From 8cc3c8a9dd040c9e380933fd2d09b3f44169e7f7 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 11 Dec 2024 23:03:54 +0000 Subject: [PATCH] Auto-Update: 2024-12-11T23:00:32.627060+00:00 --- CVE-2024/CVE-2024-531xx/CVE-2024-53121.json | 129 ++++++++++++++++++- CVE-2024/CVE-2024-531xx/CVE-2024-53122.json | 129 ++++++++++++++++++- CVE-2024/CVE-2024-531xx/CVE-2024-53123.json | 136 +++++++++++++++++++- CVE-2024/CVE-2024-531xx/CVE-2024-53124.json | 105 ++++++++++++++- README.md | 37 ++---- _state.csv | 88 ++++++------- 6 files changed, 525 insertions(+), 99 deletions(-) diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53121.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53121.json index b529d1b2208..34f6f0bde03 100644 --- a/CVE-2024/CVE-2024-531xx/CVE-2024-53121.json +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53121.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53121", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-02T14:15:12.877", - "lastModified": "2024-12-02T14:15:12.877", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-11T21:02:03.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,138 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5: fs, bloquear FTE al verificar si est\u00e1 activo Las confirmaciones a las que se hace referencia introdujeron un proceso de dos pasos para eliminar FTE: - Bloquear el FTE, eliminarlo del hardware, establecer la funci\u00f3n de eliminaci\u00f3n de hardware en NULL y desbloquear el FTE. - Bloquear el grupo de flujo principal, eliminar la copia de software del FTE y eliminarlo de la matriz x. Sin embargo, este enfoque encuentra una condici\u00f3n de carrera si se agrega simult\u00e1neamente una regla con el mismo valor de coincidencia. En este escenario, fs_core puede establecer la funci\u00f3n de eliminaci\u00f3n de hardware en NULL de forma prematura, lo que provoca un p\u00e1nico durante las eliminaciones de reglas posteriores. Para evitar esto, aseg\u00farese de que el indicador activo del FTE est\u00e9 marcado bajo un bloqueo, lo que evitar\u00e1 que la capa fs_core adjunte una nueva regla de direcci\u00f3n a un FTE que est\u00e9 en proceso de eliminaci\u00f3n. [ 438.967589] MOSHE: 2496 mlx5_del_flow_rules del_hw_func [ 438.968205] ------------[ cortar aqu\u00ed ]------------ [ 438.968654] refcount_t: el decremento lleg\u00f3 a 0; p\u00e9rdida de memoria. [ 438.969249] ADVERTENCIA: CPU: 0 PID: 8957 en lib/refcount.c:31 refcount_warn_saturate+0xfb/0x110 [ 438.970054] M\u00f3dulos vinculados en: act_mirred cls_flower act_gact sch_ingress openvswitch nsh mlx5_vdpa vringh vhost_iotlb vdpa mlx5_ib mlx5_core xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat br_netfilter rpcsec_gss_krb5 auth_rpcgss oid_registry superposici\u00f3n rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm ib_ipoib iw_cm ib_cm ib_uverbs ib_core zram zsmalloc fuse [\u00faltima descarga: cls_flower] [ 438.973288] CPU: 0 UID: 0 PID: 8957 Comm: tc No contaminado 6.12.0-rc1+ #8 [ 438.973888] Nombre del hardware: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 [ 438.974874] RIP: 0010:refcount_warn_saturate+0xfb/0x110 [ 438.975363] C\u00f3digo: 40 66 3b 82 c6 05 16 e9 4d 01 01 e8 1f 7c a0 ff 0f 0b c3 cc cc cc cc 48 c7 c7 10 66 3b 82 c6 05 fd e8 4d 01 01 e8 05 7c a0 ff <0f> 0b c3 cc cc cc cc 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 90 [ 438.976947] RSP: 0018:ffff888124a53610 EFLAGS: 00010286 [ 438.977446] RAX: 0000000000000000 RBX: ffff888119d56de0 RCX: 0000000000000000 [ 438.978090] RDX: ffff88852c828700 RSI: ffff88852c81b3c0 RDI: ffff88852c81b3c0 [ 438.978721] RBP: ffff888120fa0e88 R08: 0000000000000000 R09: ffff888124a534b0 [ 438.979353] R10: 0000000000000001 R11: 00000000000000001 R12: ffff888119d56de0 [ 438.979979] R13: ffff888120fa0ec0 R14: ffff888120fa0ee8 R15: ffff888119d56de0 [ 438.980607] FS: 00007fe6dcc0f800(0000) GS:ffff88852c800000(0000) knlGS:0000000000000000 [ 438.983984] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 438.984544] CR2: 00000000004275e0 CR3: 0000000186982001 CR4: 0000000000372eb0 [ 438.985205] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 000000000000000 [ 438.985842] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 438.986507] Seguimiento de llamadas: [ 438.986799] [ 438.987070] ? __warn+0x7d/0x110 [ 438.987426] ? refcount_warn_saturate+0xfb/0x110 [ 438.987877] ? report_bug+0x17d/0x190 [ 438.988261] ? prb_read_valid+0x17/0x20 [ 438.988659] ? handle_bug+0x53/0x90 [ 438.989054] ? exc_invalid_op+0x14/0x70 [ 438.989458] ? asm_exc_invalid_op+0x16/0x20 [ 438.989883] ? mlx5_lag_is_sriov+0x3c/0x50 [mlx5_core] [ 438.992054] ? xas_load+0x9/0xb0 [438.992407] mlx5e_tc_rule_unoffload+0x45/0xe0 [mlx5_core] [438.993037] mlx5e_tc_del_fdb_flow+0x2a6/0x2e0 [mlx5_core] [438.993623] mlx5e_flow_put+0x29/0x60 [mlx5_core] [438.994161] mlx5e_delete_flower+0x261/0x390 [mlx5_core] [438.994728] tc_setup_cb_destroy+0xb9/0x190 [438.995150] fl_hw_destroy_filter+0x94/0xc0 [cls_flower] [ 438.995650] fl_change+0x11a4/0x13c0 [cls_flower] [ 438.996105] tc_new_tfilter+0x347/0xbc0 [ 438.996503] ? __ ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1", + "versionEndExcluding": "6.1.119", + "matchCriteriaId": "DE71E822-45A0-4A8A-96CD-35A5E7AFD5D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.63", + "matchCriteriaId": "8800BB45-48BC-4B52-BDA5-B1E4633F42E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.10", + "matchCriteriaId": "C256F46A-AFDD-4B99-AA4F-67D9D9D2C55A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", + "matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*", + "matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*", + "matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*", + "matchCriteriaId": "1EF8CD82-1EAE-4254-9545-F85AB94CF90F" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/094d1a2121cee1e85ab07d74388f94809dcfb5b9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/933ef0d17f012b653e9e6006e3f50c8d0238b5ed", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9ca314419930f9135727e39d77e66262d5f7bef6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bfba288f53192db08c68d4c568db9783fb9cb838", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53122.