From e32be85f0286db48d9137e2f02af555ca22344d7 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 11 Dec 2024 15:04:10 +0000 Subject: [PATCH] Auto-Update: 2024-12-11T15:00:46.621510+00:00 --- CVE-2021/CVE-2021-469xx/CVE-2021-46958.json | 114 +++++++- CVE-2021/CVE-2021-469xx/CVE-2021-46960.json | 165 +++++++++-- CVE-2021/CVE-2021-469xx/CVE-2021-46961.json | 131 ++++++++- CVE-2021/CVE-2021-469xx/CVE-2021-46962.json | 131 ++++++++- CVE-2023/CVE-2023-234xx/CVE-2023-23472.json | 56 ++++ CVE-2024/CVE-2024-113xx/CVE-2024-11351.json | 60 ++++ CVE-2024/CVE-2024-233xx/CVE-2024-23349.json | 71 ++++- CVE-2024/CVE-2024-256xx/CVE-2024-25606.json | 288 +++++++++++++++++++- CVE-2024/CVE-2024-265xx/CVE-2024-26578.json | 71 ++++- CVE-2024/CVE-2024-421xx/CVE-2024-42135.json | 96 ++++++- CVE-2024/CVE-2024-514xx/CVE-2024-51460.json | 56 ++++ CVE-2024/CVE-2024-531xx/CVE-2024-53131.json | 99 ++++++- CVE-2024/CVE-2024-540xx/CVE-2024-54008.json | 14 +- CVE-2024/CVE-2024-72xx/CVE-2024-7232.json | 48 +++- CVE-2024/CVE-2024-72xx/CVE-2024-7238.json | 48 +++- CVE-2024/CVE-2024-72xx/CVE-2024-7239.json | 48 +++- CVE-2024/CVE-2024-72xx/CVE-2024-7240.json | 48 +++- CVE-2024/CVE-2024-80xx/CVE-2024-8025.json | 63 ++++- README.md | 46 ++-- _state.csv | 65 ++--- 20 files changed, 1559 insertions(+), 159 deletions(-) create mode 100644 CVE-2023/CVE-2023-234xx/CVE-2023-23472.json create mode 100644 CVE-2024/CVE-2024-113xx/CVE-2024-11351.json create mode 100644 CVE-2024/CVE-2024-514xx/CVE-2024-51460.json diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46958.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46958.json index 07fec5e77cc..823f0bb7289 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46958.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46958.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46958", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-27T19:04:06.813", - "lastModified": "2024-11-21T06:35:01.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-11T14:43:21.320", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,131 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: corrige la ejecuci\u00f3n entre transacciones abortadas y fsyncs que conducen a use-after-free. Hay una carrera entre una tarea que aborta una transacci\u00f3n durante un commit, una tarea que realiza una fsync y la transacci\u00f3n. kthread, lo que conduce a un use-after-free del \u00e1rbol ra\u00edz del registro. Cuando esto sucede, se genera un seguimiento de pila como el siguiente: Informaci\u00f3n BTRFS (dispositivo dm-0): solo lectura forzada Advertencia BTRFS (dispositivo dm-0): omitir confirmaci\u00f3n de transacci\u00f3n abortada. BTRFS: error (dispositivo dm-0) en cleanup_transaction:1958: errno=-5 falla de IO Advertencia de BTRFS (dispositivo dm-0): escritura de p\u00e1gina perdida debido a un error de IO en /dev/mapper/error-test (-5) BTRFS Advertencia (dispositivo dm-0): omitir confirmaci\u00f3n de transacci\u00f3n abortada. Advertencia BTRFS (dispositivo dm-0): IO directa fall\u00f3 en 261 rw 0,0 sector 0xa4e8 len 4096 err no 10 Error BTRFS (dispositivo dm-0): error al escribir el superbloque primario en el dispositivo 1 Advertencia BTRFS (dispositivo dm-0) : error de IO directo ino 261 rw 0,0 sector 0x12e000 len 4096 err no 10 advertencia BTRFS (dispositivo dm-0): error de IO directo ino 261 rw 0,0 sector 0x12e008 len 4096 error no 10 advertencia BTRFS (dispositivo dm-0) : error de IO directo ino 261 rw 0,0 sector 0x12e010 len 4096 error no 10 BTRFS: error (dispositivo dm-0) en write_all_supers:4110: errno=-5 error de IO (1 error al escribir supers) BTRFS: error (dispositivo dm -0) en btrfs_sync_log:3308: errno=-5 Fallo de E/S Fallo de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0x6b6b6b6b6b6b6b68: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC PTI CPU: 2 PID: 2458471 Comm: fsstress Not tainted 5.12.0- rc5-btrfs-next-84 #1 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 01/04/2014 RIP: 0010:__mutex_lock+ 0x139/0xa40 C\u00f3digo: c0 74 19 (...) RSP: 0018:ffff9f18830d7b00 EFLAGS: 00010202 RAX: 6b6b6b6b6b6b6b68 RBX: 0000000000000001 RCX: 00000000000000002 RD X: ffffffffb9c54d13 RSI: 0000000000000000 RDI: 0000000000000000 RBP: ffff9f18830d7bc0 R08: 00000000000000000 R09: 0000000000000000 R10: ffff9f18830d7be0 R11: 0000000000000001 R12: ffff8c6cd199c040 R13: ffff8c6c95821358 R14: 00000000fffffffb R15: ffff8c6cbcf01358 FS: 00007fa9140c2b 80(0000) GS:ffff8c6fac600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fa913d52000 CR3: 000000013d2 b4003 CR4 : 0000000000370ee0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 00000000000000000 DR6: 00000000fffe0ff0 DR7: 000000 0000000400 Rastreo de llamadas: ? __btrfs_handle_fs_error+0xde/0x146 [btrfs] ? btrfs_sync_log+0x7c1/0xf20 [btrfs]? btrfs_sync_log+0x7c1/0xf20 [btrfs] btrfs_sync_log+0x7c1/0xf20 [btrfs] btrfs_sync_file+0x40c/0x580 [btrfs] do_fsync+0x38/0x70 __x64_sys_fsync+0x10/0x20 do_syscall_64+ 0x33/0x80 Entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fa9142a55c3 C\u00f3digo : 8b 15 09 (...) RSP: 002b:00007fff26278d48 EFLAGS: 00000246 ORIG_RAX: 000000000000004a RAX: ffffffffffffffda RBX: 0000563c83cb4560 RCX: 00007fa9142a55c 3 RDX: 00007fff26278cb0 RSI: 00007fff26278cb0 RDI: 0000000000000005 RBP: 0000000000000005 R08: 000000000000000001 R09: 00007fff26278d5c R10: 0 000000000000000 R11: 0000000000000246 R12: 0000000000000340 R13: 00007fff26278de0 R14: 00007fff26278d96 R15: 0000563c83ca57c0 M\u00f3dulos vinculados en: btrfs dm_zero dm_snapshot dm _thin_pool (...) ---[ end trace ee2f1b19327d791d ]--- Los pasos que conducen a este bloqueo son los siguientes: 1) Estamos en la transacci\u00f3n N; 2) Tenemos dos tareas con un identificador de transacci\u00f3n adjunto a la transacci\u00f3n N. Tarea A y Tarea B. La tarea B est\u00e1 realizando una sincronizaci\u00f3n f; 3) La tarea B est\u00e1 en btrfs_sync_log() y ha guardado fs_info->log_root_tree en una variable local llamada 'log_root_tree' en la parte superior de btrfs_sync_log().---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.7", + "versionEndExcluding": "5.10.36", + "matchCriteriaId": "C6E35DB7-8D08-44A4-88FE-9B73324500C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.11.20", + "matchCriteriaId": "EEC03413-9760-46D4-AC1D-EB084A1D4111" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.3", + "matchCriteriaId": "F9D6B2DE-7E4A-4B3B-9AEE-3A2C5F23DA32" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/061dde8245356d8864d29e25207aa4daa0be4d3c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/633f7f216663587f17601eaa1cf2ac3d5654874c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a4794be7b00b7eda4b45fffd283ab7d76df7e5d6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e2da98788369bfba1138bada72765c47989a4338", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/061dde8245356d8864d29e25207aa4daa0be4d3c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/633f7f216663587f17601eaa1cf2ac3d5654874c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a4794be7b00b7eda4b45fffd283ab7d76df7e5d6", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e2da98788369bfba1138bada72765c47989a4338", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46960.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46960.json index 5d299035c28..2a7a325afe8 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46960.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46960.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46960", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-27T19:04:06.860", - "lastModified": "2024-11-21T06:35:02.180", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-11T14:47:28.