diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20817.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20817.json index 7f661f5158a..137765848a0 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20817.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20817.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20817", "sourceIdentifier": "security@mediatek.com", "published": "2023-08-07T04:15:14.757", - "lastModified": "2023-08-09T17:49:40.027", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T21:35:01.640", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-413xx/CVE-2023-41360.json b/CVE-2023/CVE-2023-413xx/CVE-2023-41360.json index ee7229cb9b3..0d7d6a73450 100644 --- a/CVE-2023/CVE-2023-413xx/CVE-2023-41360.json +++ b/CVE-2023/CVE-2023-413xx/CVE-2023-41360.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41360", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-29T04:15:16.957", - "lastModified": "2023-12-22T21:18:13.257", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T20:35:05.873", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42694.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42694.json index 7a63d61dbeb..f5a60ce594f 100644 --- a/CVE-2023/CVE-2023-426xx/CVE-2023-42694.json +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42694.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42694", "sourceIdentifier": "security@unisoc.com", "published": "2023-12-04T01:15:09.513", - "lastModified": "2023-12-06T22:15:35.147", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T20:35:06.813", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-474xx/CVE-2023-47463.json b/CVE-2023/CVE-2023-474xx/CVE-2023-47463.json index 37e8d24ba42..93934396a42 100644 --- a/CVE-2023/CVE-2023-474xx/CVE-2023-47463.json +++ b/CVE-2023/CVE-2023-474xx/CVE-2023-47463.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47463", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-30T05:15:08.950", - "lastModified": "2023-12-05T18:24:52.707", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T20:35:07.780", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-281" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52428.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52428.json index b543279e1ff..c66bc200be9 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52428.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52428.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52428", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-11T05:15:08.383", - "lastModified": "2024-02-11T22:29:15.837", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T20:01:01.777", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,81 @@ "value": "En Connect2id Nimbus JOSE+JWT anterior a 9.37.2, un atacante puede provocar una denegaci\u00f3n de servicio (consumo de recursos) a trav\u00e9s de un valor de encabezado JWE p2c grande (tambi\u00e9n conocido como recuento de iteraciones) para el componente PasswordBasedDecrypter (PBKDF2)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:connect2id:nimbus_jose\\+jwt:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.37.2", + "matchCriteriaId": "B33B5D00-0BBE-409A-B453-E9124F17CF99" + } + ] + } + ] + } + ], "references": [ { "url": "https://bitbucket.org/connect2id/nimbus-jose-jwt/commits/3b3b77e", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://bitbucket.org/connect2id/nimbus-jose-jwt/issues/526/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://connect2id.com/products/nimbus-jose-jwt", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10004.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10004.json index 134897b194f..764d47df38e 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10004.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10004.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10004", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-15T22:15:03.197", - "lastModified": "2024-10-16T16:38:14.557", + "lastModified": "2024-10-16T20:35:08.850", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Abrir un enlace externo a un sitio web HTTP cuando Firefox iOS estaba previamente cerrado y ten\u00eda una pesta\u00f1a HTTPS abierta podr\u00eda, en algunos casos, provocar que el \u00edcono del candado muestre incorrectamente un indicador HTTPS. Esta vulnerabilidad afecta a Firefox para iOS < 131.2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1904885", diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21196.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21196.json index 5bf9c58419d..9a4178999eb 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21196.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21196.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21196", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:07.113", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:49:16.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,62 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.39", + "matchCriteriaId": "3CCA9D30-395C-4D33-87C1-E10E50E0C27A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21197.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21197.json index fe5156563d5..ab9e365ee7d 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21197.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21197.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21197", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:07.307", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:48:51.590", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,62 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.39", + "matchCriteriaId": "3CCA9D30-395C-4D33-87C1-E10E50E0C27A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21198.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21198.json index eab3a4fc218..d8598e6c692 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21198.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21198.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21198", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:07.503", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:48:23.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,62 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.39", + "matchCriteriaId": "3CCA9D30-395C-4D33-87C1-E10E50E0C27A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21199.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21199.json index ce947111e9a..afc0cfb3c38 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21199.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21199.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21199", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:07.707", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:48:06.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,62 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.39", + "matchCriteriaId": "3CCA9D30-395C-4D33-87C1-E10E50E0C27A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21200.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21200.json index 24cb2f21863..1575e986ae0 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21200.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21200.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21200", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:07.910", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:47:34.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,45 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.35", + "matchCriteriaId": "AA4C99CA-6232-4CAF-97EB-39D1B5C815E4" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21201.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21201.json index a224245bb99..830abb9b722 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21201.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21201.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21201", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:08.130", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:46:55.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,62 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.39", + "matchCriteriaId": "3CCA9D30-395C-4D33-87C1-E10E50E0C27A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21203.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21203.json index efb9f42ac78..a812cfc09ef 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21203.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21203.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21203", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:08.490", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:46:35.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + }, { "source": "secalert_us@oracle.com", "type": "Secondary", @@ -39,10 +59,62 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.39", + "matchCriteriaId": "3CCA9D30-395C-4D33-87C1-E10E50E0C27A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21207.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21207.json index 819b1c657c8..b1b55346334 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21207.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21207.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21207", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:09.243", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:45:17.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,62 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.39", + "matchCriteriaId": "3CCA9D30-395C-4D33-87C1-E10E50E0C27A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21209.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21209.json index d35c99deff1..ecedfdd6caf 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21209.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21209.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21209", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:09.640", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:44:58.323", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,55 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21212.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21212.json index 4a66a372a4d..d009ea5dc66 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21212.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21212.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21212", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:10.237", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:44:19.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.39", + "matchCriteriaId": "3CCA9D30-395C-4D33-87C1-E10E50E0C27A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21213.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21213.json index 68ffc742d17..07807917dd2 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21213.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21213.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21213", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:10.417", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:43:51.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,62 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.39", + "matchCriteriaId": "3CCA9D30-395C-4D33-87C1-E10E50E0C27A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21218.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21218.json index 2de0b41d81d..010a67a25c4 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21218.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21218.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21218", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:11.387", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:43:35.043", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,62 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.39", + "matchCriteriaId": "3CCA9D30-395C-4D33-87C1-E10E50E0C27A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21219.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21219.json index 2119ee2f2a9..fc92efb7521 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21219.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21219.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21219", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:11.573", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:43:02.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + }, { "source": "secalert_us@oracle.com", "type": "Secondary", @@ -39,10 +59,62 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.39", + "matchCriteriaId": "3CCA9D30-395C-4D33-87C1-E10E50E0C27A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21230.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21230.json index 203eafe349f..23aa6b59300 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21230.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21230.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21230", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:11.757", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:42:35.450", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,62 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.39", + "matchCriteriaId": "3CCA9D30-395C-4D33-87C1-E10E50E0C27A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21231.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21231.json index 2873a4019ad..27e2393f732 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21231.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21231.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21231", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:11.943", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:42:13.877", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,62 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.39", + "matchCriteriaId": "3CCA9D30-395C-4D33-87C1-E10E50E0C27A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21232.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21232.json index a58ef87b958..2f17fc45187 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21232.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21232.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21232", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:12.120", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:41:35.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,55 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21236.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21236.json index 4ea90379f47..59de45795f5 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21236.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21236.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21236", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:12.810", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:41:14.010", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,62 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.39", + "matchCriteriaId": "3CCA9D30-395C-4D33-87C1-E10E50E0C27A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21237.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21237.json index f566951fa58..66e38581a8b 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21237.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21237.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21237", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:12.983", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:40:35.677", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,62 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.39", + "matchCriteriaId": "3CCA9D30-395C-4D33-87C1-E10E50E0C27A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21238.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21238.json index 4b8a3d2339e..d9cbb3326de 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21238.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21238.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21238", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:13.160", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:40:07.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,62 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.39", + "matchCriteriaId": "3CCA9D30-395C-4D33-87C1-E10E50E0C27A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21239.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21239.json index db1c44ddd30..bd9b86271f0 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21239.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21239.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21239", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:13.350", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:36:59.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,62 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.39", + "matchCriteriaId": "3CCA9D30-395C-4D33-87C1-E10E50E0C27A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21241.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21241.json index 6790ba03663..ffe9e5fef9d 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21241.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21241.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21241", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:13.547", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:36:10.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,62 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.39", + "matchCriteriaId": "3CCA9D30-395C-4D33-87C1-E10E50E0C27A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21243.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21243.json index 50b35705438..0c08ecd05bc 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21243.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21243.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21243", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:13.923", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:35:41.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,55 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21244.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21244.json index e3e4d829fd1..81885cc182e 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21244.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21244.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21244", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:14.130", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:35:00.173", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,55 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21247.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21247.json index 17b5d3f70b7..9f0b0aca04e 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21247.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21247.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21247", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:14.513", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:33:33.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,62 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndIncluding": "8.0.39", + "matchCriteriaId": "3CCA9D30-395C-4D33-87C1-E10E50E0C27A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.4.0", + "versionEndIncluding": "8.4.2", + "matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21455.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21455.json index aea1855354c..84d7a9e6de1 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21455.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21455.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21455", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:10.360", - "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T20:30:53.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + }, { "source": "product-security@qualcomm.com", "type": "Secondary", @@ -51,10 +61,555 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AEA324C-69CE-4AAC-91D6-6FAAE1B3FA77" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc1_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7B5F5CD-CE26-4C93-9FED-F783947DBDA6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", + "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_685_4g_mobile_platform_\\(sm6225-ad\\)_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2C43376-1ACC-42FF-873F-3B0372EE71A5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_685_4g_mobile_platform_\\(sm6225-ad\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "58BC09AF-6057-45A1-BEB8-AF9F4CBF3F5E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D0ED00F-1345-43AD-83C6-E979890B84AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_680_4g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92C28019-B57D-4487-B551-F7B53395C6E5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9279F02F-6C30-4891-8941-97003DE9C8C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg4150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFA7BB42-305C-451F-92D8-0718DF68A012" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4468EA5D-87B0-4FEC-A3DB-617651B0D169" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DA2C3E1-E285-4CAD-9FA3-813C8EC436F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB226552-52D9-44F5-A170-35C44761A72B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FBB16DC4-CDC9-4936-9C6A-0ED8E1F6D056" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFBD264F-F24A-4CDD-B316-9514A61B91E7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6688aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94CC5BC4-011D-4D2B-8891-97FBF61FD783" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", + "matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22128.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22128.json index 19a799f6e7b..192f688fc72 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22128.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22128.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22128", "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T02:15:08.323", - "lastModified": "2024-02-13T14:01:40.577", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:30:47.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cna@sap.com", "type": "Secondary", @@ -51,14 +71,77 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_business_client_for_html:sap_basis_700:*:*:*:*:*:*:*", + "matchCriteriaId": "78C94A50-17DD-4206-9861-E4406C7CFEDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_business_client_for_html:sap_basis_701:*:*:*:*:*:*:*", + "matchCriteriaId": "7055999C-5B25-4E7D-B7A3-9A140DCA9E93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_business_client_for_html:sap_basis_702:*:*:*:*:*:*:*", + "matchCriteriaId": "1B9F39B4-5F9B-4E1C-94A4-3201A6D6CFFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_business_client_for_html:sap_basis_731:*:*:*:*:*:*:*", + "matchCriteriaId": "D2FD9175-513A-45CE-B113-6EE1C00ADACE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_business_client_for_html:sap_ui_754:*:*:*:*:*:*:*", + "matchCriteriaId": "D3FA1C87-6B1D-49EC-B2B6-9FA74B41C643" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_business_client_for_html:sap_ui_755:*:*:*:*:*:*:*", + "matchCriteriaId": "C5A00719-2E66-4CFE-B10A-7582F83A3724" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_business_client_for_html:sap_ui_756:*:*:*:*:*:*:*", + "matchCriteriaId": "14A2A918-2B9D-442A-80E7-B0268540647D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_business_client_for_html:sap_ui_757:*:*:*:*:*:*:*", + "matchCriteriaId": "4F301FA2-E797-4AAE-B152-FD20AAB815E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_business_client_for_html:sap_ui_758:*:*:*:*:*:*:*", + "matchCriteriaId": "06987429-230F-423E-B5A2-5D9347D446EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://me.sap.com/notes/3396109", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22129.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22129.json index 82872105090..4652f6d7002 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22129.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22129.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22129", "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T04:15:08.133", - "lastModified": "2024-02-13T14:01:40.577", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:16:47.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + }, { "source": "cna@sap.com", "type": "Secondary", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:companion:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.1.38", + "matchCriteriaId": "0C24ED2F-63A1-4735-BE45-362A49ED088C" + } + ] + } + ] + } + ], "references": [ { "url": "https://me.sap.com/notes/3404025", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22130.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22130.json index d4595c26809..12eb0246a96 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22130.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22130.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22130", "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T03:15:08.163", - "lastModified": "2024-02-13T14:01:40.577", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:29:12.