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53122.json index 0caeadcb7cc..d9afbfdb961 100644 --- a/CVE-2024/CVE-2024-531xx/CVE-2024-53122.json +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53122.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53122", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-02T14:15:13.010", - "lastModified": "2024-12-02T14:15:13.010", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-11T21:14:05.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,138 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mptcp: creaci\u00f3n de subflujo de ejecuci\u00f3n en mptcp_rcv_space_adjust Los subflujos activos adicionales (es decir, creados por el administrador de rutas en el kernel) se incluyen en la lista de subflujos antes de iniciar 3whs. Un recvmsg() de ejecuci\u00f3n que pone en cola los datos recibidos en un subflujo ya establecido llamar\u00eda incondicionalmente a tcp_cleanup_rbuf() en todos los subflujos actuales, lo que podr\u00eda provocar un error de divisi\u00f3n por cero en los reci\u00e9n creados. Verifique expl\u00edcitamente que el subflujo est\u00e9 en un estado adecuado antes de invocar tcp_cleanup_rbuf()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10", + "versionEndExcluding": "6.1.119", + "matchCriteriaId": "6A2C9B37-E912-41BB-9EF9-3BC3C5E13B09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.63", + "matchCriteriaId": "8800BB45-48BC-4B52-BDA5-B1E4633F42E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.10", + "matchCriteriaId": "C256F46A-AFDD-4B99-AA4F-67D9D9D2C55A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", + "matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*", + "matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*", + "matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*", + "matchCriteriaId": "1EF8CD82-1EAE-4254-9545-F85AB94CF90F" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/24995851d58c4a205ad0ffa7b2f21e479a9c8527", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aad6412c63baa39dd813e81f16a14d976b3de2e8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ce7356ae35943cc6494cc692e62d51a734062b7d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ff825ab2f455299c0c7287550915a8878e2a66e0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53123.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53123.json index 6083b8b9bc6..a5681fc389c 100644 --- a/CVE-2024/CVE-2024-531xx/CVE-2024-53123.json +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53123.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53123", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-02T14:15:13.120", - "lastModified": "2024-12-02T14:15:13.120", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-11T21:17:25.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,145 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mptcp: error anterior al desconectar Eric inform\u00f3 de un error de divisi\u00f3n por cero en el protocolo MPTCP: Oops: error de divisi\u00f3n: 0000 [#1] PREEMPT SMP KASAN PTI CPU: 1 UID: 0 PID: 6094 Comm: syz-executor317 No contaminado 6.12.0-rc5-syzkaller-00291-g05b92660cdfe #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 13/09/2024 RIP: 0010:__tcp_select_window+0x5b4/0x1310 net/ipv4/tcp_output.c:3163 C\u00f3digo: f6 44 01 e3 89 df e8 9b 75 09 f8 44 39 f3 0f 8d 11 ff ff ff e8 0d 74 09 f8 45 89 f4 e9 04 ff ff ff e8 00 74 09 f8 44 89 f0 99 7c 24 14 41 29 d6 45 89 f4 e9 ec fe ff ff e8 e8 73 09 f8 48 89 RSP: 0018:ffffc900041f7930 EFLAGS: 00010293 RAX: 0000000000017e67 RBX: 0000000000017e67 RCX: ffffffff8983314b RDX: 00000000000000000 RSI: ffffffff898331b0 RDI: 0000000000000004 RBP: 00000000005d6000 R08: 0000000000000004 R09: 0000000000017e67 R10: 0000000000003e80 R11: 0000000000000000 R12: 0000000000003e80 R13: ffff888031d9b440 R14: 0000000000017e67 R15: 00000000002eb000 FS: 00007feb5d7f16c0(0000) GS:ffff8880b8700000(0000) knlGS:00000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007feb5d8adbb8 CR3: 0000000074e4c000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: __tcp_cleanup_rbuf+0x3e7/0x4b0 net/ipv4/tcp.c:1493 mptcp_rcv_space_adjust net/mptcp/protocol.c:2085 [en l\u00ednea] mptcp_recvmsg+0x2156/0x2600 net/mptcp/protocol.c:2289 inet_recvmsg+0x469/0x6a0 net/ipv4/af_inet.c:885 sock_recvmsg_nosec net/socket.c:1051 [en l\u00ednea] sock_recvmsg+0x1b2/0x250 net/socket.c:1073 __sys_recvfrom+0x1a5/0x2e0 net/socket.c:2265 __do_sys_recvfrom net/socket.c:2283 [en l\u00ednea] __se_sys_recvfrom net/socket.c:2279 [en l\u00ednea] __x64_sys_recvfrom+0xe0/0x1c0 net/socket.c:2279 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7feb5d857559 C\u00f3digo: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007feb5d7f1208 EFLAGS: 00000246 ORIG_RAX: 000000000000002d RAX: ffffffffffffffda RBX: 00007feb5d8e1318 RCX: 00007feb5d857559 RDX: 000000800000000e RSI: 0000000000000000 RDI: 0000000000000003 RBP: 00007feb5d8e1310 R08: 0000000000000000 R09: ffffffff81000000 R10: 0000000000000100 R11: 0000000000000246 R12: 00007feb5d8e131c R13: 00007feb5d8ae074 R14: 000000800000000e R15: 00000000fffffdef y proporcion\u00f3 un buen reproductor. La causa principal es el mal manejo actual de la desconexi\u00f3n de la ejecuci\u00f3n. Despu\u00e9s del commit culpado a continuaci\u00f3n, sk_wait_data() puede regresar (con error) con el socket subyacente desconectado y un rcv_mss de cero. Detecte el error y regrese sin realizar ninguna operaci\u00f3n adicional en el socket actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.60", + "versionEndExcluding": "6.1.119", + "matchCriteriaId": "B74B78EB-843A-44B3-877B-546941DD123B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.5.9", + "versionEndExcluding": "6.6", + "matchCriteriaId": "9AC54E1F-8CEA-4349-9973-283781371BE3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.63", + "matchCriteriaId": "BC10231A-96EA-466E-AB1B-9C40D6E030C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.10", + "matchCriteriaId": "C256F46A-AFDD-4B99-AA4F-67D9D9D2C55A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", + "matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*", + "matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*", + "matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*", + "matchCriteriaId": "1EF8CD82-1EAE-4254-9545-F85AB94CF90F" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/581302298524e9d77c4c44ff5156a6cd112227ae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/955388e1d5d222c4101c596b536d41b91a8b212e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a66805c9b22caf4e42af7a616f6c6b83c90d1010", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a749b23059b43a9b1787eb36c5d9d44150a34238", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53124.