From d6f3730125d3975928a353de74be311e388e274a Mon Sep 17 00:00:00 2001
From: cad-safe-bot <cad-safe-bot@protonmail.com>
Date: Fri, 25 Oct 2024 20:03:18 +0000
Subject: [PATCH] Auto-Update: 2024-10-25T20:00:18.737714+00:00

---
 CVE-2021/CVE-2021-331xx/CVE-2021-33145.json |  12 +-
 CVE-2022/CVE-2022-303xx/CVE-2022-30355.json |  39 ++-
 CVE-2022/CVE-2022-489xx/CVE-2022-48975.json | 122 ++++++-
 CVE-2022/CVE-2022-489xx/CVE-2022-48976.json | 110 ++++++-
 CVE-2022/CVE-2022-489xx/CVE-2022-48977.json | 148 ++++++++-
 CVE-2022/CVE-2022-489xx/CVE-2022-48978.json | 182 ++++++++++-
 CVE-2022/CVE-2022-489xx/CVE-2022-48979.json | 109 ++++++-
 CVE-2022/CVE-2022-489xx/CVE-2022-48980.json | 122 ++++++-
 CVE-2022/CVE-2022-489xx/CVE-2022-48981.json | 146 ++++++++-
 CVE-2022/CVE-2022-489xx/CVE-2022-48982.json | 133 +++++++-
 CVE-2023/CVE-2023-364xx/CVE-2023-36490.json |  63 +++-
 CVE-2023/CVE-2023-370xx/CVE-2023-37057.json |  14 +-
 CVE-2023/CVE-2023-381xx/CVE-2023-38135.json |  56 +++-
 CVE-2023/CVE-2023-385xx/CVE-2023-38561.json |  57 +++-
 CVE-2023/CVE-2023-401xx/CVE-2023-40156.json |  57 +++-
 CVE-2023/CVE-2023-508xx/CVE-2023-50806.json |   4 +-
 CVE-2023/CVE-2023-72xx/CVE-2023-7261.json   |  14 +-
 CVE-2024/CVE-2024-100xx/CVE-2024-10045.json |  37 ++-
 CVE-2024/CVE-2024-102xx/CVE-2024-10298.json |  64 +++-
 CVE-2024/CVE-2024-102xx/CVE-2024-10299.json |  58 +++-
 CVE-2024/CVE-2024-103xx/CVE-2024-10300.json |  65 +++-
 CVE-2024/CVE-2024-103xx/CVE-2024-10301.json |  65 +++-
 CVE-2024/CVE-2024-16xx/CVE-2024-1694.json   |  14 +-
 CVE-2024/CVE-2024-217xx/CVE-2024-21741.json |  14 +-
 CVE-2024/CVE-2024-218xx/CVE-2024-21828.json |  12 +-
 CVE-2024/CVE-2024-220xx/CVE-2024-22020.json |  14 +-
 CVE-2024/CVE-2024-228xx/CVE-2024-22855.json |  19 +-
 CVE-2024/CVE-2024-237xx/CVE-2024-23709.json |   4 +-
 CVE-2024/CVE-2024-237xx/CVE-2024-23766.json |  14 +-
 CVE-2024/CVE-2024-288xx/CVE-2024-28805.json |  14 +-
 CVE-2024/CVE-2024-288xx/CVE-2024-28820.json |  14 +-
 CVE-2024/CVE-2024-313xx/CVE-2024-31331.json |  14 +-
 CVE-2024/CVE-2024-333xx/CVE-2024-33375.json |  14 +-
 CVE-2024/CVE-2024-337xx/CVE-2024-33781.json |   4 +-
 CVE-2024/CVE-2024-343xx/CVE-2024-34329.json |  14 +-
 CVE-2024/CVE-2024-347xx/CVE-2024-34724.json |   4 +-
 CVE-2024/CVE-2024-353xx/CVE-2024-35308.json |  60 +++-
 CVE-2024/CVE-2024-360xx/CVE-2024-36037.json |  12 +-
 CVE-2024/CVE-2024-365xx/CVE-2024-36540.json |  14 +-
 CVE-2024/CVE-2024-365xx/CVE-2024-36542.json |  14 +-
 CVE-2024/CVE-2024-372xx/CVE-2024-37289.json |  14 +-
 CVE-2024/CVE-2024-375xx/CVE-2024-37570.json |   4 +-
 CVE-2024/CVE-2024-376xx/CVE-2024-37634.json |  14 +-
 CVE-2024/CVE-2024-376xx/CVE-2024-37661.json |  14 +-
 CVE-2024/CVE-2024-378xx/CVE-2024-37844.json |  25 ++
 CVE-2024/CVE-2024-378xx/CVE-2024-37845.json |  25 ++
 CVE-2024/CVE-2024-378xx/CVE-2024-37846.json |  25 ++
 CVE-2024/CVE-2024-378xx/CVE-2024-37847.json |  25 ++
 CVE-2024/CVE-2024-385xx/CVE-2024-38576.json |  14 +-
 CVE-2024/CVE-2024-388xx/CVE-2024-38873.json |  14 +-
 CVE-2024/CVE-2024-389xx/CVE-2024-38902.json |  14 +-
 CVE-2024/CVE-2024-389xx/CVE-2024-38909.json |  14 +-
 CVE-2024/CVE-2024-392xx/CVE-2024-39223.json |   4 +-
 CVE-2024/CVE-2024-392xx/CVE-2024-39251.json |  14 +-
 CVE-2024/CVE-2024-414xx/CVE-2024-41461.json |   4 +-
 CVE-2024/CVE-2024-416xx/CVE-2024-41601.json |  14 +-
 CVE-2024/CVE-2024-435xx/CVE-2024-43572.json | 339 ++++----------------
 CVE-2024/CVE-2024-435xx/CVE-2024-43573.json | 335 ++++---------------
 CVE-2024/CVE-2024-438xx/CVE-2024-43844.json |  70 +++-
 CVE-2024/CVE-2024-438xx/CVE-2024-43845.json |  92 +++++-
 CVE-2024/CVE-2024-438xx/CVE-2024-43846.json | 109 ++++++-
 CVE-2024/CVE-2024-438xx/CVE-2024-43847.json |  82 ++++-
 CVE-2024/CVE-2024-440xx/CVE-2024-44099.json |  39 ++-
 CVE-2024/CVE-2024-441xx/CVE-2024-44100.json |  39 ++-
 CVE-2024/CVE-2024-441xx/CVE-2024-44101.json |  39 ++-
 CVE-2024/CVE-2024-462xx/CVE-2024-46240.json |  57 +++-
 CVE-2024/CVE-2024-470xx/CVE-2024-47012.json |  39 ++-
 CVE-2024/CVE-2024-470xx/CVE-2024-47013.json |  39 ++-
 CVE-2024/CVE-2024-470xx/CVE-2024-47014.json |  39 ++-
 CVE-2024/CVE-2024-481xx/CVE-2024-48139.json |  39 ++-
 CVE-2024/CVE-2024-481xx/CVE-2024-48140.json |  39 ++-
 CVE-2024/CVE-2024-481xx/CVE-2024-48141.json |  39 ++-
 CVE-2024/CVE-2024-481xx/CVE-2024-48142.json |  39 ++-
 CVE-2024/CVE-2024-481xx/CVE-2024-48143.json |  39 ++-
 CVE-2024/CVE-2024-483xx/CVE-2024-48343.json |  21 ++
 CVE-2024/CVE-2024-484xx/CVE-2024-48448.json |  21 ++
 CVE-2024/CVE-2024-484xx/CVE-2024-48450.json |  21 ++
 CVE-2024/CVE-2024-485xx/CVE-2024-48570.json |  57 +++-
 CVE-2024/CVE-2024-487xx/CVE-2024-48700.json |  21 ++
 CVE-2024/CVE-2024-487xx/CVE-2024-48706.json |  59 +++-
 CVE-2024/CVE-2024-487xx/CVE-2024-48707.json |  57 +++-
 CVE-2024/CVE-2024-487xx/CVE-2024-48708.json |  57 +++-
 CVE-2024/CVE-2024-499xx/CVE-2024-49996.json |  94 +++++-
 CVE-2024/CVE-2024-500xx/CVE-2024-50000.json | 123 ++++++-
 CVE-2024/CVE-2024-500xx/CVE-2024-50012.json |  93 +++++-
 CVE-2024/CVE-2024-500xx/CVE-2024-50013.json | 130 +++++++-
 CVE-2024/CVE-2024-51xx/CVE-2024-5159.json   |   4 +-
 CVE-2024/CVE-2024-58xx/CVE-2024-5836.json   |  12 +-
 CVE-2024/CVE-2024-66xx/CVE-2024-6611.json   |  14 +-
 CVE-2024/CVE-2024-95xx/CVE-2024-9530.json   |  44 ++-
 CVE-2024/CVE-2024-95xx/CVE-2024-9584.json   |  60 ++++
 CVE-2024/CVE-2024-95xx/CVE-2024-9585.json   |  60 ++++
 CVE-2024/CVE-2024-99xx/CVE-2024-9987.json   |  60 +++-
 README.md                                   |  94 +++---
 _state.csv                                  | 294 +++++++++--------
 95 files changed, 3771 insertions(+), 1322 deletions(-)
 create mode 100644 CVE-2024/CVE-2024-378xx/CVE-2024-37844.json
 create mode 100644 CVE-2024/CVE-2024-378xx/CVE-2024-37845.json
 create mode 100644 CVE-2024/CVE-2024-378xx/CVE-2024-37846.json
 create mode 100644 CVE-2024/CVE-2024-378xx/CVE-2024-37847.json
 create mode 100644 CVE-2024/CVE-2024-483xx/CVE-2024-48343.json
 create mode 100644 CVE-2024/CVE-2024-484xx/CVE-2024-48448.json
 create mode 100644 CVE-2024/CVE-2024-484xx/CVE-2024-48450.json
 create mode 100644 CVE-2024/CVE-2024-487xx/CVE-2024-48700.json
 create mode 100644 CVE-2024/CVE-2024-95xx/CVE-2024-9584.json
 create mode 100644 CVE-2024/CVE-2024-95xx/CVE-2024-9585.json

diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33145.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33145.json
index b7df78d8778..10e82cc1edc 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33145.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33145.json
@@ -2,7 +2,7 @@
   "id": "CVE-2021-33145",
   "sourceIdentifier": "secure@intel.com",
   "published": "2024-02-23T21:15:09.410",
-  "lastModified": "2024-07-03T01:36:45.387",
+  "lastModified": "2024-10-25T19:35:00.780",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -49,16 +49,6 @@
           "value": "CWE-248"
         }
       ]
-    },
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-248"
-        }
-      ]
     }
   ],
   "references": [
diff --git a/CVE-2022/CVE-2022-303xx/CVE-2022-30355.json b/CVE-2022/CVE-2022-303xx/CVE-2022-30355.json
index 6e7768af383..584ada2f714 100644
--- a/CVE-2022/CVE-2022-303xx/CVE-2022-30355.json
+++ b/CVE-2022/CVE-2022-303xx/CVE-2022-30355.json
@@ -2,7 +2,7 @@
   "id": "CVE-2022-30355",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-10-25T16:15:08.733",
-  "lastModified": "2024-10-25T16:15:08.733",
+  "lastModified": "2024-10-25T19:35:01.173",
   "vulnStatus": "Received",
   "cveTags": [],
   "descriptions": [
@@ -11,7 +11,42 @@
       "value": "OvalEdge 5.2.8.0 and earlier is affected by an Account Takeover vulnerability via a POST request to /profile/updateProfile via the userId and email parameters. Authentication is required."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+        "type": "Secondary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "NONE",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "HIGH",
+          "availabilityImpact": "HIGH",
+          "baseScore": 9.8,
+          "baseSeverity": "CRITICAL"
+        },
+        "exploitabilityScore": 3.9,
+        "impactScore": 5.9
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+      "type": "Secondary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-276"
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/account-takeover#cve-2022-30355",
diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48975.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48975.json
index 586ebb149bf..29dfd83fb4f 100644
--- a/CVE-2022/CVE-2022-489xx/CVE-2022-48975.json
+++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48975.json
@@ -2,8 +2,8 @@
   "id": "CVE-2022-48975",
   "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
   "published": "2024-10-21T20:15:09.597",
-  "lastModified": "2024-10-23T15:13:25.583",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T18:48:57.490",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -15,19 +15,129 @@
       "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gpiolib: reparar p\u00e9rdida de memoria en gpiochip_setup_dev() Aqu\u00ed hay un informe de seguimiento sobre la p\u00e9rdida de memoria detectada en gpiochip_setup_dev(): objeto sin referencia 0xffff88810b406400 (tama\u00f1o 512): comm \"python3\", pid 1682, jiffies 4295346908 (edad 24.090s) seguimiento: kmalloc_trace device_add device_private_init en drivers/base/core.c:3361 (en l\u00ednea por) device_add en drivers/base/core.c:3411 cdev_device_add gpiolib_cdev_register gpiochip_setup_dev gpiochip_add_data_with_key gcdev_register() y gcdev_unregister() llamar\u00edan device_add() y device_del() (sin importar si CONFIG_GPIO_CDEV est\u00e1 habilitado o no) para registrar/anular el registro del dispositivo. Sin embargo, si device_add() tiene \u00e9xito, alg\u00fan recurso (como la estructura device_private asignada por device_private_init()) no es liberado por device_del(). Por lo tanto, despu\u00e9s de que device_add() tenga \u00e9xito por gcdev_register(), necesita llamar a put_device() para liberar el recurso en la ruta del controlador de error. Aqu\u00ed avanzamos el registro de la funci\u00f3n de liberaci\u00f3n y dejamos que libere cada pieza de recurso por put_device() en lugar de kfree(). Mientras lo hacemos, solucionamos otro problema sutil, es decir, cuando gc-&gt;ngpio es igual a 0, todav\u00eda llamamos a kcalloc() y, en caso de un error adicional, a kfree() en el puntero ZERO_PTR, que no es NULL. No es un error en s\u00ed, sino m\u00e1s bien un desperdicio de recursos y una expectativa potencialmente err\u00f3nea sobre el contenido de la variable gdev-&gt;descs."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "NONE",
+          "integrityImpact": "NONE",
+          "availabilityImpact": "HIGH",
+          "baseScore": 5.5,
+          "baseSeverity": "MEDIUM"
+        },
+        "exploitabilityScore": 1.8,
+        "impactScore": 3.6
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-401"
+        }
+      ]
+    }
+  ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "4.6",
+              "versionEndExcluding": "5.15.83",
+              "matchCriteriaId": "DF176C32-811C-421C-964D-E3513DD1789F"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.16",
+              "versionEndExcluding": "6.0.13",
+              "matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
+              "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
+              "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
+              "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
+              "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
+              "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
+              "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
+              "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*",
+              "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://git.kernel.org/stable/c/371363716398ed718e389bea8c5e9843a79dde4e",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/6daaa84b621485fe28c401be18debf92ae8ef04a",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/ec851b23084b3a0af8bf0f5e51d33a8d678bdc49",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48976.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48976.json
index aa48350667b..04bc86da74a 100644
--- a/CVE-2022/CVE-2022-489xx/CVE-2022-48976.json
+++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48976.json
@@ -2,8 +2,8 @@
   "id": "CVE-2022-48976",
   "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
   "published": "2024-10-21T20:15:09.680",
-  "lastModified": "2024-10-23T15:13:25.583",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T18:47:40.823",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -15,15 +15,115 @@
       "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: netfilter: flowtable_offload: correcci\u00f3n al usar __this_cpu_add en preemptible flow_offload_queue_work() se puede llamar en workqueue sin bh deshabilitado, como el seguimiento de llamadas que mostr\u00f3 en mi prueba act_ct, llamar a NF_FLOW_TABLE_STAT_INC() all\u00ed causar\u00eda un seguimiento de llamadas: ERROR: usar __this_cpu_add() en preemptible [00000000] c\u00f3digo: kworker/u4:0/138560 el llamador es flow_offload_queue_work+0xec/0x1b0 [nf_flow_table] Workqueue: act_ct_workqueue tcf_ct_flow_table_cleanup_work [act_ct] Seguimiento de llamadas:  dump_stack_lvl+0x33/0x46 check_preemption_disabled+0xc3/0xf0 Este parche lo corrige al usar NF_FLOW_TABLE_STAT_INC_ATOMIC() en lugar de flow_offload_queue_work(). Tenga en cuenta que para la rama FLOW_CLS_REPLACE en flow_offload_queue_work(), es posible que no se la llame en una ruta preemptible, pero es bueno usar NF_FLOW_TABLE_STAT_INC_ATOMIC() para todos los casos en flow_offload_queue_work()."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "NONE",
+          "integrityImpact": "NONE",
+          "availabilityImpact": "HIGH",
+          "baseScore": 5.5,
+          "baseSeverity": "MEDIUM"
+        },
+        "exploitabilityScore": 1.8,
+        "impactScore": 3.6
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "NVD-CWE-noinfo"
+        }
+      ]
+    }
+  ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.15.157",
+              "versionEndExcluding": "6.0.13",
+              "matchCriteriaId": "3FC10E8F-D0FF-45C4-A8F5-7ABB6F91A19E"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
+              "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
+              "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
+              "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
+              "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
+              "matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*",
+              "matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc7:*:*:*:*:*:*",
+              "matchCriteriaId": "DE5298B3-04B4-4F3E-B186-01A58B5C75A6"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc8:*:*:*:*:*:*",
+              "matchCriteriaId": "E9D7C49C-53E7-4B23-9AFE-DAC5A18B153A"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://git.kernel.org/stable/c/a220a11fda012fba506b35929672374c2723ae6d",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/a81047154e7ce4eb8769d5d21adcbc9693542a79",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48977.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48977.json
index 5468b59b8c8..d4502c7a92e 100644
--- a/CVE-2022/CVE-2022-489xx/CVE-2022-48977.json
+++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48977.json
@@ -2,8 +2,8 @@
   "id": "CVE-2022-48977",
   "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
   "published": "2024-10-21T20:15:09.763",
-  "lastModified": "2024-10-23T15:13:25.583",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T18:47:07.357",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -12,30 +12,160 @@
     },
     {
       "lang": "es",
-      "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: af_can: fix NULL pointer dereference in can_rcv_filter De manera an\u00e1loga a el commit 8aa59e355949 (\"can: af_can: fix NULL pointer dereference in can_rx_register()\"), debemos comprobar si falta una inicializaci\u00f3n de ml_priv en la ruta de recepci\u00f3n de los marcos CAN. Desde el commit 4e096a18867a (\"net: introduce CAN specific pointer in the struct net_device\"), la comprobaci\u00f3n de que dev-&gt;type sea ARPHRD_CAN ya no es suficiente, ya que los netdevices bonding o tun afirman ser dispositivos CAN pero no inicializan ml_priv en consecuencia."
+      "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: af_can: fix NULL pointer dereference in can_rcv_filter De manera an\u00e1loga a el commit 8aa59e355949 (\"can: af_can: fix NULL pointer dereference in can_rx_register()\"), debemos comprobar si falta una inicializaci\u00f3n de ml_priv en la ruta de recepci\u00f3n de los marcos CAN. Desde el commit 4e096a18867a (\"net: introduzca el puntero espec\u00edfico de CAN en la estructura net_device\"), la verificaci\u00f3n de que dev-&gt;type sea ARPHRD_CAN ya no es suficiente ya que los dispositivos de red vinculados o sintonizados afirman ser dispositivos CAN pero no inicializan ml_priv en consecuencia."