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cna@sap.com", "type": "Secondary", @@ -51,14 +71,112 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:s4fnd_102:*:*:*:*:*:*:*", + "matchCriteriaId": "81008DC2-A6AC-443B-97C7-FA176CAFB872" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:s4fnd_103:*:*:*:*:*:*:*", + "matchCriteriaId": "B47A1AF2-1AA2-473B-B827-3415E92B724D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:s4fnd_104:*:*:*:*:*:*:*", + "matchCriteriaId": "1FEBF928-D10C-4CAB-A109-DC90EE5BAC70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:s4fnd_105:*:*:*:*:*:*:*", + "matchCriteriaId": "1BD0435C-EE87-4BCF-B4D6-07E29ABECD8E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:s4fnd_106:*:*:*:*:*:*:*", + "matchCriteriaId": "FF8E42A5-BEA3-479E-A24F-67136AB59818" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:s4fnd_107:*:*:*:*:*:*:*", + "matchCriteriaId": "5EE69563-01A3-4575-9B4E-0C2E6BFE2DC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:s4fnd_108:*:*:*:*:*:*:*", + "matchCriteriaId": "E5A5FFCB-0A04-4044-8F95-19C91C1B7848" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_700:*:*:*:*:*:*:*", + "matchCriteriaId": "ECCA83F4-E081-4473-89DC-F41E369C57C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_701:*:*:*:*:*:*:*", + "matchCriteriaId": "66F16184-257A-4FC3-9F06-42C7396DFC94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_730:*:*:*:*:*:*:*", + "matchCriteriaId": "9E0744FA-927A-4858-B03E-076735DFC44D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_731:*:*:*:*:*:*:*", + "matchCriteriaId": "C43D99F4-67FF-445C-AB52-B7A7E1C331FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_746:*:*:*:*:*:*:*", + "matchCriteriaId": "A9F31DDF-CE56-4FAF-86B1-EADE327D50D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_747:*:*:*:*:*:*:*", + "matchCriteriaId": "D10EDE57-6B7A-478E-8873-8EF1340CB0BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_748:*:*:*:*:*:*:*", + "matchCriteriaId": "ACA5B5AA-7045-4784-ABF7-490F3F81FAC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_800:*:*:*:*:*:*:*", + "matchCriteriaId": "C7BD98EF-ABCC-4F39-A52B-B905E5062C1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_801:*:*:*:*:*:*:*", + "matchCriteriaId": "5AB3A28B-D89F-43C4-BE3D-D1B9A0487B51" + } + ] + } + ] + } + ], "references": [ { "url": "https://me.sap.com/notes/3410875", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22131.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22131.json index 74a7deab001..90a9a73932a 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22131.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22131.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22131", "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T03:15:08.363", - "lastModified": "2024-02-13T14:01:40.577", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:28:35.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "cna@sap.com", "type": "Secondary", @@ -51,14 +71,82 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:abap_platform:75c:*:*:*:*:*:*:*", + "matchCriteriaId": "EF0145C4-663F-4E0F-B271-515EFB130D74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:abap_platform:75i:*:*:*:*:*:*:*", + "matchCriteriaId": "79B3CC36-624C-46F9-832E-43E831AFFC35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:abap_platform:700:*:*:*:*:*:*:*", + "matchCriteriaId": "9AA5D36E-BE80-422B-8A6B-0ABDDE274146" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:abap_platform:701:*:*:*:*:*:*:*", + "matchCriteriaId": "C04D8608-83F0-4D7F-A7A9-59B616240F14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:abap_platform:702:*:*:*:*:*:*:*", + "matchCriteriaId": "E4DF5956-1396-41FA-B101-E24F7898D135" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:abap_platform:731:*:*:*:*:*:*:*", + "matchCriteriaId": "CC2B8C19-4A66-44A8-9995-2BB71D8AA665" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:abap_platform:740:*:*:*:*:*:*:*", + "matchCriteriaId": "07710B18-BF01-4316-A258-4F1CB6269C5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:abap_platform:750:*:*:*:*:*:*:*", + "matchCriteriaId": "A3A631DA-1279-49AC-922E-7D7216DACC8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:abap_platform:751:*:*:*:*:*:*:*", + "matchCriteriaId": "65320F25-669B-40D8-A246-07B0202C00A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:abap_platform:752:*:*:*:*:*:*:*", + "matchCriteriaId": "DD5559B1-08ED-4F5C-A61D-0EA13597DBE9" + } + ] + } + ] + } + ], "references": [ { "url": "https://me.sap.com/notes/3420923", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22132.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22132.json index 7b111b53586..9c9158b31e4 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22132.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22132.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22132", "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T03:15:08.570", - "lastModified": "2024-02-13T14:01:40.577", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:21:20.573", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + }, { "source": "cna@sap.com", "type": "Secondary", @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:ides_ecc:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C1F3ABB7-AE38-4215-9770-E9AD0AAB674A" + } + ] + } + ] + } + ], "references": [ { "url": "https://me.sap.com/notes/3421659", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23369.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23369.json index 76d5ecfb50d..dd69ea35a87 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23369.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23369.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23369", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:10.683", - "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T20:30:19.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + }, { "source": "product-security@qualcomm.com", "type": "Secondary", @@ -51,10 +61,3201 @@ ] } ], - "references": [ + "configurations": [ { - "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", - "source": "product-security@qualcomm.com" + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_mobile_platform_\\(sm8350-ac\\)_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "64211DA1-CC87-4AAC-AE3F-523FFED971F7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g_mobile_platform_\\(sm8350-ac\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF804E3E-E3A0-4B43-B809-E58EE4BF9888" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_platform_\\(sm8250-ab\\)_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92FFCF9B-9930-4D5B-8FCB-50BEA08CC74E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile_platform_\\(sm8250-ab\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "8F166873-2D79-4A68-A7FC-BD1C94F4BC75" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BC386D9-3D2B-40FA-A2D9-199BB138F46A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6755:-:*:*:*:*:*:*:*", + "matchCriteriaId": "133FFD9F-FA09-4801-939B-AD1D507BE5FE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", + "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CFDBB5B-0A4F-4032-874F-D2A7EF933FB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9378:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D28A12D6-CC60-4BE9-ADEE-FAB58B05440F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BA28CC6-C8BB-4F50-BFE3-A59F664A4F54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94D2BDF1-764C-48BA-8944-3275E8768078" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95762B01-2762-45BD-8388-5DB77EA6139C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4B29E7F-8BFE-466A-B357-63F8A2160C4E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D55CC7D-2E65-4CA9-9892-B6FBCC087E6F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B88B3A43-24DD-44EB-AEF1-B7ECAB97C0FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07602885-8BEA-4820-A8F5-41E909718FBA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0CD199F5-DA68-4BEB-AA99-11572DA26B4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ACA2D4D-FC77-4C1A-8278-1C27B3EA3303" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A129620-8241-4A47-AAC8-CC7E10A09C9C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CEDD78E-124C-4216-9B57-3B7B53463659" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95A98B39-067F-4047-9ADB-7C53F18CBB7B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C462F32-0E70-472A-A42D-CD0229A97E94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "205BF723-DBED-4EAE-8B5C-0E01B01E1544" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x72_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A36A7B8-CF35-4003-AC3E-C5D25288B1A1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F74BF53E-DFA1-4750-A638-FE7572B79D16" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "226D1ABD-E4AD-487E-88EB-4C66D51DB33D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x62_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FEA4DE65-C5F1-45F6-9D79-CF80196471B6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x62_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F27FE86-F0E3-4EBD-933F-9B0210CBD72F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AAFF2095-4257-40C9-8C48-B38C143159ED" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FEA2F1D-7D07-4684-BDC1-24224A53A8BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x35_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3358AEB-CD49-4FF9-9410-7EDF0AAABB82" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x35_5g_modem-rf_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ED45581-33EE-4D4C-B078-9D7DB6F2386A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_3_compute_platform_\\(sc8280xp-ab\\,_bb\\)_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE07B9B9-035F-474E-A9F8-7D75FE9185FE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_3_compute_platform_\\(sc8280xp-ab\\,_bb\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4CB7BB6-E593-4426-8F63-266B38C02CDE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22A78236-5965-4F65-9001-3FE7FF6D27E8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "414C5C1D-A5DA-47C7-B6C9-3564DD4DD911" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_\\(sm8250-ac\\)_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8584AFB9-91D1-4A5F-B9B7-073BFB57D52C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile_platform_\\(sm8250-ac\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A85EE79-C669-433A-AB80-C92FCB6537EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C9F4285-1F09-40CD-B1AA-84B406FD6A71" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8623DD44-DFDD-442D-9789-11A527A450A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FAB6D60-1C03-4F85-B874-FF169402ED09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C89A8D93-46DA-4547-A9F1-076FC0D5119D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_platform_\\(sm7250-ac\\)_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "935A596A-3DEF-4058-BDD0-A309AF9B735B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g_mobile_platform_\\(sm7250-ac\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "53020AC9-B3B4-4C4F-9E68-708D630F876A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_mobile_platform_\\(sm7250-ab\\)_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26055FD2-A4C1-4C9B-A486-7A06A4861370" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765g_5g_mobile_platform_\\(sm7250-ab\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "73E6EF0D-5D71-410B-B08D-4A273E36B253" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_platform_\\(sm7250-aa\\)_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A818B7F5-9FE1-443F-80D5-35804895BE2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g_mobile_platform_\\(sm7250-aa\\):-:*:*:*:*:*:*:*", + "matchCriteriaId": "C1423FCC-E1A2-4E9A-9B2C-E9AB17149A0B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65865EE9-59C0-498F-A4C5-EC00D4642603" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8635:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE02AB51-6FB6-4727-999B-A7466CEDC534" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D395018-251C-45AA-9EE8-A638CAB0B508" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm4635_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE676369-CC9C-4A16-A477-188240861747" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm4635:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3BCB636-956F-417D-8858-8BFB3EABD83E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76910884-45D9-4EA2-BA30-44A8C7CC1339" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33D393A6-4586-4416-86EB-F9D86DC3DED8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14E3FE58-7F1C-4F5C-B62D-0CF124E14AB2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFCB0BBA-3F81-4FCA-B3DE-190C46DA50DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2A8AB7C-5D34-4794-8C06-2193075B323F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F2F3431-9CD7-4D4F-833D-DD4D3ACF94C7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75AFAA21-0589-4C6A-9418-34EE8A61BBAD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0E807AA-5646-48AD-9A5C-B0B13E222AA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45FBB72B-B850-4E3F-ACBB-9392157FF131" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6ACE6D64-A498-482F-8270-718F4884CFFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8620p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6E016D6-1B83-4261-A27E-1F9873F81E14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D6F8899-136A-4A57-9F02-BD428E1663DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8530p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6107034C-E0B0-43BD-963B-2B558B913537" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8530p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC1839A1-4B68-468E-8155-F0A53A3C9B94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "073C1A81-D02B-4F2F-9378-CD1B2DCE0E5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C32CA38-5D48-4108-9858-FD66E20CAF2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7775p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1997F8B-17B8-4DE3-BCF7-726928720592" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B651F0A-34DA-400F-A376-B499BFDF8E86" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7255p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CFF093D-98C8-470F-8330-E5126E06343A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qualcomm_video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C20F4F14-D940-41AE-AFBC-D08A24FAE1A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qualcomm_video_collaboration_vc3_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F36CEF6E-97A9-4D01-A406-574EA7CB025B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1894F6B9-31DA-44E8-AA28-064F73EBEE8D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qsm8350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8AA23845-D9F5-4035-8A93-F475D865586F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qru1062_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C81773C-4A1C-4589-A6FD-A85770F3ADFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qru1062:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CABCCB94-8C93-4CF1-9EA1-D410FF6ACD72" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qru1052_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EAAB699-BFDA-465B-9B82-5E957C67D52A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qru1052:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D2C3994-110F-40FA-B60F-D2C85A36E256" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qru1032_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ECC6966-23CF-4189-81B3-477A97E38B05" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qru1032:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01490429-D26C-4F80-83A4-8DC257142B86" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D72C4CE0-AB59-4652-854F-94C9998F2712" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98720774-11B8-4B4B-BC73-D4DA84E07F78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7456782E-B6CE-42ED-A51E-39907120E28B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*", + "matchCriteriaId": "637BF4DF-BB40-479F-B696-6AD9D4B35D64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qep8111_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BEB4913D-940F-49CC-951A-9704CCEE636C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qep8111:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E93E1D2-4546-4D60-B53D-20CF09551766" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdx1011_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6554B2E1-AE96-40CE-A19F-C7516CDBC41A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdx1011:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1991232B-B58F-481E-A7EE-0546E64C12CC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdx1010_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B7AB84B-55D0-45EB-ABA8-F69E5179507E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdx1010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B908A65E-F3B2-417A-91EE-1BE855BABD2E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1210_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "32E0EBD5-A846-44F9-9DEC-1C6711C96A5B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C68F8102-788C-4EF3-83E4-56DF764DFFBC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1110_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F5F9F3D-1F57-4D16-972E-AF39E438E4C3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1110:-:*:*:*:*:*:*:*", + "matchCriteriaId": "53D6BEFE-AA21-4786-B11C-A6683AC06622" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B6A4AA9-E35B-4B25-9FD3-BFB907B822DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AC8538B-6663-4CF7-BD4A-9766C04CBAB5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "407EE4D5-1F52-40D6-B85A-E49915D6EF2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qdu1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5846C9DD-63E5-482D-BE01-3A1E89CC0EDE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEFEBC7A-80C0-4E4F-B9C7-53EECF86B6B5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88376C1D-AC4D-4EB0-AF6A-274D020F5859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E15BA4B4-C97F-45C0-A4AD-7E46387F19A6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F4362D2-30A3-4388-ABB6-293878AD7036" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB6AE9A7-386A-473B-9BD5-DA37B1E696C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5C66DAD-0D85-46B8-92D7-6D68B9429E9A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A75D017-032F-4369-917C-567EE2A809F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*", + "matchCriteriaId": "107F0423-608C-404D-B58B-616A6494418F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", + "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "797295C2-535C-46A9-A725-E1A5405F0436" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BFC575E-594E-4711-94B1-2DC8D03B9AC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D001127D-8160-42F0-B8B9-2FAA2976B530" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6678aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9EB615F-FD4C-450B-AB25-E936FD9816C4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288F637F-22F8-47CF-B67F-C798A730A1BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0996EA3-1C92-4933-BE34-9CF625E59FE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", + "matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11405993-5903-4716-B452-370281034B42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B828AC8-4A01-4537-B2BD-8180C99F5C32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66C16E1E-9D4A-4F20-B697-833FDCCA86FB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6431_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76FD6A24-B6F4-4C65-968F-AFF90A1A60B8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6431:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34661A30-92C3-4F0D-ABD1-8DA8E928DFF9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6421_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "503CEDEF-99D0-4432-88A0-295340743606" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6421:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE9115A0-0D87-49BE-9A9B-091DBF8D9E6E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C31FA74C-6659-4457-BC32-257624F43C66" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE03AB2A-3ED9-4489-8E5B-4FCF8BAA8559" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E646738-6A87-4470-9640-6A5A1DF3AF78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8673334-5E11-4E95-B33D-3029499F71DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC0B32F6-5EF0-4591-99D7-D0E9B09DEC5A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58170126-928F-4AE5-B5AF-5ED4710F9BA2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD37AA1A-B911-45BF-9BCC-C772FA83E657" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DBAC2260-52E3-49DE-97EA-F80DBD837FD3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8620p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "17599B8D-5753-4408-B4CD-AAA65C826922" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B12B89EF-7B12-481E-BCBC-F12B9D16321A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + } + ] + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23370.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23370.json index a5fbde2ab70..ffdd6e33b5b 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23370.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23370.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23370", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:10.927", - "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T20:27:07.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "product-security@qualcomm.com", "type": "Secondary", @@ -51,10 +61,312 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EEB883BF-68B2-4C25-84DC-5DA953BFAA2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B8455D6-287D-4934-8E4D-F4127A9C0449" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D2B46E-3996-42FD-B932-09E92C02EC8A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98E58C63-F253-4DCC-8A14-48FEB64B4C3D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2AD0E09B-92EC-4974-BC5F-66C3AAF586B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FBA48AB-85F4-4D6C-B811-87756B80FFB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23374.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23374.json index 52507c4fff0..3a727fe241f 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23374.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23374.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23374", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:11.173", - "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T20:26:47.983", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "product-security@qualcomm.com", "type": "Secondary", @@ -51,10 +61,717 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EEB883BF-68B2-4C25-84DC-5DA953BFAA2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B8455D6-287D-4934-8E4D-F4127A9C0449" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C455E7D-D256-4240-BE72-2A93273D685A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "423E21A1-8F52-46DA-9AC2-77159FEB6001" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4D2B46E-3996-42FD-B932-09E92C02EC8A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98E58C63-F253-4DCC-8A14-48FEB64B4C3D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2AD0E09B-92EC-4974-BC5F-66C3AAF586B1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FBA48AB-85F4-4D6C-B811-87756B80FFB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C31FA74C-6659-4457-BC32-257624F43C66" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23375.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23375.json index f6680ba5676..33774c2b8ec 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23375.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23375.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23375", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:11.400", - "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T20:26:01.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + }, { "source": "product-security@qualcomm.com", "type": "Secondary", @@ -51,10 +61,393 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE861CE7-B530-4698-A9BC-43A159647BF2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EEB883BF-68B2-4C25-84DC-5DA953BFAA2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B8455D6-287D-4934-8E4D-F4127A9C0449" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C455E7D-D256-4240-BE72-2A93273D685A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "423E21A1-8F52-46DA-9AC2-77159FEB6001" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8D28764-EF4F-4FB3-B936-B42397450EFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa4155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7964A762-467B-47D7-865F-30D48A0AE47C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DC99C0C-8AE3-4918-B91D-2C26990FE931" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A558A868-1B67-48D2-8A94-FDEA7126FAE7" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23376.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23376.json index 5c34a47993f..e19d1ce617c 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23376.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23376.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23376", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:11.593", - "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T20:07:45.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "product-security@qualcomm.com", "type": "Secondary", @@ -51,10 +61,582 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EEB883BF-68B2-4C25-84DC-5DA953BFAA2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B8455D6-287D-4934-8E4D-F4127A9C0449" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C455E7D-D256-4240-BE72-2A93273D685A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "423E21A1-8F52-46DA-9AC2-77159FEB6001" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB8FA32F-4690-4C5B-8968-474DA32FD0A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59BD8BEA-725A-4158-84BE-4AFD476ED03D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FF653D0-15CF-4A10-8D8E-BE56F4DAB890" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C31FA74C-6659-4457-BC32-257624F43C66" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23378.