ffb1d13d5,2025-01-27T18:29:46.497000
CVE-2024-42420,0,0,c141965d63744fc1061446ee1ae1162360d4790ebb601639ac109ac40f0d20d4,2024-11-05T19:39:31.913000
CVE-2024-42422,0,0,8b09bff488c8dc8569c2dadccec15aa8251396e2acb2d7fe429e2fbb66fc669c,2024-12-03T13:15:04.987000
CVE-2024-42422,0,1,a234770e7b65a5a9c7aeea5fe74966a3b1bb651be5713a21eeec2a7c5dc12323,2025-02-03T14:40:15.143000
CVE-2024-42423,0,0,8264e3551cb249dc1d0a50016c0beecba4be32a4ea61b5936f8d0d7397afda33,2024-09-20T19:42:20.417000
CVE-2024-42424,0,0,cdd20f106ec5d8232f1cf93d7c25f7e27225ced2de6387354bfbd69f26558307,2024-12-20T14:41:45.593000
CVE-2024-42425,0,0,4b136399741737f30b4c8074218caee04298fffe4ffb70bb1828268e47340c65,2024-09-16T15:46:03.110000
@ -267780,7 +267780,7 @@ CVE-2024-47463,0,0,0dac3d7125bccc1a673d468378cc81c511268e1f45f55b3574b748f788c1f
CVE-2024-47464,0,0,547614204d1f6cfc29d3faea8ceb0db89983ab29949fcfd3f158bcfa0ee8d9ec,2024-11-06T18:17:17.287000
CVE-2024-4747,0,0,dc86c3306ee43b541fd6b01412a7d057d47b79f0d0be13cb5d0ca8e311f58a48,2024-11-21T09:43:30.670000
CVE-2024-47475,0,0,bf0f8358bb387d27925e7e2bcc11679964bf5b3a92ce72f7eb49a3a11a0c2668,2025-01-09T16:04:01.680000
CVE-2024-47476,0,0,4b2b06dd3edf6a50e3069588182cd49c842e9fd0ba0108e65c538bf5cf0a82d0,2024-12-03T10:15:05.883000
CVE-2024-47476,0,1,6e990c853e692a8fd64c99a9ad1b15c530c423acd9421da07d1db5546a7d2cd5,2025-02-03T14:48:29.350000
CVE-2024-4748,0,0,0e1bf604cc16c6bb1a8683ee11cfaa8201b2be0b492e06be1984933dd6cedb52,2024-11-21T09:43:30.787000
CVE-2024-47480,0,0,44d73a6ff9ee57b8ad644b90b4f723a6a3c5019bc50da4f34acddcc6771b4046,2024-12-18T03:15:26.583000
CVE-2024-47481,0,0,71ea09e89917de5bc1b44200d74f1ffc8698bb7da082bd763134d649f33a6380,2024-10-31T00:01:40.487000
@ -272156,7 +272156,7 @@ CVE-2024-53799,0,0,783da60a33ccbce78617be33a3c476d287119720767ee98d4405ce9d100a8
CVE-2024-5380,0,0,226318c98a74a19f1dd2a14061de91ef6b8613a700730137544bc16df39ee24e,2024-11-21T09:47:32.550000
CVE-2024-53800,0,0,56635e5542038d20a727e4d779e35bdd05d1d3369439d6f17b76b02c17fd3159,2025-01-07T16:15:35.883000
CVE-2024-53801,0,0,95df68651124aa797a705f7b5a5f6851e90e49bc961e22dbe8e54a1034ec1e08,2025-01-08T16:20:07.380000
CVE-2024-53802,0,0,d38c12f04c4095c1a6ac4f4dc30d15b9305c85ea7eb04aa1ddfb5bdeec10087f,2024-12-06T14:15:22.430000
CVE-2024-53802,0,1,198f0f2ee910fb32d3453aef55190d645dec3436b91338df8b11834a2bd89e9a,2025-02-03T14:36:22.700000