+    }
+  ],
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "NONE",
+          "integrityImpact": "NONE",
+          "availabilityImpact": "HIGH",
+          "baseScore": 5.5,
+          "baseSeverity": "MEDIUM"
+        },
+        "exploitabilityScore": 1.8,
+        "impactScore": 3.6
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-476"
+        }
+      ]
+    }
+  ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.4.110",
+              "versionEndExcluding": "5.4.227",
+              "matchCriteriaId": "F5FB1A61-365F-4CA9-9623-69C6889A6E49"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.10.28",
+              "versionEndExcluding": "5.10.159",
+              "matchCriteriaId": "B4EFBE85-872C-4731-AD53-6DB3F3132B63"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.11.12",
+              "versionEndExcluding": "5.15.83",
+              "matchCriteriaId": "34D9B7A6-0CC8-4839-B206-AF0CEAC1CAFE"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.16",
+              "versionEndExcluding": "6.0.13",
+              "matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
+              "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
+              "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
+              "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
+              "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
+              "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
+              "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
+              "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*",
+              "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872"
+            }
+          ]
+        }
+      ]
     }
   ],
-  "metrics": {},
   "references": [
     {
       "url": "https://git.kernel.org/stable/c/0acc442309a0a1b01bcdaa135e56e6398a49439c",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/3982652957e8d79ac32efcb725450580650a8644",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/c142cba37de29f740a3852f01f59876af8ae462a",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/c42221efb1159d6a3c89e96685ee38acdce86b6f",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/fcc63f2f7ee3038d53216edd0d8291e57c752557",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48978.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48978.json
index 5068bbad56f..ee9fb453796 100644
--- a/CVE-2022/CVE-2022-489xx/CVE-2022-48978.json
+++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48978.json
@@ -2,8 +2,8 @@
   "id": "CVE-2022-48978",
   "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
   "published": "2024-10-21T20:15:09.850",
-  "lastModified": "2024-10-23T15:13:25.583",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T18:46:23.317",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -15,39 +15,199 @@
       "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: HID: n\u00facleo: se corrige un desplazamiento fuera de los l\u00edmites en hid_report_raw_event Syzbot inform\u00f3 un desplazamiento fuera de los l\u00edmites en hid_report_raw_event. microsoft 0003:045E:07DA.0001: hid_field_extract() llamado con n (128) &gt; 32! (swapper/0) ========================================================================== UBSAN: cambio fuera de los l\u00edmites en drivers/hid/hid-core.c:1323:20 el exponente de cambio 127 es demasiado grande para el tipo de 32 bits 'int' CPU: 0 PID: 0 Comm: swapper/0 No contaminado 6.1.0-rc4-syzkaller-00159-g4bbf3422df78 #0 Nombre del hardware: Google Compute Engine/Google Compute Engine, BIOS Google 26/10/2022 Rastreo de llamadas:  __dump_stack lib/dump_stack.c:88 [en l\u00ednea] dump_stack_lvl+0x1e3/0x2cb lib/dump_stack.c:106 ubsan_epilogue lib/ubsan.c:151 [en l\u00ednea] __ubsan_handle_shift_out_of_bounds+0x3a6/0x420 lib/ubsan.c:322 snto32 drivers/hid/hid-core.c:1323 [en l\u00ednea] hid_input_fetch_field drivers/hid/hid-core.c:1572 [en l\u00ednea] hid_process_report drivers/hid/hid-core.c:1665 [en l\u00ednea] hid_report_raw_event+0xd56/0x18b0 drivers/hid/hid-core.c:1998 hid_input_report+0x408/0x4f0 drivers/hid/hid-core.c:2066 hid_irq_in+0x459/0x690 drivers/hid/usbhid/hid-core.c:284 __usb_hcd_giveback_urb+0x369/0x530 drivers/usb/core/hcd.c:1671 dummy_timer+0x86b/0x3110 drivers/usb/gadget/udc/dummy_hcd.c:1988 call_timer_fn+0xf5/0x210 kernel/time/timer.c:1474 expire_timers kernel/time/timer.c:1519 [en l\u00ednea] __run_timers+0x76a/0x980 kernel/time/timer.c:1790 run_timer_softirq+0x63/0xf0 kernel/time/timer.c:1803 __do_softirq+0x277/0x75b kernel/softirq.c:571 __irq_exit_rcu+0xec/0x170 kernel/softirq.c:650 irq_exit_rcu+0x5/0x20 kernel/softirq.c:662 sysvec_apic_timer_interrupt+0x91/0xb0 arch/x86/kernel/apic/apic.c:1107 ================================================================================== Si el tama\u00f1o del entero (n sin signo) es mayor que 32 en snto32(), el exponente de desplazamiento ser\u00e1 demasiado grande para 32 bits. Tipo 'int', lo que genera un error de desplazamiento fuera de los l\u00edmites. Solucione este problema agregando una verificaci\u00f3n del tama\u00f1o del entero (n sin signo) en snto32(). Para agregar compatibilidad con n mayor que 32 bits, configure n en 32, si n es mayor que 32."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "NONE",
+          "integrityImpact": "NONE",
+          "availabilityImpact": "HIGH",
+          "baseScore": 5.5,
+          "baseSeverity": "MEDIUM"
+        },
+        "exploitabilityScore": 1.8,
+        "impactScore": 3.6
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "NVD-CWE-Other"
+        }
+      ]
+    }
+  ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "2.6.20",
+              "versionEndExcluding": "4.9.336",
+              "matchCriteriaId": "216EAACF-C9C3-4743-AC2C-A93410590082"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "4.10",
+              "versionEndExcluding": "4.14.302",
+              "matchCriteriaId": "FB3E1F82-01A3-456E-9C83-D567B9A75815"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "4.15",
+              "versionEndExcluding": "4.19.269",
+              "matchCriteriaId": "1185B8E3-712E-4BFB-BD01-78D47F7EF1F2"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "4.20",
+              "versionEndExcluding": "5.4.227",
+              "matchCriteriaId": "8C752145-904B-474A-A7F2-E9F29353B0FE"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.5",
+              "versionEndExcluding": "5.10.159",
+              "matchCriteriaId": "7318B597-DFFD-4BBC-A947-539D6E30D82A"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.11",
+              "versionEndExcluding": "5.15.83",
+              "matchCriteriaId": "90897BD1-104D-4CFF-94F5-29F9041217FB"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.16",
+              "versionEndExcluding": "6.0.13",
+              "matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
+              "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
+              "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
+              "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
+              "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
+              "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
+              "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
+              "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*",
+              "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://git.kernel.org/stable/c/151493fe5a6ed1a88decc929a7368a3f2a246914",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/2b3b4d7aadaa1b6b58d0f34823bf86cfe8a31b4d",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/809783f8b4b600c7fb3bccb10fefef822601ea3b",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/8e14f20e12224ee2429f75a5c9418a700e26a8d3",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/bc03f809da78fc79e4aee132d4e5c6a2b3aeec73",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/db1ed1b3fb4ec0d19080a102956255769bc45c79",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/ec61b41918587be530398b0d1c9a0d16619397e5",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/f755d11c55b29049b77da5cd9ab2faae96eb33c3",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48979.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48979.json
index c7d1d61f0d2..1b542900708 100644
--- a/CVE-2022/CVE-2022-489xx/CVE-2022-48979.json
+++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48979.json
@@ -2,8 +2,8 @@
   "id": "CVE-2022-48979",
   "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
   "published": "2024-10-21T20:15:09.947",
-  "lastModified": "2024-10-23T15:13:25.583",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T18:40:16.227",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -15,15 +15,114 @@
       "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: se corrige el error de \u00edndice de matriz fuera de l\u00edmite en DCN32 DML [Por qu\u00e9 y c\u00f3mo] La matriz LinkCapacitySupport est\u00e1 indexada con la cantidad de estados de voltaje y no con la cantidad m\u00e1xima de DPP. Corrija el error modificando la declaraci\u00f3n de la matriz para utilizar el tama\u00f1o de matriz correcto (m\u00e1s grande) de la cantidad total de estados de voltaje."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "NONE",
+          "integrityImpact": "NONE",
+          "availabilityImpact": "HIGH",
+          "baseScore": 5.5,
+          "baseSeverity": "MEDIUM"
+        },
+        "exploitabilityScore": 1.8,
+        "impactScore": 3.6
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-129"
+        }
+      ]
+    }
+  ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionEndExcluding": "6.0.13",
+              "matchCriteriaId": "307077FA-2651-41AE-A0DB-B92E0E7F5AE0"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
+              "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
+              "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
+              "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
+              "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
+              "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
+              "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
+              "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*",
+              "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://git.kernel.org/stable/c/3d8a298b2e83b98042e6ec726e934f535b23e6aa",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/aeffc8fb2174f017a10df114bc312f899904dc68",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48980.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48980.json
index e3c69fc49e1..5f6e39fabcc 100644
--- a/CVE-2022/CVE-2022-489xx/CVE-2022-48980.json
+++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48980.json
@@ -2,8 +2,8 @@
   "id": "CVE-2022-48980",
   "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
   "published": "2024-10-21T20:15:10.037",
-  "lastModified": "2024-10-23T15:13:25.583",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T18:36:00.703",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -15,19 +15,129 @@
       "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dsa: sja1105: evitar acceso fuera de los l\u00edmites en sja1105_init_l2_policing() La familia SJA1105 tiene 45 entradas de tabla de control de L2 (SJA1105_MAX_L2_POLICING_COUNT) y SJA1110 tiene 110 (SJA1110_MAX_L2_POLICING_COUNT). Mantener la estructura de la tabla pero tener en cuenta la diferencia en el recuento de puertos (5 en SJA1105 frente a 10 en SJA1110) no explica completamente la diferencia. En cambio, SJA1110 tambi\u00e9n tiene controladores de ingreso de L2 para tr\u00e1fico de multidifusi\u00f3n. Si un paquete se clasifica como de multidifusi\u00f3n, ser\u00e1 procesado por el \u00edndice de controlador 99 + SRCPORT. La funci\u00f3n sja1105_init_l2_policing() inicializa todos los controladores de L2 de modo que no interfieran con la recepci\u00f3n normal de paquetes de forma predeterminada. Para tener un c\u00f3digo com\u00fan entre SJA1105 y SJA1110, se calcula el \u00edndice del controlador de multidifusi\u00f3n para el puerto porque es un \u00edndice que est\u00e1 fuera de los l\u00edmites para SJA1105 pero dentro de los l\u00edmites para SJA1110, y se realiza una comprobaci\u00f3n de los l\u00edmites. El c\u00f3digo no hace lo correcto al determinar qu\u00e9 hacer con el controlador de multidifusi\u00f3n del puerto 0 en SJA1105 (ds-&gt;num_ports = 5). El \u00edndice \"mcast\" ser\u00e1 igual a 45, que tambi\u00e9n es igual a table-&gt;ops-&gt;max_entry_count (SJA1105_MAX_L2_POLICING_COUNT). Por lo tanto, pasa por la comprobaci\u00f3n. Pero al mismo tiempo, SJA1105 no tiene controladores de multidifusi\u00f3n. Por lo tanto, el c\u00f3digo programa el campo SHARINDX de un elemento fuera de los l\u00edmites en la tabla de control L2 de la configuraci\u00f3n est\u00e1tica. La comparaci\u00f3n entre las entradas del \u00edndice 45 y 45 deber\u00eda haber determinado que el c\u00f3digo no accediera a este \u00edndice de control en SJA1105, ya que su memoria ni siquiera estaba asignada. Con suficiente mala suerte, la escritura fuera de los l\u00edmites podr\u00eda incluso sobrescribir otros datos v\u00e1lidos del kernel, pero en este caso, el problema se detect\u00f3 mediante KASAN. Registro del n\u00facleo: sja1105 spi5.0: Chip conmutador sondeado: SJA1105Q ===================================================================== ERROR: KASAN: slab fuera de los l\u00edmites en sja1105_setup+0x1cbc/0x2340 Escritura de tama\u00f1o 8 en la direcci\u00f3n ffffff880bd57708 por la tarea kworker/u8:0/8 ... Cola de trabajo: events_unbound deferred_probe_work_func Rastreo de llamadas: ... sja1105_setup+0x1cbc/0x2340 dsa_register_switch+0x1284/0x18d0 sja1105_probe+0x748/0x840 ... Asignado por la tarea 8: ... sja1105_setup+0x1bcc/0x2340 dsa_register_switch+0x1284/0x18d0 sja1105_probe+0x748/0x840 ..."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "HIGH",
+          "availabilityImpact": "HIGH",
+          "baseScore": 7.8,
+          "baseSeverity": "HIGH"
+        },
+        "exploitabilityScore": 1.8,
+        "impactScore": 5.9
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-787"
+        }
+      ]
+    }
+  ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.14",
+              "versionEndExcluding": "5.15.83",
+              "matchCriteriaId": "0CB0CF0B-86CE-444B-829F-234C83EB7764"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.16",
+              "versionEndExcluding": "6.0.13",
+              "matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
+              "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
+              "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
+              "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
+              "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
+              "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
+              "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
+              "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*",
+              "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://git.kernel.org/stable/c/147f3e3d84054117ae6b9bf317ec4fda9f991192",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/5e88c6f4aaa70c542e59e5a9d2244bcc99cd245d",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/f8bac7f9fdb0017b32157957ffffd490f95faa07",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48981.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48981.json
index d9a0bbfc513..daa45e3af6f 100644
--- a/CVE-2022/CVE-2022-489xx/CVE-2022-48981.json
+++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48981.json
@@ -2,8 +2,8 @@
   "id": "CVE-2022-48981",
   "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
   "published": "2024-10-21T20:15:10.130",
-  "lastModified": "2024-10-23T15:13:25.583",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T18:33:18.783",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -15,27 +15,157 @@
       "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/shmem-helper: eliminar una ubicaci\u00f3n errada en la ruta de error drm_gem_shmem_mmap() no posee esta referencia, lo que provoca que el objeto GEM se libere prematuramente y lleve a un use after free."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "HIGH",
+          "availabilityImpact": "HIGH",
+          "baseScore": 7.8,
+          "baseSeverity": "HIGH"
+        },
+        "exploitabilityScore": 1.8,
+        "impactScore": 5.9
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-416"
+        }
+      ]
+    }
+  ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.2",
+              "versionEndExcluding": "5.4.227",
+              "matchCriteriaId": "7B395613-A8F7-4D25-ACBF-81183F723931"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.5",
+              "versionEndExcluding": "5.10.159",
+              "matchCriteriaId": "7318B597-DFFD-4BBC-A947-539D6E30D82A"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.11",
+              "versionEndExcluding": "5.15.83",
+              "matchCriteriaId": "90897BD1-104D-4CFF-94F5-29F9041217FB"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.16",
+              "versionEndExcluding": "6.0.13",
+              "matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
+              "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
+              "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
+              "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
+              "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
+              "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
+              "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
+              "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*",
+              "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://git.kernel.org/stable/c/24013314be6ee4ee456114a671e9fa3461323de8",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/585a07b820059462e0c93b76c7de2cd946b26b40",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/586847b98e20ab02212ca5c1fc46680384e68a28",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/6a4da05acd062ae7774b6b19cef2b7d922902d36",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/83e3da8bb92fcfa7a1d232cf55f9e6c49bb84942",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48982.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48982.json
index 22abb6b2d5d..e76682929d2 100644
--- a/CVE-2022/CVE-2022-489xx/CVE-2022-48982.json
+++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48982.json
@@ -2,8 +2,8 @@
   "id": "CVE-2022-48982",
   "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
   "published": "2024-10-21T20:15:10.210",
-  "lastModified": "2024-10-23T15:13:25.583",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T18:12:52.270",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -15,23 +15,142 @@
       "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Bluetooth: Se soluciona el fallo al volver a conectar controladores falsos de CSR Parece que los clones falsos de CSR 5.0 pueden provocar que el notificador de suspensi\u00f3n se registre dos veces, lo que provoca el siguiente p\u00e1nico del kernel: [ 71.986122] Seguimiento de llamadas: [ 71.986124]  [ 71.986125] blocking_notifier_chain_register+0x33/0x60 [ 71.986130] hci_register_dev+0x316/0x3d0 [bluetooth 99b5497ea3d09708fa1366c1dc03288bf3cca8da] [ 71.986154] btusb_probe+0x979/0xd85 [btusb es: e1e0605a4f4c01984a4b9c8ac58c3666ae287477] [ 71.986159] ? __pm_runtime_set_status+0x1a9/0x300 [ 71.986162] ? ktime_get_mono_fast_ns+0x3e/0x90 [ 71.986167] interfaz_sonda_usb+0xe3/0x2b0 [ 71.986171] realmente_sonda+0xdb/0x380 [ 71.986174] ? pm_runtime_barrier+0x54/0x90 [ 71.986177] __driver_probe_device+0x78/0x170 [ 71.986180] __driver_probe_device+0x1f/0x90 [ 71.986183] __device_attach_driver+0x89/0x110 [ 71.986186] ? driver_allows_async_probing+0x70/0x70 [ 71.986189] bus_para_cada_unidad+0x8c/0xe0 [ 71.986192] __dispositivo_adjunto+0xb2/0x1e0 [ 71.986195] bus_sondeo_dispositivo+0x92/0xb0 [ 71.986198] dispositivo_agregado+0x422/0x9a0 [ 71.986201] ? usb_probe_device+0x3a/0x110 [ 71.986213] realmente_probe+0xdb/0x380 [ 71.986216] ? pm_runtime_barrier+0x54/0x90 [ 71.986219] __driver_probe_device+0x78/0x170 [ 71.986221] driver_probe_device+0x1f/0x90 [ 71.986224] __device_attach_driver+0x89/0x110 [ 71.986227] ? driver_allows_async_probing+0x70/0x70 [ 71.986230] bus_para_cada_unidad+0x8c/0xe0 [ 71.986232] __device_attach+0xb2/0x1e0 [ 71.986235] bus_probe_device+0x92/0xb0 [ 71.986237] device_add+0x422/0x9a0 [ 71.986239] ? _dev_info+0x7d/0x98 [ 71.986242] ? subproceso de rescate+0x3b0/0x3b0 [ 71.986264] kthread+0xdb/0x110 [ 71.986266] ? kthread_complete_and_exit+0x20/0x20 [ 71.986268] ret_from_fork+0x1f/0x30 [ 71.986273]  [ 71.986274] ---[ fin de seguimiento 000000000000000 ]--- [ 71.986284] btusb: la sonda de 2-1.6:1.0 fall\u00f3 con el error -17"
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "NONE",
+          "integrityImpact": "NONE",
+          "availabilityImpact": "HIGH",
+          "baseScore": 5.5,
+          "baseSeverity": "MEDIUM"
+        },
+        "exploitabilityScore": 1.8,
+        "impactScore": 3.6
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "NVD-CWE-noinfo"
+        }
+      ]
+    }
+  ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionEndExcluding": "5.10.159",
+              "matchCriteriaId": "231FA27F-3CFC-4735-9239-290B1E5FE075"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.11",
+              "versionEndExcluding": "5.15.83",
+              "matchCriteriaId": "90897BD1-104D-4CFF-94F5-29F9041217FB"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.16",
+              "versionEndExcluding": "6.0.13",
+              "matchCriteriaId": "389392A7-81C4-4C26-884B-8C7CF0F53DA4"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
+              "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
+              "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
+              "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
+              "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
+              "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
+              "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
+              "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*",
+              "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://git.kernel.org/stable/c/549b46f8130effccf168293270bb3b1d5da529cc",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/a49894a5ac3656f1a4f0f6b110460060e8026bf8",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/b5ca338751ad4783ec8d37b5d99c3e37b7813e59",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/dc8fa6570deadb70c3fb74d7cd8ce38849feaed0",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36490.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36490.json
index 8fdb378185d..746a0417fd5 100644
--- a/CVE-2023/CVE-2023-364xx/CVE-2023-36490.json
+++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36490.json
@@ -2,8 +2,8 @@
   "id": "CVE-2023-36490",
   "sourceIdentifier": "secure@intel.com",
   "published": "2024-02-14T14:16:00.667",
-  "lastModified": "2024-02-14T15:01:46.050",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T19:40:43.417",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -17,6 +17,26 @@
   ],
   "metrics": {
     "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "NONE",
+          "integrityImpact": "NONE",
+          "availabilityImpact": "HIGH",
+          "baseScore": 5.5,
+          "baseSeverity": "MEDIUM"
+        },
+        "exploitabilityScore": 1.8,
+        "impactScore": 3.6
+      },
       {
         "source": "secure@intel.com",
         "type": "Secondary",
@@ -40,6 +60,16 @@
     ]
   },
   "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "NVD-CWE-noinfo"
+        }
+      ]
+    },
     {
       "source": "secure@intel.com",
       "type": "Secondary",
@@ -51,10 +81,37 @@
       ]
     }
   ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:a:intel:memory_and_storage_tool:*:*:*:*:*:linux:*:*",
+              "versionEndExcluding": "2.3",
+              "matchCriteriaId": "B9C6E596-8C30-4C02-88C3-48479CA2CB8E"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:a:intel:memory_and_storage_tool:*:*:*:*:*:windows:*:*",
+              "versionEndExcluding": "2.3",
+              "matchCriteriaId": "E70B0EEA-5331-4BA0-BE22-2459E670205A"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00967.html",
-      "source": "secure@intel.com"
+      "source": "secure@intel.com",
+      "tags": [
+        "Vendor Advisory"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37057.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37057.json
index 3c2acd7f2b5..4fdd93495cb 100644
--- a/CVE-2023/CVE-2023-370xx/CVE-2023-37057.json
+++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37057.json
@@ -2,7 +2,7 @@
   "id": "CVE-2023-37057",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-06-17T21:15:50.380",
-  "lastModified": "2024-07-03T01:40:30.133",
+  "lastModified": "2024-10-25T19:35:02.943",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -39,18 +39,6 @@
       }