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23378.json index ab8f8f46a1f..5eb31f295fe 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23378.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23378.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23378", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-10-07T13:15:11.800", - "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T20:00:29.503", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + }, { "source": "product-security@qualcomm.com", "type": "Secondary", @@ -51,10 +61,501 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4B29E7F-8BFE-466A-B357-63F8A2160C4E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D55CC7D-2E65-4CA9-9892-B6FBCC087E6F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0CD199F5-DA68-4BEB-AA99-11572DA26B4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ACA2D4D-FC77-4C1A-8278-1C27B3EA3303" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE5FCA7F-1FBE-42AA-B4E6-09CEA02A33EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2D789BC-43F5-40FB-A191-163C01BA5FBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2A8AB7C-5D34-4794-8C06-2193075B323F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F2F3431-9CD7-4D4F-833D-DD4D3ACF94C7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75AFAA21-0589-4C6A-9418-34EE8A61BBAD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0E807AA-5646-48AD-9A5C-B0B13E222AA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45FBB72B-B850-4E3F-ACBB-9392157FF131" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6ACE6D64-A498-482F-8270-718F4884CFFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8620p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6E016D6-1B83-4261-A27E-1F9873F81E14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "073C1A81-D02B-4F2F-9378-CD1B2DCE0E5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C32CA38-5D48-4108-9858-FD66E20CAF2F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7775p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1997F8B-17B8-4DE3-BCF7-726928720592" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B651F0A-34DA-400F-A376-B499BFDF8E86" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa7255p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CFF093D-98C8-470F-8330-E5126E06343A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3DDA896-576C-44B8-85B6-F71F473F776B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51A87BDA-5B24-4212-BAB3-D2BBB2F4162E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE03AB2A-3ED9-4489-8E5B-4FCF8BAA8559" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E646738-6A87-4470-9640-6A5A1DF3AF78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8673334-5E11-4E95-B33D-3029499F71DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC0B32F6-5EF0-4591-99D7-D0E9B09DEC5A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58170126-928F-4AE5-B5AF-5ED4710F9BA2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD37AA1A-B911-45BF-9BCC-C772FA83E657" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B12B89EF-7B12-481E-BCBC-F12B9D16321A" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24739.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24739.json index 7e2ffc6ead0..ce634f818a5 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24739.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24739.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24739", "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T03:15:08.780", - "lastModified": "2024-02-13T14:01:40.577", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:20:37.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + }, { "source": "cna@sap.com", "type": "Secondary", @@ -51,14 +71,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:bank_account_management:s4core_100:*:*:*:*:*:*:*", + "matchCriteriaId": "FA1ACAD6-9068-4468-83B2-8CB61F325BEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:bank_account_management:s4core_101:*:*:*:*:*:*:*", + "matchCriteriaId": "76352086-0768-4A0F-91AB-BEE3CDA58AF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:bank_account_management:sap_fin_618:*:*:*:*:*:*:*", + "matchCriteriaId": "5842D64D-C725-439A-82EA-A10FB0718DB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:bank_account_management:sap_fin_730:*:*:*:*:*:*:*", + "matchCriteriaId": "D69CC7F0-A2F5-4C3F-80F6-F2397859A6C0" + } + ] + } + ] + } + ], "references": [ { "url": "https://me.sap.com/notes/2637727", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24740.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24740.json index 930b539f759..63791647794 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24740.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24740.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24740", "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T03:15:08.987", - "lastModified": "2024-09-28T23:15:12.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:18:54.343", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "cna@sap.com", "type": "Secondary", @@ -51,14 +71,72 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:kernel_7.53:*:*:*:*:*:*:*", + "matchCriteriaId": "DBC44C62-0BFD-4170-B094-C82DEA473938" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:kernel_7.54:*:*:*:*:*:*:*", + "matchCriteriaId": "D99F18BB-B44E-48B5-BD7C-D20E40915268" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:kernel_7.77:*:*:*:*:*:*:*", + "matchCriteriaId": "208F59B2-7D79-4E0E-97DA-AEB9976C8EEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:kernel_7.85:*:*:*:*:*:*:*", + "matchCriteriaId": "A120BC2E-92B2-404A-ADF6-F1AF512631E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:kernel_7.89:*:*:*:*:*:*:*", + "matchCriteriaId": "56F63498-DAC3-40EE-9625-51FA522BA0DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:kernel_7.93:*:*:*:*:*:*:*", + "matchCriteriaId": "0269C487-81F8-4240-BEF8-1A7C33864519" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:kernel_7.94:*:*:*:*:*:*:*", + "matchCriteriaId": "32300EC9-E892-427B-A78A-55B3E5129EC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:krnl64uc_7.53:*:*:*:*:*:*:*", + "matchCriteriaId": "ADE160BD-659F-4517-B625-61CFB2FBD456" + } + ] + } + ] + } + ], "references": [ { "url": "https://me.sap.com/notes/3360827", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24741.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24741.json index 3d70a5623e2..d659407b7d4 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24741.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24741.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24741", "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T04:15:08.340", - "lastModified": "2024-02-13T14:01:40.577", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:16:23.770", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "cna@sap.com", "type": "Secondary", @@ -51,14 +71,82 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:master_data_governance_for_material_data:618:*:*:*:*:*:*:*", + "matchCriteriaId": "11DBE392-E087-47C1-A929-C2106BBD765F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:master_data_governance_for_material_data:619:*:*:*:*:*:*:*", + "matchCriteriaId": "A54FC8EC-AFCE-47F4-83D6-A670CCED00F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:master_data_governance_for_material_data:620:*:*:*:*:*:*:*", + "matchCriteriaId": "DC15EBBD-B074-4BAA-A725-DCD66138DAD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:master_data_governance_for_material_data:621:*:*:*:*:*:*:*", + "matchCriteriaId": "23B8D5F8-219C-47F4-98B7-E5B124563107" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:master_data_governance_for_material_data:622:*:*:*:*:*:*:*", + "matchCriteriaId": "BA569B7D-9360-4B22-8F04-076CA8FC0EC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:master_data_governance_for_material_data:800:*:*:*:*:*:*:*", + "matchCriteriaId": "20E3C861-0668-42FD-BD02-539861F1CBDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:master_data_governance_for_material_data:801:*:*:*:*:*:*:*", + "matchCriteriaId": "C66BC0C1-702E-44BB-AA5C-02011760B0A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:master_data_governance_for_material_data:802:*:*:*:*:*:*:*", + "matchCriteriaId": "40EAAF80-6111-4ED7-9460-DC48576F52D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:master_data_governance_for_material_data:803:*:*:*:*:*:*:*", + "matchCriteriaId": "A8F9E8C5-3C69-4E7A-8946-8A9B92698B7B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:master_data_governance_for_material_data:804:*:*:*:*:*:*:*", + "matchCriteriaId": "1F74B545-1CD8-4405-8640-C27BE6715DC5" + } + ] + } + ] + } + ], "references": [ { "url": "https://me.sap.com/notes/2897391", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24742.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24742.json index f8fded97dfc..88614d81981 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24742.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24742.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24742", "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T03:15:09.187", - "lastModified": "2024-02-13T14:01:40.577", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:18:27.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 + }, { "source": "cna@sap.com", "type": "Secondary", @@ -51,14 +71,92 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:s4fnd_102:*:*:*:*:*:*:*", + "matchCriteriaId": "81008DC2-A6AC-443B-97C7-FA176CAFB872" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:s4fnd_103:*:*:*:*:*:*:*", + "matchCriteriaId": "B47A1AF2-1AA2-473B-B827-3415E92B724D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:s4fnd_104:*:*:*:*:*:*:*", + "matchCriteriaId": "1FEBF928-D10C-4CAB-A109-DC90EE5BAC70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:s4fnd_105:*:*:*:*:*:*:*", + "matchCriteriaId": "1BD0435C-EE87-4BCF-B4D6-07E29ABECD8E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:s4fnd_106:*:*:*:*:*:*:*", + "matchCriteriaId": "FF8E42A5-BEA3-479E-A24F-67136AB59818" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_701:*:*:*:*:*:*:*", + "matchCriteriaId": "66F16184-257A-4FC3-9F06-42C7396DFC94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_731:*:*:*:*:*:*:*", + "matchCriteriaId": "C43D99F4-67FF-445C-AB52-B7A7E1C331FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_746:*:*:*:*:*:*:*", + "matchCriteriaId": "A9F31DDF-CE56-4FAF-86B1-EADE327D50D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_747:*:*:*:*:*:*:*", + "matchCriteriaId": "D10EDE57-6B7A-478E-8873-8EF1340CB0BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_748:*:*:*:*:*:*:*", + "matchCriteriaId": "ACA5B5AA-7045-4784-ABF7-490F3F81FAC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_800:*:*:*:*:*:*:*", + "matchCriteriaId": "C7BD98EF-ABCC-4F39-A52B-B905E5062C1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:crm_-_webclient_ui:webcuif_801:*:*:*:*:*:*:*", + "matchCriteriaId": "5AB3A28B-D89F-43C4-BE3D-D1B9A0487B51" + } + ] + } + ] + } + ], "references": [ { "url": "https://me.sap.com/notes/3158455", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24743.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24743.json index aa003c6ad94..81b700155ad 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24743.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24743.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24743", "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T03:15:09.393", - "lastModified": "2024-02-13T14:01:40.577", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:17:44.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@sap.com", "type": "Secondary", @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_java:7.50:*:*:*:*:*:*:*", + "matchCriteriaId": "9C506445-3787-4BFF-A98B-7502A0F7CF80" + } + ] + } + ] + } + ], "references": [ { "url": "https://me.sap.com/notes/3426111", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25642.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25642.json index 1cdaf845ccd..e54075cd02c 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25642.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25642.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25642", "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T03:15:09.613", - "lastModified": "2024-06-10T17:16:21.947", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:17:11.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + }, { "source": "cna@sap.com", "type": "Secondary", @@ -51,18 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:cloud_connector:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "99EB55F1-1E25-41FC-8939-6A410BF3790F" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/26", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://me.sap.com/notes/3424610", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25643.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25643.json index 4ae9774ade2..a8abdcea73a 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25643.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25643.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25643", "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T04:15:08.590", - "lastModified": "2024-02-13T14:01:07.747", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:15:57.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "cna@sap.com", "type": "Secondary", @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:fiori:605:*:*:*:*:*:*:*", + "matchCriteriaId": "CA2171CC-820E-4381-8F1E-D873E8ABC8CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://me.sap.com/notes/3237638", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25694.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25694.json index ee42b806e66..422ee5f1833 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25694.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25694.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25694", "sourceIdentifier": "psirt@esri.com", "published": "2024-10-04T18:15:06.167", - "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:00:18.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "psirt@esri.com", "type": "Secondary", @@ -51,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.8.1", + "versionEndIncluding": "10.9.1", + "matchCriteriaId": "3D115D5A-0395-4C0E-84BD-04119675B389" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2024-update-2-released/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25701.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25701.json index f6a6cd2c9d4..486c5aefebd 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25701.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25701.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25701", "sourceIdentifier": "psirt@esri.com", "published": "2024-10-04T18:15:06.390", - "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:00:36.173", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "psirt@esri.com", "type": "Secondary", @@ -51,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.8.1", + "versionEndIncluding": "11.1", + "matchCriteriaId": "52CEC629-7368-42D1-9107-AC3937B6DB02" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2024-update-2-released/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25702.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25702.json index ae96f5dd1f4..def0b5215e5 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25702.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25702.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25702", "sourceIdentifier": "psirt@esri.com", "published": "2024-10-04T18:15:06.593", - "lastModified": "2024-10-07T17:48:28.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:03:33.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "psirt@esri.com", "type": "Secondary", @@ -51,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.8.1", + "versionEndIncluding": "11.1", + "matchCriteriaId": "52CEC629-7368-42D1-9107-AC3937B6DB02" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2024-update-2-released/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35584.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35584.json index 8ae847a992c..c8fdac7e1f0 100644 --- a/CVE-2024/CVE-2024-355xx/CVE-2024-35584.json +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35584.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35584", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-15T19:15:16.957", - "lastModified": "2024-10-16T17:15:16.153", + "lastModified": "2024-10-16T20:35:10.897", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Ajax.php, ForWindow.php, ForExport.php, Modules.php, functions/HackingLogFnc.php en OpenSis Community Edition 9.1, 8.0 y posiblemente versiones anteriores. Es posible que un usuario autenticado realice una inyecci\u00f3n SQL debido a la falta de desinfecci\u00f3n. La aplicaci\u00f3n toma un valor arbitrario del encabezado \"X-Forwarded-For\" y lo agrega directamente a una declaraci\u00f3n SQL INSERT, lo que genera una inyecci\u00f3n SQL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "http://opensis.com", diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41997.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41997.json index 8a2862b953e..467e33a65bc 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41997.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41997.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41997", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-14T16:15:03.640", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-16T20:35:12.430", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en la versi\u00f3n de Warp Terminal anterior a 2024.07.18 (v0.2024.07.16.08.02). Existe una vulnerabilidad de inyecci\u00f3n de comandos en la funcionalidad de integraci\u00f3n de Docker. Un atacante puede crear un hiperv\u00ednculo especialmente manipulado utilizando la intenci\u00f3n `warp://action/docker/open_subshell` que, cuando la v\u00edctima hace clic en \u00e9l, da como resultado la ejecuci\u00f3n del comando en la m\u00e1quina de la v\u00edctima." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://docs.warp.dev/features/integrations-and-plugins#docker", diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42497.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42497.json index 1fce3577786..ce8f58888c9 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42497.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42497.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42497", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-08-22T16:15:09.330", - "lastModified": "2024-08-23T16:18:28.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:05:09.183", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + }, { "source": "responsibledisclosure@mattermost.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "responsibledisclosure@mattermost.com", "type": "Secondary", @@ -51,10 +81,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.5.0", + "versionEndExcluding": "9.5.8", + "matchCriteriaId": "32EE0958-90BA-4026-9C64-1823B86F341D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.8.0", + "versionEndExcluding": "9.8.3", + "matchCriteriaId": "A37536AB-52C7-4670-AA72-86CD7819CD22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.9.0", + "versionEndExcluding": "9.9.2", + "matchCriteriaId": "4C9BCD18-4646-4440-A826-C5B9C79E9BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost_server:9.10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B43DB6F9-1C15-45DB-A5E7-E46F4162436B" + } + ] + } + ] + } + ], "references": [ { "url": "https://mattermost.com/security-updates", - "source": "responsibledisclosure@mattermost.com" + "source": "responsibledisclosure@mattermost.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43481.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43481.json index fcc945e3b29..369f07754e7 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43481.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43481.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43481", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:10.147", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:34:19.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:power_bi_report_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0.1116.121", + "matchCriteriaId": "38F60399-DB2D-46B1-811C-FFF3505EA324" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43481", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43528.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43528.json index 128c8365ee0..aed97d82e7b 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43528.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43528.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43528", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:16.810", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:47:05.543", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,140 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "EE205A52-173D-44F2-AAD0-A45F5FF4D603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "8ED2CAD8-D2E2-4AF5-874A-2938D3C3EA0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "D13B5EE1-0F5A-4DD8-9462-18FC0D2A59EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "857DFFF9-C926-41C5-96E6-7CD3DD86FDD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "FE4A4090-29D6-4B44-9B01-858886DAD93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "41629AD7-FF9A-4C54-9FFE-800F4C1E719B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2762", + "matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1189", + "matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43528", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43529.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43529.json index a10279d1b82..c72f2cda120 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43529.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43529.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43529", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:17.027", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:48:07.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,122 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "D13B5EE1-0F5A-4DD8-9462-18FC0D2A59EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "857DFFF9-C926-41C5-96E6-7CD3DD86FDD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "FE4A4090-29D6-4B44-9B01-858886DAD93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "41629AD7-FF9A-4C54-9FFE-800F4C1E719B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2762", + "matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1189", + "matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43529", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43532.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43532.json index 12ed1144685..16ef71402b3 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43532.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43532.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43532", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:17.230", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:51:34.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,195 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20796", + "matchCriteriaId": "8D5CDF9D-43B5-411C-9627-14DECDA937BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20796", + "matchCriteriaId": "84562B34-6BC0-4DBD-B153-C8F1A065A08D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "58DB776E-E3B6-4990-8AA2-6A63FDAA84C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "4AC4CAAB-C035-4D00-8DBC-9C3CE39FBBD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "EE205A52-173D-44F2-AAD0-A45F5FF4D603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "8ED2CAD8-D2E2-4AF5-874A-2938D3C3EA0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "D13B5EE1-0F5A-4DD8-9462-18FC0D2A59EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "857DFFF9-C926-41C5-96E6-7CD3DD86FDD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "FE4A4090-29D6-4B44-9B01-858886DAD93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "41629AD7-FF9A-4C54-9FFE-800F4C1E719B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2762", + "matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1189", + "matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43532", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43533.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43533.json index 026d207c06e..29cedecc395 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43533.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43533.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43533", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:17.437", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:48:30.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,86 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "FE4A4090-29D6-4B44-9B01-858886DAD93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "41629AD7-FF9A-4C54-9FFE-800F4C1E719B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2762", + "matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.25398.1189", + "matchCriteriaId": "667C418E-FC6F-461C-B4F8-CC4E8530EA38" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43533", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43534.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43534.json index f4144e385f6..6f8ab3ee074 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43534.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43534.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43534", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:17.630", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:49:06.