CVE-2024-53803,0,0,3ee8313ec2c5826e6c44093bf2e19288a4ab5e01b17ba7838c8e2683c5a34992,2024-12-06T14:15:22.567000
CVE-2024-53804,0,0,c64f2291c3e202809c8bf90598d4a2a0d324c8b22742806eb77826f9e995a47d,2024-12-06T14:15:22.697000
CVE-2024-53805,0,0,f6fbe145ee852ec5282c6eab9bdebf9592e6eef4e867082a6f67281833d0254b,2024-12-06T14:15:22.823000
@ -272171,7 +272171,7 @@ CVE-2024-53812,0,0,3daf08a2a09bc066dcbaf09d8fe7037ca8d3aad09ed5b27510d438c07c36f
CVE-2024-53813,0,0,fff049c64a845625087f0ccccc8384a6cbd15c3beb52f62a43074587995956c9,2024-12-06T14:15:23.947000
CVE-2024-53814,0,0,f3f7a69f3c8b1ec6cdad93b7f421d09ec0782bd66db55fd878b84c1dd722d05d,2024-12-09T14:15:12.003000
CVE-2024-53815,0,0,4d649361421c94a2195f0bfec7830320a88f0cec019558375308f4ec8e8bbdd2,2024-12-06T14:15:24.083000
CVE-2024-53816,0,0,99904cb2b32863a09ffb83fcecab84b233dd0123de2e668a6b9e8f875d7155c5,2024-12-09T13:15:41.060000
CVE-2024-53816,0,1,56a2fb8e9f949caf28f6abf3b6a5ef45c79650165ee5951ebe96e003666ac947,2025-02-03T14:12:47.460000
CVE-2024-53817,0,0,90dadaca22557b01c649832be6992774e89f6486e9de4656a58ebe6910c5afc1,2024-12-06T14:15:24.217000
CVE-2024-53818,0,0,e77e8a506c52957be59aac095173757c0fff872f1f8ab7e188f0f2ad8fbf7522,2024-12-09T13:15:41.193000
CVE-2024-53819,0,0,4859512c969bce904dd8523931b7e318bbd4def68fe027c569d392260932164d,2024-12-09T13:15:41.370000
@ -272431,7 +272431,7 @@ CVE-2024-54209,0,0,63985ab9bc81167d6b4445b0fd25467b7cea6675e8cfc38804b37f47f7d14
CVE-2024-5421,0,0,beee81272dab093d85ed7cb0c64cbc71327279f125f7ca465458d45564ecfd3c,2024-11-21T09:47:37.330000
CVE-2024-54210,0,0,f83f30ee27a661d46c5111f7262e27c9f0414dc5f3f0a660c29ce543d494f75f,2024-12-06T14:15:25.940000
CVE-2024-54211,0,0,a0003d81fa664adaeafd319382b45028c00e98bcf6fdefd355db5bce1b24339a,2024-12-06T14:15:26.093000
CVE-2024-54212,0,0,60d354c5b09cd00ebae59ef3487f7d2dcbdfd47360fa3c7281188702d2198526,2024-12-06T14:15:26.223000
CVE-2024-54212,0,1,da37889d055399d33765c37e42d340a0af015f6364c0cac2ae31e2305a826bce,2025-02-03T14:33:05.887000
CVE-2024-54213,0,0,509cdc61113dccf0a4117c9f17cbb87e45d7a6efba5fb2b5bc372f73d2bbb0cd,2024-12-06T14:15:26.373000
CVE-2024-54214,0,0,6a0d19ffe7e7425aef813bcf3c1322b00952909677745d5ce26bafe4dfab7e84,2024-12-20T13:15:21.880000
CVE-2024-54215,0,0,4c4972e5b1b84bb58b882a741abdc0841c8379a0be8dc9634f570589683b55f7,2024-12-20T13:15:22.060000
@ -274007,6 +274007,7 @@ CVE-2024-57510,0,0,ec7ce8a8989b60deefa19abfcbcbedaf5465f5a18359995efee0e693e74ae