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53124.json index 78eaf1e778f..dea2b4a8ce3 100644 --- a/CVE-2024/CVE-2024-531xx/CVE-2024-53124.json +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53124.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53124", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-02T14:15:13.220", - "lastModified": "2024-12-02T14:15:13.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-11T21:18:59.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,110 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: fix data-races around sk->sk_forward_alloc Syzkaller inform\u00f3 esta advertencia: ------------[ cortar aqu\u00ed ]------------ ADVERTENCIA: CPU: 0 PID: 16 en net/ipv4/af_inet.c:156 inet_sock_destruct+0x1c5/0x1e0 M\u00f3dulos vinculados: CPU: 0 UID: 0 PID: 16 Comm: ksoftirqd/0 No contaminado 6.12.0-rc5 #26 Nombre del hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 RIP: 0010:inet_sock_destruct+0x1c5/0x1e0 C\u00f3digo: 24 12 4c 89 e2 5b 48 c7 c7 98 ec bb 82 41 5c e9 d1 18 17 ff 4c 89 e6 5b 48 c7 c7 d0 ec bb 82 41 5c e9 bf 18 17 ff 0f 0b eb 83 <0f> 0b eb 97 0f 0b eb 87 0f 0b e9 68 ff ff ff 66 66 2e 0f 1f 84 00 RSP: 0018:ffffc9000008bd90 EFLAGS: 00010206 RAX: 0000000000000300 RBX: ffff88810b172a90 RCX: 000000000000007 RDX: 0000000000000002 RSI: 0000000000000300 RDI: ffff88810b172a00 RBP: ffff88810b172a00 R08: ffff888104273c00 R09: 0000000000100007 R10: 0000000000020000 R11: 0000000000000006 R12: ffff88810b172a00 R13: 0000000000000004 R14: 0000000000000000 R15: ffff888237c31f78 FS: 0000000000000000(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffc63fecac8 CR3: 000000000342e000 CR4: 00000000000006f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: ? __warn+0x88/0x130 ? inet_sock_destruct+0x1c5/0x1e0 ? report_bug+0x18e/0x1a0 ? handle_bug+0x53/0x90 ? exc_invalid_op+0x18/0x70 ? asm_exc_invalid_op+0x1a/0x20 ? inet_sock_destruct+0x1c5/0x1e0 __sk_destruct+0x2a/0x200 rcu_do_batch+0x1aa/0x530 ? __pfx_smpboot_thread_fn+0x10/0x10 run_ksoftirqd+0x25/0x30 smpboot_thread_fn+0xdd/0x1d0 kthread+0xd3/0x100 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x34/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1a/0x30 ---[ fin del seguimiento 000000000000000 ]--- Es posible que dos subprocesos llamen a tcp_v6_do_rcv()/sk_forward_alloc_add() simult\u00e1neamente cuando sk->sk_state == TCP_LISTEN con sk->sk_lock desbloqueado, lo que desencadena una carrera de datos alrededor de sk->sk_forward_alloc: tcp_v6_rcv tcp_v6_do_rcv skb_clone_and_charge_r sk_rmem_schedule __sk_mem_schedule sk_forward_alloc_add() skb_set_owner_r sk_mem_charge sk_forward_alloc_add() __kfree_skb skb_release_all skb_release_head_state sock_rfree sk_mem_uncharge sk_forward_alloc_add() sk_mem_reclaim // establecer variable local recuperable __sk_mem_reclaim sk_forward_alloc_add() En este caso de prueba de syzkaller, dos subprocesos llaman a tcp_v6_do_rcv() con skb->truesize=768, sk_forward_alloc cambia de esta manera: (cpu 1) | (cpu 2) | sk_forward_alloc ... | ... | 0 __sk_mem_schedule() | | +4096 = 4096 | __sk_mem_schedule() | +4096 = 8192 sk_mem_charge() | | -768 = 7424 | sk_mem_charge() | -768 = 6656 ... | ... | sk_mem_uncharge() | | +768 = 7424 recuperable=7424 | | | sk_mem_uncharge() | +768 = 8192 | recuperable=8192 | __sk_mem_reclaim() | | -4096 = 4096 | __sk_mem_reclaim() | -8192 = -4096 != 0 No se debe llamar a skb_clone_and_charge_r() en tcp_v6_do_rcv() cuando sk->sk_state es TCP_LISTEN, esto sucede m\u00e1s adelante en tcp_v6_syn_recv_sock(). Corrija el mismo problema en dccp_v6_do_rcv()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.4", + "versionEndExcluding": "6.11.10", + "matchCriteriaId": "BAAC4539-72AA-4F8F-8CEB-AFAC1E1348A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", + "matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*", + "matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*", + "matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*", + "matchCriteriaId": "1EF8CD82-1EAE-4254-9545-F85AB94CF90F" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/073d89808c065ac4c672c0a613a71b27a80691cb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d285eb9d0641c8344f2836081b4ccb7b3c5cc1b6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 2372d4018d0..d7201a3cf42 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-11T21:00:29.770164+00:00 +2024-12-11T23:00:32.627060+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-11T20:59:36.660000+00:00 +2024-12-11T21:18:59.720000+00:00 ``` ### Last Data Feed Release @@ -44,33 +44,12 @@ Recently added CVEs: `0` ### CVEs modified in the last Commit -Recently modified CVEs: `40` - -- [CVE-2024-2279](CVE-2024/CVE-2024-22xx/CVE-2024-2279.json) (`2024-12-11T19:29:27.377`) -- [CVE-2024-23662](CVE-2024/CVE-2024-236xx/CVE-2024-23662.json) (`2024-12-11T19:11:44.790`) -- [CVE-2024-26007](CVE-2024/CVE-2024-260xx/CVE-2024-26007.json) (`2024-12-11T19:55:59.830`) -- [CVE-2024-26010](CVE-2024/CVE-2024-260xx/CVE-2024-26010.json) (`2024-12-11T19:54:35.323`) -- [CVE-2024-27794](CVE-2024/CVE-2024-277xx/CVE-2024-27794.json) (`2024-12-11T19:56:37.067`) -- [CVE-2024-2818](CVE-2024/CVE-2024-28xx/CVE-2024-2818.json) (`2024-12-11T20:25:14.693`) -- [CVE-2024-3092](CVE-2024/CVE-2024-30xx/CVE-2024-3092.json) (`2024-12-11T19:19:05.273`) -- [CVE-2024-40824](CVE-2024/CVE-2024-408xx/CVE-2024-40824.json) (`2024-12-11T19:46:47.707`) -- [CVE-2024-40828](CVE-2024/CVE-2024-408xx/CVE-2024-40828.json) (`2024-12-11T19:46:12.057`) -- [CVE-2024-40829](CVE-2024/CVE-2024-408xx/CVE-2024-40829.json) (`2024-12-11T19:45:39.007`) -- [CVE-2024-40836](CVE-2024/CVE-2024-408xx/CVE-2024-40836.json) (`2024-12-11T19:40:36.427`) -- [CVE-2024-44306](CVE-2024/CVE-2024-443xx/CVE-2024-44306.json) (`2024-12-11T20:34:16.127`) -- [CVE-2024-44307](CVE-2024/CVE-2024-443xx/CVE-2024-44307.json) (`2024-12-11T20:32:54.970`) -- [CVE-2024-53109](CVE-2024/CVE-2024-531xx/CVE-2024-53109.json) (`2024-12-11T20:21:25.433`) -- [CVE-2024-53110](CVE-2024/CVE-2024-531xx/CVE-2024-53110.json) (`2024-12-11T20:24:25.883`) -- [CVE-2024-53111](CVE-2024/CVE-2024-531xx/CVE-2024-53111.json) (`2024-12-11T20:27:04.360`) -- [CVE-2024-53112](CVE-2024/CVE-2024-531xx/CVE-2024-53112.json) (`2024-12-11T20:28:19.407`) -- [CVE-2024-53113](CVE-2024/CVE-2024-531xx/CVE-2024-53113.json) (`2024-12-11T20:29:10.150`) -- [CVE-2024-53114](CVE-2024/CVE-2024-531xx/CVE-2024-53114.json) (`2024-12-11T20:30:29.440`) -- [CVE-2024-53115](CVE-2024/CVE-2024-531xx/CVE-2024-53115.json) (`2024-12-11T20:31:39.927`) -- [CVE-2024-53116](CVE-2024/CVE-2024-531xx/CVE-2024-53116.json) (`2024-12-11T20:34:11.147`) -- [CVE-2024-53117](CVE-2024/CVE-2024-531xx/CVE-2024-53117.json) (`2024-12-11T20:44:30.167`) -- [CVE-2024-53118](CVE-2024/CVE-2024-531xx/CVE-2024-53118.json) (`2024-12-11T20:52:52.993`) -- [CVE-2024-53119](CVE-2024/CVE-2024-531xx/CVE-2024-53119.json) (`2024-12-11T20:55:09.957`) -- [CVE-2024-53120](CVE-2024/CVE-2024-531xx/CVE-2024-53120.json) (`2024-12-11T20:59:36.660`) +Recently modified CVEs: `4` + +- [CVE-2024-53121](CVE-2024/CVE-2024-531xx/CVE-2024-53121.json) (`2024-12-11T21:02:03.497`) +- [CVE-2024-53122](CVE-2024/CVE-2024-531xx/CVE-2024-53122.json) (`2024-12-11T21:14:05.653`) +- [CVE-2024-53123](CVE-2024/CVE-2024-531xx/CVE-2024-53123.json) (`2024-12-11T21:17:25.020`) +- [CVE-2024-53124](CVE-2024/CVE-2024-531xx/CVE-2024-53124.json) (`2024-12-11T21:18:59.720`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 8e4e0b7d253..8bdbf0ec2d1 100644 --- a/_state.csv +++ b/_state.csv @@ -221498,7 +221498,7 @@ CVE-2023-27971,0,0,697871038e9f195dda48b8c3a640aa8bbf063c21a5ff59442a2ac68d2ea6c CVE-2023-27972,0,0,420429654e9bf1c36921c5fb5ba9fd2a3cef17c110a30df72aaea78d27cfc78c,2024-11-21T07:53:50.660000 CVE-2023-27973,0,0,d08fe914a7a90b67c8fff32446e07617af2ab2e8c1d32e40b6c83140c1b3a4f8,2024-11-21T07:53:50.817000 CVE-2023-27974,0,0,3ad1eff0022adec35468a53c0c2dda6cdf1c1306b3acd8c5eb169ac126c3b376,2024-11-21T07:53:50.983000 -CVE-2023-27975,0,1,a8b615a95c618fd666d7af4dd64ecaf20efa67e612e19e9284003a5b9ca75398,2024-12-11T19:33:27.327000 +CVE-2023-27975,0,0,a8b615a95c618fd666d7af4dd64ecaf20efa67e612e19e9284003a5b9ca75398,2024-12-11T19:33:27.327000 CVE-2023-27976,0,0,1240c9e56fa57ba402d3f7e0a14dff38751e133e041d1bb8c630fe5679aa2691,2024-11-21T07:53:51.340000 CVE-2023-27977,0,0,857c0588f212ad0444d729b9bdbc719f3ff7494c48677155ae6ada64511bceb5,2024-11-21T07:53:51.470000 CVE-2023-27978,0,0,c5eb2c6d56ffdb1729f08196cf9badfd393df023c5ef837a92c0fe3c0ea271df,2024-11-21T07:53:51.587000 @@ -241164,7 +241164,7 @@ CVE-2023-6366,0,0,c81700b7298857b773609357411d7cd6d0b02ac8393a73ce8a6606b05ba2d9 CVE-2023-6367,0,0,13d76c3bab03b632a5ac104354ccaddbcb44c50528fde449f747852266366fe0,2024-11-21T08:43:43.187000 CVE-2023-6368,0,0,d7aade1b917eace2f4f7a629d1a8f587870cb2ed26467abb236ad6212afe7aca,2024-11-21T08:43:43.327000 CVE-2023-6369,0,0,0684710d5098cb455bcc0c897289ba2b2e7af1dfe38f32171dee435c9acf05ec,2024-11-21T08:43:43.477000 -CVE-2023-6371,0,1,bdf202c7e40c357c6b073175b5c7e7998f357cc642b231c8ed78a6a3a7f4c6ae,2024-12-11T20:26:05.660000 +CVE-2023-6371,0,0,bdf202c7e40c357c6b073175b5c7e7998f357cc642b231c8ed78a6a3a7f4c6ae,2024-12-11T20:26:05.660000 CVE-2023-6373,0,0,ae50e94c3438b36e9a3ebda05fda95ad4b2f8a3d74d2aabbf5139492357e4296,2024-11-21T08:43:43.753000 CVE-2023-6374,0,0,c2cfa15d0836d3f414742a5d2b6d44b857494d4b4f777df4bc71e86462c49e40,2024-11-21T08:43:43.890000 CVE-2023-6375,0,0,a3328413eb606f3d04183995fe30732c030df2bbe51aae4950d8517c7ddff638,2024-11-21T08:43:44.030000 @@ -241194,7 +241194,7 @@ CVE-2023-6401,0,0,b0f667a4dcd8ac6cdc2481ebbf204c862f58e6f2a554adfe690d5248646a0c CVE-2023-6402,0,0,0c89da37396c30e00e6d75f9aae38e19dbc57459695681cad5f81bca9e128446,2024-11-21T08:43:47.370000 CVE-2023-6407,0,0,dd10f941df2883a962d86cfc0f1f9b8ec320d08848c9ccf0363d118bd39eb390,2024-11-21T08:43:47.523000 CVE-2023-6408,0,0,0cedc637831222283fffb53e08c80d7989733459a15ffcd8421a31ac8746072e,2024-11-21T08:43:47.663000 -CVE-2023-6409,0,1,0f9352bdb6c1de606bdf3ef0c48621b69d24747b0de2a27df1c23bfb8768cae0,2024-12-11T19:33:54.427000 +CVE-2023-6409,0,0,0f9352bdb6c1de606bdf3ef0c48621b69d24747b0de2a27df1c23bfb8768cae0,2024-12-11T19:33:54.427000 CVE-2023-6410,0,0,7f5d659d0706bec6f1add65010cc3be9af3f6ec1ff619f6bffb38f2d7bce54ab,2024-11-21T08:43:47.920000 CVE-2023-6411,0,0,576c9ad94cee75db2b72bf62554810452e47edeca121016837c86aa1c12239f5,2024-11-21T08:43:48.047000 CVE-2023-6412,0,0,0dda674cc5906418fc0e519e16e714db5fe1e891e4d2e219eb93416eb240fb9a,2024-11-21T08:43:48.177000 @@ -241263,7 +241263,7 @@ CVE-2023-6485,0,0,88189a74e618a8780b3b3fb22c708fc0ffaa04a9d99cb8e28f399c48705d49 CVE-2023-6486,0,0,3fb73e477ab2287dc3682414ba96858420b34c65203555550881fae7301da544,2024-11-21T08:43:56.887000 CVE-2023-6487,0,0,23ae3b05d51ce51f76fa3e9d4fb6f7c2f380e6bbbcb03c51f14db68ee81a1ae4,2024-11-21T08:43:57.017000 CVE-2023-6488,0,0,d98f3cfb2d0e78a494791101f8ea0fff358cf4b57a1ea2cf08e8bf6dfb2dee4d,2024-11-21T08:43:57.150000 -CVE-2023-6489,0,1,a9e4d7a039c991299a330f31e1936aa9d07858cc5c43626bc1bfc6ea780b752e,2024-12-11T19:06:06.800000 +CVE-2023-6489,0,0,a9e4d7a039c991299a330f31e1936aa9d07858cc5c43626bc1bfc6ea780b752e,2024-12-11T19:06:06.800000 CVE-2023-6491,0,0,708b8f4bd32ebd1485ce2aad158d524378e5ecd9cb55f1f4183d21b05ef95b26,2024-11-21T08:43:57.410000 