     ]
   },
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-288"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "http://jlink.com",
diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38135.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38135.json
index 9761967fcc2..4992e558412 100644
--- a/CVE-2023/CVE-2023-381xx/CVE-2023-38135.json
+++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38135.json
@@ -2,8 +2,8 @@
   "id": "CVE-2023-38135",
   "sourceIdentifier": "secure@intel.com",
   "published": "2024-02-14T14:16:01.080",
-  "lastModified": "2024-02-14T15:01:46.050",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T19:41:09.790",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -17,6 +17,26 @@
   ],
   "metrics": {
     "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "HIGH",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "HIGH",
+          "availabilityImpact": "HIGH",
+          "baseScore": 6.7,
+          "baseSeverity": "MEDIUM"
+        },
+        "exploitabilityScore": 0.8,
+        "impactScore": 5.9
+      },
       {
         "source": "secure@intel.com",
         "type": "Secondary",
@@ -40,6 +60,16 @@
     ]
   },
   "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "NVD-CWE-noinfo"
+        }
+      ]
+    },
     {
       "source": "secure@intel.com",
       "type": "Secondary",
@@ -51,10 +81,30 @@
       ]
     }
   ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:a:intel:performance_maximizer:*:*:*:*:*:*:*:*",
+              "matchCriteriaId": "9B406362-D75F-40C3-8A53-FA746FCBF4AF"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00958.html",
-      "source": "secure@intel.com"
+      "source": "secure@intel.com",
+      "tags": [
+        "Vendor Advisory"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38561.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38561.json
index 75b2566ba56..536554d9324 100644
--- a/CVE-2023/CVE-2023-385xx/CVE-2023-38561.json
+++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38561.json
@@ -2,8 +2,8 @@
   "id": "CVE-2023-38561",
   "sourceIdentifier": "secure@intel.com",
   "published": "2024-02-14T14:16:01.300",
-  "lastModified": "2024-02-14T15:01:46.050",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T19:58:38.973",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -17,6 +17,26 @@
   ],
   "metrics": {
     "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "HIGH",
+          "availabilityImpact": "HIGH",
+          "baseScore": 7.8,
+          "baseSeverity": "HIGH"
+        },
+        "exploitabilityScore": 1.8,
+        "impactScore": 5.9
+      },
       {
         "source": "secure@intel.com",
         "type": "Secondary",
@@ -40,6 +60,16 @@
     ]
   },
   "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "NVD-CWE-noinfo"
+        }
+      ]
+    },
     {
       "source": "secure@intel.com",
       "type": "Secondary",
@@ -51,10 +81,31 @@
       ]
     }
   ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:a:intel:extreme_tuning_utility:*:*:*:*:*:*:*:*",
+              "versionEndExcluding": "7.12.0.29",
+              "matchCriteriaId": "F68E64E6-DBCF-431D-B5D8-8A4AFF38143E"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00955.html",
-      "source": "secure@intel.com"
+      "source": "secure@intel.com",
+      "tags": [
+        "Vendor Advisory"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40156.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40156.json
index db9e7600880..1501c587fef 100644
--- a/CVE-2023/CVE-2023-401xx/CVE-2023-40156.json
+++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40156.json
@@ -2,8 +2,8 @@
   "id": "CVE-2023-40156",
   "sourceIdentifier": "secure@intel.com",
   "published": "2024-02-14T14:16:04.863",
-  "lastModified": "2024-02-14T15:01:46.050",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T19:59:00.933",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -17,6 +17,26 @@
   ],
   "metrics": {
     "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "HIGH",
+          "availabilityImpact": "HIGH",
+          "baseScore": 7.8,
+          "baseSeverity": "HIGH"
+        },
+        "exploitabilityScore": 1.8,
+        "impactScore": 5.9
+      },
       {
         "source": "secure@intel.com",
         "type": "Secondary",
@@ -40,6 +60,16 @@
     ]
   },
   "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-427"
+        }
+      ]
+    },
     {
       "source": "secure@intel.com",
       "type": "Secondary",
@@ -51,10 +81,31 @@
       ]
     }
   ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:a:intel:system_support_utility:*:*:*:*:*:windows:*:*",
+              "versionEndExcluding": "3.0.0.2",
+              "matchCriteriaId": "9AFED636-905C-44B4-A70D-1BA5ED3A9208"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01011.html",
-      "source": "secure@intel.com"
+      "source": "secure@intel.com",
+      "tags": [
+        "Vendor Advisory"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50806.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50806.json
index c89bd4ae263..b333e79c5af 100644
--- a/CVE-2023/CVE-2023-508xx/CVE-2023-50806.json
+++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50806.json
@@ -2,7 +2,7 @@
   "id": "CVE-2023-50806",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-07-09T19:15:10.820",
-  "lastModified": "2024-07-11T15:05:15.190",
+  "lastModified": "2024-10-25T18:35:02.050",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -46,7 +46,7 @@
       "description": [
         {
           "lang": "en",
-          "value": "CWE-122"
+          "value": "CWE-125"
         }
       ]
     }
diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7261.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7261.json
index d38c9acfa8b..a52be62dc27 100644
--- a/CVE-2023/CVE-2023-72xx/CVE-2023-7261.json
+++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7261.json
@@ -2,7 +2,7 @@
   "id": "CVE-2023-7261",
   "sourceIdentifier": "chrome-cve-admin@google.com",
   "published": "2024-06-07T20:15:10.887",
-  "lastModified": "2024-07-03T01:44:30.563",
+  "lastModified": "2024-10-25T19:35:03.273",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -39,18 +39,6 @@
       }
     ]
   },
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-233"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "https://issues.chromium.org/issues/40064602",
diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10045.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10045.json
index bd5703336fd..2c3362a4999 100644
--- a/CVE-2024/CVE-2024-100xx/CVE-2024-10045.json
+++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10045.json
@@ -2,8 +2,8 @@
   "id": "CVE-2024-10045",
   "sourceIdentifier": "security@wordfence.com",
   "published": "2024-10-23T08:15:02.380",
-  "lastModified": "2024-10-23T15:12:34.673",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T18:52:30.337",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -51,18 +51,45 @@
       ]
     }
   ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:a:wpbeginner:transients_manager:*:*:*:*:*:wordpress:*:*",
+              "versionEndExcluding": "2.0.7",
+              "matchCriteriaId": "35AAA6CC-C7DF-45F5-AF93-2BED68C3AC8C"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://plugins.trac.wordpress.org/browser/transients-manager/trunk/src/TransientsManager.php#L993",
-      "source": "security@wordfence.com"
+      "source": "security@wordfence.com",
+      "tags": [
+        "Product"
+      ]
     },
     {
       "url": "https://plugins.trac.wordpress.org/changeset/3171619/transients-manager/trunk/src/TransientsManager.php",
-      "source": "security@wordfence.com"
+      "source": "security@wordfence.com",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/03b8b5a2-979d-42d0-86f5-48ee73162d22?source=cve",
-      "source": "security@wordfence.com"
+      "source": "security@wordfence.com",
+      "tags": [
+        "Third Party Advisory"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10298.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10298.json
index a5501a7cef4..fd5d6cd3a65 100644
--- a/CVE-2024/CVE-2024-102xx/CVE-2024-10298.json
+++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10298.json
@@ -2,8 +2,8 @@
   "id": "CVE-2024-10298",
   "sourceIdentifier": "cna@vuldb.com",
   "published": "2024-10-23T19:15:14.920",
-  "lastModified": "2024-10-25T12:56:07.750",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T18:51:44.370",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -61,6 +61,26 @@
       }
     ],
     "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "HIGH",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "HIGH",
+          "availabilityImpact": "HIGH",
+          "baseScore": 7.2,
+          "baseSeverity": "HIGH"
+        },
+        "exploitabilityScore": 1.2,
+        "impactScore": 5.9
+      },
       {
         "source": "cna@vuldb.com",
         "type": "Secondary",
@@ -120,22 +140,54 @@
       ]
     }
   ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:a:phpgurukul:medical_card_generation_system:1.0:*:*:*:*:*:*:*",
+              "matchCriteriaId": "024186C5-26DF-43AC-BDEA-732C94D55DF8"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://phpgurukul.com/",
-      "source": "cna@vuldb.com"
+      "source": "cna@vuldb.com",
+      "tags": [
+        "Product"
+      ]
     },
     {
       "url": "https://vuldb.com/?ctiid.281565",
-      "source": "cna@vuldb.com"
+      "source": "cna@vuldb.com",
+      "tags": [
+        "Permissions Required",
+        "VDB Entry"
+      ]
     },
     {
       "url": "https://vuldb.com/?id.281565",
-      "source": "cna@vuldb.com"
+      "source": "cna@vuldb.com",
+      "tags": [
+        "Third Party Advisory",
+        "VDB Entry"
+      ]
     },
     {
       "url": "https://vuldb.com/?submit.427403",
-      "source": "cna@vuldb.com"
+      "source": "cna@vuldb.com",
+      "tags": [
+        "Third Party Advisory",
+        "VDB Entry"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10299.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10299.json
index d336098b002..3e976cf97c8 100644
--- a/CVE-2024/CVE-2024-102xx/CVE-2024-10299.json
+++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10299.json
@@ -2,8 +2,8 @@
   "id": "CVE-2024-10299",
   "sourceIdentifier": "cna@vuldb.com",
   "published": "2024-10-23T19:15:15.183",
-  "lastModified": "2024-10-25T12:56:07.750",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T18:51:17.047",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -61,6 +61,26 @@
       }
     ],
     "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "HIGH",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "HIGH",
+          "availabilityImpact": "HIGH",
+          "baseScore": 7.2,
+          "baseSeverity": "HIGH"
+        },
+        "exploitabilityScore": 1.2,
+        "impactScore": 5.9
+      },
       {
         "source": "cna@vuldb.com",
         "type": "Secondary",
@@ -120,18 +140,46 @@
       ]
     }
   ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:a:phpgurukul:medical_card_generation_system:1.0:*:*:*:*:*:*:*",
+              "matchCriteriaId": "024186C5-26DF-43AC-BDEA-732C94D55DF8"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://phpgurukul.com/",
-      "source": "cna@vuldb.com"
+      "source": "cna@vuldb.com",
+      "tags": [
+        "Product"
+      ]
     },
     {
       "url": "https://vuldb.com/?ctiid.281566",
-      "source": "cna@vuldb.com"
+      "source": "cna@vuldb.com",
+      "tags": [
+        "Permissions Required",
+        "VDB Entry"
+      ]
     },
     {
       "url": "https://vuldb.com/?id.281566",
-      "source": "cna@vuldb.com"
+      "source": "cna@vuldb.com",
+      "tags": [
+        "Third Party Advisory",
+        "VDB Entry"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10300.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10300.json
index 526ea2b7bf1..a8e27a8a623 100644
--- a/CVE-2024/CVE-2024-103xx/CVE-2024-10300.json
+++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10300.json
@@ -2,8 +2,8 @@
   "id": "CVE-2024-10300",
   "sourceIdentifier": "cna@vuldb.com",
   "published": "2024-10-23T20:15:05.060",
-  "lastModified": "2024-10-25T12:56:07.750",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T18:49:01.953",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -61,6 +61,26 @@
       }
     ],
     "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "HIGH",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "HIGH",
+          "availabilityImpact": "HIGH",
+          "baseScore": 7.2,
+          "baseSeverity": "HIGH"
+        },
+        "exploitabilityScore": 1.2,
+        "impactScore": 5.9
+      },
       {
         "source": "cna@vuldb.com",
         "type": "Secondary",
@@ -120,22 +140,55 @@
       ]
     }
   ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:a:phpgurukul:medical_card_generation_system:1.0:*:*:*:*:*:*:*",
+              "matchCriteriaId": "024186C5-26DF-43AC-BDEA-732C94D55DF8"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://phpgurukul.com/",
-      "source": "cna@vuldb.com"
+      "source": "cna@vuldb.com",
+      "tags": [
+        "Product"
+      ]
     },
     {
       "url": "https://vuldb.com/?ctiid.281567",
-      "source": "cna@vuldb.com"
+      "source": "cna@vuldb.com",
+      "tags": [
+        "Permissions Required",
+        "Third Party Advisory",
+        "VDB Entry"
+      ]
     },
     {
       "url": "https://vuldb.com/?id.281567",
-      "source": "cna@vuldb.com"
+      "source": "cna@vuldb.com",
+      "tags": [
+        "Third Party Advisory",
+        "VDB Entry"
+      ]
     },
     {
       "url": "https://vuldb.com/?submit.427404",
-      "source": "cna@vuldb.com"
+      "source": "cna@vuldb.com",
+      "tags": [
+        "Third Party Advisory",
+        "VDB Entry"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10301.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10301.json
index 3825901b06f..cfbeca35b35 100644
--- a/CVE-2024/CVE-2024-103xx/CVE-2024-10301.json
+++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10301.json
@@ -2,8 +2,8 @@
   "id": "CVE-2024-10301",
   "sourceIdentifier": "cna@vuldb.com",
   "published": "2024-10-23T20:15:05.310",
-  "lastModified": "2024-10-25T12:56:07.750",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T18:47:54.033",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -61,6 +61,26 @@
       }
     ],
     "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "HIGH",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "HIGH",
+          "availabilityImpact": "HIGH",
+          "baseScore": 7.2,
+          "baseSeverity": "HIGH"
+        },
+        "exploitabilityScore": 1.2,
+        "impactScore": 5.9
+      },
       {
         "source": "cna@vuldb.com",
         "type": "Secondary",
@@ -120,22 +140,55 @@
       ]
     }
   ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:a:phpgurukul:medical_card_generation_system:1.0:*:*:*:*:*:*:*",
+              "matchCriteriaId": "024186C5-26DF-43AC-BDEA-732C94D55DF8"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://phpgurukul.com/",
-      "source": "cna@vuldb.com"
+      "source": "cna@vuldb.com",
+      "tags": [
+        "Product"
+      ]
     },
     {
       "url": "https://vuldb.com/?ctiid.281568",
-      "source": "cna@vuldb.com"
+      "source": "cna@vuldb.com",
+      "tags": [
+        "Permissions Required",
+        "Third Party Advisory",
+        "VDB Entry"
+      ]
     },
     {
       "url": "https://vuldb.com/?id.281568",
-      "source": "cna@vuldb.com"
+      "source": "cna@vuldb.com",
+      "tags": [
+        "Third Party Advisory",
+        "VDB Entry"
+      ]
     },
     {
       "url": "https://vuldb.com/?submit.427405",
-      "source": "cna@vuldb.com"
+      "source": "cna@vuldb.com",
+      "tags": [
+        "Third Party Advisory",
+        "VDB Entry"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1694.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1694.json
index 290b6caedea..ba088b312df 100644
--- a/CVE-2024/CVE-2024-16xx/CVE-2024-1694.json
+++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1694.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-1694",
   "sourceIdentifier": "chrome-cve-admin@google.com",
   "published": "2024-06-07T20:15:10.973",
-  "lastModified": "2024-08-01T13:46:10.687",
+  "lastModified": "2024-10-25T19:35:03.987",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -39,18 +39,6 @@
       }
     ]
   },
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-474"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "https://issues.chromium.org/issues/40946325",
diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21741.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21741.json
index e8127f04058..308ecb3bd7a 100644
--- a/CVE-2024/CVE-2024-217xx/CVE-2024-21741.json
+++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21741.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-21741",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-06-25T21:15:57.357",
-  "lastModified": "2024-07-03T01:46:46.537",
+  "lastModified": "2024-10-25T18:35:03.493",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -39,18 +39,6 @@
       }
     ]
   },
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-284"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "https://tches.iacr.org/index.php/TCHES/article/view/11422/10927",
diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21828.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21828.json
index 7a8ba0172ff..f8cc37d7d32 100644
--- a/CVE-2024/CVE-2024-218xx/CVE-2024-21828.json
+++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21828.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-21828",
   "sourceIdentifier": "secure@intel.com",
   "published": "2024-05-16T21:16:04.083",
-  "lastModified": "2024-07-03T01:46:50.690",
+  "lastModified": "2024-10-25T19:35:04.160",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -49,16 +49,6 @@
           "value": "CWE-284"
         }
       ]
-    },
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-284"
-        }
-      ]
     }
   ],
   "references": [
diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22020.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22020.json
index 3c4dac0cd4f..44317c21a1f 100644
--- a/CVE-2024/CVE-2024-220xx/CVE-2024-22020.json
+++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22020.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-22020",
   "sourceIdentifier": "support@hackerone.com",
   "published": "2024-07-09T02:15:09.973",
-  "lastModified": "2024-07-19T14:15:05.863",
+  "lastModified": "2024-10-25T18:35:03.697",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -39,18 +39,6 @@
       }
     ]
   },
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-284"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "http://www.openwall.com/lists/oss-security/2024/07/11/6",
diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22855.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22855.json
index 66fa6457d45..5111102a16d 100644
--- a/CVE-2024/CVE-2024-228xx/CVE-2024-22855.json
+++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22855.json
@@ -2,8 +2,8 @@
   "id": "CVE-2024-22855",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-06-12T17:15:49.913",
-  "lastModified": "2024-07-22T20:12:59.693",
-  "vulnStatus": "Undergoing Analysis",
+  "lastModified": "2024-10-25T18:41:33.187",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -22,19 +22,19 @@
         "type": "Primary",
         "cvssData": {
           "version": "3.1",
-          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
           "attackVector": "NETWORK",
           "attackComplexity": "LOW",
-          "privilegesRequired": "NONE",
+          "privilegesRequired": "LOW",
           "userInteraction": "REQUIRED",
           "scope": "CHANGED",
           "confidentialityImpact": "LOW",
           "integrityImpact": "LOW",
           "availabilityImpact": "NONE",
-          "baseScore": 6.1,
+          "baseScore": 5.4,
           "baseSeverity": "MEDIUM"
         },
-        "exploitabilityScore": 2.8,
+        "exploitabilityScore": 2.3,
         "impactScore": 2.7
       }
     ]
@@ -60,9 +60,9 @@
           "cpeMatch": [
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:a:itss:imlog:*:*:*:*:*:*:*:*",
+              "criteria": "cpe:2.3:a:itssglobal:imlog:*:*:*:*:*:*:*:*",
               "versionEndExcluding": "1.308",
-              "matchCriteriaId": "83EECA1D-8AA7-4021-8318-25C36CC8B08A"
+              "matchCriteriaId": "A39ED7F6-AB8C-423E-AEEA-AE286390EBE4"
             }
           ]
         }
@@ -75,7 +75,8 @@
       "source": "cve@mitre.org",
       "tags": [
         "Exploit",
-        "Third Party Advisory"
+        "Third Party Advisory",
+        "VDB Entry"
       ]
     }
   ]
diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23709.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23709.json
index c649d8534db..6882ae96a90 100644
--- a/CVE-2024/CVE-2024-237xx/CVE-2024-23709.json
+++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23709.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-23709",
   "sourceIdentifier": "security@android.com",
   "published": "2024-05-07T21:15:08.877",
-  "lastModified": "2024-07-03T01:48:03.920",
+  "lastModified": "2024-10-25T19:35:04.277",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -46,7 +46,7 @@
       "description": [
         {
           "lang": "en",
-          "value": "CWE-122"
+          "value": "CWE-787"
         }
       ]
     }
diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23766.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23766.json
index 899ac0dcb0e..ad3bc9559de 100644
--- a/CVE-2024/CVE-2024-237xx/CVE-2024-23766.json
+++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23766.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-23766",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-06-26T21:15:12.977",
-  "lastModified": "2024-07-03T01:48:06.303",
+  "lastModified": "2024-10-25T18:35:03.847",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -39,18 +39,6 @@
       }
     ]
   },
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-598"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "https://sensepost.com/blog/2024/targeting-an-industrial-protocol-gateway/",
diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28805.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28805.json
index e7ef28fa411..b82b0509945 100644
--- a/CVE-2024/CVE-2024-288xx/CVE-2024-28805.json
+++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28805.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-28805",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-07-29T19:15:11.990",
-  "lastModified": "2024-08-01T13:49:19.450",
+  "lastModified": "2024-10-25T18:35:04.053",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -39,18 +39,6 @@
       }
     ]
   },
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-284"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "https://www.gruppotim.it/it/footer/red-team.html",
diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28820.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28820.json
index f22ab70ad8e..a3976d3f1d2 100644
--- a/CVE-2024/CVE-2024-288xx/CVE-2024-28820.json
+++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28820.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-28820",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-06-27T16:15:10.950",
-  "lastModified": "2024-07-03T01:51:51.323",
+  "lastModified": "2024-10-25T18:35:04.300",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -39,18 +39,6 @@
       }
     ]
   },
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-121"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "https://github.com/threerings/openvpn-auth-ldap/pull/92",
diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31331.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31331.json
index 59a44177131..27984b3b65b 100644
--- a/CVE-2024/CVE-2024-313xx/CVE-2024-31331.json
+++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31331.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-31331",
   "sourceIdentifier": "security@android.com",
   "published": "2024-07-09T21:15:13.883",
-  "lastModified": "2024-07-12T16:11:33.867",
+  "lastModified": "2024-10-25T18:35:04.490",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -39,18 +39,6 @@
       }
     ]
   },
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-783"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "https://android.googlesource.com/platform/frameworks/base/+/c8694bbccfb9c19aefed536ea710230107c935eb",
diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33375.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33375.json
index 6b82f7ff5ad..e19111bf996 100644
--- a/CVE-2024/CVE-2024-333xx/CVE-2024-33375.json
+++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33375.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-33375",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-06-14T15:15:50.170",
-  "lastModified": "2024-08-01T13:51:54.967",
+  "lastModified": "2024-10-25T19:35:05.053",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -39,18 +39,6 @@