CVE-2024-57513,0,0,d9e89f7fd386462137067205c175126bd9ba80cb69a686ee45d8c4ed6a916b8c,2025-01-31T20:15:31.880000
CVE-2024-57514,0,0,13fe20ec02c985be4c4a4af0379f9e9b23030591a55f13ac002a7fb596a5977e,2025-01-29T16:15:43.533000
CVE-2024-57519,0,0,1a1af74905cce20abc5596e2722805c77bb23c1788056fac531228633dff1e0a,2025-01-29T15:15:17.483000
CVE-2024-57522,1,1,3dcb53924a3312b5156e7d870fd94d38bff105719b045de754c15a06650ea5fc,2025-02-03T13:15:21.660000
CVE-2024-5753,0,0,35e5857965ec4fb8ff4da87da0ad57743fc77f757356d105b68f8e07a9b9291a,2024-11-21T09:48:16.923000
CVE-2024-57536,0,0,02e8c7373d9548e0be6ef2dd6f50d54d1dae50f3849a42bda8fca1e700f8b5b0,2025-01-22T21:15:10.100000
CVE-2024-57537,0,0,7a57264ee99ea2cf07d8beff99c09ac577ded2e5e2c43aa0cae71e5949ab6ad2,2025-01-22T21:15:10.287000
@ -274158,7 +274159,7 @@ CVE-2024-57791,0,0,326f1a56f934ffc176ce7b6a2932ae3ce07749c9076db086eba2ded026e10
CVE-2024-57792,0,0,e53647b80dd687b9a2a0064a755fece6d3e4e026a6a0cb58d2d0e7aa75150018,2025-01-11T13:15:29.420000
CVE-2024-57793,0,0,e9b7a7fae892be6eee516cf000e8b375a33c60ab507666266d3a6f69d2535658,2025-01-11T13:15:29.593000
CVE-2024-57795,0,0,c27fd0f8d7d3c2986e45448963a7c33f5baa1cb6168473b82dcd9b787e8c4fce,2025-01-15T13:15:11.563000
CVE-2024-57798,0,0,5ecefb8ce5c363e3b6e1f065c95e1c5fd48fb90a22c6cad7ab6ba67696ea9a04,2025-01-11T13:15:29.743000
CVE-2024-57798,0,1,16d3561f254b9a67268e3fd1903675f3c6069d3999c68a99ddddb4bf962c6bef,2025-02-03T14:53:23.433000
CVE-2024-57799,0,0,629fd8bffc1c970081661553b3588a57b03911cce9c0036c62f31188e3006930,2025-01-16T15:19:18.117000
CVE-2024-5780,0,0,8f257920278f73ebde8da2f9da9c11fb9d019685aae47ae6d2026dc053194989,2024-06-12T08:15:51.300000
CVE-2024-57800,0,0,cba23954046252112d98695b858677ce05a5b64f43351feb6661ff0ff5118fe8,2025-01-11T13:15:30.073000
@ -274188,11 +274189,11 @@ CVE-2024-57857,0,0,42661a463d36aadb20f3e64c41126783ca9e0b1df58ab33691cea597d9ac1
CVE-2024-5786,0,0,8f234ab6daf42312db402cec6a9780e6a0a03ed9070824749daf6f62affc4884,2024-11-21T09:48:19.897000
CVE-2024-5787,0,0,1d58b2484cfc2497ce3be8bc315153e4937b24852bc87d95aee088e2aedc7438,2024-11-21T09:48:20.010000
CVE-2024-57872,0,0,c3ffa0e155e2ac44fac8a82673746753e090198753fbd02da0ed8386c1ecfa6e,2025-01-16T15:19:51.637000
CVE-2024-57874,0,0,2d4c37a9463f93298b5d531547be369d281ebe5f4242275dfbd63daa277981fe,2025-01-11T15:15:07.680000
CVE-2024-57874,0,1,ccedb437ba56ade4509587c360aa295e43ac6f245768ab4ce06e5c2a50c611e4,2025-02-03T14:55:54.650000