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,195 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20796", + "matchCriteriaId": "8D5CDF9D-43B5-411C-9627-14DECDA937BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20796", + "matchCriteriaId": "84562B34-6BC0-4DBD-B153-C8F1A065A08D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "58DB776E-E3B6-4990-8AA2-6A63FDAA84C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "4AC4CAAB-C035-4D00-8DBC-9C3CE39FBBD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "EE205A52-173D-44F2-AAD0-A45F5FF4D603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "8ED2CAD8-D2E2-4AF5-874A-2938D3C3EA0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "D13B5EE1-0F5A-4DD8-9462-18FC0D2A59EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "857DFFF9-C926-41C5-96E6-7CD3DD86FDD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "FE4A4090-29D6-4B44-9B01-858886DAD93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "41629AD7-FF9A-4C54-9FFE-800F4C1E719B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2762", + "matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1189", + "matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43534", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43535.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43535.json index 2a91515caa4..42f53cba628 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43535.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43535.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43535", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:17.830", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:50:04.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,195 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20796", + "matchCriteriaId": "8D5CDF9D-43B5-411C-9627-14DECDA937BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20796", + "matchCriteriaId": "84562B34-6BC0-4DBD-B153-C8F1A065A08D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "58DB776E-E3B6-4990-8AA2-6A63FDAA84C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "4AC4CAAB-C035-4D00-8DBC-9C3CE39FBBD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "EE205A52-173D-44F2-AAD0-A45F5FF4D603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "8ED2CAD8-D2E2-4AF5-874A-2938D3C3EA0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "D13B5EE1-0F5A-4DD8-9462-18FC0D2A59EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "857DFFF9-C926-41C5-96E6-7CD3DD86FDD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "FE4A4090-29D6-4B44-9B01-858886DAD93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "41629AD7-FF9A-4C54-9FFE-800F4C1E719B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2762", + "matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1189", + "matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43535", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43536.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43536.json index 41d4ecb778c..2b46ac14df1 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43536.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43536.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43536", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:18.030", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:50:39.247", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -51,10 +61,134 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "EE205A52-173D-44F2-AAD0-A45F5FF4D603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "8ED2CAD8-D2E2-4AF5-874A-2938D3C3EA0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "D13B5EE1-0F5A-4DD8-9462-18FC0D2A59EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "857DFFF9-C926-41C5-96E6-7CD3DD86FDD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "FE4A4090-29D6-4B44-9B01-858886DAD93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "41629AD7-FF9A-4C54-9FFE-800F4C1E719B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1189", + "matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43536", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43537.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43537.json index c4c48094493..3e707bedf38 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43537.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43537.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43537", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:18.263", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:51:05.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,10 +65,134 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "EE205A52-173D-44F2-AAD0-A45F5FF4D603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "8ED2CAD8-D2E2-4AF5-874A-2938D3C3EA0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "D13B5EE1-0F5A-4DD8-9462-18FC0D2A59EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "857DFFF9-C926-41C5-96E6-7CD3DD86FDD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "FE4A4090-29D6-4B44-9B01-858886DAD93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "41629AD7-FF9A-4C54-9FFE-800F4C1E719B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "A96AD8F2-2C5E-4446-BC52-D166EF8ECEC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "EEC9889B-04BF-40B1-A0BD-832582061565" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1189", + "matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43537", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43570.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43570.json index e66025c947a..b9b6007e188 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43570.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43570.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43570", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:24.207", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:53:41.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,195 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20796", + "matchCriteriaId": "8D5CDF9D-43B5-411C-9627-14DECDA937BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20796", + "matchCriteriaId": "84562B34-6BC0-4DBD-B153-C8F1A065A08D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "58DB776E-E3B6-4990-8AA2-6A63FDAA84C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "4AC4CAAB-C035-4D00-8DBC-9C3CE39FBBD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "EE205A52-173D-44F2-AAD0-A45F5FF4D603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "8ED2CAD8-D2E2-4AF5-874A-2938D3C3EA0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "D13B5EE1-0F5A-4DD8-9462-18FC0D2A59EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "857DFFF9-C926-41C5-96E6-7CD3DD86FDD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "FE4A4090-29D6-4B44-9B01-858886DAD93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "41629AD7-FF9A-4C54-9FFE-800F4C1E719B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2762", + "matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1189", + "matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43570", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43571.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43571.json index a4e59b172f9..2ac16f9846c 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43571.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43571.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43571", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:24.400", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:53:47.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -51,10 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43571", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43575.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43575.json index 60b97f42b07..1f35e461de6 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43575.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43575.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43575", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:25.257", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:53:59.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2762", + "matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1189", + "matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43575", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43576.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43576.json index a4c0a4d63d7..aa8ea5cc17d 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43576.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43576.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43576", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:25.450", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:54:24.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*", + "matchCriteriaId": "3259EBFE-AE2D-48B8-BE9A-E22BBDB31378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*", + "matchCriteriaId": "CD25F492-9272-4836-832C-8439EBE64CCF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:*:x64:*", + "matchCriteriaId": "C461C8D7-D6DC-47E2-BF64-0872A4D24E43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:*:x86:*", + "matchCriteriaId": "875BEC9A-6123-48A9-8B89-88AEA8422B89" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43576", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43581.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43581.json index 6915106a5e0..e821d53d437 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43581.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43581.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43581", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:25.647", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:54:44.573", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,140 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "EE205A52-173D-44F2-AAD0-A45F5FF4D603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "8ED2CAD8-D2E2-4AF5-874A-2938D3C3EA0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "D13B5EE1-0F5A-4DD8-9462-18FC0D2A59EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "857DFFF9-C926-41C5-96E6-7CD3DD86FDD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "FE4A4090-29D6-4B44-9B01-858886DAD93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "41629AD7-FF9A-4C54-9FFE-800F4C1E719B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2762", + "matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1189", + "matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43581", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43582.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43582.json index 33daf07eb14..6e5e1c45b25 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43582.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43582.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43582", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:25.850", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:35:49.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,140 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "EE205A52-173D-44F2-AAD0-A45F5FF4D603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "8ED2CAD8-D2E2-4AF5-874A-2938D3C3EA0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "D13B5EE1-0F5A-4DD8-9462-18FC0D2A59EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "857DFFF9-C926-41C5-96E6-7CD3DD86FDD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "FE4A4090-29D6-4B44-9B01-858886DAD93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "41629AD7-FF9A-4C54-9FFE-800F4C1E719B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2762", + "matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1189", + "matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43582", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43583.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43583.json index ce95d229474..086bcf77305 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43583.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43583.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43583", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:26.063", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:36:59.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,195 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20796", + "matchCriteriaId": "8D5CDF9D-43B5-411C-9627-14DECDA937BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20796", + "matchCriteriaId": "84562B34-6BC0-4DBD-B153-C8F1A065A08D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "58DB776E-E3B6-4990-8AA2-6A63FDAA84C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "4AC4CAAB-C035-4D00-8DBC-9C3CE39FBBD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "EE205A52-173D-44F2-AAD0-A45F5FF4D603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "8ED2CAD8-D2E2-4AF5-874A-2938D3C3EA0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "D13B5EE1-0F5A-4DD8-9462-18FC0D2A59EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "857DFFF9-C926-41C5-96E6-7CD3DD86FDD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "FE4A4090-29D6-4B44-9B01-858886DAD93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "41629AD7-FF9A-4C54-9FFE-800F4C1E719B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2762", + "matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1189", + "matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43583", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43584.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43584.json index 16b780a9b68..5be341689f3 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43584.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43584.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43584", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:26.283", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:38:33.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -51,10 +81,86 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "FE4A4090-29D6-4B44-9B01-858886DAD93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "41629AD7-FF9A-4C54-9FFE-800F4C1E719B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2762", + "matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1189", + "matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43584", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43585.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43585.json index af4ce1d46d4..54fbe513ef0 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43585.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43585.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43585", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:26.497", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:38:57.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,140 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "EE205A52-173D-44F2-AAD0-A45F5FF4D603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "8ED2CAD8-D2E2-4AF5-874A-2938D3C3EA0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "D13B5EE1-0F5A-4DD8-9462-18FC0D2A59EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "857DFFF9-C926-41C5-96E6-7CD3DD86FDD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "FE4A4090-29D6-4B44-9B01-858886DAD93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "41629AD7-FF9A-4C54-9FFE-800F4C1E719B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2762", + "matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1189", + "matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43585", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43590.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43590.json index ebc3ae50a94..4fbc5c45b12 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43590.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43590.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43590", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:26.913", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:44:50.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,75 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.9.67", + "matchCriteriaId": "00680F8D-9858-4706-8888-4130E4CDA76B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.9.67", + "matchCriteriaId": "1915924B-3EB6-4EF4-9DC8-31A98C858ADD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0", + "versionEndExcluding": "16.11.41", + "matchCriteriaId": "111ACA28-0E8E-4F6D-BE67-F2E0703BC33F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.6.0", + "versionEndExcluding": "17.6.20", + "matchCriteriaId": "18D2A92E-FB5F-4892-A7EF-0DBD26281248" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.8.0", + "versionEndExcluding": "17.8.15", + "matchCriteriaId": "34609790-24EF-448C-8AED-9BF831D73629" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.10.0", + "versionEndExcluding": "17.10.8", + "matchCriteriaId": "480AA116-1C38-4778-A84D-321278AEC747" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.11.0", + "versionEndExcluding": "17.11.5", + "matchCriteriaId": "AD8D6C06-D7AB-4E82-AAD6-4240603B6AC6" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43590", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43591.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43591.json index 5a5173202b2..d7a04133dd3 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43591.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43591.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43591", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:27.127", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T21:46:38.153", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:azure_cli:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.65.0", + "matchCriteriaId": "2BA89373-7E25-4632-89A1-7B1D54AB051A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:azure_service_connector:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.65.0", + "matchCriteriaId": "F2D36564-0C87-41B3-B2E8-8ADD8D7DB735" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43591", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43780.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43780.json index e590c09a639..7d0df1cfa02 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43780.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43780.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43780", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-08-22T16:15:09.897", - "lastModified": "2024-08-23T16:18:28.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:07:50.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "responsibledisclosure@mattermost.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "responsibledisclosure@mattermost.com", "type": "Secondary", @@ -51,10 +81,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.5.0", + "versionEndExcluding": "9.5.8", + "matchCriteriaId": "32EE0958-90BA-4026-9C64-1823B86F341D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.8.0", + "versionEndExcluding": "9.8.3", + "matchCriteriaId": "A37536AB-52C7-4670-AA72-86CD7819CD22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.9.0", + "versionEndExcluding": "9.9.2", + "matchCriteriaId": "4C9BCD18-4646-4440-A826-C5B9C79E9BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mattermost:mattermost_server:9.10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B43DB6F9-1C15-45DB-A5E7-E46F4162436B" + } + ] + } + ] + } + ], "references": [ { "url": "https://mattermost.com/security-updates", - "source": "responsibledisclosure@mattermost.com" + "source": "responsibledisclosure@mattermost.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44762.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44762.json new file mode 100644 index 00000000000..c5f3e16ad62 --- /dev/null +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44762.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-44762", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-16T21:15:12.680", + "lastModified": "2024-10-16T21:15:12.680", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A discrepancy in error messages for invalid login attempts in Webmin Usermin v2.100 allows attackers to enumerate valid user accounts." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://senscybersecurity.nl/cve-2024-44762-explained/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46212.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46212.json new file mode 100644 index 00000000000..1567bd8c071 --- /dev/null +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46212.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-46212", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-16T21:15:12.840", + "lastModified": "2024-10-16T21:15:12.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in the component /index.php?page=backup/export of REDAXO CMS v5.17.1 allows attackers to execute a directory traversal." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Purposex7/Vulns4Study/blob/main/REDAXO%20File%20Download%20Exploit.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46213.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46213.json new file mode 100644 index 00000000000..c8b869dd2a2 --- /dev/null +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46213.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-46213", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-16T21:15:12.947", + "lastModified": "2024-10-16T21:15:12.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "REDAXO CMS v2.11.0 was discovered to contain a remote code execution (RCE) vulnerability." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Purposex7/Vulns4Study/blob/main/REDAXO%20Cronjobs%20%20AddOns%20RCE.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46605.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46605.json index 8ad960a3a6e..4012ede10fa 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46605.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46605.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46605", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-16T17:15:17.023", - "lastModified": "2024-10-16T17:15:17.023", + "lastModified": "2024-10-16T20:35:13.927", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A cross-site scripting (XSS) vulnerability in the component /admin.php?page=album of Piwigo v14.5.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Description field." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "http://piwigo.com", diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47522.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47522.json new file mode 100644 index 00000000000..833218ff6b5 --- /dev/null +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47522.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-47522", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-16T20:15:06.083", + "lastModified": "2024-10-16T20:15:06.083", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.7, invalid ALPN in TLS/QUIC traffic when JA4 matching/logging is enabled can lead to Suricata aborting with a panic. This issue has been addressed in 7.0.7. One may disable ja4 as a workaround." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/OISF/suricata/security/advisories/GHSA-w5xv-6586-jpm7", + "source": "security-advisories@github.com" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/7267", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47836.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47836.json new file mode 100644 index 00000000000..8154313fddf --- /dev/null +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47836.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47836", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-16T20:15:06.350", + "lastModified": "2024-10-16T20:15:06.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Admidio is an open-source user management solution. Prior to version 4.3.12, an unsafe deserialization vulnerability allows any unauthenticated user to execute arbitrary code on the server. Version 4.3.12 fixes this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Admidio/admidio/security/advisories/GHSA-7c4c-749j-pfp2", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47887.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47887.json new file mode 100644 index 00000000000..83c80887dc8 --- /dev/null +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47887.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2024-47887", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-16T20:15:06.600", + "lastModified": "2024-10-16T21:15:13.053", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Action Pack is a framework for handling and responding to web requests. Starting in version 4.0.0 and prior to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, and 7.2.1.1, there is a possible ReDoS vulnerability in Action Controller's HTTP Token authentication. For applications using HTTP Token authentication via `authenticate_or_request_with_http_token` or similar, a carefully crafted header may cause header parsing to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, or 7.2.1.1 or apply the relevant patch immediately. One may choose to use Ruby 3.2 as a workaround.Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "UNREPORTED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/rails/rails/commit/56b2fc3302836405b496e196a8d5fc0195e55049", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/rails/rails/commit/7c1398854d51f9bb193fb79f226647351133d08a", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/rails/rails/commit/8e057db25bff1dc7a98e9ae72e0083825b9ac545", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/rails/rails/commit/f4dc83d8926509d0958ec21fcdbc2e7df3d32ce2", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/rails/rails/security/advisories/GHSA-vfg9-r3fq-jvx4", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47888.