       }
     ]
   },
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-256"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "https://github.com/ShravanSinghRathore/Security-Advisory-Multiple-Vulnerabilities-in-LB-link-BL-W1210M-Router/wiki/Credentials-Stored-in-Cleartext--%7C--Unencrypted-Credentials-%28CVE%E2%80%902024%E2%80%9033375%29",
diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33781.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33781.json
index 05ec648024d..7e0685f3815 100644
--- a/CVE-2024/CVE-2024-337xx/CVE-2024-33781.json
+++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33781.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-33781",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-05-07T14:15:10.880",
-  "lastModified": "2024-07-03T01:58:45.220",
+  "lastModified": "2024-10-25T19:35:05.260",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -46,7 +46,7 @@
       "description": [
         {
           "lang": "en",
-          "value": "CWE-121"
+          "value": "CWE-125"
         }
       ]
     }
diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34329.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34329.json
index 15c76796af9..a540a62e389 100644
--- a/CVE-2024/CVE-2024-343xx/CVE-2024-34329.json
+++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34329.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-34329",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-07-22T20:15:03.673",
-  "lastModified": "2024-08-01T13:52:19.990",
+  "lastModified": "2024-10-25T18:35:04.677",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -39,18 +39,6 @@
       }
     ]
   },
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-378"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "https://github.com/pamoutaf/CVE-2024-34329/blob/main/README.md",
diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34724.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34724.json
index fa122c8f85e..cd29ebae5bb 100644
--- a/CVE-2024/CVE-2024-347xx/CVE-2024-34724.json
+++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34724.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-34724",
   "sourceIdentifier": "security@android.com",
   "published": "2024-07-09T21:15:14.487",
-  "lastModified": "2024-07-12T16:11:39.470",
+  "lastModified": "2024-10-25T18:35:04.870",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -46,7 +46,7 @@
       "description": [
         {
           "lang": "en",
-          "value": "CWE-368"
+          "value": "CWE-362"
         }
       ]
     }
diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35308.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35308.json
index a914cc0980e..906d234f9b4 100644
--- a/CVE-2024/CVE-2024-353xx/CVE-2024-35308.json
+++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35308.json
@@ -2,8 +2,8 @@
   "id": "CVE-2024-35308",
   "sourceIdentifier": "security@pandorafms.com",
   "published": "2024-10-22T09:15:02.927",
-  "lastModified": "2024-10-23T15:12:34.673",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T19:06:14.100",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -59,9 +59,41 @@
           "baseSeverity": "HIGH"
         }
       }
+    ],
+    "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "HIGH",
+          "availabilityImpact": "HIGH",
+          "baseScore": 8.8,
+          "baseSeverity": "HIGH"
+        },
+        "exploitabilityScore": 2.8,
+        "impactScore": 5.9
+      }
     ]
   },
   "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-22"
+        }
+      ]
+    },
     {
       "source": "security@pandorafms.com",
       "type": "Secondary",
@@ -73,10 +105,32 @@
       ]
     }
   ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:a:pandorafms:pandora_fms:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "700",
+              "versionEndExcluding": "777.3",
+              "matchCriteriaId": "0443A569-9987-4E63-A2AD-749B76A5A22A"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/",
-      "source": "security@pandorafms.com"
+      "source": "security@pandorafms.com",
+      "tags": [
+        "Vendor Advisory"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36037.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36037.json
index 7b01b78be9e..f329f8b7b26 100644
--- a/CVE-2024/CVE-2024-360xx/CVE-2024-36037.json
+++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36037.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-36037",
   "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02",
   "published": "2024-05-27T18:15:10.407",
-  "lastModified": "2024-10-07T20:15:05.720",
+  "lastModified": "2024-10-25T19:35:06.023",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -49,16 +49,6 @@
           "value": "CWE-863"
         }
       ]
-    },
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-284"
-        }
-      ]
     }
   ],
   "references": [
diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36540.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36540.json
index 2938ac868d6..443a934a020 100644
--- a/CVE-2024/CVE-2024-365xx/CVE-2024-36540.json
+++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36540.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-36540",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-07-24T17:15:10.827",
-  "lastModified": "2024-08-01T13:53:04.590",
+  "lastModified": "2024-10-25T18:35:05.643",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -39,18 +39,6 @@
       }
     ]
   },
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-284"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "https://gist.github.com/HouqiyuA/a4834f3c8450f9d89e2bc4d5c4beef6a",
diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36542.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36542.json
index 707228c5ba6..19150a23b91 100644
--- a/CVE-2024/CVE-2024-365xx/CVE-2024-36542.json
+++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36542.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-36542",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-07-25T17:15:10.710",
-  "lastModified": "2024-08-01T13:53:06.130",
+  "lastModified": "2024-10-25T18:35:05.827",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -39,18 +39,6 @@
       }
     ]
   },
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-284"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "https://gist.github.com/HouqiyuA/e1685843b6f42b47dbf97e2e92e63428",
diff --git a/CVE-2024/CVE-2024-372xx/CVE-2024-37289.json b/CVE-2024/CVE-2024-372xx/CVE-2024-37289.json
index c4cbb528a11..0217b030406 100644
--- a/CVE-2024/CVE-2024-372xx/CVE-2024-37289.json
+++ b/CVE-2024/CVE-2024-372xx/CVE-2024-37289.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-37289",
   "sourceIdentifier": "security@trendmicro.com",
   "published": "2024-06-10T22:15:12.893",
-  "lastModified": "2024-07-03T02:04:12.080",
+  "lastModified": "2024-10-25T19:35:06.150",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -39,18 +39,6 @@
       }
     ]
   },
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-284"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "https://success.trendmicro.com/dcx/s/solution/000298063",
diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37570.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37570.json
index 0596b8901cc..f1eb1f07875 100644
--- a/CVE-2024/CVE-2024-375xx/CVE-2024-37570.json
+++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37570.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-37570",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-06-09T20:15:09.460",
-  "lastModified": "2024-08-01T13:53:45.687",
+  "lastModified": "2024-10-25T19:35:06.277",
   "vulnStatus": "Modified",
   "cveTags": [],
   "descriptions": [
@@ -76,7 +76,7 @@
       "description": [
         {
           "lang": "en",
-          "value": "CWE-75"
+          "value": "CWE-77"
         }
       ]
     }
diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37634.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37634.json
index a97d8966a2e..fadcc2fc651 100644
--- a/CVE-2024/CVE-2024-376xx/CVE-2024-37634.json
+++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37634.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-37634",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-06-13T19:15:52.537",
-  "lastModified": "2024-07-03T02:04:25.770",
+  "lastModified": "2024-10-25T19:35:07.043",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -39,18 +39,6 @@
       }
     ]
   },
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-121"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/TOTOLINK/A3700R/setWiFiEasyCfg/README.md",
diff --git a/CVE-2024/CVE-2024-376xx/CVE-2024-37661.json b/CVE-2024/CVE-2024-376xx/CVE-2024-37661.json
index 9a11fb84b31..b4aabefe9c6 100644
--- a/CVE-2024/CVE-2024-376xx/CVE-2024-37661.json
+++ b/CVE-2024/CVE-2024-376xx/CVE-2024-37661.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-37661",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-06-17T18:15:17.463",
-  "lastModified": "2024-07-03T02:04:33.177",
+  "lastModified": "2024-10-25T19:35:07.220",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -39,18 +39,6 @@
       }
     ]
   },
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-940"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "https://github.com/ouuan/router-vuln-report/blob/master/icmp-redirect/tl-7dr5130-redirect.md",
diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37844.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37844.json
new file mode 100644
index 00000000000..e3af5b4915e
--- /dev/null
+++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37844.json
@@ -0,0 +1,25 @@
+{
+  "id": "CVE-2024-37844",
+  "sourceIdentifier": "cve@mitre.org",
+  "published": "2024-10-25T19:15:03.897",
+  "lastModified": "2024-10-25T19:15:03.897",
+  "vulnStatus": "Received",
+  "cveTags": [],
+  "descriptions": [
+    {
+      "lang": "en",
+      "value": "A stored cross-site scripting (XSS) vulnerability in MangoOS before 5.2.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload."
+    }
+  ],
+  "metrics": {},
+  "references": [
+    {
+      "url": "https://github.com/herombey/Disclosures/blob/main/CVE-2024-37844%20XSS.pdf",
+      "source": "cve@mitre.org"
+    },
+    {
+      "url": "https://github.com/herombey/Disclosures/tree/main",
+      "source": "cve@mitre.org"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37845.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37845.json
new file mode 100644
index 00000000000..b38624f75fb
--- /dev/null
+++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37845.json
@@ -0,0 +1,25 @@
+{
+  "id": "CVE-2024-37845",
+  "sourceIdentifier": "cve@mitre.org",
+  "published": "2024-10-25T19:15:03.973",
+  "lastModified": "2024-10-25T19:15:03.973",
+  "vulnStatus": "Received",
+  "cveTags": [],
+  "descriptions": [
+    {
+      "lang": "en",
+      "value": "MangoOS before 5.2.0 was discovered to contain an authenticated remote code execution (RCE) vulnerability via the Active Process Command feature."
+    }
+  ],
+  "metrics": {},
+  "references": [
+    {
+      "url": "https://github.com/herombey/Disclosures/blob/main/CVE-2024-37845%20RCE.pdf",
+      "source": "cve@mitre.org"
+    },
+    {
+      "url": "https://github.com/herombey/Disclosures/tree/main",
+      "source": "cve@mitre.org"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37846.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37846.json
new file mode 100644
index 00000000000..1ac9afc615d
--- /dev/null
+++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37846.json
@@ -0,0 +1,25 @@
+{
+  "id": "CVE-2024-37846",
+  "sourceIdentifier": "cve@mitre.org",
+  "published": "2024-10-25T19:15:04.027",
+  "lastModified": "2024-10-25T19:15:04.027",
+  "vulnStatus": "Received",
+  "cveTags": [],
+  "descriptions": [
+    {
+      "lang": "en",
+      "value": "MangoOS before 5.2.0 was discovered to contain a Client-Side Template Injection (CSTI) vulnerability via the Platform Management Edit page."
+    }
+  ],
+  "metrics": {},
+  "references": [
+    {
+      "url": "https://github.com/herombey/Disclosures/blob/main/CVE-2024-37846-CSTI.pdf",
+      "source": "cve@mitre.org"
+    },
+    {
+      "url": "https://github.com/herombey/Disclosures/tree/main",
+      "source": "cve@mitre.org"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37847.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37847.json
new file mode 100644
index 00000000000..ce01113b1ee
--- /dev/null
+++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37847.json
@@ -0,0 +1,25 @@
+{
+  "id": "CVE-2024-37847",
+  "sourceIdentifier": "cve@mitre.org",
+  "published": "2024-10-25T19:15:04.087",
+  "lastModified": "2024-10-25T19:15:04.087",
+  "vulnStatus": "Received",
+  "cveTags": [],
+  "descriptions": [
+    {
+      "lang": "en",
+      "value": "An arbitrary file upload vulnerability in MangoOS before 5.1.4 and Mango API before 4.5.5 allows attackers to execute arbitrary code via a crafted file."
+    }
+  ],
+  "metrics": {},
+  "references": [
+    {
+      "url": "https://github.com/herombey/Disclosures/blob/main/CVE-2024-37847%20File%20Upload%20Path%20Traversal.pdf",
+      "source": "cve@mitre.org"
+    },
+    {
+      "url": "https://github.com/herombey/Disclosures/tree/main",
+      "source": "cve@mitre.org"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38576.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38576.json
index c7dd734b085..922feacfcac 100644
--- a/CVE-2024/CVE-2024-385xx/CVE-2024-38576.json
+++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38576.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-38576",
   "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
   "published": "2024-06-19T14:15:17.700",
-  "lastModified": "2024-07-03T02:05:14.340",
+  "lastModified": "2024-10-25T19:35:07.410",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -16,18 +16,6 @@
     }
   ],
   "metrics": {},
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-121"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "https://git.kernel.org/stable/c/3758f7d9917bd7ef0482c4184c0ad673b4c4e069",
diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38873.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38873.json
index b925a0f31c3..b7a1908210c 100644
--- a/CVE-2024/CVE-2024-388xx/CVE-2024-38873.json
+++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38873.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-38873",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-06-21T07:15:09.110",
-  "lastModified": "2024-07-03T02:05:21.267",
+  "lastModified": "2024-10-25T19:35:07.527",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -39,18 +39,6 @@
       }
     ]
   },
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-284"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "https://typo3.org/security/advisory/typo3-ext-sa-2024-004",
diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38902.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38902.json
index 072c906a6a9..015585c46f3 100644
--- a/CVE-2024/CVE-2024-389xx/CVE-2024-38902.json
+++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38902.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-38902",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-06-24T21:15:26.457",
-  "lastModified": "2024-07-03T02:05:26.170",
+  "lastModified": "2024-10-25T18:35:06.000",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -39,18 +39,6 @@
       }
     ]
   },
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-259"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "https://github.com/s4ndw1ch136/IOT-vuln-reports/blob/main/H3C/Magic%20R230/hardcode/README.md",
diff --git a/CVE-2024/CVE-2024-389xx/CVE-2024-38909.json b/CVE-2024/CVE-2024-389xx/CVE-2024-38909.json
index 126c94196f2..59331715091 100644
--- a/CVE-2024/CVE-2024-389xx/CVE-2024-38909.json
+++ b/CVE-2024/CVE-2024-389xx/CVE-2024-38909.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-38909",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-07-30T14:15:02.897",
-  "lastModified": "2024-08-01T13:55:08.623",
+  "lastModified": "2024-10-25T18:35:06.223",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -39,18 +39,6 @@
       }
     ]
   },
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-284"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "http://elfinder.com",
diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39223.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39223.json
index 56aa274053e..9a83261dfd5 100644
--- a/CVE-2024/CVE-2024-392xx/CVE-2024-39223.json
+++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39223.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-39223",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-07-03T15:15:06.083",
-  "lastModified": "2024-07-09T16:22:53.590",
+  "lastModified": "2024-10-25T18:35:06.463",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -46,7 +46,7 @@
       "description": [
         {
           "lang": "en",
-          "value": "CWE-289"
+          "value": "CWE-639"
         }
       ]
     }
diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39251.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39251.json
index 57484066445..121b3aed204 100644
--- a/CVE-2024/CVE-2024-392xx/CVE-2024-39251.json
+++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39251.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-39251",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-07-01T19:15:05.480",
-  "lastModified": "2024-07-11T15:06:10.633",
+  "lastModified": "2024-10-25T18:35:07.280",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -39,18 +39,6 @@
       }
     ]
   },
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-782"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "https://github.com/Souhardya/Exploit-PoCs/tree/main/ThundeRobot_Control_center",
diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41461.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41461.json
index ce079e47909..51241c5c641 100644
--- a/CVE-2024/CVE-2024-414xx/CVE-2024-41461.json
+++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41461.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-41461",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-07-24T21:15:12.150",
-  "lastModified": "2024-08-01T13:58:44.983",
+  "lastModified": "2024-10-25T18:35:07.473",
   "vulnStatus": "Modified",
   "cveTags": [],
   "descriptions": [
@@ -76,7 +76,7 @@
       "description": [
         {
           "lang": "en",
-          "value": "CWE-121"
+          "value": "CWE-787"
         }
       ]
     }
diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41601.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41601.json
index 421b07a6893..fb73568f5ad 100644
--- a/CVE-2024/CVE-2024-416xx/CVE-2024-41601.json
+++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41601.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-41601",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-07-19T17:15:03.490",
-  "lastModified": "2024-08-01T13:58:55.750",
+  "lastModified": "2024-10-25T18:35:08.280",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -39,18 +39,6 @@
       }
     ]
   },
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-378"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "https://github.com/topsky979/Security-Collections/tree/main/CVE-2024-41601",
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43572.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43572.json
index 91efeb51c63..3989f4caf70 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43572.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43572.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-43572",
   "sourceIdentifier": "secure@microsoft.com",
   "published": "2024-10-08T18:15:24.593",
-  "lastModified": "2024-10-10T15:25:33.310",
+  "lastModified": "2024-10-25T18:17:28.223",
   "vulnStatus": "Analyzed",
   "cveTags": [],
   "cisaExploitAdd": "2024-10-08",
@@ -74,80 +74,34 @@
           "cpeMatch": [
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
-              "versionEndExcluding": "10.0.17763.6414",
-              "matchCriteriaId": "EE205A52-173D-44F2-AAD0-A45F5FF4D603"
+              "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
+              "versionEndExcluding": "10.0.10240.20796",
+              "matchCriteriaId": "8D5CDF9D-43B5-411C-9627-14DECDA937BF"
             },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
-              "versionEndExcluding": "10.0.17763.6414",
-              "matchCriteriaId": "8ED2CAD8-D2E2-4AF5-874A-2938D3C3EA0F"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
-            {
-              "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
-              "versionEndExcluding": "10.0.17763.6414",
-              "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
+              "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
+              "versionEndExcluding": "10.0.10240.20796",
+              "matchCriteriaId": "84562B34-6BC0-4DBD-B153-C8F1A065A08D"
+            },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
-              "versionEndExcluding": "10.0.20348.2762",
-              "matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
+              "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
+              "versionEndExcluding": "10.0.14393.7428",
+              "matchCriteriaId": "58DB776E-E3B6-4990-8AA2-6A63FDAA84C4"
+            },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
-              "versionEndExcluding": "10.0.22000.3260",
-              "matchCriteriaId": "FE4A4090-29D6-4B44-9B01-858886DAD93D"
+              "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
+              "versionEndExcluding": "10.0.14393.7428",
+              "matchCriteriaId": "4AC4CAAB-C035-4D00-8DBC-9C3CE39FBBD4"
             },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
-              "versionEndExcluding": "10.0.22000.3260",
-              "matchCriteriaId": "41629AD7-FF9A-4C54-9FFE-800F4C1E719B"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
+              "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
+              "versionEndExcluding": "10.0.17763.6414",
+              "matchCriteriaId": "3E73B5EB-3264-4FFD-A467-03F716E8B410"
+            },
             {
               "vulnerable": true,
               "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
@@ -165,39 +119,7 @@
               "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
               "versionEndExcluding": "10.0.19044.5011",
               "matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
-            {
-              "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
-              "versionEndExcluding": "10.0.22621.4317",
-              "matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129"
             },
-            {
-              "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
-              "versionEndExcluding": "10.0.22621.4317",
-              "matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
             {
               "vulnerable": true,
               "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
@@ -215,222 +137,85 @@
               "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
               "versionEndExcluding": "10.0.19045.5011",
               "matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
+            },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_11_22h3:*:*:*:*:*:*:arm64:*",
+              "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
+              "versionEndExcluding": "10.0.22000.3260",
+              "matchCriteriaId": "68801079-35D1-4489-A0AE-DA780FF4F9BC"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+              "versionEndExcluding": "10.0.22621.4317",
+              "matchCriteriaId": "E727AE65-9D9E-49BA-A875-9D50FAE9F7DB"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
               "versionEndExcluding": "10.0.22631.4317",
-              "matchCriteriaId": "F9395C1C-1B56-4A5A-BC79-9222906FE789"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
+              "matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0"
+            },
             {
               "vulnerable": true,
               "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
               "versionEndExcluding": "10.0.22631.4317",
               "matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
-            {
-              "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:x64:*",
-              "versionEndExcluding": "10.0.25398.1189",
-              "matchCriteriaId": "432C6418-0A8F-42DB-ACD2-22661619A8F4"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
+            },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
+              "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
               "versionEndExcluding": "10.0.26100.2033",
-              "matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5"
+              "matchCriteriaId": "E07DF8B6-0DF9-4BF1-9C9B-4A29F9611C8A"
             },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