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,63 +15,194 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: devuelve el c\u00f3digo de error correcto de smb2_get_enc_key Evite una advertencia si el error se repite: [440700.376476] CIFS VFS: \\\\otters.example.com crypt_message: no se pudo obtener la clave de cifrado [440700.386947] ------------[ cortar aqu\u00ed ]------------ [440700.386948] err = 1 [440700.386977] ADVERTENCIA: CPU: 11 PID: 2733 en / build/linux-hwe-5.4-p6lk6L/linux-hwe-5.4-5.4.0/lib/errseq.c:74 errseq_set+0x5c/0x70 ... [440700.397304] CPU: 11 PID: 2733 Comm: tar Contaminado: G OE 5.4.0-70-generic #78~18.04.1-Ubuntu... [440700.397334] Seguimiento de llamadas: [440700.397346] __filemap_set_wb_err+0x1a/0x70 [440700.397419] cifs_writepages+0x9c7/0xb30 [cifs ] [440700.397426] do_writepages+0x4b /0xe0 [440700.397444] __filemap_fdatawrite_range+0xcb/0x100 [440700.397455] filemap_write_and_wait+0x42/0xa0 [440700.397486] cifs_setattr+0x68b/0xf30 [cifs] [440700.39749 3] notify_change+0x358/0x4a0 [440700.397500] utimes_common+0xe9/0x1c0 [440700.397510] do_utimes+ 0xc5/0x150 [440700.397520] __x64_sys_utimensat+0x88/0xd0" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.11", + "versionEndExcluding": "4.14.233", + "matchCriteriaId": "3CEB4F43-643B-4BF2-BC3B-FB797EC75463" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.191", + "matchCriteriaId": "5B6E6817-19A8-4C0A-8807-71DA48CF9191" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.118", + "matchCriteriaId": "C83F5505-AF9D-4F2A-8D37-A8EB73ED772D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.36", + "matchCriteriaId": "003E22D0-CA29-4338-8B35-0754C740074F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.11.20", + "matchCriteriaId": "EEC03413-9760-46D4-AC1D-EB084A1D4111" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.3", + "matchCriteriaId": "F9D6B2DE-7E4A-4B3B-9AEE-3A2C5F23DA32" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/83728cbf366e334301091d5b808add468ab46b27", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/93f3339b22ba17e66f0808737467b70ba087eaec", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aaa0faa5c28a91c362352d6b35dc3ed10df56fb0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b399c1a3ea0b9d10047ff266d65533df7f15532f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e486f8397f3f14a7cadc166138141fdb14379a54", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e94851629c49c65b4fbb29a5725ddfd7988f8f20", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f59a9242942fef0de7b926e438ba4eae65d4b4dd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/83728cbf366e334301091d5b808add468ab46b27", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/93f3339b22ba17e66f0808737467b70ba087eaec", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aaa0faa5c28a91c362352d6b35dc3ed10df56fb0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b399c1a3ea0b9d10047ff266d65533df7f15532f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e486f8397f3f14a7cadc166138141fdb14379a54", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e94851629c49c65b4fbb29a5725ddfd7988f8f20", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f59a9242942fef0de7b926e438ba4eae65d4b4dd", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46961.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46961.json index 7f58bf3df24..1009c3f29c9 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46961.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46961.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46961", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-27T19:04:06.907", - "lastModified": "2024-11-21T06:35:02.310", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-11T14:49:59.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,152 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: irqchip/gic-v3: no habilitar irqs cuando se manejan interrupciones espurias. Activamos el siguiente error al ejecutar nuestro kernel 4.19 con los parches pseudo-NMI respaldados: [14.816231] - -----------[ cortar aqu\u00ed ]------------ \u00a1ERROR del kernel [14.816231] en irq.c:99! [14.816232] Error interno: Ups - ERROR: 0 [#1] SMP [14.816232] Intercambiador de procesos/0 (pid: 0, l\u00edmite de pila = 0x(____ptrval____)) [14.816233] CPU: 0 PID: 0 Comunicaciones: intercambiador/0 Contaminado: GO 4.19.95.aarch64 #14 [ 14.816233] Nombre de hardware: evb (DT) [ 14.816234] pstate: 80400085 (Nzcv daIf +PAN -UAO) [ 14.816234] pc : asm_nmi_enter+0x94/0x98 [ 14.816235] lr : asm_nmi_enter +0x18/0x98 [ 14.816235] sp : ffff000008003c50 [ 14.816235] pmr_save: 00000070 [ 14.816237] x29: ffff000008003c50 x28: ffff0000095f56c0 [ 14.816 238] x27: 0000000000000000 x26: ffff000008004000 [ 14.816239] x25: 00000000015e0000 x24: ffff8008fb916000 [ 14.816240] x23: 000000002040 0005x22 : ffff0000080817cc [ 14.816241] x21: ffff000008003da0 x20: 0000000000000060 [ 14.816242] x19: 00000000000003ff x18: ffffffffffffffff [ 14.816243] x 17: 0000000000000008 x16: 003d090000000000 [ 14.816244] x15: ffff0000095ea6c8 x14: ffff8008fff5ab40 [ 14.816244] x13: ffff8008fff58b9d x12: 00 00000000000000 [14.816245] x11: ffff000008c8a200 x10: 000000008e31fca5 [ 14.816246] x9 : ffff000008c8a208 x8 : 0000000000000000f [ 14.816247] x7 : 0000000000000004 x6 : ffff8008fff58b9e [ 14.816248] x5 : 00000000000000000 x4 : 0000000080000000 [ 14.816249] x3 : 00000000000000000 x2 : 0000000080000000 [ 14.81 6250] x1: 0000000000120000 x0: ffff0000095f56c0 [ 14.816251] Rastreo de llamadas: [ 14.816251] asm_nmi_enter+0x94/0x98 [ 14.816251] el1_irq+0x8c/0x180 (IRQ C) [ 14.816252] gic_handle_irq+0xbc/0x2e4 [ 14.816252] el1_irq+0xcc/0x180 (IRQ B) [ 14.816253] arch_timer_handler_virt+0x38/0x58 [ 14.816253] handle_percpu_devid_irq+0x90/0x240 [ 14.816253] generic_handle_irq+0x34/0x50 [ 14.816254] __handle_domain_irq+0x68/0xc0 [ 14.81625 4] gic_handle_irq+0xf8/0x2e4 [ 14.816255] el1_irq+0xcc/0x180 (IRQ A) [ 14.816255] arch_cpu_idle+0x34/0x1c8 [ 14.816255] default_idle_call+0x24/0x44 [ 14.816256] do_idle+0x1d0/0x2c8 [ 14.816256] cpu_startup_entry+0x28/0x30 [ 14.8162 56] rest_init+0xb8/0xc8 [ 14.816257] start_kernel+0x4c8/0x4f4 [ 14.816257] C\u00f3digo: 940587f1 d5384100 b9401001 36a7fd01 (d4210000) [14.816258] M\u00f3dulos vinculados en: start_dp(O) smeth(O) [15.103092] ---[ end trace 701753956cb14aa8 ]--- [ 15.1030 93] P\u00e1nico en el kernel: no se sincroniza: excepci\u00f3n fatal en interrupci\u00f3n [15.103099] SMP: deteniendo CPU secundarias [15.103100] Desplazamiento del kernel: deshabilitado [15.103100] Caracter\u00edsticas de la CPU: 0x36,a2400218 [15.103100] L\u00edmite de memoria: ninguno causado por un 'BUG_ON(in_nmi())' en nmi_enter(). Desde el seguimiento de la llamada, podemos encontrar tres interrupciones (anotadas A, B, C arriba): la interrupci\u00f3n (A) es reemplazada por (B), que es interrumpida a\u00fan m\u00e1s por (C). Investigaciones posteriores muestran que (B) da como resultado que se llame a nmi_enter(), pero que en realidad es una interrupci\u00f3n espuria. Adem\u00e1s, las interrupciones se vuelven a habilitar en el contexto de incendios (B) y (C) con prioridad NMI. Terminamos con una situaci\u00f3n de NMI anidada, algo que definitivamente no queremos (y no podemos) manejar. El error aqu\u00ed es que las interrupciones espurias nunca deber\u00edan dar lugar a ning\u00fan cambio de estado y simplemente deber\u00edamos volver al contexto interrumpido. Mover el manejo de interrupciones espurias lo antes posible en el controlador GICv3 soluciona este problema. [maz: reescrib\u00ed el mensaje de confirmaci\u00f3n, corregido Correcciones: etiqueta]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1", + "versionEndExcluding": "5.4.118", + "matchCriteriaId": "8761CB27-5D41-47B9-868D-12B5772BF0E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.36", + "matchCriteriaId": "003E22D0-CA29-4338-8B35-0754C740074F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.11.20", + "matchCriteriaId": "EEC03413-9760-46D4-AC1D-EB084A1D4111" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.3", + "matchCriteriaId": "F9D6B2DE-7E4A-4B3B-9AEE-3A2C5F23DA32" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3f72d3709f53af72835af7dc8b15ba61611a0e36", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7be4db5c2b59fa77071c93ca4329876fb9777202", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a97709f563a078e259bf0861cd259aa60332890a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e7ea8e46e3b777be26aa855fe07778c415f24926", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ea817ac1014c04f47885532b55f5d0898deadfba", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3f72d3709f53af72835af7dc8b15ba61611a0e36", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7be4db5c2b59fa77071c93ca4329876fb9777202", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a97709f563a078e259bf0861cd259aa60332890a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e7ea8e46e3b777be26aa855fe07778c415f24926", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ea817ac1014c04f47885532b55f5d0898deadfba", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-469xx/CVE-2021-46962.json b/CVE-2021/CVE-2021-469xx/CVE-2021-46962.json index 46be60df9b6..2197e2471e1 100644 --- a/CVE-2021/CVE-2021-469xx/CVE-2021-46962.json +++ b/CVE-2021/CVE-2021-469xx/CVE-2021-46962.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46962", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-27T19:04:06.960", - "lastModified": "2024-11-21T06:35:02.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-11T14:56:40.