diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33145.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33145.json index b7df78d8778..10e82cc1edc 100644 --- a/CVE-2021/CVE-2021-331xx/CVE-2021-33145.json +++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33145.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33145", "sourceIdentifier": "secure@intel.com", "published": "2024-02-23T21:15:09.410", - "lastModified": "2024-07-03T01:36:45.387", + "lastModified": "2024-10-25T19:35:00.780", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -49,16 +49,6 @@ "value": "CWE-248" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-248" - } - ] } ], "references": [ diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30355.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30355.json index 6e7768af383..584ada2f714 100644 --- a/CVE-2022/CVE-2022-303xx/CVE-2022-30355.json +++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30355.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30355", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T16:15:08.733", - "lastModified": "2024-10-25T16:15:08.733", + "lastModified": "2024-10-25T19:35:01.173", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "OvalEdge 5.2.8.0 and earlier is affected by an Account Takeover vulnerability via a POST request to /profile/updateProfile via the userId and email parameters. Authentication is required." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/account-takeover#cve-2022-30355", diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48975.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48975.json index 586ebb149bf..29dfd83fb4f 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48975.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48975.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48975", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:09.597", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T18:48:57.490", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,129 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gpiolib: reparar p\u00e9rdida de memoria en gpiochip_setup_dev() Aqu\u00ed hay un informe de seguimiento sobre la p\u00e9rdida de memoria detectada en gpiochip_setup_dev(): objeto sin referencia 0xffff88810b406400 (tama\u00f1o 512): comm \"python3\", pid 1682, jiffies 4295346908 (edad 24.090s) seguimiento: kmalloc_trace device_add device_private_init en drivers/base/core.c:3361 (en l\u00ednea por) device_add en drivers/base/core.c:3411 cdev_device_add gpiolib_cdev_register gpiochip_setup_dev gpiochip_add_data_with_key gcdev_register() y gcdev_unregister() llamar\u00edan device_add() y device_del() (sin importar si CONFIG_GPIO_CDEV est\u00e1 habilitado o no) para registrar/anular el registro del dispositivo. Sin embargo, si device_add() tiene \u00e9xito, alg\u00fan recurso (como la estructura device_private asignada por device_private_init()) no es liberado por device_del(). Por lo tanto, despu\u00e9s de que device_add() tenga \u00e9xito por gcdev_register(), necesita llamar a put_device() para liberar el recurso en la ruta del controlador de error. Aqu\u00ed avanzamos el registro de la funci\u00f3n de liberaci\u00f3n y dejamos que libere cada pieza de recurso por put_device() en lugar de kfree(). Mientras lo hacemos, solucionamos otro problema sutil, es decir, cuando gc->ngpio es igual a 0, todav\u00eda llamamos a kcalloc() y, en caso de un error adicional, a kfree() en el puntero ZERO_PTR, que no es NULL. No es un error en s\u00ed, sino m\u00e1s bien un desperdicio de recursos y una expectativa potencialmente err\u00f3nea sobre el contenido de la variable gdev->descs." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.6", + "versionEndExcluding": "5.15.83", + "matchCriteriaId": "DF176C32-811C-421C-964D-E3513DD1789F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.0.13", + "matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", + "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", + "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", + "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", + "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", + "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/371363716398ed718e389bea8c5e9843a79dde4e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6daaa84b621485fe28c401be18debf92ae8ef04a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ec851b23084b3a0af8bf0f5e51d33a8d678bdc49", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48976.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48976.json index aa48350667b..04bc86da74a 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48976.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48976.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48976", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:09.680", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T18:47:40.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,115 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: flowtable_offload: correcci\u00f3n al usar __this_cpu_add en preemptible flow_offload_queue_work() se puede llamar en workqueue sin bh deshabilitado, como el seguimiento de llamadas que mostr\u00f3 en mi prueba act_ct, llamar a NF_FLOW_TABLE_STAT_INC() all\u00ed causar\u00eda un seguimiento de llamadas: ERROR: usar __this_cpu_add() en preemptible [00000000] c\u00f3digo: kworker/u4:0/138560 el llamador es flow_offload_queue_work+0xec/0x1b0 [nf_flow_table] Workqueue: act_ct_workqueue tcf_ct_flow_table_cleanup_work [act_ct] Seguimiento de llamadas: dump_stack_lvl+0x33/0x46 check_preemption_disabled+0xc3/0xf0 Este parche lo corrige al usar NF_FLOW_TABLE_STAT_INC_ATOMIC() en lugar de flow_offload_queue_work(). Tenga en cuenta que para la rama FLOW_CLS_REPLACE en flow_offload_queue_work(), es posible que no se la llame en una ruta preemptible, pero es bueno usar NF_FLOW_TABLE_STAT_INC_ATOMIC() para todos los casos en flow_offload_queue_work()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.157", + "versionEndExcluding": "6.0.13", + "matchCriteriaId": "3FC10E8F-D0FF-45C4-A8F5-7ABB6F91A19E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*", + "matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*", + "matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc7:*:*:*:*:*:*", + "matchCriteriaId": "DE5298B3-04B4-4F3E-B186-01A58B5C75A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc8:*:*:*:*:*:*", + "matchCriteriaId": "E9D7C49C-53E7-4B23-9AFE-DAC5A18B153A" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/a220a11fda012fba506b35929672374c2723ae6d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a81047154e7ce4eb8769d5d21adcbc9693542a79", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48977.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48977.json index 5468b59b8c8..d4502c7a92e 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48977.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48977.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48977", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:09.763", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T18:47:07.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -12,30 +12,160 @@ }, { "lang": "es", - "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: af_can: fix NULL pointer dereference in can_rcv_filter De manera an\u00e1loga a el commit 8aa59e355949 (\"can: af_can: fix NULL pointer dereference in can_rx_register()\"), debemos comprobar si falta una inicializaci\u00f3n de ml_priv en la ruta de recepci\u00f3n de los marcos CAN. Desde el commit 4e096a18867a (\"net: introduce CAN specific pointer in the struct net_device\"), la comprobaci\u00f3n de que dev->type sea ARPHRD_CAN ya no es suficiente, ya que los netdevices bonding o tun afirman ser dispositivos CAN pero no inicializan ml_priv en consecuencia." + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: af_can: fix NULL pointer dereference in can_rcv_filter De manera an\u00e1loga a el commit 8aa59e355949 (\"can: af_can: fix NULL pointer dereference in can_rx_register()\"), debemos comprobar si falta una inicializaci\u00f3n de ml_priv en la ruta de recepci\u00f3n de los marcos CAN. Desde el commit 4e096a18867a (\"net: introduzca el puntero espec\u00edfico de CAN en la estructura net_device\"), la verificaci\u00f3n de que dev->type sea ARPHRD_CAN ya no es suficiente ya que los dispositivos de red vinculados o sintonizados afirman ser dispositivos CAN pero no inicializan ml_priv en consecuencia." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.110", + "versionEndExcluding": "5.4.227", + "matchCriteriaId": "F5FB1A61-365F-4CA9-9623-69C6889A6E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.28", + "versionEndExcluding": "5.10.159", + "matchCriteriaId": "B4EFBE85-872C-4731-AD53-6DB3F3132B63" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11.12", + "versionEndExcluding": "5.15.83", + "matchCriteriaId": "34D9B7A6-0CC8-4839-B206-AF0CEAC1CAFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.0.13", + "matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", + "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", + "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", + "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", + "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", + "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/0acc442309a0a1b01bcdaa135e56e6398a49439c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3982652957e8d79ac32efcb725450580650a8644", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c142cba37de29f740a3852f01f59876af8ae462a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c42221efb1159d6a3c89e96685ee38acdce86b6f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fcc63f2f7ee3038d53216edd0d8291e57c752557", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48978.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48978.json index 5068bbad56f..ee9fb453796 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48978.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48978.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48978", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:09.850", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T18:46:23.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,199 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: HID: n\u00facleo: se corrige un desplazamiento fuera de los l\u00edmites en hid_report_raw_event Syzbot inform\u00f3 un desplazamiento fuera de los l\u00edmites en hid_report_raw_event. microsoft 0003:045E:07DA.0001: hid_field_extract() llamado con n (128) > 32! (swapper/0) ========================================================================== UBSAN: cambio fuera de los l\u00edmites en drivers/hid/hid-core.c:1323:20 el exponente de cambio 127 es demasiado grande para el tipo de 32 bits 'int' CPU: 0 PID: 0 Comm: swapper/0 No contaminado 6.1.0-rc4-syzkaller-00159-g4bbf3422df78 #0 Nombre del hardware: Google Compute Engine/Google Compute Engine, BIOS Google 26/10/2022 Rastreo de llamadas: __dump_stack lib/dump_stack.c:88 [en l\u00ednea] dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106 ubsan_epilogue lib/ubsan.c:151 [en l\u00ednea] __ubsan_handle_shift_out_of_bounds+0x3a6/0x420 lib/ubsan.c:322 snto32 drivers/hid/hid-core.c:1323 [en l\u00ednea] hid_input_fetch_field drivers/hid/hid-core.c:1572 [en l\u00ednea] hid_process_report drivers/hid/hid-core.c:1665 [en l\u00ednea] hid_report_raw_event+0xd56/0x18b0 drivers/hid/hid-core.c:1998 hid_input_report+0x408/0x4f0 drivers/hid/hid-core.c:2066 hid_irq_in+0x459/0x690 drivers/hid/usbhid/hid-core.c:284 __usb_hcd_giveback_urb+0x369/0x530 drivers/usb/core/hcd.c:1671 dummy_timer+0x86b/0x3110 drivers/usb/gadget/udc/dummy_hcd.c:1988 call_timer_fn+0xf5/0x210 kernel/time/timer.c:1474 expire_timers kernel/time/timer.c:1519 [en l\u00ednea] __run_timers+0x76a/0x980 kernel/time/timer.c:1790 run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1803 __do_softirq+0x277/0x75b kernel/softirq.c:571 __irq_exit_rcu+0xec/0x170 kernel/softirq.c:650 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662 sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1107 ================================================================================== Si el tama\u00f1o del entero (n sin signo) es mayor que 32 en snto32(), el exponente de desplazamiento ser\u00e1 demasiado grande para 32 bits. Tipo 'int', lo que genera un error de desplazamiento fuera de los l\u00edmites. Solucione este problema agregando una verificaci\u00f3n del tama\u00f1o del entero (n sin signo) en snto32(). Para agregar compatibilidad con n mayor que 32 bits, configure n en 32, si n es mayor que 32." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.20", + "versionEndExcluding": "4.9.336", + "matchCriteriaId": "216EAACF-C9C3-4743-AC2C-A93410590082" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.302", + "matchCriteriaId": "FB3E1F82-01A3-456E-9C83-D567B9A75815" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.269", + "matchCriteriaId": "1185B8E3-712E-4BFB-BD01-78D47F7EF1F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.227", + "matchCriteriaId": "8C752145-904B-474A-A7F2-E9F29353B0FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.159", + "matchCriteriaId": "7318B597-DFFD-4BBC-A947-539D6E30D82A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.83", + "matchCriteriaId": "90897BD1-104D-4CFF-94F5-29F9041217FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.0.13", + "matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", + "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", + "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", + "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", + "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", + "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/151493fe5a6ed1a88decc929a7368a3f2a246914", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2b3b4d7aadaa1b6b58d0f34823bf86cfe8a31b4d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/809783f8b4b600c7fb3bccb10fefef822601ea3b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8e14f20e12224ee2429f75a5c9418a700e26a8d3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bc03f809da78fc79e4aee132d4e5c6a2b3aeec73", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/db1ed1b3fb4ec0d19080a102956255769bc45c79", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ec61b41918587be530398b0d1c9a0d16619397e5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f755d11c55b29049b77da5cd9ab2faae96eb33c3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48979.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48979.json index c7d1d61f0d2..1b542900708 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48979.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48979.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48979", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:09.947", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T18:40:16.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,114 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: se corrige el error de \u00edndice de matriz fuera de l\u00edmite en DCN32 DML [Por qu\u00e9 y c\u00f3mo] La matriz LinkCapacitySupport est\u00e1 indexada con la cantidad de estados de voltaje y no con la cantidad m\u00e1xima de DPP. Corrija el error modificando la declaraci\u00f3n de la matriz para utilizar el tama\u00f1o de matriz correcto (m\u00e1s grande) de la cantidad total de estados de voltaje." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.0.13", + "matchCriteriaId": "307077FA-2651-41AE-A0DB-B92E0E7F5AE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", + "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", + "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", + "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", + "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", + "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3d8a298b2e83b98042e6ec726e934f535b23e6aa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/aeffc8fb2174f017a10df114bc312f899904dc68", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48980.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48980.json index e3c69fc49e1..5f6e39fabcc 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48980.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48980.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48980", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:10.037", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T18:36:00.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,129 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dsa: sja1105: evitar acceso fuera de los l\u00edmites en sja1105_init_l2_policing() La familia SJA1105 tiene 45 entradas de tabla de control de L2 (SJA1105_MAX_L2_POLICING_COUNT) y SJA1110 tiene 110 (SJA1110_MAX_L2_POLICING_COUNT). Mantener la estructura de la tabla pero tener en cuenta la diferencia en el recuento de puertos (5 en SJA1105 frente a 10 en SJA1110) no explica completamente la diferencia. En cambio, SJA1110 tambi\u00e9n tiene controladores de ingreso de L2 para tr\u00e1fico de multidifusi\u00f3n. Si un paquete se clasifica como de multidifusi\u00f3n, ser\u00e1 procesado por el \u00edndice de controlador 99 + SRCPORT. La funci\u00f3n sja1105_init_l2_policing() inicializa todos los controladores de L2 de modo que no interfieran con la recepci\u00f3n normal de paquetes de forma predeterminada. Para tener un c\u00f3digo com\u00fan entre SJA1105 y SJA1110, se calcula el \u00edndice del controlador de multidifusi\u00f3n para el puerto porque es un \u00edndice que est\u00e1 fuera de los l\u00edmites para SJA1105 pero dentro de los l\u00edmites para SJA1110, y se realiza una comprobaci\u00f3n de los l\u00edmites. El c\u00f3digo no hace lo correcto al determinar qu\u00e9 hacer con el controlador de multidifusi\u00f3n del puerto 0 en SJA1105 (ds->num_ports = 5). El \u00edndice \"mcast\" ser\u00e1 igual a 45, que tambi\u00e9n es igual a table->ops->max_entry_count (SJA1105_MAX_L2_POLICING_COUNT). Por lo tanto, pasa por la comprobaci\u00f3n. Pero al mismo tiempo, SJA1105 no tiene controladores de multidifusi\u00f3n. Por lo tanto, el c\u00f3digo programa el campo SHARINDX de un elemento fuera de los l\u00edmites en la tabla de control L2 de la configuraci\u00f3n est\u00e1tica. La comparaci\u00f3n entre las entradas del \u00edndice 45 y 45 deber\u00eda haber determinado que el c\u00f3digo no accediera a este \u00edndice de control en SJA1105, ya que su memoria ni siquiera estaba asignada. Con suficiente mala suerte, la escritura fuera de los l\u00edmites podr\u00eda incluso sobrescribir otros datos v\u00e1lidos del kernel, pero en este caso, el problema se detect\u00f3 mediante KASAN. Registro del n\u00facleo: sja1105 spi5.0: Chip conmutador sondeado: SJA1105Q ===================================================================== ERROR: KASAN: slab fuera de los l\u00edmites en sja1105_setup+0x1cbc/0x2340 Escritura de tama\u00f1o 8 en la direcci\u00f3n ffffff880bd57708 por la tarea kworker/u8:0/8 ... Cola de trabajo: events_unbound deferred_probe_work_func Rastreo de llamadas: ... sja1105_setup+0x1cbc/0x2340 dsa_register_switch+0x1284/0x18d0 sja1105_probe+0x748/0x840 ... Asignado por la tarea 8: ... sja1105_setup+0x1bcc/0x2340 dsa_register_switch+0x1284/0x18d0 sja1105_probe+0x748/0x840 ..." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.14", + "versionEndExcluding": "5.15.83", + "matchCriteriaId": "0CB0CF0B-86CE-444B-829F-234C83EB7764" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.0.13", + "matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", + "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", + "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", + "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", + "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", + "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/147f3e3d84054117ae6b9bf317ec4fda9f991192", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5e88c6f4aaa70c542e59e5a9d2244bcc99cd245d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f8bac7f9fdb0017b32157957ffffd490f95faa07", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48981.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48981.json index d9a0bbfc513..daa45e3af6f 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48981.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48981.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48981", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:10.130", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T18:33:18.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,157 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/shmem-helper: eliminar una ubicaci\u00f3n errada en la ruta de error drm_gem_shmem_mmap() no posee esta referencia, lo que provoca que el objeto GEM se libere prematuramente y lleve a un use after free." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.2", + "versionEndExcluding": "5.4.227", + "matchCriteriaId": "7B395613-A8F7-4D25-ACBF-81183F723931" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.159", + "matchCriteriaId": "7318B597-DFFD-4BBC-A947-539D6E30D82A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.83", + "matchCriteriaId": "90897BD1-104D-4CFF-94F5-29F9041217FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.0.13", + "matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", + "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", + "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", + "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", + "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", + "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/24013314be6ee4ee456114a671e9fa3461323de8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/585a07b820059462e0c93b76c7de2cd946b26b40", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/586847b98e20ab02212ca5c1fc46680384e68a28", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6a4da05acd062ae7774b6b19cef2b7d922902d36", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/83e3da8bb92fcfa7a1d232cf55f9e6c49bb84942", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48982.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48982.json index 22abb6b2d5d..e76682929d2 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48982.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48982.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48982", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:10.210", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T18:12:52.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,142 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: Se soluciona el fallo al volver a conectar controladores falsos de CSR Parece que los clones falsos de CSR 5.0 pueden provocar que el notificador de suspensi\u00f3n se registre dos veces, lo que provoca el siguiente p\u00e1nico del kernel: [ 71.986122] Seguimiento de llamadas: [ 71.986124] [ 71.986125] blocking_notifier_chain_register+0x33/0x60 [ 71.986130] hci_register_dev+0x316/0x3d0 [bluetooth 99b5497ea3d09708fa1366c1dc03288bf3cca8da] [ 71.986154] btusb_probe+0x979/0xd85 [btusb es: e1e0605a4f4c01984a4b9c8ac58c3666ae287477] [ 71.986159] ? __pm_runtime_set_status+0x1a9/0x300 [ 71.986162] ? ktime_get_mono_fast_ns+0x3e/0x90 [ 71.986167] interfaz_sonda_usb+0xe3/0x2b0 [ 71.986171] realmente_sonda+0xdb/0x380 [ 71.986174] ? pm_runtime_barrier+0x54/0x90 [ 71.986177] __driver_probe_device+0x78/0x170 [ 71.986180] __driver_probe_device+0x1f/0x90 [ 71.986183] __device_attach_driver+0x89/0x110 [ 71.986186] ? driver_allows_async_probing+0x70/0x70 [ 71.986189] bus_para_cada_unidad+0x8c/0xe0 [ 71.986192] __dispositivo_adjunto+0xb2/0x1e0 [ 71.986195] bus_sondeo_dispositivo+0x92/0xb0 [ 71.986198] dispositivo_agregado+0x422/0x9a0 [ 71.986201] ? usb_probe_device+0x3a/0x110 [ 71.986213] realmente_probe+0xdb/0x380 [ 71.986216] ? pm_runtime_barrier+0x54/0x90 [ 71.986219] __driver_probe_device+0x78/0x170 [ 71.986221] driver_probe_device+0x1f/0x90 [ 71.986224] __device_attach_driver+0x89/0x110 [ 71.986227] ? driver_allows_async_probing+0x70/0x70 [ 71.986230] bus_para_cada_unidad+0x8c/0xe0 [ 71.986232] __device_attach+0xb2/0x1e0 [ 71.986235] bus_probe_device+0x92/0xb0 [ 71.986237] device_add+0x422/0x9a0 [ 71.986239] ? _dev_info+0x7d/0x98 [ 71.986242] ? subproceso de rescate+0x3b0/0x3b0 [ 71.986264] kthread+0xdb/0x110 [ 71.986266] ? kthread_complete_and_exit+0x20/0x20 [ 71.986268] ret_from_fork+0x1f/0x30 [ 71.986273] [ 71.986274] ---[ fin de seguimiento 000000000000000 ]--- [ 71.986284] btusb: la sonda de 2-1.6:1.0 fall\u00f3 con el error -17" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.10.159", + "matchCriteriaId": "231FA27F-3CFC-4735-9239-290B1E5FE075" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.83", + "matchCriteriaId": "90897BD1-104D-4CFF-94F5-29F9041217FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.0.13", + "matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", + "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", + "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", + "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", + "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", + "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/549b46f8130effccf168293270bb3b1d5da529cc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a49894a5ac3656f1a4f0f6b110460060e8026bf8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b5ca338751ad4783ec8d37b5d99c3e37b7813e59", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dc8fa6570deadb70c3fb74d7cd8ce38849feaed0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36490.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36490.json index 8fdb378185d..746a0417fd5 100644 --- a/CVE-2023/CVE-2023-364xx/CVE-2023-36490.json +++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36490.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36490", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:16:00.667", - "lastModified": "2024-02-14T15:01:46.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T19:40:43.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:memory_and_storage_tool:*:*:*:*:*:linux:*:*", + "versionEndExcluding": "2.3", + "matchCriteriaId": "B9C6E596-8C30-4C02-88C3-48479CA2CB8E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:memory_and_storage_tool:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "2.3", + "matchCriteriaId": "E70B0EEA-5331-4BA0-BE22-2459E670205A" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00967.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37057.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37057.json index 3c2acd7f2b5..4fdd93495cb 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37057.