CVE-2023-6492,0,0,e6005ae667055ac8ae283196b03169ed895debca9f77dbaece293ed0c91f2b51,2024-11-21T08:43:57.547000 CVE-2023-6493,0,0,66a6bc3744048daffff5b648f4b2a86cf20fb0204e54a7708f7bf9298339ead7,2024-11-21T08:43:57.670000 @@ -241418,7 +241418,7 @@ CVE-2023-6673,0,0,3a650b3eb4786634d840cb3cc0f15623e73a6ae796615143cb299297acb672 CVE-2023-6675,0,0,256937adfd0060027db8e052681e30244debd0c62786ed6d634b1d5c9e1b90d3,2024-11-21T08:44:19.243000 CVE-2023-6676,0,0,d6df9da0cb051c0b5e514876c794167f7138c8fe225267146b80a819d287476e,2024-11-21T08:44:19.373000 CVE-2023-6677,0,0,a42907a68b35ab893f84a4a8982d5a0459299568a0e135d60959e938df1dfc11,2024-11-21T08:44:19.513000 -CVE-2023-6678,0,1,6f3a5f028fe8255ef71af1c12d235abfed4cf3aa03103a5801341366424f5626,2024-12-11T19:58:13.110000 +CVE-2023-6678,0,0,6f3a5f028fe8255ef71af1c12d235abfed4cf3aa03103a5801341366424f5626,2024-12-11T19:58:13.110000 CVE-2023-6679,0,0,2433496c121ca610d17640117da3db027308473d1e8f376305a6f3251be24882,2024-11-21T08:44:19.783000 CVE-2023-6680,0,0,c5ebb765eb58422ad2a1705f900d6e487ec280b792c1875e94c130510d5cd8c0,2024-11-21T08:44:19.957000 CVE-2023-6681,0,0,0f04aff308b498004b056ce42e67b46004fb37e86ec12da84c8829ed28a2b2e6,2024-11-21T08:44:20.090000 @@ -242130,7 +242130,7 @@ CVE-2024-0194,0,0,aebaac2f2096d2130a6374250cdf5207fba6109273d9eb049f10f67fd69e55 CVE-2024-0195,0,0,20d44a923469cd72437093c52a9988a6ea0c329c670153d613e10fe01c1f003e,2024-11-21T08:46:02.473000 CVE-2024-0196,0,0,a710d52c8be3a6249890209b5cb88477dafab3e2f6559a2b4df7510ce36db555,2024-11-21T08:46:02.607000 CVE-2024-0197,0,0,df7a7d0f88a3087dadfb0a85b5558d236be8425dcf730b96558aa872bf299f8a,2024-11-21T08:46:02.750000 -CVE-2024-0199,0,1,21d5ab91f1ef81daf029bd9933e93292228f6e37c8bf61f6ea8ae9ff1893aef3,2024-12-11T20:12:49.670000 +CVE-2024-0199,0,0,21d5ab91f1ef81daf029bd9933e93292228f6e37c8bf61f6ea8ae9ff1893aef3,2024-12-11T20:12:49.670000 CVE-2024-0200,0,0,960bfffc60e8e094b51fc325744ecd82e4e15c7f4a611a4c757227ceca1a67ed,2024-11-21T08:46:03.023000 CVE-2024-0201,0,0,bc1414ac350a7f67445e5f54f441bae0f708e8c010ba49ff59690510ed4d1239,2024-11-21T08:46:03.193000 CVE-2024-0202,0,0,72c547fb3aee28c1cf66f48325eaa3b3635703c62aa29f3ce5a0d24c6af3222c,2024-11-21T08:46:03.343000 @@ -243620,8 +243620,8 @@ CVE-2024-10941,0,0,13c9aa5648736117eddcc05b7c7bbd41bd256da81c39332a1bd9e9e846bf4 CVE-2024-10943,0,0,26f3128d989fcb7c084f6a2785233e142b456ba7fa2bbfa2225352075f798149,2024-11-13T17:01:58.603000 CVE-2024-10944,0,0,1c0b69d1ba3b87998eabf673d5ce85783b7ff742767256df1f0369b07a97fdcd,2024-11-13T17:01:58.603000 CVE-2024-10945,0,0,eaecb76bb2926a21e85aba18d448e990c084aea718f0f5fbf4d666258d929307,2024-11-13T17:01:58.603000 -CVE-2024-10946,0,1,e939ae56a130941682682fa8c3248447c6e56390d24186994637b4a0f9c753fe,2024-12-11T19:58:39.510000 -CVE-2024-10947,0,1,dacc13455ec4929fc7dfb8811927a59e4a69ca38f996547e3516014c1db68e50,2024-12-11T19:58:55.657000 +CVE-2024-10946,0,0,e939ae56a130941682682fa8c3248447c6e56390d24186994637b4a0f9c753fe,2024-12-11T19:58:39.510000 +CVE-2024-10947,0,0,dacc13455ec4929fc7dfb8811927a59e4a69ca38f996547e3516014c1db68e50,2024-12-11T19:58:55.657000 CVE-2024-1095,0,0,c3b9382662b402032abf8ceff61647f8e00b16f3ebb8e17edcc93fa481ed1000,2024-11-21T08:49:47.093000 CVE-2024-10952,0,0,edff8b29d26accda4a8e33f169e18ac16231b4d8b9445539c32344bf5f44c6f1,2024-12-04T03:15:04.593000 CVE-2024-10953,0,0,94ed881c1741c9a6db86af195e84904697442fcf31d986afec17a96f3fc5a311,2024-11-12T13:56:54.483000 @@ -243993,7 +243993,7 @@ CVE-2024-11463,0,0,ad17f3fab6bfb40a789d68c4383c6c0e1f14efa77f86cc521d310c195559f CVE-2024-11464,0,0,b8134ded04019f0dc322d50c830b80e3f3f841b43578bd4adfc4b4daf1965843,2024-12-07T12:15:19.567000 CVE-2024-11466,0,0,36ba29a0e83960f183cdc1bb8910604befb538a9ed8bdd074a88ef8b7f706e46,2024-12-04T08:15:06.523000 CVE-2024-1147,0,0,7c585dad4e071b38d649d847ff37c79a25a5d07f7a32720dda50f90a08541bc4,2024-11-21T08:49:54.360000 -CVE-2024-11477,0,1,76aa7637b95fa2ecc6b147d714f578f30f2e0042532b214641b9ba44d9ec49fd,2024-12-11T19:23:36.800000 +CVE-2024-11477,0,0,76aa7637b95fa2ecc6b147d714f578f30f2e0042532b214641b9ba44d9ec49fd,2024-12-11T19:23:36.800000 CVE-2024-11479,0,0,e45a25bfdd55a73dd4f84ed406864a56b4c33194e1807e98971c4aae47176800,2024-12-04T01:15:04.650000 CVE-2024-1148,0,0,42f8b4a331499e416da7e39ecb917cc148de70355c01e7459a0ecc809b95c273,2024-11-21T08:49:54.507000 CVE-2024-11481,0,0,43aefde0b60b7bb2c03e6e9073efa36888743c80ea5c30a176dc892fe3500a31,2024-11-29T08:15:04.270000 @@ -244289,7 +244289,7 @@ CVE-2024-11952,0,0,8be0c69e3107fa6f3273f59b11ff511450df70a157d0236a300dd71a0356b CVE-2024-11959,0,0,8e4c044a79a34553dacc3bbf68fddd2b6e5f24a72d4b7a0c2b06bf8643853e87,2024-12-04T16:52:55.150000 CVE-2024-1196,0,0,fb9cee3548f997ff6f5fcfe0021c5d65fb9ff65b14bac0023a1f0fa42083dcd0,2024-11-21T08:50:00.883000 CVE-2024-11960,0,0,bd9138e92373cf0f2d64cabaf1c792eb3475a5676b172a9be24a4ae943f1b162,2024-12-04T16:52:34.413000 -CVE-2024-11961,0,1,e6c58b0f0ebcb435bb20e9edf2a205e6264c5d1fef5b95ef6f8a54827fe7cf7b,2024-12-11T19:59:30.533000 +CVE-2024-11961,0,0,e6c58b0f0ebcb435bb20e9edf2a205e6264c5d1fef5b95ef6f8a54827fe7cf7b,2024-12-11T19:59:30.533000 CVE-2024-11962,0,0,f538b65665f2e3cba57b21491ff610cfd2c91dae4a78a6a09ff0930469b2bf9d,2024-12-04T16:51:47.007000 CVE-2024-11963,0,0,3e254fdaabe1a428140e6a7d7fc0327fd8a35973f16b2835f24e923dec166329,2024-12-04T16:51:21.440000 CVE-2024-11964,0,0,37459bfcc29215486f1bd42ba7b539350d067861021516c9a1104062a391c8fc,2024-12-04T16:50:38.423000 @@ -244500,7 +244500,7 @@ CVE-2024-1295,0,0,58e65e331ff11f824ceffb79237c2ca705e423c379ee489ababaab58413247 CVE-2024-1296,0,0,2c8681669a40b4c1355bcd3bfff211c08a874ea1e31940665fa8f736883bd89e,2024-11-21T08:50:15.633000 CVE-2024-1297,0,0,0d9e22e56ecef1715a16e9d7809dba48ba55def0e741f79f7098027ea7ebc7ff,2024-11-21T08:50:15.770000 CVE-2024-1298,0,0,04246e35362f6f4b760051526529d0b042d99f56b78c06a26d303553264d4594,2024-11-21T08:50:15.890000 -CVE-2024-1299,0,1,c7f245e662ec35ddd87c48ae29ff03e74531f9ba7973bf15293ed4e82f111599,2024-12-11T20:23:27.497000 +CVE-2024-1299,0,0,c7f245e662ec35ddd87c48ae29ff03e74531f9ba7973bf15293ed4e82f111599,2024-12-11T20:23:27.497000 