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47888.json new file mode 100644 index 00000000000..48d31e3ea9c --- /dev/null +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47888.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2024-47888", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-16T21:15:13.180", + "lastModified": "2024-10-16T21:15:13.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Action Text brings rich text content and editing to Rails. Starting in version 6.0.0 and prior to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, and 7.2.1.1, there is a possible ReDoS vulnerability in the `plain_text_for_blockquote_node helper` in Action Text. Carefully crafted text can cause the `plain_text_for_blockquote_node` helper to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, or 7.2.1.1 or apply the relevant patch immediately. As a workaround, users can avoid calling `plain_text_for_blockquote_node` or upgrade to Ruby 3.2. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 depends on Ruby 3.2 or greater so is unaffected." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "UNREPORTED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/rails/rails/commit/4f4312b21a6448336de7c7ab0c4d94b378def468", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/rails/rails/commit/727b0946c3cab04b825c039435eac963d4e91822", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/rails/rails/commit/ba286c0a310b7f19cf5cac2a7a4c9def5cf9882e", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/rails/rails/commit/de0df7caebd9cb238a6f10dca462dc5f8d5e98b5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/rails/rails/security/advisories/GHSA-wwhv-wxv9-rpgw", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47889.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47889.json new file mode 100644 index 00000000000..ac34f701c58 --- /dev/null +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47889.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2024-47889", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-16T21:15:13.320", + "lastModified": "2024-10-16T21:15:13.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Action Mailer is a framework for designing email service layers. Starting in version 3.0.0 and prior to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, and 7.2.1.1, there is a possible ReDoS vulnerability in the block_format helper in Action Mailer. Carefully crafted text can cause the block_format helper to take an unexpected amount of time, possibly resulting in a DoS vulnerability. All users running an affected release should either upgrade to versions 6.1.7.9, 7.0.8.5, 7.1.4.1, or 7.2.1.1 or apply the relevant patch immediately. As a workaround, users can avoid calling the `block_format` helper or upgrade to Ruby 3.2. Ruby 3.2 has mitigations for this problem, so Rails applications using Ruby 3.2 or newer are unaffected. Rails 8.0.0.beta1 requires Ruby 3.2 or greater so is unaffected." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "UNREPORTED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/rails/rails/commit/0e5694f4d32544532d2301a9b4084eacb6986e94", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/rails/rails/commit/3612e3eb3fbafed4f85e1c6ea4c7b6addbb0fdd3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/rails/rails/commit/985f1923fa62806ff676e41de67c3b4552131ab9", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/rails/rails/commit/be898cc996986decfe238341d96b2a6573b8fd2e", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/rails/rails/security/advisories/GHSA-h47h-mwp9-c6q6", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48180.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48180.json new file mode 100644 index 00000000000..436a569437d --- /dev/null +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48180.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48180", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-16T21:15:13.457", + "lastModified": "2024-10-16T21:15:13.457", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ClassCMS <=4.8 is vulnerable to file inclusion in the nowView method in/class/cms/cms.php, which can include a file uploaded to the/class/template directory to execute PHP code." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/J-0k3r/CVE-2024-48180", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48758.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48758.json new file mode 100644 index 00000000000..c3980070816 --- /dev/null +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48758.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48758", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-16T21:15:13.557", + "lastModified": "2024-10-16T21:15:13.557", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "dingfanzu CMS V1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via the addPro parameter of the component doAdminAction.php which allows a remote attacker to execute arbitrary code" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Yllxx03/CVE/blob/main/CVE-2024-48758/CVE-2024-48758.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48795.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48795.json index c39c1c280d4..4b569663459 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48795.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48795.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48795", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-14T18:15:05.717", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-16T20:35:16.150", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un problema en Creative Labs Pte Ltd com.creative.apps.xficonnect 2.00.02 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n del firmware." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.creative.apps.xficonnect/com.creative.apps.xficonnect.md", diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48918.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48918.json new file mode 100644 index 00000000000..29b9f4e3f09 --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48918.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-48918", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-16T21:15:13.650", + "lastModified": "2024-10-16T21:15:13.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "RDS Light is a simplified version of the Reflective Dialogue System (RDS), a self-reflecting AI framework. Versions prior to 1.1.0 contain a vulnerability that involves a lack of input validation within the RDS AI framework, specifically within the user input handling code in the main module (`main.py`). This leaves the framework open to injection attacks and potential memory tampering. Any user or external actor providing input to the system could exploit this vulnerability to inject malicious commands, corrupt stored data, or affect API calls. This is particularly critical for users employing RDS AI in production environments where it interacts with sensitive systems, performs dynamic memory caching, or retrieves user-specific data for analysis. Impacted areas include developers using the RDS AI system as a backend for AI-driven applications and systems running RDS AI that may be exposed to untrusted environments or receive unverified user inputs. The vulnerability has been patched in version 1.1.0 of the RDS AI framework. All user inputs are now sanitized and validated against a set of rules designed to mitigate malicious content. Users should upgrade to version 1.1.0 or higher and ensure all dependencies are updated to their latest versions. For users unable to upgrade to the patched version, a workaround can be implemented. The user implementing the workaround should implement custom validation checks for user inputs to filter out unsafe characters and patterns (e.g., SQL injection attempts, script injections) and limit or remove features that allow user input until the system can be patched." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "UNREPORTED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.1, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/RDSaiPlatforms/RDSlight/commit/7dac0e214a344447a2a8ea7414188c38c6a61a6e", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/RDSaiPlatforms/RDSlight/security/advisories/GHSA-5f6w-8mqh-hv2g", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-491xx/CVE-2024-49193.json b/CVE-2024/CVE-2024-491xx/CVE-2024-49193.json index 9a9b2313bd4..97064073215 100644 --- a/CVE-2024/CVE-2024-491xx/CVE-2024-49193.json +++ b/CVE-2024/CVE-2024-491xx/CVE-2024-49193.json @@ -2,7 +2,7 @@ "id": "CVE-2024-49193", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-12T14:15:02.753", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-16T20:35:16.380", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Zendesk anterior al 2 de julio de 2024 permite a atacantes remotos leer el historial de tickets a trav\u00e9s de suplantaci\u00f3n de correo electr\u00f3nico, porque los campos Cc se extraen de los mensajes de correo electr\u00f3nico entrantes y se utilizan para otorgar autorizaci\u00f3n adicional para la visualizaci\u00f3n de tickets, el mecanismo para detectar mensajes de correo electr\u00f3nico falsificados es insuficiente y las direcciones de correo electr\u00f3nico de soporte asociadas con tickets individuales son predecibles." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/hackermondev/68ec8ed145fcee49d2f5e2b9d2cf2e52", diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8231.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8231.json index 1d6dd2a2da9..ad87f1b97f6 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8231.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8231.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8231", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-28T02:15:04.160", - "lastModified": "2024-08-28T12:57:27.610", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T20:01:30.877", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -120,26 +150,71 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:o6_firmware:1.0.0.7\\(2054\\):*:*:*:*:*:*:*", + "matchCriteriaId": "E63C1EF6-3A8A-4465-B6E6-82C53FE1B15A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:o6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9FDBE473-E5E3-4C9E-BBEE-6EC15A6F1D2D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/AHU-IoT-vulnerable/blob/main/Tenda/web-bridge/O6V3.0/fromVirtualSet.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.275940", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.275940", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.394032", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.tenda.com.cn/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9955.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9955.json index 1fd809fa5fa..6e2cd2f2ad3 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9955.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9955.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9955", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-10-15T21:15:12.193", - "lastModified": "2024-10-16T16:38:14.557", + "lastModified": "2024-10-16T20:35:17.940", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El use-after-free en WebAuthentication en Google Chrome anterior a la versi\u00f3n 130.0.6723.58 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -26,6 +49,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9956.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9956.json index 8fad245980d..782df849a5c 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9956.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9956.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9956", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-10-15T21:15:12.267", - "lastModified": "2024-10-16T16:38:14.557", + "lastModified": "2024-10-16T20:35:18.800", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Una implementaci\u00f3n inadecuada de WebAuthentication en Google Chrome en Android anterior a la versi\u00f3n 130.0.6723.58 permiti\u00f3 que un atacante local realizara una escalada de privilegios a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_15.html", diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9957.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9957.json index d35a22bdd83..64ff5903837 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9957.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9957.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9957", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-10-15T21:15:12.320", - "lastModified": "2024-10-16T16:38:14.557", + "lastModified": "2024-10-16T20:35:19.063", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El use-after-free en la interfaz de usuario de Google Chrome en iOS anterior a la versi\u00f3n 130.0.6723.58 permiti\u00f3 que un atacante remoto convenciera a un usuario para que realizara gestos espec\u00edficos de la interfaz de usuario para explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -26,6 +49,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9959.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9959.json index e04e54665b2..5c5a8e4f73f 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9959.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9959.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9959", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-10-15T21:15:12.447", - "lastModified": "2024-10-16T16:38:14.557", + "lastModified": "2024-10-16T20:35:20.050", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El use-after-free en DevTools en Google Chrome anterior a la versi\u00f3n 130.0.6723.58 permiti\u00f3 que un atacante remoto que hab\u00eda comprometido el proceso de renderizaci\u00f3n potencialmente explotara la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una extensi\u00f3n de Chrome manipulada. (Gravedad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -26,6 +49,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9960.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9960.json index d90de08a06c..b12de141997 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9960.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9960.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9960", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-10-15T21:15:12.520", - "lastModified": "2024-10-16T16:38:14.557", + "lastModified": "2024-10-16T20:35:20.890", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El use-after-free en Dawn en Google Chrome anterior a la versi\u00f3n 130.0.6723.58 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -26,6 +49,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9961.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9961.json index 39da999f1ae..7db6f905844 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9961.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9961.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9961", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-10-15T21:15:12.597", - "lastModified": "2024-10-16T16:38:14.557", + "lastModified": "2024-10-16T20:35:21.773", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El use-after-free en ParcelTracking en Google Chrome en iOS anterior a la versi\u00f3n 130.0.6723.58 permiti\u00f3 que un atacante remoto convenciera a un usuario para que realizara gestos espec\u00edficos de la interfaz de usuario para explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: media)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -26,6 +49,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "references": [ diff --git a/README.md b/README.md index 3307087e866..4420de84857 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-16T20:00:19.288182+00:00 +2024-10-16T22:00:21.041902+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-16T19:58:41.543000+00:00 +2024-10-16T21:54:44.573000+00:00 ``` ### Last Data Feed Release @@ -33,50 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -265899 +265910 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `11` -- [CVE-2024-41128](CVE-2024/CVE-2024-411xx/CVE-2024-41128.json) (`2024-10-16T18:15:06.070`) -- [CVE-2024-45795](CVE-2024/CVE-2024-457xx/CVE-2024-45795.json) (`2024-10-16T19:15:26.660`) -- [CVE-2024-45796](CVE-2024/CVE-2024-457xx/CVE-2024-45796.json) (`2024-10-16T19:15:26.923`) -- [CVE-2024-45797](CVE-2024/CVE-2024-457xx/CVE-2024-45797.json) (`2024-10-16T19:15:27.177`) -- [CVE-2024-47187](CVE-2024/CVE-2024-471xx/CVE-2024-47187.json) (`2024-10-16T19:15:27.407`) -- [CVE-2024-47188](CVE-2024/CVE-2024-471xx/CVE-2024-47188.json) (`2024-10-16T19:15:27.670`) +- [CVE-2024-44762](CVE-2024/CVE-2024-447xx/CVE-2024-44762.json) (`2024-10-16T21:15:12.680`) +- [CVE-2024-46212](CVE-2024/CVE-2024-462xx/CVE-2024-46212.json) (`2024-10-16T21:15:12.840`) +- [CVE-2024-46213](CVE-2024/CVE-2024-462xx/CVE-2024-46213.json) (`2024-10-16T21:15:12.947`) +- [CVE-2024-47522](CVE-2024/CVE-2024-475xx/CVE-2024-47522.json) (`2024-10-16T20:15:06.083`) +- [CVE-2024-47836](CVE-2024/CVE-2024-478xx/CVE-2024-47836.json) (`2024-10-16T20:15:06.350`) +- [CVE-2024-47887](CVE-2024/CVE-2024-478xx/CVE-2024-47887.json) (`2024-10-16T20:15:06.600`) +- [CVE-2024-47888](CVE-2024/CVE-2024-478xx/CVE-2024-47888.json) (`2024-10-16T21:15:13.180`) +- [CVE-2024-47889](CVE-2024/CVE-2024-478xx/CVE-2024-47889.json) (`2024-10-16T21:15:13.320`) +- [CVE-2024-48180](CVE-2024/CVE-2024-481xx/CVE-2024-48180.json) (`2024-10-16T21:15:13.457`) +- [CVE-2024-48758](CVE-2024/CVE-2024-487xx/CVE-2024-48758.json) (`2024-10-16T21:15:13.557`) +- [CVE-2024-48918](CVE-2024/CVE-2024-489xx/CVE-2024-48918.json) (`2024-10-16T21:15:13.650`) ### CVEs modified in the last Commit -Recently modified CVEs: `44` - -- [CVE-2024-38399](CVE-2024/CVE-2024-383xx/CVE-2024-38399.json) (`2024-10-16T18:17:09.577`) -- [CVE-2024-41311](CVE-2024/CVE-2024-413xx/CVE-2024-41311.json) (`2024-10-16T19:35:06.653`) -- [CVE-2024-43365](CVE-2024/CVE-2024-433xx/CVE-2024-43365.json) (`2024-10-16T19:15:56.007`) -- [CVE-2024-43686](CVE-2024/CVE-2024-436xx/CVE-2024-43686.json) (`2024-10-16T19:20:57.230`) -- [CVE-2024-43687](CVE-2024/CVE-2024-436xx/CVE-2024-43687.json) (`2024-10-16T19:28:09.177`) -- [CVE-2024-44729](CVE-2024/CVE-2024-447xx/CVE-2024-44729.json) (`2024-10-16T19:35:07.543`) -- [CVE-2024-44730](CVE-2024/CVE-2024-447xx/CVE-2024-44730.json) (`2024-10-16T19:35:08.430`) -- [CVE-2024-44734](CVE-2024/CVE-2024-447xx/CVE-2024-44734.json) (`2024-10-16T19:35:09.310`) -- [CVE-2024-44775](CVE-2024/CVE-2024-447xx/CVE-2024-44775.json) (`2024-10-16T19:35:10.167`) -- [CVE-2024-45290](CVE-2024/CVE-2024-452xx/CVE-2024-45290.json) (`2024-10-16T19:54:53.397`) -- [CVE-2024-45291](CVE-2024/CVE-2024-452xx/CVE-2024-45291.json) (`2024-10-16T19:09:52.697`) -- [CVE-2024-46532](CVE-2024/CVE-2024-465xx/CVE-2024-46532.json) (`2024-10-16T18:35:05.480`) -- [CVE-2024-47194](CVE-2024/CVE-2024-471xx/CVE-2024-47194.json) (`2024-10-16T18:15:04.043`) -- [CVE-2024-47195](CVE-2024/CVE-2024-471xx/CVE-2024-47195.json) (`2024-10-16T18:11:29.990`) -- [CVE-2024-47196](CVE-2024/CVE-2024-471xx/CVE-2024-47196.json) (`2024-10-16T18:07:38.850`) -- [CVE-2024-48411](CVE-2024/CVE-2024-484xx/CVE-2024-48411.json) (`2024-10-16T19:35:11.290`) -- [CVE-2024-48744](CVE-2024/CVE-2024-487xx/CVE-2024-48744.json) (`2024-10-16T18:35:07.013`) -- [CVE-2024-48781](CVE-2024/CVE-2024-487xx/CVE-2024-48781.json) (`2024-10-16T19:35:12.160`) -- [CVE-2024-48782](CVE-2024/CVE-2024-487xx/CVE-2024-48782.json) (`2024-10-16T19:35:13.023`) -- [CVE-2024-48790](CVE-2024/CVE-2024-487xx/CVE-2024-48790.json) (`2024-10-16T19:35:13.893`) -- [CVE-2024-8422](CVE-2024/CVE-2024-84xx/CVE-2024-8422.json) (`2024-10-16T18:00:10.507`) -- [CVE-2024-8925](CVE-2024/CVE-2024-89xx/CVE-2024-8925.json) (`2024-10-16T18:53:39.957`) -- [CVE-2024-8926](CVE-2024/CVE-2024-89xx/CVE-2024-8926.json) (`2024-10-16T18:35:59.500`) -- [CVE-2024-8927](CVE-2024/CVE-2024-89xx/CVE-2024-8927.json) (`2024-10-16T18:28:34.573`) -- [CVE-2024-9026](CVE-2024/CVE-2024-90xx/CVE-2024-9026.json) (`2024-10-16T18:30:37.133`) +Recently modified CVEs: `86` + +- [CVE-2024-43535](CVE-2024/CVE-2024-435xx/CVE-2024-43535.json) (`2024-10-16T21:50:04.210`) +- [CVE-2024-43536](CVE-2024/CVE-2024-435xx/CVE-2024-43536.json) (`2024-10-16T21:50:39.247`) +- [CVE-2024-43537](CVE-2024/CVE-2024-435xx/CVE-2024-43537.json) (`2024-10-16T21:51:05.800`) +- [CVE-2024-43570](CVE-2024/CVE-2024-435xx/CVE-2024-43570.json) (`2024-10-16T21:53:41.207`) +- [CVE-2024-43571](CVE-2024/CVE-2024-435xx/CVE-2024-43571.json) (`2024-10-16T21:53:47.887`) +- [CVE-2024-43575](CVE-2024/CVE-2024-435xx/CVE-2024-43575.json) (`2024-10-16T21:53:59.407`) +- [CVE-2024-43576](CVE-2024/CVE-2024-435xx/CVE-2024-43576.json) (`2024-10-16T21:54:24.047`) +- [CVE-2024-43581](CVE-2024/CVE-2024-435xx/CVE-2024-43581.json) (`2024-10-16T21:54:44.573`) +- [CVE-2024-43582](CVE-2024/CVE-2024-435xx/CVE-2024-43582.json) (`2024-10-16T21:35:49.927`) +- [CVE-2024-43583](CVE-2024/CVE-2024-435xx/CVE-2024-43583.json) (`2024-10-16T21:36:59.847`) +- [CVE-2024-43584](CVE-2024/CVE-2024-435xx/CVE-2024-43584.json) (`2024-10-16T21:38:33.867`) +- [CVE-2024-43585](CVE-2024/CVE-2024-435xx/CVE-2024-43585.json) (`2024-10-16T21:38:57.467`) +- [CVE-2024-43590](CVE-2024/CVE-2024-435xx/CVE-2024-43590.json) (`2024-10-16T21:44:50.927`) +- [CVE-2024-43591](CVE-2024/CVE-2024-435xx/CVE-2024-43591.json) (`2024-10-16T21:46:38.153`) +- [CVE-2024-43780](CVE-2024/CVE-2024-437xx/CVE-2024-43780.json) (`2024-10-16T20:07:50.637`) +- [CVE-2024-46605](CVE-2024/CVE-2024-466xx/CVE-2024-46605.json) (`2024-10-16T20:35:13.927`) +- [CVE-2024-48795](CVE-2024/CVE-2024-487xx/CVE-2024-48795.json) (`2024-10-16T20:35:16.150`) +- [CVE-2024-49193](CVE-2024/CVE-2024-491xx/CVE-2024-49193.json) (`2024-10-16T20:35:16.380`) +- [CVE-2024-8231](CVE-2024/CVE-2024-82xx/CVE-2024-8231.json) (`2024-10-16T20:01:30.877`) +- [CVE-2024-9955](CVE-2024/CVE-2024-99xx/CVE-2024-9955.json) (`2024-10-16T20:35:17.940`) +- [CVE-2024-9956](CVE-2024/CVE-2024-99xx/CVE-2024-9956.json) (`2024-10-16T20:35:18.800`) +- [CVE-2024-9957](CVE-2024/CVE-2024-99xx/CVE-2024-9957.json) (`2024-10-16T20:35:19.063`) +- [CVE-2024-9959](CVE-2024/CVE-2024-99xx/CVE-2024-9959.json) (`2024-10-16T20:35:20.050`) +- [CVE-2024-9960](CVE-2024/CVE-2024-99xx/CVE-2024-9960.json) (`2024-10-16T20:35:20.890`) +- [CVE-2024-9961](CVE-2024/CVE-2024-99xx/CVE-2024-9961.json) (`2024-10-16T20:35:21.773`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 45d78f74868..4c51fe8fa7a 100644 --- a/_state.csv +++ b/_state.csv @@ -215111,7 +215111,7 @@ CVE-2023-20813,0,0,c2ea6a3a70781d7dbccf1526412ecec6c8f2b8be302634f666f379539f370 CVE-2023-20814,0,0,cf497785cd6df0f37f4f6f206453796f6fe2be8b9b8a350d94f3bb8390d42416,2023-08-09T17:49:54.570000 CVE-2023-20815,0,0,8cc3f7cc80285a6d4675688af0e2947eb6247e1768f3a1cba4030e1fe2239aa4,2023-08-09T17:50:02.677000 CVE-2023-20816,0,0,b5ebd1fdc3ab6ed7a182a78bde921026151951d7c3c6446da9b6c53cc30f6793,2023-08-09T17:49:47.037000 -CVE-2023-20817,0,0,f0b94745e685b77ed63a36db9c117b6b39f9cfcbdabff9d9c87b3a2313980c93,2023-08-09T17:49:40.027000 +CVE-2023-20817,0,1,58f94f12dbbd27ecff4c9c45f02bb5c66ca030778a1e43a6c1041583e7476d0a,2024-10-16T21:35:01.640000 CVE-2023-20818,0,0,45ae32b47377e91ea351a73468b41994cd1d3b4ec51c18c8865d863ed741c606,2023-08-09T17:49:30.607000 CVE-2023-20819,0,0,c056b87b2ebed256b5107aaf5ce311d220de95b3b3db7b11c4effe7a4eed0352,2024-09-21T16:35:01.573000 CVE-2023-2082,0,0,24dcd898b1f3567259f4f6aad9d57c28cbb421cc1896ebbe2df775b7cf6101c6,2023-11-07T04:11:54.467000 @@ -223833,7 +223833,7 @@ CVE-2023-31489,0,0,f40bc274026e723eed248e3cd860f7554fd9baa312c8fe8261f9c3be784f4 CVE-2023-3149,0,0,bce316cd67c6ca931761748c29c72ae1ed2a557e141934a592bd29b69b981165,2024-05-17T02:27:18.640000 CVE-2023-31490,0,0,61fc25171181c0b69b76c07a3b7fdca62b63b6ce9aad36174db3d627ff1c84da,2023-12-21T01:50:03.113000 CVE-2023-31492,0,0,aece3a5fd4b316e271fc416801bc45ac5f2f92f655c5953e6b1be0a0d7af71c7,2024-02-13T23:15:08.187000 -CVE-2023-31493,0,1,90b02b0ed0544e8351586be82ca30a81ee5dd3fbb630475a3e18968522527017,2024-10-16T19:35:04.040000 +CVE-2023-31493,0,0,90b02b0ed0544e8351586be82ca30a81ee5dd3fbb630475a3e18968522527017,2024-10-16T19:35:04.040000 CVE-2023-31497,0,0,469b822be93366c470e1092fa5b7a7b3c6c1d7dffd5f922d0d27c9589d89b215,2023-05-22T18:09:55.340000 CVE-2023-31498,0,0,79b97ab647acce1195b8c92d9300189b77d878b751786cd4718d0dffc2c5d62c,2023-11-14T16:22:52.857000 CVE-2023-3150,0,0,8e4c269722e7141cdbf11157021378ef98797bff0ff1403f0acd9a50cba02ba5,2024-05-17T02:27:18.753000 @@ -231430,7 +231430,7 @@ CVE-2023-41357,0,0,00f65bb07fa6c7ae5be3907535577d6b693e38bd111110d70c524621331a2 CVE-2023-41358,0,0,b12e3630124fc2762fcaaf231aeb49d7a9b7b5cda2a1c06c304357c3eb7a006c,2023-12-22T21:18:08.167000 CVE-2023-41359,0,0,b38c88f7822708db827556bc6fbd8ea6cddbe63fa861dd7aef6499d1ba3a5a20,2023-12-22T21:18:17.247000 CVE-2023-4136,0,0,a0a74dc1900425558821ead72a568bce5103a2c833c5e0f4f148a971cabe8aa8,2023-08-23T16:15:10.050000 -CVE-2023-41360,0,0,fb2b39065c6c8a72025a6a7213ca1fbbe32ab4acd3b58caa82190f9dc911d324,2023-12-22T21:18:13.257000 +CVE-2023-41360,0,1,04a86818176980de37ff0f40d25d6e9739dbeeb6af25e7921aa7a91ec1fa71ee,2024-10-16T20:35:05.873000 CVE-2023-41361,0,0,783c845a62cdb6e9f9d3671156df5fd1701862b26b5da0c1f249a8b754358342,2023-10-26T19:52:51.877000 CVE-2023-41362,0,0,a80b89806e5b5b0963051c2cb5d13b3942ef0964d481f93a0e8122196efa35c3,2023-09-11T15:16:03.410000 CVE-2023-41363,0,0,0e9e2327ec7d2f8627869d8b04e33002fea2d70fbebafbc5162eac7486748456,2023-08-31T19:07:05.343000 @@ -232324,7 +232324,7 @@ CVE-2023-42690,0,0,432c1be0c182f4542388677031f7d60fb082856542ba701f6bf0af2ad33b2 CVE-2023-42691,0,0,5fadd13949c3361c5989128502d35c389f926394790fd66a30bd8477d11dde8a,2023-12-06T22:16:16.917000 CVE-2023-42692,0,0,c87119d9c59dbfb512f4b3a6f9deae9ee7717b9272997d98f8a3ddedee3b5167,2023-12-06T22:16:04.247000 CVE-2023-42693,0,0,5f8398e9c06a5d4e98adb767a4a5c29f68c70ea9afc29fd8fc53ac9efcf62710,2023-12-06T22:15:44.227000 -CVE-2023-42694,0,0,0a334b3143d41753ab784b02d210c11408def100058f642420399249bec54f70,2023-12-06T22:15:35.147000 +CVE-2023-42694,0,1,b1f56b1bddbc37f189ccf6e5dd9208a12c8a8cb97755ffaa65303c4c7910b02f,2024-10-16T20:35:06.813000 CVE-2023-42695,0,0,85fc12c142107c09b70708ea324f5136440ab42f6b5e44329bba4781d52f83fc,2023-12-06T22:15:23.793000 CVE-2023-42696,0,0,2541265e8addd1fafdea3300b8f639f9fc8599cfc8db59564713f9920de798fb,2023-12-07T16:02:10.430000 CVE-2023-42697,0,0,ce466b689245eac9969dfabb6930a3e18caa110eb57c9f66106fb8f2eabc46e3,2023-12-07T14:48:37.540000 @@ -234279,7 +234279,7 @@ CVE-2023-45689,0,0,9a5b9a98db22284970de2ff416e2cd1edad1e21d097d8ace4303b84796a44 CVE-2023-4569,0,0,13e9ae3e93013b9e6c636e661e6dff661ec6fadcb8975b604839831e7844dbef,2023-11-07T04:22:45.773000 CVE-2023-45690,0,0,d104c837f03f326a5dc9340d00f93c1f83708421d3862c6a386c41589f66c844,2023-10-24T16:45:38.280000 CVE-2023-45696,0,0,49a194b4f2d268a3c97667efd0856c7e293e3b4f2e3a96ae5ba558bf875f66ff,2024-09-05T13:23:21.547000 -CVE-2023-45698,0,1,03f75cc96e1b4cf7e1aa69c7ea6032cde5b9c8dedaaffb4142acbb9d8b60bdab,2024-10-16T19:58:41.543000 +CVE-2023-45698,0,0,03f75cc96e1b4cf7e1aa69c7ea6032cde5b9c8dedaaffb4142acbb9d8b60bdab,2024-10-16T19:58:41.543000 CVE-2023-4570,0,0,f2557c82c9282970bda5ed09f8a2708fcb8bbd71be459586ce4b5914e7684317,2023-10-12T18:38:41.030000 CVE-2023-45700,0,0,99127c98a0922d674dde3a3491990e29c4b23d2db9ad2fd841961a3cb902503e,2024-01-02T16:47:07.460000 CVE-2023-45701,0,0,26c6fbc11c3dcab3e67a2bcdc37fc362d82a66e1003da348e08ed46528afab2b,2024-01-04T20:25:30.933000 @@ -235580,7 +235580,7 @@ CVE-2023-47459,0,0,7e45b8dbba72569a5cb67ce1a8e0b7467604a9784f2ff9ca32c5218334a2a CVE-2023-4746,0,0,26013a430c4d4a7078676100edab0baa509c5bca37f8938011599d579aca0e9e,2024-05-17T02:31:46.187000 CVE-2023-47460,0,0,e55aea94d8116bc98c95a7d957716d5404a4e384e5f63d8be0d93164511b2e93,2024-01-22T19:37:30.577000 CVE-2023-47462,0,0,81881187c5159674db85691d02b9ed5d58cdeb909d7086f1e3d4a104d1243849,2023-12-05T14:26:20.953000 -CVE-2023-47463,0,0,55d70746402d8adfa26f5165e33f5f9becf39baff7bc0e4d5c233cdcf450252b,2023-12-05T18:24:52.707000 +CVE-2023-47463,0,1,ebb9eae61224db464366f96dc3156cae2cc0dfc68625b1c7f9e20ee008560700,2024-10-16T20:35:07.780000 CVE-2023-47464,0,0,c8affb5c2963e7878d55a46571e0918e511f12fbb2eb62dc16f54d4937704b28,2023-12-05T18:23:35.077000 CVE-2023-47465,0,0,7175bca4286fb9747417e89be443c166d9b65de57eb2dca6191f8c4673e16763,2023-12-12T22:35:12.383000 CVE-2023-47467,0,0,c39462250ba1cffd03a729be6fd66236c7e097456d36f1b7303bd1444f5a34d8,2023-11-30T20:44:34.303000 @@ -238988,7 +238988,7 @@ CVE-2023-52424,0,0,dd00ce5bd5f0127edc0f085308e3c4c575aeaa945754c66a530759a6f3d06 CVE-2023-52425,0,0,3cdfdc314fa83fb5af809d9132a0994bcdd918d186b1c4985a8cb6aee50ffac5,2024-08-26T20:35:10.427000 CVE-2023-52426,0,0,5acfd7432cf1ea71a30546485e308068720bd35fb8a9c9072c82d0c9714337d5,2024-03-07T17:15:11.893000 CVE-2023-52427,0,0,0a54450b6cf413ae3e0cd14ca73a4997d322ba669f6ff28b106bdd9dadc652f1,2024-08-02T23:16:18.710000 -CVE-2023-52428,0,0,780a20df5925e099c50682efa6b9b5b9a7581e992635addf027a9478a9c99948,2024-02-11T22:29:15.837000 +CVE-2023-52428,0,1,0a04486874aac3629974d1ca44929c76c47902d8c17eb2cde1efd5de3b4903cd,2024-10-16T20:01:01.777000 CVE-2023-52429,0,0,bb71f6867b546918a32b40939aad4a54664a6e064966565e92e979c5b5823dd4,2024-06-27T12:15:13.797000 CVE-2023-5243,0,0,e49838102a5721a273506f040a2a95bdeca1c43c3e414141d5a1a29f3ab700c3,2023-11-08T18:40:41.847000 CVE-2023-52430,0,0,9b119fede2bb0d45c16cf06aac5c3bb465a163e763f0ae820658b0f4e7b632b3,2024-10-16T13:11:53.423000 @@ -242209,9 +242209,9 @@ CVE-2024-0997,0,0,40cbe7d07647cf304a8bc3bc11787b58a8f50582e3e8b65316a7ae7fa59c2b CVE-2024-0998,0,0,f7933578d5dbeb3f77563ebf1f5420d4cf36180b38c1c7cf760eedcdac974d39,2024-05-17T02:35:08.490000 CVE-2024-0999,0,0,84034800a287889c8e66f3ba01c1d930a06538aadfe1b375cfd8893390aed6f7,2024-05-17T02:35:08.593000 CVE-2024-1000,0,0,60c836cbd4d96144c97b06caa16452d33dc82172b5cc2c653a7406010f53b5df,2024-05-17T02:35:08.790000 -CVE-2024-10004,0,0,426f3a4790c39e62a5ecac67f72c8307ca784a47e9a91aea8d30bb6f01ec1d34,2024-10-16T16:38:14.557000 +CVE-2024-10004,0,1,2b01ad1fe33b0387cc6ecf8ca605118100ba1eac830a494972582a4b13530ed3,2024-10-16T20:35:08.850000 CVE-2024-1001,0,0,481a263280d7671352a0e81cdb22876e1831937aba78d275dcb085f339a7c9b0,2024-05-17T02:35:08.903000 -CVE-2024-10018,0,1,2aa14605c63d984e9b2fdfd4b3872cd3e6ce36a0ab239799435cd07454bf385f,2024-10-16T18:35:03.460000 +CVE-2024-10018,0,0,2aa14605c63d984e9b2fdfd4b3872cd3e6ce36a0ab239799435cd07454bf385f,2024-10-16T18:35:03.460000 CVE-2024-1002,0,0,da9ff0a1d838ebe2cbec1ae9defbaf7310d6b3493363163f0389be14aee69800,2024-05-17T02:35:09.013000 CVE-2024-10021,0,0,a6b17344f3b8ed69b69af1e4c8072f0ea15408a02fd5537c80b963512d6978ea,2024-10-16T16:38:14.557000 CVE-2024-10022,0,0,0168cd514401d1be0e849bc27c7e2e366e37ce97ce04620f3f8d342cf2b43281,2024-10-16T16:38:14.557000 @@ -244078,51 +244078,51 @@ CVE-2024-21192,0,0,d93baca94099d342ec1b0d3c924bd4baff1a32a1142d3db36ef3e4b7352d4 CVE-2024-21193,0,0,a555684f5c880f118da1410b59701b5fcf0008ade305164d727bd0a741669d5b,2024-10-16T16:38:43.170000 CVE-2024-21194,0,0,c7d2722409f5c1d0676690eb7305798b787a3e17662bfed66355da75a539780d,2024-10-16T16:38:43.170000 CVE-2024-21195,0,0,48715d2190953b8dbcb48357a7db4b74d9666952220df9aeda714fdc57577988,2024-10-16T16:38:43.170000 -CVE-2024-21196,0,0,087c2f9bdc6e84dd55585564d375a1e70b808771d73619f15b0a243b05d11238,2024-10-16T16:38:43.170000 -CVE-2024-21197,0,0,9980fced962ab1adda73e9edb77f80ebe6004aa171e29668bc653ecd5924d4e8,2024-10-16T16:38:43.170000 -CVE-2024-21198,0,0,d2ab1b214e1182305e3f6e9370e59e7ce0cb07c1c58c1a4f2acec9374746a654,2024-10-16T16:38:43.170000 -CVE-2024-21199,0,0,bf13574eb7682161eedb05919d5cce4dfbca56bc0305275e574c3105330f3908,2024-10-16T16:38:43.170000 +CVE-2024-21196,0,1,3696b58988996dc939f29a93c60941d733e88241cfd322cb609247ad02fc17a3,2024-10-16T20:49:16.167000 +CVE-2024-21197,0,1,70adcf27af8c5288774490ed1ea69c441a02c4bcafa925b18c196f1d0c45845b,2024-10-16T20:48:51.590000 +CVE-2024-21198,0,1,fe14074b83aba568e4523e28df21ded4dfc29f3a8da3153efcf108130257ae0b,2024-10-16T20:48:23.717000 +CVE-2024-21199,0,1,4b25b94e75665f46b44aa4896f5d9a296c3a1965d62aaad507ed8fb5e5d374cc,2024-10-16T20:48:06.233000 CVE-2024-2120,0,0,6b5464bebd26aefe39617ee608f8869264c47eca6efc9fe45d62e273fef6e20b,2024-03-27T12:29:30.307000 -CVE-2024-21200,0,0,5855c2089a0504f5aae3c1743bcfdad1d0832ef1fdb7f38cb8826fd4606bf0b1,2024-10-16T16:38:43.170000 -CVE-2024-21201,0,0,f9021f4fe4be21cc6321b76686f0ab8a0795c21c45b14a3c022c738a3e2ba216,2024-10-16T16:38:43.170000 +CVE-2024-21200,0,1,efab48fd342da84d3fb0c03b50cb3a574019285000d7db7c8d62dd9dd400f37b,2024-10-16T20:47:34.210000 +CVE-2024-21201,0,1,b849e22f9ffd1216a749c1634aa4c7ef9412b5c9954fb074eafb59095a77ac2a,2024-10-16T20:46:55.087000 CVE-2024-21202,0,0,f8f5108b83591d9371e7c813ffbfc53018c30365467cb4203bd1177802a1f248,2024-10-16T16:38:43.170000 -CVE-2024-21203,0,0,89da62487da64300095d074040b97a52d511881730ceefde68cc2e4cecb90ff4,2024-10-16T16:38:43.170000 +CVE-2024-21203,0,1,485891ac42bb6471c272b9a68a958e530ac5119e2c4569ec98012fb7f6b3a688,2024-10-16T20:46:35.560000 CVE-2024-21204,0,0,1cacb3dcd99f5368519a046d220cbfe3e46979a9dbd90e00ea14ed1d1a9d932d,2024-10-16T16:38:43.170000 CVE-2024-21205,0,0,ec15adfa9d5a9979d5a131273b5b03f853fd6d8bb593e43b897a822b83013155,2024-10-16T16:38:43.170000 CVE-2024-21206,0,0,12044bca635d46dc06bba67023cc66e6ec5c6a8ca2061f8529322ff296b183ae,2024-10-16T16:38:43.170000 -CVE-2024-21207,0,0,6620c9f98e798ac3d52ae3855f5d8e09105a05613d52c759978b246553017591,2024-10-16T16:38:43.170000 +CVE-2024-21207,0,1,441e7ee527d2b149c57c3cf29122fa50593225a02ed0e8e1aa929ce2ccb3cd06,2024-10-16T20:45:17.507000 CVE-2024-21208,0,0,67bc4a246b410a4637b4d04517d4df5890fa5369a9ab7ac3a1b1f9f2bd37ca66,2024-10-16T16:38:43.170000 -CVE-2024-21209,0,0,62c0ae14c90383a731f7168d36290cf10bb361059f0c45353e443b23e67384d8,2024-10-16T16:38:43.170000 +CVE-2024-21209,0,1,09a10e210e54f395a42456e8f1afac7dc21db5e4c2e5e9d4c0f4a12f07e14076,2024-10-16T20:44:58.323000 CVE-2024-2121,0,0,2cfb1a723dc54cb3d26c2160d4679da8744349bbf9431cfc104ee6efa0d850da,2024-03-27T12:29:30.307000 CVE-2024-21210,0,0,a4cdc2dd66c61fd543ca03dfb8ec0a55173e93be90bac59938a3a7fbec016519,2024-10-16T16:38:43.170000 CVE-2024-21211,0,0,0fc12f59af0c7ed49deb3ad65e42d5e4770a5c08baa8ee780185cfbce72a319a,2024-10-16T16:38:43.170000 -CVE-2024-21212,0,0,832a07377bf2547cadab3f7ec7bc0883f5c306359f49e3aa7fbee581daa30bd7,2024-10-16T16:38:43.170000 -CVE-2024-21213,0,0,c8ee79f026b5fbc6c5bae52c2ec2b4b39f07693fbae29bdca9828d2e93b553f0,2024-10-16T16:38:43.170000 +CVE-2024-21212,0,1,19f687ae812c0e698f3f0e8daad4c738a294b64f047163a3f6c2379dc26312f5,2024-10-16T20:44:19.233000 +CVE-2024-21213,0,1,42d1671ecea98024063bd01928cc7c2037a7c665f9b2aa465a872189431111e7,2024-10-16T20:43:51.853000 CVE-2024-21214,0,0,4ad144ddf26517d5d9686e4022ca74ee3dc38767088706947ad5068061cdd57a,2024-10-16T16:38:43.170000 CVE-2024-21215,0,0,492ed6bc2a5eaf26b34b89e801a315008331a92f0ab2ba4befa1eed9d12e0863,2024-10-16T16:38:43.170000 CVE-2024-21216,0,0,9ba3f3cd3bceba073981b6b84d9661253e9ddc2869c9d858a2947a8d59ce7e02,2024-10-16T16:38:43.170000 CVE-2024-21217,0,0,e95e813d705e9975ded57011b49dec627560aa1d8d743244a0f9ed66fbec1393,2024-10-16T16:38:43.170000 -CVE-2024-21218,0,0,75d44a350b663ea4d7df0c45e8adc3bbe63921b2ce954e72fbd7ad1a312ce359,2024-10-16T16:38:43.170000 -CVE-2024-21219,0,0,82110677b640d84928edd18c48a4f6cb9f1e7e0329e1c076f1093e7b28a5903d,2024-10-16T16:38:43.170000 +CVE-2024-21218,0,1,d876f9a85e4aa79dcba8e7a4eea826d616269b3fdb765b8815ece34ebdbf369e,2024-10-16T20:43:35.043000 +CVE-2024-21219,0,1,b6effc9f982788b73b4eb56004519c0fc735cba0021c5d3f6950730648e65efd,2024-10-16T20:43:02.867000 CVE-2024-2122,0,0,6adb417d17977398c135497f29387af3778b2599a16ab5e9bd8471296ff409da,2024-08-02T17:25:13.067000 CVE-2024-2123,0,0,0719ae4bee332af79c93b8620c3a1fe6da02de27a90f1595704940d001e25d74,2024-03-13T12:33:51.697000 -CVE-2024-21230,0,0,71c40132e7c64b18d2770b6f20a63b009b6b430191f876f6b437888ae43ca07c,2024-10-16T16:38:43.170000 -CVE-2024-21231,0,0,a0d53a4e6c54051263360ab343b57f68f41c80c4b69d852d0181a96ca382ff20,2024-10-16T16:38:43.170000 -CVE-2024-21232,0,0,9bd267b2be33f1783863b3ea9de038d21cbc0939f4dd0e1ab4c7dca9caeb26a9,2024-10-16T16:38:43.170000 +CVE-2024-21230,0,1,c4e17944ebc3bfcbdf78b6336940e6a6054992926ab544142906aebeac23eae0,2024-10-16T20:42:35.450000 +CVE-2024-21231,0,1,36b78c7f1d40d41b87ee14c511c304eaf9286e1b39ae47f4ae34fcf1169219e8,2024-10-16T20:42:13.877000 +CVE-2024-21232,0,1,d3c11f941e85cc6d35f85f7ba5765b381a26d5c1e4add84f192886aaa77d4741,2024-10-16T20:41:35.300000 CVE-2024-21233,0,0,2e1f835c6d1aeb12b526b73852696d4c05a55a397cf3b3c751d6dd9e9ca62929,2024-10-16T16:38:43.170000 CVE-2024-21234,0,0,a29292c1102bbaedc79fdc51b93d13809a9f459ba18ebb5ec0f90b0ff104fc54,2024-10-16T16:38:43.170000 CVE-2024-21235,0,0,8587da8fb7ebcc161bded282c332f25d8a8e49a200b16b429f6a61a9353b7cbf,2024-10-16T16:38:43.170000 -CVE-2024-21236,0,0,d4fdabece8835798d4ddb300221a4a7c3ddbc7b259c6cada95062dcf3805c075,2024-10-16T16:38:43.170000 -CVE-2024-21237,0,0,cfb090645e03282fdd8f27fbc285b090c5f85a4dabd824ea49150bb8fe27c67b,2024-10-16T16:38:43.170000 -CVE-2024-21238,0,0,0aa2d097429bc626e5eb3a321b776d36b3cf01faf4a6fbed74e83e8ef206a4b6,2024-10-16T16:38:43.170000 -CVE-2024-21239,0,0,5493c399d174e7ad5fafc4def8a203cd65c0dfe51555ad0e7d2dedc246c3ab46,2024-10-16T16:38:43.170000 +CVE-2024-21236,0,1,f3064ccc3b1d0405a68efbf4a4a2fc151335deb597e7bbeb33d75084dfe01195,2024-10-16T20:41:14.010000 +CVE-2024-21237,0,1,1a26096b9c345c3a850242bf98620cdadbc2a123ce2de82063035b571c670486,2024-10-16T20:40:35.677000 +CVE-2024-21238,0,1,04b43b7dfcf632c90dd367c6beee91e01080526504fa7fe217224e883f00b75e,2024-10-16T20:40:07.527000 +CVE-2024-21239,0,1,526fc8375712e973ff0d45003cae230ec5f44402442ae70a546b37d628f02100,2024-10-16T20:36:59.973000 CVE-2024-2124,0,0,49dc310dcf10d520f5d59cd2423bf19b84e2577ed2ccf7fa71616fe601b6b6e0,2024-03-20T13:00:16.367000 -CVE-2024-21241,0,0,5753e5f70d420e5130b768b0bec23b4d599e46170a592dcec2dbc7b1c064b92c,2024-10-16T16:38:43.170000 +CVE-2024-21241,0,1,653a64e8940346f0241e59fbad90640ce2853b3ef07ef0bd409dac1e90cb0ec1,2024-10-16T20:36:10.917000 CVE-2024-21242,0,0,7bb4c55d9279da0a657529b25e9dcce21fd2bafbdd73da59c4162dbe512dab79,2024-10-16T16:38:43.170000 -CVE-2024-21243,0,0,ed11eec18a963814fd57645afdab7286081f7162c859b262929de8826ad25dc3,2024-10-16T16:38:43.170000 -CVE-2024-21244,0,0,8bd693f8b5678996581b899600169761c933b70b19267875db0f2da8d256eec4,2024-10-16T16:38:43.170000 +CVE-2024-21243,0,1,0fc41f40153463683032ac1bfc5c5f45a9ef74d8033ddc59d83f59345dd7fc5e,2024-10-16T20:35:41.957000 +CVE-2024-21244,0,1,a2d8857947cab47435f13652b22d7660077ec99971dc97d0f1c04da6d4b605c6,2024-10-16T20:35:00.173000 CVE-2024-21246,0,0,69d34f05442ae2b6d91f4aa2c4b2541703cedc46634ab3929ac99525849e529c,2024-10-16T16:38:43.170000 -CVE-2024-21247,0,0,5cde9ed527a906e5b90b9aa1c0d016a57ca1fc0cb0d5591d62a09872e9f9fe6c,2024-10-16T16:38:43.170000 +CVE-2024-21247,0,1,65e62ada788d7c8dd8f6bbcfcf373e355969c491bcf2b35cf52ed2528731ff42,2024-10-16T20:33:33.027000 CVE-2024-21248,0,0,0e2a5de59e4d4b28c72db4fd17bda6cc170490a01b0e29a5a16bbf66af9592af,2024-10-16T16:38:43.170000 CVE-2024-21249,0,0,fb960aca811c792a1c35a893ddd2779c68ee519fad06b7f2c31a2b52454d37ac,2024-10-16T16:38:43.170000 CVE-2024-2125,0,0,872a2657310e63ac8c9e764159a2a2b1b3991a1ff9d35b42d26ee113c654f515,2024-04-10T13:23:38.787000 @@ -244333,7 +244333,7 @@ CVE-2024-21451,0,0,fda859879476242f447364ed932f4e097d32ef677cea24910429c5be2e679 CVE-2024-21452,0,0,9f708d763548b34c7c49c3f0348df362d48fec38e955d6efb9dc3104c88d6865,2024-04-12T09:15:09.877000 CVE-2024-21453,0,0,da605aa15089d99be623e883beeca2f93e21f8fdda0997652a458a217ea7b701,2024-04-12T09:15:09.977000 CVE-2024-21454,0,0,bb3c6f4e967eb55a8c57e103a3dd8be0b010cb457fa764651101d90478af9307,2024-04-12T09:15:10.083000 -CVE-2024-21455,0,0,0cbcfb9d4379cf92169db795863490ebee0281e7743e931ccd226c6dd17fa6ac,2024-10-07T17:47:48.410000 +CVE-2024-21455,0,1,0ff43e0945329ec2597945b2273f89d937ddf5722e0c57f6cbbfe010a8f68ae2,2024-10-16T20:30:53.093000 CVE-2024-21456,0,0,febed50af5286757c8cac18d43d41c241de675306b4f7eab1cf3e42fd902eaa8,2024-08-21T14:25:32.873000 CVE-2024-21457,0,0,0397b493f3a90fa8856b8c3877d0f328b647dc8423fd236ad4c3272a6eecd90f,2024-07-02T17:49:35.410000 CVE-2024-21458,0,0,f9498022a3fab8a9690b0ccfe79640e4fd1995291accc416b68050d29e4c1e40,2024-07-02T17:57:05.057000 @@ -244835,12 +244835,12 @@ CVE-2024-22124,0,0,ae727126e60d9cde8ef5e51668c38a883080195512277d1a80e4217d8781f CVE-2024-22125,0,0,45e3a9c2ec5632f05c6eeeb6aeaaf2c6d04ed3da2f62c2fdc1ffee6c0b199240,2024-01-12T19:42:36.637000 CVE-2024-22126,0,0,d8d1a9364c6ab71905a9fe572b018a67040d0b71e6ce4efc9f545461184f6d37,2024-10-10T15:56:49.207000 CVE-2024-22127,0,0,a93c2036d31e75652d8f4eeafd412b70336432f9ad8255c87f034d5f74373945,2024-09-26T19:15:06.897000 -CVE-2024-22128,0,0,e822311a5166652c748d7f5c7454ac543482bc9dec92f05602ced23da2b71de6,2024-02-13T14:01:40.577000 -CVE-2024-22129,0,0,ba420a1c14bce7e28ead165e75ccb496644eaa485a531f02f34dbfc27059925d,2024-02-13T14:01:40.577000 +CVE-2024-22128,0,1,5c2f4f68aec037896792302688929eb45edce1e42bf909e54d29490c2869b86b,2024-10-16T21:30:47.157000 +CVE-2024-22129,0,1,fe1510f76eb95c83d9587c1d8d12faac9a49d36b11a4ee502daade66f08986b0,2024-10-16T21:16:47.470000 CVE-2024-2213,0,0,f67e62c176cc50eea5691c81fd80a750d99ec2626a8cb82c5910f3ff3bb4b956,2024-10-11T15:34:13.917000 -CVE-2024-22130,0,0,34095af75712555f9bec25279e5c72484148ae0825a4a0b5c9bc878eb827030f,2024-02-13T14:01:40.577000 -CVE-2024-22131,0,0,308a1550b622eccea8d6d4899fdaaf52b0a22364a168a2ca37daa3143d39a5f0,2024-02-13T14:01:40.577000 -CVE-2024-22132,0,0,125dcad5f4bb53ef2491b560d7ed3e56b9abd0e40721c1e4d5f044afddfb0e04,2024-02-13T14:01:40.577000 +CVE-2024-22130,0,1,18f066fc0e68b22fd8abeef456a14a855f6e3ae59162fde48d34b391703764cb,2024-10-16T21:29:12.880000 +CVE-2024-22131,0,1,5ff6efca5626bfed5c3db280ba386d72b12f0bc3e0e426758ee24113d6076c57,2024-10-16T21:28:35.253000 +CVE-2024-22132,0,1,58c6c4a0b2c5e4c6a131914021f4c92ff9df846060d0e48c1177d12fcb0b5b6e,2024-10-16T21:21:20.573000 CVE-2024-22133,0,0,fd4030d865edb227e19d5ff6fd27e04a8ff5ff7dff516fbab20fe256c1779f6e,2024-03-12T12:40:13.500000 CVE-2024-22134,0,0,2b239bd82844ff03e74318982801c82d566b0fddf549b6e0f4f4282b4b5e0b1b,2024-01-30T17:07:24.310000 CVE-2024-22135,0,0,52831c791b2b0a5e282e425426b22008b4037e94f9edf766ed4cf5b5e07f0424,2024-01-30T17:34:58.917000 @@ -245662,16 +245662,16 @@ CVE-2024-23363,0,0,f3bca7930119a168b01a4f3c6a543138a5f31bd5e8f14fd6e950dfaab71bf CVE-2024-23364,0,0,d335bfe8fa3d7a699b93e4031ef9a4b12c2c27a445d90d9a5a233dbae9b9707d,2024-09-03T12:59:02.453000 CVE-2024-23365,0,0,b549beaf46af95806279ede941b0b9df9f8e0ef8f9248b984c743f41e6969a1d,2024-09-03T12:59:02.453000 CVE-2024-23368,0,0,5726397ddc8ddada7ad85b481081c827980e0b31f00843d9c4a575a1cdcf7c17,2024-07-02T17:51:25.690000 -CVE-2024-23369,0,0,c0103c8a46c3acd4c0d6849fe40fd8c68164eefecb2bdeb66cbc7a05ddd77370,2024-10-07T17:47:48.410000 +CVE-2024-23369,0,1,87b135c1c59894c44b432e25f700e2df930545e3a5efd6794929627b2bbac2ad,2024-10-16T20:30:19.067000 CVE-2024-2337,0,0,07544cbaaf25f2cf04c699ba032dfae130492c60bdcce260485571b3859c104c,2024-07-22T13:00:53.287000 -CVE-2024-23370,0,0,7073d4c33d21845c43d238d6e8c234015bd9b080f755227d2e54c421d67f87d0,2024-10-07T17:47:48.410000 +CVE-2024-23370,0,1,58794daa9f34b44f59531a33a5c5e28a56a7a0bf01c09157858be869f5ace510,2024-10-16T20:27:07.517000 CVE-2024-23372,0,0,23b270a28eac6f2e33d3cc96090d40d8bd34b2e6172d17ba5be5b87ce6bb3571,2024-07-02T17:51:04.530000 CVE-2024-23373,0,0,5f71e52681ce9b4c683001ee0714339e5fcbf3b0ac462fe47ab6cd76399fa906,2024-07-02T17:50:38.573000 -CVE-2024-23374,0,0,3b7f0594ca59e4e5a6ad050acea8133c1a6c14c22ef90f3df6934c92c794178e,2024-10-07T17:47:48.410000 -CVE-2024-23375,0,0,21ceeef02534e493a9020906ccab988c70c9a8ba438c31af4f4cbf4a0b3904c9,2024-10-07T17:47:48.410000 -CVE-2024-23376,0,0,209677926ddf6789b0356adf1f5414972576ffda1a3f48177480f90edecf7c1e,2024-10-07T17:47:48.410000 -CVE-2024-23378,0,0,074779fd36c0c374360ef032c239b4ec46fbf2a8aa6e7a5cf4230cc4665c7561,2024-10-07T17:47:48.410000 -CVE-2024-23379,0,1,d83d42193b183369769000f98e3afdec4ada9e1be3c04ea1a4b9166a0e8b650f,2024-10-16T19:58:40.227000 +CVE-2024-23374,0,1,f4c6d02700b6a8420aafee41d5598362caa782be31e75b6b5a2be4f35376a456,2024-10-16T20:26:47.983000 +CVE-2024-23375,0,1,6c40f68c93a67061204173a720ea1a7d00eaefa497b28279e14abbb274c64d60,2024-10-16T20:26:01.167000 +CVE-2024-23376,0,1,53f5fbcb9e7022eaed6b3b110c6c4a497cb456faf848338c012c4a394e4a25a1,2024-10-16T20:07:45.260000 +CVE-2024-23378,0,1,cb12f7c9d19ce7e2f02f7f248035e9b955e6980ec80efbda1175620e9584e886,2024-10-16T20:00:29.503000 +CVE-2024-23379,0,0,d83d42193b183369769000f98e3afdec4ada9e1be3c04ea1a4b9166a0e8b650f,2024-10-16T19:58:40.227000 CVE-2024-2338,0,0,97ed9304e53653e5f2f6be84ec656ed42a5ae14786266fb81f31dd764d99c05c,2024-03-08T21:19:43.127000 CVE-2024-23380,0,0,bf0ce83ac3185ab9d5bec787958ddc81b954eccc336ea58dd24a5df8b6433ba9,2024-07-02T17:50:17.873000 CVE-2024-23381,0,0,c05f9cee58e223ab89c0d0d7ff884408a74aec6ab8924761148e9dbc59968126,2024-08-06T16:30:24.547000 @@ -246037,7 +246037,7 @@ CVE-2024-2383,0,0,585ce3a48313228947e40f9e72b94221ce0a7d581a1242a34676aeed0a2812 CVE-2024-23830,0,0,baf51b255b1d611a2691efce00c0d171805679867f73d6b48c17ea5c48d6f748,2024-02-22T19:07:37.840000 CVE-2024-23831,0,0,85dc29d4c69ed89d07f94e734e98d7fea8d9a8dd87844133c4b3378b980f85af,2024-02-10T01:43:51.527000 CVE-2024-23832,0,0,2c53e6677810065a49b3c27a486b6f9b7ab7331e27ed402ea99d5e5d9c4aaa28,2024-02-09T20:21:45.317000 -CVE-2024-23833,0,1,6ddb768d01b38c44973332d6b7ff450f53f64784361168478f7f4d6c73201416,2024-10-16T19:51:33.200000 +CVE-2024-23833,0,0,6ddb768d01b38c44973332d6b7ff450f53f64784361168478f7f4d6c73201416,2024-10-16T19:51:33.200000 CVE-2024-23834,0,0,7bcb78c769bf92e6385abfba80a8e69d4ce41b7ac12f11f1ba0cb9b9e44a7dd2,2024-02-08T16:39:31.963000 CVE-2024-23835,0,0,94c2d033bb4cfa04437e702465da1bc359431c2b2f8d4dedfd9b52b779747645,2024-03-07T03:15:06.900000 CVE-2024-23836,0,0,566c6b0dac3daf7d1215901c82bb006ba7d87180faba9e6f293d6e00e23b555f,2024-03-07T03:15:06.987000 @@ -246502,12 +246502,12 @@ CVE-2024-24724,0,0,987b03154d8c04503d355cf1ee5e3a5f82060d437b582c3cf8e7d7248a9af CVE-2024-24725,0,0,abcdbf333e953117e91fbd719efd3f28f2197c31afd05d1b1f71cb089103575c,2024-08-27T18:35:04.830000 CVE-2024-2473,0,0,b1c39f683d6b313337fd343b6b650f75d80b2d74ff0a3d50cf1f445968eec6c2,2024-07-25T13:25:04.520000 CVE-2024-24736,0,0,314fd4df2659ae516d75e93823704bd217b531c9ea252f3ea384402e73f605e1,2024-02-02T02:08:23.417000 -CVE-2024-24739,0,0,fb61bf6f32281c36f8c1e74038a5cd6556a569506b03186f48e1a5e0ce1840cc,2024-02-13T14:01:40.577000 +CVE-2024-24739,0,1,1a536e5f35303c8f0d97d78a39033524d00909b0ff52c8189b0f7c4198855b33,2024-10-16T21:20:37.827000 CVE-2024-2474,0,0,533d281c039392b1ada46a52c0b4f0bb4180f10c340d5f76f63e617b17e80e48,2024-03-20T13:00:16.367000 -CVE-2024-24740,0,0,f3833f90a0cfe994e2c22d2b554fc600ed244615ed325dad0c4f67c40477fb80,2024-09-28T23:15:12.777000 -CVE-2024-24741,0,0,4890ced4a403916077d16ba39c71c4b3c52ddd4da6d5e5236539cca3f1ca883a,2024-02-13T14:01:40.577000 -CVE-2024-24742,0,0,4a51b6d1bed538d124974674cc583afaa77815fce0387ecc7ba52420a7d28ffc,2024-02-13T14:01:40.577000 -CVE-2024-24743,0,0,08c0b66d4a5ca6ba5511a9ebb40a57d0d8b91a4309aed10a9cf2a85f1d29e871,2024-02-13T14:01:40.577000 +CVE-2024-24740,0,1,1577f982218120b8f752f9b72965242bf7e351c368695b0e8fb561d5ca0768a1,2024-10-16T21:18:54.343000 +CVE-2024-24741,0,1,7195e6869a8f890c986c9077a010f00e8446adf2f91735ea5902d22abfee0928,2024-10-16T21:16:23.770000 +CVE-2024-24742,0,1,88e783afc98505d530044d6ba96ffe5053ef91dd8303e539b011ac9eb40248ed,2024-10-16T21:18:27.487000 +CVE-2024-24743,0,1,8d506b5956b5574786417f610fbc06c605184560fb113b6f212a31bce6bb0e0f,2024-10-16T21:17:44.610000 CVE-2024-24746,0,0,40e7bceff1c25e6b9953ddd3810454050ac129de5e60f835bc00a18b7d10c7b8,2024-08-22T14:35:07.450000 CVE-2024-24747,0,0,c7102f6cbbbb54dbf174b4ec9b33188c1d6a88ca038e451e81aa538a223d6e72,2024-02-09T15:18:00.510000 CVE-2024-24748,0,0,5f49ffc2835721d9b1ffe4198862561f4a25b7f09882de4d4811a0ddce7110f1,2024-03-17T22:38:29.433000 @@ -246592,7 +246592,7 @@ CVE-2024-24822,0,0,f5c8cf448b16b286008df690b572e339c86d302ad1ca3f03ba6dc478ba62a CVE-2024-24823,0,0,ca387b9ca279544bc70a4924c2cae6ededf5b36798c51b4811775c8050c55d01,2024-02-15T15:41:48.550000 CVE-2024-24824,0,0,3cd8cb72af7a9d86f6447b6b741f0605f9e64f6f4be750a68ce4b077beee9862,2024-02-15T15:40:51.680000 CVE-2024-24825,0,0,44ab98b07f8e13f8b0c82f9421a9e43aec0d6c0ed033d2b04542ee6d71077af6,2024-02-16T21:37:47.923000 -CVE-2024-24826,0,1,d4c3f9593b950e147c4408f101014dcd5f1ee645b7ba2e4681336c23bfcc2209,2024-10-16T19:39:06.887000 +CVE-2024-24826,0,0,d4c3f9593b950e147c4408f101014dcd5f1ee645b7ba2e4681336c23bfcc2209,2024-10-16T19:39:06.887000 CVE-2024-24827,0,0,8a3fb819168e70feabdebbadc33e7d5fb16a735b42b02da853323d07ee2f6102,2024-03-17T22:38:29.433000 CVE-2024-24828,0,0,5febe2126555754e7f75249112b510c6cf702ee8ea0e8f4efc1e398efc8df599,2024-02-16T13:43:33.407000 CVE-2024-24829,0,0,d5256308fc86c325573389b1557c0f4be2aa9472f94995eb3c78bbae5a267a9a,2024-02-16T21:37:59.497000 @@ -246824,7 +246824,7 @@ CVE-2024-25109,0,0,c41f7e7a8b0352e7db5bd3620b2014d3afb64c0a666c2f8d504ee8ea7a10e CVE-2024-2511,0,0,25ba3d5dec8dfd6cf26bc268a14176944084d3a63c61f96c81b75524a5331e44,2024-10-14T15:15:13.270000 CVE-2024-25110,0,0,d26cbb0693a4d6c53e7081518beb8a84b92d2cd8bf57244ea03bf261dee5ab3f,2024-10-11T21:55:24.837000 CVE-2024-25111,0,0,260c08f765b0b23211db8fb3020f7ae46891432e3f36f885aebdb89bc620ed80,2024-06-10T18:15:27.443000 -CVE-2024-25112,0,1,571b0f346b371db0e3ba5a04743770e3fc27cc5cc12d0fe17d3077af1a1ba6c1,2024-10-16T19:35:51.397000 +CVE-2024-25112,0,0,571b0f346b371db0e3ba5a04743770e3fc27cc5cc12d0fe17d3077af1a1ba6c1,2024-10-16T19:35:51.397000 CVE-2024-25113,0,0,857a8a6c04923b8f13653e0c0fed4f0ffff75cf90412dfa840a70a6bc18a3ae7,2024-02-17T22:15:46.660000 CVE-2024-25114,0,0,3524254a4b7a3e50af9bc4f15e149e8b2a8070e77f38c1db0e166835208309e2,2024-03-12T12:40:13.500000 CVE-2024-25115,0,0,40d5efaae1e56dcbebba13c843b26cb154e67c37776585c4828884d73c024208,2024-04-10T13:24:00.070000 @@ -247003,7 +247003,7 @@ CVE-2024-25395,0,0,56e51d7cdf071865c9c3e88e6e5ac096f849119a0a671dbbfc83351b3b934 CVE-2024-25398,0,0,1ca4a836d24b5db40e48b55b365c5f32c1298501340103a0d376f4b670c7179a,2024-08-27T21:35:12.350000 CVE-2024-25399,0,0,1476dc50a563fb725fe1946b55f2c733462e19d80809e452ba10c245f29defa3,2024-02-28T14:07:00.563000 CVE-2024-25400,0,0,5a1a699f766ac616b34401ab3d26cec4ee9ace8ad79386f513c8e8091e234b3c,2024-08-12T13:38:17.123000 -CVE-2024-25407,0,1,9b1a69e41e37eb54f2237c8e78a2625322280c389153646e787e55e211a4a244,2024-10-16T19:41:48.053000 +CVE-2024-25407,0,0,9b1a69e41e37eb54f2237c8e78a2625322280c389153646e787e55e211a4a244,2024-10-16T19:41:48.053000 CVE-2024-2541,0,0,bba0606372ded88d8bc4d9948e1817b21d9407fc6bca0230b3250a7d287eee8e,2024-09-09T18:40:23.437000 CVE-2024-25410,0,0,bd9e79518cb72a7506fa003003f0ba0ca5f3409a943529c82b970295f2c8078b,2024-08-16T17:35:06.847000 CVE-2024-25411,0,0,f9808b9c08c02274fff68dd7e5217db1355a6b403a57d6ed0599eb26f30420e4,2024-09-30T12:45:57.823000 @@ -247162,8 +247162,8 @@ CVE-2024-25639,0,0,90920ed35508f61f109c2fa6620249a2bcd1fd3af4dea83f43caf56835347 CVE-2024-2564,0,0,6b3fd70d19edcd290602091f68cfa932af4444200d4de70b2e0360193173678c,2024-05-17T02:38:19.517000 CVE-2024-25640,0,0,3bceb9b54384127c8987d6d0f984f439fa5009d13bcb784ca7a9cb2c455ef455,2024-02-20T19:50:53.960000 CVE-2024-25641,0,0,676a26b1b2c12534fcd8ac5d05e0285f4f22783fa69470781479894a7e859c5d,2024-06-10T17:16:21.837000 -CVE-2024-25642,0,0,638fd1308f3d8842eb533aa3108c9355f89cfd97e2e1ef98df198a0b000c5b3a,2024-06-10T17:16:21.947000 -CVE-2024-25643,0,0,7fd5012d58e0f26127820c0dfe85f7653ff3e82c349a6c9e79ae2a59ca03b868,2024-02-13T14:01:07.747000 +CVE-2024-25642,0,1,d6d3351b0efe9715f9dedab69850752c129a78d300da2da72872c3bb965d7326,2024-10-16T21:17:11.097000 +CVE-2024-25643,0,1,b37cbe067d8add39730eb4b37fe5e8af21dcf6913d79a4bada6119cce1ed1707,2024-10-16T21:15:57.840000 CVE-2024-25644,0,0,b702cfb10f1d9840e7089aa6d4444498e1a0b1a9f6491295ca80b70c56a42bd0,2024-09-28T23:15:12.907000 