CVE-2024-57875,0,0,3a16f7ba20f0485e3dd71d1132dd8a89eaffde288852f03ec6f11461188bba68,2025-01-11T15:15:07.803000
CVE-2024-57876,0,0,86fef3f8a5e8b98f66eadd24a1ef85fb6575aae013277463bce306740c013a1b,2025-01-11T15:15:07.930000
CVE-2024-57877,0,0,58da0e92f9379adbf036a527c421ff8869e65a088cd080ee09a97294a6ec4529,2025-01-11T15:15:08.063000
CVE-2024-57878,0,0,77d31b533956ee5b0b6de4e60e536ef561084c713e8193b62763d8b53ff374bf,2025-01-11T15:15:08.190000
CVE-2024-57877,0,1,8f0461b7329696b353e666b26223a4a86f782d67e8ce099f2b03a4f0cf6907df,2025-02-03T14:57:09.220000
CVE-2024-57878,0,1,eab5b2d1e2790bacea3afd0970e8367d772d893b4d3c95486d955221dbe5236e,2025-02-03T14:58:14.423000
CVE-2024-57879,0,0,5750ea5676872443c5ff1996ebeb6500e7c60dbaab10547ac7ff353f213a1b38,2025-01-11T15:15:08.317000
CVE-2024-5788,0,0,26eba16faf8bba170e4c4924cd3861a76450b8d63d3d592b315f9dc173dd2a7c,2024-11-21T09:48:20.137000
CVE-2024-57880,0,0,1164249640ccbae8f44ec0303ec00ce8897de783080074e0b0de1571b4e8f28b,2025-01-11T15:15:08.440000
@ -274228,8 +274229,8 @@ CVE-2024-57907,0,0,5c2ea095f232c69c7c12886f1f388fe794a9a0374ba46030989a606b4fcd1
CVE-2024-57908,0,0,a6e69175fc6568336ca2705f1a2065a838c7de0d0aa111e2b34f781a4bb3477d,2025-02-02T11:15:13.003000
CVE-2024-57909,0,0,20beca3b55e8ba8e1792a65aa4f8efba94e31f5b40d511d1b8cdf5c3c80696ac,2025-01-19T12:15:25.083000
CVE-2024-5791,0,0,c186795f1b9cb5c37849e995a8b3a0b74da1832637d3182b3a656dc9e7491fd6,2024-11-21T09:48:20.453000
CVE-2024-57910,0,0,b146aea04343b179597ed928611f8f144a04705d696e26cbc5617435856b0c05,2025-02-02T11:15:13.133000
CVE-2024-57911,0,0,03add3eed066e5de16a42c107f6d6f3f9c055886f0c00ee52300a21eb1da1ad7,2025-02-02T11:15:13.363000
CVE-2024-57910,0,1,8608ac6abfac8f417ccdafd980c9b6946bd5a88dadccafd52a7ad793d4fd3d91,2025-02-03T14:48:35.543000
CVE-2024-57911,0,1,1bd58cba4dcc3e15e3e807eeffd494022f72a8e294782de7f37752bb8026d96a,2025-02-03T14:51:30.527000
CVE-2024-57912,0,0,44f7160a1a37bbda2c5c7fa8c6d77c8a6a0382eb187adc2a3d7d300f4cdcdf70,2025-02-02T11:15:13.627000
CVE-2024-57913,0,0,f4c7a2492e587f9186e7f660b6755e3565a9bbd1bab88284bedc36464601cafd,2025-02-02T11:15:13.780000
CVE-2024-57914,0,0,47047672b97dc7073c40b4f814317b314574d03739889bb553935924c13faf35,2025-01-31T15:19:21.703000
@ -274254,7 +274255,7 @@ CVE-2024-57930,0,0,94a6cd36a388f60e55b904e5c2967fc93fc62a2c24f551093d7bc1fc6ebce
CVE-2024-57931,0,0,850feebef8f5e99716b8aee53bc54bf61303831fdecae3825f24d2fe16e517cd,2025-01-21T12:15:26.713000