-              "versionEndExcluding": "10.0.26100.2033",
-              "matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
+              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x32:*",
+              "matchCriteriaId": "56DC72C1-E387-48FD-98AF-113A6C694C21"
+            },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
-              "versionEndExcluding": "10.0.10240.20796",
-              "matchCriteriaId": "8D5CDF9D-43B5-411C-9627-14DECDA937BF"
+              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
+              "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
             },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
-              "versionEndExcluding": "10.0.10240.20796",
-              "matchCriteriaId": "84562B34-6BC0-4DBD-B153-C8F1A065A08D"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
+              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
+              "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
+            },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
-              "versionEndExcluding": "10.0.14393.7428",
-              "matchCriteriaId": "58DB776E-E3B6-4990-8AA2-6A63FDAA84C4"
+              "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
+              "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
             },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
-              "versionEndExcluding": "10.0.14393.7428",
-              "matchCriteriaId": "4AC4CAAB-C035-4D00-8DBC-9C3CE39FBBD4"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
+              "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*",
+              "matchCriteriaId": "8968BAC8-A1DB-4F88-89F8-4BE47919C247"
+            },
             {
               "vulnerable": true,
               "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
               "versionEndExcluding": "10.0.14393.7428",
               "matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
-            {
-              "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*",
-              "versionEndExcluding": "6.0.6003.22918",
-              "matchCriteriaId": "2687CF2E-B586-40A0-BAEC-3BE25F8AFB54"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
-            {
-              "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*",
-              "versionEndExcluding": "6.0.6003.22918",
-              "matchCriteriaId": "2687CF2E-B586-40A0-BAEC-3BE25F8AFB54"
             },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*",
-              "versionEndExcluding": "6.0.6003.22918",
-              "matchCriteriaId": "1D49F0DD-282D-4967-8559-F66C5B161728"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
-            {
-              "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*",
-              "versionEndExcluding": "6.0.6003.22918",
-              "matchCriteriaId": "1D49F0DD-282D-4967-8559-F66C5B161728"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
+              "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
+              "versionEndExcluding": "10.0.17763.6414",
+              "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D"
+            },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
-              "versionEndExcluding": "6.2.9200.25118",
-              "matchCriteriaId": "363CAA3C-BCE9-43B7-AF45-4539EB87BA0C"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
+              "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+              "versionEndExcluding": "10.0.20348..2762",
+              "matchCriteriaId": "AC8DD27D-4538-4CB9-894A-3BF3DFF9D25A"
+            },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:*:*",
-              "versionEndExcluding": "6.3.9600.22221",
-              "matchCriteriaId": "6AA9D814-0076-4851-B95B-5073AC382D8D"
+              "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
+              "versionEndExcluding": "10.0.25398.1189",
+              "matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9"
             }
           ]
         }
diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43573.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43573.json
index 770ae830837..5553bad431d 100644
--- a/CVE-2024/CVE-2024-435xx/CVE-2024-43573.json
+++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43573.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-43573",
   "sourceIdentifier": "secure@microsoft.com",
   "published": "2024-10-08T18:15:24.817",
-  "lastModified": "2024-10-10T15:54:19.353",
+  "lastModified": "2024-10-25T18:17:35.217",
   "vulnStatus": "Analyzed",
   "cveTags": [],
   "cisaExploitAdd": "2024-10-08",
@@ -94,124 +94,34 @@
           "cpeMatch": [
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
-              "versionEndExcluding": "10.0.19045.5011",
-              "matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1"
+              "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
+              "versionEndExcluding": "10.0.10240.20796",
+              "matchCriteriaId": "8D5CDF9D-43B5-411C-9627-14DECDA937BF"
             },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
-              "versionEndExcluding": "10.0.19045.5011",
-              "matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC"
+              "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
+              "versionEndExcluding": "10.0.10240.20796",
+              "matchCriteriaId": "84562B34-6BC0-4DBD-B153-C8F1A065A08D"
             },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
-              "versionEndExcluding": "10.0.19045.5011",
-              "matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
-            {
-              "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
-              "versionEndExcluding": "10.0.22000.3260",
-              "matchCriteriaId": "011A7B27-0084-4C73-8E59-A17C0862B098"
+              "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
+              "versionEndExcluding": "10.0.14393.7428",
+              "matchCriteriaId": "58DB776E-E3B6-4990-8AA2-6A63FDAA84C4"
             },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
-              "versionEndExcluding": "10.0.22000.3260",
-              "matchCriteriaId": "6FD17BE4-CA3A-4392-BB5E-2A43DB2E3D57"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
-            {
-              "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
-              "versionEndExcluding": "10.0.22621.4317",
-              "matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129"
+              "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
+              "versionEndExcluding": "10.0.14393.7428",
+              "matchCriteriaId": "4AC4CAAB-C035-4D00-8DBC-9C3CE39FBBD4"
             },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
-              "versionEndExcluding": "10.0.22621.4317",
-              "matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
-            {
-              "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_11_22h3:*:*:*:*:*:*:x64:*",
-              "versionEndExcluding": "10.0.22631.4317",
-              "matchCriteriaId": "FAF3DC83-B324-48EC-9B4D-D72375992D35"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
-            {
-              "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
-              "versionEndExcluding": "10.0.20348..2762",
-              "matchCriteriaId": "AC8DD27D-4538-4CB9-894A-3BF3DFF9D25A"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
-            {
-              "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*",
-              "versionEndExcluding": "10.0.25398.1189",
-              "matchCriteriaId": "95D955C0-5BD1-41A9-959E-4F2F4282CCD4"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
+              "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
+              "versionEndExcluding": "10.0.17763.6414",
+              "matchCriteriaId": "3E73B5EB-3264-4FFD-A467-03F716E8B410"
+            },
             {
               "vulnerable": true,
               "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
@@ -229,206 +139,83 @@
               "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
               "versionEndExcluding": "10.0.19044.5011",
               "matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
+            },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
-              "versionEndExcluding": "10.0.22631.4317",
-              "matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
+              "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
+              "versionEndExcluding": "10.0.19045.5011",
+              "matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1"
+            },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
-              "versionEndExcluding": "10.0.17763.6414",
-              "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
+              "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
+              "versionEndExcluding": "10.0.19045.5011",
+              "matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC"
+            },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
-              "versionEndExcluding": "10.0.17763.6414",
-              "matchCriteriaId": "EE205A52-173D-44F2-AAD0-A45F5FF4D603"
+              "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
+              "versionEndExcluding": "10.0.19045.5011",
+              "matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F"
             },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
-              "versionEndExcluding": "10.0.17763.6414",
-              "matchCriteriaId": "8ED2CAD8-D2E2-4AF5-874A-2938D3C3EA0F"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
+              "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
+              "versionEndExcluding": "10.0.22000.3260",
+              "matchCriteriaId": "68801079-35D1-4489-A0AE-DA780FF4F9BC"
+            },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
-              "versionEndExcluding": "10.0.17763.6414",
-              "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
+              "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
+              "versionEndExcluding": "10.0.22621.4317",
+              "matchCriteriaId": "E727AE65-9D9E-49BA-A875-9D50FAE9F7DB"
+            },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
-              "versionEndExcluding": "10.0.26100.2033",
-              "matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5"
+              "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
+              "versionEndExcluding": "10.0.22631.4317",
+              "matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0"
             },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
-              "versionEndExcluding": "10.0.26100.2033",
-              "matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
+              "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
+              "versionEndExcluding": "10.0.22631.4317",
+              "matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7"
+            },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
-              "versionEndExcluding": "10.0.10240.20796",
-              "matchCriteriaId": "8D5CDF9D-43B5-411C-9627-14DECDA937BF"
+              "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
+              "versionEndExcluding": "10.0.26100.2033",
+              "matchCriteriaId": "E07DF8B6-0DF9-4BF1-9C9B-4A29F9611C8A"
             },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
-              "versionEndExcluding": "10.0.10240.20796",
-              "matchCriteriaId": "84562B34-6BC0-4DBD-B153-C8F1A065A08D"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
+              "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*",
+              "matchCriteriaId": "8968BAC8-A1DB-4F88-89F8-4BE47919C247"
+            },
             {
               "vulnerable": true,
               "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
               "versionEndExcluding": "10.0.14393.7428",
               "matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
-            {
-              "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
-              "versionEndExcluding": "10.0.14393.7428",
-              "matchCriteriaId": "58DB776E-E3B6-4990-8AA2-6A63FDAA84C4"
             },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
-              "versionEndExcluding": "10.0.14393.7428",
-              "matchCriteriaId": "4AC4CAAB-C035-4D00-8DBC-9C3CE39FBBD4"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
-            {
-              "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*",
-              "versionEndExcluding": "6.3.9600.22221",
-              "matchCriteriaId": "585A59A3-0F7E-4FC1-BA5E-B33261DC3F49"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
+              "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
+              "versionEndExcluding": "10.0.17763.6414",
+              "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D"
+            },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
-              "versionEndExcluding": "10.0.14393.7428",
-              "matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7"
-            }
-          ]
-        }
-      ]
-    },
-    {
-      "nodes": [
-        {
-          "operator": "OR",
-          "negate": false,
-          "cpeMatch": [
+              "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
+              "versionEndExcluding": "10.0.20348..2762",
+              "matchCriteriaId": "AC8DD27D-4538-4CB9-894A-3BF3DFF9D25A"
+            },
             {
               "vulnerable": true,
-              "criteria": "cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:*:*",
-              "versionEndExcluding": "6.3.9600.22221",
-              "matchCriteriaId": "6AA9D814-0076-4851-B95B-5073AC382D8D"
+              "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
+              "versionEndExcluding": "10.0.25398.1189",
+              "matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9"
             }
           ]
         }
diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43844.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43844.json
index 6fc479a2cac..566a6c9a73f 100644
--- a/CVE-2024/CVE-2024-438xx/CVE-2024-43844.json
+++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43844.json
@@ -2,8 +2,8 @@
   "id": "CVE-2024-43844",
   "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
   "published": "2024-08-17T10:15:09.763",
-  "lastModified": "2024-08-19T12:59:59.177",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T19:49:05.987",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -15,15 +15,75 @@
       "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: rtw89: wow: soluciona el problema de skbuff de H2C de descarga GTK. Por error pusimos skb demasiado grande y eso puede exceder skb-&gt;end. Por eso lo arreglamos. skbuff: skb_over_panic: text:ffffffffc09e9a9d len:416 put:204 head:ffff8fba04eca780 data:ffff8fba04eca7e0 tail:0x200 end:0x140 dev: ------------[ cortar aqu\u00ed ]---- -------- \u00a1ERROR del kernel en net/core/skbuff.c:192! c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] PREEMPT SMP PTI CPU: 1 PID: 4747 Comm: kworker/u4:44 Contaminado: GO 6.6.30-02659-gc18865c4dfbd #1 86547039b47e46935493f615ee31d0b2d711d35e Nombre de hardware: HP Me ep/Meep, BIOS Google_Meep.11297.262. 0 18/03/2021 Cola de trabajo: events_unbound async_run_entry_fn RIP: 0010:skb_panic+0x5d/0x60 C\u00f3digo: c6 63 8b 8f bb 4c 0f 45 f6 48 c7 c7 4d 89 8b bb 48 89 ce 44 89 d1 41 53 41 53 y siguientes b0 c8 00 00 00 e8 27 5f 23 00 48 83 c4 20 &lt;0f&gt; 0b 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 RSP 0018:ffffaa700144ba d0 EFLAGS: 00010282 RAX: 0000000000000089 RBX: 0000000000000140 RCX: 14432c5aad26c900 RDX: 0000000000000000 RSI: 00000000ffffdfff RDI: 0000000000000001 RBP: ffffaa700144bae0 R08: 00000000 R09: ffffaa700144b920 R10: 00000000ffffdfff R11: ffffffffbc28fbc0 R12: ffff8fba4e57a010 R13: 00000000000000000 R14: ffffffffbb8f8b63 R15: 00000000000 FS: 0000000000000000(0000) GS:ffff8fba7bd00000( 0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007999c4ad1000 CR3: 000000015503a000 CR4: 000000000035 0ee0 Seguimiento de llamadas:  ? __die_body+0x1f/0x70 ? morir+0x3d/0x60? do_trap+0xa4/0x110? skb_panic+0x5d/0x60? do_error_trap+0x6d/0x90? skb_panic+0x5d/0x60? handle_invalid_op+0x30/0x40? skb_panic+0x5d/0x60? exc_invalid_op+0x3c/0x50? asm_exc_invalid_op+0x16/0x20? skb_panic+0x5d/0x60 skb_put+0x49/0x50 rtw89_fw_h2c_wow_gtk_ofld+0xbd/0x220 [rtw89_core 778b32de31cd1f14df2d6721ae99ba8a83636fa5] 1f/0x540 [rtw89_core 778b32de31cd1f14df2d6721ae99ba8a83636fa5] rtw89_ops_resume+0x2b/0xa0 [rtw89_core 778b32de31cd1f14df2d6721ae99ba8a83636fa5] _reconfig+0x84/0x13e0 [mac80211 818a894e3b77da6298269c59ed7cdff065a4ed52] ? __pfx_wiphy_resume+0x10/0x10 [cfg80211 1a793119e2aeb157c4ca4091ff8e1d9ae233b59d]? dev_printk_emit+0x51/0x70? _dev_info+0x6e/0x90? __pfx_wiphy_resume+0x10/0x10 [cfg80211 1a793119e2aeb157c4ca4091ff8e1d9ae233b59d] wiphy_resume+0x89/0x180 [cfg80211 1a793119e2aeb157c4ca4091ff8e1d9ae23 3b59d] ? __pfx_wiphy_resume+0x10/0x10 [cfg80211 1a793119e2aeb157c4ca4091ff8e1d9ae233b59d] dpm_run_callback+0x3c/0x140 device_resume+0x1f9/0x3c0 ? __pfx_dpm_watchdog_handler+0x10/0x10 async_resume+0x1d/0x30 async_run_entry_fn+0x29/0xd0 Process_scheduled_works+0x1d8/0x3d0 trabajador_thread+0x1fc/0x2f0 kthread+0xed/0x110 ? __pfx_worker_thread+0x10/0x10? __pfx_kthread+0x10/0x10 ret_from_fork+0x38/0x50 ? __pfx_kthread+0x10/0x10 ret_from_fork_asm+0x1b/0x30  M\u00f3dulos vinculados en: ccm 8021q r8153_ecm cdc_ether usbnet r8152 mii dm_integrity async_xor xor async_tx lz4 lz4_compress zstd zstd_compress zram zsmalloc u entrada rfcomm cmac algif_hash rtw89_8922ae(O) algif_skcipher rtw89_8922a(O) af_alg rtw89_pci (O) rtw89_core(O) btusb(O) snd_soc_sst_bxt_da7219_max98357a btbcm(O) snd_soc_hdac_hdmi btintel(O) snd_soc_intel_hda_dsp_common snd_sof_probes btrtl(O) btmtk(O) c_hdmi snd_soc_dmic uvcvideo videobuf2_vmalloc uvc videobuf2_memops videobuf2_v4l2 videobuf2_common snd_sof_pci_intel_apl snd_sof_intel_hda_common snd_soc_hdac_hda snd_sof_intel_hda soundwire_intel soundwire_generic_allocation snd_ sof_intel_hda_mlink soundwire_cadence snd_sof_pci snd_sof_xtensa_dsp mac80211 snd_soc_acpi_intel_match snd_soc_acpi snd_sof snd_sof_utils soundwire_bus snd_soc_max98357a snd_soc_avs snd_soc_hda_codec snd_hda_ext_core snd_intel_dspcfg snd_intel_sdw_acpi snd_soc_da72 19 snd_hda_codec snd_hwdep snd_hda_core veth ip6table_nat xt_MASQUERADE xt_cgroup fuse bluetooth ecdh_generic cfg80211 ecc gsmi: Apagado de registro ---truncado---"
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "NONE",
+          "integrityImpact": "NONE",
+          "availabilityImpact": "HIGH",
+          "baseScore": 5.5,
+          "baseSeverity": "MEDIUM"
+        },
+        "exploitabilityScore": 1.8,
+        "impactScore": 3.6
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "NVD-CWE-noinfo"
+        }
+      ]
+    }
+  ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "6.10",
+              "versionEndExcluding": "6.10.3",
+              "matchCriteriaId": "21DC7A88-E88C-4C44-9AFB-CBB30134097C"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://git.kernel.org/stable/c/dda364c345913fe03ddbe4d5ae14a2754c100296",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/ef0d9d2f0dc1133db3d3a1c5167190c6627146b2",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43845.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43845.json
index d2781ee2f9c..cc0a600c8de 100644
--- a/CVE-2024/CVE-2024-438xx/CVE-2024-43845.json
+++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43845.json
@@ -2,8 +2,8 @@
   "id": "CVE-2024-43845",
   "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
   "published": "2024-08-17T10:15:09.837",
-  "lastModified": "2024-10-22T15:15:07.240",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T19:51:07.187",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -15,27 +15,103 @@
       "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: udf: corrige el c\u00e1lculo falso de la suma de comprobaci\u00f3n en udf_rename() Syzbot informa acceso a memoria no inicializada en udf_rename() al actualizar la suma de comprobaci\u00f3n de la entrada del directorio '..' de un directorio movido. De hecho, esto es cierto cuando pasamos diriter.fi en la pila a udf_update_tag() y debido a que solo tiene la estructura fileIdentDesc incluida y no los campos impUse o nombre, la funci\u00f3n de suma de verificaci\u00f3n sumar\u00e1 los contenidos aleatorios de la pila m\u00e1s all\u00e1 del final de la estructura. En realidad, esto es inofensivo porque el siguiente udf_fiiter_write_fi() volver\u00e1 a calcular la suma de comprobaci\u00f3n de los b\u00faferes en el disco donde todo est\u00e1 incluido correctamente. As\u00ed que todo lo que se necesita es simplemente eliminar el c\u00e1lculo falso."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "NONE",
+          "integrityImpact": "LOW",
+          "availabilityImpact": "NONE",
+          "baseScore": 3.3,
+          "baseSeverity": "LOW"
+        },
+        "exploitabilityScore": 1.8,
+        "impactScore": 1.4
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-908"
+        }
+      ]
+    }
+  ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "6.3",
+              "versionEndExcluding": "6.6.44",
+              "matchCriteriaId": "E752D2D6-EE15-4491-857A-AA8D6AE62EDF"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "6.7",
+              "versionEndExcluding": "6.10.3",
+              "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://git.kernel.org/stable/c/27ab33854873e6fb958cb074681a0107cc2ecc4c",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/40d7b3ed52449d36143bab8d3e70926aa61a60f4",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/9c439311c13fc6faab1921441165c9b8b500c83b",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/c996b570305e7a6910c2ce4cdcd4c22757ffe241",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/fe2ead240c31e8d158713beca9d0681a6e6a53ab",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43846.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43846.json
index a3591f14452..e26aa2b3cec 100644
--- a/CVE-2024/CVE-2024-438xx/CVE-2024-43846.json
+++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43846.json
@@ -2,8 +2,8 @@
   "id": "CVE-2024-43846",
   "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
   "published": "2024-08-17T10:15:09.900",
-  "lastModified": "2024-08-19T12:59:59.177",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T19:52:01.380",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -15,35 +15,124 @@
       "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: lib: objagg: soluciona un fallo de protecci\u00f3n general. La librer\u00eda admite la agregaci\u00f3n de objetos en otros objetos s\u00f3lo si el objeto principal no tiene un padre en s\u00ed. Es decir, no se admite el anidamiento. La agregaci\u00f3n ocurre en dos casos: sin y con sugerencias, donde las sugerencias son una recomendaci\u00f3n calculada previamente sobre c\u00f3mo agregar los objetos proporcionados. El anidamiento no es posible en el primer caso debido a una verificaci\u00f3n que lo impide, pero en el segundo caso no hay verificaci\u00f3n porque se supone que el anidamiento no puede ocurrir cuando se crean objetos basados en sugerencias. La violaci\u00f3n de este supuesto conduce a diversas advertencias y eventualmente a un fallo de protecci\u00f3n general [1]. Antes de solucionar la causa ra\u00edz, elimine el error cuando se produzca el anidamiento y advierta. [1] falla de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0xdead000000000d90: 0000 [#1] CPU PREEMPT SMP PTI: 1 PID: 1083 Comm: kworker/1:9 Tainted: GW 6.9.0-rc6-custom-gd9b4f1cca7fb #7 Nombre del hardware: Mellanox Technologies Ltd. MSN3700/VMOD0005, BIOS 5.11 06/01/2019 Cola de trabajo: mlxsw_core mlxsw_sp_acl_tcam_vregion_rehash_work RIP: 0010:mlxsw_sp_acl_erp_bf_insert+0x25/0x80 [...] Rastreo de llamadas:  acl_atcam_entry_add+0x256/0x3c0 mlxsw_sp_acl_tcam_entry_create+0x5e /0xa0 mlxsw_sp_acl_tcam_vchunk_migrate_one+0x16b/0x270 mlxsw_sp_acl_tcam_vregion_rehash_work+0xbe/0x510 Process_one_work+0x151/0x370 trabajador_thread+0x2cb/0x3e0 kthread+0xd0/0x100 x34/0x50 ret_from_fork_asm+0x1a/0x30 "
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "NONE",
+          "integrityImpact": "NONE",
+          "availabilityImpact": "HIGH",
+          "baseScore": 5.5,
+          "baseSeverity": "MEDIUM"
+        },
+        "exploitabilityScore": 1.8,
+        "impactScore": 3.6
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "NVD-CWE-noinfo"
+        }
+      ]
+    }
+  ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.1",
+              "versionEndExcluding": "6.1.103",
+              "matchCriteriaId": "FB327727-E3BB-4E46-A8EC-12AD13E62544"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "6.2",