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37057.json @@ -2,7 +2,7 @@ "id": "CVE-2023-37057", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T21:15:50.380", - "lastModified": "2024-07-03T01:40:30.133", + "lastModified": "2024-10-25T19:35:02.943", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-288" - } - ] - } - ], "references": [ { "url": "http://jlink.com", diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38135.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38135.json index 9761967fcc2..4992e558412 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38135.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38135.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38135", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:16:01.080", - "lastModified": "2024-02-14T15:01:46.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T19:41:09.790", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:performance_maximizer:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9B406362-D75F-40C3-8A53-FA746FCBF4AF" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00958.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38561.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38561.json index 75b2566ba56..536554d9324 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38561.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38561.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38561", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:16:01.300", - "lastModified": "2024-02-14T15:01:46.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T19:58:38.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:extreme_tuning_utility:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.12.0.29", + "matchCriteriaId": "F68E64E6-DBCF-431D-B5D8-8A4AFF38143E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00955.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40156.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40156.json index db9e7600880..1501c587fef 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40156.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40156.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40156", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:16:04.863", - "lastModified": "2024-02-14T15:01:46.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T19:59:00.933", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:system_support_utility:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "3.0.0.2", + "matchCriteriaId": "9AFED636-905C-44B4-A70D-1BA5ED3A9208" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01011.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50806.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50806.json index c89bd4ae263..b333e79c5af 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50806.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50806.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50806", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-09T19:15:10.820", - "lastModified": "2024-07-11T15:05:15.190", + "lastModified": "2024-10-25T18:35:02.050", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-122" + "value": "CWE-125" } ] } diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7261.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7261.json index d38c9acfa8b..a52be62dc27 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7261.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7261.json @@ -2,7 +2,7 @@ "id": "CVE-2023-7261", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-07T20:15:10.887", - "lastModified": "2024-07-03T01:44:30.563", + "lastModified": "2024-10-25T19:35:03.273", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-233" - } - ] - } - ], "references": [ { "url": "https://issues.chromium.org/issues/40064602", diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10045.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10045.json index bd5703336fd..2c3362a4999 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10045.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10045.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10045", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-23T08:15:02.380", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T18:52:30.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpbeginner:transients_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.7", + "matchCriteriaId": "35AAA6CC-C7DF-45F5-AF93-2BED68C3AC8C" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/transients-manager/trunk/src/TransientsManager.php#L993", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3171619/transients-manager/trunk/src/TransientsManager.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/03b8b5a2-979d-42d0-86f5-48ee73162d22?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10298.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10298.json index a5501a7cef4..fd5d6cd3a65 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10298.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10298.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10298", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-23T19:15:14.920", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T18:51:44.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:medical_card_generation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "024186C5-26DF-43AC-BDEA-732C94D55DF8" + } + ] + } + ] + } + ], "references": [ { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.281565", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281565", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.427403", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10299.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10299.json index d336098b002..3e976cf97c8 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10299.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10299.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10299", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-23T19:15:15.183", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T18:51:17.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,18 +140,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:medical_card_generation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "024186C5-26DF-43AC-BDEA-732C94D55DF8" + } + ] + } + ] + } + ], "references": [ { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.281566", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281566", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10300.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10300.json index 526ea2b7bf1..a8e27a8a623 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10300.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10300.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10300", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-23T20:15:05.060", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T18:49:01.953", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:medical_card_generation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "024186C5-26DF-43AC-BDEA-732C94D55DF8" + } + ] + } + ] + } + ], "references": [ { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.281567", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281567", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.427404", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10301.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10301.json index 3825901b06f..cfbeca35b35 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10301.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10301.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10301", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-23T20:15:05.310", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T18:47:54.033", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:medical_card_generation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "024186C5-26DF-43AC-BDEA-732C94D55DF8" + } + ] + } + ] + } + ], "references": [ { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.281568", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281568", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.427405", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1694.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1694.json index 290b6caedea..ba088b312df 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1694.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1694.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1694", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-07T20:15:10.973", - "lastModified": "2024-08-01T13:46:10.687", + "lastModified": "2024-10-25T19:35:03.987", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-474" - } - ] - } - ], "references": [ { "url": "https://issues.chromium.org/issues/40946325", diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21741.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21741.json index e8127f04058..308ecb3bd7a 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21741.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21741.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21741", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-25T21:15:57.357", - "lastModified": "2024-07-03T01:46:46.537", + "lastModified": "2024-10-25T18:35:03.493", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-284" - } - ] - } - ], "references": [ { "url": "https://tches.iacr.org/index.php/TCHES/article/view/11422/10927", diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21828.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21828.json index 7a8ba0172ff..f8cc37d7d32 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21828.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21828.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21828", "sourceIdentifier": "secure@intel.com", "published": "2024-05-16T21:16:04.083", - "lastModified": "2024-07-03T01:46:50.690", + "lastModified": "2024-10-25T19:35:04.160", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -49,16 +49,6 @@ "value": "CWE-284" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-284" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22020.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22020.json index 3c4dac0cd4f..44317c21a1f 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22020.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22020.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22020", "sourceIdentifier": "support@hackerone.com", "published": "2024-07-09T02:15:09.973", - "lastModified": "2024-07-19T14:15:05.863", + "lastModified": "2024-10-25T18:35:03.697", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-284" - } - ] - } - ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/07/11/6", diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22855.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22855.json index 66fa6457d45..5111102a16d 100644 --- a/CVE-2024/CVE-2024-228xx/CVE-2024-22855.json +++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22855.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22855", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-12T17:15:49.913", - "lastModified": "2024-07-22T20:12:59.693", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-25T18:41:33.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -22,19 +22,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 6.1, + "baseScore": 5.4, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 2.3, "impactScore": 2.7 } ] @@ -60,9 +60,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:itss:imlog:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:itssglobal:imlog:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.308", - "matchCriteriaId": "83EECA1D-8AA7-4021-8318-25C36CC8B08A" + "matchCriteriaId": "A39ED7F6-AB8C-423E-AEEA-AE286390EBE4" } ] } @@ -75,7 +75,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] } ] diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23709.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23709.json index c649d8534db..6882ae96a90 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23709.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23709.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23709", "sourceIdentifier": "security@android.com", "published": "2024-05-07T21:15:08.877", - "lastModified": "2024-07-03T01:48:03.920", + "lastModified": "2024-10-25T19:35:04.277", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-122" + "value": "CWE-787" } ] } diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23766.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23766.json index 899ac0dcb0e..ad3bc9559de 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23766.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23766.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23766", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T21:15:12.977", - "lastModified": "2024-07-03T01:48:06.303", + "lastModified": "2024-10-25T18:35:03.847", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-598" - } - ] - } - ], "references": [ { "url": "https://sensepost.com/blog/2024/targeting-an-industrial-protocol-gateway/", diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28805.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28805.json index e7ef28fa411..b82b0509945 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28805.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28805.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28805", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-29T19:15:11.990", - "lastModified": "2024-08-01T13:49:19.450", + "lastModified": "2024-10-25T18:35:04.053", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-284" - } - ] - } - ], "references": [ { "url": "https://www.gruppotim.it/it/footer/red-team.html", diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28820.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28820.json index f22ab70ad8e..a3976d3f1d2 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28820.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28820.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28820", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-27T16:15:10.950", - "lastModified": "2024-07-03T01:51:51.323", + "lastModified": "2024-10-25T18:35:04.300", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-121" - } - ] - } - ], "references": [ { "url": "https://github.com/threerings/openvpn-auth-ldap/pull/92", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31331.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31331.json index 59a44177131..27984b3b65b 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31331.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31331.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31331", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:13.883", - "lastModified": "2024-07-12T16:11:33.867", + "lastModified": "2024-10-25T18:35:04.490", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-783" - } - ] - } - ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/c8694bbccfb9c19aefed536ea710230107c935eb", diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33375.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33375.json index 6b82f7ff5ad..e19111bf996 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33375.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33375.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33375", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-14T15:15:50.170", - "lastModified": "2024-08-01T13:51:54.967", + "lastModified": "2024-10-25T19:35:05.053", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-256" - } - ] - } - ], "references": [ { "url": "https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Credentials-Stored-in-Cleartext--%7C--Unencrypted-Credentials-%28CVE%E2%80%902024%E2%80%9033375%29", diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33781.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33781.json index 05ec648024d..7e0685f3815 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33781.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33781.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33781", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T14:15:10.880", - "lastModified": "2024-07-03T01:58:45.220", + "lastModified": "2024-10-25T19:35:05.260", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-121" + "value": "CWE-125" } ] } diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34329.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34329.json index 15c76796af9..a540a62e389 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34329.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34329.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34329", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T20:15:03.673", - "lastModified": "2024-08-01T13:52:19.990", + "lastModified": "2024-10-25T18:35:04.677", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-378" - } - ] - } - ], "references": [ { "url": "https://github.com/pamoutaf/CVE-2024-34329/blob/main/README.md", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34724.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34724.json index fa122c8f85e..cd29ebae5bb 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34724.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34724.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34724", "sourceIdentifier": "security@android.com", "published": "2024-07-09T21:15:14.487", - "lastModified": "2024-07-12T16:11:39.470", + "lastModified": "2024-10-25T18:35:04.870", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-368" + "value": "CWE-362" } ] } diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35308.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35308.json index a914cc0980e..906d234f9b4 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35308.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35308.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35308", "sourceIdentifier": "security@pandorafms.com", "published": "2024-10-22T09:15:02.927", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T19:06:14.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "security@pandorafms.com", "type": "Secondary", @@ -73,10 +105,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pandorafms:pandora_fms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "700", + "versionEndExcluding": "777.3", + "matchCriteriaId": "0443A569-9987-4E63-A2AD-749B76A5A22A" + } + ] + } + ] + } + ], "references": [ { "url": "https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/", - "source": "security@pandorafms.com" + "source": "security@pandorafms.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36037.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36037.json index 7b01b78be9e..f329f8b7b26 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36037.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36037.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36037", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-05-27T18:15:10.407", - "lastModified": "2024-10-07T20:15:05.720", + "lastModified": "2024-10-25T19:35:06.023", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -49,16 +49,6 @@ "value": "CWE-863" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-284" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36540.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36540.json index 2938ac868d6..443a934a020 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36540.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36540.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36540", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T17:15:10.827", - "lastModified": "2024-08-01T13:53:04.590", + "lastModified": "2024-10-25T18:35:05.643", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-284" - } - ] - } - ], "references": [ { "url": "https://gist.github.com/HouqiyuA/a4834f3c8450f9d89e2bc4d5c4beef6a", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36542.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36542.json index 707228c5ba6..19150a23b91 100644 --- a/CVE-2024/CVE-2024-365xx/CVE-2024-36542.json +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36542.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36542", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-25T17:15:10.710", - "lastModified": "2024-08-01T13:53:06.130", + "lastModified": "2024-10-25T18:35:05.827", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-284" - } - ] - } - ], "references": [ { "url": "https://gist.github.com/HouqiyuA/e1685843b6f42b47dbf97e2e92e63428", diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37289.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37289.json index c4cbb528a11..0217b030406 100644 --- a/CVE-2024/CVE-2024-372xx/CVE-2024-37289.json +++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37289.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37289", "sourceIdentifier": "security@trendmicro.com", "published": "2024-06-10T22:15:12.893", - "lastModified": "2024-07-03T02:04:12.080", + "lastModified": "2024-10-25T19:35:06.150", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-284" - } - ] - } - ], "references": [ { "url": "https://success.trendmicro.com/dcx/s/solution/000298063", diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37570.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37570.json index 0596b8901cc..f1eb1f07875 100644 --- a/CVE-2024/CVE-2024-375xx/CVE-2024-37570.json +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37570.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37570", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-09T20:15:09.460", - "lastModified": "2024-08-01T13:53:45.687", + "lastModified": "2024-10-25T19:35:06.277", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-75" + "value": "CWE-77" } ] } diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37634.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37634.json index a97d8966a2e..fadcc2fc651 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37634.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37634.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37634", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-13T19:15:52.537", - "lastModified": "2024-07-03T02:04:25.770", + "lastModified": "2024-10-25T19:35:07.043", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-121" - } - ] - } - ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWiFiEasyCfg/README.md", diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37661.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37661.json index 9a11fb84b31..b4aabefe9c6 100644 --- a/CVE-2024/CVE-2024-376xx/CVE-2024-37661.json +++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37661.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37661", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-17T18:15:17.463", - "lastModified": "2024-07-03T02:04:33.177", + "lastModified": "2024-10-25T19:35:07.220", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-940" - } - ] - } - ], "references": [ { "url": "https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/tl-7dr5130-redirect.md", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37844.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37844.json new file mode 100644 index 00000000000..e3af5b4915e --- /dev/null +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37844.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-37844", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-25T19:15:03.897", + "lastModified": "2024-10-25T19:15:03.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A stored cross-site scripting (XSS) vulnerability in MangoOS before 5.2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/herombey/Disclosures/blob/main/CVE-2024-37844%20XSS.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/herombey/Disclosures/tree/main", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37845.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37845.json new file mode 100644 index 00000000000..b38624f75fb --- /dev/null +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37845.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-37845", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-25T19:15:03.973", + "lastModified": "2024-10-25T19:15:03.973", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "MangoOS before 5.2.0 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the Active Process Command feature." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/herombey/Disclosures/blob/main/CVE-2024-37845%20RCE.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/herombey/Disclosures/tree/main", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37846.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37846.json new file mode 100644 index 00000000000..1ac9afc615d --- /dev/null +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37846.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-37846", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-25T19:15:04.027", + "lastModified": "2024-10-25T19:15:04.027", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "MangoOS before 5.2.0 was discovered to contain a Client-Side Template Injection (CSTI) vulnerability via the Platform Management Edit page." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/herombey/Disclosures/blob/main/CVE-2024-37846-CSTI.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/herombey/Disclosures/tree/main", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37847.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37847.json new file mode 100644 index 00000000000..ce01113b1ee --- /dev/null +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37847.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-37847", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-25T19:15:04.087", + "lastModified": "2024-10-25T19:15:04.087", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An arbitrary file upload vulnerability in MangoOS before 5.1.4 and Mango API before 4.5.5 allows attackers to execute arbitrary code via a crafted file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/herombey/Disclosures/blob/main/CVE-2024-37847%20File%20Upload%20Path%20Traversal.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/herombey/Disclosures/tree/main", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38576.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38576.json index c7dd734b085..922feacfcac 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38576.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38576.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38576", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:17.700", - "lastModified": "2024-07-03T02:05:14.340", + "lastModified": "2024-10-25T19:35:07.410", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -16,18 +16,6 @@ } ], "metrics": {}, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-121" - } - ] - } - ], "references": [ { "url": "https://git.kernel.org/stable/c/3758f7d9917bd7ef0482c4184c0ad673b4c4e069", diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38873.