CVE-2024-1300,0,0,1449d51d635587092ee7e467b53bae80464f92cc07a6bda2595172832d29c1e4,2024-11-25T03:15:10.053000 CVE-2024-1301,0,0,a82904378c141da107f996cbfc3663893c64b71f2f3d06fe2a7b32b9cc0bfa85,2024-11-21T08:50:16.340000 CVE-2024-1302,0,0,50e21539c22b43b4db748f33a4680786d0cd3b39c9a7a5fc858bc75c33660782,2024-11-21T08:50:16.467000 @@ -244547,7 +244547,7 @@ CVE-2024-1343,0,0,419883927ae3b083384516246fa6e1f74b7f4f2e309a0068972246a296f53e CVE-2024-1344,0,0,597c0cc8c6eb641f90ae3a9870d3e75470a230889fbaee8e504503cb0f59d32c,2024-11-21T08:50:22.543000 CVE-2024-1345,0,0,0c76ed0a957ae2e29015c6df7057e5c17f3081f7b68ed33d0e7f09f33dcdc4ff,2024-11-21T08:50:22.667000 CVE-2024-1346,0,0,303f14c2019e4c9714a03c35023cb78da79f82df77a269203b1411390b024a24,2024-11-21T08:50:22.793000 -CVE-2024-1347,0,1,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000 +CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000 CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000 CVE-2024-1349,0,0,e7a4e73532ed6e0c8758e3697d94f88d5800a92d17af76b3782f000b22261a78,2024-11-21T08:50:23.197000 CVE-2024-1350,0,0,ce11ba75737d3c0dc14aea45038ee6ef39f1db647d13879ee3f248d09a81697f,2024-11-21T08:50:23.313000 @@ -245002,8 +245002,8 @@ CVE-2024-1828,0,0,b6976ed94d57f1336064fc79323390eec3658f16d0aa2744f892fad62b7ea3 CVE-2024-1829,0,0,1d902f6ab55a48ce8679b9555af4f7400a09e1e8a88e9a612ee93d6a137b7279,2024-12-06T16:20:39.807000 CVE-2024-1830,0,0,d45cda4b1d5ed84f256382444c2274c6c644ab1eafdc8f3894a05d999338ff31,2024-12-06T16:15:12.410000 CVE-2024-1831,0,0,6fb1b01628c74786d0213dead60cf1da6fc0a4c2c0dd9d0d6a178c6822c37f39,2024-11-21T08:51:25.133000 -CVE-2024-1832,0,1,c06d50298f0700d94c119d417d23c0a1930dc31256814c3e89781b7d12de3489,2024-12-11T19:57:16.060000 -CVE-2024-1833,0,1,c8d92fc9cd839b68971699d5d283e73f3d2803989549e697773061edb8d08a35,2024-12-11T19:57:54.520000 +CVE-2024-1832,0,0,c06d50298f0700d94c119d417d23c0a1930dc31256814c3e89781b7d12de3489,2024-12-11T19:57:16.060000 +CVE-2024-1833,0,0,c8d92fc9cd839b68971699d5d283e73f3d2803989549e697773061edb8d08a35,2024-12-11T19:57:54.520000 CVE-2024-1834,0,0,48b90332f0c6341e9785a8b27fcf738be2841e8ef5a9b23f4fc109fd93604577,2024-12-06T19:59:24.463000 CVE-2024-1839,0,0,3c411ae2cf52bddf662314956b4d5c92c6cd816f3113019cdd44905638026af6,2024-11-21T08:51:25.720000 CVE-2024-1840,0,0,2e6d7672faccf941673a79a75aacce54ff693ecbc0604990f24bf8316ac34cbb,2024-11-21T08:51:25.860000 @@ -246841,7 +246841,7 @@ CVE-2024-21911,0,0,ecf2241468adf940e2c0a2f0db8992eda0c6792ed4a6f3737c2295eb4920e CVE-2024-21912,0,0,582ec5203997d71ac0d1056ed47fe2417de67c4c6aa7cffe8ec76cfed2576539,2024-12-09T15:13:40.437000 CVE-2024-21913,0,0,479b5dd08769265b5661e21b75669cce61442e59290ecf0b015bb7ab2058f5f3,2024-12-09T15:18:28.870000 CVE-2024-21914,0,0,9be91234e3a87100bb31a25430bfb3372edd3b42a557333c44d4254d13220f1f,2024-11-21T08:55:15.933000 -CVE-2024-21915,0,1,a165f2d25eb37fb2f87120fddd3fade5ec5c366c0d09d9e6ea27b966a24766a0,2024-12-11T19:31:28.200000 +CVE-2024-21915,0,0,a165f2d25eb37fb2f87120fddd3fade5ec5c366c0d09d9e6ea27b966a24766a0,2024-12-11T19:31:28.200000 CVE-2024-21916,0,0,281122525b18b4c37d709679826f35f553f234e6aca4e9b21e208465570118c1,2024-11-21T08:55:16.243000 CVE-2024-21917,0,0,4596cf747d33ef750330f71a8f984548ddf844a5b7fe1daf92e4333c822c4a23,2024-11-21T08:55:16.427000 CVE-2024-21918,0,0,a67329e256c4a4c8d9d647b0d42114dbaccc94d666d01581e4b8a2c6d540f918,2024-12-09T15:18:49.257000 @@ -247447,7 +247447,7 @@ CVE-2024-22778,0,0,0281e5b3d87cacccb8a69ac78c76b4bd9497abd80d8182d500e2e4228a262 CVE-2024-22779,0,0,4b2529eb2a537ec4153614b263ea5bd6cc064ff2067dc5f922966e44620967d9,2024-11-21T08:56:38.937000 CVE-2024-2278,0,0,afc218644888ddfdbfc0ee64d2dbcff5719c87ddda676fd55b5f4ebef946ea8f,2024-11-21T09:09:24.857000 CVE-2024-22780,0,0,e7c9e53b53c73f14641469ac17c6a267c6ae51b4da23d85d4748bd237084cc7c,2024-12-04T21:15:21.567000 -CVE-2024-2279,0,1,15594de242362166ba4fcc677c674c35e566adb6da76d65bb4bb570b8c49add8,2024-12-11T19:29:27.377000 +CVE-2024-2279,0,0,15594de242362166ba4fcc677c674c35e566adb6da76d65bb4bb570b8c49add8,2024-12-11T19:29:27.377000 CVE-2024-22795,0,0,4b871fe15d673131e56820fa86db7a52e60ec35118fbfcd9a32eee5736e087d9,2024-11-21T08:56:39.250000 CVE-2024-2280,0,0,ee01e33ad8c8e15890c2537e3a2ce31e47602f1cab0dfcd5928f922e440ae8d7,2024-11-21T09:09:25.187000 CVE-2024-22807,0,0,c63e56e80af4c58ae1f7129e86f946e6c72bfda64cfef4929c6ab6ca5fc4096d,2024-11-21T08:56:39.420000 @@ -248053,7 +248053,7 @@ CVE-2024-23658,0,0,031ef15b7509622c724db229aaa3a875142f71b91d78f59e593c2d2226a24 CVE-2024-23659,0,0,ad170a41af26f2d803ac6b77f51bcda8b824401a4b561683bd9fd982de3deaf1,2024-11-21T08:58:06.740000 CVE-2024-2366,0,0,90e2f12149642b70d84804fc6f88a92a2e96d1915eadd9b4c5ad94265dc43843,2024-11-21T09:09:36.327000 CVE-2024-23660,0,0,a0693769ca2af12f268fbf5cf4c178feba914b1a9e06080d95be4eda9e1f6ced,2024-11-21T08:58:06.890000 -CVE-2024-23662,0,1,fcb6a3236ea3e39380df6e19287e42e2832677f3aa97bcd1d15ed0addfd552f6,2024-12-11T19:11:44.790000 +CVE-2024-23662,0,0,fcb6a3236ea3e39380df6e19287e42e2832677f3aa97bcd1d15ed0addfd552f6,2024-12-11T19:11:44.790000 CVE-2024-23663,0,0,4115801077b89b088b225d11dd742f9500976c4f6b3e6ad1ae4e5eab6cc084e4,2024-11-21T08:58:07.203000 CVE-2024-23664,0,0,665ff2ffa7ebe6329b6096a4739ce61633371294cf2579873454d1efb96b574b,2024-11-21T08:58:07.350000 CVE-2024-23665,0,0,c8eca8ed5083a6d0fa08238fe8d304598d21bb2eb465c1d1eedb994b2280c9b5,2024-11-21T08:58:07.463000 @@ -249639,8 +249639,8 @@ CVE-2024-26002,0,0,32fc549004fe526f29d75a3c1035c8b1eea052113d42e21c57b5e9dc040cc CVE-2024-26003,0,0,acf8a847c632d1fd9e01f901c5b2e86fd0b75b5ff38501c5893d29f7e6b8d728,2024-11-21T09:01:45.207000 CVE-2024-26004,0,0,fde2d42e2610c51c10504bb6c3916fb89500c264b8ec9b06c18924f884e5115e,2024-11-21T09:01:45.330000 CVE-2024-26005,0,0,ab8dec86b835a1025d9007a91813d1fb4ad91c2949fe7b6a778b69a8a5e1905d,2024-11-21T09:01:45.453000 -CVE-2024-26007,0,1,5566a1952f2701dd4149a375a6c93e3c6434006ebc54211b6a50bcacb2b01156,2024-12-11T19:55:59.830000 -CVE-2024-26010,0,1,aa94400b6d9b88521b847077f70baf8416af93283c6afed0d9452bca0e3c5cd0,2024-12-11T19:54:35.323000 +CVE-2024-26007,0,0,5566a1952f2701dd4149a375a6c93e3c6434006ebc54211b6a50bcacb2b01156,2024-12-11T19:55:59.830000 +CVE-2024-26010,0,0,aa94400b6d9b88521b847077f70baf8416af93283c6afed0d9452bca0e3c5cd0,2024-12-11T19:54:35.323000 CVE-2024-26011,0,0,e974a2b113f427dd018031dca3d60158e24db135804a10020cf79fb5b92d5801,2024-11-13T17:01:16.850000 CVE-2024-26015,0,0,61e1ee285e159a140490fe9bac1615210ace2b02df5e5f1a9d7b48836125a67e,2024-11-21T09:01:45.940000 CVE-2024-26016,0,0,0ae73fe611f07c6e72809273d28a2e16fd71142d8f7d9b985444be8bf710ce16,2024-11-21T09:01:46.090000 @@ -251122,7 +251122,7 @@ CVE-2024-27790,0,0,19fcb60ab52fe9c379609c39b59142d5014d893a59bae627bebebc5a2412f CVE-2024-27791,0,0,439aca2fd1f55eeaf8fa200c5d29a0be14fb7faf194f143c1548179e82383c22,2024-12-10T17:58:55.290000 CVE-2024-27792,0,0,f31b62b6f6fa42ac443db705e1bcf2907bbf913e30a3984de7b426f885533f5d,2024-11-21T09:05:03.877000 CVE-2024-27793,0,0,4b0df2c2b74473c2b8ba466a704f8df7dacd244d361ee42c49a6311ab2e4a128,2024-12-09T19:28:03.753000 -CVE-2024-27794,0,1,4504b4b825a11a7d65b5081c774372a74748805bca6e18e3905fa44645f60653,2024-12-11T19:56:37.067000 +CVE-2024-27794,0,0,4504b4b825a11a7d65b5081c774372a74748805bca6e18e3905fa44645f60653,2024-12-11T19:56:37.067000 CVE-2024-27795,0,0,2de9488f4a2a5b051aabc1783837072f4df9aa8191cf9f582ee4dd5bd134fb81,2024-09-23T20:01:19.910000 CVE-2024-27796,0,0,29507f426e53036da7b53c85ed50d31725f49a7e326b571b9bcdf2b6bd7f5686,2024-12-09T19:22:11.867000 CVE-2024-27798,0,0,4709bcea1f0a0d9660b4090ec800aba4e3c546c43ac22074df5e0370c9b4fc3b,2024-12-09T19:21:45.187000 @@ -251492,7 +251492,7 @@ CVE-2024-28174,0,0,70032b95a853e7690385c0d53188c202b95c2c5ec7c61b8a9d2f2e919f971 CVE-2024-28175,0,0,d3ff2e666b1aedf8b388410f078a1d5d7af943680bbf262f67250c6a4b9da239,2024-11-21T09:05:57.817000 CVE-2024-28176,0,0,8e2712bfe1ea7116f11f8ad9a2861387b20c6463817c56944eede5e5ddf4bb41,2024-11-21T09:05:57.947000 CVE-2024-28179,0,0,7f82026281e2dd9f15927caa04d85bc2295c5beb1cf03576e742ef34b4c15043,2024-11-21T09:05:58.083000 -CVE-2024-2818,0,1,0911c1acc4d9c090902c611e6719e3f0aa3c0379c78a97d42dc069d2ec5f6dee,2024-12-11T20:25:14.693000 +CVE-2024-2818,0,0,0911c1acc4d9c090902c611e6719e3f0aa3c0379c78a97d42dc069d2ec5f6dee,2024-12-11T20:25:14.693000 CVE-2024-28180,0,0,9f5a21f69cf8970f5cdcfc45029ec448caaadd4eb92377934524f9dd36094847,2024-11-21T09:05:58.227000 CVE-2024-28181,0,0,6bd311faaf46af3dff9fd97c3b0355e1ad7f1917e6cc72e0605e0852aabed029,2024-11-21T09:05:58.393000 CVE-2024-28182,0,0,36cc5d7b3bc1aeb665e26b64252bf571693be9481e520c82c88e8eddbab3b630,2024-11-21T09:05:58.537000 @@ -253413,7 +253413,7 @@ CVE-2024-3091,0,0,e0eeef129ce9a44d0ebea4d97f92b821262466eaf3a38a7275856066395171 CVE-2024-30915,0,0,955c73c260c7bf6c12b9e7af49211a242d1f4ff7118c7fbceeab57178f5aebab,2024-11-21T09:12:33.743000 CVE-2024-30916,0,0,4073e6dea6f641fb158f013be5768038a110090e69c49bb4a7be384745684c55,2024-11-21T09:12:33.980000 CVE-2024-30917,0,0,1db8ecc4f84bdb53bb46c092c6af560f66ec5de557a1924722b14e3fcd15eded,2024-11-21T09:12:34.190000 -CVE-2024-3092,0,1,91b6db3015b37d065cd77564396003fe4e7ebc37c5fe361994ab7567d49e61c6,2024-12-11T19:19:05.273000 +CVE-2024-3092,0,0,91b6db3015b37d065cd77564396003fe4e7ebc37c5fe361994ab7567d49e61c6,2024-12-11T19:19:05.273000 CVE-2024-30920,0,0,31223b0c711bda40c144eb0e5090c9e613dff648aec6b9f6f4db7b5e0ea61799,2024-11-21T09:12:34.407000 CVE-2024-30921,0,0,ed325ad563d44c5ff4793afe259206bdc76a0c6351793ca20e0031756a46e279,2024-11-21T09:12:34.627000 CVE-2024-30922,0,0,0ecbae908129430749f82fec4c0e0e5d6e255c53578d811d0b95baacb487d0d1,2024-11-21T09:12:34.847000 @@ -260652,12 +260652,12 @@ CVE-2024-4082,0,0,884f744d4b6d6c38211069fff9472a771275afdc68ad46774024765c6d1375 CVE-2024-40821,0,0,a3b876952ec8ce255096f7c26040316035df8c47e37e23640e020f9cd5f7797f,2024-12-10T14:47:42.573000 CVE-2024-40822,0,0,f2e42c11a9194a009cec70add00bceafd93485fa2ccc44b94afc5a8685e89cd1,2024-11-21T09:31:42.490000 CVE-2024-40823,0,0,ea5834191915fbf77537780befd2f8170562cc3e8f14a6bae616ecfbb3aa16eb,2024-11-21T09:31:42.633000 -CVE-2024-40824,0,1,fbdc319b868b2cfa791578ade1e61c98f6d87f7eb28feeae98cf58c6b93dbf7d,2024-12-11T19:46:47.707000 +CVE-2024-40824,0,0,fbdc319b868b2cfa791578ade1e61c98f6d87f7eb28feeae98cf58c6b93dbf7d,2024-12-11T19:46:47.707000 CVE-2024-40825,0,0,9d304162ffa86a0427546e740669b60679660b64dbbb4aae0359d2b969ff4c63,2024-09-20T12:31:20.110000 CVE-2024-40826,0,0,c1291659e0404a097790dfd83faebb12f457e81680df4ca24c59974ee41a889a,2024-09-23T19:25:04.707000 CVE-2024-40827,0,0,a6a2c34277bc8e4cfbaeac3ab667c292869f606bd0db645af1cff508065008ad,2024-11-21T09:31:43.213000 -CVE-2024-40828,0,1,7b08ff9a88811c1a2d2f6a8cabe468d48214feff7b5748f8277c1d1c6bcaac95,2024-12-11T19:46:12.057000 -CVE-2024-40829,0,1,7b94e56592e4d055988a33b0a03aa7c3e38da8fd672f53fd9dd2cc8e302d9c7d,2024-12-11T19:45:39.007000 +CVE-2024-40828,0,0,7b08ff9a88811c1a2d2f6a8cabe468d48214feff7b5748f8277c1d1c6bcaac95,2024-12-11T19:46:12.057000 +CVE-2024-40829,0,0,7b94e56592e4d055988a33b0a03aa7c3e38da8fd672f53fd9dd2cc8e302d9c7d,2024-12-11T19:45:39.007000 CVE-2024-4083,0,0,861c69f070b98df21ed1e5fe755d0f8a3138be95fcc12d774c40863a7b1a40b2,2024-11-21T09:42:09.710000 CVE-2024-40830,0,0,5a11ad0fbf19f984d9514795e3ce671f0d4fd0db283d4edb735d82b003a62069,2024-09-23T19:19:46.127000 CVE-2024-40831,0,0,77a034f59c59409708be4a3edb262d2ddfc572eafa36e0ec5128163562471781,2024-09-23T19:18:02.207000 @@ -260665,7 +260665,7 @@ CVE-2024-40832,0,0,00c14c566f042719b789e0fa64de268df676d122f61af7b5d4e2c9ee45727 CVE-2024-40833,0,0,b910eead051682eac062094cd6da18a48ed3792c5e338b1321e1813ef0d8294e,2024-11-21T09:31:44.070000 CVE-2024-40834,0,0,b4c4b71055815b6c806419e94e6b9564969aed474e4e4a56741e21af283b0152,2024-11-21T09:31:44.290000 CVE-2024-40835,0,0,3f6ef0b1fef5cf4b00a629185a96b630665ef3a9544463783f9d2cf4975e71e7,2024-11-21T09:31:44.430000 -CVE-2024-40836,0,1,a141cd1ddaeaf46ffa54c1bf810175958c1ce047751b66d0d0ec544280cee946,2024-12-11T19:40:36.427000 +CVE-2024-40836,0,0,a141cd1ddaeaf46ffa54c1bf810175958c1ce047751b66d0d0ec544280cee946,2024-12-11T19:40:36.427000 CVE-2024-40837,0,0,d9e1d727c5489e5fbe91c9a35481e1b475460063dae3d0ae089fbdf692fb517e,2024-09-23T18:50:16.050000 