+              "versionEndExcluding": "6.6.44",
+              "matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "6.7",
+              "versionEndExcluding": "6.10.3",
+              "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://git.kernel.org/stable/c/1936fa05a180834c3b52e0439a6bddc07814d3eb",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/22ae17a267f4812861f0c644186c3421ff97dbfc",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/499f742fed42e74f1321f4b12ca196a66a2b49fc",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/565213e005557eb6cc4e42189d26eb300e02f170",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/5adc61d29bbb461d7f7c2b48dceaa90ecd182eb7",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/8161263362154cbebfbf4808097b956a6a8cb98a",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/b4a3a89fffcdf09702b1f161b914e52abca1894d",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43847.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43847.json
index b2dc66d6031..616edd6092b 100644
--- a/CVE-2024/CVE-2024-438xx/CVE-2024-43847.json
+++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43847.json
@@ -2,8 +2,8 @@
   "id": "CVE-2024-43847",
   "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
   "published": "2024-08-17T10:15:09.963",
-  "lastModified": "2024-08-19T12:59:59.177",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T19:55:53.963",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -15,19 +15,89 @@
       "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: ath12k: corrige el acceso no v\u00e1lido a la memoria mientras se procesan paquetes fragmentados. El anillo de monitor y el anillo de reinyecci\u00f3n de reo comparten el mismo \u00edndice de m\u00e1scara de anillo. Cuando el controlador recibe una interrupci\u00f3n para el anillo de reinyecci\u00f3n de reo, el anillo del monitor tambi\u00e9n se procesa, lo que genera un acceso no v\u00e1lido a la memoria. Dado que la compatibilidad con el monitor a\u00fan no est\u00e1 habilitada en ath12k, se debe quitar la m\u00e1scara del anillo del monitor. Probado en: QCN9274 hw2.0 PCI WLAN.WBE.1.1.1-00209-QCAHKSWPL_SILICONZ-1"
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "HIGH",
+          "availabilityImpact": "HIGH",
+          "baseScore": 8.8,
+          "baseSeverity": "HIGH"
+        },
+        "exploitabilityScore": 2.8,
+        "impactScore": 5.9
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "NVD-CWE-noinfo"
+        }
+      ]
+    }
+  ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "6.3",
+              "versionEndExcluding": "6.6.44",
+              "matchCriteriaId": "E752D2D6-EE15-4491-857A-AA8D6AE62EDF"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "6.7",
+              "versionEndExcluding": "6.10.3",
+              "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://git.kernel.org/stable/c/073f9f249eecd64ab9d59c91c4a23cfdcc02afe4",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/36fc66a7d9ca3e5c6eac25362cac63f83df8bed6",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/8126f82dab7bd8b2e04799342b19fff0a1fd8575",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44099.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44099.json
index e645d2472ac..cb51e9a9943 100644
--- a/CVE-2024/CVE-2024-440xx/CVE-2024-44099.json
+++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44099.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-44099",
   "sourceIdentifier": "dsap-vuln-management@google.com",
   "published": "2024-10-25T11:15:16.237",
-  "lastModified": "2024-10-25T12:56:07.750",
+  "lastModified": "2024-10-25T19:35:07.773",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -11,7 +11,42 @@
       "value": "There is a possible Local bypass of user interaction due to an insecure default value. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+        "type": "Secondary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "NONE",
+          "availabilityImpact": "NONE",
+          "baseScore": 5.5,
+          "baseSeverity": "MEDIUM"
+        },
+        "exploitabilityScore": 1.8,
+        "impactScore": 3.6
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+      "type": "Secondary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-863"
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://source.android.com/security/bulletin/pixel/2024-10-01",
diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44100.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44100.json
index c96337c9cb7..60ccbd30664 100644
--- a/CVE-2024/CVE-2024-441xx/CVE-2024-44100.json
+++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44100.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-44100",
   "sourceIdentifier": "dsap-vuln-management@google.com",
   "published": "2024-10-25T11:15:16.293",
-  "lastModified": "2024-10-25T14:15:11.590",
+  "lastModified": "2024-10-25T19:35:08.533",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -11,7 +11,42 @@
       "value": "Android before 2024-10-05 on Google Pixel devices allows information disclosure in the modem component, A-299774545."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+        "type": "Secondary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "NONE",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "NONE",
+          "availabilityImpact": "NONE",
+          "baseScore": 7.5,
+          "baseSeverity": "HIGH"
+        },
+        "exploitabilityScore": 3.9,
+        "impactScore": 3.6
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+      "type": "Secondary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-276"
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://source.android.com/security/bulletin/pixel/2024-10-01",
diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44101.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44101.json
index adc6138698a..e02740dbd57 100644
--- a/CVE-2024/CVE-2024-441xx/CVE-2024-44101.json
+++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44101.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-44101",
   "sourceIdentifier": "dsap-vuln-management@google.com",
   "published": "2024-10-25T11:15:16.343",
-  "lastModified": "2024-10-25T12:56:07.750",
+  "lastModified": "2024-10-25T19:35:09.280",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -11,7 +11,42 @@
       "value": "there is a possible Null Pointer Dereference (modem crash) due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+        "type": "Secondary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "NONE",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "NONE",
+          "integrityImpact": "NONE",
+          "availabilityImpact": "HIGH",
+          "baseScore": 7.5,
+          "baseSeverity": "HIGH"
+        },
+        "exploitabilityScore": 3.9,
+        "impactScore": 3.6
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+      "type": "Secondary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-476"
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://source.android.com/security/bulletin/pixel/2024-10-01",
diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46240.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46240.json
index f78ec206e3c..79f97c39ae1 100644
--- a/CVE-2024/CVE-2024-462xx/CVE-2024-46240.json
+++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46240.json
@@ -2,8 +2,8 @@
   "id": "CVE-2024-46240",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-10-22T16:15:07.407",
-  "lastModified": "2024-10-23T15:12:34.673",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T19:00:20.737",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -17,6 +17,26 @@
   ],
   "metrics": {
     "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "HIGH",
+          "userInteraction": "REQUIRED",
+          "scope": "CHANGED",
+          "confidentialityImpact": "LOW",
+          "integrityImpact": "LOW",
+          "availabilityImpact": "NONE",
+          "baseScore": 4.8,
+          "baseSeverity": "MEDIUM"
+        },
+        "exploitabilityScore": 1.7,
+        "impactScore": 2.7
+      },
       {
         "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         "type": "Secondary",
@@ -40,6 +60,16 @@
     ]
   },
   "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-79"
+        }
+      ]
+    },
     {
       "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
       "type": "Secondary",
@@ -51,10 +81,31 @@
       ]
     }
   ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:a:o-dyn:collabtive:3.1:*:*:*:*:*:*:*",
+              "matchCriteriaId": "A283D24F-7012-45F6-8B04-BF11495B9114"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS1.md",
-      "source": "cve@mitre.org"
+      "source": "cve@mitre.org",
+      "tags": [
+        "Exploit",
+        "Third Party Advisory"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47012.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47012.json
index bc36e2ef099..9e431d3af5b 100644
--- a/CVE-2024/CVE-2024-470xx/CVE-2024-47012.json
+++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47012.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-47012",
   "sourceIdentifier": "dsap-vuln-management@google.com",
   "published": "2024-10-25T11:15:16.403",
-  "lastModified": "2024-10-25T12:56:07.750",
+  "lastModified": "2024-10-25T19:35:10.183",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -11,7 +11,42 @@
       "value": "In mm_GetMobileIdIndexForNsUpdate of mm_GmmPduCodec.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+        "type": "Secondary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "HIGH",
+          "availabilityImpact": "HIGH",
+          "baseScore": 7.8,
+          "baseSeverity": "HIGH"
+        },
+        "exploitabilityScore": 1.8,
+        "impactScore": 5.9
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+      "type": "Secondary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-276"
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://source.android.com/security/bulletin/pixel/2024-10-01",
diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47013.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47013.json
index 5896e82f8a6..463bd5bfea9 100644
--- a/CVE-2024/CVE-2024-470xx/CVE-2024-47013.json
+++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47013.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-47013",
   "sourceIdentifier": "dsap-vuln-management@google.com",
   "published": "2024-10-25T11:15:16.460",
-  "lastModified": "2024-10-25T12:56:07.750",
+  "lastModified": "2024-10-25T19:35:10.947",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -11,7 +11,42 @@
       "value": "In pmucal_rae_handle_seq_int of flexpmu_cal_rae.c, there is a possible arbitrary write due to uninitialized data. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+        "type": "Secondary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "HIGH",
+          "availabilityImpact": "HIGH",
+          "baseScore": 7.8,
+          "baseSeverity": "HIGH"
+        },
+        "exploitabilityScore": 1.8,
+        "impactScore": 5.9
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+      "type": "Secondary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-276"
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://source.android.com/security/bulletin/pixel/2024-10-01",
diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47014.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47014.json
index 6b427c9af2f..a742bcf8523 100644
--- a/CVE-2024/CVE-2024-470xx/CVE-2024-47014.json
+++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47014.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-47014",
   "sourceIdentifier": "dsap-vuln-management@google.com",
   "published": "2024-10-25T11:15:16.513",
-  "lastModified": "2024-10-25T14:15:11.783",
+  "lastModified": "2024-10-25T19:35:11.740",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -11,7 +11,42 @@
       "value": "Android before 2024-10-05 on Google Pixel devices allows privilege escalation in the ABL component, A-330537292."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+        "type": "Secondary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "HIGH",
+          "availabilityImpact": "HIGH",
+          "baseScore": 8.8,
+          "baseSeverity": "HIGH"
+        },
+        "exploitabilityScore": 2.8,
+        "impactScore": 5.9
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+      "type": "Secondary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-276"
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://source.android.com/security/bulletin/pixel/2024-10-01",
diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48139.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48139.json
index 5232c011501..abb3dfdd45f 100644
--- a/CVE-2024/CVE-2024-481xx/CVE-2024-48139.json
+++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48139.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-48139",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-10-24T19:15:15.050",
-  "lastModified": "2024-10-25T12:56:07.750",
+  "lastModified": "2024-10-25T19:35:12.730",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -15,7 +15,42 @@
       "value": "Una vulnerabilidad de inyecci\u00f3n r\u00e1pida en el cuadro de chat de Blackbox AI v1.3.95 permite a los atacantes acceder y filtrar todos los datos de chat anteriores y posteriores entre el usuario y el asistente de IA a trav\u00e9s de un mensaje manipulado espec\u00edficamente para ello."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+        "type": "Secondary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "NONE",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "NONE",
+          "availabilityImpact": "NONE",
+          "baseScore": 7.5,
+          "baseSeverity": "HIGH"
+        },
+        "exploitabilityScore": 3.9,
+        "impactScore": 3.6
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+      "type": "Secondary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-77"
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://github.com/soursec/CVEs/tree/main/CVE-2024-48139",
diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48140.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48140.json
index 7157c8459f4..b98a6152fa7 100644
--- a/CVE-2024/CVE-2024-481xx/CVE-2024-48140.json
+++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48140.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-48140",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-10-24T19:15:15.150",
-  "lastModified": "2024-10-25T12:56:07.750",
+  "lastModified": "2024-10-25T19:35:13.497",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -15,7 +15,42 @@
       "value": "Una vulnerabilidad de inyecci\u00f3n r\u00e1pida en el cuadro de chat de Butterfly Effect Limited Monica Your AI Copilot impulsado por ChatGPT4 v6.3.0 permite a los atacantes acceder y exfiltrar todos los datos de chat anteriores y posteriores entre el usuario y el asistente de IA a trav\u00e9s de un mensaje manipulado especialmente."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+        "type": "Secondary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "NONE",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "NONE",
+          "availabilityImpact": "NONE",
+          "baseScore": 7.5,
+          "baseSeverity": "HIGH"
+        },
+        "exploitabilityScore": 3.9,
+        "impactScore": 3.6
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+      "type": "Secondary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-77"
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://chromewebstore.google.com/detail/monica-your-ai-copilot-po/ofpnmcalabcbjgholdjcjblkibolbppb?hl=en",
diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48141.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48141.json
index aabf955b87d..56337442d1e 100644
--- a/CVE-2024/CVE-2024-481xx/CVE-2024-48141.json
+++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48141.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-48141",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-10-24T19:15:15.240",
-  "lastModified": "2024-10-25T12:56:07.750",
+  "lastModified": "2024-10-25T19:35:14.257",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -15,7 +15,42 @@
       "value": "Una vulnerabilidad de inyecci\u00f3n r\u00e1pida en el cuadro de chat de Zhipu AI CodeGeeX v2.17.0 permite a los atacantes acceder y filtrar todos los datos de chat anteriores y posteriores entre el usuario y el asistente de IA a trav\u00e9s de un mensaje manipulado espec\u00edficamente para ello."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+        "type": "Secondary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "NONE",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "NONE",
+          "availabilityImpact": "NONE",
+          "baseScore": 7.5,
+          "baseSeverity": "HIGH"
+        },
+        "exploitabilityScore": 3.9,
+        "impactScore": 3.6
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+      "type": "Secondary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-77"
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://github.com/soursec/CVEs/tree/main/CVE-2024-48141",
diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48142.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48142.json
index 0dac6b0553e..2942809e2d8 100644
--- a/CVE-2024/CVE-2024-481xx/CVE-2024-48142.json
+++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48142.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-48142",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-10-24T19:15:15.333",
-  "lastModified": "2024-10-25T12:56:07.750",
+  "lastModified": "2024-10-25T18:35:08.560",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -15,7 +15,42 @@
       "value": "Una vulnerabilidad de inyecci\u00f3n r\u00e1pida en el cuadro de chat de Butterfly Effect Limited Monica ChatGPT AI Assistant v2.4.0 permite a los atacantes acceder y filtrar todos los datos de chat anteriores y posteriores entre el usuario y el asistente de IA a trav\u00e9s de un mensaje manipulado espec\u00edficamente."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+        "type": "Secondary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "NONE",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "NONE",
+          "availabilityImpact": "NONE",
+          "baseScore": 7.5,
+          "baseSeverity": "HIGH"
+        },
+        "exploitabilityScore": 3.9,
+        "impactScore": 3.6
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+      "type": "Secondary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-77"
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://github.com/soursec/CVEs/tree/main/CVE-2024-48142",
diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48143.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48143.json
index 7e1fbca6592..c774fd6f703 100644
--- a/CVE-2024/CVE-2024-481xx/CVE-2024-48143.json
+++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48143.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-48143",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-10-24T19:15:15.427",
-  "lastModified": "2024-10-25T12:56:07.750",
+  "lastModified": "2024-10-25T18:35:09.327",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -15,7 +15,42 @@
       "value": "La falta de limitaci\u00f3n de velocidad en el componente de validaci\u00f3n de OTP de Digitory Multi Channel Integrated POS v1.0 permite a los atacantes obtener acceso al sistema de pedidos y realizar una cantidad excesiva de pedidos de comida."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+        "type": "Secondary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "NONE",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "NONE",
+          "integrityImpact": "HIGH",
+          "availabilityImpact": "HIGH",
+          "baseScore": 9.1,
+          "baseSeverity": "CRITICAL"
+        },
+        "exploitabilityScore": 3.9,
+        "impactScore": 5.2
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
+      "type": "Secondary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-307"
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://digitory.com/multi-channel-integrated-pos/",
diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48343.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48343.json
new file mode 100644
index 00000000000..2d3228d97f0
--- /dev/null
+++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48343.json
@@ -0,0 +1,21 @@
+{
+  "id": "CVE-2024-48343",
+  "sourceIdentifier": "cve@mitre.org",
+  "published": "2024-10-25T18:15:04.250",
+  "lastModified": "2024-10-25T18:15:04.250",
+  "vulnStatus": "Received",
+  "cveTags": [],
+  "descriptions": [
+    {
+      "lang": "en",
+      "value": "A SQL Injection vulnerability in ESAFENET CDG 5 and earlier allows an attacker to execute arbitrary code via the id parameter of the dataSearch.jsp page."
+    }
+  ],
+  "metrics": {},
+  "references": [
+    {
+      "url": "https://flowus.cn/share/d038084d-6370-4bcb-a268-6cca9e0f6615?code=G8A6P3",
+      "source": "cve@mitre.org"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48448.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48448.json
new file mode 100644
index 00000000000..15d0459a278
--- /dev/null
+++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48448.json
@@ -0,0 +1,21 @@
+{
+  "id": "CVE-2024-48448",
+  "sourceIdentifier": "cve@mitre.org",
+  "published": "2024-10-25T18:15:04.330",
+  "lastModified": "2024-10-25T18:15:04.330",
+  "vulnStatus": "Received",
+  "cveTags": [],
+  "descriptions": [
+    {
+      "lang": "en",
+      "value": "An arbitrary file upload vulnerability in Huly Platform v0.6.295 allows attackers to execute arbitrary code via uploading a crafted HTML file into the tracker comments page."
+    }
+  ],
+  "metrics": {},
+  "references": [
+    {
+      "url": "https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-48448",
+      "source": "cve@mitre.org"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48450.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48450.json
new file mode 100644
index 00000000000..822be7df00b
--- /dev/null
+++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48450.json
@@ -0,0 +1,21 @@
+{
+  "id": "CVE-2024-48450",
+  "sourceIdentifier": "cve@mitre.org",
+  "published": "2024-10-25T19:15:04.373",
+  "lastModified": "2024-10-25T19:15:04.373",
+  "vulnStatus": "Received",
+  "cveTags": [],
+  "descriptions": [
+    {
+      "lang": "en",
+      "value": "An arbitrary file upload vulnerability in Huly Platform v0.6.295 allows attackers to execute arbitrary code via uploading a crafted HTML file into chat group."
+    }
+  ],
+  "metrics": {},
+  "references": [
+    {
+      "url": "https://github.com/b-hermes/vulnerability-research/tree/main/CVE-2024-48450",
+      "source": "cve@mitre.org"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-485xx/CVE-2024-48570.json b/CVE-2024/CVE-2024-485xx/CVE-2024-48570.json
index 4e01a391835..73e43c9c43d 100644
--- a/CVE-2024/CVE-2024-485xx/CVE-2024-48570.json
+++ b/CVE-2024/CVE-2024-485xx/CVE-2024-48570.json
@@ -2,8 +2,8 @@
   "id": "CVE-2024-48570",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-10-22T17:15:04.087",
-  "lastModified": "2024-10-23T15:12:34.673",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T18:59:22.033",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -17,6 +17,26 @@
   ],
   "metrics": {
     "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "NONE",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "NONE",
+          "availabilityImpact": "NONE",
+          "baseScore": 7.5,
+          "baseSeverity": "HIGH"
+        },
+        "exploitabilityScore": 3.9,
+        "impactScore": 3.6
+      },
       {
         "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         "type": "Secondary",
@@ -40,6 +60,16 @@
     ]
   },
   "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-89"
+        }
+      ]
+    },
     {
       "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
       "type": "Secondary",
@@ -51,10 +81,31 @@
       ]
     }
   ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:a:phpgurukul:client_management_system:1.0:*:*:*:*:*:*:*",
+              "matchCriteriaId": "116BBDCB-50A8-4827-97A6-9EAE33C9A23F"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://github.com/Luc1f3r066/Client-Management-System-v1.0-",
-      "source": "cve@mitre.org"
+      "source": "cve@mitre.org",
+      "tags": [
+        "Exploit",
+        "Third Party Advisory"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48700.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48700.json
new file mode 100644
index 00000000000..ee73a4aa036
--- /dev/null
+++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48700.json
@@ -0,0 +1,21 @@
+{
+  "id": "CVE-2024-48700",
+  "sourceIdentifier": "cve@mitre.org",
+  "published": "2024-10-25T18:15:04.407",
+  "lastModified": "2024-10-25T18:15:04.407",
+  "vulnStatus": "Received",
+  "cveTags": [],
+  "descriptions": [
+    {
+      "lang": "en",
+      "value": "Kliqqi-CMS has a background arbitrary code execution vulnerability that attackers can exploit to implant backdoors or getShell via the edit_page.php component."