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38873.json index b925a0f31c3..b7a1908210c 100644 --- a/CVE-2024/CVE-2024-388xx/CVE-2024-38873.json +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38873.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38873", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-21T07:15:09.110", - "lastModified": "2024-07-03T02:05:21.267", + "lastModified": "2024-10-25T19:35:07.527", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-284" - } - ] - } - ], "references": [ { "url": "https://typo3.org/security/advisory/typo3-ext-sa-2024-004", diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38902.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38902.json index 072c906a6a9..015585c46f3 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38902.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38902.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38902", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-24T21:15:26.457", - "lastModified": "2024-07-03T02:05:26.170", + "lastModified": "2024-10-25T18:35:06.000", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-259" - } - ] - } - ], "references": [ { "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/H3C/Magic%20R230/hardcode/README.md", diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38909.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38909.json index 126c94196f2..59331715091 100644 --- a/CVE-2024/CVE-2024-389xx/CVE-2024-38909.json +++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38909.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38909", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-30T14:15:02.897", - "lastModified": "2024-08-01T13:55:08.623", + "lastModified": "2024-10-25T18:35:06.223", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-284" - } - ] - } - ], "references": [ { "url": "http://elfinder.com", diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39223.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39223.json index 56aa274053e..9a83261dfd5 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39223.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39223.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39223", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-03T15:15:06.083", - "lastModified": "2024-07-09T16:22:53.590", + "lastModified": "2024-10-25T18:35:06.463", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-289" + "value": "CWE-639" } ] } diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39251.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39251.json index 57484066445..121b3aed204 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39251.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39251.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39251", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-01T19:15:05.480", - "lastModified": "2024-07-11T15:06:10.633", + "lastModified": "2024-10-25T18:35:07.280", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-782" - } - ] - } - ], "references": [ { "url": "https://github.com/Souhardya/Exploit-PoCs/tree/main/ThundeRobot_Control_center", diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41461.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41461.json index ce079e47909..51241c5c641 100644 --- a/CVE-2024/CVE-2024-414xx/CVE-2024-41461.json +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41461.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41461", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-24T21:15:12.150", - "lastModified": "2024-08-01T13:58:44.983", + "lastModified": "2024-10-25T18:35:07.473", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-121" + "value": "CWE-787" } ] } diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41601.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41601.json index 421b07a6893..fb73568f5ad 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41601.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41601.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41601", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-19T17:15:03.490", - "lastModified": "2024-08-01T13:58:55.750", + "lastModified": "2024-10-25T18:35:08.280", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-378" - } - ] - } - ], "references": [ { "url": "https://github.com/topsky979/Security-Collections/tree/main/CVE-2024-41601", diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43572.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43572.json index 91efeb51c63..3989f4caf70 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43572.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43572.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43572", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:24.593", - "lastModified": "2024-10-10T15:25:33.310", + "lastModified": "2024-10-25T18:17:28.223", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-10-08", @@ -74,80 +74,34 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", - "versionEndExcluding": "10.0.17763.6414", - "matchCriteriaId": "EE205A52-173D-44F2-AAD0-A45F5FF4D603" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20796", + "matchCriteriaId": "8D5CDF9D-43B5-411C-9627-14DECDA937BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", - "versionEndExcluding": "10.0.17763.6414", - "matchCriteriaId": "8ED2CAD8-D2E2-4AF5-874A-2938D3C3EA0F" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.17763.6414", - "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20796", + "matchCriteriaId": "84562B34-6BC0-4DBD-B153-C8F1A065A08D" + }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.20348.2762", - "matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "58DB776E-E3B6-4990-8AA2-6A63FDAA84C4" + }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", - "versionEndExcluding": "10.0.22000.3260", - "matchCriteriaId": "FE4A4090-29D6-4B44-9B01-858886DAD93D" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "4AC4CAAB-C035-4D00-8DBC-9C3CE39FBBD4" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", - "versionEndExcluding": "10.0.22000.3260", - "matchCriteriaId": "41629AD7-FF9A-4C54-9FFE-800F4C1E719B" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "3E73B5EB-3264-4FFD-A467-03F716E8B410" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", @@ -165,39 +119,7 @@ "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.19044.5011", "matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", - "versionEndExcluding": "10.0.22621.4317", - "matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", - "versionEndExcluding": "10.0.22621.4317", - "matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", @@ -215,222 +137,85 @@ "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.19045.5011", "matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11_22h3:*:*:*:*:*:*:arm64:*", + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "68801079-35D1-4489-A0AE-DA780FF4F9BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "E727AE65-9D9E-49BA-A875-9D50FAE9F7DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", "versionEndExcluding": "10.0.22631.4317", - "matchCriteriaId": "F9395C1C-1B56-4A5A-BC79-9222906FE789" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + "matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "10.0.22631.4317", "matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:x64:*", - "versionEndExcluding": "10.0.25398.1189", - "matchCriteriaId": "432C6418-0A8F-42DB-ACD2-22661619A8F4" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.26100.2033", - "matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5" + "matchCriteriaId": "E07DF8B6-0DF9-4BF1-9C9B-4A29F9611C8A" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", - "versionEndExcluding": "10.0.26100.2033", - "matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x32:*", + "matchCriteriaId": "56DC72C1-E387-48FD-98AF-113A6C694C21" + }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", - "versionEndExcluding": "10.0.10240.20796", - "matchCriteriaId": "8D5CDF9D-43B5-411C-9627-14DECDA937BF" + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", - "versionEndExcluding": "10.0.10240.20796", - "matchCriteriaId": "84562B34-6BC0-4DBD-B153-C8F1A065A08D" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", - "versionEndExcluding": "10.0.14393.7428", - "matchCriteriaId": "58DB776E-E3B6-4990-8AA2-6A63FDAA84C4" + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", - "versionEndExcluding": "10.0.14393.7428", - "matchCriteriaId": "4AC4CAAB-C035-4D00-8DBC-9C3CE39FBBD4" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*", + "matchCriteriaId": "8968BAC8-A1DB-4F88-89F8-4BE47919C247" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.14393.7428", "matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", - "versionEndExcluding": "6.0.6003.22918", - "matchCriteriaId": "2687CF2E-B586-40A0-BAEC-3BE25F8AFB54" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", - "versionEndExcluding": "6.0.6003.22918", - "matchCriteriaId": "2687CF2E-B586-40A0-BAEC-3BE25F8AFB54" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", - "versionEndExcluding": "6.0.6003.22918", - "matchCriteriaId": "1D49F0DD-282D-4967-8559-F66C5B161728" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", - "versionEndExcluding": "6.0.6003.22918", - "matchCriteriaId": "1D49F0DD-282D-4967-8559-F66C5B161728" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D" + }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", - "versionEndExcluding": "6.2.9200.25118", - "matchCriteriaId": "363CAA3C-BCE9-43B7-AF45-4539EB87BA0C" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348..2762", + "matchCriteriaId": "AC8DD27D-4538-4CB9-894A-3BF3DFF9D25A" + }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:*:*", - "versionEndExcluding": "6.3.9600.22221", - "matchCriteriaId": "6AA9D814-0076-4851-B95B-5073AC382D8D" + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1189", + "matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9" } ] } diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43573.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43573.json index 770ae830837..5553bad431d 100644 --- a/CVE-2024/CVE-2024-435xx/CVE-2024-43573.json +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43573.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43573", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:24.817", - "lastModified": "2024-10-10T15:54:19.353", + "lastModified": "2024-10-25T18:17:35.217", "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-10-08", @@ -94,124 +94,34 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", - "versionEndExcluding": "10.0.19045.5011", - "matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20796", + "matchCriteriaId": "8D5CDF9D-43B5-411C-9627-14DECDA937BF" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", - "versionEndExcluding": "10.0.19045.5011", - "matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC" + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20796", + "matchCriteriaId": "84562B34-6BC0-4DBD-B153-C8F1A065A08D" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", - "versionEndExcluding": "10.0.19045.5011", - "matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", - "versionEndExcluding": "10.0.22000.3260", - "matchCriteriaId": "011A7B27-0084-4C73-8E59-A17C0862B098" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "58DB776E-E3B6-4990-8AA2-6A63FDAA84C4" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", - "versionEndExcluding": "10.0.22000.3260", - "matchCriteriaId": "6FD17BE4-CA3A-4392-BB5E-2A43DB2E3D57" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", - "versionEndExcluding": "10.0.22621.4317", - "matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129" + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "4AC4CAAB-C035-4D00-8DBC-9C3CE39FBBD4" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", - "versionEndExcluding": "10.0.22621.4317", - "matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11_22h3:*:*:*:*:*:*:x64:*", - "versionEndExcluding": "10.0.22631.4317", - "matchCriteriaId": "FAF3DC83-B324-48EC-9B4D-D72375992D35" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.20348..2762", - "matchCriteriaId": "AC8DD27D-4538-4CB9-894A-3BF3DFF9D25A" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.25398.1189", - "matchCriteriaId": "95D955C0-5BD1-41A9-959E-4F2F4282CCD4" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "3E73B5EB-3264-4FFD-A467-03F716E8B410" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", @@ -229,206 +139,83 @@ "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", "versionEndExcluding": "10.0.19044.5011", "matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", - "versionEndExcluding": "10.0.22631.4317", - "matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1" + }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.17763.6414", - "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC" + }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", - "versionEndExcluding": "10.0.17763.6414", - "matchCriteriaId": "EE205A52-173D-44F2-AAD0-A45F5FF4D603" + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", - "versionEndExcluding": "10.0.17763.6414", - "matchCriteriaId": "8ED2CAD8-D2E2-4AF5-874A-2938D3C3EA0F" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "68801079-35D1-4489-A0AE-DA780FF4F9BC" + }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.17763.6414", - "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "E727AE65-9D9E-49BA-A875-9D50FAE9F7DB" + }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", - "versionEndExcluding": "10.0.26100.2033", - "matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5" + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", - "versionEndExcluding": "10.0.26100.2033", - "matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7" + }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", - "versionEndExcluding": "10.0.10240.20796", - "matchCriteriaId": "8D5CDF9D-43B5-411C-9627-14DECDA937BF" + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "E07DF8B6-0DF9-4BF1-9C9B-4A29F9611C8A" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", - "versionEndExcluding": "10.0.10240.20796", - "matchCriteriaId": "84562B34-6BC0-4DBD-B153-C8F1A065A08D" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*", + "matchCriteriaId": "8968BAC8-A1DB-4F88-89F8-4BE47919C247" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.14393.7428", "matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", - "versionEndExcluding": "10.0.14393.7428", - "matchCriteriaId": "58DB776E-E3B6-4990-8AA2-6A63FDAA84C4" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", - "versionEndExcluding": "10.0.14393.7428", - "matchCriteriaId": "4AC4CAAB-C035-4D00-8DBC-9C3CE39FBBD4" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*", - "versionEndExcluding": "6.3.9600.22221", - "matchCriteriaId": "585A59A3-0F7E-4FC1-BA5E-B33261DC3F49" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D" + }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.0.14393.7428", - "matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348..2762", + "matchCriteriaId": "AC8DD27D-4538-4CB9-894A-3BF3DFF9D25A" + }, { "vulnerable": true, - "criteria": "cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:*:*", - "versionEndExcluding": "6.3.9600.22221", - "matchCriteriaId": "6AA9D814-0076-4851-B95B-5073AC382D8D" + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1189", + "matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9" } ] } diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43844.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43844.json index 6fc479a2cac..566a6c9a73f 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43844.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43844.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43844", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T10:15:09.763", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T19:49:05.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: rtw89: wow: soluciona el problema de skbuff de H2C de descarga GTK. Por error pusimos skb demasiado grande y eso puede exceder skb->end. Por eso lo arreglamos. skbuff: skb_over_panic: text:ffffffffc09e9a9d len:416 put:204 head:ffff8fba04eca780 data:ffff8fba04eca7e0 tail:0x200 end:0x140 dev: ------------[ cortar aqu\u00ed ]---- -------- \u00a1ERROR del kernel en net/core/skbuff.c:192! c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] PREEMPT SMP PTI CPU: 1 PID: 4747 Comm: kworker/u4:44 Contaminado: GO 6.6.30-02659-gc18865c4dfbd #1 86547039b47e46935493f615ee31d0b2d711d35e Nombre de hardware: HP Me ep/Meep, BIOS Google_Meep.11297.262. 0 18/03/2021 Cola de trabajo: events_unbound async_run_entry_fn RIP: 0010:skb_panic+0x5d/0x60 C\u00f3digo: c6 63 8b 8f bb 4c 0f 45 f6 48 c7 c7 4d 89 8b bb 48 89 ce 44 89 d1 41 53 41 53 y siguientes b0 c8 00 00 00 e8 27 5f 23 00 48 83 c4 20 <0f> 0b 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 RSP 0018:ffffaa700144ba d0 EFLAGS: 00010282 RAX: 0000000000000089 RBX: 0000000000000140 RCX: 14432c5aad26c900 RDX: 0000000000000000 RSI: 00000000ffffdfff RDI: 0000000000000001 RBP: ffffaa700144bae0 R08: 00000000 R09: ffffaa700144b920 R10: 00000000ffffdfff R11: ffffffffbc28fbc0 R12: ffff8fba4e57a010 R13: 00000000000000000 R14: ffffffffbb8f8b63 R15: 00000000000 FS: 0000000000000000(0000) GS:ffff8fba7bd00000( 0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007999c4ad1000 CR3: 000000015503a000 CR4: 000000000035 0ee0 Seguimiento de llamadas: ? __die_body+0x1f/0x70 ? morir+0x3d/0x60? do_trap+0xa4/0x110? skb_panic+0x5d/0x60? do_error_trap+0x6d/0x90? skb_panic+0x5d/0x60? handle_invalid_op+0x30/0x40? skb_panic+0x5d/0x60? exc_invalid_op+0x3c/0x50? asm_exc_invalid_op+0x16/0x20? skb_panic+0x5d/0x60 skb_put+0x49/0x50 rtw89_fw_h2c_wow_gtk_ofld+0xbd/0x220 [rtw89_core 778b32de31cd1f14df2d6721ae99ba8a83636fa5] 1f/0x540 [rtw89_core 778b32de31cd1f14df2d6721ae99ba8a83636fa5] rtw89_ops_resume+0x2b/0xa0 [rtw89_core 778b32de31cd1f14df2d6721ae99ba8a83636fa5] _reconfig+0x84/0x13e0 [mac80211 818a894e3b77da6298269c59ed7cdff065a4ed52] ? __pfx_wiphy_resume+0x10/0x10 [cfg80211 1a793119e2aeb157c4ca4091ff8e1d9ae233b59d]? dev_printk_emit+0x51/0x70? _dev_info+0x6e/0x90? __pfx_wiphy_resume+0x10/0x10 [cfg80211 1a793119e2aeb157c4ca4091ff8e1d9ae233b59d] wiphy_resume+0x89/0x180 [cfg80211 1a793119e2aeb157c4ca4091ff8e1d9ae23 3b59d] ? __pfx_wiphy_resume+0x10/0x10 [cfg80211 1a793119e2aeb157c4ca4091ff8e1d9ae233b59d] dpm_run_callback+0x3c/0x140 device_resume+0x1f9/0x3c0 ? __pfx_dpm_watchdog_handler+0x10/0x10 async_resume+0x1d/0x30 async_run_entry_fn+0x29/0xd0 Process_scheduled_works+0x1d8/0x3d0 trabajador_thread+0x1fc/0x2f0 kthread+0xed/0x110 ? __pfx_worker_thread+0x10/0x10? __pfx_kthread+0x10/0x10 ret_from_fork+0x38/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1b/0x30 M\u00f3dulos vinculados en: ccm 8021q r8153_ecm cdc_ether usbnet r8152 mii dm_integrity async_xor xor async_tx lz4 lz4_compress zstd zstd_compress zram zsmalloc u entrada rfcomm cmac algif_hash rtw89_8922ae(O) algif_skcipher rtw89_8922a(O) af_alg rtw89_pci (O) rtw89_core(O) btusb(O) snd_soc_sst_bxt_da7219_max98357a btbcm(O) snd_soc_hdac_hdmi btintel(O) snd_soc_intel_hda_dsp_common snd_sof_probes btrtl(O) btmtk(O) c_hdmi snd_soc_dmic uvcvideo videobuf2_vmalloc uvc videobuf2_memops videobuf2_v4l2 videobuf2_common snd_sof_pci_intel_apl snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda soundwire_intel soundwire_generic_allocation snd_ sof_intel_hda_mlink soundwire_cadence snd_sof_pci snd_sof_xtensa_dsp mac80211 snd_soc_acpi_intel_match snd_soc_acpi snd_sof snd_sof_utils soundwire_bus snd_soc_max98357a snd_soc_avs snd_soc_hda_codec snd_hda_ext_core snd_intel_dspcfg snd_intel_sdw_acpi snd_soc_da72 19 snd_hda_codec snd_hwdep snd_hda_core veth ip6table_nat xt_MASQUERADE xt_cgroup fuse bluetooth ecdh_generic cfg80211 ecc gsmi: Apagado de registro ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "21DC7A88-E88C-4C44-9AFB-CBB30134097C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/dda364c345913fe03ddbe4d5ae14a2754c100296", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ef0d9d2f0dc1133db3d3a1c5167190c6627146b2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43845.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43845.json index d2781ee2f9c..cc0a600c8de 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43845.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43845.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43845", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T10:15:09.837", - "lastModified": "2024-10-22T15:15:07.240", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T19:51:07.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: udf: corrige el c\u00e1lculo falso de la suma de comprobaci\u00f3n en udf_rename() Syzbot informa acceso a memoria no inicializada en udf_rename() al actualizar la suma de comprobaci\u00f3n de la entrada del directorio '..' de un directorio movido. De hecho, esto es cierto cuando pasamos diriter.fi en la pila a udf_update_tag() y debido a que solo tiene la estructura fileIdentDesc incluida y no los campos impUse o nombre, la funci\u00f3n de suma de verificaci\u00f3n sumar\u00e1 los contenidos aleatorios de la pila m\u00e1s all\u00e1 del final de la estructura. En realidad, esto es inofensivo porque el siguiente udf_fiiter_write_fi() volver\u00e1 a calcular la suma de comprobaci\u00f3n de los b\u00faferes en el disco donde todo est\u00e1 incluido correctamente. As\u00ed que todo lo que se necesita es simplemente eliminar el c\u00e1lculo falso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.3", + "versionEndExcluding": "6.6.44", + "matchCriteriaId": "E752D2D6-EE15-4491-857A-AA8D6AE62EDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/27ab33854873e6fb958cb074681a0107cc2ecc4c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/40d7b3ed52449d36143bab8d3e70926aa61a60f4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9c439311c13fc6faab1921441165c9b8b500c83b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c996b570305e7a6910c2ce4cdcd4c22757ffe241", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fe2ead240c31e8d158713beca9d0681a6e6a53ab", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43846.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43846.json index a3591f14452..e26aa2b3cec 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43846.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43846.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43846", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T10:15:09.900", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T19:52:01.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,124 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: lib: objagg: soluciona un fallo de protecci\u00f3n general. La librer\u00eda admite la agregaci\u00f3n de objetos en otros objetos s\u00f3lo si el objeto principal no tiene un padre en s\u00ed. Es decir, no se admite el anidamiento. La agregaci\u00f3n ocurre en dos casos: sin y con sugerencias, donde las sugerencias son una recomendaci\u00f3n calculada previamente sobre c\u00f3mo agregar los objetos proporcionados. El anidamiento no es posible en el primer caso debido a una verificaci\u00f3n que lo impide, pero en el segundo caso no hay verificaci\u00f3n porque se supone que el anidamiento no puede ocurrir cuando se crean objetos basados en sugerencias. La violaci\u00f3n de este supuesto conduce a diversas advertencias y eventualmente a un fallo de protecci\u00f3n general [1]. Antes de solucionar la causa ra\u00edz, elimine el error cuando se produzca el anidamiento y advierta. [1] falla de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0xdead000000000d90: 0000 [#1] CPU PREEMPT SMP PTI: 1 PID: 1083 Comm: kworker/1:9 Tainted: GW 6.9.0-rc6-custom-gd9b4f1cca7fb #7 Nombre del hardware: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 06/01/2019 Cola de trabajo: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work RIP: 0010:mlxsw_sp_acl_erp_bf_insert+0x25/0x80 [...] Rastreo de llamadas: acl_atcam_entry_add+0x256/0x3c0 mlxsw_sp_acl_tcam_entry_create+0x5e /0xa0 mlxsw_sp_acl_tcam_vchunk_migrate_one+0x16b/0x270 mlxsw_sp_acl_tcam_vregion_rehash_work+0xbe/0x510 Process_one_work+0x151/0x370 trabajador_thread+0x2cb/0x3e0 kthread+0xd0/0x100 x34/0x50 ret_from_fork_asm+0x1a/0x30 " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1", + "versionEndExcluding": "6.1.103", + "matchCriteriaId": "FB327727-E3BB-4E46-A8EC-12AD13E62544" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.44", + "matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1936fa05a180834c3b52e0439a6bddc07814d3eb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/22ae17a267f4812861f0c644186c3421ff97dbfc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/499f742fed42e74f1321f4b12ca196a66a2b49fc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/565213e005557eb6cc4e42189d26eb300e02f170", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5adc61d29bbb461d7f7c2b48dceaa90ecd182eb7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8161263362154cbebfbf4808097b956a6a8cb98a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b4a3a89fffcdf09702b1f161b914e52abca1894d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43847.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43847.json index b2dc66d6031..616edd6092b 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43847.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43847.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43847", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T10:15:09.963", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T19:55:53.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: ath12k: corrige el acceso no v\u00e1lido a la memoria mientras se procesan paquetes fragmentados. El anillo de monitor y el anillo de reinyecci\u00f3n de reo comparten el mismo \u00edndice de m\u00e1scara de anillo. Cuando el controlador recibe una interrupci\u00f3n para el anillo de reinyecci\u00f3n de reo, el anillo del monitor tambi\u00e9n se procesa, lo que genera un acceso no v\u00e1lido a la memoria. Dado que la compatibilidad con el monitor a\u00fan no est\u00e1 habilitada en ath12k, se debe quitar la m\u00e1scara del anillo del monitor. Probado en: QCN9274 hw2.0 PCI WLAN.WBE.1.1.1-00209-QCAHKSWPL_SILICONZ-1" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.3", + "versionEndExcluding": "6.6.44", + "matchCriteriaId": "E752D2D6-EE15-4491-857A-AA8D6AE62EDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/073f9f249eecd64ab9d59c91c4a23cfdcc02afe4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/36fc66a7d9ca3e5c6eac25362cac63f83df8bed6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8126f82dab7bd8b2e04799342b19fff0a1fd8575", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44099.