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,47 +15,152 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mmc: uniphier-sd: corrige una fuga de recursos en la funci\u00f3n de eliminaci\u00f3n Falta una llamada 'tmio_mmc_host_free()' en la funci\u00f3n de eliminaci\u00f3n, para equilibrar un 'tmio_mmc_host_alloc()' llamar a la sonda. Esto se hace en la ruta de manejo de errores de la sonda, pero no en la funci\u00f3n de eliminaci\u00f3n. Agrega la llamada faltante." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.118", + "matchCriteriaId": "C83F5505-AF9D-4F2A-8D37-A8EB73ED772D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.36", + "matchCriteriaId": "003E22D0-CA29-4338-8B35-0754C740074F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.11.20", + "matchCriteriaId": "EEC03413-9760-46D4-AC1D-EB084A1D4111" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.12.3", + "matchCriteriaId": "F9D6B2DE-7E4A-4B3B-9AEE-3A2C5F23DA32" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0d8941b9b2d3e7b3481fdf43b1a6189d162175b7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/25ac6ce65f1ab458982d15ec1caf441acd37106a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d6e7fda496978f2763413b5523557b38dc2bf6c2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e29c84857e2d51aa017ce04284b962742fb97d9e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ebe0f12cf4c044f812c6d17011531582f9ac8bb3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0d8941b9b2d3e7b3481fdf43b1a6189d162175b7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/25ac6ce65f1ab458982d15ec1caf441acd37106a", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d6e7fda496978f2763413b5523557b38dc2bf6c2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e29c84857e2d51aa017ce04284b962742fb97d9e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ebe0f12cf4c044f812c6d17011531582f9ac8bb3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23472.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23472.json new file mode 100644 index 00000000000..567594dd31c --- /dev/null +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23472.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-23472", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-11T13:15:05.150", + "lastModified": "2024-12-11T13:15:05.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM InfoSphere DataStage Flow Designer (InfoSphere Information Server 11.7) could allow an authenticated user to obtain sensitive information that could aid in further attacks against the system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/6988167", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-113xx/CVE-2024-11351.json b/CVE-2024/CVE-2024-113xx/CVE-2024-11351.json new file mode 100644 index 00000000000..e3735c829e9 --- /dev/null +++ b/CVE-2024/CVE-2024-113xx/CVE-2024-11351.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-11351", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-11T13:15:06.350", + "lastModified": "2024-12-11T13:15:06.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Restrict \u2013 membership, site, content and user access restrictions for WordPress plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.8 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3201494/restricted-content", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de982653-26b4-4a7b-a391-373362bcb834?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23349.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23349.json index c8c00a43540..01ffbc6b8de 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23349.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23349.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23349", "sourceIdentifier": "security@apache.org", "published": "2024-02-22T10:15:08.427", - "lastModified": "2024-11-21T08:57:33.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-11T14:22:19.183", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,7 +15,30 @@ "value": "Neutralizaci\u00f3n inadecuada de la entrada durante la vulnerabilidad de generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en Apache Answer. Este problema afecta a Apache Answer: hasta 1.2.1. Ataque XSS cuando el usuario ingresa un resumen. Un usuario que haya iniciado sesi\u00f3n, al modificar su propia pregunta enviada, puede ingresar c\u00f3digo malicioso en el resumen para crear dicho ataque. Se recomienda a los usuarios actualizar a la versi\u00f3n [1.2.5], que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -28,22 +51,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:answer:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.2.1", + "matchCriteriaId": "F977E6DB-B10B-4AC2-BD22-EA5F228989A9" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/02/22/2", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/y5902t09vfgy7892z3vzr1zq900sgyqg", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/02/22/2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/y5902t09vfgy7892z3vzr1zq900sgyqg", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25606.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25606.json index 8e669c76502..d52bb74f5d9 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25606.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25606.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25606", "sourceIdentifier": "security@liferay.com", "published": "2024-02-20T09:15:09.533", - "lastModified": "2024-11-21T09:01:04.087", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-11T14:27:37.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.3, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 5.8 } ] }, @@ -49,16 +69,276 @@ "value": "CWE-611" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.2", + "matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*", + "matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*", + "matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*", + "matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*", + "matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*", + "matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*", + "matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*", + "matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*", + "matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_17:*:*:*:*:*:*", + "matchCriteriaId": "F2B55C77-9FAA-4E14-8CEF-9C4CAC804007" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_18:*:*:*:*:*:*", + "matchCriteriaId": "54E499E6-C747-476B-BFE2-C04D9F8744F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_19:*:*:*:*:*:*", + "matchCriteriaId": "6A773FC6-429D-483D-9736-25323B55A71F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*", + "matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*", + "matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*", + "matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*", + "matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_6:*:*:*:*:*:*", + "matchCriteriaId": "71E41E59-D71F-48F0-812B-39D59F81997B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_7:*:*:*:*:*:*", + "matchCriteriaId": "B6AAAAF1-994E-409D-8FC7-DE2A2CF60AD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*", + "matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update10:*:*:*:*:*:*", + "matchCriteriaId": "AA984F92-4C6C-4049-A731-96F587B51E75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update11:*:*:*:*:*:*", + "matchCriteriaId": "CADDF499-DDC4-4CEE-B512-404EA2024FCB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update4:*:*:*:*:*:*", + "matchCriteriaId": "AD408C73-7D78-4EB1-AA2C-F4A6D4DC980B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update5:*:*:*:*:*:*", + "matchCriteriaId": "513F3229-7C31-44EB-88F6-E564BE725853" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update6:*:*:*:*:*:*", + "matchCriteriaId": "76B9CD05-A10E-439C-9FDE-EA88EC3AF2C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update7:*:*:*:*:*:*", + "matchCriteriaId": "A7D2D415-36AA-41B2-8FD9-21A98CDFE1EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update8:*:*:*:*:*:*", + "matchCriteriaId": "124F2D2E-F8E7-4EDE-A98B-DD72FB43DF20" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:update9:*:*:*:*:*:*", + "matchCriteriaId": "0DEE5985-289E-4138-B7C0-1E471BA7A1FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:-:*:*:*:*:*:*", + "matchCriteriaId": "96E84DBC-C740-4E23-8D1D-83C8AE49813E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update1:*:*:*:*:*:*", + "matchCriteriaId": "8B1B2384-764F-43CC-8206-36DCBE9DDCBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update2:*:*:*:*:*:*", + "matchCriteriaId": "10B863B8-201D-494C-8175-168820996174" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.4:update3:*:*:*:*:*:*", + "matchCriteriaId": "CBF766CE-CBB8-472A-BAF0-BD39A7BCB4DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.4.3.8", + "matchCriteriaId": "EEC6590B-9ECD-4B86-A964-0824C7F129EB" + } + ] + } + ] } ], "references": [ { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25606", - "source": "security@liferay.com" + "source": "security@liferay.