+    }
+  ],
+  "metrics": {},
+  "references": [
+    {
+      "url": "https://github.com/ChangeYourWay/post/blob/main/CVE-2024-48700",
+      "source": "cve@mitre.org"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48706.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48706.json
index bcad3026547..f09a77ccf29 100644
--- a/CVE-2024/CVE-2024-487xx/CVE-2024-48706.json
+++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48706.json
@@ -2,8 +2,8 @@
   "id": "CVE-2024-48706",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-10-22T17:15:04.180",
-  "lastModified": "2024-10-23T15:12:34.673",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T18:58:35.380",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -17,6 +17,26 @@
   ],
   "metrics": {
     "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "REQUIRED",
+          "scope": "CHANGED",
+          "confidentialityImpact": "LOW",
+          "integrityImpact": "LOW",
+          "availabilityImpact": "NONE",
+          "baseScore": 5.4,
+          "baseSeverity": "MEDIUM"
+        },
+        "exploitabilityScore": 2.3,
+        "impactScore": 2.7
+      },
       {
         "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         "type": "Secondary",
@@ -39,10 +59,43 @@
       }
     ]
   },
+  "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-79"
+        }
+      ]
+    }
+  ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:a:o-dyn:collabtive:3.1:*:*:*:*:*:*:*",
+              "matchCriteriaId": "A283D24F-7012-45F6-8B04-BF11495B9114"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS2.md",
-      "source": "cve@mitre.org"
+      "source": "cve@mitre.org",
+      "tags": [
+        "Exploit",
+        "Third Party Advisory"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48707.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48707.json
index de3c4c61192..89d0092052b 100644
--- a/CVE-2024/CVE-2024-487xx/CVE-2024-48707.json
+++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48707.json
@@ -2,8 +2,8 @@
   "id": "CVE-2024-48707",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-10-22T17:15:04.273",
-  "lastModified": "2024-10-23T15:12:34.673",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T19:11:54.310",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -17,6 +17,26 @@
   ],
   "metrics": {
     "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "REQUIRED",
+          "scope": "CHANGED",
+          "confidentialityImpact": "LOW",
+          "integrityImpact": "LOW",
+          "availabilityImpact": "NONE",
+          "baseScore": 5.4,
+          "baseSeverity": "MEDIUM"
+        },
+        "exploitabilityScore": 2.3,
+        "impactScore": 2.7
+      },
       {
         "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         "type": "Secondary",
@@ -40,6 +60,16 @@
     ]
   },
   "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-79"
+        }
+      ]
+    },
     {
       "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
       "type": "Secondary",
@@ -51,10 +81,31 @@
       ]
     }
   ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:a:o-dyn:collabtive:3.1:*:*:*:*:*:*:*",
+              "matchCriteriaId": "A283D24F-7012-45F6-8B04-BF11495B9114"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS3.md",
-      "source": "cve@mitre.org"
+      "source": "cve@mitre.org",
+      "tags": [
+        "Exploit",
+        "Third Party Advisory"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48708.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48708.json
index d04905129d9..15fe22c89fd 100644
--- a/CVE-2024/CVE-2024-487xx/CVE-2024-48708.json
+++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48708.json
@@ -2,8 +2,8 @@
   "id": "CVE-2024-48708",
   "sourceIdentifier": "cve@mitre.org",
   "published": "2024-10-22T17:15:04.370",
-  "lastModified": "2024-10-23T15:12:34.673",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T19:10:08.457",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -17,6 +17,26 @@
   ],
   "metrics": {
     "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "REQUIRED",
+          "scope": "CHANGED",
+          "confidentialityImpact": "LOW",
+          "integrityImpact": "LOW",
+          "availabilityImpact": "NONE",
+          "baseScore": 5.4,
+          "baseSeverity": "MEDIUM"
+        },
+        "exploitabilityScore": 2.3,
+        "impactScore": 2.7
+      },
       {
         "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
         "type": "Secondary",
@@ -40,6 +60,16 @@
     ]
   },
   "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-79"
+        }
+      ]
+    },
     {
       "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
       "type": "Secondary",
@@ -51,10 +81,31 @@
       ]
     }
   ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:a:o-dyn:collabtive:3.1:*:*:*:*:*:*:*",
+              "matchCriteriaId": "A283D24F-7012-45F6-8B04-BF11495B9114"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://github.com/anoncoder01/Collabtive_StoredXSS/blob/master/vulnerabilities/XSS4.md",
-      "source": "cve@mitre.org"
+      "source": "cve@mitre.org",
+      "tags": [
+        "Exploit",
+        "Third Party Advisory"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49996.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49996.json
index 69b681a1153..a8ba762a915 100644
--- a/CVE-2024/CVE-2024-499xx/CVE-2024-49996.json
+++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49996.json
@@ -2,8 +2,8 @@
   "id": "CVE-2024-49996",
   "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
   "published": "2024-10-21T18:15:19.760",
-  "lastModified": "2024-10-23T15:13:25.583",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T19:56:10.320",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -15,23 +15,103 @@
       "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: Se corrige el desbordamiento de b\u00fafer al analizar los puntos de an\u00e1lisis de NFS ReparseDataLength es la suma del tama\u00f1o de InodeType y el tama\u00f1o de DataBuffer. Por lo tanto, para obtener el tama\u00f1o de DataBuffer, es necesario restar el tama\u00f1o de InodeType de ReparseDataLength. La funci\u00f3n cifs_strndup_from_utf16() est\u00e1 accediendo actualmente a buf-&gt;DataBuffer en la posici\u00f3n despu\u00e9s del final del b\u00fafer porque no resta el tama\u00f1o de InodeType de la longitud. Solucione este problema y reste correctamente la variable len. El miembro InodeType solo est\u00e1 presente cuando el b\u00fafer de an\u00e1lisis es lo suficientemente grande. Verifique ReparseDataLength antes de acceder a InodeType para evitar otro acceso no v\u00e1lido a la memoria. Los valores rdev principales y secundarios tambi\u00e9n est\u00e1n presentes solo cuando el b\u00fafer de an\u00e1lisis es lo suficientemente grande. Verifique el tama\u00f1o del b\u00fafer de an\u00e1lisis antes de llamar a reparse_mkdev()."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "HIGH",
+          "availabilityImpact": "HIGH",
+          "baseScore": 7.8,
+          "baseSeverity": "HIGH"
+        },
+        "exploitabilityScore": 1.8,
+        "impactScore": 5.9
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-120"
+        }
+      ]
+    }
+  ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.3",
+              "versionEndExcluding": "6.6.55",
+              "matchCriteriaId": "93FE9DDB-76BE-4920-9078-D8278AF553B3"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "6.7",
+              "versionEndExcluding": "6.10.14",
+              "matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "6.11",
+              "versionEndExcluding": "6.11.3",
+              "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://git.kernel.org/stable/c/803b3a39cb096d8718c0aebc03fd19f11c7dc919",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/c173d47b69f07cd7ca08efb4e458adbd4725d8e9",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/c6db81c550cea0c73bd72ef55f579991e0e4ba07",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/e2a8910af01653c1c268984855629d71fb81f404",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50000.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50000.json
index e9a0ac22ad9..c0429aeece9 100644
--- a/CVE-2024/CVE-2024-500xx/CVE-2024-50000.json
+++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50000.json
@@ -2,8 +2,8 @@
   "id": "CVE-2024-50000",
   "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
   "published": "2024-10-21T18:15:20.063",
-  "lastModified": "2024-10-23T15:13:25.583",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T19:55:55.357",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -15,31 +15,136 @@
       "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net/mlx5e: Se ha corregido la desreferenciaci\u00f3n NULL en mlx5e_tir_builder_alloc(). En mlx5e_tir_builder_alloc(), kvzalloc() puede devolver NULL, que se desreferencia en la siguiente l\u00ednea en una referencia al campo de modificaci\u00f3n. Encontrado por Linux Verification Center (linuxtesting.org) con SVACE."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "NONE",
+          "integrityImpact": "NONE",
+          "availabilityImpact": "HIGH",
+          "baseScore": 5.5,
+          "baseSeverity": "MEDIUM"
+        },
+        "exploitabilityScore": 1.8,
+        "impactScore": 3.6
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-476"
+        }
+      ]
+    }
+  ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.15",
+              "versionEndExcluding": "5.15.168",
+              "matchCriteriaId": "151D0F58-4482-4AA5-87D2-803A6F5164C1"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.16",
+              "versionEndExcluding": "6.1.113",
+              "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "6.2",
+              "versionEndExcluding": "6.6.55",
+              "matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "6.7",
+              "versionEndExcluding": "6.10.14",
+              "matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "6.11",
+              "versionEndExcluding": "6.11.3",
+              "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
+              "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://git.kernel.org/stable/c/0168ab6fbd9e50d20b97486168b604b2ab28a2ca",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/1bcc86cc721bea68980098f51f102aa2c2b9d932",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/4655456a64a0f936098c8432bac64e7176bd2aff",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/4d80dde26d7bab1320210279483ac854dcb274b2",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/b48ee5bb25c02ca2b81e0d16bf8af17ab6ed3f8b",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/f25389e779500cf4a59ef9804534237841bce536",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50012.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50012.json
index c9c677a5c31..bd3b13b332b 100644
--- a/CVE-2024/CVE-2024-500xx/CVE-2024-50012.json
+++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50012.json
@@ -2,8 +2,8 @@
   "id": "CVE-2024-50012",
   "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
   "published": "2024-10-21T19:15:04.683",
-  "lastModified": "2024-10-23T15:13:25.583",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T19:55:40.217",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -15,23 +15,102 @@
       "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cpufreq: evitar un recuento de referencia incorrecto en el nodo de CPU En la funci\u00f3n parse_perf_domain, si la llamada a of_parse_phandle_with_args devuelve un error, la referencia al nodo de dispositivo de CPU que se adquiri\u00f3 al inicio de la funci\u00f3n no se decrementar\u00eda correctamente. Aborde esto declarando la variable con el atributo de limpieza __free(device_node)."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "NONE",
+          "integrityImpact": "NONE",
+          "availabilityImpact": "HIGH",
+          "baseScore": 5.5,
+          "baseSeverity": "MEDIUM"
+        },
+        "exploitabilityScore": 1.8,
+        "impactScore": 3.6
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "NVD-CWE-Other"
+        }
+      ]
+    }
+  ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionEndExcluding": "6.6.55",
+              "matchCriteriaId": "8B527B5F-BDDA-424E-932E-16FCAAB575E2"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "6.7",
+              "versionEndExcluding": "6.10.14",
+              "matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "6.11",
+              "versionEndExcluding": "6.11.3",
+              "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://git.kernel.org/stable/c/0f41f383b5a61a2bf6429a449ebba7fb08179d81",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/47cb1d9278f179df8250304ec41009e3e836a926",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/77f88b17387a017416babf1e6488fa17682287e2",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/c0f02536fffbbec71aced36d52a765f8c4493dc2",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50013.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50013.json
index 7be437632e2..7a5e80780fa 100644
--- a/CVE-2024/CVE-2024-500xx/CVE-2024-50013.json
+++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50013.json
@@ -2,8 +2,8 @@
   "id": "CVE-2024-50013",
   "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
   "published": "2024-10-21T19:15:04.767",
-  "lastModified": "2024-10-23T15:13:25.583",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T19:49:36.863",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -15,35 +15,145 @@
       "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: exfat: corrige p\u00e9rdida de memoria en exfat_load_bitmap() Si la primera entrada de directorio en el directorio ra\u00edz no es una entrada de directorio de mapa de bits, 'bh' no se liberar\u00e1 ni se reasignar\u00e1, lo que provocar\u00e1 una p\u00e9rdida de memoria."
     }
   ],
-  "metrics": {},
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
+          "attackVector": "LOCAL",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "NONE",
+          "integrityImpact": "NONE",
+          "availabilityImpact": "HIGH",
+          "baseScore": 5.5,
+          "baseSeverity": "MEDIUM"
+        },
+        "exploitabilityScore": 1.8,
+        "impactScore": 3.6
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-401"
+        }
+      ]
+    }
+  ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.7",
+              "versionEndExcluding": "5.10.227",
+              "matchCriteriaId": "E992DF81-0B1D-4EEA-8F9E-DCB1FE218301"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.11",
+              "versionEndExcluding": "5.15.168",
+              "matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "5.16",
+              "versionEndExcluding": "6.1.113",
+              "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "6.2",
+              "versionEndExcluding": "6.6.55",
+              "matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "6.7",
+              "versionEndExcluding": "6.10.14",
+              "matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021"
+            },
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "6.11",
+              "versionEndExcluding": "6.11.3",
+              "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://git.kernel.org/stable/c/4e1813e52f86eb8db0c6c9570251f2fcbc571f5d",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/89081e8407e637463db5880d168e3652fb9f4330",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/bf0b3b35259475d1fe377bcaa565488e26684f7a",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/d2b537b3e533f28e0d97293fe9293161fe8cd137",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/dca359db1eb37f334267ebd7e3cab9a66d191d5b",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/ddf704c2ce3b73f38d2dd8cf1bb0f7ec038bdf63",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://git.kernel.org/stable/c/f692160d3e1e5450605071b8df8f7d08d9b09a83",
-      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
+      "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
+      "tags": [
+        "Patch"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5159.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5159.json
index 327a36da52d..843e0e5705f 100644
--- a/CVE-2024/CVE-2024-51xx/CVE-2024-5159.json
+++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5159.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-5159",
   "sourceIdentifier": "chrome-cve-admin@google.com",
   "published": "2024-05-22T16:15:11.013",
-  "lastModified": "2024-07-03T02:08:35.967",
+  "lastModified": "2024-10-25T19:35:15.010",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -46,7 +46,7 @@
       "description": [
         {
           "lang": "en",
-          "value": "CWE-122"
+          "value": "CWE-125"
         }
       ]
     }
diff --git a/CVE-2024/CVE-2024-58xx/CVE-2024-5836.json b/CVE-2024/CVE-2024-58xx/CVE-2024-5836.json
index 26a25d8e995..f952a40165d 100644
--- a/CVE-2024/CVE-2024-58xx/CVE-2024-5836.json
+++ b/CVE-2024/CVE-2024-58xx/CVE-2024-5836.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-5836",
   "sourceIdentifier": "chrome-cve-admin@google.com",
   "published": "2024-06-11T21:15:54.657",
-  "lastModified": "2024-08-01T14:00:02.493",
+  "lastModified": "2024-10-25T19:35:15.787",
   "vulnStatus": "Modified",
   "cveTags": [],
   "descriptions": [
@@ -69,16 +69,6 @@
           "value": "NVD-CWE-noinfo"
         }
       ]
-    },
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-474"
-        }
-      ]
     }
   ],
   "configurations": [
diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6611.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6611.json
index cc289a10d8c..29218cb77c5 100644
--- a/CVE-2024/CVE-2024-66xx/CVE-2024-6611.json
+++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6611.json
@@ -2,7 +2,7 @@
   "id": "CVE-2024-6611",
   "sourceIdentifier": "security@mozilla.org",
   "published": "2024-07-09T15:15:13.047",
-  "lastModified": "2024-07-16T18:15:09.590",
+  "lastModified": "2024-10-25T18:35:10.737",
   "vulnStatus": "Awaiting Analysis",
   "cveTags": [],
   "descriptions": [
@@ -39,18 +39,6 @@
       }
     ]
   },
-  "weaknesses": [
-    {
-      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
-      "type": "Secondary",
-      "description": [
-        {
-          "lang": "en",
-          "value": "CWE-1275"
-        }
-      ]
-    }
-  ],
   "references": [
     {
       "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1844827",
diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9530.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9530.json
index b690c3c2aee..0946adab541 100644
--- a/CVE-2024/CVE-2024-95xx/CVE-2024-9530.json
+++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9530.json
@@ -2,8 +2,8 @@
   "id": "CVE-2024-9530",
   "sourceIdentifier": "security@wordfence.com",
   "published": "2024-10-23T08:15:03.770",
-  "lastModified": "2024-10-23T15:12:34.673",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T18:52:10.810",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -41,8 +41,18 @@
   },
   "weaknesses": [
     {
-      "source": "security@wordfence.com",
+      "source": "nvd@nist.gov",
       "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "NVD-CWE-noinfo"
+        }
+      ]
+    },
+    {
+      "source": "security@wordfence.com",
+      "type": "Secondary",
       "description": [
         {
           "lang": "en",
@@ -51,14 +61,38 @@
       ]
     }
   ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:a:qodeinteractive:qi_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
+              "versionEndExcluding": "1.8.1",
+              "matchCriteriaId": "F7F221B4-E19A-42FF-A7BD-EFD37DC5A8CD"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3170536%40qi-addons-for-elementor%2Ftrunk&old=3159768%40qi-addons-for-elementor%2Ftrunk&sfp_email=&sfph_mail=",
-      "source": "security@wordfence.com"
+      "source": "security@wordfence.com",
+      "tags": [
+        "Patch"
+      ]
     },
     {
       "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0dd93514-657c-4b04-931a-23f3d405fb88?source=cve",
-      "source": "security@wordfence.com"
+      "source": "security@wordfence.com",
+      "tags": [
+        "Third Party Advisory"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9584.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9584.json
new file mode 100644
index 00000000000..df24e038f1f
--- /dev/null
+++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9584.json
@@ -0,0 +1,60 @@
+{
+  "id": "CVE-2024-9584",
+  "sourceIdentifier": "security@wordfence.com",
+  "published": "2024-10-25T18:15:04.673",
+  "lastModified": "2024-10-25T18:15:04.673",
+  "vulnStatus": "Received",
+  "cveTags": [],
+  "descriptions": [
+    {
+      "lang": "en",
+      "value": "The Image Map Pro plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on the AJAX functions in versions up to, and including, 6.0.20. This makes it possible for authenticated attackers with contributor-level privileges or above, to add, update or delete map projects."