CVE-2024-57932,0,0,f682dbce85c95d101f3a39c1ce300ce214e215cf8183d2b35f730465c3db3f0d,2025-01-21T12:15:26.837000
CVE-2024-57933,0,0,c22748b6ba91edfdf32d27e38b78d85c8b997f8cd8d2f021e949514b0586a0fd,2025-01-31T15:21:36.207000
CVE-2024-57934,0,0,4f2279d34e133614f4f1bf4c4614a3e308bf893c7f5d63bc29ecc550fe731435,2025-01-21T12:15:27.047000
CVE-2024-57934,0,1,207962b461429675df7424e6a2844d824397eb4a52e2c1c3a3967dca26dd7879,2025-02-03T14:52:40.740000
CVE-2024-57935,0,0,8b3eb97b6b95c3fe9d0c269036f5d7d9ad4b4664482a4f748b3e7a6a9e25f371,2025-01-21T12:15:27.153000
CVE-2024-57936,0,0,76bb9a17847208e201d8a03062287095715af2de891728ec102a50fec66b64aa,2025-01-21T12:15:27.257000
CVE-2024-57937,0,0,f2713cfe55ce0b98723add19c398fbf3ee712c696fe715eebadbe1d21a06c1df,2025-01-22T13:15:20.400000
@ -275178,7 +275179,7 @@ CVE-2024-6786,0,0,24b60530c6034531c77c2d1b48861d1803ea99b2f9c33031d04caaeed70b36
CVE-2024-6787,0,0,90cf15e57425c43b775634b4354b40060025f05d6eaf18a16dd08f964b080f1e,2024-09-30T18:02:51.080000
CVE-2024-6788,0,0,d8b0a1fa7769433e763a36830a142df8174d088944fec86d083b39a4d3db018a,2025-01-23T18:57:17.443000
CVE-2024-6789,0,0,4b9a8b21a7b8d3b3122250d144669cc58eda4febe37ff5f20b051cf858077c6c,2024-09-16T07:15:03.877000
CVE-2024-6790,1,1,c9ba82118eb198dcab7bef258c9b51e7baba4ab494c959cbdc0eda80f665bed4,2025-02-03T11:15:09.583000
CVE-2024-6790,0,0,c9ba82118eb198dcab7bef258c9b51e7baba4ab494c959cbdc0eda80f665bed4,2025-02-03T11:15:09.583000
CVE-2024-6791,0,0,e4d85f8fb40ccafaaf4e816bcb0b2f9bebe7794b5d079179e81702c8126cea44,2024-11-21T09:50:20.043000
CVE-2024-6792,0,0,2dec27d0d2b25a881ca7ccc36c231e588713f0bac92b84e46fea473abaf6d1e4,2024-09-06T13:35:02.020000
CVE-2024-6793,0,0,089acc836001f0515cb87092cae48bd40391064797e4f212fffbdb1dff2f2803,2024-11-21T09:50:20.327000
@ -277886,7 +277887,7 @@ CVE-2024-9996,0,0,433ba4c226a5a6d2212e25ce0b55b45b5a0aaae59192553eedeafbaec42bc6
CVE-2024-9997,0,0,c951d1dfad7abcf434414a546a4fccad53052e3fa40c16bd73a8c37c97d5eba8,2024-11-01T16:27:34.960000
CVE-2024-9998,0,0,0419a3dad23ae850906f2650ca4d40b180999b4a5d360bcc1b838f8893ae2af5,2024-11-12T11:15:03.840000
CVE-2024-9999,0,0,cad7c92a380ae514b71a1dd06f3b79a139ea65cb773110d32be2b942d72ae5af,2024-11-13T17:01:58.603000
CVE-2025-0015,1,1,6c32934e2662360f0aaf48ec9aead33ec5d7f507933dfb79b328ded43c444db8,2025-02-03T11:15:09.807000
CVE-2025-0015,0,0,6c32934e2662360f0aaf48ec9aead33ec5d7f507933dfb79b328ded43c444db8,2025-02-03T11:15:09.807000