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25606", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-265xx/CVE-2024-26578.json b/CVE-2024/CVE-2024-265xx/CVE-2024-26578.json index 99d03b217e7..0aa51e0cf08 100644 --- a/CVE-2024/CVE-2024-265xx/CVE-2024-26578.json +++ b/CVE-2024/CVE-2024-265xx/CVE-2024-26578.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26578", "sourceIdentifier": "security@apache.org", "published": "2024-02-22T10:15:08.503", - "lastModified": "2024-11-21T09:02:34.530", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-11T14:25:58.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,7 +15,30 @@ "value": "Ejecuci\u00f3n simult\u00e1nea mediante recurso compartido con vulnerabilidad de sincronizaci\u00f3n incorrecta ('Condici\u00f3n de Ejecuci\u00f3n') en Apache Answer. Este problema afecta a Apache Answer: hasta 1.2.1. El env\u00edo repetido durante el registro result\u00f3 en el registro del mismo usuario. Cuando los usuarios se registran, si env\u00edan r\u00e1pidamente varios registros utilizando scripts, puede resultar en la creaci\u00f3n de varias cuentas de usuario simult\u00e1neamente con el mismo nombre. Se recomienda a los usuarios actualizar a la versi\u00f3n [1.2.5], que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -28,22 +51,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:answer:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.2.1", + "matchCriteriaId": "F977E6DB-B10B-4AC2-BD22-EA5F228989A9" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/02/22/3", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/ko0ksnznt2484lxt0zts2ygr82ldkhcb", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/02/22/3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.apache.org/thread/ko0ksnznt2484lxt0zts2ygr82ldkhcb", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42135.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42135.json index 1a9b694326e..e35ca963c03 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42135.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42135.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42135", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-30T08:15:05.433", - "lastModified": "2024-11-21T09:33:40.560", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-11T14:59:33.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,109 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: vhost_task: maneja SIGKILL vaciando el trabajo y saliendo. En lugar de demorarnos hasta que se cierre el dispositivo, esto nos permite manejar SIGKILL de la siguiente manera: 1. marcar al trabajador como eliminado para que ya no intentemos hacerlo. \u00daselo con nuevas virtqueues y nuevas operaciones de descarga. 2. configurar la cola virtual para el mapeo de trabajadores para que no haya trabajos nuevos en cola. 3. ejecutar todas las obras existentes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.39", + "matchCriteriaId": "AFFE1388-D45B-4287-88F7-BBA975D80E4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.9", + "matchCriteriaId": "ADCC1407-0CB3-4C8F-B4C5-07F682CD7085" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/abe067dc3a662eef7d5cddbbc41ed50a0b68b0af", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/db5247d9bf5c6ade9fd70b4e4897441e0269b233", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dec987fe2df670827eb53b97c9552ed8dfc63ad4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/abe067dc3a662eef7d5cddbbc41ed50a0b68b0af", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/db5247d9bf5c6ade9fd70b4e4897441e0269b233", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dec987fe2df670827eb53b97c9552ed8dfc63ad4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51460.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51460.json new file mode 100644 index 00000000000..555a44d91f5 --- /dev/null +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51460.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51460", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-11T13:15:06.510", + "lastModified": "2024-12-11T13:15:06.510", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM InfoSphere Information Server 11.7 could allow an authenticated user to obtain sensitive information when a detailed technical error message is returned in a stack trace. This information could be used in further attacks against the system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7177698", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53131.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53131.json index e3e8b64567a..df35deee695 100644 --- a/CVE-2024/CVE-2024-531xx/CVE-2024-53131.json +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53131.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53131", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-04T15:15:13.090", - "lastModified": "2024-12-05T12:15:19.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-11T14:55:01.573", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,110 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint Serie de parches \"nilfs2: fix null-ptr-deref bugs on block tracepoints\". Esta serie corrige errores de desreferencia de puntero nulo que ocurren al usar nilfs2 y dos puntos de seguimiento relacionados con bloques. Este parche (de 2): Se ha informado que al usar el punto de seguimiento \"block:block_touch_buffer\", touch_buffer() llamado desde __nilfs_get_folio_block() causa una desreferencia de puntero NULL o un error de protecci\u00f3n general cuando KASAN est\u00e1 habilitado. Esto sucede porque, dado que el punto de seguimiento se agreg\u00f3 en touch_buffer(), hace referencia al miembro dev_t bh->b_bdev->bd_dev independientemente de si el cabezal del b\u00fafer tiene un puntero a una estructura block_device. En la implementaci\u00f3n actual, la estructura block_device se establece despu\u00e9s de que la funci\u00f3n regresa al llamador. Aqu\u00ed, touch_buffer() se utiliza para marcar el folio/p\u00e1gina que posee el encabezado del b\u00fafer como accedido, pero el asistente de b\u00fasqueda com\u00fan para folio/p\u00e1gina utilizado por la funci\u00f3n de llamada se optimiz\u00f3 para marcar el folio/p\u00e1gina como accedido cuando se reimplement\u00f3 hace mucho tiempo, eliminando la necesidad de llamar a touch_buffer() aqu\u00ed en primer lugar. Por lo tanto, esto resuelve el problema al eliminar la llamada a touch_buffer() en s\u00ed." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.9", + "versionEndExcluding": "6.1.119", + "matchCriteriaId": "B9F07E74-2989-4705-AED1-FEACA2FEF716" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.0", + "versionEndExcluding": "6.6.63", + "matchCriteriaId": "DC8AE946-6593-4D8D-863A-0BC137CF667F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11.0", + "versionEndExcluding": "6.11.10", + "matchCriteriaId": "5D7D3F96-FD78-48BB-9935-3CD41775FEAA" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/085556bf8c70e2629e02e79268dac3016a08b8bf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3b2a4fd9bbee77afdd3ed5a05a0c02b6cde8d3b9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/59b49ca67cca7b007a5afd3de0283c8008157665", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/77e47f89d32c2d72eb33d0becbce7abe14d061f4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cd45e963e44b0f10d90b9e6c0e8b4f47f3c92471", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54008.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54008.json index 346d894ff6f..aecd99b59e1 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54008.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54008.json @@ -2,7 +2,7 @@ "id": "CVE-2024-54008", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-12-10T19:15:30.900", - "lastModified": "2024-12-10T19:15:30.900", + "lastModified": "2024-12-11T14:15:19.713", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04765en_us&docLocale=en_US", diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7232.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7232.json index cda4940fbd3..7a8bdc11e4c 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7232.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7232.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7232", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T22:15:15.920", - "lastModified": "2024-11-22T22:15:15.920", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-11T14:44:38.