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44099.json index e645d2472ac..cb51e9a9943 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44099.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44099.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44099", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-10-25T11:15:16.237", - "lastModified": "2024-10-25T12:56:07.750", + "lastModified": "2024-10-25T19:35:07.773", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "There is a possible Local bypass of user interaction due to an insecure default value. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-10-01", diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44100.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44100.json index c96337c9cb7..60ccbd30664 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44100.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44100.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44100", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-10-25T11:15:16.293", - "lastModified": "2024-10-25T14:15:11.590", + "lastModified": "2024-10-25T19:35:08.533", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Android before 2024-10-05 on Google Pixel devices allows information disclosure in the modem component, A-299774545." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-10-01", diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44101.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44101.json index adc6138698a..e02740dbd57 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44101.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44101.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44101", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-10-25T11:15:16.343", - "lastModified": "2024-10-25T12:56:07.750", + "lastModified": "2024-10-25T19:35:09.280", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "there is a possible Null Pointer Dereference (modem crash) due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-10-01", diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46240.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46240.json index f78ec206e3c..79f97c39ae1 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46240.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46240.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46240", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-22T16:15:07.407", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T19:00:20.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:o-dyn:collabtive:3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A283D24F-7012-45F6-8B04-BF11495B9114" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS1.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47012.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47012.json index bc36e2ef099..9e431d3af5b 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47012.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47012.json @@ -2,7 +2,7 @@ "id": "CVE-2024-47012", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-10-25T11:15:16.403", - "lastModified": "2024-10-25T12:56:07.750", + "lastModified": "2024-10-25T19:35:10.183", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In mm_GetMobileIdIndexForNsUpdate of mm_GmmPduCodec.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-10-01", diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47013.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47013.json index 5896e82f8a6..463bd5bfea9 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47013.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47013.json @@ -2,7 +2,7 @@ "id": "CVE-2024-47013", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-10-25T11:15:16.460", - "lastModified": "2024-10-25T12:56:07.750", + "lastModified": "2024-10-25T19:35:10.947", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In pmucal_rae_handle_seq_int of flexpmu_cal_rae.c, there is a possible arbitrary write due to uninitialized data. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-10-01", diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47014.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47014.json index 6b427c9af2f..a742bcf8523 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47014.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47014.json @@ -2,7 +2,7 @@ "id": "CVE-2024-47014", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-10-25T11:15:16.513", - "lastModified": "2024-10-25T14:15:11.783", + "lastModified": "2024-10-25T19:35:11.740", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Android before 2024-10-05 on Google Pixel devices allows privilege escalation in the ABL component, A-330537292." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-10-01", diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48139.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48139.json index 5232c011501..abb3dfdd45f 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48139.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48139.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48139", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-24T19:15:15.050", - "lastModified": "2024-10-25T12:56:07.750", + "lastModified": "2024-10-25T19:35:12.730", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n r\u00e1pida en el cuadro de chat de Blackbox AI v1.3.95 permite a los atacantes acceder y filtrar todos los datos de chat anteriores y posteriores entre el usuario y el asistente de IA a trav\u00e9s de un mensaje manipulado espec\u00edficamente para ello." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/soursec/CVEs/tree/main/CVE-2024-48139", diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48140.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48140.json index 7157c8459f4..b98a6152fa7 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48140.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48140.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48140", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-24T19:15:15.150", - "lastModified": "2024-10-25T12:56:07.750", + "lastModified": "2024-10-25T19:35:13.497", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n r\u00e1pida en el cuadro de chat de Butterfly Effect Limited Monica Your AI Copilot impulsado por ChatGPT4 v6.3.0 permite a los atacantes acceder y exfiltrar todos los datos de chat anteriores y posteriores entre el usuario y el asistente de IA a trav\u00e9s de un mensaje manipulado especialmente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://chromewebstore.google.com/detail/monica-your-ai-copilot-po/ofpnmcalabcbjgholdjcjblkibolbppb?hl=en", diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48141.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48141.json index aabf955b87d..56337442d1e 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48141.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48141.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48141", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-24T19:15:15.240", - "lastModified": "2024-10-25T12:56:07.750", + "lastModified": "2024-10-25T19:35:14.257", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n r\u00e1pida en el cuadro de chat de Zhipu AI CodeGeeX v2.17.0 permite a los atacantes acceder y filtrar todos los datos de chat anteriores y posteriores entre el usuario y el asistente de IA a trav\u00e9s de un mensaje manipulado espec\u00edficamente para ello." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/soursec/CVEs/tree/main/CVE-2024-48141", diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48142.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48142.json index 0dac6b0553e..2942809e2d8 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48142.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48142.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48142", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-24T19:15:15.333", - "lastModified": "2024-10-25T12:56:07.750", + "lastModified": "2024-10-25T18:35:08.560", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n r\u00e1pida en el cuadro de chat de Butterfly Effect Limited Monica ChatGPT AI Assistant v2.4.0 permite a los atacantes acceder y filtrar todos los datos de chat anteriores y posteriores entre el usuario y el asistente de IA a trav\u00e9s de un mensaje manipulado espec\u00edficamente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/soursec/CVEs/tree/main/CVE-2024-48142", diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48143.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48143.json index 7e1fbca6592..c774fd6f703 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48143.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48143.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48143", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-24T19:15:15.427", - "lastModified": "2024-10-25T12:56:07.750", + "lastModified": "2024-10-25T18:35:09.327", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La falta de limitaci\u00f3n de velocidad en el componente de validaci\u00f3n de OTP de Digitory Multi Channel Integrated POS v1.0 permite a los atacantes obtener acceso al sistema de pedidos y realizar una cantidad excesiva de pedidos de comida." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], "references": [ { "url": "https://digitory.com/multi-channel-integrated-pos/", diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48343.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48343.json new file mode 100644 index 00000000000..2d3228d97f0 --- /dev/null +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48343.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48343", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-25T18:15:04.250", + "lastModified": "2024-10-25T18:15:04.250", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL Injection vulnerability in ESAFENET CDG 5 and earlier allows an attacker to execute arbitrary code via the id parameter of the dataSearch.jsp page." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://flowus.cn/share/d038084d-6370-4bcb-a268-6cca9e0f6615?code=G8A6P3", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48448.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48448.json new file mode 100644 index 00000000000..15d0459a278 --- /dev/null +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48448.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48448", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-25T18:15:04.330", + "lastModified": "2024-10-25T18:15:04.330", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An arbitrary file upload vulnerability in Huly Platform v0.6.295 allows attackers to execute arbitrary code via uploading a crafted HTML file into the tracker comments page." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-48448", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48450.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48450.json new file mode 100644 index 00000000000..822be7df00b --- /dev/null +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48450.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48450", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-25T19:15:04.373", + "lastModified": "2024-10-25T19:15:04.373", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An arbitrary file upload vulnerability in Huly Platform v0.6.295 allows attackers to execute arbitrary code via uploading a crafted HTML file into chat group." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-48450", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-485xx/CVE-2024-48570.json b/CVE-2024/CVE-2024-485xx/CVE-2024-48570.json index 4e01a391835..73e43c9c43d 100644 --- a/CVE-2024/CVE-2024-485xx/CVE-2024-48570.json +++ b/CVE-2024/CVE-2024-485xx/CVE-2024-48570.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48570", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-22T17:15:04.087", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T18:59:22.033", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:client_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "116BBDCB-50A8-4827-97A6-9EAE33C9A23F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Luc1f3r066/Client-Management-System-v1.0-", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48700.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48700.json new file mode 100644 index 00000000000..ee73a4aa036 --- /dev/null +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48700.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48700", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-25T18:15:04.407", + "lastModified": "2024-10-25T18:15:04.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Kliqqi-CMS has a background arbitrary code execution vulnerability that attackers can exploit to implant backdoors or getShell via the edit_page.php component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ChangeYourWay/post/blob/main/CVE-2024-48700", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48706.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48706.json index bcad3026547..f09a77ccf29 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48706.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48706.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48706", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-22T17:15:04.180", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T18:58:35.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:o-dyn:collabtive:3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A283D24F-7012-45F6-8B04-BF11495B9114" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS2.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48707.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48707.json index de3c4c61192..89d0092052b 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48707.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48707.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48707", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-22T17:15:04.273", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T19:11:54.310", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:o-dyn:collabtive:3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A283D24F-7012-45F6-8B04-BF11495B9114" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS3.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48708.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48708.json index d04905129d9..15fe22c89fd 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48708.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48708.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48708", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-22T17:15:04.370", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T19:10:08.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:o-dyn:collabtive:3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A283D24F-7012-45F6-8B04-BF11495B9114" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS4.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49996.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49996.json index 69b681a1153..a8ba762a915 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49996.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49996.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49996", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:19.760", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T19:56:10.320", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: Se corrige el desbordamiento de b\u00fafer al analizar los puntos de an\u00e1lisis de NFS ReparseDataLength es la suma del tama\u00f1o de InodeType y el tama\u00f1o de DataBuffer. Por lo tanto, para obtener el tama\u00f1o de DataBuffer, es necesario restar el tama\u00f1o de InodeType de ReparseDataLength. La funci\u00f3n cifs_strndup_from_utf16() est\u00e1 accediendo actualmente a buf->DataBuffer en la posici\u00f3n despu\u00e9s del final del b\u00fafer porque no resta el tama\u00f1o de InodeType de la longitud. Solucione este problema y reste correctamente la variable len. El miembro InodeType solo est\u00e1 presente cuando el b\u00fafer de an\u00e1lisis es lo suficientemente grande. Verifique ReparseDataLength antes de acceder a InodeType para evitar otro acceso no v\u00e1lido a la memoria. Los valores rdev principales y secundarios tambi\u00e9n est\u00e1n presentes solo cuando el b\u00fafer de an\u00e1lisis es lo suficientemente grande. Verifique el tama\u00f1o del b\u00fafer de an\u00e1lisis antes de llamar a reparse_mkdev()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3", + "versionEndExcluding": "6.6.55", + "matchCriteriaId": "93FE9DDB-76BE-4920-9078-D8278AF553B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.14", + "matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.3", + "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/803b3a39cb096d8718c0aebc03fd19f11c7dc919", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c173d47b69f07cd7ca08efb4e458adbd4725d8e9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c6db81c550cea0c73bd72ef55f579991e0e4ba07", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e2a8910af01653c1c268984855629d71fb81f404", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50000.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50000.json index e9a0ac22ad9..c0429aeece9 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50000.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50000.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50000", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:20.063", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T19:55:55.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,136 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5e: Se ha corregido la desreferenciaci\u00f3n NULL en mlx5e_tir_builder_alloc(). En mlx5e_tir_builder_alloc(), kvzalloc() puede devolver NULL, que se desreferencia en la siguiente l\u00ednea en una referencia al campo de modificaci\u00f3n. Encontrado por Linux Verification Center (linuxtesting.org) con SVACE." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.168", + "matchCriteriaId": "151D0F58-4482-4AA5-87D2-803A6F5164C1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.55", + "matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.14", + "matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.3", + "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0168ab6fbd9e50d20b97486168b604b2ab28a2ca", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1bcc86cc721bea68980098f51f102aa2c2b9d932", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4655456a64a0f936098c8432bac64e7176bd2aff", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4d80dde26d7bab1320210279483ac854dcb274b2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b48ee5bb25c02ca2b81e0d16bf8af17ab6ed3f8b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f25389e779500cf4a59ef9804534237841bce536", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50012.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50012.json index c9c677a5c31..bd3b13b332b 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50012.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50012.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50012", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T19:15:04.683", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T19:55:40.217", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,102 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cpufreq: evitar un recuento de referencia incorrecto en el nodo de CPU En la funci\u00f3n parse_perf_domain, si la llamada a of_parse_phandle_with_args devuelve un error, la referencia al nodo de dispositivo de CPU que se adquiri\u00f3 al inicio de la funci\u00f3n no se decrementar\u00eda correctamente. Aborde esto declarando la variable con el atributo de limpieza __free(device_node)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.55", + "matchCriteriaId": "8B527B5F-BDDA-424E-932E-16FCAAB575E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.14", + "matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.3", + "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0f41f383b5a61a2bf6429a449ebba7fb08179d81", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/47cb1d9278f179df8250304ec41009e3e836a926", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/77f88b17387a017416babf1e6488fa17682287e2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c0f02536fffbbec71aced36d52a765f8c4493dc2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50013.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50013.json index 7be437632e2..7a5e80780fa 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50013.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50013.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50013", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T19:15:04.767", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T19:49:36.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,145 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: exfat: corrige p\u00e9rdida de memoria en exfat_load_bitmap() Si la primera entrada de directorio en el directorio ra\u00edz no es una entrada de directorio de mapa de bits, 'bh' no se liberar\u00e1 ni se reasignar\u00e1, lo que provocar\u00e1 una p\u00e9rdida de memoria." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.7", + "versionEndExcluding": "5.10.227", + "matchCriteriaId": "E992DF81-0B1D-4EEA-8F9E-DCB1FE218301" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.168", + "matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.55", + "matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.14", + "matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.3", + "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4e1813e52f86eb8db0c6c9570251f2fcbc571f5d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/89081e8407e637463db5880d168e3652fb9f4330", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bf0b3b35259475d1fe377bcaa565488e26684f7a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d2b537b3e533f28e0d97293fe9293161fe8cd137", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dca359db1eb37f334267ebd7e3cab9a66d191d5b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ddf704c2ce3b73f38d2dd8cf1bb0f7ec038bdf63", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f692160d3e1e5450605071b8df8f7d08d9b09a83", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5159.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5159.json index 327a36da52d..843e0e5705f 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5159.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5159.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5159", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-22T16:15:11.013", - "lastModified": "2024-07-03T02:08:35.967", + "lastModified": "2024-10-25T19:35:15.010", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-122" + "value": "CWE-125" } ] } diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5836.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5836.json index 26a25d8e995..f952a40165d 100644 --- a/CVE-2024/CVE-2024-58xx/CVE-2024-5836.json +++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5836.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5836", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-06-11T21:15:54.657", - "lastModified": "2024-08-01T14:00:02.493", + "lastModified": "2024-10-25T19:35:15.787", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,16 +69,6 @@ "value": "NVD-CWE-noinfo" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-474" - } - ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6611.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6611.json index cc289a10d8c..29218cb77c5 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6611.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6611.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6611", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:13.047", - "lastModified": "2024-07-16T18:15:09.590", + "lastModified": "2024-10-25T18:35:10.737", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-1275" - } - ] - } - ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1844827", diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9530.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9530.json index b690c3c2aee..0946adab541 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9530.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9530.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9530", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-23T08:15:03.770", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T18:52:10.810", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +61,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qodeinteractive:qi_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.8.1", + "matchCriteriaId": "F7F221B4-E19A-42FF-A7BD-EFD37DC5A8CD" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3170536%40qi-addons-for-elementor%2Ftrunk&old=3159768%40qi-addons-for-elementor%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0dd93514-657c-4b04-931a-23f3d405fb88?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9584.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9584.json new file mode 100644 index 00000000000..df24e038f1f --- /dev/null +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9584.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-9584", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-10-25T18:15:04.673", + "lastModified": "2024-10-25T18:15:04.673", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Image Map Pro plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on the AJAX functions in versions up to, and including, 6.0.20. This makes it possible for authenticated attackers with contributor-level privileges or above, to add, update or delete map projects." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://imagemappro.com/change-log/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7c632452-8b13-4f78-aa8a-3c92bef5907f?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9585.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9585.json new file mode 100644 index 00000000000..aee6312dd6c --- /dev/null +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9585.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-9585", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-10-25T18:15:04.907", + "lastModified": "2024-10-25T18:15:04.907", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Image Map Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'save_project' function with an arbitrary shortcode in versions up to, and including, 6.0.20 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://imagemappro.com/change-log/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/22245bb5-a310-4cd2-98e3-6611e71ff7fa?