CVE-2024-25645,0,0,6bd46b6b76bf2191c2da23dbf63dbdf0c2ad3d8c1e837e15d8adaddae98d01c1,2024-09-28T23:15:13.020000 CVE-2024-25646,0,0,a101219cbb661ecbc967b4403965684b4e383408a09ced0696a5c771abd09b61,2024-09-28T23:15:13.110000 @@ -247198,7 +247198,7 @@ CVE-2024-25690,0,0,87e489ac687df3386a5e24fd2776124e23b4b69824b5d876d66a887615116 CVE-2024-25691,0,0,b41fcdc0b6e3b80ce68962bb56e9ccf2a79205cd4fd70b9d6fd56f5a64fece0e,2024-10-15T14:35:02.133000 CVE-2024-25692,0,0,d0dd15c1fd6afb16949febf43262c764c6cd4b54de8a2254593f0df169ca3486,2024-04-19T23:15:09.780000 CVE-2024-25693,0,0,ee3b1699756246429d08fcae77f5a3d1bf8999838fba0943d498908eefa0b3ea,2024-04-19T23:15:09.857000 -CVE-2024-25694,0,0,df973b9c2c97d997da6138526a86d0f0fa774d11a4a0dad8933c8a4014fb7bbb,2024-10-07T17:48:28.117000 +CVE-2024-25694,0,1,38d90ac227fd1baf2ae319ba2fff44ef00cd1a7c3cdc768d0e3ffc751699dcba,2024-10-16T21:00:18.683000 CVE-2024-25695,0,0,ae0f9f8b4640bad4ef7d98bcee5a49c1f9e646c53c1fb5af299b3d59dbeeccbf,2024-04-04T19:24:50.670000 CVE-2024-25696,0,0,b9ac53149f8eb62bad5c1e7fe3f9f0b5771bd4ade8a07c59c93d14f596dac225,2024-04-19T23:15:09.930000 CVE-2024-25697,0,0,00e09b3a3d399949d344c4792642676acc05306dfb8c33dc1b47547a03399a73,2024-10-08T17:15:29.717000 @@ -247206,8 +247206,8 @@ CVE-2024-25698,0,0,2e4c293fce5511a49d5e47901a449b88216e166f1733cf134304a504814cc CVE-2024-25699,0,0,9d693017a1c9d09a675540e3ff57b587b5c9e0a64b03ba2e5a4505b921a75e06,2024-10-08T17:15:29.917000 CVE-2024-2570,0,0,62ba08b313dad98b50886ef335be346def1e9e22dc58f4ebc2c3039b966f349e,2024-05-17T02:38:20.170000 CVE-2024-25700,0,0,9f93306ac6edcebea165bf5bf6cc8e9e96960ebf6d995fdefa65259eb1d6db09,2024-04-25T18:15:07.817000 -CVE-2024-25701,0,0,edcfc4602c5c7a86871da4bea4d4b5b1a7bb9b9065dc1c26073a215bc7af59fb,2024-10-07T17:48:28.117000 -CVE-2024-25702,0,0,e859ce563aeb48d8e92df453a4deb6f580b48ac6a6b244b21d2d46b882f73d7c,2024-10-07T17:48:28.117000 +CVE-2024-25701,0,1,f27167be0e5777908d3c265ab5096cbb1db5b7c58359e6e6a0ff97800d809dca,2024-10-16T21:00:36.173000 +CVE-2024-25702,0,1,8dfd41a7be445d3c5a624d12c60597f0041956482e18d7f710c6411e1b0f213f,2024-10-16T21:03:33.347000 CVE-2024-25703,0,0,1afe4ca1ce005dadbbbe3861ac31e3fa775711912585fe3575d9e4d068c0830c,2024-04-25T19:15:49.520000 CVE-2024-25704,0,0,fb54909d350b3454c6bcc148be02f730a032c03d05d0a91141a9e8dbb6c64f5c,2024-04-25T19:15:49.597000 CVE-2024-25705,0,0,70404f8be55e7f45193785fe1a9f191f8bf3c87c1846c3ded06f2c02ee5cc19f,2024-10-10T12:57:21.987000 @@ -252732,7 +252732,7 @@ CVE-2024-33043,0,0,e440b5c9b2a1727157025810ce1b92ddb45351842873f98e286f1378d612b CVE-2024-33045,0,0,c750be85f91783e59cd18e60c65725c2f8e2b0f2771fc29ca9f691ba1ec0dcfe,2024-09-04T17:20:55.297000 CVE-2024-33047,0,0,cb0eb88ac7f41a9c98cf0d3c8ebd2b1f66d8a5c56732d8ae21823446d39c74ab,2024-09-04T17:07:31.877000 CVE-2024-33048,0,0,f9f67875b847da24eb9cf137e9f097d769cd7f8f3d65d24eb4619818f972d900,2024-09-04T17:20:01.083000 -CVE-2024-33049,0,1,988187ef6484e79ab1206e7b4ef064ea2ee0b7bd4dfc0b86d647cb0fb44b92ec,2024-10-16T19:57:57.243000 +CVE-2024-33049,0,0,988187ef6484e79ab1206e7b4ef064ea2ee0b7bd4dfc0b86d647cb0fb44b92ec,2024-10-16T19:57:57.243000 CVE-2024-3305,0,0,60cb4bdd6aab216e8dcee2531752f4a05622ff14e3e073fcab37d9212a2d0cdf,2024-09-19T14:44:28.980000 CVE-2024-33050,0,0,90923f1d1865d88057676c94e2b893aea7270f8731add142aed38ad6597070db,2024-09-04T17:07:13.930000 CVE-2024-33051,0,0,1fd409b2ba830a4d68baa6f497a6e4704a55e16bd6f855473d9753382be831b5,2024-09-04T17:18:10.950000 @@ -252741,14 +252741,14 @@ CVE-2024-33054,0,0,67fa57bf4b27f2520026aaaf6b13807e21cefd1307528e92c6c6a61d930ac CVE-2024-33057,0,0,fc38afeaa7486b0a5aebc4f1315319ab783e3abf0a4193027aaf853eaf32aed0,2024-09-04T17:06:24.843000 CVE-2024-3306,0,0,395196a450f14ac42a9c4c7d5b943f8723d96e3f07723d87dcdff36c939bae9a,2024-09-19T14:43:51.830000 CVE-2024-33060,0,0,8e20f230158ec785e72e303f04a05aee62188eb8b143d335c7e1363dc54b78e7,2024-09-04T17:06:08.407000 -CVE-2024-33064,0,1,bfbd742ae234880f52f67d6978c158799c406232f5aac7c3edf51ec757747c4a,2024-10-16T19:52:54.483000 -CVE-2024-33065,0,1,e28bf41f307659f4fb4f14868be73b5e9d88ec7819cf206c24cd9f25c36ab870,2024-10-16T19:50:45.190000 -CVE-2024-33066,0,1,66a8d9354112b9051cf178fd2c2f4c437b5cf34f4a798a9546a14ff489506cc8,2024-10-16T19:49:40.333000 -CVE-2024-33069,0,1,43c56f0e9b4f42c73eddbe695dc23769c84225eafe9aba7ea54e0211778b7147,2024-10-16T19:48:32.207000 +CVE-2024-33064,0,0,bfbd742ae234880f52f67d6978c158799c406232f5aac7c3edf51ec757747c4a,2024-10-16T19:52:54.483000 +CVE-2024-33065,0,0,e28bf41f307659f4fb4f14868be73b5e9d88ec7819cf206c24cd9f25c36ab870,2024-10-16T19:50:45.190000 +CVE-2024-33066,0,0,66a8d9354112b9051cf178fd2c2f4c437b5cf34f4a798a9546a14ff489506cc8,2024-10-16T19:49:40.333000 +CVE-2024-33069,0,0,43c56f0e9b4f42c73eddbe695dc23769c84225eafe9aba7ea54e0211778b7147,2024-10-16T19:48:32.207000 CVE-2024-3307,0,0,de2078d32c9fd66ca1e329712579640346be35f0240807faa106038aa71fb05f,2024-05-02T18:00:37.360000 -CVE-2024-33070,0,1,5c227e83ae052fa89b8d8522db931e95887b68320f2416daace5ac118cc217ce,2024-10-16T19:47:04.547000 -CVE-2024-33071,0,1,119fb280d2e35e00455464a3a99dd71f6f26b7c42f14a629fd9aa9bbc6cf316c,2024-10-16T19:41:46.737000 -CVE-2024-33073,0,1,f313a0faf47a58265c25a7247bcbfded37c0251d492fba51d586e20652db3dd5,2024-10-16T18:25:05.420000 +CVE-2024-33070,0,0,5c227e83ae052fa89b8d8522db931e95887b68320f2416daace5ac118cc217ce,2024-10-16T19:47:04.547000 +CVE-2024-33071,0,0,119fb280d2e35e00455464a3a99dd71f6f26b7c42f14a629fd9aa9bbc6cf316c,2024-10-16T19:41:46.737000 +CVE-2024-33073,0,0,f313a0faf47a58265c25a7247bcbfded37c0251d492fba51d586e20652db3dd5,2024-10-16T18:25:05.420000 CVE-2024-33078,0,0,32899b4391f10b7cbfcaee5abff907eff95c8894218149b7342d82053a7e337b,2024-08-01T13:51:41.723000 CVE-2024-3308,0,0,b12c3c7359268120e478241aac0d965ee4975d5f2a92382c8de950e6d75610fc,2024-05-02T18:00:37.360000 CVE-2024-3309,0,0,86d23734c08e91abb9c54fe3adc839130d817cf111a237c0656262c25ce176f0,2024-04-29T12:42:03.667000 @@ -254373,7 +254373,7 @@ CVE-2024-35580,0,0,a43fd10e129fd9e146689cfa2d63929069dd287ced1e3cf39c84ed52a8ef4 CVE-2024-35581,0,0,f44263214f42e721dd7c3dc00efbb15dd18e867b1fcd80955bdfd7a6cc44bd29,2024-07-03T02:01:55.113000 CVE-2024-35582,0,0,2219b5579a19c25f0f78733ea0e4d22e0bdafa0a58bb93c103fdebb267edde75,2024-08-20T15:35:17.183000 CVE-2024-35583,0,0,b5c80f126e7aedb5091bd213ec23d58eb7894ac75a15e7c2f39695f5e3fa2ab6,2024-08-01T13:52:43.587000 -CVE-2024-35584,0,0,e4cbd341ff6f57cc361ac87d076a17fb49cf92bdf5d3ab94e9b13b57d96a0c0c,2024-10-16T17:15:16.153000 +CVE-2024-35584,0,1,a29f46ee06a007e729a98a7d98a071b43cde1fd1d5429fad7148fb429f444f92,2024-10-16T20:35:10.897000 CVE-2024-3559,0,0,6795a97a10669b581ec15fc558119e6f23b6f2221caf66e80800086dfa7b2bd5,2024-06-13T18:36:09.013000 CVE-2024-35591,0,0,27faac454b8155f287bc6ac35261d2d1913acb4129e9514b657e844f649215b5,2024-08-29T20:36:47.170000 CVE-2024-35592,0,0,c1fef65873ac1061d41e08db42afc69241a1ccc24e746aa460028428ca90ae7f,2024-08-20T15:35:17.980000 @@ -256150,7 +256150,7 @@ CVE-2024-38024,0,0,1797dacf114220c1e1049c00517f85420f4d0a240dbe89f86adea8256bc98 CVE-2024-38025,0,0,9f028b66722379a4d88b7ebae27bb9427c5009d1dce1299424f156ca72de7c23,2024-07-11T16:43:28.747000 CVE-2024-38027,0,0,4aa1cddeb9caa33aa67dad478e11bf6f705700b0330932b5452f221ae54ceffe,2024-07-11T16:42:49.083000 CVE-2024-38028,0,0,a1f99f145474526e61ea4a0e3c69bdb1c6e1b6da7efe7b6b1a875e09474817bf,2024-07-11T16:42:20.313000 -CVE-2024-38029,0,1,41e1b20c9c630a38ebec8928ada9620a2a27e0c7008237554214e6595cbb95b2,2024-10-16T19:27:25.183000 +CVE-2024-38029,0,0,41e1b20c9c630a38ebec8928ada9620a2a27e0c7008237554214e6595cbb95b2,2024-10-16T19:27:25.183000 CVE-2024-3803,0,0,a90b9a8d430e9bd2f1e0e91bbe856922d83605aa62e95511f94f70d1134bb7f2,2024-05-17T02:40:08.240000 CVE-2024-38030,0,0,2692bbe3cc189a0b531f2e3918e547283f3aaa5462dbf0310bed7de364bbd2a0,2024-07-11T16:35:21.450000 CVE-2024-38031,0,0,39791687a86cb00a8c8a9bf6c29b8b333e2d9192614552a4ee24252586df51d0,2024-07-11T16:32:33.517000 @@ -256219,7 +256219,7 @@ CVE-2024-38092,0,0,fa52aaacdeeea4f553a80268533abc67279c4becb10c86c23506d5aee3ea5 CVE-2024-38093,0,0,075dd9daa56a96b357ca4934063a6c16d1ea30c840caecea5eb303d11b987d24,2024-08-07T16:28:38.140000 CVE-2024-38094,0,0,acf9b14cc18bf684a3807e3f8aab28f09790dad10479460ab41f157199bfc8c8,2024-07-11T18:27:53.843000 CVE-2024-38095,0,0,b0c4146c3c5698cffee7ab10e0a7873691f618c4c7b8c0ade94c4f51d88f93cd,2024-07-11T18:27:00.083000 -CVE-2024-38097,0,1,ec0681baade18d94d09b5111a4aef11a06995dddf75e81ac63731ba4f9ee74eb,2024-10-16T19:28:08.227000 +CVE-2024-38097,0,0,ec0681baade18d94d09b5111a4aef11a06995dddf75e81ac63731ba4f9ee74eb,2024-10-16T19:28:08.227000 CVE-2024-38098,0,0,ec97a6f3d3826e98c4bef4bf966b3f4e3463526409f9c97694a785720fc1ed54,2024-08-16T20:38:02.817000 CVE-2024-38099,0,0,7782db89a967b149d71a424fdb71c049e171d01d737658a72251691ef31a5e3e,2024-07-11T18:24:27.333000 CVE-2024-3810,0,0,4b9c7ead6ab7332e33f083e2f6cd125d9bb6a7d7cb025550c9e1df7b29084607,2024-05-20T13:00:34.807000 @@ -256486,8 +256486,8 @@ CVE-2024-38391,0,0,20b04656bf618f5c1be614d3d82a6f2592410c65ddd3dee3dc7474add7c8b CVE-2024-38394,0,0,4144cb185c34fe25a28109cad04fb4f27c8fbde291d856b148c8ebd597877958,2024-08-02T04:17:26.447000 CVE-2024-38395,0,0,200f7eb17515a405ff37cc6fccc1c826c560846e0c0625cd687aedb08987a6c9,2024-07-03T02:04:58.833000 CVE-2024-38396,0,0,5f72717de89283d9d02d4a6b5fda996e5c7ff361cf439906862ebb83e84bfcdf,2024-07-03T02:04:59.670000 -CVE-2024-38397,0,1,f461234b92debd850a617105f7cb8c8522d3637ba003870d9e531d816ef5bdcf,2024-10-16T18:23:57.797000 -CVE-2024-38399,0,1,2b771b5ba490c62bc791d46a0084f1ef76097271953e34800c189edde8b5e6e0,2024-10-16T18:17:09.577000 +CVE-2024-38397,0,0,f461234b92debd850a617105f7cb8c8522d3637ba003870d9e531d816ef5bdcf,2024-10-16T18:23:57.797000 +CVE-2024-38399,0,0,2b771b5ba490c62bc791d46a0084f1ef76097271953e34800c189edde8b5e6e0,2024-10-16T18:17:09.577000 CVE-2024-3840,0,0,ec33e8e5666d06426f4f27241e2048dc8546d2022bc8f60f84c59f2555cee127,2024-07-03T02:06:39.663000 CVE-2024-38401,0,0,49e5f353e979551d81ba913b1959baf9c9c3b65372fddd5de7583edefa3b0302,2024-09-04T17:05:39.320000 CVE-2024-38402,0,0,0bfbbf50597e4077e5091de633e6f7dc9b2e3a47b37a9db75c35363f82e41c81,2024-09-05T21:43:22.677000 @@ -258196,7 +258196,7 @@ CVE-2024-41122,0,0,db4a015145ff1fc63debc38645ec64fd0c8a278e5cdafdcde4b59bfb53ec7 CVE-2024-41123,0,0,e5c9227af2b887ccb9089a5ad2dc1eac1dac994eb9a8b3fb98a0a3f4b9e884f6,2024-10-10T12:56:29.837000 CVE-2024-41124,0,0,545390f2812fb35069d3dbe35e40ac5aea11b2900ce09299ced750b1f5fdfac1,2024-07-22T13:00:53.287000 CVE-2024-41127,0,0,cb656d719f797ab9b0f4b867a7e6012c2f45c355cda77a51db0501f209b4731d,2024-09-11T14:52:15.690000 -CVE-2024-41128,1,1,24728ea0aa688e7c1dfcbacd943b9236737fc176c4e5fce85695b9a056c1f423,2024-10-16T18:15:06.070000 +CVE-2024-41128,0,0,24728ea0aa688e7c1dfcbacd943b9236737fc176c4e5fce85695b9a056c1f423,2024-10-16T18:15:06.070000 CVE-2024-41129,0,0,49760c4facba24da14310a8aaec7d506bc9460cea62e06abe7615580f897df69,2024-07-24T12:55:13.223000 CVE-2024-4113,0,0,e0d06b1b449a5e3093ad238184a1fc3bb7c021d3199342ed4f77b54476531329,2024-05-17T02:40:15.830000 CVE-2024-41130,0,0,3261a584e7edf3f3595234f8eb2bc4cb2240cd20df8deb4c9a02d301bb600580,2024-07-24T12:55:13.223000 @@ -258284,7 +258284,7 @@ CVE-2024-41308,0,0,0cfb1f5a539d1b3ab56fa248bc4e6b56744120f3ffd7eb646c940bb1f8d27 CVE-2024-41309,0,0,b9bc578a75924505757e6c223f9b414f575de364b8af8a3b843d1bd2707bdb26,2024-08-08T15:35:19.553000 CVE-2024-4131,0,0,9a9dc3f28ed3cf5dc60a06ac74f038b77e708c032afa1341b54f35e0fc68ae43,2024-10-15T12:58:51.050000 CVE-2024-41310,0,0,dab67ac1aeab1ffb95f812e4938961307c6ce203d52330d45800d09dd75058c0,2024-08-28T17:42:01.190000 -CVE-2024-41311,0,1,dc273fb6c1f4af0ecf5753899416e3c5db9901a0b87f1084e4dca76a2624d798,2024-10-16T19:35:06.653000 +CVE-2024-41311,0,0,dc273fb6c1f4af0ecf5753899416e3c5db9901a0b87f1084e4dca76a2624d798,2024-10-16T19:35:06.653000 CVE-2024-41314,0,0,db53d1cfc39af554879f83e26dbe36479a0a26172379fc4a043735d6cb186ac0,2024-08-01T13:58:28.057000 CVE-2024-41315,0,0,2d4182edc23b3ca5f23da4066941e10349788ef80e0dc9d84cb1c30a4edf0d37,2024-08-01T13:58:28.840000 CVE-2024-41316,0,0,fdd83ec8e5f08975a0e0f1c308e905edc7588e4137c92360541a6835aa02f708,2024-08-01T13:58:29.627000 @@ -258684,7 +258684,7 @@ CVE-2024-41990,0,0,a9d3bfe1152ea007eb5df4a4d15c3972fabe2ab7cf6c4dc84957655472913 CVE-2024-41991,0,0,c38f7b679bd3e48c46db9fd1c6390ab9383b0c22d8669d807f374055f46ee42b,2024-08-07T20:48:22.403000 CVE-2024-41995,0,0,79638f0d10c16b237f07db3242d98d294e87bf4205be8c6d9c3c7b90790704bd,2024-08-06T16:30:24.547000 CVE-2024-41996,0,0,29b8c50df43b1c66bff4b5734acbca34adccc097a107dedf36398e589357d13d,2024-08-26T16:35:11.247000 -CVE-2024-41997,0,0,84df8118b29b34cdc8faf73e33107460ae4ddccf285b98bc5e63560a742aef86,2024-10-15T12:57:46.880000 +CVE-2024-41997,0,1,84a3f0ea395077fa02b4a334ab8509ff391bef43bdcea38ddd875b5794f83bfd,2024-10-16T20:35:12.430000 CVE-2024-41999,0,0,a370380ae5e595c1d409f5d8d8f92b14e0e23ae9708051ce0a7058f9d91625a3,2024-09-30T17:35:09.340000 CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000 CVE-2024-42001,0,0,fcbbb9fe256b159250061e78a0e74ebb6632e1ed1a0fdada8381ebf9439eb017,2024-08-20T16:37:05.447000 @@ -259097,7 +259097,7 @@ CVE-2024-42491,0,0,f29a442764e941cf16c1143e20ac825cd384b5c08683995678d650efdc593 CVE-2024-42493,0,0,62acde285327354a8bf885be4a4449e2ac155d363ca62a755a0d6560a4377c67,2024-08-29T14:24:14.373000 CVE-2024-42495,0,0,9abc7330eac6d6df1f12abde56401fb389a89e85bdfac6db206d32a19ef64c3e,2024-10-04T14:37:36.703000 CVE-2024-42496,0,0,82629bcd722b8cb6d341bed3916823c994361fb6b4946b9099c29ac012cbc5a4,2024-09-30T12:45:57.823000 -CVE-2024-42497,0,0,262b8d15cef13f44f6c11c9732e86216b599547f262ceb2ec772c87233738fc0,2024-08-23T16:18:28.547000 +CVE-2024-42497,0,1,6c95277a74b4240375f9e65f5c21a104fec038817af68c50a8b421844638164c,2024-10-16T20:05:09.183000 CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000 CVE-2024-42500,0,0,f0bcaea9090b49f77db24a21554ec397886059105966434018e3d2adca5c9151,2024-09-10T12:09:50.377000 CVE-2024-42501,0,0,2d6a46c355be0708ff7db2c58107fc669881111adf034802ab42261dde0a7bbe,2024-09-20T12:30:51.220000 @@ -259589,7 +259589,7 @@ CVE-2024-43360,0,0,7806cb26815467de093fc97bcea332d20fcda51f3ce248e59da2d3fe25d63 CVE-2024-43362,0,0,d5feff3f0dfa0bdfe36569e1b23b1d8d2a7f4c0a0f821e5156876156789f80c0,2024-10-10T12:57:21.987000 CVE-2024-43363,0,0,0ff075120757feae88fffcf2d76821fd09fecb2bcd47bb6f49234a442520899f,2024-10-10T12:57:21.987000 CVE-2024-43364,0,0,fedb7f9a44640115fc8844aeb31f3d22d4df0dc3934e9a0e3954b45d8af40d9c,2024-10-10T12:57:21.987000 -CVE-2024-43365,0,1,4616ecddea44daf38ee6071a6acc19cf904981b1f48904aacc5c1e2a491e3e5d,2024-10-16T19:15:56.007000 +CVE-2024-43365,0,0,4616ecddea44daf38ee6071a6acc19cf904981b1f48904aacc5c1e2a491e3e5d,2024-10-16T19:15:56.007000 CVE-2024-43366,0,0,10596fd0d5961ab0f378ad75066948ef896628eea187118ad2dc666e04926488,2024-09-27T18:08:11.690000 CVE-2024-43367,0,0,0f8409cf79e678cffdb4974928d567f1e40ad1650bdffb611ca3860d13e991c5,2024-08-19T13:00:23.117000 CVE-2024-43368,0,0,1d00a2d97832bca557e0027710c3b9dd305a4196742f053b6b5599e12fe83219,2024-08-15T13:01:10.150000 @@ -259671,7 +259671,7 @@ CVE-2024-43477,0,0,d50cbeb6e00e9871b6577501fc388e557638d61c564a40e04e41a194af066 CVE-2024-43479,0,0,313bbcabdd9b44fdcc219a1bba9045a367d02f58a01b8953aabace95c227c905,2024-09-13T14:38:13.873000 CVE-2024-4348,0,0,6e86bc5560fea8dde0d2ebca4133582cb5d1167a5aec18ad6c6b9b23741c69df,2024-06-04T19:20:36.223000 CVE-2024-43480,0,0,ae10f040ee8f2f3ce1d342bef8f47f821195cc6c7c128504e1ca0e7d741f91e4,2024-10-10T12:56:30.817000 -CVE-2024-43481,0,0,272199d4625d9189c414a789278b849a1e24cdea9c57d64ae469f172557b3ff9,2024-10-10T12:56:30.817000 +CVE-2024-43481,0,1,fa0a86aff51fa534acc1bf04e9514a8b9ae5e4b98d0edc7dae95695ec2e5df10,2024-10-16T21:34:19.840000 CVE-2024-43482,0,0,d8f402bc0f3ce251083854e9d472514518876444465b9e6fddf99899cdf432df,2024-09-18T14:11:50.303000 CVE-2024-43483,0,0,a203f8e312e9e65d989c16262e1ab330707839bf3219ea38ec79e790d77dfd81,2024-10-10T12:56:30.817000 CVE-2024-43484,0,0,dc5ab4eccb00bd13e6aff096efe58f743e9ff10113c77bca3a6931c756d701ee,2024-10-10T12:56:30.817000 @@ -259714,15 +259714,15 @@ CVE-2024-43524,0,0,1724b2f16c6d23cc3984120392a815e76d36f338ecdbdf210ef2e4986d901 CVE-2024-43525,0,0,840102d4e72691185278702ea3dd0de1ec11454fd26d0a8e517205b482892d44,2024-10-10T12:56:30.817000 CVE-2024-43526,0,0,0061ba3601562593d0b94a790514398a1bfef8da02c84eb484880d4a22cdabfe,2024-10-10T12:56:30.817000 CVE-2024-43527,0,0,030e0505556f9d785df237650d8a1e72e8588cd2d402f2b5947f8e847be8d6ba,2024-10-10T12:56:30.817000 -CVE-2024-43528,0,0,e238c6cd891da6085c25129b0aaf6e2f4c5131cffb55ce1ed67b8f5ed35abc15,2024-10-10T12:56:30.817000 -CVE-2024-43529,0,0,fdb4f7b351045f4507cce4316f949189e399a458ba9cad25ad624cdfb54d1a33,2024-10-10T12:56:30.817000 +CVE-2024-43528,0,1,c078a6601673a23e9f5cb9927d553390a34b2f1fb3f3c869076da972c659e11d,2024-10-16T21:47:05.543000 +CVE-2024-43529,0,1,6d2e5c631923a97dc2fc3a94b6294dc3ad5e559d16d70ff1d0c82c75d4ea2458,2024-10-16T21:48:07.683000 CVE-2024-4353,0,0,aba01e17f5523fea8114a858821f92c407b11c64f22dee184f29d8c270ca2d70,2024-08-07T19:15:48.223000 -CVE-2024-43532,0,0,f49c75d060c30a2058bcff30c424d1c7222325f73e003dc86c70af996b81ad7e,2024-10-10T12:56:30.817000 -CVE-2024-43533,0,0,34dfc4a5e4f503750cb5e40d13f63ea6bf4b1de3dd9fbbd2d3ad8344d8c0ef61,2024-10-10T12:56:30.817000 -CVE-2024-43534,0,0,5827e3fb82c00baf3523732cf83c0fe7d21adca42cdca256f07369c2ba9eca7f,2024-10-10T12:56:30.817000 -CVE-2024-43535,0,0,b540b3e2f51c003b7539f34e3a5f87871168fc17a032fe1ee941b340ad452fed,2024-10-10T12:56:30.817000 -CVE-2024-43536,0,0,7a831e16a0173e7c67d4834a0ee81db4cf4830434756b4cb99b9d449153ef270,2024-10-10T12:56:30.817000 -CVE-2024-43537,0,0,d1a96b66f7cd0120a50427488c00f549e059e69fef39642c4fcfb2039cfb867a,2024-10-10T12:56:30.817000 +CVE-2024-43532,0,1,c4a5dec645ee682c2fb747712fd0b31ac99f4ae71f14f2366a2b1d631440f236,2024-10-16T21:51:34.370000 +CVE-2024-43533,0,1,0f9ce0b0dadab4dc53059badbfdc228def8a270b47abc0d441c46b976784c440,2024-10-16T21:48:30.067000 +CVE-2024-43534,0,1,a57be74fbdb76e88ff1715c3f432c68cba04c18e2f38436ceafe7daae64c58a1,2024-10-16T21:49:06.767000 +CVE-2024-43535,0,1,0049132446f0d35210e15683b096950fb9c32f4169c47c192822e578024e1af7,2024-10-16T21:50:04.210000 +CVE-2024-43536,0,1,7a8f7ba0b0133fa843294dd8db8d534c600bb9275e1dab006d0f4719e3a0f957,2024-10-16T21:50:39.247000 +CVE-2024-43537,0,1,8169cdc8f05353907c4a6365c2ec6d7138f525169241bf2c2673e0a349bfa9a1,2024-10-16T21:51:05.800000 CVE-2024-43538,0,0,855e9da7e6b48f846fc157a254dd765bb9dc56f0d4d7f802def7c1a1aa2d4890,2024-10-10T12:56:30.817000 CVE-2024-4354,0,0,664e83e852799af34d5f786f17cdf52435e913db328cd710bdb953811fde5eb8,2024-07-18T16:14:41.387000 CVE-2024-43540,0,0,99421455f162a78e51726cf4d736fd07d0f8dd60e0a4fe07b8a115450debffe5,2024-10-10T12:56:30.817000 @@ -259754,23 +259754,23 @@ CVE-2024-43564,0,0,886ca69de72113b6dbaaa96694e01d78005a7b8e6e71316deb862bb438bab CVE-2024-43565,0,0,c466c8aab3d31d3785b78ed81988bff14a09a9e44dcf3b51840fc9b63ca0d8c7,2024-10-10T12:56:30.817000 CVE-2024-43567,0,0,5254211d003cb9dfab5d0a0274d50ed06371d19404c4e47d666432ca57706882,2024-10-10T12:56:30.817000 CVE-2024-4357,0,0,86e4d24bdc3dca7ecac9fc1438972a4a1617b1654b394ca919ca67f001ce2742,2024-05-15T18:35:11.453000 -CVE-2024-43570,0,0,88dda18dea5aab30a8b1636887b7cb6c4f34115391115ea688abc04bc8fde786,2024-10-10T12:56:30.817000 -CVE-2024-43571,0,0,f8edfb2787c1eab934cc303c5abe72e106c9e4b70ca9942d956c6f31636d811b,2024-10-10T12:56:30.817000 +CVE-2024-43570,0,1,cb1ebdbcc9f463b489680ee7f906a1b002e658802f44b1edfc93e77479cd3deb,2024-10-16T21:53:41.207000 +CVE-2024-43571,0,1,fa36d8639880a909bc9227e28caa319904ee146b710e8465c63988bc833161f8,2024-10-16T21:53:47.887000 CVE-2024-43572,0,0,94efad9fab1aec1f1c3fad704766c71ab9f5733d1a2959a700e703dee09baee7,2024-10-10T15:25:33.310000 CVE-2024-43573,0,0,7cb2a96662a466abf265ca3d01d38469acb4c1db062ef75727d0e2c8e1756007,2024-10-10T15:54:19.353000 CVE-2024-43574,0,0,a0920743051db98a99f574b7bb3a6476f4b57fe6be6e46d01afab92a0b649720,2024-10-10T12:56:30.817000 -CVE-2024-43575,0,0,fc73d17bccf6876bf61418a511f9695f1568dd7cd1aee7d4081b5fdc8210cdd2,2024-10-10T12:56:30.817000 -CVE-2024-43576,0,0,249305b9082f7eb5aedef9d41c9795b63af1c113de502f00f8de95d1c40a4c57,2024-10-10T12:56:30.817000 +CVE-2024-43575,0,1,24f2c5a591586cc897a2d8a6a2db6f48b0fde505b74f11c59d7d9cf153abc125,2024-10-16T21:53:59.407000 +CVE-2024-43576,0,1,fe1fcad43644aa438f5b12fd73a64989a355f1461202f1bc35d3359c0344ca8c,2024-10-16T21:54:24.047000 CVE-2024-4358,0,0,947921f329844fe043b805245fd7e3c28f7c0f168bb436200605d302b39b1665,2024-06-14T17:59:33.993000 -CVE-2024-43581,0,0,3408ef9f09a181497b64dcc3dcedb4431383818f60869645b5385a9474d018ca,2024-10-10T12:56:30.817000 -CVE-2024-43582,0,0,ee8e800fc27c9a765c6886a0ec7b4692b4f30050ff2f30877dee298387f20fbf,2024-10-10T12:56:30.817000 -CVE-2024-43583,0,0,496910bf3a5c58d8d30ef71a00554324066e65d62a81e2f3f536622c84a6d993,2024-10-10T12:56:30.817000 -CVE-2024-43584,0,0,49e1f81db3c49141093c0d681d3dd19c231fcb9646ebc3b0e4093eb6d02e298a,2024-10-10T12:56:30.817000 -CVE-2024-43585,0,0,4898d1c3f1c624615e5f4d4242c682115f1089245ec144c969f207462924bdfa,2024-10-10T12:56:30.817000 +CVE-2024-43581,0,1,a22e98e422ecc04b0ca934a31973c1276568d5ce765f25976494433393f91166,2024-10-16T21:54:44.573000 +CVE-2024-43582,0,1,293f560c4e09b299c2e18ac66941327f15925f69b715064473f34607ebe9fe26,2024-10-16T21:35:49.927000 +CVE-2024-43583,0,1,644d57ca5c0876327fd1914bed083468117306cb0e7b162159599db8c7b2795a,2024-10-16T21:36:59.847000 +CVE-2024-43584,0,1,362ea5a413c7ba1c32a6fee99bf2388c9e5eb62bbecc3bdbb75267eaeaf9dea9,2024-10-16T21:38:33.867000 +CVE-2024-43585,0,1,6e4f086b3b625aa729537cada88bf0b054983b8ff5768ed654837466a18e4381,2024-10-16T21:38:57.467000 CVE-2024-43589,0,0,78d47cc785569b349dce95fb2e6d8a34e6eeefcc81296c73c51c2f00b5575977,2024-10-10T12:56:30.817000 CVE-2024-4359,0,0,14ae9b130c152b886b9b21ff0fc5d35432a1812b898a1bc13704faab705127c7,2024-08-12T13:41:36.517000 -CVE-2024-43590,0,0,540bda35bad73e0203e9d35af74fa8169ca2056d2d3a63e9c6136ec610c34bfd,2024-10-10T12:56:30.817000 -CVE-2024-43591,0,0,d517d7743c9db23b79fd0ac9627b8989785700423690d15f2471e2c28723a881,2024-10-10T12:56:30.817000 +CVE-2024-43590,0,1,152277bbadbbed56789e7a47dd749f0ba30af86c181629a529a65bb7827133a9,2024-10-16T21:44:50.927000 +CVE-2024-43591,0,1,21af6b0df980a2fc5a207f146dfd7c6553b24177efdeb611a01147c3bfe2bcf4,2024-10-16T21:46:38.153000 CVE-2024-43592,0,0,7ecc81cf1723714fa4e3de1f15eac00751a7a7544d8b8c45c193cc8c2f235717,2024-10-10T12:56:30.817000 CVE-2024-43593,0,0,bdb519a73d468c07de00793af221602ccf6b3af63b116f963a7af3f2dba9f29b,2024-10-10T12:56:30.817000 CVE-2024-43599,0,0,436cb9624682226b2994331d8731c94def94e4601b3b8f7d3fac50357f2fe4b1,2024-10-10T12:56:30.817000 @@ -259799,8 +259799,8 @@ CVE-2024-4368,0,0,ebedd608e412600f3409256680729c82fcf5015495435afd7648389243e696 CVE-2024-43683,0,0,5b3f70f6659e7b7cf84d6d8bf8ec36499f5378e2912bed4caea967e8d36c4ee6,2024-10-16T16:25:49.433000 CVE-2024-43684,0,0,6491e24ba014b0f520d195f5b702da5a47c176ffcdc61829b9dd6571eb836d53,2024-10-07T17:48:28.117000 CVE-2024-43685,0,0,abe63f7aebdfc5ef80d105f6cdf8648153783ef6fae252047757e1cacc34f3bb,2024-10-07T17:48:28.117000 -CVE-2024-43686,0,1,57da9b9a959d579b6b38566543c182c3ea32961f0f4f75db16d108202427ec80,2024-10-16T19:20:57.230000 -CVE-2024-43687,0,1,2d688f9009e177644291437898c6abc2a42e1449965d5242ebc6bc49d96ae3d9,2024-10-16T19:28:09.177000 +CVE-2024-43686,0,0,57da9b9a959d579b6b38566543c182c3ea32961f0f4f75db16d108202427ec80,2024-10-16T19:20:57.230000 +CVE-2024-43687,0,0,2d688f9009e177644291437898c6abc2a42e1449965d5242ebc6bc49d96ae3d9,2024-10-16T19:28:09.177000 CVE-2024-43688,0,0,f39d1b1cd29869db949f77b65b174936ed5c42e4fb24c070ceb5bc7ef518b2eb,2024-08-26T14:35:06.680000 CVE-2024-4369,0,0,9bcc319f475d5802b53d6dedcfa6ead4761cbf7c42adde8daf6f3ff8c0c17af2,2024-06-19T18:15:11.820000 CVE-2024-43690,0,0,d9d35b70595ee9d0c288460e486611e2e8293b6f0702f7c86364e442cd6413d7,2024-09-11T16:26:11.920000 @@ -259831,7 +259831,7 @@ CVE-2024-43775,0,0,386009b272e00dd7e320eaa82eec20a93bfce64d4bcdb8a26930d34c6fe0d CVE-2024-43776,0,0,27e4419e8ce01901c27e76cb21d9618c21e34d6a14d012499c61adf6cf980a12,2024-09-04T12:27:40.113000 CVE-2024-43778,0,0,617cbe6e8002aeb0554b4bf09608badf395689487ff5457209c7f93a3188bb1a,2024-09-20T12:30:51.220000 CVE-2024-4378,0,0,09f9e04bae659373b82712486e7efa4baa3211e21ee904b68f572ef978953753,2024-05-24T01:15:30.977000 -CVE-2024-43780,0,0,5217ce0351fcb75bd7982f01c3d436316e02e5a2bb3d0e7b3ad2fd10f4519787,2024-08-23T16:18:28.547000 +CVE-2024-43780,0,1,d9608e5282027284dec0a71836db679a0d0aeb03741c7f05a7da689503d596d5,2024-10-16T20:07:50.637000 CVE-2024-43781,0,0,fe4ff27a41c5a2d11128d539a346b2aa7ff5522b07e03c5290a837b9cf154eca,2024-09-10T12:09:50.377000 CVE-2024-43782,0,0,5703533b3fa89464edfce2a0c22f8a172fe2aa48f2f15930053049c9144e5860,2024-09-12T18:29:50.943000 CVE-2024-43783,0,0,ddca1425623bacb4f350aa37099519b24871b2f03a1ef61a2ee233ff179354b6,2024-09-12T21:33:56.637000 @@ -260314,19 +260314,20 @@ CVE-2024-44724,0,0,8275388c9a55c7b39cc91e96ee195961c5f04dd9487a0f8921294249f0634 CVE-2024-44725,0,0,a55d2d013099f06bab136286a0540186f6f582fe646bcd5f9a3d4c9c9074736c,2024-09-10T12:09:50.377000 CVE-2024-44727,0,0,519c6edd63986291fddd28777499b5bf49fa3688edaaf8c8b5736fac2c095d2c,2024-09-06T13:15:09.567000 CVE-2024-44728,0,0,cb7a7604dfcd48f9cda73a0c69d9a24576616f565cbb7b44a1dd956c1a2540eb,2024-09-06T13:23:23.743000 -CVE-2024-44729,0,1,8927fd223d4ba575b179ed6c329831ef814c6d84c37bf537a737d3016ff6f41f,2024-10-16T19:35:07.543000 +CVE-2024-44729,0,0,8927fd223d4ba575b179ed6c329831ef814c6d84c37bf537a737d3016ff6f41f,2024-10-16T19:35:07.543000 CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000 -CVE-2024-44730,0,1,68e24ec16142e7e4b16db1fb49b8bca291622a943e62f8987d7002843b292365,2024-10-16T19:35:08.430000 +CVE-2024-44730,0,0,68e24ec16142e7e4b16db1fb49b8bca291622a943e62f8987d7002843b292365,2024-10-16T19:35:08.430000 CVE-2024-44731,0,0,84a9da96da62ef0fd19671f44ccbd7806fe97a6aa159a56e60da9946ddc9c890,2024-10-15T12:57:46.880000 -CVE-2024-44734,0,1,2c4788aa6c56f345d19a79974f7a25e8f33117ccbb6a849bf098c683fbf59a73,2024-10-16T19:35:09.310000 +CVE-2024-44734,0,0,2c4788aa6c56f345d19a79974f7a25e8f33117ccbb6a849bf098c683fbf59a73,2024-10-16T19:35:09.310000 CVE-2024-44739,0,0,48da2c283a8d53275b8fef0ca13127577bd8ad3471472700794962cf357a3ab6,2024-09-06T16:46:47.907000 CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000 CVE-2024-44744,0,0,83942cbf0bc52b807dc374447d58331fdab7ca8540cec1aa4efb11011d74c6f7,2024-10-04T20:15:07.203000 CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000 CVE-2024-44760,0,0,0d252ff08482783aaee88c027910c09101e7f32f15f52b69e5e2b4482012606e,2024-08-30T15:55:41.137000 CVE-2024-44761,0,0,2cb43df04a70791b0f0fb8982142da3403b663e9582e8c16ce12d7edd85714da,2024-08-30T16:00:30.557000 +CVE-2024-44762,1,1,2ff62d739686b9059a46dc5b04634beb33f83b49f39a20fa5faacfd7510ead2a,2024-10-16T21:15:12.680000 CVE-2024-4477,0,0,b275cf91a81ef0e33ced77c1c5ba5e17245e6b33fc991fd87901e463b723d83e,2024-07-12T16:12:03.717000 -CVE-2024-44775,0,1,205ee8ae27d9197291c9317d68e5db327a872699c5adb78e1d5b21baab0f0fd4,2024-10-16T19:35:10.167000 +CVE-2024-44775,0,0,205ee8ae27d9197291c9317d68e5db327a872699c5adb78e1d5b21baab0f0fd4,2024-10-16T19:35:10.167000 CVE-2024-44776,0,0,553f0ea6859d4ff6b6f354ecc1fde63fb20d3cedbc33d036b9304dfd1b315c86,2024-09-03T18:33:26.287000 CVE-2024-44777,0,0,6a3359ab703fdb561391b6cc1409dea8918b62f00651402e3928cb656c93cf1a,2024-09-03T18:33:38.413000 CVE-2024-44778,0,0,f65f6032191fc3b59c27a2ff44b0f804e08b380039ac35a42aadeb42e1c6d1d1,2024-09-03T18:34:36.987000 @@ -260694,8 +260695,8 @@ CVE-2024-45286,0,0,8f2e1da507766dacf9e0cae8531253d3a4901ee6705aefce0b8c842c2e037 CVE-2024-45287,0,0,045bfb0d53167c55abd32c57163028c51920368f50e2cf76774839485016e81f,2024-09-06T16:26:26.303000 CVE-2024-45288,0,0,955296d26f6688a711bb67949962e8bc8a5c80938f39e5cdb2e043fe3c66ded8,2024-09-05T14:35:25.337000 CVE-2024-4529,0,0,5fbb4c14219ef7d51954458b7780a68dbee769876e9489db6e9ba34bd68834fa,2024-07-03T02:07:42.220000 -CVE-2024-45290,0,1,47b2969bc1a747d3ad8c94a2a1403ba705f7312da0ef51083401cc2cbbe8b318,2024-10-16T19:54:53.397000 -CVE-2024-45291,0,1,d43c3b21f765f29ad064a7621a2d1e18446d51e2e184bc6e561edf1a1c4d2c29,2024-10-16T19:09:52.697000 +CVE-2024-45290,0,0,47b2969bc1a747d3ad8c94a2a1403ba705f7312da0ef51083401cc2cbbe8b318,2024-10-16T19:54:53.397000 +CVE-2024-45291,0,0,d43c3b21f765f29ad064a7621a2d1e18446d51e2e184bc6e561edf1a1c4d2c29,2024-10-16T19:09:52.697000 CVE-2024-45292,0,0,e6e59897c6adcfbffa941572d5833988c8c05ede32b9058681f709f7731a274c,2024-10-10T12:57:21.987000 CVE-2024-45293,0,0,430350ec91188531418760350e8f549756bfaa1ced9621751a07b456acea4484,2024-10-10T12:57:21.987000 CVE-2024-45294,0,0,571ccadaa63af3685b6ee82cf020ce004878004e5a04088787ea6924189ffc78,2024-09-06T17:15:16.977000 @@ -260948,9 +260949,9 @@ CVE-2024-4579,0,0,b44e5adee861e75c9f2de9111724b513cf79b7a7dcd7134192d107fac17822 CVE-2024-45790,0,0,339d5c59c4b08184225ef02e77057a5607db1e407fbacc8325ce6de4811d4a59,2024-09-18T18:38:04.393000 CVE-2024-45792,0,0,5abb7de999f910eaa61796ecbea33f574a65653e2aa062ee4c5c2e229e356bd5,2024-10-04T13:51:25.567000 CVE-2024-45793,0,0,9df195d476b9f18fe89dd15d9de75cbf87671a956c83113b39ce1c0cbc87094f,2024-09-26T13:32:55.343000 -CVE-2024-45795,1,1,7f2b2bba09914a193d06ae7cc31a277d11f4db6bc0af3a322ac2c67e50856100,2024-10-16T19:15:26.660000 -CVE-2024-45796,1,1,38453092b0c3d6269258fb97464079cdc0bb1fb11ac62b3eea65f9391fffc169,2024-10-16T19:15:26.923000 -CVE-2024-45797,1,1,bfeb319b0be9eb20cbdca1f21b11e65a8f6d9b5f57d4808f7de637d932e31cb9,2024-10-16T19:15:27.177000 +CVE-2024-45795,0,0,7f2b2bba09914a193d06ae7cc31a277d11f4db6bc0af3a322ac2c67e50856100,2024-10-16T19:15:26.660000 +CVE-2024-45796,0,0,38453092b0c3d6269258fb97464079cdc0bb1fb11ac62b3eea65f9391fffc169,2024-10-16T19:15:26.923000 +CVE-2024-45797,0,0,bfeb319b0be9eb20cbdca1f21b11e65a8f6d9b5f57d4808f7de637d932e31cb9,2024-10-16T19:15:27.177000 CVE-2024-45798,0,0,36d6c14bd6da02b6f563e24f34a8e0ae70f5e9226b87bf40201ee0b5fcb96dec,2024-09-20T12:30:51.220000 CVE-2024-45799,0,0,57236f37d51cb52dc4abff4e8ae9968f58089f5668de4fddcdb24ddcded04f03,2024-09-20T12:31:20.110000 CVE-2024-4580,0,0,f99138bfd0684bd0d747f9e33cce7b8336876269ba637f66c2865bb254a7b704,2024-05-16T13:03:05.353000 @@ -261087,6 +261088,8 @@ CVE-2024-4618,0,0,c37ae26f2e1f44a703054cee4816ca3bf0ad845eefa4a632c5bbef4a4e755f CVE-2024-4619,0,0,4a40c989d02466215a13e8ebc90eedd665aa01db8dc0a625ac187e77f54f90ad,2024-05-21T12:37:59.687000 CVE-2024-4620,0,0,1935a4a456c9356aa20baa9af9ee846c5d3912db31523d71d257746ce19dd702,2024-07-12T16:12:03.980000 CVE-2024-4621,0,0,2ba6d981e4d5b6f91910837209ceaa779e2d1828d6d78fc3d542c33aa869820e,2024-07-03T02:07:50.963000 +CVE-2024-46212,1,1,4db661eff0848dce341d88024ce63c31a51a3ec381e534511d409c5894dab839,2024-10-16T21:15:12.840000 +CVE-2024-46213,1,1,5a52b6eab6443e3c76212518a3da42f984cb223ac12eb0e4a634c0406066512c,2024-10-16T21:15:12.947000 CVE-2024-46215,0,0,d9c9b41b37ebb8d2c46b9303b2f662f08cd28b45185e47d3a9c15d51a3370a31,2024-10-15T21:35:30.590000 CVE-2024-4622,0,0,7ee7f5b0dbbae0efd9526a317b5150a2af537411986feb7d056b697fe5fc8d53,2024-05-15T18:35:11.453000 CVE-2024-4623,0,0,c53a127683caa8cc49c11a88cc217ef787af901116f1ba89c4741730eb1cc926,2024-06-20T12:44:01.637000 @@ -261178,7 +261181,7 @@ CVE-2024-46511,0,0,78cf785de24718da0c0ea71257e191470c834e4be61ca79ad4d72c264c3c4 CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a541,2024-06-04T19:20:44.873000 CVE-2024-46528,0,0,229b9bb15493caebdf3e208d9a8202b04a5b638f9227848df207ebaa53b79ee7,2024-10-15T15:35:16.373000 CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000 -CVE-2024-46532,0,1,28e90e41b88b199c93bd44748203fc4edc0b214d52c53df9729e48aaafb51060,2024-10-16T18:35:05.480000 +CVE-2024-46532,0,0,28e90e41b88b199c93bd44748203fc4edc0b214d52c53df9729e48aaafb51060,2024-10-16T18:35:05.480000 CVE-2024-46535,0,0,303f432dafe76053288b97daeba04961b685b8c5980dad6e5d762d1f5502c318,2024-10-15T16:35:08.740000 CVE-2024-46539,0,0,2d2c57643421ecf3202df41ca86f61b87e91435ec045a273724c1fd7bed0cf14,2024-10-10T12:56:30.817000 CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000 @@ -261228,7 +261231,7 @@ CVE-2024-46597,0,0,8f236358fa12b20d7d532e9a104df6fc7e0ce7ec4a140308bc23ebcdc1614 CVE-2024-46598,0,0,3f997be93c6377cc697c394dfc90ddad6cd8938191b35fea7934308cfcf432e0,2024-09-24T16:37:39.833000 CVE-2024-4660,0,0,e2da4ceee6df96a1cb7e9b187d6ffc85e3946e3cc1d921567db2bce412f91772,2024-09-14T14:57:01.130000 CVE-2024-46600,0,0,cae524fca9cb69012594d951fa8090d3fe8d1cfa0f217e7dac4acb986038e2d7,2024-09-26T13:32:02.803000 -CVE-2024-46605,0,0,3176916096b1a1b5998ae7b798bb17e81507221fcf47290c08a87a8438d2f10a,2024-10-16T17:15:17.023000 +CVE-2024-46605,0,1,ce2dab57c9c2c2a5dbadca8e13c7c48c362b8d13253740409e0aec0f8c212299,2024-10-16T20:35:13.927000 CVE-2024-46606,0,0,9fe3e4a1abd61c6f2049b26e9ca3c14aa3a001d844f149b92b0cb396c31127fc,2024-10-16T17:15:17.117000 CVE-2024-46607,0,0,19b52a4f221a81e7b0e70e694b13b9c3dc0a4fb6554fee97e54b7afadc8502a3,2024-09-26T13:32:02.803000 CVE-2024-46609,0,0,867378c24ca26a245e4713a4ba27c2af9d0d9faadf75c67789542038576759bd,2024-09-27T16:35:03.627000 @@ -261622,13 +261625,13 @@ CVE-2024-47182,0,0,e5cdb75305d71a5fc3653b4e9f8414538656f5f17a6a2cce9e83d34199d18 CVE-2024-47183,0,0,0b76031324ee2fb120db4824ba5dbb2c20e3fad1aa53ab61ba1485112276da67,2024-10-07T17:48:28.117000 CVE-2024-47184,0,0,ec4f2d4aa381d6be3b04a5d96e034e76004fe037b3abeb496a459d57a9fce134,2024-10-04T18:19:26.240000 CVE-2024-47186,0,0,039f38f277124d2a0772e43f534fb151851ccf4c65185f4966f7e81d742991ce,2024-10-07T13:30:55.640000 -CVE-2024-47187,1,1,65cb98609c05a673b2ae445e27da71ac0342350704f4bc5a7adf09735e0292e9,2024-10-16T19:15:27.407000 -CVE-2024-47188,1,1,5d83036cc4ce25c59a1d4fa4fd71a70c8aa237ff50b0cc57bf3f901f4093143b,2024-10-16T19:15:27.670000 +CVE-2024-47187,0,0,65cb98609c05a673b2ae445e27da71ac0342350704f4bc5a7adf09735e0292e9,2024-10-16T19:15:27.407000 +CVE-2024-47188,0,0,5d83036cc4ce25c59a1d4fa4fd71a70c8aa237ff50b0cc57bf3f901f4093143b,2024-10-16T19:15:27.670000 CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000 CVE-2024-47191,0,0,2d0ea97c75991dd32a2813bf0ef51251f3610baaa622ce7906ea2e3545fc5ab0,2024-10-10T12:51:56.987000 -CVE-2024-47194,0,1,0afa0b09ca6b7bbd6bd860b01b5c9153eec47be962883f1807d6c455d470088c,2024-10-16T18:15:04.043000 -CVE-2024-47195,0,1,13778db546c78cfe27d2d127a511510e1d599b625eb31f21fc4e65992e2127a0,2024-10-16T18:11:29.990000 -CVE-2024-47196,0,1,854c9d23e22c82e5339f8a331c929fb519fa43506b02445ee87a1d94228daed1,2024-10-16T18:07:38.850000 +CVE-2024-47194,0,0,0afa0b09ca6b7bbd6bd860b01b5c9153eec47be962883f1807d6c455d470088c,2024-10-16T18:15:04.043000 +CVE-2024-47195,0,0,13778db546c78cfe27d2d127a511510e1d599b625eb31f21fc4e65992e2127a0,2024-10-16T18:11:29.990000 +CVE-2024-47196,0,0,854c9d23e22c82e5339f8a331c929fb519fa43506b02445ee87a1d94228daed1,2024-10-16T18:07:38.850000 CVE-2024-47197,0,0,e4a1d8789bd0c967523f7418fe544ba10b0b511b96a39b8a241e5a1afb5230b4,2024-10-02T17:25:36.990000 CVE-2024-4720,0,0,eb5b6c06efbc2e8e5b700d46905e09781ba603e4dc4e18ff8664640e85fa6762,2024-06-04T19:20:47.440000 CVE-2024-4721,0,0,58190a4c7e114543454f0451ab9386f5b2fe1b56ab67d3c8b011dbecb251f4fd,2024-05-17T02:40:34.750000 @@ -261795,6 +261798,7 @@ CVE-2024-47508,0,0,429956ab48f11c14bf051f4f1bacba4ac8df38416461ca7db82bee8d071ff CVE-2024-47509,0,0,76ece07115d6fe55eea56c310deff86334b962222c61b334eea857efd424bcd0,2024-10-15T12:58:51.050000 CVE-2024-4751,0,0,258479d9744cea39d1125b819c638c567793396e05305e64bbc0e320bde2cbf7,2024-08-09T19:35:10.473000 CVE-2024-4752,0,0,6bc9a9ea56288a6bdc9797f778ecc1371bb94f8257819cae6e07cdc5634a3ca3,2024-08-01T13:59:33.713000 +CVE-2024-47522,1,1,3fdd880817a9ec1e2154652b7d1c6d578296981e6bb27b59eafa907386bf86e9,2024-10-16T20:15:06.083000 CVE-2024-47523,0,0,22d43e6df5f74e6749ea10e7fe6523466b29bb84b684bbdd4f0562f87b193f88,2024-10-07T19:07:30.287000 CVE-2024-47524,0,0,77296b251ba1494f06bcdfbc6ea161d149e1205d582f48b9fdc9c430ceb9a466,2024-10-04T13:50:43.727000 CVE-2024-47525,0,0,8339d8a4218b69cc82268cff155d0d4fed2713f73ada7785c822ea6568feb0cc,2024-10-07T19:08:18.707000 @@ -261950,6 +261954,7 @@ CVE-2024-47830,0,0,457ed410238dd49134235c9291fcb215f555d7bf33b38d5e70e7cf82b4377 CVE-2024-47831,0,0,8378040ad1670275264457c73829ff18d4decae710e794487e001c672444fba8,2024-10-15T12:57:46.880000 CVE-2024-47832,0,0,2db718b13b3751bc3ef92e2930bbfe31f27f0a24beb6f2f6f579c1ed94f36d1a,2024-10-10T12:51:56.987000 CVE-2024-47833,0,0,6fec3debcf8c22e7cca5edd580a7219cef06b49b718a5106f83d6e8ff52a9663,2024-10-16T16:33:34.493000 +CVE-2024-47836,1,1,b02d3e91f06d58665de123d3af0debabd27fa7bfbafc8a4245978409bf654021,2024-10-16T20:15:06.350000 CVE-2024-4784,0,0,4cc2a5a387e2d44a289947f3cae3cd294fd9977dc8f62a4a2754567f4ad78544,2024-08-23T16:59:30.430000 CVE-2024-47840,0,0,c2ff7b850c32ab1f0cd524b652cd23069ad0261af0dda33ffcd5ed7e8a17367a,2024-10-16T16:44:54.440000 CVE-2024-47841,0,0,5965eb4de1da8f2a0dd0895a3f88b849e9e6237b2cba12893d6c98b9d53e6e0f,2024-10-16T16:34:31.173000 @@ -261977,6 +261982,9 @@ CVE-2024-47877,0,0,42d52e9a067bcb9f8cadc0b4324eaa32d4b8c11c11d62f0e9296f0c93d92b CVE-2024-4788,0,0,036e4ce9e476328c73022572d41365684f416f1f77ea3a1f5e72bdd2454ce2ec,2024-08-05T20:23:52.467000 CVE-2024-47884,0,0,4b7292fdbf8233f599cca6380416fda96798ff386a0442d2b37eeea12dd398ed,2024-10-15T12:57:46.880000 CVE-2024-47885,0,0,0d40ba494c86913544c4c9553c55befe8904b360cb2214c55ae6a6aeadb78d12,2024-10-15T12:57:46.880000 +CVE-2024-47887,1,1,96d0dd568a8a49b3d7a4289f6619d1534c318426b5d7e86f721569f8b68b052d,2024-10-16T21:15:13.053000 +CVE-2024-47888,1,1,2aee8cc080352d2505fc5c075253ff58615baa7861ff37351e279238a0d599a8,2024-10-16T21:15:13.180000 +CVE-2024-47889,1,1,98b6da2d6477ff6b4a2a697aff1dbe5afaaf55dbd41145a6f93e75c7e93a8511,2024-10-16T21:15:13.320000 CVE-2024-4789,0,0,991c3c0809892f7a4ebcc223f96155782fc07af160e30bd64d5fbc63735bec50,2024-05-17T18:35:35.070000 CVE-2024-4790,0,0,96aecd7cd4f769c190cdd6309a2627db4d493e5cf9efda536a135cb9a7f4eb96,2024-06-20T20:15:19.883000 CVE-2024-4791,0,0,45f7f0badd9eeca0c08f0ffcf78bd3c1e9a171e1e79fba42777d793a804985ff,2024-05-17T02:40:37.090000 @@ -262048,6 +262056,7 @@ CVE-2024-4816,0,0,8565abd2d0a6378ede6981ddf7bac1f2251b8eaa5cb7a310b72a2f14c255bb CVE-2024-48168,0,0,0fd63dbc86b3cb12d110bd22d9d904e3f3202d39864d2923ce46e572ac34fcfc,2024-10-15T16:35:11.240000 CVE-2024-4817,0,0,34b565d993de0f23b2da3e66a459da3d9e976182c7f2db8f77c4f90d033797ec,2024-06-04T19:20:51.393000 CVE-2024-4818,0,0,3fe1d5f18f9b194d5b3db8480cedce43b94847211b0e14441f0f1578988c6d95,2024-06-04T19:20:51.510000 +CVE-2024-48180,1,1,410c65120ffe84cc291bd2a8ba47b2e3cb3bed020fb800a8d16aa5bce80e8adb,2024-10-16T21:15:13.457000 CVE-2024-4819,0,0,bc26e072d222c9731ee42bb1198fec18f8f3236e713c07e319d531bbf6577caa,2024-06-04T19:20:51.613000 CVE-2024-4820,0,0,832738c431d4032e72cf5367ea2c2310b7c6cd840d9bc0fc3f10b9e1f0e05ed2,2024-06-04T19:20:51.710000 CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093af,2024-06-11T17:29:33.213000 @@ -262075,7 +262084,7 @@ CVE-2024-4838,0,0,18fa2348db877da11c5078171d002c78cc86239f9092091ea1ecb3106ab228 CVE-2024-4839,0,0,b71f0924b0409cbf87c224c453882d6c9b4eee1b8a725627eb630ec6587a6e2b,2024-06-24T19:26:47.037000 CVE-2024-4840,0,0,e883b61cf74d34d59484fc9e98d49b7c4a3e1a85aadae7b936258fde00012f35,2024-05-14T16:11:39.510000 CVE-2024-4841,0,0,65ebfdfe2681835a6b4ece6477d685d2c79df9dc285d61b3c6847a6703ab5189,2024-06-24T12:57:36.513000 -CVE-2024-48411,0,1,f02f5a173c68a1066ae1d0ad3ecb091448747ebc7ae5d98814db8ad4f2b7f72f,2024-10-16T19:35:11.290000 +CVE-2024-48411,0,0,f02f5a173c68a1066ae1d0ad3ecb091448747ebc7ae5d98814db8ad4f2b7f72f,2024-10-16T19:35:11.290000 CVE-2024-4842,0,0,266948939b8663b41b45dca8cb12f3f3247c17eab2663a8a73d7a0fbf198d426,2024-05-30T20:15:09.703000 CVE-2024-4843,0,0,b365eeabe96e8dec3f961357ff342df21bbefef716d14e64f95fe3929d1e363a,2024-05-16T13:03:05.353000 CVE-2024-4844,0,0,b1cdfd63abb8075cb2a12dc44eacca2f75c6048adf9c4ea8b8b7c6072669030d,2024-05-16T13:03:05.353000 @@ -262111,8 +262120,9 @@ CVE-2024-48714,0,0,5966fa7e4cea1148b0617541f87717ad0f7359afa5da2d98079f2bad16d0d CVE-2024-4872,0,0,c60d4ff9e5499bf7427bb540017644c2677aac5e300662a3bf0eae497fb13b4d,2024-09-05T09:15:03.743000 CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000 CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000 -CVE-2024-48744,0,1,8e19cb42cde15715851c57e1c66000fdbf20886f6db4ceeb1bd088f8a6da228c,2024-10-16T18:35:07.013000 +CVE-2024-48744,0,0,8e19cb42cde15715851c57e1c66000fdbf20886f6db4ceeb1bd088f8a6da228c,2024-10-16T18:35:07.013000 CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000 +CVE-2024-48758,1,1,3347caed90386feb4c7a47d345572a30c9cd625ff8c71a5a50d35b79e9679501,2024-10-16T21:15:13.557000 CVE-2024-4876,0,0,6c7ef7cd93a9d659be2199330000de11a6027348fd6a9308e40ba12083e70d2c,2024-05-21T12:37:59.687000 CVE-2024-48768,0,0,91e2c6ddcec0eefa58d2f68380e387364241aaf16f381d6cb6f91314ddf06c84,2024-10-15T21:35:32.950000 CVE-2024-48769,0,0,111cb6e3b59af6f41642c6c2c5b8c53bc420797d62f026a9cd65018ae24e939c,2024-10-15T19:35:39.423000 @@ -262126,8 +262136,8 @@ CVE-2024-48776,0,0,af432ddb24c7bcb7ce84fc64dfda91ca17d324ea8a4b812d9d11a65d3b30f CVE-2024-48777,0,0,54c3f1ea2e45e8317008bb4fa68d7dedc38bc1a3751236b3d316d88496c43ce3,2024-10-15T19:35:41.067000 CVE-2024-48778,0,0,84465a6cd0aeb1f5e7a79a50b406c02904acdaa29d8045952a59d45351acb806,2024-10-15T19:35:41.840000 CVE-2024-48779,0,0,7b4bb1d752e381da83c42e25ca59d9912028ca40f0e66b0a1345f52c39afdf93,2024-10-16T16:38:14.557000 -CVE-2024-48781,0,1,def8da40d2e3000f84547055f8a8e1f07c6a72e8f93e09b1e29d5c94bce33085,2024-10-16T19:35:12.160000 -CVE-2024-48782,0,1,657280405f72b96cca8d15f0169a0c59717f325a8a72d146f1dff61ffc4a85a4,2024-10-16T19:35:13.023000 +CVE-2024-48781,0,0,def8da40d2e3000f84547055f8a8e1f07c6a72e8f93e09b1e29d5c94bce33085,2024-10-16T19:35:12.160000 +CVE-2024-48782,0,0,657280405f72b96cca8d15f0169a0c59717f325a8a72d146f1dff61ffc4a85a4,2024-10-16T19:35:13.023000 CVE-2024-48783,0,0,65a7d4b97d776e14fb7a33b5e88d0b321e1319708ab5e5dbf5ff39c3a5eb36cd,2024-10-16T16:38:14.557000 CVE-2024-48784,0,0,b17d7d33d987ccc732abbbed7a19a2cd24322765e46d4a5e12c5048ecd3b3022,2024-10-15T19:35:42.627000 CVE-2024-48786,0,0,356725ffde0ce97cc052a45790af4a3778948dfbfe170e13c7ea8d62a13a4603,2024-10-15T19:35:43.413000 @@ -262135,11 +262145,11 @@ CVE-2024-48787,0,0,6d2ea7e3a85defa8b6f92bcb4641f0fb3472eedc1d016221be7f4707cb95d CVE-2024-48788,0,0,d49daeb800740f0e90355e5fab9ca765541a870f5f806cc24938c90cbcb96ed5,2024-10-15T19:35:44.980000 CVE-2024-48789,0,0,5f592c36436047d58bf382ebdc10d7cfe3a178af546d803f30cd03c06e0e8ad4,2024-10-15T15:35:19.560000 CVE-2024-4879,0,0,49a8b41ea605df8bd1da4063a7058b50435504f1dbecb0dc4bcc8efa8c8e8867,2024-07-30T15:13:39.720000 -CVE-2024-48790,0,1,b235a3522bcf91277866ff181181d33cd39bf5fee0121fcd68436c0334d82527,2024-10-16T19:35:13.893000 +CVE-2024-48790,0,0,b235a3522bcf91277866ff181181d33cd39bf5fee0121fcd68436c0334d82527,2024-10-16T19:35:13.893000 CVE-2024-48791,0,0,cee0a23c7df15be93fddb008f000fe0bf9be40f59d5c9806b782ce26b20a6a61,2024-10-15T15:35:19.917000 CVE-2024-48792,0,0,f0468a8723df3ecc044b28f7bf95d6c4f917c9f33598ee95b354cbcc674cafbd,2024-10-15T15:35:20.183000 CVE-2024-48793,0,0,d60db5162195c233da466b1dfce9be08b3c0ca1d20d0bb55e0a4937af9154f66,2024-10-15T21:35:34.713000 -CVE-2024-48795,0,0,3ba44c809bccc74424c36040f3837b0bb086ec1f910a55507b2cf216568d50ad,2024-10-15T12:57:46.880000 +CVE-2024-48795,0,1,69ffa845fdd95b805aa99d48cada74f79ebe67b4e8cf1906f6cd768972ba18a0,2024-10-16T20:35:16.150000 CVE-2024-48796,0,0,1e14f7498f727da73668bbab5fa9c3e26a7526443607be49f5cc1b64f9aed9ca,2024-10-15T16:35:14.433000 CVE-2024-48797,0,0,84ec47d2f0875bb5f244804e75fe25176b42fd271e656bf8a6c457b2cefda79b,2024-10-15T15:35:21.060000 CVE-2024-48798,0,0,456e6efd1999d161e08d7d92b829aad7f771e38427be013211a406399a3cd174,2024-10-15T16:35:14.783000 @@ -262167,6 +262177,7 @@ CVE-2024-48911,0,0,e0b0f376339137788c8f5f310259d6e022437aed42d17513390da35e83b91 CVE-2024-48913,0,0,06d6a212c655b7ac1bbc6f5a3509e81cf89d4f1d83017b87d6e9303af3084bb1,2024-10-16T16:38:43.170000 CVE-2024-48914,0,0,8775ce8f63d45f4e21be0399438c25117df9f166b6335c0adfec50056398fb57,2024-10-16T16:38:43.170000 CVE-2024-48915,0,0,53434c02f8cd9e61d046160183bd56a99da2a89b0bd423c79e06c9bddd2f90b1,2024-10-16T16:38:43.170000 +CVE-2024-48918,1,1,83e2bd9ebcecad4a2651c905f471b8729ea3e219151f83a14b1e27ec710b9795,2024-10-16T21:15:13.650000 CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000 CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000 CVE-2024-48933,0,0,eab55cc4133fd12eb852707496206c0c064cf1bfef188e95346821cf2dadf897,2024-10-15T18:56:52.363000 @@ -262205,7 +262216,7 @@ CVE-2024-4916,0,0,7f9c97d60056af6520ce5e52312d7e3a0a1a6112ce8355fa197ec22854a966 CVE-2024-4917,0,0,6cef1f1b9c67b0bba74556ced18fc262fe370a97a734fa36d53272fcc01b0da0,2024-06-04T19:20:53.527000 CVE-2024-4918,0,0,d46f8a4fb764a0404096a5c058a93218c921ca6c4bf015a8f26430856edda636,2024-05-17T02:40:42.037000 CVE-2024-4919,0,0,c726f606173904c8377395d864d6d1f0bfcdbe8df42cdb4cc2d61ca12557d877,2024-06-04T19:20:53.633000 -CVE-2024-49193,0,0,2fb765324a8f2d36d4e9310c3432afa1ec5d25e41e48c037c8d4a9b584ba6a95,2024-10-15T12:57:46.880000 +CVE-2024-49193,0,1,4817bc5a524f8686c9c390cc6499f217005a03a967baaa28cc06a1d405a85c45,2024-10-16T20:35:16.380000 CVE-2024-49195,0,0,d5b14eb2c31777fd8bfb897e0df514a64c98c0213ff27d255d8e6b92e332f5fc,2024-10-16T16:38:14.557000 CVE-2024-4920,0,0,fb11a98a98fcee227749c982e12efa14a4a4b18da858cef87f2552ce91a0c62d,2024-05-17T02:40:42.227000 CVE-2024-4921,0,0,1060b5013f8dc8547f0f33cabd337061fb69f6fcf324e5387138007cbeb6a9c1,2024-06-04T19:20:53.730000 @@ -264966,7 +264977,7 @@ CVE-2024-8227,0,0,7fb87bfd0eb03c7bed066ab334d7081c8d7faa01ad6e62bb8c684ad60388d2 CVE-2024-8228,0,0,93a2ed289eaee58adcb93cda42520d2efec521ebb9601fd9e70d3a991a36c958,2024-08-29T00:11:21.440000 CVE-2024-8229,0,0,b4e82f248689c551a8c2d56510132af8816aa6c16d8f7b5aa18c38850899c5a7,2024-08-29T00:10:09.807000 CVE-2024-8230,0,0,51972d3a01eef60d4ec2fcebcc43d9f517d40a0a396b61ca7c24bdef0d5fcb4e,2024-08-29T00:08:24.643000 -CVE-2024-8231,0,0,19b769716e3fff898a72bf0ee7d68779b61ab99af63bed31a0498759613ebd4e,2024-08-28T12:57:27.610000 +CVE-2024-8231,0,1,446131483e8b45e43bdf8638b1d57bddc78ae79290a43024fb0cbf42d668bb64,2024-10-16T20:01:30.877000 CVE-2024-8232,0,0,5572b7d7bb007c2d5d81196fae90ff25fc17db53d2496173f3c02b5439ff5273,2024-09-11T16:26:11.920000 CVE-2024-8234,0,0,870a131a53db84d6497bde7de38de6b7411ad7686be0738cd78fff93fab14909,2024-08-30T13:00:05.390000 CVE-2024-8235,0,0,b786ef24a32ef6e274d547283632e384bd9e424c03fcdd4e02e8982f754d2de6,2024-09-25T18:56:19.090000 @@ -265098,7 +265109,7 @@ CVE-2024-8416,0,0,135a04ecfe4373dd7e99d043d76128d31e33f9197f002be9000b3ee4a6fb84 CVE-2024-8417,0,0,8580cbd844a53cf335c90d7b0b427ee4c081c6060c525d72a654406a58e7a040,2024-09-19T19:53:12.383000 CVE-2024-8418,0,0,45db7c5e32209561e336e52f972f2bde6e59f6364560666284054dcf874b8fe1,2024-09-17T20:15:06.710000 CVE-2024-8421,0,0,d73687c7a440fd8723ef6583db3c90a2a943a5b89a22a06b8eb401f91173afbd,2024-10-04T13:51:25.567000 -CVE-2024-8422,0,1,719afb1520795869e1cc4a3e221732b33ebfb108c1947a89f9c81c8469a6d752,2024-10-16T18:00:10.507000 +CVE-2024-8422,0,0,719afb1520795869e1cc4a3e221732b33ebfb108c1947a89f9c81c8469a6d752,2024-10-16T18:00:10.507000 CVE-2024-8427,0,0,57dcbf97b68dfdac544ef9faf52bed3587edeaacde16f067da96879677802837,2024-09-11T17:41:18.733000 CVE-2024-8428,0,0,224fe311bf12d06d4c690b8d9ea3bc4f42261bcb370dc3457883b86fb932f74d,2024-09-26T21:58:45.393000 CVE-2024-8430,0,0,55a9f0c318551ddd036fdf97a76cda9a73c7561d06c4df941f7c206a6547670b,2024-10-04T13:51:25.567000 @@ -265404,9 +265415,9 @@ CVE-2024-8918,0,0,a139fa98c762213efbc8dcac6978c26e1be1ed82aa4c6eeed1f671b900ced8 CVE-2024-8919,0,0,e01b61fd584c4fffdfd8e5db7a09e1be1033f5c7df5b5418d10948726a2bc540,2024-09-30T15:08:14.077000 CVE-2024-8921,0,0,284c01e369230b6750ee6b9940d65eaadc6d5f92caf4598fee3000ae2f72d29e,2024-10-16T16:38:14.557000 CVE-2024-8922,0,0,8e0e34187cf2453e3fbc920fc9b2ec5c27a6978605c90cb2daa5d0ef90213fbe,2024-10-04T19:11:47.217000 -CVE-2024-8925,0,1,7b6e4b4e016d861119aaef8d6752703732a07441653d2fc6f49b309099d5a5d4,2024-10-16T18:53:39.957000 -CVE-2024-8926,0,1,a754d1da087a38a540f43b496a74701704f80b11b38ca93965866e0a4f56c5ab,2024-10-16T18:35:59.500000 -CVE-2024-8927,0,1,111a4443e95a74bdfce7c0d0d95c5c978a35ed475f30166e617d9fcf08b6e72f,2024-10-16T18:28:34.573000 +CVE-2024-8925,0,0,7b6e4b4e016d861119aaef8d6752703732a07441653d2fc6f49b309099d5a5d4,2024-10-16T18:53:39.957000 +CVE-2024-8926,0,0,a754d1da087a38a540f43b496a74701704f80b11b38ca93965866e0a4f56c5ab,2024-10-16T18:35:59.500000 +CVE-2024-8927,0,0,111a4443e95a74bdfce7c0d0d95c5c978a35ed475f30166e617d9fcf08b6e72f,2024-10-16T18:28:34.573000 CVE-2024-8939,0,0,1f70befe339fdb31af424859012581aeb13e8f518e2f8da7bf31e05da17f11bc,2024-09-20T12:30:51.220000 CVE-2024-8940,0,0,8c62b13b4d198a54cb56580861e41476c7bb8758f7b9eb8762dc3ff8a4d7701c,2024-10-01T17:21:01.550000 CVE-2024-8941,0,0,92a203d8a6a94e9c82aca27b5b4eb25cc17b0659508e43ff25edbb70a0d6f393,2024-09-30T19:45:43.223000 @@ -265455,7 +265466,7 @@ CVE-2024-9022,0,0,c00a992a9cf89bb9fc2e7a7f0a333d7cc66e835cec72c4bd4d9ee62b68d658 CVE-2024-9023,0,0,8856d7ffdca739d2c0d1b85fb1ee05faeaf6947167077ac20feaa24f6c509db2,2024-10-01T14:39:38.370000 CVE-2024-9024,0,0,29f2f073ee82aef300cee3fd954ac6dc4243aa67d5082fca2a65737992da04c1,2024-10-02T18:02:59.683000 CVE-2024-9025,0,0,8c34a0621e4e149deefb96042ae2c7c0174789fb7b5db2c9c1ef1c4077be46cb,2024-10-01T13:44:23.667000 -CVE-2024-9026,0,1,e1bccc8b5b2dfca0a76239e472c10acc1880f40f26ae40f40cf5d31366c05bc2,2024-10-16T18:30:37.133000 +CVE-2024-9026,0,0,e1bccc8b5b2dfca0a76239e472c10acc1880f40f26ae40f40cf5d31366c05bc2,2024-10-16T18:30:37.133000 CVE-2024-9027,0,0,f3828020bd9a05a5e8ccaf0c12e55b05c6a031d2d0b0e5c28efac160e51428ac,2024-10-02T19:42:31.563000 CVE-2024-9028,0,0,12ca3746b7fb03c9df5889561116f4fbc62436426375b30bf910f3c4d7d8403e,2024-10-02T19:45:00.813000 CVE-2024-9029,0,0,9076ca7374bbbeb2209faec4a2cd78108bb0db6f5ed66892cd6b13e6647405d7,2024-09-30T12:46:20.237000 @@ -265868,13 +265879,13 @@ CVE-2024-9944,0,0,0105315be1482473acf9cccf2807cd53dd651f41a7a3739bca8c3d692de031 CVE-2024-9952,0,0,d5c643eb1b76a39b13753ce231704557bf9fa9c82efce6d96f1e313e65eab479,2024-10-16T15:05:13.467000 CVE-2024-9953,0,0,d4420057cd6ff540e58057e827a120bd402b45b9e9ab6580a72e462bb02065ee,2024-10-15T15:15:13.660000 CVE-2024-9954,0,0,0aceca2bdabed823c6b0aded99883effe44fb9f2c345d4baec5c14dedba32864,2024-10-16T16:38:14.557000 -CVE-2024-9955,0,0,a30c882a6805f4a2b73c1acc497812ff36508b6f9cd6f22dd52b4cb0bc262a26,2024-10-16T16:38:14.557000 -CVE-2024-9956,0,0,21aba864b0ab830dc92060cf83aaf86d520a32bd6d89453773fddaae1064ad42,2024-10-16T16:38:14.557000 -CVE-2024-9957,0,0,1ff80b259509a301a2452119ee5b7f828882f5a76713b2b283619cfa3ebfd2a7,2024-10-16T16:38:14.557000 +CVE-2024-9955,0,1,45227aa1cd093efa9a4d5133239326b3e68cacdbc4de50b61ed9b49144add304,2024-10-16T20:35:17.940000 +CVE-2024-9956,0,1,f974b5a7bcf66a4da7ddae62205b6111a86377bd67b3bba6f556f380d6e0b73a,2024-10-16T20:35:18.800000 +CVE-2024-9957,0,1,e55008b91f9338515eea34db34c434c139087d4bdba7009fe84d45d746e6aad2,2024-10-16T20:35:19.063000 CVE-2024-9958,0,0,f2448441dacf12a1223f94af81354b97ebb405a665a1753606f36efb734673b1,2024-10-16T16:38:14.557000 -CVE-2024-9959,0,0,86f6361e373a6ae37f02a812d07662bd09b6b8e0547020001efa9db922c10be3,2024-10-16T16:38:14.557000 -CVE-2024-9960,0,0,9181446c595fdb4320521776ff6273ac93516c23a4c6ad3de3ecd667b780f942,2024-10-16T16:38:14.557000 -CVE-2024-9961,0,0,4ce33191dafdad8d79df385a85715031c62bb0fc44fade819c59dc44d6b307fd,2024-10-16T16:38:14.557000 +CVE-2024-9959,0,1,f42a4e43f40e8e819988afbd4b2057babc53bd27688b429c0f1c819f28777654,2024-10-16T20:35:20.050000 +CVE-2024-9960,0,1,1b8371ce736760705582ee9841571f4ddc63824af07fc9b009af9fb0c6305ca8,2024-10-16T20:35:20.890000 +CVE-2024-9961,0,1,2aee6d8afe041582df48e602420be34df5111931bb65c37c44e9e652ea0fd7b3,2024-10-16T20:35:21.773000 CVE-2024-9962,0,0,25a185b79545d58e28bd1c1535f447c14ef8d3545a863359e57f54a1d71030a3,2024-10-16T16:38:14.557000 CVE-2024-9963,0,0,193124156d5fed92ac7d2793036ac7bf4f2fb2fdc7aaecea1fda7e2bbc549d43,2024-10-16T16:38:14.557000 CVE-2024-9964,0,0,8536c12a824b16089aece0f1271b636d463c6133591e83473ece491455395f4f,2024-10-16T16:38:14.557000