CVE-2025-0053,0,0,b8373307f8e7839c7035660b5035e0ad8594f9f834cb4c64706371a8c3a2ce31,2025-01-14T01:15:15.403000
CVE-2025-0055,0,0,0e89795bc87c51adbc679d78b37bf974fd01b97679ad0635934ee83322d4b078,2025-01-14T01:15:15.570000
CVE-2025-0056,0,0,be034bcd972f419ff8782984466cba082295f005cb1c5e6f9c99f15962645479,2025-01-14T01:15:15.730000
@ -278608,7 +278609,7 @@ CVE-2025-21630,0,0,b687cde38a98e756a80e569a98743dbd03093e3308ce5058c13044fa43b51
CVE-2025-21631,0,0,951b6661489b5599322546106915b833076b58b2852a68f2ceeec40d618b9337,2025-01-23T17:15:24.477000
CVE-2025-21632,0,0,319c971763f332a963bcaca50f66216a12a2c5a0d07d26ccb015f5aed2bdc246,2025-01-19T11:15:08.650000
CVE-2025-21633,0,0,5feddd6b17cfde18f8f70d5415e3d187d491e0f9f4fddbbb10eb6daf6c6066de,2025-01-19T11:15:08.773000
CVE-2025-21634,0,0,f59bdd6262754ea5a79c93a577da540e1b81f510d9d77d33f78b7c9778d600f6,2025-01-19T11:15:08.890000
CVE-2025-21634,0,1,c8b95aca08c2b45c9dba95d6155aefb765f07edea9819768e8b59b392e1eaba1,2025-02-03T14:42:29.407000
CVE-2025-21635,0,0,f68693db8da33a37c51f7f5f67c2bc3befefae2a56081d367cd2c2267ce553f1,2025-01-19T11:15:09
CVE-2025-21636,0,0,6097ea20b833d9169f54205d90a302acd27d436dea66efcd6b9cee92a1babbe7,2025-01-23T17:15:24.790000
CVE-2025-21637,0,0,b7a8d56ddd50af1471a0f4d7cac298ed3a55c9230ac55675f7f04a67673d6a2d,2025-01-23T17:15:25.090000
@ -278626,7 +278627,7 @@ CVE-2025-21648,0,0,1e28b61383e7660836dbbb26d762b1871cd28f2a60ea4ccb673beb9382150
CVE-2025-21649,0,0,83a08c42f448e1e2fb20d671a214f30c7bf25568b8e5958ef29572790d694059,2025-01-31T15:56:17.907000
CVE-2025-21650,0,0,5c2cc290747169083422e01affc4fe11f3615a46223fc7a7cd149465660494c6,2025-01-19T11:15:10.630000
CVE-2025-21651,0,0,d057ff764ce31c4ac7e93c37cb4ba424635250ef668040e2530ccd52f14e89f7,2025-01-19T11:15:10.733000
CVE-2025-21652,0,0,1a1131cb46a3082eb5d5a1a681e28e180d58365a22bacacb5866276f192831ee,2025-01-19T11:15:10.830000
CVE-2025-21652,0,1,8787e45f49ee4a2d43e3a94c956b2f9a8a26b431f0e0a34e8824bef5db26d32b,2025-02-03T14:43:11.690000
CVE-2025-21653,0,0,4054ad842aceda82766dc1a772620a2211cc9da6d0c6c3e3c2a1ffa9a7bf55f6,2025-02-02T11:15:15.557000
CVE-2025-21654,0,0,4ec90f1484bdb180e8872bd379989357ef5549f6f68655399ae0221a6a448c8e,2025-01-24T16:15:38.177000
CVE-2025-21655,0,0,1eabdf7a355ba98b3a0c06447e719ec81e53cba37d87ec4da3249b7fa751136f,2025-01-20T14:15:27.027000

Can't render this file because it is too large.