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,10 +73,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:avast:free_antivirus:23.12.6094:build_23.12.8700.813:*:*:*:*:*:*", + "matchCriteriaId": "09E65B75-405A-4F8C-96AB-A04EA144FF12" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1004/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7238.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7238.json index b60e6114145..6871b681a03 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7238.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7238.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7238", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T22:15:16.663", - "lastModified": "2024-11-22T22:15:16.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-11T14:34:42.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,10 +73,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vipre:advanced_security:12.0.1.214:*:*:*:*:*:*:*", + "matchCriteriaId": "9084015C-B278-48A4-BC84-F5ACCD57E585" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1011/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7239.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7239.json index e4382d06cd5..ee37ce4d625 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7239.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7239.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7239", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T22:15:16.780", - "lastModified": "2024-11-22T22:15:16.780", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-11T14:25:45.607", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,10 +73,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vipre:advanced_security:12.0.1.214:*:*:*:*:*:*:*", + "matchCriteriaId": "9084015C-B278-48A4-BC84-F5ACCD57E585" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1010/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7240.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7240.json index 21f0230d9c2..05a94a229ab 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7240.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7240.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7240", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T22:15:16.890", - "lastModified": "2024-11-22T22:15:16.890", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-11T14:22:23.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,10 +73,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f-secure:total:19.2:*:*:*:*:*:*:*", + "matchCriteriaId": "7D9704EF-C37E-40DB-881C-182961B65263" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1012/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8025.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8025.json index c1ebfca7d1e..11c064f8ea3 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8025.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8025.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8025", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T22:15:18.713", - "lastModified": "2024-11-22T22:15:18.713", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-11T14:02:07.930", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,49 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nikon:nef_codec:1.31.2:*:*:*:*:*:*:*", + "matchCriteriaId": "CE76D594-3E0A-466D-A446-B617CFE15D34" + } + ] + } + ] } ], "references": [ { "url": "https://downloadcenter.nikonimglib.com/en/download/sw/259.html", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1422/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 5e2a2c11221..8bb6320d818 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-11T13:01:43.009958+00:00 +2024-12-11T15:00:46.621510+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-11T12:48:19.230000+00:00 +2024-12-11T14:59:33.097000+00:00 ``` ### Last Data Feed Release @@ -33,35 +33,37 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -273172 +273175 ``` ### CVEs added in the last Commit -Recently added CVEs: `11` +Recently added CVEs: `3` -- [CVE-2024-10511](CVE-2024/CVE-2024-105xx/CVE-2024-10511.json) (`2024-12-11T09:15:05.293`) -- [CVE-2024-11008](CVE-2024/CVE-2024-110xx/CVE-2024-11008.json) (`2024-12-11T11:15:04.947`) -- [CVE-2024-11401](CVE-2024/CVE-2024-114xx/CVE-2024-11401.json) (`2024-12-11T10:15:06.013`) -- [CVE-2024-11737](CVE-2024/CVE-2024-117xx/CVE-2024-11737.json) (`2024-12-11T10:15:06.677`) -- [CVE-2024-11840](CVE-2024/CVE-2024-118xx/CVE-2024-11840.json) (`2024-12-11T11:15:06.453`) -- [CVE-2024-12004](CVE-2024/CVE-2024-120xx/CVE-2024-12004.json) (`2024-12-11T09:15:05.500`) -- [CVE-2024-12283](CVE-2024/CVE-2024-122xx/CVE-2024-12283.json) (`2024-12-11T09:15:05.697`) -- [CVE-2024-12294](CVE-2024/CVE-2024-122xx/CVE-2024-12294.json) (`2024-12-11T11:15:06.623`) -- [CVE-2024-12325](CVE-2024/CVE-2024-123xx/CVE-2024-12325.json) (`2024-12-11T12:15:19.200`) -- [CVE-2024-12363](CVE-2024/CVE-2024-123xx/CVE-2024-12363.json) (`2024-12-11T10:15:07.260`) -- [CVE-2024-54269](CVE-2024/CVE-2024-542xx/CVE-2024-54269.json) (`2024-12-11T10:15:07.790`) +- [CVE-2023-23472](CVE-2023/CVE-2023-234xx/CVE-2023-23472.json) (`2024-12-11T13:15:05.150`) +- [CVE-2024-11351](CVE-2024/CVE-2024-113xx/CVE-2024-11351.json) (`2024-12-11T13:15:06.350`) +- [CVE-2024-51460](CVE-2024/CVE-2024-514xx/CVE-2024-51460.json) (`2024-12-11T13:15:06.510`) ### CVEs modified in the last Commit -Recently modified CVEs: `5` - -- [CVE-2024-11053](CVE-2024/CVE-2024-110xx/CVE-2024-11053.json) (`2024-12-11T10:15:05.397`) -- [CVE-2024-49532](CVE-2024/CVE-2024-495xx/CVE-2024-49532.json) (`2024-12-11T12:15:20.753`) -- [CVE-2024-49533](CVE-2024/CVE-2024-495xx/CVE-2024-49533.json) (`2024-12-11T12:48:18.580`) -- [CVE-2024-49534](CVE-2024/CVE-2024-495xx/CVE-2024-49534.json) (`2024-12-11T12:48:19.230`) -- [CVE-2024-8602](CVE-2024/CVE-2024-86xx/CVE-2024-8602.json) (`2024-12-11T09:15:05.890`) +Recently modified CVEs: `15` + +- [CVE-2021-46958](CVE-2021/CVE-2021-469xx/CVE-2021-46958.json) (`2024-12-11T14:43:21.320`) +- [CVE-2021-46960](CVE-2021/CVE-2021-469xx/CVE-2021-46960.json) (`2024-12-11T14:47:28.957`) +- [CVE-2021-46961](CVE-2021/CVE-2021-469xx/CVE-2021-46961.json) (`2024-12-11T14:49:59.620`) +- [CVE-2021-46962](CVE-2021/CVE-2021-469xx/CVE-2021-46962.json) (`2024-12-11T14:56:40.457`) +- [CVE-2024-23349](CVE-2024/CVE-2024-233xx/CVE-2024-23349.json) (`2024-12-11T14:22:19.183`) +- [CVE-2024-25606](CVE-2024/CVE-2024-256xx/CVE-2024-25606.json) (`2024-12-11T14:27:37.600`) +- [CVE-2024-26578](CVE-2024/CVE-2024-265xx/CVE-2024-26578.json) (`2024-12-11T14:25:58.393`) +- [CVE-2024-42135](CVE-2024/CVE-2024-421xx/CVE-2024-42135.json) (`2024-12-11T14:59:33.097`) +- [CVE-2024-53131](CVE-2024/CVE-2024-531xx/CVE-2024-53131.json) (`2024-12-11T14:55:01.573`) +- [CVE-2024-54008](CVE-2024/CVE-2024-540xx/CVE-2024-54008.json) (`2024-12-11T14:15:19.713`) +- [CVE-2024-7232](CVE-2024/CVE-2024-72xx/CVE-2024-7232.json) (`2024-12-11T14:44:38.737`) +- [CVE-2024-7238](CVE-2024/CVE-2024-72xx/CVE-2024-7238.json) (`2024-12-11T14:34:42.833`) +- [CVE-2024-7239](CVE-2024/CVE-2024-72xx/CVE-2024-7239.json) (`2024-12-11T14:25:45.607`) +- [CVE-2024-7240](CVE-2024/CVE-2024-72xx/CVE-2024-7240.json) (`2024-12-11T14:22:23.280`) +- [CVE-2024-8025](CVE-2024/CVE-2024-80xx/CVE-2024-8025.json) (`2024-12-11T14:02:07.930`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 69b2a35d0aa..9203c0246ef 100644 --- a/_state.csv +++ b/_state.csv @@ -187099,11 +187099,11 @@ CVE-2021-46954,0,0,e1fa2a573497ac3cca2eee300a8202a85d71444ad1ae9d67a48ccba1351fd CVE-2021-46955,0,0,fba2bdea5b92fd2bb608ef13865c7c716d690c748a48c0107fec8f1770dcc976,2024-12-06T17:53:52.043000 CVE-2021-46956,0,0,76c2d7d149a52a4365576d3df8b3754fee5701e4ff7f9a4a2a36c2118984f44d,2024-12-06T17:54:34.117000 CVE-2021-46957,0,0,bbe461b34c6df98a2e7d85c7c55d1deb4507d01fe0a54998222ee20412cbfadb,2024-11-21T06:35:01.700000 -CVE-2021-46958,0,0,317f8c07920524ffd2335976a75de30b1b2705580b11da123b84707ba836c004,2024-11-21T06:35:01.890000 +CVE-2021-46958,0,1,5b50b682b8116efcca529fbd28c5eefb378e5effcdc8ded445bdcaaf6f6266bf,2024-12-11T14:43:21.320000 CVE-2021-46959,0,0,bb00e0a22da9b704f505ef16ef46738f1a4c1788be5f1b4157870da30260bb29,2024-12-10T17:55:18.607000 -CVE-2021-46960,0,0,c4a01d4d86bef4e80567471da81b8c9c41b2c57974fe96d4afe631e5f53e8049,2024-11-21T06:35:02.180000 -CVE-2021-46961,0,0,e637628638ee43775048aaec9e37d140ea58b39b013f1029760f9438722e69e1,2024-11-21T06:35:02.310000 -CVE-2021-46962,0,0,e86c71bba9c983e586e34bd676d13ec99d08f43c95e99b00119c63ae7803cd5f,2024-11-21T06:35:02.443000 +CVE-2021-46960,0,1,93adc63857297399bb3e172923626740b3a2251d6d6684f265fbff125aa509a0,2024-12-11T14:47:28.957000 +CVE-2021-46961,0,1,5cd831cd809d2fe0046a1637f020f49a679577e4a0a98dad8858b62bb6faf1ce,2024-12-11T14:49:59.620000 +CVE-2021-46962,0,1,c2add0fa35a2b624472b36db248d8d830acc6f42ffa2bcf78c3542a48bf06b43,2024-12-11T14:56:40.457000 CVE-2021-46963,0,0,ed803386ec84b6f1d2a8d52134d898d34d9dfaeaf4f90f7e8c8a4abcc6f6979e,2024-11-21T06:35:02.580000 CVE-2021-46964,0,0,add212b1b30e4a27a2fddf94d21547296337853832d6be635522371cdb728833,2024-11-21T06:35:02.703000 CVE-2021-46965,0,0,b46915ce2a81dd117323c8c6bb7b33e42c3c3992924bab30d16a37675e4afe55,2024-11-21T06:35:02.837000 @@ -217829,6 +217829,7 @@ CVE-2023-23468,0,0,dcf3783a6e46e2a0eeb9074ee47ed2d5c0a9c74ff1896870c21e1e0585b30 CVE-2023-23469,0,0,69288f0f15e2c2829cc139ea58aa96679edf14002fe3924391288bf0361cb528,2024-11-21T07:46:15.757000 CVE-2023-2347,0,0,537d1f3c8d04870af60e6afd6bd0bbb550617328ab9535d9b20c15152403871d,2024-11-21T07:58:25.880000 CVE-2023-23470,0,0,805f33b64cf2149db6b5e5d1695195d5fb15d1d1e7fd0dc5ce1bcf2fd6089263,2024-11-21T07:46:15.897000 +CVE-2023-23472,1,1,d1adab87d9c998e6269bb24ccf75fba4c0d07d5114972fb5981530f6c90d0406,2024-12-11T13:15:05.150000 CVE-2023-23473,0,0,6e568225fe37b401d88506d3abb6e7be1d1fd3f5dd589c1df7bd297f7599cab4,2024-11-21T07:46:16.040000 CVE-2023-23474,0,0,b8acb675618c02fb8615d33e861383e47b93572a37e4fdcdcd749f7ca7a5a118,2024-11-21T07:46:16.183000 CVE-2023-23475,0,0,3a68aebf09e3ed863e58894bdc66525870538242756e587e97f59ebf17bf6357,2024-11-21T07:46:16.307000 @@ -243284,7 +243285,7 @@ CVE-2024-10508,0,0,3c8ca455116090fc18d0350a110b8bb6a6e21d65af46a84fffdf80725f5b3 CVE-2024-10509,0,0,f0b7ecf89c97695400b3d4347ae46c239dcae25c8470ed90af5bd1df1138e483,2024-11-01T20:52:15.573000 CVE-2024-1051,0,0,47e83543cdb00e91b0b2e6dfcb71fb878c597c188c0668b9ed609335433c9d66,2024-11-21T08:49:41.187000 CVE-2024-10510,0,0,1a1b225dc371f891ed5076d52ce3977c9397cc1b9a9aecca92726347c481951f,2024-11-29T16:15:08.733000 -CVE-2024-10511,1,1,ee07b0caff70deca8b41bd3b6ccd18f16e3d99411cca536c66b66eed04915414,2024-12-11T09:15:05.293000 +CVE-2024-10511,0,0,ee07b0caff70deca8b41bd3b6ccd18f16e3d99411cca536c66b66eed04915414,2024-12-11T09:15:05.293000 CVE-2024-10515,0,0,14324a428dd077d8f7bb8b90151b521be92a127d3fed7cf5017dbabd68aea528,2024-11-21T13:57:24.187000 CVE-2024-10516,0,0,41abef9bd4588b7c0f5163eb6fc95284400f27617ce541752b60c8df384ecab0,2024-12-06T14:15:19.667000 CVE-2024-10519,0,0,0f4b4a1e9d73c1dc5e7d90ae91171b7454c700ee85af6548970583aa8f68f73b,2024-11-23T10:15:03.600000 @@ -243665,7 +243666,7 @@ CVE-2024-11004,0,0,30fe68a257b05692750323b521c5f518985bf9c969788c60d49e72cf40cd2 CVE-2024-11005,0,0,975391e22047d3945c6f3bb53e7adad1d72b5dc3bc794e99654eb1b89426f12f,2024-11-22T17:15:06.803000 CVE-2024-11006,0,0,0e93ac1b0efb24ee7d808883c78ff1d229849a32cacc57a86392940297a299c2,2024-11-22T17:15:06.913000 CVE-2024-11007,0,0,62a2e0757d628f20a5e5c0dd4a347b28f717af7d2afebfa5668d63b84e88b9e1,2024-11-22T17:15:07.010000 -CVE-2024-11008,1,1,1880244f1f67b5841f1d2e94dcf73ce7501d11084552d8b71465fd847ea3803b,2024-12-11T11:15:04.947000 +CVE-2024-11008,0,0,1880244f1f67b5841f1d2e94dcf73ce7501d11084552d8b71465fd847ea3803b,2024-12-11T11:15:04.947000 CVE-2024-11009,0,0,f480d27ee8261f76524c7f6e635dd05967cd1bee3828280624cb8a929fc9e083,2024-11-27T12:15:19.383000 CVE-2024-11010,0,0,df432a6ddcc96473c4608b251cddef86854ccd41b5717633ded9b47b86325565,2024-12-10T00:15:21.207000 CVE-2024-11013,0,0,1584e7889c2d3a99777654ed0e3acd92f4aff58e9059c4aeb7efc6520ecfc42a,2024-11-29T08:15:03.923000 @@ -243695,7 +243696,7 @@ CVE-2024-11048,0,0,ee0614f8b92ffed3e1b3dc74317f3bf75a0ccca022aff193893f1abe1be52 CVE-2024-11049,0,0,f15d3cde98533895db175c6daeef740cd643f4fe5ea44a8fb9695d76fbd71539,2024-11-23T01:41:19.207000 CVE-2024-11050,0,0,97b09a9297d22ccf4873559fbbb697493b98dfb210b831947a035d7cd550348b,2024-11-23T01:38:15.047000 CVE-2024-11051,0,0,0c5db2f4a5372b3789ea13ae4e153849a79584f39670640750e498cda1bc9950,2024-12-02T15:14:56.087000 -CVE-2024-11053,0,1,bc78603271bb633e85e4d1f56d4ae4eb8b7e4725f8dc4f33de4f337018994a76,2024-12-11T10:15:05.397000 +CVE-2024-11053,0,0,bc78603271bb633e85e4d1f56d4ae4eb8b7e4725f8dc4f33de4f337018994a76,2024-12-11T10:15:05.397000 CVE-2024-11054,0,0,62fc21be220f83b3b99662a715e1e46c9921295e254139d37846c3d822e7f7f0,2024-11-14T02:43:36.197000 CVE-2024-11055,0,0,361b4525d8d554dca9b7af21fbdc2732ba2b4cb91ff03c9d581c539d68f515b7,2024-11-14T15:18:45.933000 CVE-2024-11056,0,0,9d9d3c33a7dea9c205bece3d4c8bdb949d23390d0100cf526cee841daf2a71cc,2024-11-14T15:21:09.907000 @@ -243911,6 +243912,7 @@ CVE-2024-1134,0,0,3b9e316f9f09adef1cfd4f6b3383505dbc9180172570e63197eb1d9f1f72ee CVE-2024-11341,0,0,fc1530097b0e35ed459b254b1ecb0cad070bf3ed96eaf9858f6cdb401383b357,2024-12-05T10:31:39.520000 CVE-2024-11342,0,0,e5c7c30c6a212e83bae351facc5b11e3c8030751d949156ac2c5ae223532d502,2024-11-26T04:15:04.030000 CVE-2024-1135,0,0,68c50f9eb4591d8bb506721809b1f0298841fc2528944ed9529aba74567efa11,2024-11-21T08:49:52.457000 +CVE-2024-11351,1,1,826b9861e058dc7cd171d254424cebec62cad9d99bf32049629edf3acf54bc21,2024-12-11T13:15:06.350000 CVE-2024-11352,0,0,3e29015c6ddb727a2fde19c192da7eef0aa6d301384cc964189003e83042cffc,2024-12-06T09:15:06.650000 CVE-2024-11353,0,0,ef44a4979882bdb8ebc7e65b79558cac81921a597185e183e034648fbf6765f4,2024-12-07T02:15:17.850000 CVE-2024-11354,0,0,87986c107f2d598ec9b5e54e0419b4149d63b452699e5d17cc10ffbc61f46d56,2024-11-26T17:34:55.767000 @@ -243943,7 +243945,7 @@ CVE-2024-11395,0,0,2c785115768091bea44fe3e26e4ea70367c535f8cb96f9ee4af4a34ca2f81 CVE-2024-11398,0,0,6bc73f661401a8dde5698cef66f54bb03a0cf44e7d4372165a54805de1061f29,2024-12-04T07:15:05.983000 CVE-2024-1140,0,0,e367e373e330a6c319ba1be412de101ae17a95b0fed1ad3fa83bac6f1faa29f8,2024-11-21T08:49:53.403000 CVE-2024-11400,0,0,f0d968b1fcd82e57778ae527db41a43291e92e150d389e79eb9e311a943ae3a4,2024-11-25T15:02:53.013000 -CVE-2024-11401,1,1,6d7b37cf0ef78794f5a23da0580b81099a6aeb56da350b9df4b8f1e9f4d48208,2024-12-11T10:15:06.013000 +CVE-2024-11401,0,0,6d7b37cf0ef78794f5a23da0580b81099a6aeb56da350b9df4b8f1e9f4d48208,2024-12-11T10:15:06.013000 CVE-2024-11402,0,0,e7ae3fa2fa6e79198d2bcac530a6805477d44c934650be2a141e6ae6e94c93ed,2024-11-28T11:15:17.613000 CVE-2024-11403,0,0,b3df7bf41156ce41154983c83b0636a1aa7e44c18278702ab49ee5bf72bcc6ee,2024-11-25T14:15:06.310000 CVE-2024-11404,0,0,0e1883534fa0b703d3bb5764163f7c50e7ea172c78345c28aae1aacd9300a1e5,2024-11-21T13:57:24.187000 @@ -244193,7 +244195,7 @@ CVE-2024-11729,0,0,2827c895dedc0ed4dd965773a11bae36af1e873ca6340b82c6f253a207f9b CVE-2024-1173,0,0,c4d4cdf7c6a3868eb9e98cb8ff74e2d000c2d6f84447d896138ac8342670c9eb,2024-11-21T08:49:57.650000 CVE-2024-11730,0,0,1c75a29ac86330ee59ce7e562964d19e5b2f34b817b5e3f64dd6b06aec3955ea,2024-12-06T11:15:08.033000 CVE-2024-11732,0,0,6786f7c223dbf5c7abf2566386e4c9fbb35edf5a2ada6569df25893c7ff24b7c,2024-12-03T08:15:06.383000 -CVE-2024-11737,1,1,adbb619cbb79a807a6b16c33974d09efae1c89dafcbf1284cac41939ec6cf676,2024-12-11T10:15:06.677000 +CVE-2024-11737,0,0,adbb619cbb79a807a6b16c33974d09efae1c89dafcbf1284cac41939ec6cf676,2024-12-11T10:15:06.677000 CVE-2024-11738,0,0,5803102c629088a1a2da01b2d25c2140a03e3f90be532f5ab04ee726320c55e3,2024-12-06T15:15:07.723000 CVE-2024-1174,0,0,6b46be4d722ab187c094170b7547b36656d9ec8ed90fcec0cd49c5c30bebda75,2024-11-21T08:49:57.790000 CVE-2024-11742,0,0,159958446bfcddf210e603d44dd5e0653c4d00985f509f964ecd8fded8c95573,2024-12-04T21:04:48.830000 @@ -244245,7 +244247,7 @@ CVE-2024-11823,0,0,39aa0fbc102b8a9648f017c9098019c8c94234f421f38dd89f51eddc70f54 CVE-2024-11828,0,0,602aa5ef7af00586aa736b8ffe32cf96277c2dc1be2f8a5d747f0e8c798e383a,2024-11-26T19:15:22.910000 CVE-2024-1183,0,0,65ecfa5c3d2b221c19281f6b798c6cc7087d171223e10f3dd191314d09620aec,2024-11-21T08:49:58.950000 CVE-2024-1184,0,0,2df19971af19652a2c9010665a81893140f6f37a453740869a5d55aaa9937e61,2024-11-21T08:49:59.067000 -CVE-2024-11840,1,1,09e01e238ec312d53d671f8cf876f09242b194b014906fd4d44fc65beb910377,2024-12-11T11:15:06.453000 +CVE-2024-11840,0,0,09e01e238ec312d53d671f8cf876f09242b194b014906fd4d44fc65beb910377,2024-12-11T11:15:06.453000 CVE-2024-11844,0,0,04412f8d1e89e121c8013622c692022d4f804bc36ac5e0beee05cf8987e8ae7f,2024-12-03T09:15:04.473000 CVE-2024-1185,0,0,78290528f068dedb8140a9e577b3dd14843a1270282e7453db0a3904a48bc34c,2024-11-21T08:49:59.223000 CVE-2024-11853,0,0,34e99eba0841fa956ba4d7c4a308f8505540f1a8e5d486ec7f2fdd3d46494b2f,2024-12-03T08:15:06.710000 @@ -244318,7 +244320,7 @@ CVE-2024-12000,0,0,e45e46bd9049a7c2eac2343a939848eded6d5b005c7247796df205afc6eac CVE-2024-12001,0,0,75bbf94d31b41f422ac1216beeda365d0b924dd232e408edb33262f11bb39f10,2024-12-10T23:16:24.893000 CVE-2024-12002,0,0,642bad4c124467ff4f581f355ddf310f5dadc994966ff22ccdf8e42852d0744f,2024-12-10T23:21:19.827000 