CVE-2024-40838,0,0,580b3d51fd4431cbc24e96aafd19ebfdf3fdc30d947e42e3e5409dfdf94d1c3e,2024-09-25T16:46:24.123000 CVE-2024-4084,0,0,657f5681c21f742d770aabfd6f3259f87cb735c98cee6e03f2c636c6ffc65895,2024-11-21T09:42:09.817000 @@ -263352,8 +263352,8 @@ CVE-2024-44297,0,0,15b11a1a880cbcc6b8dc8f6c7e90f9afa6080bf98d20fe4b15a67c3ef7cd8 CVE-2024-4430,0,0,d5d36fbeccc483ac36a1692cd3da44d019b58c951236b193b64bdfb1c1fbb731,2024-11-21T09:42:48.940000 CVE-2024-44301,0,0,92d51fc975ead2b338c26accd94652ad84b6246707eb6eb0fccef69671475afd,2024-10-30T19:35:22.447000 CVE-2024-44302,0,0,8e2df0f8c8bbf990ae9e0c0188d5dc060a503901afef39bb207c003562ed13c7,2024-12-06T15:15:09.050000 -CVE-2024-44306,0,1,8fb83c68a3960e43ecba5e716ce2c319df21cea60529cc8954824fbcac0a96d6,2024-12-11T20:34:16.127000 -CVE-2024-44307,0,1,1f7e71cf7755409ec2cf8830e6d0a0c679d373aedb9b20dcc049bbb014d968fb,2024-12-11T20:32:54.970000 +CVE-2024-44306,0,0,8fb83c68a3960e43ecba5e716ce2c319df21cea60529cc8954824fbcac0a96d6,2024-12-11T20:34:16.127000 +CVE-2024-44307,0,0,1f7e71cf7755409ec2cf8830e6d0a0c679d373aedb9b20dcc049bbb014d968fb,2024-12-11T20:32:54.970000 CVE-2024-44308,0,0,acc369578912d118b4a89ca8ee5987b89635f4149292d31f719e55be8c103584,2024-11-27T19:35:10.147000 CVE-2024-44309,0,0,52770843bac18ca9341a93eea8b19ddbef2c8812b70a8cb8a748cb3c19c4c5a4,2024-11-29T18:28:16.227000 CVE-2024-4431,0,0,357eff4f15b095adf7d0d7c2534d815a670275730c5f5456eabe410d4fe83988,2024-11-21T09:42:49.050000 @@ -268777,24 +268777,24 @@ CVE-2024-53105,0,0,49789fd38eb8c2e3aaed32c560b477653876ad3a281d38d4728b170cce015 CVE-2024-53106,0,0,30e3702644fc7a35784d9f94136dad383572937546c2f59633334350f5453e80,2024-12-02T14:15:11.420000 CVE-2024-53107,0,0,8f70c788a7b6178a3903b9f5f9459c260918d71bed6669c5c2bf534cedaffb24,2024-12-02T14:15:11.523000 CVE-2024-53108,0,0,b4292863b8ed237f808d295de102699b1ca4b4ad0a5c2696f066f9d9322750ce,2024-12-02T14:15:11.617000 -CVE-2024-53109,0,1,d80085f3f410dd8afe5fcb4bb2a7425adbf441880eea0d78d08351256f1f73ed,2024-12-11T20:21:25.433000 +CVE-2024-53109,0,0,d80085f3f410dd8afe5fcb4bb2a7425adbf441880eea0d78d08351256f1f73ed,2024-12-11T20:21:25.433000 CVE-2024-5311,0,0,f8378ba9ebef46eccbf323def8cbd96b7160acf8b4fbc81591c784546335a944,2024-11-21T09:47:24.407000 -CVE-2024-53110,0,1,bccbe74747dd8340ef9bab29109d8892c819998be48c1b36230170d42b1281e1,2024-12-11T20:24:25.883000 -CVE-2024-53111,0,1,e6cccb5360d7be828bc3d6ee06773ec6a738d42e94be83ed1e612e5458065938,2024-12-11T20:27:04.360000 -CVE-2024-53112,0,1,f9a5f14a5c91f3a4f9aec80e7e66bea060ee69c2aaf9fd454be8fbaa8e4997dd,2024-12-11T20:28:19.407000 -CVE-2024-53113,0,1,a5dbf8867cc8acd3bb02fb96e099532a2cc5c6a04e027b1659de7c1ee85ac36e,2024-12-11T20:29:10.150000 -CVE-2024-53114,0,1,0cb65a410b3587aabfb1cf3b28d41f6036958f6d46ab3f63ee8852d20e1cc953,2024-12-11T20:30:29.440000 -CVE-2024-53115,0,1,501caba5bd28664d84ca1ecb6b341727e67873c4d1380ad693f3be1beb2d4dfa,2024-12-11T20:31:39.927000 -CVE-2024-53116,0,1,93437c22f5df7465cbd26c3922add3afeeb61a2aa2abbbb83e35597c8fed0711,2024-12-11T20:34:11.147000 -CVE-2024-53117,0,1,10537f1f8b5d15eafcabda813e9011665124189b2e4722cf2ad12faaca24813a,2024-12-11T20:44:30.167000 -CVE-2024-53118,0,1,cf99f3a0b5334b8c2170fa08f994b6085545faed7e1f9a2e12fd06a382632f22,2024-12-11T20:52:52.993000 -CVE-2024-53119,0,1,a5cb29cc4540c3ac475fc1c857e391019e201a894198296122bd3cfa250d839d,2024-12-11T20:55:09.957000 +CVE-2024-53110,0,0,bccbe74747dd8340ef9bab29109d8892c819998be48c1b36230170d42b1281e1,2024-12-11T20:24:25.883000 +CVE-2024-53111,0,0,e6cccb5360d7be828bc3d6ee06773ec6a738d42e94be83ed1e612e5458065938,2024-12-11T20:27:04.360000 +CVE-2024-53112,0,0,f9a5f14a5c91f3a4f9aec80e7e66bea060ee69c2aaf9fd454be8fbaa8e4997dd,2024-12-11T20:28:19.407000 +CVE-2024-53113,0,0,a5dbf8867cc8acd3bb02fb96e099532a2cc5c6a04e027b1659de7c1ee85ac36e,2024-12-11T20:29:10.150000 +CVE-2024-53114,0,0,0cb65a410b3587aabfb1cf3b28d41f6036958f6d46ab3f63ee8852d20e1cc953,2024-12-11T20:30:29.440000 +CVE-2024-53115,0,0,501caba5bd28664d84ca1ecb6b341727e67873c4d1380ad693f3be1beb2d4dfa,2024-12-11T20:31:39.927000 +CVE-2024-53116,0,0,93437c22f5df7465cbd26c3922add3afeeb61a2aa2abbbb83e35597c8fed0711,2024-12-11T20:34:11.147000 +CVE-2024-53117,0,0,10537f1f8b5d15eafcabda813e9011665124189b2e4722cf2ad12faaca24813a,2024-12-11T20:44:30.167000 +CVE-2024-53118,0,0,cf99f3a0b5334b8c2170fa08f994b6085545faed7e1f9a2e12fd06a382632f22,2024-12-11T20:52:52.993000 +CVE-2024-53119,0,0,a5cb29cc4540c3ac475fc1c857e391019e201a894198296122bd3cfa250d839d,2024-12-11T20:55:09.957000 CVE-2024-5312,0,0,76fc8f0f224e779c413fe7053d6cc7231c000374597daa3fa125fa2942cfd8ea,2024-11-21T09:47:24.540000 -CVE-2024-53120,0,1,9b354eea941c64c4589ba6b55c7962c2166bcaf461a5602e55b7e9dbb37c2b79,2024-12-11T20:59:36.660000 -CVE-2024-53121,0,0,20e6456104ca3e9475977760331dbe5bef10a1641e5a4ae3e9d30fe889a1eb88,2024-12-02T14:15:12.877000 -CVE-2024-53122,0,0,296e5c6ddaf65cb73532dbf1c8691b97f4aceba923bea3b92ff6182e3e9a96fc,2024-12-02T14:15:13.010000 -CVE-2024-53123,0,0,24dcf5fc8c07696d4316a0bcaae80c912836766e13bc36abf856ed9cfdf90e86,2024-12-02T14:15:13.120000 -CVE-2024-53124,0,0,da81b079a26032372df994f5cc215d5737b556ce711aee1c1f9f02abac5fe165,2024-12-02T14:15:13.220000 +CVE-2024-53120,0,0,9b354eea941c64c4589ba6b55c7962c2166bcaf461a5602e55b7e9dbb37c2b79,2024-12-11T20:59:36.660000 +CVE-2024-53121,0,1,c784b514ac824b9af34f671a5c9ebc46030ed727296d3483ccb0b52d3f63b9b3,2024-12-11T21:02:03.497000 +CVE-2024-53122,0,1,d72ee4c9f60aa0f8d03561fa938ededb616ddb009d68487a3c6d0759955d76a9,2024-12-11T21:14:05.653000 +CVE-2024-53123,0,1,71f21729080a0e801a6cb2164f291576ac0021d8430a91e80e44111e111f8773,2024-12-11T21:17:25.020000 +CVE-2024-53124,0,1,e15bbc6c2ee57925aa9c911b0c64603cd3032e04ba61e93fffa6217082d7a4b0,2024-12-11T21:18:59.720000 CVE-2024-53125,0,0,d287d13c96190c9b37b83c5ddd3e5440e1a3556c4f4f915762743d7e8ac2ac93,2024-12-04T14:15:20.460000 CVE-2024-53126,0,0,a72263375ba67d50282c60abedec935bfe8d50e7cbcfeba2f1a3d6ecee961c22,2024-12-11T17:26:28.807000 CVE-2024-53127,0,0,cec2242d0c78ed327c08b697c91b7aa54e84f1501c9625675c6496076be61db6,2024-12-11T17:30:25.387000