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9987.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9987.json index 9956214877a..86324ecef50 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9987.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9987.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9987", "sourceIdentifier": "security@pandorafms.com", "published": "2024-10-22T09:15:03.497", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-25T19:06:35.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "security@pandorafms.com", "type": "Secondary", @@ -73,10 +105,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pandorafms:pandora_fms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "700", + "versionEndIncluding": "777.3", + "matchCriteriaId": "666704E5-7450-4CA4-8FC1-11FB91DE2E64" + } + ] + } + ] + } + ], "references": [ { "url": "https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/", - "source": "security@pandorafms.com" + "source": "security@pandorafms.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 3dde97e0406..444d083d05a 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-25T18:00:18.940756+00:00 +2024-10-25T20:00:18.737714+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-25T17:35:05.913000+00:00 +2024-10-25T19:59:00.933000+00:00 ``` ### Last Data Feed Release @@ -33,64 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -267095 +267105 ``` ### CVEs added in the last Commit -Recently added CVEs: `20` - -- [CVE-2022-30354](CVE-2022/CVE-2022-303xx/CVE-2022-30354.json) (`2024-10-25T16:15:08.663`) -- [CVE-2022-30355](CVE-2022/CVE-2022-303xx/CVE-2022-30355.json) (`2024-10-25T16:15:08.733`) -- [CVE-2022-30356](CVE-2022/CVE-2022-303xx/CVE-2022-30356.json) (`2024-10-25T17:15:03.387`) -- [CVE-2022-30357](CVE-2022/CVE-2022-303xx/CVE-2022-30357.json) (`2024-10-25T17:15:03.450`) -- [CVE-2022-30358](CVE-2022/CVE-2022-303xx/CVE-2022-30358.json) (`2024-10-25T17:15:03.507`) -- [CVE-2022-30359](CVE-2022/CVE-2022-303xx/CVE-2022-30359.json) (`2024-10-25T17:15:03.570`) -- [CVE-2022-30360](CVE-2022/CVE-2022-303xx/CVE-2022-30360.json) (`2024-10-25T17:15:03.630`) -- [CVE-2022-30361](CVE-2022/CVE-2022-303xx/CVE-2022-30361.json) (`2024-10-25T17:15:03.700`) -- [CVE-2023-26248](CVE-2023/CVE-2023-262xx/CVE-2023-26248.json) (`2024-10-25T16:15:09.500`) -- [CVE-2024-10386](CVE-2024/CVE-2024-103xx/CVE-2024-10386.json) (`2024-10-25T17:15:03.987`) -- [CVE-2024-10387](CVE-2024/CVE-2024-103xx/CVE-2024-10387.json) (`2024-10-25T17:15:04.230`) -- [CVE-2024-48204](CVE-2024/CVE-2024-482xx/CVE-2024-48204.json) (`2024-10-25T16:15:09.873`) -- [CVE-2024-48459](CVE-2024/CVE-2024-484xx/CVE-2024-48459.json) (`2024-10-25T17:15:04.703`) -- [CVE-2024-48579](CVE-2024/CVE-2024-485xx/CVE-2024-48579.json) (`2024-10-25T16:15:09.940`) -- [CVE-2024-48580](CVE-2024/CVE-2024-485xx/CVE-2024-48580.json) (`2024-10-25T16:15:09.993`) -- [CVE-2024-48581](CVE-2024/CVE-2024-485xx/CVE-2024-48581.json) (`2024-10-25T16:15:10.047`) -- [CVE-2024-48654](CVE-2024/CVE-2024-486xx/CVE-2024-48654.json) (`2024-10-25T17:15:04.763`) -- [CVE-2024-48655](CVE-2024/CVE-2024-486xx/CVE-2024-48655.json) (`2024-10-25T17:15:04.817`) -- [CVE-2024-48743](CVE-2024/CVE-2024-487xx/CVE-2024-48743.json) (`2024-10-25T17:15:04.873`) -- [CVE-2024-8036](CVE-2024/CVE-2024-80xx/CVE-2024-8036.json) (`2024-10-25T17:15:04.963`) +Recently added CVEs: `10` + +- [CVE-2024-37844](CVE-2024/CVE-2024-378xx/CVE-2024-37844.json) (`2024-10-25T19:15:03.897`) +- [CVE-2024-37845](CVE-2024/CVE-2024-378xx/CVE-2024-37845.json) (`2024-10-25T19:15:03.973`) +- [CVE-2024-37846](CVE-2024/CVE-2024-378xx/CVE-2024-37846.json) (`2024-10-25T19:15:04.027`) +- [CVE-2024-37847](CVE-2024/CVE-2024-378xx/CVE-2024-37847.json) (`2024-10-25T19:15:04.087`) +- [CVE-2024-48343](CVE-2024/CVE-2024-483xx/CVE-2024-48343.json) (`2024-10-25T18:15:04.250`) +- [CVE-2024-48448](CVE-2024/CVE-2024-484xx/CVE-2024-48448.json) (`2024-10-25T18:15:04.330`) +- [CVE-2024-48450](CVE-2024/CVE-2024-484xx/CVE-2024-48450.json) (`2024-10-25T19:15:04.373`) +- [CVE-2024-48700](CVE-2024/CVE-2024-487xx/CVE-2024-48700.json) (`2024-10-25T18:15:04.407`) +- [CVE-2024-9584](CVE-2024/CVE-2024-95xx/CVE-2024-9584.json) (`2024-10-25T18:15:04.673`) +- [CVE-2024-9585](CVE-2024/CVE-2024-95xx/CVE-2024-9585.json) (`2024-10-25T18:15:04.907`) ### CVEs modified in the last Commit -Recently modified CVEs: `40` - -- [CVE-2024-43177](CVE-2024/CVE-2024-431xx/CVE-2024-43177.json) (`2024-10-25T16:05:15.777`) -- [CVE-2024-44098](CVE-2024/CVE-2024-440xx/CVE-2024-44098.json) (`2024-10-25T17:35:01.100`) -- [CVE-2024-44812](CVE-2024/CVE-2024-448xx/CVE-2024-44812.json) (`2024-10-25T16:56:11.150`) -- [CVE-2024-47024](CVE-2024/CVE-2024-470xx/CVE-2024-47024.json) (`2024-10-25T17:35:01.947`) -- [CVE-2024-47025](CVE-2024/CVE-2024-470xx/CVE-2024-47025.json) (`2024-10-25T17:35:02.767`) -- [CVE-2024-47026](CVE-2024/CVE-2024-470xx/CVE-2024-47026.json) (`2024-10-25T17:35:03.593`) -- [CVE-2024-47027](CVE-2024/CVE-2024-470xx/CVE-2024-47027.json) (`2024-10-25T17:35:04.390`) -- [CVE-2024-47028](CVE-2024/CVE-2024-470xx/CVE-2024-47028.json) (`2024-10-25T17:35:05.147`) -- [CVE-2024-47029](CVE-2024/CVE-2024-470xx/CVE-2024-47029.json) (`2024-10-25T16:35:07.850`) -- [CVE-2024-47033](CVE-2024/CVE-2024-470xx/CVE-2024-47033.json) (`2024-10-25T17:35:05.913`) -- [CVE-2024-47034](CVE-2024/CVE-2024-470xx/CVE-2024-47034.json) (`2024-10-25T16:35:08.630`) -- [CVE-2024-47035](CVE-2024/CVE-2024-470xx/CVE-2024-47035.json) (`2024-10-25T16:35:09.407`) -- [CVE-2024-47041](CVE-2024/CVE-2024-470xx/CVE-2024-47041.json) (`2024-10-25T16:35:10.220`) -- [CVE-2024-48415](CVE-2024/CVE-2024-484xx/CVE-2024-48415.json) (`2024-10-25T16:55:26.083`) -- [CVE-2024-48540](CVE-2024/CVE-2024-485xx/CVE-2024-48540.json) (`2024-10-25T16:35:11.093`) -- [CVE-2024-48652](CVE-2024/CVE-2024-486xx/CVE-2024-48652.json) (`2024-10-25T16:51:57.013`) -- [CVE-2024-48926](CVE-2024/CVE-2024-489xx/CVE-2024-48926.json) (`2024-10-25T16:19:17.073`) -- [CVE-2024-48927](CVE-2024/CVE-2024-489xx/CVE-2024-48927.json) (`2024-10-25T16:15:13.327`) -- [CVE-2024-48929](CVE-2024/CVE-2024-489xx/CVE-2024-48929.json) (`2024-10-25T16:12:15.897`) -- [CVE-2024-8500](CVE-2024/CVE-2024-85xx/CVE-2024-8500.json) (`2024-10-25T16:43:24.040`) -- [CVE-2024-9583](CVE-2024/CVE-2024-95xx/CVE-2024-9583.json) (`2024-10-25T16:28:17.497`) -- [CVE-2024-9628](CVE-2024/CVE-2024-96xx/CVE-2024-9628.json) (`2024-10-25T16:15:10.160`) -- [CVE-2024-9829](CVE-2024/CVE-2024-98xx/CVE-2024-9829.json) (`2024-10-25T16:30:44.520`) -- [CVE-2024-9927](CVE-2024/CVE-2024-99xx/CVE-2024-9927.json) (`2024-10-25T16:29:27.300`) -- [CVE-2024-9947](CVE-2024/CVE-2024-99xx/CVE-2024-9947.json) (`2024-10-25T16:53:12.867`) +Recently modified CVEs: `83` + +- [CVE-2024-44099](CVE-2024/CVE-2024-440xx/CVE-2024-44099.json) (`2024-10-25T19:35:07.773`) +- [CVE-2024-44100](CVE-2024/CVE-2024-441xx/CVE-2024-44100.json) (`2024-10-25T19:35:08.533`) +- [CVE-2024-44101](CVE-2024/CVE-2024-441xx/CVE-2024-44101.json) (`2024-10-25T19:35:09.280`) +- [CVE-2024-46240](CVE-2024/CVE-2024-462xx/CVE-2024-46240.json) (`2024-10-25T19:00:20.737`) +- [CVE-2024-47012](CVE-2024/CVE-2024-470xx/CVE-2024-47012.json) (`2024-10-25T19:35:10.183`) +- [CVE-2024-47013](CVE-2024/CVE-2024-470xx/CVE-2024-47013.json) (`2024-10-25T19:35:10.947`) +- [CVE-2024-47014](CVE-2024/CVE-2024-470xx/CVE-2024-47014.json) (`2024-10-25T19:35:11.740`) +- [CVE-2024-48139](CVE-2024/CVE-2024-481xx/CVE-2024-48139.json) (`2024-10-25T19:35:12.730`) +- [CVE-2024-48140](CVE-2024/CVE-2024-481xx/CVE-2024-48140.json) (`2024-10-25T19:35:13.497`) +- [CVE-2024-48141](CVE-2024/CVE-2024-481xx/CVE-2024-48141.json) (`2024-10-25T19:35:14.257`) +- [CVE-2024-48142](CVE-2024/CVE-2024-481xx/CVE-2024-48142.json) (`2024-10-25T18:35:08.560`) +- [CVE-2024-48143](CVE-2024/CVE-2024-481xx/CVE-2024-48143.json) (`2024-10-25T18:35:09.327`) +- [CVE-2024-48570](CVE-2024/CVE-2024-485xx/CVE-2024-48570.json) (`2024-10-25T18:59:22.033`) +- [CVE-2024-48706](CVE-2024/CVE-2024-487xx/CVE-2024-48706.json) (`2024-10-25T18:58:35.380`) +- [CVE-2024-48707](CVE-2024/CVE-2024-487xx/CVE-2024-48707.json) (`2024-10-25T19:11:54.310`) +- [CVE-2024-48708](CVE-2024/CVE-2024-487xx/CVE-2024-48708.json) (`2024-10-25T19:10:08.457`) +- [CVE-2024-49996](CVE-2024/CVE-2024-499xx/CVE-2024-49996.json) (`2024-10-25T19:56:10.320`) +- [CVE-2024-50000](CVE-2024/CVE-2024-500xx/CVE-2024-50000.json) (`2024-10-25T19:55:55.357`) +- [CVE-2024-50012](CVE-2024/CVE-2024-500xx/CVE-2024-50012.json) (`2024-10-25T19:55:40.217`) +- [CVE-2024-50013](CVE-2024/CVE-2024-500xx/CVE-2024-50013.json) (`2024-10-25T19:49:36.863`) +- [CVE-2024-5159](CVE-2024/CVE-2024-51xx/CVE-2024-5159.json) (`2024-10-25T19:35:15.010`) +- [CVE-2024-5836](CVE-2024/CVE-2024-58xx/CVE-2024-5836.json) (`2024-10-25T19:35:15.787`) +- [CVE-2024-6611](CVE-2024/CVE-2024-66xx/CVE-2024-6611.json) (`2024-10-25T18:35:10.737`) +- [CVE-2024-9530](CVE-2024/CVE-2024-95xx/CVE-2024-9530.json) (`2024-10-25T18:52:10.810`) +- [CVE-2024-9987](CVE-2024/CVE-2024-99xx/CVE-2024-9987.json) (`2024-10-25T19:06:35.350`) ## Download and Usage diff --git a/_state.csv b/_state.csv index a320a763854..cb3d0b3f538 100644 --- a/_state.csv +++ b/_state.csv @@ -176776,7 +176776,7 @@ CVE-2021-33141,0,0,e0a065c9925276699eb5f8937853ed461086d29f7a31aeec1551cbb7f5460 CVE-2021-33142,0,0,6b6d2e7a3593474e941a48c0e0a86b2afdb88e9d637d16ea56105561edab726b,2024-05-17T18:36:31.297000 CVE-2021-33143,0,0,d33bc31405c694174d143c612f45f6bb45da8c342a10f9e04e8fe9e0b4afac47,2024-05-17T01:57:50.467000 CVE-2021-33144,0,0,9a9f4bc57e199cf457d3114610bce4b7cdb0bca10058a5af438e8b02d657b104,2024-05-17T01:57:50.507000 -CVE-2021-33145,0,0,fa8c9843e7b9fcca7c562a7add034c5c8e68695955e92bb0c378acd44a9f83dd,2024-07-03T01:36:45.387000 +CVE-2021-33145,0,1,f6fedb7ea0ffd4f9b5854891de3ec3bf7fcad1994b7d5fcf04fe5f8486d8999c,2024-10-25T19:35:00.780000 CVE-2021-33146,0,0,1b10b1154ea12dfba2ef43c2271cc4baf012ccc3e3f0df488ec84bb305233130,2024-07-03T01:36:46.133000 CVE-2021-33147,0,0,4fd910e8850035a7c5a60833e30ea5134ba4be70dca5cf5c934dfae1565347c4,2022-02-15T16:51:32.753000 CVE-2021-33148,0,0,a6a0f8af441e615c4cab080b9ae7f289c149d473f5d60c819201878714dd3401,2024-05-17T01:57:50.630000 @@ -198413,15 +198413,15 @@ CVE-2022-3035,0,0,56f1fc89fb5d6992dffdef4a1f1866585697ecbd361910f27cf4eb74bef319 CVE-2022-30350,0,0,18d3001ce63cdc43cde8480b95b699a5a0a5ecb7deba51d4dc72c0d86c6408f8,2023-04-10T16:55:52.733000 CVE-2022-30351,0,0,2df1fcff158bfaa98e8e388cc82c7b76555d1068f7cfc1016565d9f0f49748dd,2023-04-10T16:42:49.510000 CVE-2022-30352,0,0,9c99852cab9cb3dba12ad494a32dc9a161c396d474ce4e7a613cf8447766b558,2022-06-10T02:33:25.820000 -CVE-2022-30354,1,1,7cba051f8dce4545bb466640a9f5c05e0372bd088683a3405bf2a27c2cce1974,2024-10-25T16:15:08.663000 -CVE-2022-30355,1,1,a63c222394726d2b71551b949ec5395a64f26fd11980591e88025dc69028c968,2024-10-25T16:15:08.733000 -CVE-2022-30356,1,1,9308385fcbcb801d9c8b00db22c0630d9b3e8c8ae137f0fed3bf5630f60767fa,2024-10-25T17:15:03.387000 -CVE-2022-30357,1,1,69ac61555cbd98d1a0a5e01a94a9884cf5cfab9c5fac56dd7704263164771904,2024-10-25T17:15:03.450000 -CVE-2022-30358,1,1,09934a292607f0f0fec4c9584ccd370034b961e333a8196f11a9642776345e47,2024-10-25T17:15:03.507000 -CVE-2022-30359,1,1,cd098a9a0befa2548cd8f1a5cc248bfe7beae08baa1c613c2049e59c36272bdf,2024-10-25T17:15:03.570000 +CVE-2022-30354,0,0,7cba051f8dce4545bb466640a9f5c05e0372bd088683a3405bf2a27c2cce1974,2024-10-25T16:15:08.663000 +CVE-2022-30355,0,1,5dc1531b708befb320f7d2b9c4c4c759ee5636e9d0af320547d51d8dc9a1901c,2024-10-25T19:35:01.173000 +CVE-2022-30356,0,0,9308385fcbcb801d9c8b00db22c0630d9b3e8c8ae137f0fed3bf5630f60767fa,2024-10-25T17:15:03.387000 +CVE-2022-30357,0,0,69ac61555cbd98d1a0a5e01a94a9884cf5cfab9c5fac56dd7704263164771904,2024-10-25T17:15:03.450000 +CVE-2022-30358,0,0,09934a292607f0f0fec4c9584ccd370034b961e333a8196f11a9642776345e47,2024-10-25T17:15:03.507000 +CVE-2022-30359,0,0,cd098a9a0befa2548cd8f1a5cc248bfe7beae08baa1c613c2049e59c36272bdf,2024-10-25T17:15:03.570000 CVE-2022-3036,0,0,c4abe10251774bed45d05e8655ab46440316bc2da3c56604182cb58b05d9789f,2022-09-21T15:01:39.933000 -CVE-2022-30360,1,1,34569a3f641a3cdd7841c1c67f2a5aa99c1c300275cfc941611e517f8fba9cfc,2024-10-25T17:15:03.630000 -CVE-2022-30361,1,1,db7f1efce552edea697a9c8209f404511683bc404219a3cf97df9f6f95f43d37,2024-10-25T17:15:03.700000 +CVE-2022-30360,0,0,34569a3f641a3cdd7841c1c67f2a5aa99c1c300275cfc941611e517f8fba9cfc,2024-10-25T17:15:03.630000 +CVE-2022-30361,0,0,db7f1efce552edea697a9c8209f404511683bc404219a3cf97df9f6f95f43d37,2024-10-25T17:15:03.700000 CVE-2022-30367,0,0,4ab429b852faf9723dbf506dba281ae94cd253e629be5b5f8d2fb2c552ccac49,2022-05-23T16:59:24.497000 CVE-2022-3037,0,0,c435799296f92b50e0bd30d245bc09441dcbbe40f6a0905fc66767266b6ff152,2023-11-07T03:50:43.193000 CVE-2022-30370,0,0,43e003e1eee0ff632ee04c0ec5c6be63af911ff9967992f449cf67592ab6166e,2022-05-23T16:49:37.360000 @@ -212596,24 +212596,24 @@ CVE-2022-48971,0,0,998975336af1feca0df2eeedd516faed136509784fd2222bb672c33e3083f CVE-2022-48972,0,0,1b38bc5eab69345ffacf3735f7c4d7a21942b008815acccb4048e2196ca88ff8,2024-10-25T15:22:33.897000 CVE-2022-48973,0,0,976ef450614292c62923177c314a4b2aa5b18418ae239de605da93f276c749ea,2024-10-25T15:35:54.687000 CVE-2022-48974,0,0,665d9c03b3d3f1f2b3e7ecc5cabdfc4e26418e7914055dc95137c3a3c52dd1bf,2024-10-25T15:25:54.433000 -CVE-2022-48975,0,0,5aa03611cf6147e6cbe4a65152583e0072aea2d5e51c8399c173faf09094d685,2024-10-23T15:13:25.583000 -CVE-2022-48976,0,0,a64de68b36096327ba87788e46c4482923e9b464dece26a8aba3dd90cbbbdf36,2024-10-23T15:13:25.583000 -CVE-2022-48977,0,0,22a1f9cacabe8dede59f80dc5c8e91dcb66c9e473ead5c6f5b52cff09106031d,2024-10-23T15:13:25.583000 -CVE-2022-48978,0,0,31293eb0f81829ea7af1f070d7a3df5a1790f8574ca5251e33cd7c1710ed9003,2024-10-23T15:13:25.583000 -CVE-2022-48979,0,0,d38e0f35f5b0051b12afc3385f777364a73a3b1754aa2556c22567d7fd4543a8,2024-10-23T15:13:25.583000 +CVE-2022-48975,0,1,e1fb3e2bc7f9ba54b7ee65fa841ac29a199874f317e3d17428ca1b5f9402dbe2,2024-10-25T18:48:57.490000 +CVE-2022-48976,0,1,bbbf0bdfd942edca0508c3b6adeeebc2a07f64cf4a932ca62327eb55c9a12c1c,2024-10-25T18:47:40.823000 +CVE-2022-48977,0,1,eff713f1e22ab6714c388c4b46d09006813ee4d3c2ac4f34360f0c12818df52d,2024-10-25T18:47:07.357000 +CVE-2022-48978,0,1,63d84a3101a74198d1a57d7e01f661d8ddede015533d663af8fbf98cad6e5e89,2024-10-25T18:46:23.317000 +CVE-2022-48979,0,1,6e293a7d4d94801184b43db15d0a018f7d2d54654b239c95c385d82bf055453d,2024-10-25T18:40:16.227000 CVE-2022-4898,0,0,45b8fe73140eae686f75256e6a033fa7f76a1c506314cc4b83a596aba96b02bc,2023-02-21T15:15:12.023000 -CVE-2022-48980,0,0,8d526640cbdfc2eac896bd10a04a158881a6eaf9b8c038323a974e23d54cd968,2024-10-23T15:13:25.583000 -CVE-2022-48981,0,0,964b5764196aa475d717a98d105807ba1ba56de8f543da7fb2f4d00ef08bab19,2024-10-23T15:13:25.583000 -CVE-2022-48982,0,0,2b231419453512dd11ff8c1000c255778689437792243f66ab1524a71b12fbdf,2024-10-23T15:13:25.583000 +CVE-2022-48980,0,1,847f9f7949c9e624eef3c5211fe6f9f34a42f62c669ae41cbeca15bb8a3e49f0,2024-10-25T18:36:00.703000 +CVE-2022-48981,0,1,edbe50226f61eeb3964ee5f01c48ece48013ec7f030ccd46e06c058038ce5163,2024-10-25T18:33:18.783000 +CVE-2022-48982,0,1,58fbd0b9b2a1580dc158a88315d6703348749f40d4fc009911acc30aa732771b,2024-10-25T18:12:52.270000 CVE-2022-48983,0,0,dfa67a553ef1fa3c57f719e3548ad9b975bf5a0f74df240dd01055c881443dcd,2024-10-25T15:58:02.297000 CVE-2022-48984,0,0,e51fd7e8de77f3a8cf163611cb2f09fc6b7014335c2a9168caf96cf9450b0b0f,2024-10-25T15:53:53.890000 CVE-2022-48985,0,0,6cf11753a689d662f9255b9369c8210e89bb6def1b70b9ecf2bda7c020ae1116,2024-10-23T15:13:25.583000 CVE-2022-48986,0,0,6c9de2cdc1f05896064512205d6a856f3488acd470650f11d2c15464c4a320e4,2024-10-23T15:13:25.583000 CVE-2022-48987,0,0,7e41a00ba39093b717c7e7821e300a97872c374b14c3fe63fb5c52c9819075bf,2024-10-23T15:13:25.583000 CVE-2022-48988,0,0,13aee4cb90261ef632b8011d536d4f4d81a59bc5186a33e9a1bb37d07ce9e2c4,2024-10-23T15:13:25.583000 -CVE-2022-48989,0,1,12f08708869bbe9ec063b7392e0e15042d70e2feeae860945b26c11deb45e931,2024-10-25T16:02:05.787000 +CVE-2022-48989,0,0,12f08708869bbe9ec063b7392e0e15042d70e2feeae860945b26c11deb45e931,2024-10-25T16:02:05.787000 CVE-2022-4899,0,0,64070b82b08d57aace9b84f3711bc30a23fda3b7a68f2b187d0af07aa5382f53,2023-11-07T03:59:16.090000 -CVE-2022-48990,0,1,f3f5f9ba37039dd5bdebda25bf3b72aaf6156992a282b1be1c6dde6507784974,2024-10-25T16:03:41.527000 +CVE-2022-48990,0,0,f3f5f9ba37039dd5bdebda25bf3b72aaf6156992a282b1be1c6dde6507784974,2024-10-25T16:03:41.527000 CVE-2022-48991,0,0,6a7cb21a3ac184136cd0ab4a861f7301f05b1785725a9d2367d58cd519d1b08f,2024-10-23T15:13:25.583000 CVE-2022-48992,0,0,8f56e9ce177d276837e828e603f41b46405afcc8129dce28e104445db61b74c5,2024-10-25T15:51:38.037000 CVE-2022-48993,0,0,ef216d3e2a04a71a8d804734065ba340ce4d331bb10df8d692bb266c02e77712,2024-10-23T09:15:02.593000 @@ -219837,7 +219837,7 @@ CVE-2023-26243,0,0,48cb445983df6e845460de44bcefe9b053ee215782ea6fb71062113286d3e CVE-2023-26244,0,0,3e14139b3a5d244c793fcf72da7c9d561b05de05bc6b4a0cc6be5180c7f30def,2023-05-08T14:15:15.390000 CVE-2023-26245,0,0,755add3a1550f5f231ae6bc72bcb3689b3591a566d528b68a135543809ea17f8,2023-05-08T14:15:48.107000 CVE-2023-26246,0,0,3968ee2416178f3373b173158130de8333d79f4b30871ec73ef61f489c3ad845,2023-05-08T14:15:42.497000 -CVE-2023-26248,1,1,1226826808b3a14467514cae889974b976a1cc373f34617329f41e9945ca0855,2024-10-25T16:15:09.500000 +CVE-2023-26248,0,0,1226826808b3a14467514cae889974b976a1cc373f34617329f41e9945ca0855,2024-10-25T16:15:09.500000 CVE-2023-26249,0,0,67d1d0c7cd14c3e554469121f96a8b736060705fef121074c7fbb5229e25b180,2023-03-02T23:20:03.390000 CVE-2023-2625,0,0,9986d8092e79a4b295b9781284b5a771179624be994dd8d9e9634af08ab34626,2023-07-06T16:10:43.413000 CVE-2023-26253,0,0,1ae34e99a0e17ae55380be2767abcad6c3e45c70e14babf83d8ba52ebd904367,2023-11-07T04:09:31.830000 @@ -227576,7 +227576,7 @@ CVE-2023-36487,0,0,4ee451a0564756ffd2f87667dd3e053ca883a586efcb5e3646d6db8c84bbd CVE-2023-36488,0,0,8a8c94d3e56d54aa8236dd81881b8fd4e3b6cf6358546f3bd01ade2f9809eb94,2023-07-07T17:17:29.997000 CVE-2023-36489,0,0,dc3b2a16fb93102da57c7283fbace2014f377f0bd7bc62fc2588a28c19875238,2023-09-11T13:36:35.507000 CVE-2023-3649,0,0,e5601b17dd56710e279a251177061f0fafab9b420c2e2a77a3dbf0de88036ac3,2023-07-25T18:20:46.537000 -CVE-2023-36490,0,0,119165280024c3c9b9d70c125a0f3d01d53952b0224cf1691f9ab32fd4083c97,2024-02-14T15:01:46.050000 +CVE-2023-36490,0,1,212625366332af3d57eec534d617401802f3ed4def9de6e9a6bbc60e2168ff1f,2024-10-25T19:40:43.417000 CVE-2023-36492,0,0,a6fdf1b6c1920694305ae38a0209cc3b60add5c0d6876bff239d05fef669fc26,2023-09-08T16:48:06.590000 CVE-2023-36493,0,0,0616934dcaec5abb5bed6dc7f46ba3e7e0347b94b99ba052265b2e8e478656d0,2024-02-14T15:01:46.050000 CVE-2023-36494,0,0,11b002c7660baf795f5041a7c39da6a423e11c613352f9cd1ef2e12fe703cd9a,2023-08-07T20:03:35.267000 @@ -228026,7 +228026,7 @@ CVE-2023-3703,0,0,068e0b1f7843fd3f40e1bbb100dd81035cac75a5a96efe260c2bf4520dd681 CVE-2023-3704,0,0,793d9220d2da7f9b3fa1a1422d71c1aea286d4f76d2d1332891021d1253c90f6,2023-09-01T17:12:08.027000 CVE-2023-37049,0,0,5bb9a8e44ea747874aa62b6c776677530d8780a6d693b25786035510152b5bb7,2023-07-31T18:12:44.960000 CVE-2023-3705,0,0,dd535da15bc24d4772bb9fea1dd1db9053b8e85cfda0d0123768f455a693d9fa,2024-10-02T21:35:11.020000 -CVE-2023-37057,0,0,e1223f8efcbaf7ddeedc5d28ed13cdf256cc28b55524c35baa26ced5559f6966,2024-07-03T01:40:30.133000 +CVE-2023-37057,0,1,cb4dabaa18f8952e184ff41a265048d993a683ef833689b31804b434bc233812,2024-10-25T19:35:02.943000 CVE-2023-37058,0,0,eff855c03dbccfeeb722602f8747e282673b8e0d20673a6a13b2384c9bf3aeea,2024-08-26T13:21:34.693000 CVE-2023-3706,0,0,bf0c4659730cc64b8185baa2687b08807130d9eec2e6a62373b00bff897cec78,2023-11-07T04:19:25.570000 CVE-2023-37061,0,0,ae38a5d48720b8f86c566ccc68715d9acf86f46115f38bfd0cd8f1590bd4a3ab,2023-07-12T20:58:22.373000 @@ -228887,7 +228887,7 @@ CVE-2023-38130,0,0,a4d937a40ab1906cc70a377b2965fb97adc8d21f6a7f14d60e6427d2863f3 CVE-2023-38131,0,0,f92c1cb176fd142005f4dc8e0e46e473f799f5268800d2a119ca21923a92c65b,2023-11-17T04:12:48.530000 CVE-2023-38132,0,0,2e29d7e4390895d75db8d14175ecf954c2b73938ed2c37d00fe12fa95aed044a,2024-10-08T15:35:11.083000 CVE-2023-38133,0,0,af06ef913649a6ee499e8e12b5e3cc4498907d0af745e1aa77e34a778995abf1,2024-01-05T14:15:47.027000 -CVE-2023-38135,0,0,7749fcad167ae61d0a929abd3f0312ffd64f30caed31dcd80ffa2deee6ad5f51,2024-02-14T15:01:46.050000 +CVE-2023-38135,0,1,b66dcf3e36b08e5b13174eb7fed300f364e2b75f26ae57383f7f638fe3f07136,2024-10-25T19:41:09.790000 CVE-2023-38136,0,0,554f39e979a0861d4175b39a9164da3690299a760aaac82981d94d1c4d3b2c13,2023-08-03T16:56:20.357000 CVE-2023-38137,0,0,1cec05d7be20edcda40f67c7c6ac8d770b26a8316863ab68482af52d2669688c,2024-02-14T18:15:45.880000 CVE-2023-38138,0,0,f3ec9c077a05429868cf76734f4c4d6cff4d508294e155ff19fe386e5f02db74,2023-08-07T19:11:51.917000 @@ -229298,7 +229298,7 @@ CVE-2023-38558,0,0,41531cacb1de233098d32b79fd9efecebdba07a9595f0a633638e81ec8b2c CVE-2023-38559,0,0,f4de074d6255bba1adaf1a2af72abedea97811f23e11ff71de6632665bc659e7,2024-09-16T13:15:05.667000 CVE-2023-3856,0,0,31b604aceaf14703f21a8b47a664ff4f650adc31c83b4a1251209c844c970874,2024-05-17T02:27:54.067000 CVE-2023-38560,0,0,247e24b5ab5349d123f13aa4bc5ee89bef8684469506b9c7e635be9f6283daaa,2023-11-07T04:17:21.293000 -CVE-2023-38561,0,0,c8e08cb46ebd1aa35ebd189dc0663df0fa88b7acddaf3601d5cae603037f46b4,2024-02-14T15:01:46.050000 +CVE-2023-38561,0,1,ff406c0079fec6c6ff77b3655776dbd132debe9e16a7e020eb07ce8fdc933cca,2024-10-25T19:58:38.973000 CVE-2023-38562,0,0,127d1a2b630856d5538c1ca38a31578c3089871c39c5f3a8684c910dd7a424b2,2024-02-20T19:50:53.960000 CVE-2023-38563,0,0,cd5653006ddb237fe74acb1487f8018dcc309b748db7c43e87d0e1655d65393a,2023-09-11T13:39:23.730000 CVE-2023-38564,0,0,b6614995561f59800bbe304c9a4bb6f0df0678257f2d10dccc98201621f1d3d9,2023-08-03T16:48:13.720000 @@ -230512,7 +230512,7 @@ CVE-2023-40152,0,0,dcacc5b44050cb59d212435fbba4b589e052e87e87f7f380cddbb6affa05e CVE-2023-40153,0,0,68082b8d0b1cd673ce13fc831779593073884ad14dff8278795b2977ab85be34,2023-10-25T13:39:43.797000 CVE-2023-40154,0,0,0c21ee8c4fe867d7637a5b5eae7ca984d29457115dd9276ce93b2b7de45045a8,2024-10-23T14:07:44.730000 CVE-2023-40155,0,0,6607ef25c31938b51bd9b5bc14fc82ea7b9d6e01e850e1c2a7260709004a339f,2024-07-03T01:41:05.087000 -CVE-2023-40156,0,0,5e8f76b298822e89ccc8b4a43484c8f474a98f9ca30f47e72c0a6bb7cf341fbd,2024-02-14T15:01:46.050000 +CVE-2023-40156,0,1,bfae4b687c53df49e6861b02d4b223c8701c3005138ddfe5fc25e8f5f182b643,2024-10-25T19:59:00.933000 CVE-2023-40158,0,0,f5c33dd671eaea6944f90c9c2dcc1f233b63eb3f3d167e9fce8fa1f154c769a3,2024-10-11T22:35:00.770000 CVE-2023-40159,0,0,f23653787b2c8d1c7ab49dff62eab2cb6aa12e31e549c1c4d79a1506883bf305,2024-09-05T20:41:09.723000 CVE-2023-4016,0,0,fd0766ac93b2d18ad336657f47ddb29d4b25b76da4cba12e55388717e6b8762f,2023-12-15T18:19:03.787000 @@ -235007,7 +235007,7 @@ CVE-2023-46518,0,0,50a6b72c9eca27d9118865834eb8eeb2d6571605663676a98cbc4bc277ffc CVE-2023-4652,0,0,5222738c738474475cc77f6118c2f194c8e026777ab00d0851e9cdbfda77bd35,2023-09-01T18:39:07.780000 CVE-2023-46520,0,0,6785302a5c9677ea2ec7e929767d096b2f5d09c9a984620f2dcaf9963a74132f,2024-09-11T16:35:15.170000 CVE-2023-46521,0,0,ba0fc3a8fc3510daceca92d9bd55661d2ae155990d59b773f724fdc9ba1fc058,2024-09-11T16:35:15.977000 -CVE-2023-46522,0,1,75a62eb161b75a20276cda0b22a36582e143f545fbcc95881a2a51df6fa24c24,2024-10-25T17:15:03.790000 +CVE-2023-46522,0,0,75a62eb161b75a20276cda0b22a36582e143f545fbcc95881a2a51df6fa24c24,2024-10-25T17:15:03.790000 CVE-2023-46523,0,0,b32818064f5423969c5b5a7f2c46b5f76f2b50349f4ee7c69655f3693d2d7bac,2024-09-11T16:35:17.560000 CVE-2023-46525,0,0,536995641d0eae55a415097fbcf59d5e1023235e14ee48c525d45b6b231dab64,2024-09-11T16:35:18.350000 CVE-2023-46526,0,0,330f6130a88e73fcf05e8b87b6f746fc59d12c849d672aa5a5aad838ccd9b5c1,2024-09-11T16:35:19.150000 @@ -236059,7 +236059,7 @@ CVE-2023-48068,0,0,d2ed6581af62c4b74ef3f8171b12ae6e16910b36aa9ccf062a942fd093c09 CVE-2023-4807,0,0,3de0d677ebbf00153cefbfa374c0ecc381ecf722c89be68b57b7df074a7f14d7,2024-10-14T15:15:12.213000 CVE-2023-48078,0,0,0d9dcf5cb116c36b06b2365e4b759d1ca0ba54345b6daa32e108a2d9f4c48031,2024-08-14T19:35:13.890000 CVE-2023-4808,0,0,4a43f94f49b00a1ded4942c432a3569f5fcf99624dd900f508f8d30286fbcfa9,2023-11-27T16:33:33.237000 -CVE-2023-48082,0,1,ea4291e271299bc9548bf3dbd598a1caf33674d80f8f961b04db68b3e8ba972b,2024-10-25T17:15:03.903000 +CVE-2023-48082,0,0,ea4291e271299bc9548bf3dbd598a1caf33674d80f8f961b04db68b3e8ba972b,2024-10-25T17:15:03.903000 CVE-2023-48084,0,0,459a90979a07550a284aa3e1863b171726a2debcb2ae1cda3b39790a2d652b29,2023-12-19T18:41:44.493000 CVE-2023-48085,0,0,ad24d46a2c7d3c2e30b77344324b90919c3f0291c86071ef906b236a00e55787,2023-12-19T18:41:59.183000 CVE-2023-48087,0,0,9729ddec6f348b3a3c6a59a1ffe393a6cd2fd40ee60944b2ab3b3e235f9546cb,2023-11-21T02:42:52.163000 @@ -237965,7 +237965,7 @@ CVE-2023-5080,0,0,e74b710ac5ce55c8b64e5a605db4534fb958b292680076cb58f4eecbcfdcbd CVE-2023-50803,0,0,39b8457e6689f19cf0cfb42bf6f8f9bc85c44a7256b507e6e2e5e4502e82fde8,2024-06-25T21:15:51.453000 CVE-2023-50804,0,0,39f75e54eac34ee2309659a8b63ea3ce44f3663e0d436459f4acb23eb679f665,2024-06-27T16:42:15.310000 CVE-2023-50805,0,0,6a1b68eb1c84b0e9c0411e8c2b1c211a94333de961886c775bd464a3e1dc9ade,2024-07-11T13:06:13.187000 -CVE-2023-50806,0,0,b76f16dc23feb49e04f1b42035094c51dba4a883093ee0167c8a3ca387a724ae,2024-07-11T15:05:15.190000 +CVE-2023-50806,0,1,ecfb4db274c5901b7304546aec7b66276cb9bab5714351e0c4fb60a29c3cf84b,2024-10-25T18:35:02.050000 CVE-2023-50807,0,0,49d7ddd672f2ace5a4bacad8e9a69ecb67c1f752bb20673689176d58cf559602,2024-07-11T15:05:15.990000 CVE-2023-50808,0,0,eb111853188ca06e9540385134be25115b61d3ae24652382189ac577efef0822,2024-10-17T14:35:01.797000 CVE-2023-50809,0,0,bc071172f4263c6ad714cd837284dbe1dad1416a743fc7cfef6ab03d74ce787e,2024-10-24T20:35:04.223000 @@ -240835,7 +240835,7 @@ CVE-2023-6597,0,0,ac8c057de6d1c11d6944b0b9d92513a5893025dbfa0d30575569eb524fd5d8 CVE-2023-6598,0,0,44646d82b677b24aa988874a2f513c7a55374b6fc5e8239b526ea32f6db36822,2024-01-17T21:24:33.233000 CVE-2023-6599,0,0,87adfeaa904a3f0139fc2bf2ce135f454b340363d2ac212c6a95e9e2242d91ba,2023-12-12T17:22:17.503000 CVE-2023-6600,0,0,6558933adcd201cd8955c6c229da3bb8a7b6988f9263957fe0fdcc657ce47eed,2024-01-10T01:15:38.327000 -CVE-2023-6606,0,1,4cfdb26fdec003d889123845126cfb79253e8be899795563b1b4e029b0ad3ad6,2024-10-25T16:37:21.847000 +CVE-2023-6606,0,0,4cfdb26fdec003d889123845126cfb79253e8be899795563b1b4e029b0ad3ad6,2024-10-25T16:37:21.847000 CVE-2023-6607,0,0,81fceb5d2210d094481ebc286d221197231e631e432fc51c3654e75c6bb55dc3,2024-05-17T02:33:48.050000 CVE-2023-6608,0,0,5487174dec87235f3204bcb9adcbf0d2d725602df0e746e9cda4254f8d663296,2024-05-17T02:33:48.163000 CVE-2023-6609,0,0,c7bba61fa49512bdfc6e42061c9ccef0b9628ee7268c0dc198f2bd1bce9b1d84,2024-05-17T02:33:48.270000 @@ -241412,7 +241412,7 @@ CVE-2023-7256,0,0,4d31b5d621cc269e867da095170b22428e07c2ba7854722005d4b162e4ce2e CVE-2023-7258,0,0,743a17302c5d0deefce3c9c18515bc1a780c1d3e967dd943e69bc9c091c417e4,2024-05-15T18:35:11.453000 