CVE-2024-12003,0,0,e39ee63656708893dab4dc4b108494b2da97ab05cd1b7a687dd08b180fa7d4d8,2024-12-06T09:15:07.630000 -CVE-2024-12004,1,1,7e4e24a5d67ea69d4a4f30f000844c0ff592f0fb4af7e0aa61274a2e2a55f08c,2024-12-11T09:15:05.500000 +CVE-2024-12004,0,0,7e4e24a5d67ea69d4a4f30f000844c0ff592f0fb4af7e0aa61274a2e2a55f08c,2024-12-11T09:15:05.500000 CVE-2024-12007,0,0,8e607a1eddf324cb0db7978994624ff72f4892cd536259d2d33593eb53a4d98b,2024-12-11T03:16:24.473000 CVE-2024-1201,0,0,ede9ef00e40c3771a17b2608d045b2ee9c35ff3d800bb0d000b60662409e157c,2024-11-21T08:50:01.647000 CVE-2024-12015,0,0,d5a693fd232b1e3fbc53d72a834e39c83a435aa6e5ae231752c351acc22ca6db,2024-12-02T14:15:05.383000 @@ -244402,10 +244404,10 @@ CVE-2024-1226,0,0,b8e723228c95f73a75e74922943d4c7b5983bd824925379e4a1dadf0498e92 CVE-2024-1227,0,0,2b74966c63acb4b53db9100814c0ea98b900c2b18de594c13a326b21bfb265c8,2024-11-21T08:50:06.103000 CVE-2024-12270,0,0,39bcf28b0c7f0c2cc7925c4c71867c3d58c667f7e488518c8c9808ae3acf42cd,2024-12-07T10:15:06.200000 CVE-2024-1228,0,0,02a2d35b9c29d8600ba5afee210d0e6465f5ee41eb5d9edcafc9d5f9e15f44ef,2024-11-21T08:50:06.280000 -CVE-2024-12283,1,1,dca4df71f894f590cb0f5d26cfe1803e25114c809f761c64773c44a35cabeb38,2024-12-11T09:15:05.697000 +CVE-2024-12283,0,0,dca4df71f894f590cb0f5d26cfe1803e25114c809f761c64773c44a35cabeb38,2024-12-11T09:15:05.697000 CVE-2024-12286,0,0,fd7295e26214e392d9cfe3b72df0f6a777b0e479184a2a0c173af7d7cc4270a2,2024-12-10T18:15:27.150000 CVE-2024-1229,0,0,8ad8bfe76844e757ec6d08a1bad2f097b99b608e965943a6e4928e217dfee4df,2024-11-21T08:50:06.520000 -CVE-2024-12294,1,1,c80c38451ddc3a567e7758d3362278a970e04ba14ecece8e507b66c499c77553,2024-12-11T11:15:06.623000 +CVE-2024-12294,0,0,c80c38451ddc3a567e7758d3362278a970e04ba14ecece8e507b66c499c77553,2024-12-11T11:15:06.623000 CVE-2024-1230,0,0,4e58704ea3cd6d96f1b95bf7630f56ca27fd7e9cf7f7c464007165035f04082e,2024-11-21T08:50:06.710000 CVE-2024-12305,0,0,591beb549e2fd130a4eb51689f906f54cfd4f9ef094b292b5ebd58de367d8b56,2024-12-09T09:15:04.970000 CVE-2024-12306,0,0,7a6ad19881298b2491617643bd5219a8f3696a7257d332ef3f9d18eb332eeb87,2024-12-09T09:15:05.293000 @@ -244413,7 +244415,7 @@ CVE-2024-12307,0,0,23aacf8c044133a030d70d78a0f87e6b3da2eadc1bf68e4a395d80d759eab CVE-2024-1231,0,0,b14e8b0a07bc5ec367647c5978c3a1256f30a8a16700580e77b0e0e8d9654fdc,2024-11-21T08:50:06.870000 CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000 CVE-2024-12323,0,0,cda0016ec5c0b14f1438c5124cf1a1a11494fb26a27490c50b47e2260e80d4bf,2024-12-10T15:15:07.300000 -CVE-2024-12325,1,1,71dcfc0e1510c4d112935e942e5da24f635d661929d4a007be66df22f4234e9f,2024-12-11T12:15:19.200000 +CVE-2024-12325,0,0,71dcfc0e1510c4d112935e942e5da24f635d661929d4a007be66df22f4234e9f,2024-12-11T12:15:19.200000 CVE-2024-12326,0,0,f960296d4c7a80b2aa28fc7f84f75a77ad31211d0d7e9b5df25b051a57e66633,2024-12-06T21:15:05.957000 CVE-2024-1233,0,0,9d758d75169c31056a2dd99a6ff761ac0a3c179827b3dc598c6fb0d83614dada,2024-11-21T08:50:07.317000 CVE-2024-1234,0,0,6b4d1ae0b8159c98fb379447cf95a21f71a7514cfa9af5f48616ab89e3a52cca,2024-11-21T08:50:07.567000 @@ -244436,7 +244438,7 @@ CVE-2024-12358,0,0,c693e0849f917c8e8b82ecbabaa009531cb87832861cfd247370c207501db CVE-2024-12359,0,0,c89d1a1aa75e792ebb41728457dc48f1f26a200ebabc2671ae04aee3d706d446,2024-12-10T23:34:02.110000 CVE-2024-1236,0,0,98cf8c8d0d2027d41420e47ce0e54a62c55b6c82b55779fb1975380b5e094f29,2024-11-21T08:50:07.797000 CVE-2024-12360,0,0,9c92ce0fa75af6038fb90116f61bca41613e1dcad55daccb6d63b1c2c6eac745,2024-12-10T23:33:47.773000 -CVE-2024-12363,1,1,0a491da0a2abbcf7984025bbc6c43b56fe1619f44d47ff309424ed17b404b173,2024-12-11T10:15:07.260000 +CVE-2024-12363,0,0,0a491da0a2abbcf7984025bbc6c43b56fe1619f44d47ff309424ed17b404b173,2024-12-11T10:15:07.260000 CVE-2024-12369,0,0,020d729c045c8eaa8f498306958a74fd2b364bdb1cd395ef2460e8703f80119a,2024-12-09T21:15:08.203000 CVE-2024-1237,0,0,7608b762d209f55f10a23dbde634d086adad1d6240344714ec7de5c458d836b6,2024-11-21T08:50:07.910000 CVE-2024-1238,0,0,61e2d99ce6e3dfa86afb8331abcc236f68b5fa34f245659f4f6216db5239b32e,2024-11-21T08:50:08.053000 @@ -247804,7 +247806,7 @@ CVE-2024-23345,0,0,93238d3b825f485d8eb374a435c101f669289e1d89c688d77924b26c7cc59 CVE-2024-23346,0,0,15a6ec1f47e9a6cfc97c2a72502eaa07279591547945e2ab80bf144c2636f3b3,2024-11-21T08:57:33.443000 CVE-2024-23347,0,0,25471626506419779168ea545004b9fe96b382d2dd9a27aa905a7945d77256d0,2024-11-21T08:57:33.577000 CVE-2024-23348,0,0,a129e6b3747159f86ada3699e7ce730a1fff4c4aa879c6338bc74b8e570fdbe1,2024-11-21T08:57:33.707000 -CVE-2024-23349,0,0,eb17e6b1fd6696c1da992538406a371a894f92f2d06d606e8b3f6aa506c6a246,2024-11-21T08:57:33.853000 +CVE-2024-23349,0,1,4f771bcc93ebb4ca49452299c3a1c8f24e42a293d9a873d9c6b26612990ea1f9,2024-12-11T14:22:19.183000 CVE-2024-2335,0,0,ed64babb31900629e88691a28bf293e48139716a308e0dcea2c4d5bc974613c1,2024-11-21T09:09:31.907000 CVE-2024-23350,0,0,339ca97a071d45a6e59ad694d2760add389eaeb02c1699dfd49abf0f96fae5ce,2024-11-26T15:48:05.817000 CVE-2024-23351,0,0,8649c4833ba8351b45556d140a13f7a21d02c862e3d1f89c33bba0b7ac42ae62,2024-11-21T08:57:34.173000 @@ -249327,7 +249329,7 @@ CVE-2024-25602,0,0,43c5fd7be09141d81d52c491e8514b96cba0daa24c348da2dd7a06a5b7ef9 CVE-2024-25603,0,0,6efc2ab54ea3be651c1cc1d95ba47da582406dbdf361cbfd55e80b7611a41412,2024-11-21T09:01:03.690000 CVE-2024-25604,0,0,adb2744e99dce2faa265e66e541e673623a62dc0725d7f7a02f3571eed752f2b,2024-12-10T22:59:32.727000 CVE-2024-25605,0,0,cd3f213631c053f1b608e3b480951743b40dfcd47cd39c4fbb6227f798899db1,2024-12-10T22:20:47.737000 -CVE-2024-25606,0,0,bde9b15898ae8e9ac91d25fcc0eaa7295bb6e28d0668446fd2e7868187bc749d,2024-11-21T09:01:04.087000 +CVE-2024-25606,0,1,cac38eab3443645d7904eb9442ba71c62f7d0310cd49ec6e2c6f23596207af9e,2024-12-11T14:27:37.600000 CVE-2024-25607,0,0,92a9fb01b0a8ceee06add8818a4f6f32834dea0c68b94bc58e295449a80a9e8b,2024-11-21T09:01:04.213000 CVE-2024-25608,0,0,7279c61e8730c275fdc995418fe07aa60ec60482b57bc6e0726dab12a2b3647c,2024-11-21T09:01:04.343000 CVE-2024-25609,0,0,55a8a632e5823ec358a36f05933df0c5d27523588b88b0d4903abb387c61beef,2024-11-21T09:01:04.470000 @@ -250028,7 +250030,7 @@ CVE-2024-26566,0,0,17fcdac1abfd469cf3ffd2a7711c92e40eda453c6c83e0105c8a9c787273b CVE-2024-2657,0,0,0a4026599cc8f564da68adf5d96fb16ac5a93f2d83477b37500b3fcf5ca350a2,2024-11-21T09:10:13.690000 CVE-2024-26574,0,0,c9911895eba0376ea8a04813b72831a135e34cb8219fef4dc4368d52d0492aa2,2024-11-21T09:02:34.080000 CVE-2024-26577,0,0,b31cfe48a896bbe0069a91709f0e0fcdcc1053cc2c31cf21b6fc4d7e6e447649,2024-11-21T09:02:34.307000 -CVE-2024-26578,0,0,dc2abd261efaae4d6302030c302f6e783d178e59520fc50d28cd4e6d5089d099,2024-11-21T09:02:34.530000 +CVE-2024-26578,0,1,2e58008b2e2354ced3f03ecb873037b7722363d10f6079fa1efe7f01fe5f0136,2024-12-11T14:25:58.393000 CVE-2024-26579,0,0,9c84da18e023cd09fe2fb7cf03db0b8a51d68ccf0b7a927b5e53949a549ffecd,2024-11-21T09:02:34.660000 CVE-2024-26580,0,0,2da523ae9bab4583fae6c14513aa51a5182ca599877e28f208436ca984866b9b,2024-11-21T09:02:34.773000 CVE-2024-26581,0,0,80b86b5dff9ca5be14908e5f3367dd0289faaf1f938aad6d98d56fc7348c93e6,2024-11-21T09:02:34.970000 @@ -261609,7 +261611,7 @@ CVE-2024-42131,0,0,db085189da3b1018c39f394e11d97ed680f76fa1907c88c45ed38fab0f2eb CVE-2024-42132,0,0,62638dac35ecadbd01a50f2d7971ef730320c69562f8244ae5965c2dd83a62aa,2024-11-21T09:33:40.220000 CVE-2024-42133,0,0,c0e81121fdc58f27a3e76b08e8d6881c1a767f5a54a91918926c95174eed2109,2024-11-21T09:33:40.330000 CVE-2024-42134,0,0,822056960c6524aacc2ff35fee40fa8b035616373ee26f3432ea53ebec5d459e,2024-11-21T09:33:40.443000 -CVE-2024-42135,0,0,b3c3507ab345ff5ee6da5cf472a2d01e7a7141c8e2a505a8ce1ce8a81c7ea3d1,2024-11-21T09:33:40.560000 +CVE-2024-42135,0,1,0d77200cd1db63536fe02bbc697ee9cac3377a841f3e6d1c18cc172ac5451f93,2024-12-11T14:59:33.097000 CVE-2024-42136,0,0,46cf0449c1576cec046c7cfd30f571d29aa4a3763cd2bcc721d00c8e3b8292c0,2024-11-21T09:33:40.673000 CVE-2024-42137,0,0,af91881db6e05d40d39068871045965102a2d4547246ad7308857f29c1a14506,2024-11-21T09:33:40.817000 CVE-2024-42138,0,0,5578d34a042bc0a91eb3eb443168291ecf7a51e5c04224989ea9b7f5c2d40694,2024-11-21T09:33:40.960000 @@ -266387,9 +266389,9 @@ CVE-2024-49528,0,0,63319d635eea06771d746aaef2fa7b933b9c0f0420f665631edc0ca867ae1 CVE-2024-49529,0,0,bc912441c1467e88d09c1eebc868707893b19843941c8a4da84053631d70d7a6,2024-12-03T14:37:05.960000 CVE-2024-49530,0,0,afafe2f9e708a0df7b6d673b385a03bf08c9e6f95dcc179119b1592790dc1dc9,2024-12-10T20:15:18.107000 CVE-2024-49531,0,0,43539ba71c9f721c1ff762780d88d45522d85ce331f91d895b58432f07e6d879,2024-12-10T20:15:18.270000 -CVE-2024-49532,0,1,4e372532dd8c4ca18ce90209f001d470d219b9faa378c4c94ed7fff494be9829,2024-12-11T12:15:20.753000 -CVE-2024-49533,0,1,b7fa46411acc29bb525767df2f82a6876ab053bff5d4249298e29189fc8eb8b6,2024-12-11T12:48:18.580000 -CVE-2024-49534,0,1,f5a65280f6923cb0001383f4d54b21a1bbdd11660c383cbfc1fbc3f07f52c595,2024-12-11T12:48:19.230000 +CVE-2024-49532,0,0,4e372532dd8c4ca18ce90209f001d470d219b9faa378c4c94ed7fff494be9829,2024-12-11T12:15:20.753000 +CVE-2024-49533,0,0,b7fa46411acc29bb525767df2f82a6876ab053bff5d4249298e29189fc8eb8b6,2024-12-11T12:48:18.580000 +CVE-2024-49534,0,0,f5a65280f6923cb0001383f4d54b21a1bbdd11660c383cbfc1fbc3f07f52c595,2024-12-11T12:48:19.230000 CVE-2024-49535,0,0,e52b71be2403d7e7c7ec6df87555241b12f0d6af2e7ed28d403cc9e5574871ea,2024-12-10T20:15:18.923000 CVE-2024-49536,0,0,3226abc075af5af9440f5cdc9a3a66360f030ce3d405055960c0bca748fe4e92,2024-11-19T21:21:45.640000 CVE-2024-49537,0,0,9069a21f9ad82f63c2008fa214d1f0de46072a9dfd4ccd673ef0f8c9a149a49e,2024-12-10T21:15:16.500000 @@ -267657,6 +267659,7 @@ CVE-2024-51432,0,0,90d6088b4b691a13d46bf67decae9a8dc78d3184ac661e87666bdc2bf7a41 CVE-2024-51434,0,0,fd0f2e493c6557b3a7b75698795afa3b125b8838b7989d6283ab0195617010c3,2024-11-08T19:01:03.880000 CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000 CVE-2024-5145,0,0,1ce6a725d120216d833ed23f25099d9f4810ecb9d4c63ffcf11012cbf68534d1,2024-11-21T09:47:03.920000 +CVE-2024-51460,1,1,54ac0204b63f74164b897a6b6b8f06af4e57f79919a62eae732f4c393e26f20a,2024-12-11T13:15:06.510000 CVE-2024-51465,0,0,b984a1f47331a027471db6ecd22c9db67a7b4679236a111706732d4e42cb3082,2024-12-04T14:15:20.223000 CVE-2024-5147,0,0,b4fda03873bf91b8aee1014c1d03851aae8f0afeab0edb3aed7529ff221065c3,2024-11-21T09:47:04.057000 CVE-2024-51478,0,0,f0595ed35f1f283d907e9d623fdb50e27981165a57dcab6e98c75f63ec12b3b4,2024-11-01T12:57:03.417000 @@ -268788,7 +268791,7 @@ CVE-2024-53128,0,0,f9eec68ede1e406488191c46f9d50f73ad3aa1613bc770edcaf522cca67dd CVE-2024-53129,0,0,d1fc77f1dab17eeff37788fbf62ea42867a917fecd21166d87ba8aca6ef2ff20,2024-12-04T15:15:12.837000 CVE-2024-5313,0,0,be791a23ecd40bbfd3a356fb20dc239f3a0459ddf5fc8645766d7d90d3fc6d71,2024-11-21T09:47:24.663000 CVE-2024-53130,0,0,1ac44920956419aad8b1ca6bf8ac4668a9398d444f79b6ca27325351b5992189,2024-12-05T12:15:19.417000 -CVE-2024-53131,0,0,774d0dbbc527675c217a09d9e629a20d83cbcdc307c262e6c9cf61b5b7701eff,2024-12-05T12:15:19.513000 +CVE-2024-53131,0,1,19eba6d8151a3ccf75118bd0f587f03ce57bf19a786a52e87aafc302369fecff,2024-12-11T14:55:01.573000 CVE-2024-53132,0,0,784764b8393c16a2472dcd9ceb193598a6266f6f7101743057b3398e5016616d,2024-12-04T15:15:13.193000 CVE-2024-53133,0,0,7dc3bd97ae2fd964c9544e8c99d455f2dfa36bb52ebc957fde2a8701f7a2df3e,2024-12-04T15:15:13.310000 CVE-2024-53134,0,0,2ca33ba2789e0ed81e4159165518bbe19d131a1732e729bb807ce7f34c35506a,2024-12-04T15:15:13.503000 @@ -269164,7 +269167,7 @@ CVE-2024-54002,0,0,7c5a00df1d470c32b9eac42d93309bb19614d9762fa0f049a771979bb9894 CVE-2024-54003,0,0,b632b439005206974a2b4ec6ab08a78e134e0c09d892996aec7289d7221f0377,2024-11-27T20:15:26.133000 CVE-2024-54004,0,0,5d94a9bc2fe383b10883d5f21fb711b04368ee28bef8377081c80a039d1c1dee,2024-11-27T19:15:33.723000 CVE-2024-54005,0,0,78bbd546deba4e2b14f99ce80711c725e32521468135821d5bfe1062b9007f78,2024-12-10T14:30:47.037000 -CVE-2024-54008,0,0,c83adc0070c7b9fe5dc822e3df77a6cc986e702399c7129cd968ded9ec0b9a23,2024-12-10T19:15:30.900000 +CVE-2024-54008,0,1,9593f48912b6399476026a38f0139749c7711d31f8d7f240872e5de4e305e3a9,2024-12-11T14:15:19.713000 CVE-2024-54014,0,0,9895136be901bda6024d3c86fc774e344b5ffa93f0cfe6e13e8990c6229717ed,2024-12-05T03:15:14.530000 CVE-2024-5402,0,0,ff0d9bb22ac0a71984c61b65bae28749f481f4dd7d54b4eb8642f168357fe194,2024-11-21T09:47:34.947000 CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000 @@ -269275,7 +269278,7 @@ CVE-2024-54254,0,0,6bd242e91a77ad9f90586d1c5e750c7c7ef35caa4861ebccd75667e5bfdd8 CVE-2024-54255,0,0,d518bbc292d8d1ed45e1085d8351cd8eb89783a225379287ae001a806a27b758,2024-12-09T13:15:44.007000 CVE-2024-5426,0,0,5ea29bfa6e12ae428a874da685da80617819a2a2873f1c2f03b3a2184d9a719d,2024-11-21T09:47:37.890000 CVE-2024-54260,0,0,77b8fbae5dfcc4dde97d03f134d079c69e76d5819885d9eb9375c0c7f0405e6d,2024-12-09T13:15:44.153000 -CVE-2024-54269,1,1,0bc9974eaf651dbbd6c977f144059de52f484482978cc1afb739ac8f56279a96,2024-12-11T10:15:07.790000 +CVE-2024-54269,0,0,0bc9974eaf651dbbd6c977f144059de52f484482978cc1afb739ac8f56279a96,2024-12-11T10:15:07.790000 CVE-2024-5427,0,0,0e5a4a243a6c356d48858411e10959c0d2b5ef3e2a4a055bc1bad76f470ca7d5,2024-11-21T09:47:38.020000 CVE-2024-5428,0,0,5169bb0837062392ce64ea8c5c88b5f92f711aab81af161892590a75207e24aa,2024-12-09T22:51:14.763000 CVE-2024-5429,0,0,c5c127d3962dc4b6ee503ad5fd97fce8ef1325aee9713e37b6918218af05ded4,2024-10-18T12:53:04.627000 @@ -270925,15 +270928,15 @@ CVE-2024-7228,0,0,a661e4304e23b944f3e8caf0591bdbb960fdef6359f8da5b3192c6c46e2a36 CVE-2024-7229,0,0,8efaf3b22bc612c6ca8d639c951b60915658eeaa33a73cd7f332a9e9f2f85e82,2024-12-09T20:04:08.797000 CVE-2024-7230,0,0,d3377bb66796c49c17d64d458ce5ec67560c57e6041313bf69cd2192d63dd3e2,2024-12-09T20:02:58.670000 CVE-2024-7231,0,0,822a99d1572fc0918e8ef2849d04bc7abba7466bb16a280b5875c6569fb3fa14,2024-12-09T20:01:00.623000 -CVE-2024-7232,0,0,798d5a89669b4c71bd315f72bebc56d11f622b89fd931997013854c9fa21c023,2024-11-22T22:15:15.920000 +CVE-2024-7232,0,1,145bec6ad818752e8e1aa21e21512188df08b9d67e720d8ed692b55ccf0053c5,2024-12-11T14:44:38.737000 CVE-2024-7233,0,0,245c9c7282702c0ad7d2d9fdcc98fa270b960e17480a03d5bfdac380727b2f08,2024-11-22T22:15:16.060000 CVE-2024-7234,0,0,c841032797f89ed33f5e5c6be97d90177bf36eff8435e446fc59dbaf44344590,2024-11-22T22:15:16.190000 CVE-2024-7235,0,0,19563b43b3a2c50df5995e73338cd7539ec685bdbbf6153d07006a345ecea5dc,2024-11-22T22:15:16.307000 CVE-2024-7236,0,0,bfe8ac9abbe8d96981ff80186e1a3adf2d31e739768635eb532383cfe3d6b902,2024-11-22T22:15:16.427000 CVE-2024-7237,0,0,662e39cca4be9b647909bd94510ead901bfe81a53d4b07cc53fbab12da70f718,2024-11-22T22:15:16.547000 -CVE-2024-7238,0,0,6dc96245ea595553b878ec0d596535652093c4c6b67dcdfae5515849b2e3f407,2024-11-22T22:15:16.663000 -CVE-2024-7239,0,0,8724318e0cf230292681d459bc1de03a030fd3a69d3cf6fafb24c48dfab5f216,2024-11-22T22:15:16.780000 -CVE-2024-7240,0,0,ff35a4403d856dbcfc67a54df65195d6bc98a046b6b13b712d29da452c9663df,2024-11-22T22:15:16.890000 +CVE-2024-7238,0,1,4b440d963378f1f4b9e96264a799f3697812528bd67e5c582e2981fc5ec5258f,2024-12-11T14:34:42.833000 +CVE-2024-7239,0,1,53968c59a1174219ae44eef241610b22dfa99619aca14fbe12febb5f8fe62200,2024-12-11T14:25:45.607000 +CVE-2024-7240,0,1,4119106a820cfa30ee1f58dc1a66e01faf0d8e616ec3f0cd9a46b5ee461420d8,2024-12-11T14:22:23.280000 CVE-2024-7241,0,0,2d262dc5b536521ef90a26c60e93d56427c74446a97caffd69699909d3022758,2024-11-26T15:08:51.357000 CVE-2024-7242,0,0,936971159de650d2954dd29c139b2685e1eb7d8690bb7709b88a437f9c6120d7,2024-11-26T14:59:29.483000 CVE-2024-7243,0,0,c6b88fa7532074a1fe50f63bbb0afc38fd44b72846ee13736713968c199e6910,2024-11-26T15:04:44.320000 @@ -271618,7 +271621,7 @@ CVE-2024-8015,0,0,dd5555b85e994899c4893ace6d3afbd967c37c55c50d205d5b3c8bf6cb87a3 CVE-2024-8016,0,0,238c4df3f0de00a81fde1b1c7b561464841085dd6f47f09817353c1bbacbfe77,2024-09-03T14:51:16.470000 CVE-2024-8022,0,0,2c2738dbc526c308d2f52af114ef294873c5e8e6729dec83af9008e9c3b5cc37,2024-08-21T12:30:33.697000 CVE-2024-8023,0,0,a1b6d905a0240efa1881c72db04eeea68a6752bd4f402a8f1846f80b6c974719,2024-08-21T12:30:33.697000 -CVE-2024-8025,0,0,688f7e4d5cdf12950b5f375d1bc6db9f5ba2bf006bfe68225511b92d3ff26344,2024-11-22T22:15:18.713000 +CVE-2024-8025,0,1,70061881b166a3a1a51ca6087abec369478d3afe4c5d3b16bf1339b5559f41f2,2024-12-11T14:02:07.930000 CVE-2024-8030,0,0,0222c140f338b9929800e6ff1f38275ac87b01268708f4fe3253d79e319814e4,2024-08-28T12:57:27.610000 CVE-2024-8033,0,0,2e06813e88b6cfa39b77eeda56acb40b59d06578c1b6d8003a2b6bea9d735890,2024-08-27T19:39:04.953000 CVE-2024-8034,0,0,8737be6f93f1495d1046c9a435fb5c4639722e22541174f90d62414e220dc49f,2024-08-22T17:35:30.003000 @@ -272078,7 +272081,7 @@ CVE-2024-8598,0,0,17bb7382ca41b399712cc44723ca89862306ddc2f56284b931416f3f7d8e7e CVE-2024-8599,0,0,13d0ff884a73c291b4096f8b78ca27030351114c1d87f3c5c05bf8cf4b35984f,2024-11-01T16:17:25.073000 CVE-2024-8600,0,0,467df8817b963ff6dd4943ad648cb11c98233a9da8dfa53fb316598e73a6889f,2024-11-01T16:17:19.680000 CVE-2024-8601,0,0,3acaee371a9188d72925a2deaf0ff4d7e630c2dd4f9352ccbd013d52f89a3544,2024-09-17T17:54:39.767000 -CVE-2024-8602,0,1,4be711d34a664a8b5e0b3d37ce84c88b22a5259bad96166dd05534c7898940cb,2024-12-11T09:15:05.890000 +CVE-2024-8602,0,0,4be711d34a664a8b5e0b3d37ce84c88b22a5259bad96166dd05534c7898940cb,2024-12-11T09:15:05.890000 CVE-2024-8604,0,0,b0f4bef2cd9a719a1e9111dc84cb9eb65623a02bb8b15e8ab1025f3d735a01a0,2024-09-10T19:14:57.017000 CVE-2024-8605,0,0,18cd92611e13242841985be931e73363b96d6240a8d360002f41aa2863d0fe3b,2024-09-13T15:31:52.140000 CVE-2024-8606,0,0,d6634fb8da7243ac8a8022d5719888e145acab992bdb7a29d6a427971fe505a6,2024-09-30T15:32:34.647000