CVE-2023-7259,0,0,4927c73cd38943cc915f51b0766c09a76100affe33b1049612344f19331c1f96,2024-08-02T09:15:55.730000 CVE-2023-7260,0,0,320b55d1f034809d79e51e192994ba6b2fe9aaa6c60b445d7c661747328ccbb2,2024-10-16T12:53:08.807000 -CVE-2023-7261,0,0,44080cc2bc0d6a25d80bc7855327b03309b2d9def17d97f1c55e50122c67ac97,2024-07-03T01:44:30.563000 +CVE-2023-7261,0,1,d82bd77293e7c621816dc935a927a719f351e834364e213cfbe4997d396227f8,2024-10-25T19:35:03.273000 CVE-2023-7264,0,0,51dd8b83703649c91504628a1d95022ef41c77d28d8363a527e775cafaba1511,2024-06-11T13:54:12.057000 CVE-2023-7265,0,0,fb43e2fc7ead32f16ab1a40e592be4835649042e83490e66c86a7fe9f44ca4b0,2024-09-06T16:38:04.533000 CVE-2023-7268,0,0,cddf00fb75fb363308068c92d4a58df3d516324074a1a2ced29fd3b08d0ccedc,2024-08-01T13:45:52.747000 @@ -242347,7 +242347,7 @@ CVE-2024-10033,0,0,c0a9b2336bab3102cd006cc0abae51c59fa7520aa657f85607505772ed524 CVE-2024-1004,0,0,be9a3a60f238fd673f4d3f1f166af1f9400f4582d193359c16f232ef2b1c02fa,2024-05-17T02:35:09.263000 CVE-2024-10040,0,0,e60010f49ca3103740274faae9ff6204ef5e8179ea2561631dfe21b2ee350ec3,2024-10-18T12:52:33.507000 CVE-2024-10041,0,0,d3a5fc70054a78d48c6ae937cda2967a3e628fbc08e88f2a331a6962f073bdec,2024-10-23T15:12:34.673000 -CVE-2024-10045,0,0,df53331c9b7607363b5960cd2fb00b418f72be4924f4b02eb17d04eadab916e2,2024-10-23T15:12:34.673000 +CVE-2024-10045,0,1,a817f3402cf6055b1a750108ad8efeb9be1dc186e8fac94b1b8b513bcc47b228,2024-10-25T18:52:30.337000 CVE-2024-10049,0,0,53720c9da49b26dcdd62ca517621f91bdc81303aa9036eed1b0a1b7834addde0,2024-10-18T12:52:33.507000 CVE-2024-1005,0,0,1191b4a20d5b719ff3ba58b8e13bb4278d19f2133e7221e782230a58acb2d18f,2024-05-17T02:35:09.367000 CVE-2024-10050,0,0,d8b5aaf0fed099523fa2ba7c0c86d11fc479440388170ed27b77f7313b983d74,2024-10-25T12:56:07.750000 @@ -242442,13 +242442,13 @@ CVE-2024-10201,0,0,fc2d027d5ae19fe93b2c62f794fd44c91138a3ac85ba03fab3fa5acc683a1 CVE-2024-10202,0,0,bbf4778e12a2d6f664529db53cb3cf049c2b3a3bf45111e5ee15b039098bfbd2,2024-10-24T13:55:46.110000 CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000 CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4debd,2024-05-17T02:35:11.070000 -CVE-2024-10229,0,1,d8b7c88d62022a9dc51348547e30f2a14480969b9761e4820e45f77df3ca533b,2024-10-25T17:04:54.080000 +CVE-2024-10229,0,0,d8b7c88d62022a9dc51348547e30f2a14480969b9761e4820e45f77df3ca533b,2024-10-25T17:04:54.080000 CVE-2024-1023,0,0,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c4116,2024-07-25T21:15:10.280000 -CVE-2024-10230,0,1,7c95dfcca31fe3a59bb8904d131576d1f25eece1df462a8bd9caf648b1fe5671,2024-10-25T17:02:56.843000 -CVE-2024-10231,0,1,eb0443e51721212742591278ce3f179ecbfdd0bb144d3d1886157523275588e9,2024-10-25T17:01:55.633000 +CVE-2024-10230,0,0,7c95dfcca31fe3a59bb8904d131576d1f25eece1df462a8bd9caf648b1fe5671,2024-10-25T17:02:56.843000 +CVE-2024-10231,0,0,eb0443e51721212742591278ce3f179ecbfdd0bb144d3d1886157523275588e9,2024-10-25T17:01:55.633000 CVE-2024-10234,0,0,f0f874ebc55e8dfa4acd91fc71f3ef8e531ff2aafbcdb23e5894b5f6702649bb,2024-10-23T15:12:34.673000 CVE-2024-1024,0,0,d47b3d3840cd70db883d335219cea52b6b4fa0e3fdfc3f4d41efc4b833dff6a1,2024-05-17T02:35:11.210000 -CVE-2024-10250,0,1,8accb693817c35c7e4f9fa710076ead819720d8653e5052fbeeec31b3a5b47d2,2024-10-25T16:37:32.777000 +CVE-2024-10250,0,0,8accb693817c35c7e4f9fa710076ead819720d8653e5052fbeeec31b3a5b47d2,2024-10-25T16:37:32.777000 CVE-2024-1026,0,0,e127bb5d00442b36eed0e6ff6513a3a42c45706876a3a5f2167365447fb898e7,2024-05-17T02:35:11.320000 CVE-2024-1027,0,0,7cdd04f65f65ce162dee4b0e860b968e4c1a6b7f21d53e978519c8259363a858,2024-05-17T02:35:11.427000 CVE-2024-10276,0,0,5e7ff159e65586309659d6baff08f635e7f7065d36341ca3fc8957b4d9175dc0,2024-10-23T15:12:34.673000 @@ -242472,11 +242472,11 @@ CVE-2024-10293,0,0,97810b693c214de7eba440fa721337a0acab1625229c9faa2817690aeba72 CVE-2024-10295,0,0,05be2217733c9dc82e0ab847a99213d443b6eb2416a14b489bddd760491fe8e9,2024-10-25T12:56:07.750000 CVE-2024-10296,0,0,3731dd63766ea164d82646758d87e47e2e2d1ca9061034b26ec431458662311d,2024-10-25T12:56:36.827000 CVE-2024-10297,0,0,7059e1e2bb8cf8e51a328b566020cbc23abd446f188f444527bfee9442b2adad,2024-10-25T12:56:36.827000 -CVE-2024-10298,0,0,182fddfc46dce2e154a9d7232dcd133e34601980b0699619ad9ebc89c9d41132,2024-10-25T12:56:07.750000 -CVE-2024-10299,0,0,3f9d2a84b81fd1d46a6bc0dc8cb6a067838da188f2f1d1614d47c67215bc1829,2024-10-25T12:56:07.750000 +CVE-2024-10298,0,1,a0e9f6b5e6c68ad8ada3edbba009974fda145ba113b49020fdab65d252296669,2024-10-25T18:51:44.370000 +CVE-2024-10299,0,1,8f6bbd417e81aed931d66aa709de124d671c1a1cb50b9fa501b1939928e9cb42,2024-10-25T18:51:17.047000 CVE-2024-1030,0,0,34264c5a1a4e97f6ee4441192a69e3a5aa9d9614a8467bdc88cd76d1a9884fe0,2024-05-17T02:35:11.737000 -CVE-2024-10300,0,0,0f1c3dcfa436dddf319fa507de84a27903859bee7806d8166e59b8ed4cf9916b,2024-10-25T12:56:07.750000 -CVE-2024-10301,0,0,774b09626a31a7a9cb638e2934cb9a21776b22d0dba749d89f118e1850f05197,2024-10-25T12:56:07.750000 +CVE-2024-10300,0,1,ca0242a4c58ba5eb41987558653c1fad0eefdb856c34de56d3278680f413cd2c,2024-10-25T18:49:01.953000 +CVE-2024-10301,0,1,43e47cf56bc671ed7b90e0f04f420138e8362a6d949261d9acbcdf888c921aa2,2024-10-25T18:47:54.033000 CVE-2024-1031,0,0,6576162a78ac686f55e5931a6b8f02ff6c7312ac04792581e6d78da8a91700d4,2024-05-17T02:35:11.843000 CVE-2024-10313,0,0,0a692e743da8a6f5929e9a5e61a16c962249b9fbffffedea4a154098bf7390c0,2024-10-25T12:56:07.750000 CVE-2024-1032,0,0,06925fc416f8ceea7fb895efc2e3f765d4f064c5150968a9409448741aa1fb78,2024-05-17T02:35:11.947000 @@ -242515,8 +242515,8 @@ CVE-2024-10379,0,0,3c7753aa53a7f490ce21f7358197ba3a7c5845bca9dfc769528ab53d2e506 CVE-2024-1038,0,0,c7b47d6608546def6f3304631405edc76ac6151bae95644217fe0b19e7498b5e,2024-03-13T18:16:18.563000 CVE-2024-10380,0,0,fbc6bdf17d1189e11e8b0a1f98f107dfa2f1f98f4113f4f2078dda76042f5da0,2024-10-25T13:15:17.547000 CVE-2024-10381,0,0,6ffe44cfcb0700d41680c7c9242cba169e32dff153adc942340c76d32ff0166c,2024-10-25T13:15:17.810000 -CVE-2024-10386,1,1,620f9606b4947e68d786b63bc64226dc49af2c78c3961a92113a83d41fde8506,2024-10-25T17:15:03.987000 -CVE-2024-10387,1,1,1d314c1f04eb0f6b0e625a4b66f38d6fe480b0f44899159cd155926983f5770f,2024-10-25T17:15:04.230000 +CVE-2024-10386,0,0,620f9606b4947e68d786b63bc64226dc49af2c78c3961a92113a83d41fde8506,2024-10-25T17:15:03.987000 +CVE-2024-10387,0,0,1d314c1f04eb0f6b0e625a4b66f38d6fe480b0f44899159cd155926983f5770f,2024-10-25T17:15:04.230000 CVE-2024-1039,0,0,823ba846a6d7c1759f085b54cf23829cdbadd28135927175e007d2b5df85a6ad,2024-02-07T14:09:47.017000 CVE-2024-1040,0,0,b32f85342f197693d2db41df3bf264f5b00d802b0a5fb12822762c63c498621d,2024-02-07T17:11:40.623000 CVE-2024-1041,0,0,991d5a9e7f9515845650bb9d6b0cbb707e5b40a6073b13e973f0804460a34ef9,2024-04-10T13:23:38.787000 @@ -243127,7 +243127,7 @@ CVE-2024-1690,0,0,43710398ffbfd97fd2d2298464d22f4652f5075ca69bcdcca56d9f56aad3c2 CVE-2024-1691,0,0,2ef9826de93209d069c81e6ab358d8eb246774f7a80e6c411cef0c396fac265e,2024-03-13T18:15:58.530000 CVE-2024-1692,0,0,e629a44d67e992e57af157f5aea9a741f288cdc07f581fddcf0fc8e93b27323f,2024-04-01T01:12:59.077000 CVE-2024-1693,0,0,7d3cbcfec88fed9681b32070817b963b8ddcb473d92ad7474c8d67a492ce3782,2024-05-14T16:13:02.773000 -CVE-2024-1694,0,0,bf85801f0832fa365d7f8985fe10eb8a950958f13710e85ca1e046f87150cc0b,2024-08-01T13:46:10.687000 +CVE-2024-1694,0,1,4e4bca9b1ddbeb95cb8c742cbf6cbd0b885366c38f0d6f8f8d4aaf7488401fd4,2024-10-25T19:35:03.987000 CVE-2024-1695,0,0,040d25b8839514ef94a30e51fac7a9ab85a44004216413bd5b5709553eab9e32,2024-08-15T19:35:04.110000 CVE-2024-1696,0,0,a663827cac86b281a6bafba3681725496e03564ad841117e5d12a480311031fd,2024-03-12T12:40:13.500000 CVE-2024-1697,0,0,122d0b7b2464b5cdb9c8634ff2a556f4e654f017fc1c1b4f9f5a42e2fdd2fc2b,2024-03-25T01:51:01.223000 @@ -244868,7 +244868,7 @@ CVE-2024-21738,0,0,ee493f18830fa61778a839e41065e0a164cfc7a69da412e6c6babcc4b17cc CVE-2024-21739,0,0,74c51cc55d726fea23dbc7423ad28b618c0ad3e8f250404a9e572e22bf0444c5,2024-06-26T12:44:29.693000 CVE-2024-2174,0,0,69f2854ef3602f6c241fc54636cb33b9aa524ada04f0df9d9cfac3f6048da2a0,2024-08-28T15:35:20.553000 CVE-2024-21740,0,0,578e6e77253937b45696dc5f6043eefe34a835f238564d1fe1369311381e46c2,2024-07-11T15:05:22.467000 -CVE-2024-21741,0,0,abad64de70c0fef6bdf30dcd2634a39b659714e71a96cc61f74db71b448be2aa,2024-07-03T01:46:46.537000 +CVE-2024-21741,0,1,276c90d557a1ddbd7ef0f820219f4441d781301bc74a468f8ee48dc1b2e4d8b9,2024-10-25T18:35:03.493000 CVE-2024-21742,0,0,fae1ce375f3fcebe0111b56738c6b02117d77d438c12e42f2ce0251b9cb2427c,2024-02-29T01:44:04.040000 CVE-2024-21743,0,0,0796f228a255a8494ca4bcb581e49158cafa8b24400e4f1dc60b4a4d36771963,2024-09-20T12:30:51.220000 CVE-2024-21744,0,0,2932a891b0379b8b90b4b42aa5b769696f0f306f989668b0b1182de9207b4937,2024-01-11T18:45:53.040000 @@ -244944,7 +244944,7 @@ CVE-2024-21824,0,0,7aa5726f0c5574af74e9f5a3cf3ffd6696b10e95ff2f5e13938ce9966974f CVE-2024-21825,0,0,d4fc704324754f387b029d9f0684cd28f1fe50758fd7d66af26180f7c807a125,2024-02-26T18:15:07.390000 CVE-2024-21826,0,0,e4665c6424ea4b61934e3bcd1ab7ddf62869802487f99534f2a3f3dd7a0149b4,2024-03-04T13:58:23.447000 CVE-2024-21827,0,0,8263bac5597e4519006a0d1acc911f20f09ec3c50860f85a35f4c00493288d2b,2024-06-25T18:50:42.040000 -CVE-2024-21828,0,0,88cb5c9903fd1c4f16d4af828768cbf95671e28587a038a573d470994b7962b2,2024-07-03T01:46:50.690000 +CVE-2024-21828,0,1,0198d53936750e8cf0a58e2c2aae43911345deb4d12d37a3a779e588c3b4ab30,2024-10-25T19:35:04.160000 CVE-2024-21829,0,0,baceae2e87b9c4b6697075d910bfce042bad89e889f8ed957911e0763d7f587d,2024-09-16T18:03:16.707000 CVE-2024-2183,0,0,b1a8bdb0521ceaa401c4ef49664ed1eca0fdb532f6e98da751ce529fa93d2e00,2024-04-10T13:23:38.787000 CVE-2024-21831,0,0,9403a3b9e0cc57695dbc8303d38fe710d2e07914a8ff134cb0d06a991e5fb5bc,2024-07-03T01:46:51.433000 @@ -245065,7 +245065,7 @@ CVE-2024-22017,0,0,bd2434479505f25ba61ded39e252a137caec1b8140356d38e69aae2c52d44 CVE-2024-22018,0,0,4fae4a09ff6c97462c219a17730a6b02641ce527ea4e228be02726c5015758d3,2024-07-19T14:15:05.763000 CVE-2024-22019,0,0,5ea5d0f669fc75d99f03776806b9fffc572153dc1c8ef34725dc8bf55b3cedce,2024-05-01T18:15:13.800000 CVE-2024-2202,0,0,07ee8ffdc3e2c6571649a2da17705092fde8ccafb25f9e28d35a275c632c563a,2024-03-25T01:51:01.223000 -CVE-2024-22020,0,0,debd2a01716784fdc798c1002cfd1de2c7ec7af620c6ad131da757aceaba0623,2024-07-19T14:15:05.863000 +CVE-2024-22020,0,1,b8b8fb44696fc1f3b47b955eac0aff79a4a0b20e8a4ef5f07ba12dfc66d0b5d4,2024-10-25T18:35:03.697000 CVE-2024-22021,0,0,638048027337936cbd408ce99df3409e0af8fc4be0132d034339cad92c33270d,2024-02-29T01:44:04.690000 CVE-2024-22022,0,0,520151bf342f8e1b6d0df34d3bdc80dc16c1dfc15f7f487e84d9dadfaf67b99c,2024-02-15T18:45:30.887000 CVE-2024-22023,0,0,11d74a9331c831e739405cc0841308e5bee17f7f9ac670af4c4e9f14b6af019b,2024-10-03T22:35:01.533000 @@ -245627,7 +245627,7 @@ CVE-2024-22851,0,0,bca50b43839bb5a9440c8cbeb408fd89f180d58427aad27d09e9a965c6eb8 CVE-2024-22852,0,0,8ae9b682c67cb845884ddd035899d91b91d18dec5a1d45bf6dc8c5eb275039b7,2024-02-13T18:16:51.790000 CVE-2024-22853,0,0,bc89e715c02ccddcdd7224ca8b312fb06ea03063bc4da2eba5ae6389033cf42c,2024-02-12T17:50:31.950000 CVE-2024-22854,0,0,fe4766229122c652e0af3232fbea71e93fb7b09fb4336c021b2a5471e8b1a0a8,2024-08-16T18:35:04.633000 -CVE-2024-22855,0,0,978cea221cbe34e7be3e94946577d6e11833682bc78df01e6099f3765bab7431,2024-07-22T20:12:59.693000 +CVE-2024-22855,0,1,8ee1e01d04ee73e5ce31c7f7bbb3f977167c1250df872de067e1d7cdf4762aa8,2024-10-25T18:41:33.187000 CVE-2024-22856,0,0,6a3f29bbeb760b1b5f19c8ae7d193c6384c770b41fcb22b793b9dc616df88d1a,2024-07-03T01:47:29.290000 CVE-2024-22857,0,0,90837a66d9e6be33e61afe64f3e09fe9073b2ba728f4bd27a877f40b8e8bec96,2024-08-27T20:35:09.263000 CVE-2024-22859,0,0,c789fd1319ae29200cfda38411ba15b951620161f2106b97557558350eee1281,2024-08-01T23:15:38.057000 @@ -246240,7 +246240,7 @@ CVE-2024-23705,0,0,ead7fe198af09437794c6077c888124fa1580ba6ce0d00067776236205768 CVE-2024-23706,0,0,babe5ff56a1d4a28f81247fdfc7205f6cd9fa2ddbe2826f5bdf18ddb36d0d2f0,2024-07-03T01:48:01.407000 CVE-2024-23707,0,0,de06c54b01b50c7ee8eaf57e83c8e50f0519388a760daadedf65fa62d4cccb8c,2024-07-03T01:48:02.287000 CVE-2024-23708,0,0,4d59e4f4929ae2353651e29b21457a04e0165e60511aebb470f63de6c6b68d06,2024-07-03T01:48:03.097000 -CVE-2024-23709,0,0,dc400007ea16188eacfc9466b22ae75237bff556adf9f34ba5e4a0201918c134,2024-07-03T01:48:03.920000 +CVE-2024-23709,0,1,6083bf0f0d1ceb0cc50a3d0ad67764af70d38b4988ab6d8b3fcba635f794c892,2024-10-25T19:35:04.277000 CVE-2024-2371,0,0,c0989400ce8a0213fb359b764ed40ca0a5e234cbe2249418689e4cdb3beac647,2024-03-12T12:40:13.500000 CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582caf9,2024-07-03T01:48:04.733000 CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000 @@ -246288,7 +246288,7 @@ CVE-2024-23762,0,0,dccea0d0f4f72e935db3cd4738ae0afc7e81200fb78885cb904f8f8d8505b CVE-2024-23763,0,0,fd6bb7068b643be895795866753868b545c9ff02dc3b3575d3900d3b7ddc29be,2024-02-15T04:49:47.153000 CVE-2024-23764,0,0,e6776799806671e89b40fb29cea011f49ce6380839da8b1fc02e631b1db62327,2024-02-15T17:57:25.633000 CVE-2024-23765,0,0,06c410fc3cf16eeddff78c760088188768ab51319095babe2779c4b543e1454d,2024-06-27T12:47:19.847000 -CVE-2024-23766,0,0,745046bc01c8fb779d22eb65856beb7240cd099e103c65a0cc993dacce583ed7,2024-07-03T01:48:06.303000 +CVE-2024-23766,0,1,5f5a0ec5e5d0bbb4ae98974aaf53d329daaf5cd414e4b4f2a2a0e897689a4b74,2024-10-25T18:35:03.847000 CVE-2024-23767,0,0,6f43d09d7d5e03bec0de213ab6d6435f3d55689189694bafd3c00cc2823ce4ac,2024-07-11T15:05:27.593000 CVE-2024-23768,0,0,cfab380f6caada116bf310137e7bf68190f1658747da2207737dea42a2db4a9c,2024-01-26T19:15:05.400000 CVE-2024-23769,0,0,dda5f503e252df13be658288b8df8a7c295023d6b8d6a36e330610bd6bb10025,2024-02-15T15:40:20.690000 @@ -249881,7 +249881,7 @@ CVE-2024-28798,0,0,a6356458c4f4311bbbb434bcb07b82d4a8232904c746806c3a615b0a52481 CVE-2024-28799,0,0,7b5116d22118620746e99fb01d2c120abfeb878a1b857004ae9b1cd3fd81fff2,2024-09-21T10:15:05.253000 CVE-2024-2880,0,0,c617aabe27a476530f11dd1aff9d0e70b8bc9314c3647a1cac79a81958f4d9d1,2024-07-12T16:55:30.137000 CVE-2024-28804,0,0,f7e3d6c3e14215e831a96b931ea15f5f72cb16cc7bfabd09d8b34530beca586f,2024-08-01T13:49:18.607000 -CVE-2024-28805,0,0,57ffe0c5396b469d1d6aea3771a149218b95fafbad9b52c6f522fc5113787118,2024-08-01T13:49:19.450000 +CVE-2024-28805,0,1,cb27f95e8662e6f56b138761747243a7826d2330470c48886448473bebd0bb3c,2024-10-25T18:35:04.053000 CVE-2024-28806,0,0,b0870c92c612bc52e55ac5da958c74e320d7e205346206836a7ae598363f9d27,2024-08-05T11:35:01.757000 CVE-2024-28807,0,0,5a4650d9d919dd00d60ada425df7221ee51ecb76af44fdd9eca355c706e3553b,2024-10-04T13:51:25.567000 CVE-2024-28808,0,0,e2707d0256028ba4fdef94248719fe3b54bec857fab5ab8ef9c9d36dc0c8edcd,2024-10-04T13:51:25.567000 @@ -249895,7 +249895,7 @@ CVE-2024-28815,0,0,a66a592511ffd5b563fa083295811494fe79ce7c34bc79ae02ae7f38cd9af CVE-2024-28816,0,0,75a949219f8a896ffef945213a1610d3de2a2cf64da977b1d4287b567e2864da,2024-09-06T17:35:06.960000 CVE-2024-28818,0,0,553ea080520e3ef7d7c194b1130a084d77d8e937a2b2bb8942609e2870cc98f5,2024-06-27T16:43:48.633000 CVE-2024-2882,0,0,ac3db032a55af245aeee4f2522d2c10c01bd50b8ed58cf00aeea2dd39d0cf75d,2024-06-27T19:25:12.067000 -CVE-2024-28820,0,0,095fd29e11db669f6714a4a5dc4339712d67abbd0b3541df2a561e8f599caac0,2024-07-03T01:51:51.323000 +CVE-2024-28820,0,1,0570fa594a35dba860ba454a62deb89787849f22b04a2bbfc96e6ee6293fe6a9,2024-10-25T18:35:04.300000 CVE-2024-28823,0,0,637bac634141463600503c91e4b5796abd8273b1efd793dd400cf02a2e3fa972,2024-03-11T12:47:42.653000 CVE-2024-28824,0,0,eef4aea08ae10a65f9268e3694b2e67d70c352841b8880eff507640248495160,2024-03-22T12:45:36.130000 CVE-2024-28825,0,0,2060c8862968982d4a6159b0b62313dec95ecc020293b85f137ce41396383f90,2024-04-24T13:39:42.883000 @@ -250851,11 +250851,11 @@ CVE-2024-30135,0,0,434c5499719264a4e2ad07af1f36d8ed1af6151b19467e0009865806919ae CVE-2024-3014,0,0,c46983235075ad6c61a858c21d5be28ec226124df8363686d4a4d1cade05d3fc,2024-05-17T02:39:40.800000 CVE-2024-3015,0,0,cf3ef36018f814f81d7c4b278b721ac941c52c0f1c0bedc65491406707b51ee6,2024-05-17T02:39:40.887000 CVE-2024-30156,0,0,3d53855c757ad6b4fdec1c866bc6a474f7a081008c29fdfc2556616a5702f89d,2024-03-25T01:51:01.223000 -CVE-2024-30157,0,1,03c40ae2d6bb5fbe19cdcb81ee9473f77e02194f7cb98d03508973afcb5f65ab,2024-10-25T16:29:11.307000 -CVE-2024-30158,0,1,1234308b996a92cbaf899b21ed405616cb44f1f3637c58c6a67ec8b7390e221e,2024-10-25T16:30:09.927000 -CVE-2024-30159,0,1,c2f69c82c310c4c7d423021fb3a365e7918cd3a612018ed272a3cf1ea353956c,2024-10-25T16:30:47.127000 +CVE-2024-30157,0,0,03c40ae2d6bb5fbe19cdcb81ee9473f77e02194f7cb98d03508973afcb5f65ab,2024-10-25T16:29:11.307000 +CVE-2024-30158,0,0,1234308b996a92cbaf899b21ed405616cb44f1f3637c58c6a67ec8b7390e221e,2024-10-25T16:30:09.927000 +CVE-2024-30159,0,0,c2f69c82c310c4c7d423021fb3a365e7918cd3a612018ed272a3cf1ea353956c,2024-10-25T16:30:47.127000 CVE-2024-3016,0,0,365b1d8bd40146c56247f165cad66ba9032ab62d7024128ecd437112ab8f9af3,2024-08-22T15:35:08.600000 -CVE-2024-30160,0,1,a5cbd8b397241e2bf3153583f5284054bbcdf44919115ac1136f24883a861194,2024-10-25T16:30:53.613000 +CVE-2024-30160,0,0,a5cbd8b397241e2bf3153583f5284054bbcdf44919115ac1136f24883a861194,2024-10-25T16:30:53.613000 CVE-2024-30161,0,0,1923ba0ba6f178ce866a1a8ca8f64984391bfd8920138b4d8c36e03ff657287b,2024-04-11T14:15:12.083000 CVE-2024-30162,0,0,bfc1b2dd1f9f0516f5fde509ec8f6b937e3d3043c9b38e8e614a15ddc80d79a3,2024-07-03T01:53:51.970000 CVE-2024-30163,0,0,a73a629b03deb6cd2f20f667428a8c95efd54363034c035eeeed31541b8e07f7,2024-08-08T21:25:19.010000 @@ -251432,7 +251432,7 @@ CVE-2024-3087,0,0,69d2e87c7c87bdc5c6a0aa1788aa50fe5b44316fc88ba1cd34f51a4a48534d CVE-2024-30870,0,0,30e1e140bee6b30095d3a05cd84fe8f82c3aa6e140f2eb4d0b7d811e3ca16636,2024-08-16T19:35:10.750000 CVE-2024-30871,0,0,a922b83af83720bdaf0bdaf6a8fbbd91cfae311a46841e866add85841910b19e,2024-08-19T17:35:14.410000 CVE-2024-30872,0,0,f4c68436231336d4dfed85be3bb02cc34ef76405f018ff6a0b0b786c7062708e,2024-04-01T15:53:18.060000 -CVE-2024-30875,0,1,1cda1f7e96707733b42fb351c9353bb46bc4382d5324d37a18f42fe89fb4a47a,2024-10-25T16:15:09.693000 +CVE-2024-30875,0,0,1cda1f7e96707733b42fb351c9353bb46bc4382d5324d37a18f42fe89fb4a47a,2024-10-25T16:15:09.693000 CVE-2024-30878,0,0,21b1e9cb6e80d2eff229006b5f8418d6d6360e70820dbf7044b36f5f56cc5c12,2024-07-09T16:22:30.387000 CVE-2024-30879,0,0,1301a0d53d8ce6102d32b653bb55ca8eae261084329d07814fddadd6bf631c71,2024-04-11T12:47:44.137000 CVE-2024-3088,0,0,8c7469f878ec7cd8b5c24cda6fed51b2dd10606a6076102ea910b62b21ab4a7c,2024-08-27T18:35:09.493000 @@ -251778,7 +251778,7 @@ CVE-2024-31325,0,0,a9bcdbd792a6ed8c686901e49872aa0bea6152484f11f86c22b43dfd437d3 CVE-2024-31326,0,0,97d123c2aa1e1e9a7489aadcba3a4341ca3ee3d2d31afc6659975d4411771d64,2024-08-19T16:35:12.080000 CVE-2024-31327,0,0,6cb945d11f8664a0277f1157bd8eac8d374886bfe8f127c66f41c26468520cf9,2024-07-11T15:05:41.523000 CVE-2024-3133,0,0,a5199a1ff93b7f0b9b2c8f7c4014dbfb416c9e59a9d9caab3f26a064ce40a24e,2024-06-07T19:15:24.213000 -CVE-2024-31331,0,0,d63ee06c884fadbebb4e0ffd30f7de42c6d5483b78b8ccdaba35e5ffeb309e42,2024-07-12T16:11:33.867000 +CVE-2024-31331,0,1,1e74e89a9634cca12a894d6fde78d348f2e1f0a48ba44578aea7a1fe82acc729,2024-10-25T18:35:04.490000 CVE-2024-31332,0,0,fe533958eb1f5014a983744e26d4dc56008592fb4b2dc96ebd425a317d9ee5f4,2024-07-11T15:05:41.733000 CVE-2024-31333,0,0,fffa52c47c5b8e1c2bcdc9fe3c080f43dd069e7ef7813f142892cae434fbd8ff,2024-08-19T13:00:23.117000 CVE-2024-31334,0,0,69828e729ce39e0f18173fda19e01cf9f4d39333d7345a58dacf94a302bbacd6,2024-07-11T15:05:41.960000 @@ -253205,7 +253205,7 @@ CVE-2024-3337,0,0,61d2bfcc2d7fd47838831dec2e0c7db020f3b69cc3626c76d24aae7640ac48 CVE-2024-33371,0,0,e62923a0247293e9f796432d7299bfd32c3f9d7f0037d1c3b023058b5d67d80f,2024-08-01T13:51:54.193000 CVE-2024-33373,0,0,1310aa8488d26ba93bc57409318880dd75ff8c9ca32bcabb44ee33f3844ee015,2024-06-17T18:15:15.920000 CVE-2024-33374,0,0,243e9f210ed37aee6e82391955d78875fcc399a2a4a1c88574efbf4fc6f1f077,2024-07-03T01:57:58.047000 -CVE-2024-33375,0,0,5d7df8240369da1ea82d816f49a8798a22ce4828b4c1dbb3062e5d8eb520b928,2024-08-01T13:51:54.967000 +CVE-2024-33375,0,1,de8e1352d7131bede7a3e7df21528b3c50d741bdac0f3347d0114838c7b14af2,2024-10-25T19:35:05.053000 CVE-2024-33377,0,0,5c66eca70fd229829a7599a954669068b1cb2c9f37ae66f1e849ed753dd8febc,2024-09-06T17:35:09.517000 CVE-2024-3338,0,0,b2327c11e1d762220f8764f83498076a393d83520a65cf1a3ec9854d72e0d01a,2024-05-02T18:00:37.360000 CVE-2024-33382,0,0,dc1b896c815bbb6d05d98ce7170409486d331681fef4f2caee5818b69d11fbd6,2024-05-09T13:05:45.620000 @@ -253480,7 +253480,7 @@ CVE-2024-33774,0,0,6f292020d7adae9637fe533dad1837a596af7348622d3ee140dd37eaf1c8c CVE-2024-33775,0,0,7ea36af513c1579a89db448065ac36bc3c10f0e65b879ce7520d408ffbf766c8,2024-07-03T01:58:43.587000 CVE-2024-3378,0,0,8befaa6be8f3b8c8430cad46a1e49c322e7c667fd428df502463d5be35761acf,2024-06-06T19:43:40.377000 CVE-2024-33780,0,0,c16faa38fa2e3cb315427d6e5330ce2610c63349f4a81ec54bc650473e873a60,2024-07-03T01:58:44.400000 -CVE-2024-33781,0,0,f92b3d1e80a012680436fd49e5bab657fd2a9b945e08254832c1c45257ab0ec0,2024-07-03T01:58:45.220000 +CVE-2024-33781,0,1,f25247eaf0d169b3289142514410c6853680fdc2b7e71bcacdd07bcc75733002,2024-10-25T19:35:05.260000 CVE-2024-33782,0,0,d54261586afd08a5185da8c98a333efe96e77b0a86120ba9d5a8acb87e82f8b3,2024-07-03T01:58:46.057000 CVE-2024-33783,0,0,ab3a37415f38062c8c0433a787e71d9de7161e1a21f1c7c7424bb11f9e8ff724,2024-07-03T01:58:46.247000 CVE-2024-33786,0,0,4c34eaaeb6404bd11728362ca0ccaf1f06d8896bfaa0a8e30f5a7055f9db9f9d,2024-08-01T13:52:06.273000 @@ -253876,7 +253876,7 @@ CVE-2024-34313,0,0,5e7685d85b9be01539c2df2509259cab02217b4b071e1347f30175d5b9d70 CVE-2024-34314,0,0,229621e4389765698bde4ee87838cb1f181d4467573c64759d3cb34848f22f9d,2024-05-07T20:07:58.737000 CVE-2024-34315,0,0,2da9a3f01679d1f45f0bab05fdfd699ff25c9ffa82f02a145c0a3654a4071435,2024-07-03T01:59:52.883000 CVE-2024-3432,0,0,e551b49681f8859ae36cb659ecb1c23b498009c34da11d9120924e791a83c404,2024-05-17T02:39:55.693000 -CVE-2024-34329,0,0,5172a316043ee9e75055b2f826441189fde5eb6a90f1810a0be2672c1d7dbfd2,2024-08-01T13:52:19.990000 +CVE-2024-34329,0,1,41a7f5395746b238b78024ca151752d8fbac15716c701f047eb67a43590b2636,2024-10-25T18:35:04.677000 CVE-2024-3433,0,0,edcd29ee74449d6852e66c4b5448756dccce5e71a9bad9a5025cf08aebadb09b,2024-05-17T02:39:55.780000 CVE-2024-34331,0,0,e9e9c5dfb1f97d7d959d603e7ca8311b7235683652ebe96931c8c00fed413160,2024-09-26T13:32:55.343000 CVE-2024-34332,0,0,8f6c683335644bc93205234e59c96ea37a2e6389fa2dea8d8666173975a538e9,2024-07-03T01:59:53.650000 @@ -254239,7 +254239,7 @@ CVE-2024-34720,0,0,d5f9e320876749ef63f3ae3fd855102efef7812668f3ea77cca5b86835b0f CVE-2024-34721,0,0,f71307059aeed2acc9a5b096fe278629e1ab4f96dc0c7de77c8899892fd1b7e5,2024-07-11T13:05:54.930000 CVE-2024-34722,0,0,cf8aa681488fcb61e6053338c1005fbdb8a07b1c3e2be30881c9597f7f06ab3b,2024-07-12T16:11:37.803000 CVE-2024-34723,0,0,9ee1e9ea0079333d8123e1479d0c1b548d28a892d3601137f6e64ded9880a7ff,2024-07-12T16:11:38.633000 -CVE-2024-34724,0,0,0452aa45e04971f6e547ee694d42ca35f85625c1031b931eba0ca8059efefaef,2024-07-12T16:11:39.470000 +CVE-2024-34724,0,1,913fd057cda1c7d4c484876a49aa72529e900891c98a4a2d61e29b59d94441ca,2024-10-25T18:35:04.870000 CVE-2024-34725,0,0,71c51510eb6c519ede5c0bd5b935ecb821799239014d1b6c0035512d0bff6cbf,2024-08-01T13:52:25.887000 CVE-2024-34726,0,0,148667699b7fd62da52cb8a62c1c3c6fd756ca900c40298f1823e1d94f76998b,2024-07-11T15:05:45.340000 CVE-2024-34727,0,0,75befb2ba24a3b4b3047b7cd5fae93e6c869e1a4a8df4db9070d6b118a79dd7b,2024-09-11T12:43:45.260000 @@ -254586,7 +254586,7 @@ CVE-2024-35304,0,0,6034918ad52f93d1da2bc26a38d2a41af1cec6e4b2633afd9a4c11faed3e6 CVE-2024-35305,0,0,e31f5a2153df0748351b63d3b29145f978c7628ebc2659ea3282a1f078dca5e0,2024-06-10T18:06:22.600000 CVE-2024-35306,0,0,ad90645c7ad3fc3d00a11af0348fe264fd3520d218ef28c934a8abfa42cbedb9,2024-06-10T18:06:22.600000 CVE-2024-35307,0,0,b73247d3e5b323866c011ccf7e1f39f41293535811b1ef82260b19c7e0a4c21f,2024-06-10T18:06:22.600000 -CVE-2024-35308,0,0,79e7327977df0aea45e2e6e1fe499b2de02adb1ea26d766fd37180400d1b0cfe,2024-10-23T15:12:34.673000 +CVE-2024-35308,0,1,6321cc28d6dd78c933cd913b6aa72a191bb42ebafe4f0197b96f22ae54b8e1a2,2024-10-25T19:06:14.100000 CVE-2024-3531,0,0,a342a9958ba8d00c279b1676525284c1cab302a477225f05f9d97b5deb071134,2024-05-17T02:39:59.430000 CVE-2024-35311,0,0,94751a7e140c2a3ff83ee374530e5919b0823edf97b2e344646a9709229c503b,2024-05-29T19:50:25.303000 CVE-2024-35312,0,0,81ee7e5cffa0828718ff42985b5f71e3223019ea36fce71fb3a2d6856e31b3e3,2024-05-20T13:00:34.807000 @@ -255172,7 +255172,7 @@ CVE-2024-36033,0,0,8911dfc666d23e1c126e3abba0a30a2fed5f5b6caff101c24ce4eb4be9e3d CVE-2024-36034,0,0,4c959fcfa233ae27a9c3f47b39a3f7ddc9a28a9c57a26789bd7acdd84b3e47d4,2024-08-16T20:21:06.120000 CVE-2024-36035,0,0,3fdb254cbf2b10e7d511633eed06bbb7c03953c8f2eb713a72f26b7556cced7e,2024-08-16T20:23:29.943000 CVE-2024-36036,0,0,7da0ef0412625002a493959e0f4b9d5a2d61be8a7aa9a2a45b491bb215f046f7,2024-05-28T12:39:28.377000 -CVE-2024-36037,0,0,f0155f25f53452aadad745932abbc5146f9299ef5a143d0b20572ef3287fefe1,2024-10-07T20:15:05.720000 +CVE-2024-36037,0,1,38e293cc8c09dc94fd987a33e5a092088fcec9402eddbf56938ce37dd2a7c640,2024-10-25T19:35:06.023000 CVE-2024-36038,0,0,ed3921618390576c9219c98f6a3f7baf8a0d13ec50c49da12a34a4e745352466,2024-06-24T12:57:36.513000 CVE-2024-36039,0,0,d5f6bc43648106f8c0710f8301f59ed0f37eac1af0c9c7b161995113609db70a,2024-06-24T07:15:15.230000 CVE-2024-3604,0,0,2f82d9621c7da51111c7599a59e672098e964c892eb2588f225c0e98c5e45cbd,2024-08-01T17:39:33.907000 @@ -255545,9 +255545,9 @@ CVE-2024-36537,0,0,5f930f9ed55795838127e0e3777c1d69912524f2615f541a92461ae3dca81 CVE-2024-36538,0,0,2c2f89c6add65eaa7fe73370f2b6ea6e66fa3976602a2c3fae08fdc086d59130,2024-08-01T13:53:02.957000 CVE-2024-36539,0,0,4a0be599c84b4fdc4a373e9fea743448da6ea5dfc7c56ce644077bbc1d54be9e,2024-08-01T13:53:03.723000 CVE-2024-3654,0,0,a7708e7e436d988a91abde36ee9f26c2df705dde9b78c457b8712b905cf4dc6a,2024-04-19T16:19:49.043000 -CVE-2024-36540,0,0,3e3503c7f79b3195337d8b0f1e38320534b7157865481ac23c232b4e96a5cb95,2024-08-01T13:53:04.590000 +CVE-2024-36540,0,1,de534e526837cb522fb82cf562565010fe73cf9fd1bef920aea8b6c454f1800b,2024-10-25T18:35:05.643000 CVE-2024-36541,0,0,b5291ecad28b9af4ed1704c2ed0f9af422de7d38da1fbc69723e312c6c52ab9c,2024-08-01T13:53:05.347000 -CVE-2024-36542,0,0,4df09cc2abdf3caca422217226bc2f709ae2db68bdb5b96a0a920b5965caf0bc,2024-08-01T13:53:06.130000 +CVE-2024-36542,0,1,dc63b890116e2af8ac1d66c7a9bd57fd6a0a3a86d9dc76224890314ebd97a04e,2024-10-25T18:35:05.827000 CVE-2024-36543,0,0,dbb1c819537d5d2e6ccb57b6fa0d1307530721c713dab080cb8c7f78417a5f63,2024-07-03T02:03:16.430000 CVE-2024-36547,0,0,1b4cc0318f47a7d1f45dacca15d9b24343df7af637add62667d3afc6feef36f0,2024-08-19T17:35:18.467000 CVE-2024-36548,0,0,e144d04945e12f1b5c400dc40c85f1ddfbf9c8356b7dd5897c3f62cd196828a6,2024-08-19T16:35:18.257000 @@ -256022,7 +256022,7 @@ CVE-2024-37283,0,0,07a52ca714a9a80e3a78bead6f35fc6d30e576ab4ba6daa4bcb81e93f175a CVE-2024-37286,0,0,6382030145a65eaac3e6c890da740dca7c4a6af69dff82fb27db89389bebb54f,2024-09-11T20:20:34.503000 CVE-2024-37287,0,0,a9d3453fb1c9fe3cd5af0cb7ff0109d98a345ff76f4539de093f05db9c477ffa,2024-08-22T13:33:12.477000 CVE-2024-37288,0,0,665135dee06da174ac43bb1366ac01932e76fc67d054a27a8125a1a355fb458d,2024-09-16T13:29:06.023000 -CVE-2024-37289,0,0,2976747a57097020fbcd1f162347209565208622cbfbb8b77b0b7237b06e86b8,2024-07-03T02:04:12.080000 +CVE-2024-37289,0,1,c2aed8b5e160df798b39cb68c5926e3d1a79953e1858659f2c8710785015aa57,2024-10-25T19:35:06.150000 CVE-2024-3729,0,0,3415ccd7b93278c163a46fc8f742b8dd4fa5f770790b8aa49be2a2c1ba3b0c85,2024-05-02T18:00:37.360000 CVE-2024-37293,0,0,b38c9bef2ce8854b8f0a9c288c7acec55e60fa5af9100539279c24f2cbecf35c,2024-08-16T16:11:53.287000 CVE-2024-37294,0,0,b35339309cfb6110892ba6e3580c3b860149dc89948cc54efd20172fbcf6cac8,2024-06-13T18:36:45.417000 @@ -256241,7 +256241,7 @@ CVE-2024-37565,0,0,e464b9f5d1b6751d8f05b2f30904029569bd814d202d52a27f0ddb9877153 CVE-2024-37568,0,0,f2cf556c58317250bc2c2e32d55d7d2250f892a6ccdb5a364803d78d5a6c2fd9,2024-08-15T16:35:12.900000 CVE-2024-37569,0,0,d72ceb83b037eeec35f3e81abfdf503a49618e4aba004fb3f45e6970df347f2e,2024-07-03T02:04:20.517000 CVE-2024-3757,0,0,d3e75f8205a45aeb6c1cb5b9efd4d99998e027f23a100dabf40ce218744ea3e8,2024-05-07T13:39:32.710000 -CVE-2024-37570,0,0,c193fee7dc1a9f16da69c8e0950cd823d6e1aa62ce8d8888b2d1531f1f227667,2024-08-01T13:53:45.687000 +CVE-2024-37570,0,1,3d4360fa9467e8eab1b52b173ed2069d0c82ea4d63ef454bbfc16c6908108d82,2024-10-25T19:35:06.277000 CVE-2024-37571,0,0,67e7b2412f8af956bea28aab4c57aae5f7e196be8f9b19162aa5c75b5cf90c89,2024-06-27T12:47:19.847000 CVE-2024-3758,0,0,9133e9ab6c91a5523f7a6c3075b39d739f115990ca9d090ea03db032b6c7f7e8,2024-05-07T13:39:32.710000 CVE-2024-3759,0,0,228c14dd97b4dcf6507c1901dec59f930e3b9b578ef9455bb0b7881e5199f2f8,2024-05-07T13:39:32.710000 @@ -256261,7 +256261,7 @@ CVE-2024-37630,0,0,b73fafa23f6f8f8d3f613797e56521f00b8303c2808cdb99d411fdd5c8f71 CVE-2024-37631,0,0,a5cd8ddcd7ce699acdac9f3f2fda8f6d11cc509e6dadfd80153c488cb1c74926,2024-07-03T02:04:24.127000 CVE-2024-37632,0,0,d01b52b8e66490156eb3a16ca33b4814211737a83815b462a53e59e26de8e387,2024-08-07T16:43:37.570000 CVE-2024-37633,0,0,99956c5373735a5feafab5f8f91db462df7c04d480ce88e052b279d716c258f7,2024-07-03T02:04:24.930000 -CVE-2024-37634,0,0,6e16f0f95dfcf255097e7dd652ce7848499c89be47e371aaa754251b1b9e9021,2024-07-03T02:04:25.770000 +CVE-2024-37634,0,1,4081cc7ab580a9299c7ffef215ba137926eeb6d1f981e2078cdbabf89132ed38,2024-10-25T19:35:07.043000 CVE-2024-37635,0,0,bc407e83f05b7c8f9bd8802eae4a82a8e6966063def27bcc1e49acc27f521f01,2024-08-13T15:35:11.883000 CVE-2024-37637,0,0,4382c3c11477cb9c0c98c6b36d4d6a080861c8e7a12e5a542c24ab931706be1f,2024-07-03T02:04:26.567000 CVE-2024-37639,0,0,faac05558a999374b477194ccded752579ad2da62ef52225a1808c93fa007076,2024-07-03T02:04:27.370000 @@ -256275,7 +256275,7 @@ CVE-2024-37645,0,0,34d8cced57780441610f62d6af434c6d9470f47af1755e23758fa357fcc20 CVE-2024-3765,0,0,c051b63b3dec9d4081d844e4544651061bce58c568511d432e52d12af5fb8047,2024-05-17T02:40:06.923000 CVE-2024-37654,0,0,7407bd364d22c8dcd819097303b9dde5a80019ad44dcc6e140b90521c8753ce7,2024-06-24T12:57:36.513000 CVE-2024-3766,0,0,0b2c4eb9631c7021b81225c2fb00e637faa5f43f79bca7f1f91ab6ad96dfad12,2024-06-20T16:15:14.380000 -CVE-2024-37661,0,0,6db168d2f3ae431d826f69a05b16f3210dc133b79cd809abcdc976904db6eec2,2024-07-03T02:04:33.177000 +CVE-2024-37661,0,1,c74e63bb441fb8171e408570fea34647bbe045e761d33fb25f185e1128ad10b0,2024-10-25T19:35:07.220000 CVE-2024-37662,0,0,bb6f8e7d075ce8cc2661f5a874a4a5a881cd67a10164dc149927e6fe92640579,2024-08-14T14:35:29.050000 CVE-2024-37663,0,0,01b3999a296dc990f7de7601c48f66af39da90c049c2b0eec4443d6e5080ce32,2024-08-01T13:54:09.780000 CVE-2024-37664,0,0,262d89efd9586f8d9685582ca4f4936d4d0dff4dc96c611162b38556aa6e87b4,2024-08-01T13:54:10.727000 @@ -256346,6 +256346,10 @@ CVE-2024-37831,0,0,84d591b6c62e8531ddd444b16a032f0bcaaa039fd0dd2bdc2becb030b994a CVE-2024-3784,0,0,f0c80c77a0788aa17bf80578f54749ae490fe23c5161f7f9c165d9871caa60a2,2024-04-15T19:12:25.887000 CVE-2024-37840,0,0,1ea05f0cae39cea91919dabf259bc43d4d53a339aa6352e9633c1155c24e02e9,2024-07-03T02:04:49.190000 CVE-2024-37843,0,0,b2b97625cfd8538b070daf88e20efea752488fb698343ba1b69e8a5a31a226a9,2024-08-01T13:54:21.843000 +CVE-2024-37844,1,1,496b512bef97f12eeb3644f6875825f2babb3858bb5fa5b7bffaf9db215b4234,2024-10-25T19:15:03.897000 +CVE-2024-37845,1,1,e98c32bfb9d88e11b762acb88da42827a928d6fa1e210271b9fe28c035c83b61,2024-10-25T19:15:03.973000 +CVE-2024-37846,1,1,0df8407e8fb222721efdef46d431e9c16574ef2c1695bc50f4ed6a17403d40ae,2024-10-25T19:15:04.027000 +CVE-2024-37847,1,1,3e1a8bc941b9a408ca7d14276a75304e177fbf7e2a356cc57572be4e1f77546e,2024-10-25T19:15:04.087000 CVE-2024-37848,0,0,b9654691620e5501baad2d1771338ac2aedaf89f42fcedfa6b269a2de242ad76,2024-07-03T02:04:49.977000 CVE-2024-37849,0,0,7a15b5118e0a895a8306b103c51dd029b756d9600db3bef6c7132e3f601ee351,2024-08-15T15:35:11.593000 CVE-2024-3785,0,0,e84209989b24c941d7c6f3eae4d5a1283a6975747744d670fcd7c761c7276a68,2024-04-15T19:12:25.887000 @@ -256984,7 +256988,7 @@ CVE-2024-38572,0,0,51daba4ae3afcf7c5fe55b093c1a3f72e1a3bceba37dea337e218e2c66da7 CVE-2024-38573,0,0,ca8898dfb11b5dd535a57345209c5053ecbd565ef57ea10dbb17683dd19ec64e,2024-07-03T02:05:13.393000 CVE-2024-38574,0,0,6afdc30adbe5999044de1cc76d2cc76289f74910e8879e6f74197c6ff1a2b954,2024-06-20T12:44:01.637000 CVE-2024-38575,0,0,2bb1d17f38c40f1a364165b77b7ca5fceadcc7cb4b05f83746adb6eb31d29aa9,2024-06-20T12:44:01.637000 -CVE-2024-38576,0,0,2236920d60064e661a944c733eb2e7966e7c6fdf3b15109d7e99a4086a362b36,2024-07-03T02:05:14.340000 +CVE-2024-38576,0,1,477d4b02867a8a6171e5c0098a90e5077b46001fce931cc0647d4f2611054e40,2024-10-25T19:35:07.410000 CVE-2024-38577,0,0,1efc1e7397f24359bd6439871f08b63ff432bc413f747234aacf9ee77a51c8fb,2024-09-12T12:15:47.620000 CVE-2024-38578,0,0,59aca8de5dbd59caa444dd7e2a1cba02589d14b7e716ca8b1544730c92701d84,2024-07-15T07:15:10.620000 CVE-2024-38579,0,0,b473c1338d077f4b1eb5b907c1fe49edff8282b40b79f122f252878eded18e82,2024-07-15T07:15:10.703000 @@ -257205,7 +257209,7 @@ CVE-2024-3887,0,0,7992ee60f5f26d3f15d818db21e67277dbf02ae9d208c24a54e5c01935424c CVE-2024-38870,0,0,4167db09a3d5f0d1fb37f47670f8f4f5bc2492675561171c559ebd86c6b84b27,2024-07-18T12:28:43.707000 CVE-2024-38871,0,0,57edf361883e1d6a8acb97285bfd5cacdef0784f3b2cf35520ec84b56f0b6341,2024-09-11T15:29:50.230000 CVE-2024-38872,0,0,6a652d0f00754e6ed4c8f746ec78ed9435eea30377e39cffec01179ba6a9a283,2024-09-11T15:29:16.677000 -CVE-2024-38873,0,0,6889a908915a370dc32eb3b9351070cdb3a634a1b8f52aac6863c833e22f79b2,2024-07-03T02:05:21.267000 +CVE-2024-38873,0,1,e9e8d1dba6eafaf915ddebcc080a55b1cc67bf8a1cbc318ab456e405181b2bdc,2024-10-25T19:35:07.527000 CVE-2024-38874,0,0,1c1b28247d06b02b2f044fb942d8a6aa89aab3909bc7e48738a346b7a68e1cc9,2024-06-21T11:22:01.687000 CVE-2024-38875,0,0,d18c0c1f05faa02ef048ee622890d874b54f8d91a4409a82414c9856f7ccdec0,2024-07-12T16:11:48.453000 CVE-2024-38876,0,0,25480756813f020fa50f173d621e9d6fe38555b94130c33f850eba69c0fb613c,2024-09-17T14:45:04.577000 @@ -257231,9 +257235,9 @@ CVE-2024-38895,0,0,716e59d18f64015676dc141eff408f11adbd22a4a66efb34ed2b5a79bef7b CVE-2024-38896,0,0,e949d7f0d604812e0c7b71a22b8e4f3e31cd0c4c5e0e9ab86180bc45c3e0d030,2024-07-03T02:05:24.560000 CVE-2024-38897,0,0,d5624b84699009a260fe1a98237ae1687fc4d1ba5c6044d2e051c4d97cd50e55,2024-07-03T02:05:25.367000 CVE-2024-3890,0,0,e12639d0080d409836c0239fc937b27c8c64796cc206deb32f0595f7d19e1777,2024-04-26T12:58:17.720000 -CVE-2024-38902,0,0,ac988b882df018ca92e12c5877e77cfd875299a6f04c2e568bccd90f65b2e946,2024-07-03T02:05:26.170000 +CVE-2024-38902,0,1,1c3e99761119af86bfc08c133d200d98145139b24546fb36382532918e199885,2024-10-25T18:35:06 CVE-2024-38903,0,0,2b94b77610c8a043c9d0ea06696528fdc7d9d24aef31329270a0121bf4f56367,2024-07-03T02:05:26.943000 -CVE-2024-38909,0,0,f29175e3e286d20a69ae84e0dcf87435063b2a199fee90e548d4dde17b39c0f0,2024-08-01T13:55:08.623000 +CVE-2024-38909,0,1,f6a5b574aebed08039f44fd76bb05493334edfb3318746bc09e1f467a2df0529,2024-10-25T18:35:06.223000 CVE-2024-3891,0,0,f9d0b3848969a1acfea7b9a20331b02cfc9759078e69f46c5576c9e3267f4690,2024-05-02T18:00:37.360000 CVE-2024-3892,0,0,635a0a9dff99d68a800a0815fade3930f3dac436f84c87dcff7c11db25dc6686,2024-05-15T18:35:11.453000 CVE-2024-3893,0,0,8eb90c61219540666d23479f74a65575eaf5c1a0dbea88b697d9ac7cb634e024,2024-07-03T02:06:50.403000 @@ -257356,7 +257360,7 @@ CVE-2024-39210,0,0,a6968325552cf6cb6c7f302a071accd1facda0c07b9843340635e35e5b596 CVE-2024-39211,0,0,c9d7c4325bba0a2ec1ec1fe3daef35d056c7407899b9cbce0b5c58ab7122a0da,2024-08-22T19:35:34.747000 CVE-2024-3922,0,0,d93b594e75035330ffbe6c52b35218aa3c4c95531df86f73f7a2c93c08b19be8,2024-07-18T19:33:55.580000 CVE-2024-39220,0,0,cffdc7781bb5a48c8af1f6973408b621ad60d81fad4d0ce74cb4feeeca56b86d,2024-07-09T16:22:52.750000 -CVE-2024-39223,0,0,883c34699a9736998d96a24eca81d41004d2627c06ccc61484d0f3062b934079,2024-07-09T16:22:53.590000 +CVE-2024-39223,0,1,f54ba99b81aef6a1a473e3f0b32cd7be01aae3fd33418d38ef44eeff204ead38,2024-10-25T18:35:06.463000 CVE-2024-39225,0,0,967bd0a79163136bba6e3e394c24ab42a107f2cade4053bebd45ebbe7a971cdb,2024-08-15T16:15:19.317000 CVE-2024-39226,0,0,795af5d2bfe7e0b32f75745d1bcb51aae69a7d95811f3267e75c2594cf597057,2024-08-15T16:15:19.493000 CVE-2024-39227,0,0,9b9dd0fff6f6efe1b1b7968ed33a92edd9262d57a609d9726e0c0ac59c14becb,2024-08-15T16:15:19.650000 @@ -257372,7 +257376,7 @@ CVE-2024-39248,0,0,bd438370022685a4151ebf84eacd73dcdc5ba59d6ceb4a7e44b285f898cf5 CVE-2024-39249,0,0,55419fdc735f4b5d3c5b1e858306972036cffb58a6300e012da45bf6f04a8bc8,2024-08-26T15:35:13.893000 CVE-2024-3925,0,0,7eee90dddbc89d587d2add5ec583b68109d8e96ea070cac853f0344fab97474f,2024-06-13T18:36:09.010000 CVE-2024-39250,0,0,57928bd3b6fed5e7ca24bfa49026f1317017d625b7d77802180f56e1fd67fb2c,2024-08-01T13:55:47.607000 -CVE-2024-39251,0,0,9df7da1e1e27461254efbb4f14985199d1f5c3e4c1c9dbcd995558e03e5bb519,2024-07-11T15:06:10.633000 +CVE-2024-39251,0,1,64af2157392d57f79850089f97cd12b9961f6851a323e46fd70206b4bebea7d4,2024-10-25T18:35:07.280000 CVE-2024-3926,0,0,5b04461367e6759c792ebfb9ad8f25b57b29be658a49f3088676d8721c7c2f63,2024-05-22T18:59:20.240000 CVE-2024-3927,0,0,c053c5f2098184ebda7812ad9ad17f8e9bcb0fa48f3cf62ccbd3c0beff2bc975,2024-05-22T12:46:53.887000 CVE-2024-39274,0,0,6d4b03e5d97ff9e2231b9be6769126c78b619f16e46745a1adeaad7d24bf4316,2024-08-23T14:39:29.247000 @@ -258055,7 +258059,7 @@ CVE-2024-40486,0,0,4cd2f281e08f3291d37d3a4823af93070215d87d687ca41653f1c72ca427a CVE-2024-40487,0,0,41af7da83500c8a75e7df05fb6c9f48916ac5794006d346f5d5ff76e523c1408,2024-08-23T15:35:06.307000 CVE-2024-40488,0,0,935bd1c3b9e22ad2c8e572783ed910d0a85a3508107693b6f595be8805553bbf,2024-08-13T01:13:53.230000 CVE-2024-40492,0,0,887baeb8c822fbf96c83ae7c8317e551b9d380e125d5f646dfb0a8c0719647ab,2024-08-01T13:57:30.260000 -CVE-2024-40493,0,1,aaea0b22b1a9fd8ca62ceefb69cfb4d04acb9686bdbdbc9774da6bba4ba8925d,2024-10-25T17:01:22.433000 +CVE-2024-40493,0,0,aaea0b22b1a9fd8ca62ceefb69cfb4d04acb9686bdbdbc9774da6bba4ba8925d,2024-10-25T17:01:22.433000 CVE-2024-40494,0,0,48a84fe0e443f816c7deb1ffb2fa8d49462b96b77d70d281cb18dcbf2a2ebfcd,2024-10-23T17:35:05.100000 CVE-2024-40495,0,0,0c92b9527f5126e4b4bbf0d1f0a16c194305be9e806244080172bf727ded6b6a,2024-08-01T13:57:31.037000 CVE-2024-40498,0,0,5810ed5aa59e12db14c51ce30325d1c0d70a5c997d2111b8b796a66ebc036219,2024-08-06T16:30:24.547000 @@ -258715,7 +258719,7 @@ CVE-2024-4145,0,0,704254773246494130c81e0600984df247a970411736d475449e315ca595ee CVE-2024-41459,0,0,9640a7afe79b79343a3929c52d836dc236bb14f56157fc3a97eeb523f4182cdc,2024-08-01T13:58:42.827000 CVE-2024-4146,0,0,44d4e6fc76499583267ad9d2982965e0b01277c59cea588fc1c62cd739f32cf9,2024-08-30T16:15:09.813000 CVE-2024-41460,0,0,c083c888decef1f6a25386395c954e7130328fe40eb807fb48aeb706487a4b23,2024-08-01T13:58:43.920000 -CVE-2024-41461,0,0,29e4ea2e6c0449f9c564b466527c20a02d07c4c6d50d9f1be0a40101bb5592e5,2024-08-01T13:58:44.983000 +CVE-2024-41461,0,1,aae828816594ac85aaa8be9fd3dede24e13fe31d859c851e8cc5b1861ae37720,2024-10-25T18:35:07.473000 CVE-2024-41462,0,0,7dbe5aff525bed125a538ee4652d679dba96e46bb328711bc0224d78949e0a92,2024-08-01T13:58:45.997000 CVE-2024-41463,0,0,a153f77c3b8e8afae6003ca7f5efd2bc999f5bab94d5319580e03183eccf746b,2024-08-01T13:58:46.833000 CVE-2024-41464,0,0,fb783471109de1fb41b0e999af63416fe9b60360e3d7ca49fc0b68889080f79c,2024-08-01T13:58:47.627000 @@ -258774,7 +258778,7 @@ CVE-2024-41597,0,0,7bc1c683ecc7754ef9a4accb42f1f9f659f54572a438343a1c4fabae2a9df CVE-2024-41599,0,0,48a45c986c9579d7d3c0496e1b383e5802ce839d40edd99b19ede2ffd41e1b22,2024-08-22T18:27:45.397000 CVE-2024-4160,0,0,02cbb5178621697de395e5bf97f83709ae910ce21eba24af27e6bc1b3971ae89,2024-05-31T13:01:46.727000 CVE-2024-41600,0,0,ddd05664b5ee0043272f1a43166002722a6b163ed847eae777be121e2c652a5b,2024-08-22T18:27:15.310000 -CVE-2024-41601,0,0,bbe6fd3c72d7dad8c522d892fc1c0f9bacbb178b64f66555395886f778d90253,2024-08-01T13:58:55.750000 +CVE-2024-41601,0,1,4221cd1e430017fd47307441fb25a646ed9deb7bd75e8490c865278249c927d4,2024-10-25T18:35:08.280000 CVE-2024-41602,0,0,3aaf8bd0d1359c5ef86792c331ff3b330f01dba788f9b1812b99e2f11e997bba,2024-08-01T13:58:56.507000 CVE-2024-41603,0,0,274738d202695ad4f9eeac726dd842b3cdc47fbabba17edb5ee76c87292d7f32,2024-08-01T13:58:57.330000 CVE-2024-41605,0,0,bb255aac120d8e7bcca665451b615d0034f2513afeb2d3aeb08551ca63d9661a,2024-09-30T12:46:20.237000 @@ -259823,7 +259827,7 @@ CVE-2024-43167,0,0,c4eae034ed90d957ee0d40ac6b75e1eb711889b4b8905f404c5783e222980 CVE-2024-43168,0,0,ef0081344887975b429a2b0b7741a490ebb03d62e914345ff88e9fc7663b3374,2024-10-21T12:15:04.327000 CVE-2024-4317,0,0,2ab51635ebb5a78f9093ee7220532c2f98c47bcb30186dfa33cf412783a7fe8e,2024-05-14T16:11:39.510000 CVE-2024-43173,0,0,5fd3a7cd2e25eaa59bc7be29d2c1d5f9369e6e7564f4001a4cb0dbe8b47a7f52,2024-10-25T15:40:19.977000 -CVE-2024-43177,0,1,2e91df99c102e520c2bb937f75df1229588c30ac5f4c9282ac32d182ae56467a,2024-10-25T16:05:15.777000 +CVE-2024-43177,0,0,2e91df99c102e520c2bb937f75df1229588c30ac5f4c9282ac32d182ae56467a,2024-10-25T16:05:15.777000 CVE-2024-4318,0,0,3bd63bc61468b7ca3d2d40c33a55eb01fa72ff95d7d5fb5f0e4f8d9b094da54b,2024-05-16T13:03:05.353000 CVE-2024-43180,0,0,abb2e48a138ce8e840850ec2c73107ac445b622170d298531958775b0aa3e8a2,2024-09-20T17:28:06.617000 CVE-2024-43188,0,0,e35d0111e2400440d7a3229650e46565d9a613f599bd61cb8e0041fbf0bfcd3f,2024-09-29T00:24:49.103000 @@ -260136,8 +260140,8 @@ CVE-2024-43567,0,0,b1aa8d4eda561d64c2d6cb4a7fbba0f5a1685cba00aff4889ad4b33556da9 CVE-2024-4357,0,0,86e4d24bdc3dca7ecac9fc1438972a4a1617b1654b394ca919ca67f001ce2742,2024-05-15T18:35:11.453000 CVE-2024-43570,0,0,cb1ebdbcc9f463b489680ee7f906a1b002e658802f44b1edfc93e77479cd3deb,2024-10-16T21:53:41.207000 CVE-2024-43571,0,0,fa36d8639880a909bc9227e28caa319904ee146b710e8465c63988bc833161f8,2024-10-16T21:53:47.887000 -CVE-2024-43572,0,0,94efad9fab1aec1f1c3fad704766c71ab9f5733d1a2959a700e703dee09baee7,2024-10-10T15:25:33.310000 -CVE-2024-43573,0,0,7cb2a96662a466abf265ca3d01d38469acb4c1db062ef75727d0e2c8e1756007,2024-10-10T15:54:19.353000 +CVE-2024-43572,0,1,257e329a7c7fcc1c3aa59295d878c66b1ff93d840d2da33e0c77b5b8eb2e3746,2024-10-25T18:17:28.223000 +CVE-2024-43573,0,1,99c4b510e413885843aeaba4bd6f60319242cb24f5b664274f7f6f8822356c2d,2024-10-25T18:17:35.217000 CVE-2024-43574,0,0,27cb32f4bd91a68a1d79359c4fa56d2ab297703b1b8d3a2c872a415c852b6007,2024-10-17T18:58:37.100000 CVE-2024-43575,0,0,24f2c5a591586cc897a2d8a6a2db6f48b0fde505b74f11c59d7d9cf153abc125,2024-10-16T21:53:59.407000 CVE-2024-43576,0,0,fe1fcad43644aa438f5b12fd73a64989a355f1461202f1bc35d3359c0344ca8c,2024-10-16T21:54:24.047000 @@ -260286,10 +260290,10 @@ CVE-2024-43840,0,0,23c960f08c72e92672042c1b393c21288af5920aee8a16c3fbfc5fa814adb CVE-2024-43841,0,0,e1a2c38a635a3f723bb13f01d4b145d0059affd305089e3a07adc4eba6ffd3eb,2024-08-19T12:59:59.177000 CVE-2024-43842,0,0,79cd60e4a4023eb7c9a6d86176017ee449ccbc0688862836e1c280871c39de83,2024-09-30T13:55:17.007000 CVE-2024-43843,0,0,a0131aafc1fe810a712c7a36d5efccca41cdcb3c562b11e8dec7755521d56b27,2024-08-19T12:59:59.177000 -CVE-2024-43844,0,0,a0d50b71edd9141ff92598003e1617be5ffa1f51ed6945e4adfc2aef19f1831c,2024-08-19T12:59:59.177000 -CVE-2024-43845,0,0,d80433b94567f7553ba59d5578ff0ab177cc617e43797bbfe0b461c6dff68752,2024-10-22T15:15:07.240000 -CVE-2024-43846,0,0,336ca6ce5d381bc8197cb8ae52aec5d82cb25fe9302c78389787b6ba92216525,2024-08-19T12:59:59.177000 -CVE-2024-43847,0,0,835246f4f393ea975e0a8495b92ecf4d0f17d69854486c3d470ee96289075a6e,2024-08-19T12:59:59.177000 +CVE-2024-43844,0,1,f8e0e9c6309b78819993f04abd3f0fabe15d23e7d433454c8fc7a70ef34d9adc,2024-10-25T19:49:05.987000 +CVE-2024-43845,0,1,caaa023c02e31720553b20117af210f2452fe00e9e2b31c2df183843a916f65c,2024-10-25T19:51:07.187000 +CVE-2024-43846,0,1,f266cac61831a851876149b3774436f495d75f984b51eb837eba29752a3f1863,2024-10-25T19:52:01.380000 +CVE-2024-43847,0,1,4e65a4d22ff6510c288db589631fb202b95ed61e906a43d1b3d8af8c2605b147,2024-10-25T19:55:53.963000 CVE-2024-43848,0,0,574ca28c6f6f9483be8c689a91acf3081f69bbcf361ca8233d166c12381f4f93,2024-10-25T13:57:51.800000 CVE-2024-43849,0,0,c09809025deb42d3e16ffa77bdd804cd5a554e28cbe29839183c2ce44189d8b9,2024-10-24T16:02:21.587000 CVE-2024-4385,0,0,218d1e7a4ca055c9cc2f26803db027cb337ddeafcf5f646e236db9e9e217180d,2024-05-16T13:03:05.353000 @@ -260514,11 +260518,11 @@ CVE-2024-44094,0,0,745c42fe2d315a5bcee63bacf45ed85a137f90126e69b7519e917691efb99 CVE-2024-44095,0,0,b00dc9986da442410ed4230403c0d5027e748adf40134501c33f35c9b4d16312,2024-10-15T14:35:04.083000 CVE-2024-44096,0,0,9e10fae26ac71a12ed9f5239ac873ac3368309ebde15657c2661c84b3db39f54,2024-10-15T14:35:04.383000 CVE-2024-44097,0,0,965cf9d05fda49947baa77cde6164ca7e937d7f38563ab41cd3e9e9bd0e5a36b,2024-10-04T13:50:43.727000 -CVE-2024-44098,0,1,1168004266a8f5e54e269c18ca4a45508b8876128dba4e929319900254f0936c,2024-10-25T17:35:01.100000 -CVE-2024-44099,0,0,cef1b52b87cb045fe362229d573416685e664fe9a620a39f6e73878a28bd66a1,2024-10-25T12:56:07.750000 +CVE-2024-44098,0,0,1168004266a8f5e54e269c18ca4a45508b8876128dba4e929319900254f0936c,2024-10-25T17:35:01.100000 +CVE-2024-44099,0,1,8b5d0671cd3c07c2e2fdb1ba85a34b0fab024886d0499cf4b6e612e91b95d5dd,2024-10-25T19:35:07.773000 CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000 -CVE-2024-44100,0,0,e9777f3823ca5f020625b7de7657f183ca0a32ff11566ee15e67030df4347240,2024-10-25T14:15:11.590000 -CVE-2024-44101,0,0,583f76d53afea6250ddef045f5c30668d9eb48e1e8827b0f170aa5034ba6581d,2024-10-25T12:56:07.750000 +CVE-2024-44100,0,1,20d0415dcd9cbb9ed7789457496bacac14a274719770af0b32fd0cba6d6500f9,2024-10-25T19:35:08.533000 +CVE-2024-44101,0,1,38a10de066362f808ab5201dce6c06e3469b38a2adfd796214f3d1e7a2c50419,2024-10-25T19:35:09.280000 CVE-2024-44103,0,0,709653e0e681c50169d2a31a1ca4fa07ba0b9e103bee0789c715365497e0794a,2024-09-18T17:18:39.040000 CVE-2024-44104,0,0,929a3e88a508b197778cb9d698752e7d95d2a1fd6ba54e089d4187ada17accb8,2024-09-18T17:33:06.413000 CVE-2024-44105,0,0,6ace8c54c3fc6c9b1684fd8d42f178f1cce19bf6d08f58b02fdc3857633db641,2024-09-18T17:48:11.193000 @@ -260749,7 +260753,7 @@ CVE-2024-44807,0,0,62c2b8a7567d7a7c61c3dd691038c78c799cdde1b88696256483cc85f3e66 CVE-2024-44808,0,0,53ee5f88da9d15aa3ffd696fc5703153aab92dbb219aaccde4dc48186abdbb68,2024-09-05T12:53:21.110000 CVE-2024-44809,0,0,424c650381a963ac60378eaa5a7cd36fd86829e33f994f3d0227dc416ec44e82,2024-09-04T14:35:12.707000 CVE-2024-4481,0,0,c2852db732c7c65c13524ea22e5406663429c55dff3bfe0d5bbffa299f48bbd3,2024-05-14T16:11:39.510000 -CVE-2024-44812,0,1,26c90ab8a711eee71d3b78116577aa5e43694ec9f3cafc1dd7ab46be708a1d95,2024-10-25T16:56:11.150000 +CVE-2024-44812,0,0,26c90ab8a711eee71d3b78116577aa5e43694ec9f3cafc1dd7ab46be708a1d95,2024-10-25T16:56:11.150000 CVE-2024-44815,0,0,b542c0b8057471e724100a6582edd807f2b604eab9a88d4411aa24f995571f97,2024-09-25T19:17:02.237000 CVE-2024-44817,0,0,69deaa4e7ecbf919037754dfd86d6f5f34bcd33ff645863b7e5f14d08ab18721,2024-09-05T12:53:21.110000 CVE-2024-44818,0,0,d174c0799ffdbf965fa98c057c949d0dd19f8293fcbd2dc7f74d6c2c59752335,2024-09-05T12:53:21.110000 @@ -261522,7 +261526,7 @@ CVE-2024-46237,0,0,89c70f938f955e8f8794daf2309e374bb81a18bcff912f949189945353ae1 CVE-2024-46238,0,0,c0b3aa1e64f4a91b9c4da7e2401f4fe18d33534691ef378a47cfa822f9a55266,2024-10-23T15:13:25.583000 CVE-2024-46239,0,0,725c4cefa2ca2647a32f2bf2b322ce53dedacf1976287dda499bc36c65d5a603,2024-10-23T15:13:25.583000 CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000 -CVE-2024-46240,0,0,e1fabb07f498fd1cd5336ee19dd4a0cded9959b31a2fc1d149406578714fa211,2024-10-23T15:12:34.673000 +CVE-2024-46240,0,1,3dfb8006578d7ba4d6d34c3d67455dcd6450605a9bdc241e6a377f0c41b90870,2024-10-25T19:00:20.737000 CVE-2024-46241,0,0,e8f867d722224165a0936937fdbb3a70034985bd08f25a28d6b30ab6a32199ce,2024-09-26T13:32:55.343000 CVE-2024-46256,0,0,8bf470a14240bc761051ec27ff055fa64e8fa7727cdd73b13c40b5c555057a54,2024-10-24T17:15:16.690000 CVE-2024-46257,0,0,77ff81579b9686846d30b6279f2f3ca51486f319de7ee8b1a0a61768d1f232f7,2024-10-24T18:15:08.617000 @@ -261975,9 +261979,9 @@ CVE-2024-47009,0,0,264b3f36a46fb3043a7ff13a0518523aa897b1a061a2770490e43d56fad1b CVE-2024-4701,0,0,5f841f0540b46f49c80d409ca526b0c08d190fe4f1f5bc2d7cfb115b5ba38647,2024-05-14T16:11:39.510000 CVE-2024-47010,0,0,ee58b9d0b7d45ffa465af597d034eab50b110dc72368e1b0d3bbec3fe3bad3d6,2024-10-16T13:28:07.393000 CVE-2024-47011,0,0,834715db0c973116652eef0dcc6e7b991e8d6c4d096b7d3fa0496c73f0d11b86,2024-10-16T13:28:40.480000 -CVE-2024-47012,0,0,48ee9c2e60f1c3fdbb797fe7506ae5bd29a96b346912b9784e7b5f21c1040cfe,2024-10-25T12:56:07.750000 -CVE-2024-47013,0,0,190f11c14ed590e07e01ba9516bee238cab256108bd9f907d6f67a20bc3a2f78,2024-10-25T12:56:07.750000 -CVE-2024-47014,0,0,517bfa885256428630aad0993b455784cae5e87712cb97182016a861f18bb976,2024-10-25T14:15:11.783000 +CVE-2024-47012,0,1,51b296eca2295acd5a1d0247cca9b894804b420f2f6637dab75d64e90b1a99f2,2024-10-25T19:35:10.183000 +CVE-2024-47013,0,1,c79edd60fa0cb1b64b4333b41bac8a25c3b687d03a9279b3c4a732c53b04973e,2024-10-25T19:35:10.947000 +CVE-2024-47014,0,1,2588aa48a53d7f12c66f0a23d0984f4a68a355479a0bdb5afb4d6899e7323bbd,2024-10-25T19:35:11.740000 CVE-2024-47015,0,0,ff96cfa0d9f88263fbfdd79733732a9ff330d97dcf8ab9375596378f10ba09df,2024-10-25T15:35:13.317000 CVE-2024-47016,0,0,5bb480ec0e9fd631ee64eb7e86f79fadf399ca14a987be83ebc334f12731b432,2024-10-25T15:35:14.487000 CVE-2024-47017,0,0,ec48a73c66b69cfdbd33128fb6e18b5a985fdcc5efbe00cd3212f49f8adb9439,2024-10-25T15:35:16.170000 @@ -261988,20 +261992,20 @@ CVE-2024-47020,0,0,8cc56588fa67c6488d48725ca463b6e7c5121aa699e52d967ec763322c988 CVE-2024-47021,0,0,c76dc6b96a46993f8506ca6606d4ca47360f6031b2daa317a23260ae58f459eb,2024-10-25T12:56:07.750000 CVE-2024-47022,0,0,0021a56385b34320390d37d93b6b70f267a8ab1d92243aadd4981880ae362c7f,2024-10-25T14:15:11.877000 CVE-2024-47023,0,0,a160120633f566da41dca5c1d4166256c3ed06e850b8cbe662f2b94d506ea18c,2024-10-25T12:56:07.750000 -CVE-2024-47024,0,1,fdd8db96887c49e8c2dd0a2345448533fa22363bcdc70296d3714d8b8a1d05c9,2024-10-25T17:35:01.947000 -CVE-2024-47025,0,1,cc755d2dfa83d9b00f84dc441cc05031865cf46bc6d4474051ebb8a299ce8934,2024-10-25T17:35:02.767000 -CVE-2024-47026,0,1,0dd3b1d0ee282e446b5ffdb7f0e22e1a75573914f3e5e07cd15aeb5631127479,2024-10-25T17:35:03.593000 -CVE-2024-47027,0,1,9176463edf9ab1fb44b78c2bf720fcfcc8a97ada3de811f156f19e6c5968310b,2024-10-25T17:35:04.390000 -CVE-2024-47028,0,1,8e6ccd9449d1650f43ce21de8f3b71bac79f34933413bae4fdbe703e619e4a81,2024-10-25T17:35:05.147000 -CVE-2024-47029,0,1,6ceacea7b31d9c08df562719f0aea3b0f5dcfad40eadbbbd9c8bcf984e54b881,2024-10-25T16:35:07.850000 +CVE-2024-47024,0,0,fdd8db96887c49e8c2dd0a2345448533fa22363bcdc70296d3714d8b8a1d05c9,2024-10-25T17:35:01.947000 +CVE-2024-47025,0,0,cc755d2dfa83d9b00f84dc441cc05031865cf46bc6d4474051ebb8a299ce8934,2024-10-25T17:35:02.767000 +CVE-2024-47026,0,0,0dd3b1d0ee282e446b5ffdb7f0e22e1a75573914f3e5e07cd15aeb5631127479,2024-10-25T17:35:03.593000 +CVE-2024-47027,0,0,9176463edf9ab1fb44b78c2bf720fcfcc8a97ada3de811f156f19e6c5968310b,2024-10-25T17:35:04.390000 +CVE-2024-47028,0,0,8e6ccd9449d1650f43ce21de8f3b71bac79f34933413bae4fdbe703e619e4a81,2024-10-25T17:35:05.147000 +CVE-2024-47029,0,0,6ceacea7b31d9c08df562719f0aea3b0f5dcfad40eadbbbd9c8bcf984e54b881,2024-10-25T16:35:07.850000 CVE-2024-4703,0,0,7e57d47de6048bcd912b4c77aa51d488946887d89315e68305481f1a25780324,2024-06-11T18:06:31.967000 CVE-2024-47030,0,0,3be2a305b27576be0e6560e95b9293dd29db11df97610966c4be76782dd4afda,2024-10-25T14:15:11.917000 CVE-2024-47031,0,0,b3e1a11628b63eb1d5c738aa227e8f278147c031544256d5366c807174523df5,2024-10-25T14:15:11.960000 -CVE-2024-47033,0,1,9c2cd5b06235ca8b45a07f3d037aabc911bbc4d5c31162114495fe851d679b35,2024-10-25T17:35:05.913000 -CVE-2024-47034,0,1,d59fd6f166a400963fc3af740fda9e91c610700fad7ee93dfce3994dca94702a,2024-10-25T16:35:08.630000 -CVE-2024-47035,0,1,a3e48751355d497c6d8bf42ca7764bc77732d3fbfe4fec392271ffd450fa111b,2024-10-25T16:35:09.407000 +CVE-2024-47033,0,0,9c2cd5b06235ca8b45a07f3d037aabc911bbc4d5c31162114495fe851d679b35,2024-10-25T17:35:05.913000 +CVE-2024-47034,0,0,d59fd6f166a400963fc3af740fda9e91c610700fad7ee93dfce3994dca94702a,2024-10-25T16:35:08.630000 +CVE-2024-47035,0,0,a3e48751355d497c6d8bf42ca7764bc77732d3fbfe4fec392271ffd450fa111b,2024-10-25T16:35:09.407000 CVE-2024-4704,0,0,9637a93e192a5f32142e05687e31ff3688b029254561fc4728d18bbfa1666d6b,2024-07-03T02:07:57.433000 -CVE-2024-47041,0,1,badb113c52ad3f26fac9981faa6ebae8f0444af7e7657f49674083947f90d206,2024-10-25T16:35:10.220000 +CVE-2024-47041,0,0,badb113c52ad3f26fac9981faa6ebae8f0444af7e7657f49674083947f90d206,2024-10-25T16:35:10.220000 CVE-2024-47044,0,0,ee5fa186fb8ea19ca537298bbe2b5e712b21f44e9ac5aca4b5f7e41e68f91755,2024-10-17T02:15:02.840000 CVE-2024-47045,0,0,f477b3cad8608c11a6f4e2c578041877872bac107a164ee977d83ddf752336b4,2024-09-26T15:35:29.950000 CVE-2024-47046,0,0,7869fbf4e097ddf562d122b002ca5484caa2f32ab0ccc92f893d14cc4f35f687,2024-10-10T12:56:30.817000 @@ -262651,12 +262655,12 @@ CVE-2024-48119,0,0,6022221da5fd10d70715948b01fe2f7f8a0f43256a22ac2ee84f2922fba50 CVE-2024-4812,0,0,96f0244e64d02e8b825789000f88a75dd5b3d67c4d6e5fa4b2230b6ad5599e15,2024-06-18T18:49:19.783000 CVE-2024-48120,0,0,9504bbf5097a8042aa622e4bcffcd74f79e5a7cbeebb7a1d1951fd43248d522c,2024-10-15T16:35:09.650000 CVE-2024-4813,0,0,ffced1bec51c6384e79d75317b856f32e05abf0a3cdd3adf718b586086ffad4a,2024-06-04T19:20:50.970000 -CVE-2024-48139,0,0,58adfd4ad5d14e9290c7beb94672bc1925877b47c221370b67aede32a9c4bfaf,2024-10-25T12:56:07.750000 +CVE-2024-48139,0,1,4498e53310bd0f1ddf9c5f5a2ccdf773885d2c9acdbd970572ebc94239438a82,2024-10-25T19:35:12.730000 CVE-2024-4814,0,0,6ed65b628d782e4c0035f27d12907232951228fb5dd63de02df922628089b508,2024-06-04T19:20:51.077000 -CVE-2024-48140,0,0,ab88a4cea76b588e8807c35674ca34539cb7760a2303af2de3fe7ea49b8e90c9,2024-10-25T12:56:07.750000 -CVE-2024-48141,0,0,f853a3b6514a9f113366f907dcf08a8f876356fd18da6498484194ba625e807e,2024-10-25T12:56:07.750000 -CVE-2024-48142,0,0,4fb50954b1384ca3c2474625ffe298309170fdf75242d5b2db0493bcc203c6ec,2024-10-25T12:56:07.750000 -CVE-2024-48143,0,0,26c2b4a358e23b06a48f32e76ebfbc4bba3d0f8b03c430e00d9c294cff3bf09a,2024-10-25T12:56:07.750000 +CVE-2024-48140,0,1,7bdd1e284971ed20bbd566db3c44806f986d48a3fa213bf0dc8436945e28930e,2024-10-25T19:35:13.497000 +CVE-2024-48141,0,1,cc4782a8f0951c87e98422618b067d64816a658947d4a8eca9697f1d8a5b003c,2024-10-25T19:35:14.257000 +CVE-2024-48142,0,1,cae437d6fee1555558b712ee6c06f3021c0f2d9f12fdcac6beaa6daa4a343e39,2024-10-25T18:35:08.560000 +CVE-2024-48143,0,1,5545db23ed22335df1a529c388d9711e2b5fcb2994cec0953d6220a72ae8ba76,2024-10-25T18:35:09.327000 CVE-2024-48144,0,0,fdb4eecf8121a078afe76760eccc74cd2b7d4a296fa77eb553646edbcf93e74b,2024-10-25T12:56:07.750000 CVE-2024-48145,0,0,a7822e773b5e8b97e44909da5983b8285f14b3b7031fc690fa121b3e6000150c,2024-10-25T12:56:07.750000 CVE-2024-4815,0,0,a12a3714528f7b768c4c9101b510e3e25b21fa14abf883b4fca5d245888d3088,2024-06-04T19:20:51.183000 @@ -262670,7 +262674,7 @@ CVE-2024-48180,0,0,5891665b96e5bb6f8325528a26dbdcd36c2f7a69e9155272862a28dae07f4 CVE-2024-4819,0,0,bc26e072d222c9731ee42bb1198fec18f8f3236e713c07e319d531bbf6577caa,2024-06-04T19:20:51.613000 CVE-2024-48192,0,0,50ca3857fa6f25fe2966bfab9679a90bf80eec0b1a66f64f4eaab1d030168651,2024-10-18T12:52:33.507000 CVE-2024-4820,0,0,832738c431d4032e72cf5367ea2c2310b7c6cd840d9bc0fc3f10b9e1f0e05ed2,2024-06-04T19:20:51.710000 -CVE-2024-48204,1,1,2d0833879720aba0f189d98abf08c386855c552d12207fd3da114e189cd9f34d,2024-10-25T16:15:09.873000 +CVE-2024-48204,0,0,2d0833879720aba0f189d98abf08c386855c552d12207fd3da114e189cd9f34d,2024-10-25T16:15:09.873000 CVE-2024-48208,0,0,b02f86f1b335b3183358f07d84617fba93d01a0b465de0ef3561929c34125b92,2024-10-25T12:56:07.750000 CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093af,2024-06-11T17:29:33.213000 CVE-2024-48213,0,0,117f3b040dc13bc06ba79e6afb4438d02d6453981e7ddab2f51ac57958bb9036,2024-10-25T12:56:07.750000 @@ -262692,6 +262696,7 @@ CVE-2024-48279,0,0,734681838e14fea506d33d2e5cffcb45e5208b2ff1232248e90dbda0d4737 CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b92f9,2024-10-16T16:38:43.170000 CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b694,2024-10-16T16:38:43.170000 CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000 +CVE-2024-48343,1,1,5656db22df2b3676700d39c69c4e1b01dffc629287daa5fe07ebec03a2fcdc3a,2024-10-25T18:15:04.250000 CVE-2024-4835,0,0,b63c1e2c2f2232a6ba415444f30303ee4e5ea1a45d737d79b2133d2755ec709c,2024-05-24T01:15:30.977000 CVE-2024-4836,0,0,6397d82c08a27dc6d1e4828623f7dccd401e56dd97e62d291cde8c73c9f6f8bd,2024-07-02T12:09:16.907000 CVE-2024-4837,0,0,e7f6212a3767856f93e80078aa36a8d58ae9b0d6d87727b0b71ea9bfd6a3b44b,2024-05-15T18:35:11.453000 @@ -262700,7 +262705,7 @@ CVE-2024-4839,0,0,b71f0924b0409cbf87c224c453882d6c9b4eee1b8a725627eb630ec6587a6e CVE-2024-4840,0,0,e883b61cf74d34d59484fc9e98d49b7c4a3e1a85aadae7b936258fde00012f35,2024-05-14T16:11:39.510000 CVE-2024-4841,0,0,65ebfdfe2681835a6b4ece6477d685d2c79df9dc285d61b3c6847a6703ab5189,2024-06-24T12:57:36.513000 CVE-2024-48411,0,0,f02f5a173c68a1066ae1d0ad3ecb091448747ebc7ae5d98814db8ad4f2b7f72f,2024-10-16T19:35:11.290000 -CVE-2024-48415,0,1,74b10390d002ade4800e5d7a55f6d3a4ceb198a0f7cd7077ee2455a630a69b9d,2024-10-25T16:55:26.083000 +CVE-2024-48415,0,0,74b10390d002ade4800e5d7a55f6d3a4ceb198a0f7cd7077ee2455a630a69b9d,2024-10-25T16:55:26.083000 CVE-2024-4842,0,0,266948939b8663b41b45dca8cb12f3f3247c17eab2663a8a73d7a0fbf198d426,2024-05-30T20:15:09.703000 CVE-2024-48423,0,0,8c282145a9dde1964a7595668e5968537e68f0c62ec8f7f792ca8b027908f113,2024-10-25T12:56:07.750000 CVE-2024-48424,0,0,ee533150d47efc3108cae9b82d77aeffc985ad6f31e1c299d1eaedfbcdbff2c3,2024-10-25T12:56:07.750000 @@ -262713,9 +262718,11 @@ CVE-2024-4844,0,0,b1cdfd63abb8075cb2a12dc44eacca2f75c6048adf9c4ea8b8b7c607266903 CVE-2024-48440,0,0,5219db498a563dd1c6489094539901c4defdd8cd94636f8687a9af5fa80de2ee,2024-10-25T12:56:07.750000 CVE-2024-48441,0,0,224bc247fd5f1747eb1e946da5b3115767d16a53740175a2dfcb73dea07b1575,2024-10-25T12:56:07.750000 CVE-2024-48442,0,0,084bb62aa7e367eaa572c5f66b2188f35788a01f98625b5dbdc0959d7e2c72e8,2024-10-25T12:56:07.750000 +CVE-2024-48448,1,1,aab36c7efa4d3cefca6b8cb68026c1ed9e940d94877b0f17e3d7005f8bd77c6c,2024-10-25T18:15:04.330000 CVE-2024-4845,0,0,f8e5a569577a931ed62905431d3e7dc57f80df89344697bf8fc7f196d4c6a1d9,2024-07-23T17:23:41.597000 +CVE-2024-48450,1,1,c87cb9a823527d7ad40eff56b320ed10998d734b68c031022d699dd9986e1481,2024-10-25T19:15:04.373000 CVE-2024-48454,0,0,6b6ca49a060c554891c90c2e114c529f7522d5800fbd375e9b33b5c669ae0f53,2024-10-25T12:56:07.750000 -CVE-2024-48459,1,1,a7d1ee8f457b4cb4b257b6751d2a0c81826e21b458157c0b6ac00441abd5283c,2024-10-25T17:15:04.703000 +CVE-2024-48459,0,0,a7d1ee8f457b4cb4b257b6751d2a0c81826e21b458157c0b6ac00441abd5283c,2024-10-25T17:15:04.703000 CVE-2024-4846,0,0,354213cecebbad5d2830809199864dadc70a5508c38afeb47a24b8f17c4c0fe1,2024-06-25T18:50:42.040000 CVE-2024-4847,0,0,3e175fcde7743d0dafc07697dcd3c0585505cba50a8840c440513434f4a1e2f1,2024-05-15T16:40:19.330000 CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000 @@ -262727,7 +262734,7 @@ CVE-2024-4853,0,0,7e943be0a2434f6362f67f453fe22910f05fecde26076344b21d97f20b2d6e CVE-2024-48538,0,0,d00c6ae109958170edcc3a2c583c2ac0637abae567969e57f7b9a648e6c8cb40,2024-10-25T12:56:07.750000 CVE-2024-48539,0,0,1d5c8fdf188ef55366358121671809693c2ffcac98329c253bc948034dac981b,2024-10-25T12:56:07.750000 CVE-2024-4854,0,0,9d5d733c00183e47994464da1b76a252c7e4b8268459cd8a1634b1fda6297d73,2024-08-29T15:15:31.797000 -CVE-2024-48540,0,1,d28fdb22fce9e3091e2d534ef960f29e698a35b76fafedab91937579287ab000,2024-10-25T16:35:11.093000 +CVE-2024-48540,0,0,d28fdb22fce9e3091e2d534ef960f29e698a35b76fafedab91937579287ab000,2024-10-25T16:35:11.093000 CVE-2024-48541,0,0,445987ffb9995efed065af6e947aa780367ff397aa0e6a5c5154f3922a65938e,2024-10-25T12:56:07.750000 CVE-2024-48542,0,0,3cd5de49086c2c00210e7dab5fa3a8eb1e801db273093814abbd4185d4a7eeaf,2024-10-25T12:56:07.750000 CVE-2024-48544,0,0,066e44948f9e780845364a134f83700eb451ac395786b145ae7dc4bd6c567b2e,2024-10-25T12:56:07.750000 @@ -262738,11 +262745,11 @@ CVE-2024-48548,0,0,ec80620fd2405092cb652dc2117913ce945d52911c33fb7583254b23a981c CVE-2024-4855,0,0,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f872,2024-08-29T15:15:31.893000 CVE-2024-4856,0,0,01234b09ea1a4585c989c1dc87d23ed182241e8a50536214983ade66b15e19f8,2024-06-04T16:57:41.053000 CVE-2024-4857,0,0,1a28f92c79b598b55521235359a1d50b478306861b37a5a0ef0abc4d3160ef4c,2024-06-04T16:57:41.053000 -CVE-2024-48570,0,0,a07030a76cd88cf2d077be21611e593db567eb3ed2799d5f3776bbda7ecbaf36,2024-10-23T15:12:34.673000 -CVE-2024-48579,1,1,050bf08496731e9fa01ddddf10f6c383539d6e884fee1d3101c51c157c56909c,2024-10-25T16:15:09.940000 +CVE-2024-48570,0,1,7446ae4df00f32873e4ee72b4a315b4accd5c33a83ff9b6be395bc57cb3e12c5,2024-10-25T18:59:22.033000 +CVE-2024-48579,0,0,050bf08496731e9fa01ddddf10f6c383539d6e884fee1d3101c51c157c56909c,2024-10-25T16:15:09.940000 CVE-2024-4858,0,0,3cb9bd8b6c75f95328665e9ee04ad5356aa75f69b8a71bb4682aa7bcb86b9454,2024-05-28T12:39:42.673000 -CVE-2024-48580,1,1,38c4000b35372237ef9186873e78fb7b43739235dd7422171df3719331b79af0,2024-10-25T16:15:09.993000 -CVE-2024-48581,1,1,7e02d80033b3f21fbfe923c81e59e73fdce925d6814b23c4e7dbaf3d3da8d2ec,2024-10-25T16:15:10.047000 +CVE-2024-48580,0,0,38c4000b35372237ef9186873e78fb7b43739235dd7422171df3719331b79af0,2024-10-25T16:15:09.993000 +CVE-2024-48581,0,0,7e02d80033b3f21fbfe923c81e59e73fdce925d6814b23c4e7dbaf3d3da8d2ec,2024-10-25T16:15:10.047000 CVE-2024-4859,0,0,8383b8e86eb4a4e5b90aae7f1f2380c0c5e94dbe99d2c93d082bf89d93f61e82,2024-05-14T19:17:55.627000 CVE-2024-48597,0,0,72aec40fe60a6c8353dc32b60169cb2bc295b2fc07fd4d45cd6ccc7e559fc86b,2024-10-23T15:12:34.673000 CVE-2024-4860,0,0,51415b9207d508daf9b92cfd5981ba904e23fd57e3ad30c10a4a3319cff2429d,2024-05-14T19:17:55.627000 @@ -262765,9 +262772,9 @@ CVE-2024-48638,0,0,93a9606c88551eca2a43d58a9a18871f8de782bd448d66dc6474dd57c860a CVE-2024-48644,0,0,767bea0974441fd2cc19792b3d98e4d360220265a6636145290e8043d3dbc5a5,2024-10-23T19:35:12.593000 CVE-2024-48645,0,0,68a6d6f0e4b4f7bc96fb65a4350b69a13ff6b55f133c0422ecbf10590166619b,2024-10-23T15:12:34.673000 CVE-2024-4865,0,0,df8706c5d26e485ec9b623150b314bb58c6338346ba72ce79d78a6dbca58bc77,2024-05-20T13:00:34.807000 -CVE-2024-48652,0,1,de9357326c4ec67fec06a2f6916117e7d67385a63ec8c48f3929233398d3928a,2024-10-25T16:51:57.013000 -CVE-2024-48654,1,1,e34310090447184f0e074f6a144ad626d589255dd6d7d0c385a44ba8bdec3cb5,2024-10-25T17:15:04.763000 -CVE-2024-48655,1,1,01169986f94a33ed859c0940866e2417c4a2c0d0d0863258a06e31477c3e9a96,2024-10-25T17:15:04.817000 +CVE-2024-48652,0,0,de9357326c4ec67fec06a2f6916117e7d67385a63ec8c48f3929233398d3928a,2024-10-25T16:51:57.013000 +CVE-2024-48654,0,0,e34310090447184f0e074f6a144ad626d589255dd6d7d0c385a44ba8bdec3cb5,2024-10-25T17:15:04.763000 +CVE-2024-48655,0,0,01169986f94a33ed859c0940866e2417c4a2c0d0d0863258a06e31477c3e9a96,2024-10-25T17:15:04.817000 CVE-2024-48656,0,0,7991ecc43dfce32475e8e1d32ee086228d1cf510284114bf3bd76e22363c0bc1,2024-10-24T14:37:36.353000 CVE-2024-48657,0,0,92137caf7714ad77e1f5fbc8130edf53e1c7b0ac9e690fd892c8d5cb42ccb1b6,2024-10-24T14:38:41.620000 CVE-2024-48659,0,0,74eba10fd7e373cc2157a8c68b69a750c73226aa0e75d8a35ccb512ee7fa62b0,2024-10-23T15:12:34.673000 @@ -262775,9 +262782,10 @@ CVE-2024-4866,0,0,1fd2c3b939730f1522c70c99454a98badb9f05648f1c0fa9438c4abc3e506e CVE-2024-4868,0,0,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a13,2024-07-09T18:19:14.047000 CVE-2024-4869,0,0,c966893d60f3d2b834063ff6490a8006deca39b71769e89345f5be1133a2f10c,2024-06-26T12:44:29.693000 CVE-2024-4870,0,0,34dc62fe0d9ee09fd087b0b9ccdcdae4c15125668207018dedb4b3cfd451baf0,2024-06-04T16:57:41.053000 -CVE-2024-48706,0,0,f713530be88e39bc26678bb907cef38003dcec08f4e06d8324296c8e4ff23ce3,2024-10-23T15:12:34.673000 -CVE-2024-48707,0,0,11d7dda87282e1f93592f9ed17a7b792c848338d8fc8576caa83ed8e9a59d7c5,2024-10-23T15:12:34.673000 -CVE-2024-48708,0,0,a3d087492c40739451e8f1e17f6bd6f3fe16ba5866242fef2c3de1daa457a1c3,2024-10-23T15:12:34.673000 +CVE-2024-48700,1,1,9be6619a603858f176cb422702afce112f0c83e8f944ab9cb6b18eb6af3ba813,2024-10-25T18:15:04.407000 +CVE-2024-48706,0,1,e747f2815f744d2574a2c914482979e92abcb175ce526e54d28ad054b049d395,2024-10-25T18:58:35.380000 +CVE-2024-48707,0,1,fd9b1d38f6684577739099dad2b9e541d52b6b52c575d76793119672c0ee0220,2024-10-25T19:11:54.310000 +CVE-2024-48708,0,1,117d10f4a9b96b209a6f5e6f3097728d8a65264e256ad998e6bda4d438b21882,2024-10-25T19:10:08.457000 CVE-2024-48709,0,0,09a0506fcee26889d94982710596f7bcc50ff18fa38b0b5a0230c066edc673cb,2024-10-23T15:13:25.583000 CVE-2024-4871,0,0,27d58887099f376e93909bb4c2214524b0789bbba79f05cabea36e120d5295ee,2024-08-12T16:15:17.313000 CVE-2024-48710,0,0,2fbd0f8c58cb24ce52b0e5c8d654e92a74d3cd7c1aadc3c4c977083a33ba41b8,2024-10-16T17:35:03.423000 @@ -262787,7 +262795,7 @@ CVE-2024-48714,0,0,5966fa7e4cea1148b0617541f87717ad0f7359afa5da2d98079f2bad16d0d CVE-2024-4872,0,0,c60d4ff9e5499bf7427bb540017644c2677aac5e300662a3bf0eae497fb13b4d,2024-09-05T09:15:03.743000 CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000 CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000 -CVE-2024-48743,1,1,990afaada28bfd6eaecf6c0573daeeeeb4ff3c6941fad6d144122478a8f4e339,2024-10-25T17:15:04.873000 +CVE-2024-48743,0,0,990afaada28bfd6eaecf6c0573daeeeeb4ff3c6941fad6d144122478a8f4e339,2024-10-25T17:15:04.873000 CVE-2024-48744,0,0,424c481c5fd1d12d1736019bf9f8804bc723e4ae30a5fde28dbb02cb380182de,2024-10-16T18:35:07.013000 CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000 CVE-2024-48758,0,0,a0017ffb6fab9626ea62b98de0c6903a7dbb8c74f73f1e588de68b4bc17a833d,2024-10-18T12:53:04.627000 @@ -262854,9 +262862,9 @@ CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752da CVE-2024-48920,0,0,a03bdbd7875951f84a0ddd56d8e819e54834e1b20b1220c7604c44f7db3ea361,2024-10-18T12:52:33.507000 CVE-2024-48924,0,0,e474b369eaf4331d2ff3a579fbee4e63e8ec29b93749a9c533ecb0a1775a3de6,2024-10-18T12:52:33.507000 CVE-2024-48925,0,0,c9fcd7e04639957ea66d2331abf3d50745ade802e21b5a3409a8d69b208718a8,2024-10-25T14:12:18.833000 -CVE-2024-48926,0,1,d45a9da5f6f1b245a6d729f168d41330fc51c968405a1c91c3b061c128e5b29d,2024-10-25T16:19:17.073000 -CVE-2024-48927,0,1,23a6232a362c7fb17e2b0c22da571a466ad2d8607917844c1edab564eae3beac,2024-10-25T16:15:13.327000 -CVE-2024-48929,0,1,9634f8a920413f581a19c3b63c79c0b9d222c6607f7ac0361bee3f54dbad7500,2024-10-25T16:12:15.897000 +CVE-2024-48926,0,0,d45a9da5f6f1b245a6d729f168d41330fc51c968405a1c91c3b061c128e5b29d,2024-10-25T16:19:17.073000 +CVE-2024-48927,0,0,23a6232a362c7fb17e2b0c22da571a466ad2d8607917844c1edab564eae3beac,2024-10-25T16:15:13.327000 +CVE-2024-48929,0,0,9634f8a920413f581a19c3b63c79c0b9d222c6607f7ac0361bee3f54dbad7500,2024-10-25T16:12:15.897000 CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000 CVE-2024-48930,0,0,c7b6cd0340da2631ccf07a7015b8cf581a1e5f29f6a6b1ff9f3168b16f8d9c48,2024-10-21T17:09:45.417000 CVE-2024-48931,0,0,cb76da7947433082044eb8eab7c26fb2f1f77c9a2e73af320a6686276ae68e56,2024-10-25T12:56:07.750000 @@ -263316,12 +263324,12 @@ CVE-2024-49992,0,0,552b9e8ee31b9d2986b015547bb9a5ad1516a945b66e9c2d1491a0c82371c CVE-2024-49993,0,0,173745e8fc0b2f51f6583b765f43b75fc7379f37eeab514e19093d1e0bbc2187,2024-10-25T14:52:19.167000 CVE-2024-49994,0,0,b259470c6938b01fe0b06a9ea53deb1f1b59fb7f77762cb60813754903d6329f,2024-10-25T14:52:32.877000 CVE-2024-49995,0,0,b14274080bc6cde5e18285c4271101e0fd75dd4ad1b68ac92642bd34920a24f9,2024-10-23T15:13:25.583000 -CVE-2024-49996,0,0,09919f5bd92b6ffa4ceeb00f48af54ba697342e221271cbab43696a2c7a40ce0,2024-10-23T15:13:25.583000 +CVE-2024-49996,0,1,81c0545f780fa695d599970a227ba85a22409c164ec567cfb530b43ba7149524,2024-10-25T19:56:10.320000 CVE-2024-49997,0,0,4f0d5cbc938668da4cca12e8619053d4fe51e93b90646e0ffb3c7559200d809e,2024-10-23T15:13:25.583000 CVE-2024-49998,0,0,dc2b1c1752af1746445d713a06a03643e693f616cacbb49fca8b0a6d6c19fcfd,2024-10-23T15:13:25.583000 CVE-2024-49999,0,0,78b6148f41a15652bfa26256a49a5e5917d5dbd35564ac4e51ba7d691f423879,2024-10-23T15:13:25.583000 CVE-2024-5000,0,0,78aa4b3aa9bab8131501fa8740489ecb0fe42637a1055cb7cfa2d7935a7c9e42,2024-06-04T16:57:41.053000 -CVE-2024-50000,0,0,cec02897eadd69642a8478330d38fa15edaf3633d0d107bb46ad0cb4bf889d34,2024-10-23T15:13:25.583000 +CVE-2024-50000,0,1,40a554287361de92ee1140e71e9aeb78cfdfe71967eace32a2e7d700fc182c42,2024-10-25T19:55:55.357000 CVE-2024-50001,0,0,886b8a582aeed728b3b4fd74e088fd22423f5fc4d8231c2d820afabe46d603d5,2024-10-23T15:13:25.583000 CVE-2024-50002,0,0,7e826e0b3de3d65693e9dcc09edb35c05892be528b111a68d82dd8a04b1f2994,2024-10-23T15:13:25.583000 CVE-2024-50003,0,0,318b4134c29bf882eea2c3b90b36a6f001c79495854be1fa1cd17567830c7826,2024-10-23T15:13:25.583000 @@ -263334,8 +263342,8 @@ CVE-2024-50009,0,0,b25c89b587ef8f767a118a888203f26c1813b03ccfac66d7b88c177a8b952 CVE-2024-5001,0,0,d13fccabd833b06301db98a96a793d9305ac650b09885bcad3ab7a5e90e7be86,2024-07-23T20:32:50.207000 CVE-2024-50010,0,0,719c9dfbef8438b722e214bb4144425701839515de68fd900ca2439cbf367998,2024-10-23T15:13:25.583000 CVE-2024-50011,0,0,980130793609ba85d978ac3897743b36e06d03e5578449cd8463c6a50ef6140e,2024-10-23T15:13:25.583000 -CVE-2024-50012,0,0,6824ea7cd046916e5a46602bc6bf106039cd8c4524a0aa5c1d68ccb97cc90580,2024-10-23T15:13:25.583000 -CVE-2024-50013,0,0,e7dcb33b5a8b3baabdc44a24528c311c52a525f369b10c0876273d89b7dc19b8,2024-10-23T15:13:25.583000 +CVE-2024-50012,0,1,0b464fdf78181eaa99a743288b56773d15a2abd5d273a31aea10de63165e8299,2024-10-25T19:55:40.217000 +CVE-2024-50013,0,1,eefeead007890563f349e532e89dba096326c5095afb27c53d3f32df4440455c,2024-10-25T19:49:36.863000 CVE-2024-50014,0,0,1b9d9129c629d7a256ee3df690e7fe663397d99e76b77d5144d84fc7840136c0,2024-10-23T15:13:25.583000 CVE-2024-50015,0,0,6d4bf18cde3e91eef710a5b6ca23cc98ba4179d8758cab4bc07f83164bcd0fab,2024-10-23T15:13:25.583000 CVE-2024-50016,0,0,150cc155a5101207172a6ab21de9b50c216ceecbad4a50f73bb2b1561ac16362,2024-10-23T15:13:25.583000 @@ -263531,7 +263539,7 @@ CVE-2024-5155,0,0,bda9a47dace36470fd3600985ed47f5579d8b3230222d03e314a73ac1655d7 CVE-2024-5156,0,0,15fe916f4b576f7b7dc0d841e2e4a8f8e08add666a82cde7e5fe7e09d48d907a,2024-06-20T16:07:50.417000 CVE-2024-5157,0,0,24d31b037c5fbef35f77d9be746cd537f78e6f1e98b9c21955d97a62fe59949f,2024-07-03T02:08:34.407000 CVE-2024-5158,0,0,b58e7eaee1d1dd9c5e85390b8596c36aa736d240ceb0715ad1a8e256309daea1,2024-09-15T19:35:04.757000 -CVE-2024-5159,0,0,9a9b3de45c6c36099e2df42ed5c739b91b4960d213fd6f345b99527b20e821e8,2024-07-03T02:08:35.967000 +CVE-2024-5159,0,1,6487690749e64572084b0b1ffb84b7950e8b682c3129ca3d21d0dbc204e9ec91,2024-10-25T19:35:15.010000 CVE-2024-5160,0,0,761bdadb9ac3f89d156978519ca326c5704c62592c7f03e703ecc7e802a865d7,2024-07-03T02:08:36.807000 CVE-2024-5161,0,0,f120c7db938e25c7983d6c400da502880d5ffbc93ab4e5e05351c3fca8fbd038,2024-07-24T17:54:42.387000 CVE-2024-5162,0,0,b916c521cfe3c1fb21956086b784f2a8541eeb514496e084206ecc726f921efe,2024-07-24T17:53:33.277000 @@ -264136,7 +264144,7 @@ CVE-2024-5832,0,0,fcc8d912e6c8c38175ccea7150b16b62e2ce7eae3dd1539b01b9bf831f40b8 CVE-2024-5833,0,0,a74d6cce3a1790ef74d3836450506e9a7e306cd07532907e8300bc8d9a8bd7ba,2024-07-03T02:09:19.737000 CVE-2024-5834,0,0,3eaebe678be109cf432cf27c742c2b9362970e430c21bfb473c7c2fbeada267f,2024-07-03T02:09:20.643000 CVE-2024-5835,0,0,3e524b82e8ed0b84d2c482cdc0cfce05ebf5d76c695278d4bcb9110adcb244b7,2024-07-03T02:09:21.673000 -CVE-2024-5836,0,0,2f98f47f48e7e5263684bded9a2beb714e548c5c355a03358e37a18e2fe16ed7,2024-08-01T14:00:02.493000 +CVE-2024-5836,0,1,2445453ac51184d720119a34e3e0f2d4a922733fec600942629d4a7fb75a8f4b,2024-10-25T19:35:15.787000 CVE-2024-5837,0,0,a3430952c8e48f90bf943b78b484234954723d493f275584419eeb04849b7796,2024-07-03T02:09:22.720000 CVE-2024-5838,0,0,7c76efe71220708ee702a73816746926766b357630940d525e4a60a2a76d2e61,2024-07-03T02:09:23.820000 CVE-2024-5839,0,0,9130876cb95f097dbdaed8649c52744f55bb9ad261dd630433bc625ccdf7d124,2024-07-03T02:09:24.927000 @@ -264806,7 +264814,7 @@ CVE-2024-6607,0,0,e0f051eabf509802774447af80a0c738a4502496130b70b32bcf3185bbfd56 CVE-2024-6608,0,0,246c9ba89ed8e01f5cf842e2ef0777e6ce9e95831d341293bd5aa49bcd990f4d,2024-08-29T18:34:20.043000 CVE-2024-6609,0,0,e0015ee4b4061bd74c9f14d02e039fc61e2646b8b8a922c9f2cb851cbba76ddf,2024-08-29T18:32:56.240000 CVE-2024-6610,0,0,e7175b3f300966611850e9b1403e59c253bcbbb5dce9d539450c19b2bca9cfd3,2024-08-29T18:22:37.277000 -CVE-2024-6611,0,0,1cb6de18228bc7b87d48b8533959bdfa42c6b3371da5b304bf872662b7a458e0,2024-07-16T18:15:09.590000 +CVE-2024-6611,0,1,102d605bb189ea442954feec50cbc1b79d4cb5728b389bfc836cc71d32e19f50,2024-10-25T18:35:10.737000 CVE-2024-6612,0,0,d34a2e10bc1c43655aa28f997fd8d7918b9d5919fcfded6bd9a7bc48a40520a0,2024-07-16T18:15:09.667000 CVE-2024-6613,0,0,2c9248a7ca42e8738ab702e9dc188d19870d6e260e6ad7403e7b1f4010624eaa,2024-07-16T18:15:09.747000 CVE-2024-6614,0,0,92c74753eb3da74f24a895083a8e9cff7c2fc2f9bf400831c94c14936544ed9b,2024-07-16T18:15:09.813000 @@ -265929,7 +265937,7 @@ CVE-2024-8030,0,0,b6f55198da4c8a890918e236b9cb91502d6b60f60aed340690526a7aff836e CVE-2024-8033,0,0,bc1d961345030012faa7942ae80f05081f947cf441680ad49c3fcb3512e2fcdc,2024-08-27T19:39:04.953000 CVE-2024-8034,0,0,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a38,2024-08-22T17:35:30.003000 CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000 -CVE-2024-8036,1,1,73a83d7777d531c09b678c37584a8f8f23997d17ca11c3ed80d660a03af8ff47,2024-10-25T17:15:04.963000 +CVE-2024-8036,0,0,73a83d7777d531c09b678c37584a8f8f23997d17ca11c3ed80d660a03af8ff47,2024-10-25T17:15:04.963000 CVE-2024-8037,0,0,ad453071137fae9bcec080d9b16736ac997e7f592728683f801a0fad0292f9ca,2024-10-04T13:50:43.727000 CVE-2024-8038,0,0,57ce29f0b3931b72a63ae8ef2369330769f4bf264a0163aeabfd65f65e14fa82,2024-10-04T13:50:43.727000 CVE-2024-8039,0,0,75dd15cbf64fe4bb3f25b4e678f58a350c7ac0d4791106998aa5586c640f03c8,2024-09-17T02:35:59.503000 @@ -266263,7 +266271,7 @@ CVE-2024-8488,0,0,0a3c72da0e3d6042858531d99f20f7d46ebd7634c2988e0b42f58011241f99 CVE-2024-8490,0,0,5ff62dababbd8edfb72d0a97e4807df424b78f87491e2373479d6c84fbd14d32,2024-09-27T18:36:00.053000 CVE-2024-8497,0,0,903ccc83158de7417bc6f3ffdca83d1bf1fc40ad14228b01a3e1e063e242f9a9,2024-09-26T13:32:02.803000 CVE-2024-8499,0,0,a066f12eb0db45b577c1044e88855b3e531b0d4e8e1575f5845b6487effebb39,2024-10-04T13:50:43.727000 -CVE-2024-8500,0,1,4a6f945879b83f03905c3f0642d30c4c3935515f8d05579f7adc4234c4210fca,2024-10-25T16:43:24.040000 +CVE-2024-8500,0,0,4a6f945879b83f03905c3f0642d30c4c3935515f8d05579f7adc4234c4210fca,2024-10-25T16:43:24.040000 CVE-2024-8503,0,0,9f803200a857fcdb413b5557fdfb30066c33963fff9f6132df8887c5f7ded0b9,2024-09-11T16:26:11.920000 CVE-2024-8504,0,0,8357da8291f04353fac31874868f2eb40b31e26be1555ef771437bf9554e80e3,2024-09-12T14:35:23.173000 CVE-2024-8505,0,0,1c04e90354babae2df3035dc354852183330b8445c04d1f2331a89a32b3e4a48,2024-10-07T19:26:53 @@ -266868,7 +266876,7 @@ CVE-2024-9520,0,0,043b00f2bf4932488b29ee05bd55762d90704159cb97bf4c710160da6d1296 CVE-2024-9521,0,0,09a594ea849fc5009e458f6cc46742d3176f440810ef4457104bfe2103f1d0c7,2024-10-16T16:38:14.557000 CVE-2024-9522,0,0,884c9004d667a145fae3b3526c4cb56c9d9a1365bd2a57b2af580c0e3b9c19a1,2024-10-15T14:27:41.553000 CVE-2024-9528,0,0,ad76266403ba94311c1f58d7258b765d914c39ddcd1148706c2e05f82ca92e87,2024-10-07T17:48:28.117000 -CVE-2024-9530,0,0,c8501e0bb039e166d52c4ac8c3106fb221a4406a702b0c3915afb70bff44dc96,2024-10-23T15:12:34.673000 +CVE-2024-9530,0,1,a4f4ec0ca4c538513c522bc25437bdee95aa200ea2c8ddaeaa2d301c3f668205,2024-10-25T18:52:10.810000 CVE-2024-9531,0,0,2d32cff16aa07ef9767a12c3b335b7a483cb4a13b1ba87080414d4508df82841,2024-10-25T12:56:07.750000 CVE-2024-9532,0,0,b7f2aba05edad35ecf41f43ec9640effe332d3189a3ed38d97f2bf49866ac50d,2024-10-09T11:18:49.027000 CVE-2024-9533,0,0,483ea201fb3f13623de51b6a803ec3c9d4b4a9f8d222ab5b1546c8a9a88ca771,2024-10-09T11:18:34.560000 @@ -266913,7 +266921,9 @@ CVE-2024-9575,0,0,902a179ba291c73f1ff19f974c0569ed05c8dbb3d8914c4f7409455feb2bd5 CVE-2024-9576,0,0,7a96a155cd09492144b259aa00c523497a7aeb66fdb84ed492d68f7654aa3880,2024-10-07T17:47:48.410000 CVE-2024-9581,0,0,fb1d34fab9f94525003a0f26c830b830dcb7b4bdc92dd8a95590c26db891e7c3,2024-10-15T14:28:35.283000 CVE-2024-9582,0,0,6ec198135418f168eaebdeafd2e2fe73c3f44201fb3d949937a7b4e70c974bf6,2024-10-16T16:38:14.557000 -CVE-2024-9583,0,1,04369671dcdc0ba41b402439013a80918f2a6c5ddfb5fc47088dd1f892929f97,2024-10-25T16:28:17.497000 +CVE-2024-9583,0,0,04369671dcdc0ba41b402439013a80918f2a6c5ddfb5fc47088dd1f892929f97,2024-10-25T16:28:17.497000 +CVE-2024-9584,1,1,a992d61a5cdd03ad2d3b77cb6df10059852a63ac606a482384dba94358966cf7,2024-10-25T18:15:04.673000 +CVE-2024-9585,1,1,9855271ce8249d7c27d8b4a0f9f33c61ad619d88deb5f63a9da742af390b07ae,2024-10-25T18:15:04.907000 CVE-2024-9586,0,0,a482a25f032ea940edbd74f8dc11272d0d4fecf517c5613466c04b8bd798dc3e,2024-10-15T12:58:51.050000 CVE-2024-9587,0,0,081ae6ebdba381265a40b327141c3458d6ec1c5b94d7fb86236bf633a93923d3,2024-10-15T12:58:51.050000 CVE-2024-9588,0,0,65aff2b1cd3b1280d8083f78d790697b85257a07a6c6e6516ccebd73625a92dc,2024-10-23T15:12:34.673000 @@ -266937,7 +266947,7 @@ CVE-2024-9621,0,0,9e376b0f3dfa34027ae088e771a22694180917eee238e690ac2f4896caf46a CVE-2024-9622,0,0,616f2c897f0ea8915fa743288697302d927eccd4a4b981ffaaf2224bd032869d,2024-10-10T12:56:30.817000 CVE-2024-9623,0,0,86dd85464498f6d194e548538328537f5fc627208085718de66c1a06e69de686,2024-10-16T16:59:36.817000 CVE-2024-9627,0,0,ab5726be759a332c53fc28be3ad1e688481f8077248af16a587354d8ff7a5b98,2024-10-23T15:12:34.673000 -CVE-2024-9628,0,1,61a27472b9da741357728e2747c61581a42641370f854cfe14defa2dd6861d0b,2024-10-25T16:15:10.160000 +CVE-2024-9628,0,0,61a27472b9da741357728e2747c61581a42641370f854cfe14defa2dd6861d0b,2024-10-25T16:15:10.160000 CVE-2024-9630,0,0,95cf42fc9d833aab63558caaeb38c94fd9570f2d1a1e45300ec7feb07db9cd04,2024-10-25T12:56:07.750000 CVE-2024-9634,0,0,d64c376a2cd176bba19f7a8121026bf8ac88c7cb95243ab4e56bfc5d5fa1c1d3,2024-10-16T16:38:14.557000 CVE-2024-9647,0,0,6da0b5c2c888d90e6f29cb1f98cdc0c7a4315eaaa058e1c781c3c46d5b8615f9,2024-10-16T16:38:14.557000 @@ -267004,7 +267014,7 @@ CVE-2024-9821,0,0,847982287e8db8d54661c5522d18fa833c3d9091b2ddb2afe78ab1e8077a47 CVE-2024-9822,0,0,3245ced109c1c371c55834b9b14d881a9e8b7fd7c32c19b6e9a742506d7d4c79,2024-10-15T12:58:51.050000 CVE-2024-9823,0,0,918595934cb9b43f50abc93ebc9bbb9148088fae18c39570ebc344ac634d3e40,2024-10-15T12:57:46.880000 CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca424894a,2024-10-15T12:57:46.880000 -CVE-2024-9829,0,1,ea980a1e481fc86407edeb6f0040d6f4a6ff2d17edcbe8d18dd95381292ad49b,2024-10-25T16:30:44.520000 +CVE-2024-9829,0,0,ea980a1e481fc86407edeb6f0040d6f4a6ff2d17edcbe8d18dd95381292ad49b,2024-10-25T16:30:44.520000 CVE-2024-9837,0,0,bb6af129df538114e71c369a037f26903d10504dcd81ada4fc7f4b05786c12dd,2024-10-15T12:57:46.880000 CVE-2024-9848,0,0,b402d34d635014e43cf3d9b875728458bb9e45308a715285ac01e2036b42d252,2024-10-22T16:42:25.867000 CVE-2024-9855,0,0,f4067d5f9739a4a46f27ed071acd023bca1d9a27db9968d98f329af2e8d70e8b,2024-10-15T12:58:51.050000 @@ -267050,13 +267060,13 @@ CVE-2024-9922,0,0,5b3f4f94b058e10394fda050af76e1c62dd106f0eebadd14ac4c752deaa614 CVE-2024-9923,0,0,e0957ae0002d68f1b955241f204c0150727bb34721e8b9ed064776340efa0183,2024-10-24T13:24:23.430000 CVE-2024-9924,0,0,4d0aa49bc1047e2e0a23ab80e176dbdf70a0af5e82bea53f63a116cd5905286e,2024-10-15T12:57:46.880000 CVE-2024-9925,0,0,d9114846b6ab22497d9820c775f40ff778b3a4311afada5c7a947fe6aafbbadc,2024-10-17T18:09:40.537000 -CVE-2024-9927,0,1,247470617823bbc670f145b2243babfdfbfd8541e02092a27795136533b63780,2024-10-25T16:29:27.300000 +CVE-2024-9927,0,0,247470617823bbc670f145b2243babfdfbfd8541e02092a27795136533b63780,2024-10-25T16:29:27.300000 CVE-2024-9936,0,0,9b9410743fe1ca2f5a844c24ad20043ec989ced54414fa626e93bdc74b6425ff,2024-10-15T12:57:46.880000 CVE-2024-9937,0,0,4e7ae54d6a9c5099857ac0a66ba44c96220fc2ab3e1844c918c371d4dbb6d38d,2024-10-16T16:38:14.557000 CVE-2024-9940,0,0,0591f213f2bec6924fef18017d23419024c9c5bdc4c598c1e0fd80a492ebb13b,2024-10-18T12:53:04.627000 CVE-2024-9943,0,0,2b1bd0bf17ad8265b1c648445115c5e7c1a49eb398158e5a8ef4b45ea9c6d38b,2024-10-25T12:56:07.750000 CVE-2024-9944,0,0,0b8e9f26d6b78f71e8a64eb7650f72f57e1c6a31a17ce0fafe5b6b8377b71371,2024-10-17T20:47:35.817000 -CVE-2024-9947,0,1,88ec45aa6bd99a52db1c3f2ce1757c1650b55146fad6304733cc20a8df4a46b2,2024-10-25T16:53:12.867000 +CVE-2024-9947,0,0,88ec45aa6bd99a52db1c3f2ce1757c1650b55146fad6304733cc20a8df4a46b2,2024-10-25T16:53:12.867000 CVE-2024-9949,0,0,7baff7b9a9118e82abe3afe4a5ae476b8e56ff4f2cbd456d4ba563053750f9b6,2024-10-25T12:56:07.750000 CVE-2024-9951,0,0,5d941c75af8c4072e469beaa1d6ae2855b0ca23ecdce87314ecd326f6a54014a,2024-10-18T12:52:33.507000 CVE-2024-9952,0,0,d5c643eb1b76a39b13753ce231704557bf9fa9c82efce6d96f1e313e65eab479,2024-10-16T15:05:13.467000 @@ -267092,5 +267102,5 @@ CVE-2024-9983,0,0,05b40e9cfe77e2a0c57e66e13edd76f3cb7232b22c3913645dde67dce84859 CVE-2024-9984,0,0,8e8b1dff68b77e14ce417f91873fee227d0458654a790688014355062c7539a9,2024-10-16T22:03:23.407000 CVE-2024-9985,0,0,35f031595deb3bfd21882874fada51cff590c3c6a37f03f4259fa4136f5b9157,2024-10-16T22:02:08.117000 CVE-2024-9986,0,0,f83b3609bd670a0cfc3a1c687a45465cc896c6d69e9f1c37efb33a43ca882e79,2024-10-21T13:07:47.700000 -CVE-2024-9987,0,0,2fc9d3fa3d6f4a94d8c02299e2f4be1487dde9c0790750bfc65dc5695ac94c18,2024-10-23T15:12:34.673000 +CVE-2024-9987,0,1,b4e78fb8d0c1bab610593085dcb79fb387a1d85dc24b4ac387edaf5184ee7742,2024-10-25T19:06:35.350000 CVE-2024-9991,0,0,135856d748c7daa954bd600476aafa57f64f806d190f4c4bca162ba71620ec7a,2024-10-25T13:15:18.250000