+    }
+  ],
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "security@wordfence.com",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "NONE",
+          "integrityImpact": "LOW",
+          "availabilityImpact": "LOW",
+          "baseScore": 5.4,
+          "baseSeverity": "MEDIUM"
+        },
+        "exploitabilityScore": 2.8,
+        "impactScore": 2.5
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "security@wordfence.com",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-862"
+        }
+      ]
+    }
+  ],
+  "references": [
+    {
+      "url": "https://imagemappro.com/change-log/",
+      "source": "security@wordfence.com"
+    },
+    {
+      "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7c632452-8b13-4f78-aa8a-3c92bef5907f?source=cve",
+      "source": "security@wordfence.com"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9585.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9585.json
new file mode 100644
index 00000000000..aee6312dd6c
--- /dev/null
+++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9585.json
@@ -0,0 +1,60 @@
+{
+  "id": "CVE-2024-9585",
+  "sourceIdentifier": "security@wordfence.com",
+  "published": "2024-10-25T18:15:04.907",
+  "lastModified": "2024-10-25T18:15:04.907",
+  "vulnStatus": "Received",
+  "cveTags": [],
+  "descriptions": [
+    {
+      "lang": "en",
+      "value": "The Image Map Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'save_project' function with an arbitrary shortcode in versions up to, and including, 6.0.20 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+    }
+  ],
+  "metrics": {
+    "cvssMetricV31": [
+      {
+        "source": "security@wordfence.com",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "CHANGED",
+          "confidentialityImpact": "LOW",
+          "integrityImpact": "LOW",
+          "availabilityImpact": "NONE",
+          "baseScore": 6.4,
+          "baseSeverity": "MEDIUM"
+        },
+        "exploitabilityScore": 3.1,
+        "impactScore": 2.7
+      }
+    ]
+  },
+  "weaknesses": [
+    {
+      "source": "security@wordfence.com",
+      "type": "Secondary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-79"
+        }
+      ]
+    }
+  ],
+  "references": [
+    {
+      "url": "https://imagemappro.com/change-log/",
+      "source": "security@wordfence.com"
+    },
+    {
+      "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/22245bb5-a310-4cd2-98e3-6611e71ff7fa?source=cve",
+      "source": "security@wordfence.com"
+    }
+  ]
+}
\ No newline at end of file
diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9987.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9987.json
index 9956214877a..86324ecef50 100644
--- a/CVE-2024/CVE-2024-99xx/CVE-2024-9987.json
+++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9987.json
@@ -2,8 +2,8 @@
   "id": "CVE-2024-9987",
   "sourceIdentifier": "security@pandorafms.com",
   "published": "2024-10-22T09:15:03.497",
-  "lastModified": "2024-10-23T15:12:34.673",
-  "vulnStatus": "Awaiting Analysis",
+  "lastModified": "2024-10-25T19:06:35.350",
+  "vulnStatus": "Analyzed",
   "cveTags": [],
   "descriptions": [
     {
@@ -59,9 +59,41 @@
           "baseSeverity": "HIGH"
         }
       }
+    ],
+    "cvssMetricV31": [
+      {
+        "source": "nvd@nist.gov",
+        "type": "Primary",
+        "cvssData": {
+          "version": "3.1",
+          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
+          "attackVector": "NETWORK",
+          "attackComplexity": "LOW",
+          "privilegesRequired": "LOW",
+          "userInteraction": "NONE",
+          "scope": "UNCHANGED",
+          "confidentialityImpact": "HIGH",
+          "integrityImpact": "HIGH",
+          "availabilityImpact": "HIGH",
+          "baseScore": 8.8,
+          "baseSeverity": "HIGH"
+        },
+        "exploitabilityScore": 2.8,
+        "impactScore": 5.9
+      }
     ]
   },
   "weaknesses": [
+    {
+      "source": "nvd@nist.gov",
+      "type": "Primary",
+      "description": [
+        {
+          "lang": "en",
+          "value": "CWE-89"
+        }
+      ]
+    },
     {
       "source": "security@pandorafms.com",
       "type": "Secondary",
@@ -73,10 +105,32 @@
       ]
     }
   ],
+  "configurations": [
+    {
+      "nodes": [
+        {
+          "operator": "OR",
+          "negate": false,
+          "cpeMatch": [
+            {
+              "vulnerable": true,
+              "criteria": "cpe:2.3:a:pandorafms:pandora_fms:*:*:*:*:*:*:*:*",
+              "versionStartIncluding": "700",
+              "versionEndIncluding": "777.3",
+              "matchCriteriaId": "666704E5-7450-4CA4-8FC1-11FB91DE2E64"
+            }
+          ]
+        }
+      ]
+    }
+  ],
   "references": [
     {
       "url": "https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/",
-      "source": "security@pandorafms.com"
+      "source": "security@pandorafms.com",
+      "tags": [
+        "Vendor Advisory"
+      ]
     }
   ]
 }
\ No newline at end of file
diff --git a/README.md b/README.md
index 3dde97e0406..444d083d05a 100644
--- a/README.md
+++ b/README.md
@@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
 ### Last Repository Update
 
 ```plain
-2024-10-25T18:00:18.940756+00:00
+2024-10-25T20:00:18.737714+00:00
 ```
 
 ### Most recent CVE Modification Timestamp synchronized with NVD
 
 ```plain
-2024-10-25T17:35:05.913000+00:00
+2024-10-25T19:59:00.933000+00:00
 ```
 
 ### Last Data Feed Release
@@ -33,64 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
 ### Total Number of included CVEs
 
 ```plain
-267095
+267105
 ```
 
 ### CVEs added in the last Commit
 
-Recently added CVEs: `20`
-
-- [CVE-2022-30354](CVE-2022/CVE-2022-303xx/CVE-2022-30354.json) (`2024-10-25T16:15:08.663`)
-- [CVE-2022-30355](CVE-2022/CVE-2022-303xx/CVE-2022-30355.json) (`2024-10-25T16:15:08.733`)
-- [CVE-2022-30356](CVE-2022/CVE-2022-303xx/CVE-2022-30356.json) (`2024-10-25T17:15:03.387`)
-- [CVE-2022-30357](CVE-2022/CVE-2022-303xx/CVE-2022-30357.json) (`2024-10-25T17:15:03.450`)
-- [CVE-2022-30358](CVE-2022/CVE-2022-303xx/CVE-2022-30358.json) (`2024-10-25T17:15:03.507`)
-- [CVE-2022-30359](CVE-2022/CVE-2022-303xx/CVE-2022-30359.json) (`2024-10-25T17:15:03.570`)
-- [CVE-2022-30360](CVE-2022/CVE-2022-303xx/CVE-2022-30360.json) (`2024-10-25T17:15:03.630`)
-- [CVE-2022-30361](CVE-2022/CVE-2022-303xx/CVE-2022-30361.json) (`2024-10-25T17:15:03.700`)
-- [CVE-2023-26248](CVE-2023/CVE-2023-262xx/CVE-2023-26248.json) (`2024-10-25T16:15:09.500`)
-- [CVE-2024-10386](CVE-2024/CVE-2024-103xx/CVE-2024-10386.json) (`2024-10-25T17:15:03.987`)
-- [CVE-2024-10387](CVE-2024/CVE-2024-103xx/CVE-2024-10387.json) (`2024-10-25T17:15:04.230`)
-- [CVE-2024-48204](CVE-2024/CVE-2024-482xx/CVE-2024-48204.json) (`2024-10-25T16:15:09.873`)
-- [CVE-2024-48459](CVE-2024/CVE-2024-484xx/CVE-2024-48459.json) (`2024-10-25T17:15:04.703`)
-- [CVE-2024-48579](CVE-2024/CVE-2024-485xx/CVE-2024-48579.json) (`2024-10-25T16:15:09.940`)
-- [CVE-2024-48580](CVE-2024/CVE-2024-485xx/CVE-2024-48580.json) (`2024-10-25T16:15:09.993`)
-- [CVE-2024-48581](CVE-2024/CVE-2024-485xx/CVE-2024-48581.json) (`2024-10-25T16:15:10.047`)
-- [CVE-2024-48654](CVE-2024/CVE-2024-486xx/CVE-2024-48654.json) (`2024-10-25T17:15:04.763`)
-- [CVE-2024-48655](CVE-2024/CVE-2024-486xx/CVE-2024-48655.json) (`2024-10-25T17:15:04.817`)
-- [CVE-2024-48743](CVE-2024/CVE-2024-487xx/CVE-2024-48743.json) (`2024-10-25T17:15:04.873`)
-- [CVE-2024-8036](CVE-2024/CVE-2024-80xx/CVE-2024-8036.json) (`2024-10-25T17:15:04.963`)
+Recently added CVEs: `10`
+
+- [CVE-2024-37844](CVE-2024/CVE-2024-378xx/CVE-2024-37844.json) (`2024-10-25T19:15:03.897`)
+- [CVE-2024-37845](CVE-2024/CVE-2024-378xx/CVE-2024-37845.json) (`2024-10-25T19:15:03.973`)
+- [CVE-2024-37846](CVE-2024/CVE-2024-378xx/CVE-2024-37846.json) (`2024-10-25T19:15:04.027`)
+- [CVE-2024-37847](CVE-2024/CVE-2024-378xx/CVE-2024-37847.json) (`2024-10-25T19:15:04.087`)
+- [CVE-2024-48343](CVE-2024/CVE-2024-483xx/CVE-2024-48343.json) (`2024-10-25T18:15:04.250`)
+- [CVE-2024-48448](CVE-2024/CVE-2024-484xx/CVE-2024-48448.json) (`2024-10-25T18:15:04.330`)
+- [CVE-2024-48450](CVE-2024/CVE-2024-484xx/CVE-2024-48450.json) (`2024-10-25T19:15:04.373`)
+- [CVE-2024-48700](CVE-2024/CVE-2024-487xx/CVE-2024-48700.json) (`2024-10-25T18:15:04.407`)
+- [CVE-2024-9584](CVE-2024/CVE-2024-95xx/CVE-2024-9584.json) (`2024-10-25T18:15:04.673`)
+- [CVE-2024-9585](CVE-2024/CVE-2024-95xx/CVE-2024-9585.json) (`2024-10-25T18:15:04.907`)
 
 
 ### CVEs modified in the last Commit
 
-Recently modified CVEs: `40`
-
-- [CVE-2024-43177](CVE-2024/CVE-2024-431xx/CVE-2024-43177.json) (`2024-10-25T16:05:15.777`)
-- [CVE-2024-44098](CVE-2024/CVE-2024-440xx/CVE-2024-44098.json) (`2024-10-25T17:35:01.100`)
-- [CVE-2024-44812](CVE-2024/CVE-2024-448xx/CVE-2024-44812.json) (`2024-10-25T16:56:11.150`)
-- [CVE-2024-47024](CVE-2024/CVE-2024-470xx/CVE-2024-47024.json) (`2024-10-25T17:35:01.947`)
-- [CVE-2024-47025](CVE-2024/CVE-2024-470xx/CVE-2024-47025.json) (`2024-10-25T17:35:02.767`)
-- [CVE-2024-47026](CVE-2024/CVE-2024-470xx/CVE-2024-47026.json) (`2024-10-25T17:35:03.593`)
-- [CVE-2024-47027](CVE-2024/CVE-2024-470xx/CVE-2024-47027.json) (`2024-10-25T17:35:04.390`)
-- [CVE-2024-47028](CVE-2024/CVE-2024-470xx/CVE-2024-47028.json) (`2024-10-25T17:35:05.147`)
-- [CVE-2024-47029](CVE-2024/CVE-2024-470xx/CVE-2024-47029.json) (`2024-10-25T16:35:07.850`)
-- [CVE-2024-47033](CVE-2024/CVE-2024-470xx/CVE-2024-47033.json) (`2024-10-25T17:35:05.913`)
-- [CVE-2024-47034](CVE-2024/CVE-2024-470xx/CVE-2024-47034.json) (`2024-10-25T16:35:08.630`)
-- [CVE-2024-47035](CVE-2024/CVE-2024-470xx/CVE-2024-47035.json) (`2024-10-25T16:35:09.407`)
-- [CVE-2024-47041](CVE-2024/CVE-2024-470xx/CVE-2024-47041.json) (`2024-10-25T16:35:10.220`)
-- [CVE-2024-48415](CVE-2024/CVE-2024-484xx/CVE-2024-48415.json) (`2024-10-25T16:55:26.083`)
-- [CVE-2024-48540](CVE-2024/CVE-2024-485xx/CVE-2024-48540.json) (`2024-10-25T16:35:11.093`)
-- [CVE-2024-48652](CVE-2024/CVE-2024-486xx/CVE-2024-48652.json) (`2024-10-25T16:51:57.013`)
-- [CVE-2024-48926](CVE-2024/CVE-2024-489xx/CVE-2024-48926.json) (`2024-10-25T16:19:17.073`)
-- [CVE-2024-48927](CVE-2024/CVE-2024-489xx/CVE-2024-48927.json) (`2024-10-25T16:15:13.327`)
-- [CVE-2024-48929](CVE-2024/CVE-2024-489xx/CVE-2024-48929.json) (`2024-10-25T16:12:15.897`)
-- [CVE-2024-8500](CVE-2024/CVE-2024-85xx/CVE-2024-8500.json) (`2024-10-25T16:43:24.040`)
-- [CVE-2024-9583](CVE-2024/CVE-2024-95xx/CVE-2024-9583.json) (`2024-10-25T16:28:17.497`)
-- [CVE-2024-9628](CVE-2024/CVE-2024-96xx/CVE-2024-9628.json) (`2024-10-25T16:15:10.160`)
-- [CVE-2024-9829](CVE-2024/CVE-2024-98xx/CVE-2024-9829.json) (`2024-10-25T16:30:44.520`)
-- [CVE-2024-9927](CVE-2024/CVE-2024-99xx/CVE-2024-9927.json) (`2024-10-25T16:29:27.300`)
-- [CVE-2024-9947](CVE-2024/CVE-2024-99xx/CVE-2024-9947.json) (`2024-10-25T16:53:12.867`)
+Recently modified CVEs: `83`
+
+- [CVE-2024-44099](CVE-2024/CVE-2024-440xx/CVE-2024-44099.json) (`2024-10-25T19:35:07.773`)
+- [CVE-2024-44100](CVE-2024/CVE-2024-441xx/CVE-2024-44100.json) (`2024-10-25T19:35:08.533`)
+- [CVE-2024-44101](CVE-2024/CVE-2024-441xx/CVE-2024-44101.json) (`2024-10-25T19:35:09.280`)
+- [CVE-2024-46240](CVE-2024/CVE-2024-462xx/CVE-2024-46240.json) (`2024-10-25T19:00:20.737`)
+- [CVE-2024-47012](CVE-2024/CVE-2024-470xx/CVE-2024-47012.json) (`2024-10-25T19:35:10.183`)
+- [CVE-2024-47013](CVE-2024/CVE-2024-470xx/CVE-2024-47013.json) (`2024-10-25T19:35:10.947`)
+- [CVE-2024-47014](CVE-2024/CVE-2024-470xx/CVE-2024-47014.json) (`2024-10-25T19:35:11.740`)
+- [CVE-2024-48139](CVE-2024/CVE-2024-481xx/CVE-2024-48139.json) (`2024-10-25T19:35:12.730`)
+- [CVE-2024-48140](CVE-2024/CVE-2024-481xx/CVE-2024-48140.json) (`2024-10-25T19:35:13.497`)
+- [CVE-2024-48141](CVE-2024/CVE-2024-481xx/CVE-2024-48141.json) (`2024-10-25T19:35:14.257`)
+- [CVE-2024-48142](CVE-2024/CVE-2024-481xx/CVE-2024-48142.json) (`2024-10-25T18:35:08.560`)
+- [CVE-2024-48143](CVE-2024/CVE-2024-481xx/CVE-2024-48143.json) (`2024-10-25T18:35:09.327`)
+- [CVE-2024-48570](CVE-2024/CVE-2024-485xx/CVE-2024-48570.json) (`2024-10-25T18:59:22.033`)
+- [CVE-2024-48706](CVE-2024/CVE-2024-487xx/CVE-2024-48706.json) (`2024-10-25T18:58:35.380`)
+- [CVE-2024-48707](CVE-2024/CVE-2024-487xx/CVE-2024-48707.json) (`2024-10-25T19:11:54.310`)
+- [CVE-2024-48708](CVE-2024/CVE-2024-487xx/CVE-2024-48708.json) (`2024-10-25T19:10:08.457`)
+- [CVE-2024-49996](CVE-2024/CVE-2024-499xx/CVE-2024-49996.json) (`2024-10-25T19:56:10.320`)
+- [CVE-2024-50000](CVE-2024/CVE-2024-500xx/CVE-2024-50000.json) (`2024-10-25T19:55:55.357`)
+- [CVE-2024-50012](CVE-2024/CVE-2024-500xx/CVE-2024-50012.json) (`2024-10-25T19:55:40.217`)
+- [CVE-2024-50013](CVE-2024/CVE-2024-500xx/CVE-2024-50013.json) (`2024-10-25T19:49:36.863`)
+- [CVE-2024-5159](CVE-2024/CVE-2024-51xx/CVE-2024-5159.json) (`2024-10-25T19:35:15.010`)
+- [CVE-2024-5836](CVE-2024/CVE-2024-58xx/CVE-2024-5836.json) (`2024-10-25T19:35:15.787`)
+- [CVE-2024-6611](CVE-2024/CVE-2024-66xx/CVE-2024-6611.json) (`2024-10-25T18:35:10.737`)
+- [CVE-2024-9530](CVE-2024/CVE-2024-95xx/CVE-2024-9530.json) (`2024-10-25T18:52:10.810`)
+- [CVE-2024-9987](CVE-2024/CVE-2024-99xx/CVE-2024-9987.json) (`2024-10-25T19:06:35.350`)
 
 
 ## Download and Usage
diff --git a/_state.csv b/_state.csv
index a320a763854..cb3d0b3f538 100644
--- a/_state.csv
+++ b/_state.csv
@@ -176776,7 +176776,7 @@ CVE-2021-33141,0,0,e0a065c9925276699eb5f8937853ed461086d29f7a31aeec1551cbb7f5460
 CVE-2021-33142,0,0,6b6d2e7a3593474e941a48c0e0a86b2afdb88e9d637d16ea56105561edab726b,2024-05-17T18:36:31.297000
 CVE-2021-33143,0,0,d33bc31405c694174d143c612f45f6bb45da8c342a10f9e04e8fe9e0b4afac47,2024-05-17T01:57:50.467000
 CVE-2021-33144,0,0,9a9f4bc57e199cf457d3114610bce4b7cdb0bca10058a5af438e8b02d657b104,2024-05-17T01:57:50.507000
-CVE-2021-33145,0,0,fa8c9843e7b9fcca7c562a7add034c5c8e68695955e92bb0c378acd44a9f83dd,2024-07-03T01:36:45.387000
+CVE-2021-33145,0,1,f6fedb7ea0ffd4f9b5854891de3ec3bf7fcad1994b7d5fcf04fe5f8486d8999c,2024-10-25T19:35:00.780000
 CVE-2021-33146,0,0,1b10b1154ea12dfba2ef43c2271cc4baf012ccc3e3f0df488ec84bb305233130,2024-07-03T01:36:46.133000
 CVE-2021-33147,0,0,4fd910e8850035a7c5a60833e30ea5134ba4be70dca5cf5c934dfae1565347c4,2022-02-15T16:51:32.753000
 CVE-2021-33148,0,0,a6a0f8af441e615c4cab080b9ae7f289c149d473f5d60c819201878714dd3401,2024-05-17T01:57:50.630000
@@ -198413,15 +198413,15 @@ CVE-2022-3035,0,0,56f1fc89fb5d6992dffdef4a1f1866585697ecbd361910f27cf4eb74bef319
 CVE-2022-30350,0,0,18d3001ce63cdc43cde8480b95b699a5a0a5ecb7deba51d4dc72c0d86c6408f8,2023-04-10T16:55:52.733000
 CVE-2022-30351,0,0,2df1fcff158bfaa98e8e388cc82c7b76555d1068f7cfc1016565d9f0f49748dd,2023-04-10T16:42:49.510000
 CVE-2022-30352,0,0,9c99852cab9cb3dba12ad494a32dc9a161c396d474ce4e7a613cf8447766b558,2022-06-10T02:33:25.820000
-CVE-2022-30354,1,1,7cba051f8dce4545bb466640a9f5c05e0372bd088683a3405bf2a27c2cce1974,2024-10-25T16:15:08.663000
-CVE-2022-30355,1,1,a63c222394726d2b71551b949ec5395a64f26fd11980591e88025dc69028c968,2024-10-25T16:15:08.733000
-CVE-2022-30356,1,1,9308385fcbcb801d9c8b00db22c0630d9b3e8c8ae137f0fed3bf5630f60767fa,2024-10-25T17:15:03.387000
-CVE-2022-30357,1,1,69ac61555cbd98d1a0a5e01a94a9884cf5cfab9c5fac56dd7704263164771904,2024-10-25T17:15:03.450000
-CVE-2022-30358,1,1,09934a292607f0f0fec4c9584ccd370034b961e333a8196f11a9642776345e47,2024-10-25T17:15:03.507000
-CVE-2022-30359,1,1,cd098a9a0befa2548cd8f1a5cc248bfe7beae08baa1c613c2049e59c36272bdf,2024-10-25T17:15:03.570000
+CVE-2022-30354,0,0,7cba051f8dce4545bb466640a9f5c05e0372bd088683a3405bf2a27c2cce1974,2024-10-25T16:15:08.663000
+CVE-2022-30355,0,1,5dc1531b708befb320f7d2b9c4c4c759ee5636e9d0af320547d51d8dc9a1901c,2024-10-25T19:35:01.173000
+CVE-2022-30356,0,0,9308385fcbcb801d9c8b00db22c0630d9b3e8c8ae137f0fed3bf5630f60767fa,2024-10-25T17:15:03.387000
+CVE-2022-30357,0,0,69ac61555cbd98d1a0a5e01a94a9884cf5cfab9c5fac56dd7704263164771904,2024-10-25T17:15:03.450000
+CVE-2022-30358,0,0,09934a292607f0f0fec4c9584ccd370034b961e333a8196f11a9642776345e47,2024-10-25T17:15:03.507000
+CVE-2022-30359,0,0,cd098a9a0befa2548cd8f1a5cc248bfe7beae08baa1c613c2049e59c36272bdf,2024-10-25T17:15:03.570000
 CVE-2022-3036,0,0,c4abe10251774bed45d05e8655ab46440316bc2da3c56604182cb58b05d9789f,2022-09-21T15:01:39.933000
-CVE-2022-30360,1,1,34569a3f641a3cdd7841c1c67f2a5aa99c1c300275cfc941611e517f8fba9cfc,2024-10-25T17:15:03.630000
-CVE-2022-30361,1,1,db7f1efce552edea697a9c8209f404511683bc404219a3cf97df9f6f95f43d37,2024-10-25T17:15:03.700000
+CVE-2022-30360,0,0,34569a3f641a3cdd7841c1c67f2a5aa99c1c300275cfc941611e517f8fba9cfc,2024-10-25T17:15:03.630000
+CVE-2022-30361,0,0,db7f1efce552edea697a9c8209f404511683bc404219a3cf97df9f6f95f43d37,2024-10-25T17:15:03.700000
 CVE-2022-30367,0,0,4ab429b852faf9723dbf506dba281ae94cd253e629be5b5f8d2fb2c552ccac49,2022-05-23T16:59:24.497000
 CVE-2022-3037,0,0,c435799296f92b50e0bd30d245bc09441dcbbe40f6a0905fc66767266b6ff152,2023-11-07T03:50:43.193000
 CVE-2022-30370,0,0,43e003e1eee0ff632ee04c0ec5c6be63af911ff9967992f449cf67592ab6166e,2022-05-23T16:49:37.360000
@@ -212596,24 +212596,24 @@ CVE-2022-48971,0,0,998975336af1feca0df2eeedd516faed136509784fd2222bb672c33e3083f
 CVE-2022-48972,0,0,1b38bc5eab69345ffacf3735f7c4d7a21942b008815acccb4048e2196ca88ff8,2024-10-25T15:22:33.897000
 CVE-2022-48973,0,0,976ef450614292c62923177c314a4b2aa5b18418ae239de605da93f276c749ea,2024-10-25T15:35:54.687000
 CVE-2022-48974,0,0,665d9c03b3d3f1f2b3e7ecc5cabdfc4e26418e7914055dc95137c3a3c52dd1bf,2024-10-25T15:25:54.433000
-CVE-2022-48975,0,0,5aa03611cf6147e6cbe4a65152583e0072aea2d5e51c8399c173faf09094d685,2024-10-23T15:13:25.583000
-CVE-2022-48976,0,0,a64de68b36096327ba87788e46c4482923e9b464dece26a8aba3dd90cbbbdf36,2024-10-23T15:13:25.583000
-CVE-2022-48977,0,0,22a1f9cacabe8dede59f80dc5c8e91dcb66c9e473ead5c6f5b52cff09106031d,2024-10-23T15:13:25.583000
-CVE-2022-48978,0,0,31293eb0f81829ea7af1f070d7a3df5a1790f8574ca5251e33cd7c1710ed9003,2024-10-23T15:13:25.583000
-CVE-2022-48979,0,0,d38e0f35f5b0051b12afc3385f777364a73a3b1754aa2556c22567d7fd4543a8,2024-10-23T15:13:25.583000
+CVE-2022-48975,0,1,e1fb3e2bc7f9ba54b7ee65fa841ac29a199874f317e3d17428ca1b5f9402dbe2,2024-10-25T18:48:57.490000
+CVE-2022-48976,0,1,bbbf0bdfd942edca0508c3b6adeeebc2a07f64cf4a932ca62327eb55c9a12c1c,2024-10-25T18:47:40.823000
+CVE-2022-48977,0,1,eff713f1e22ab6714c388c4b46d09006813ee4d3c2ac4f34360f0c12818df52d,2024-10-25T18:47:07.357000
+CVE-2022-48978,0,1,63d84a3101a74198d1a57d7e01f661d8ddede015533d663af8fbf98cad6e5e89,2024-10-25T18:46:23.317000
+CVE-2022-48979,0,1,6e293a7d4d94801184b43db15d0a018f7d2d54654b239c95c385d82bf055453d,2024-10-25T18:40:16.227000
 CVE-2022-4898,0,0,45b8fe73140eae686f75256e6a033fa7f76a1c506314cc4b83a596aba96b02bc,2023-02-21T15:15:12.023000
-CVE-2022-48980,0,0,8d526640cbdfc2eac896bd10a04a158881a6eaf9b8c038323a974e23d54cd968,2024-10-23T15:13:25.583000
-CVE-2022-48981,0,0,964b5764196aa475d717a98d105807ba1ba56de8f543da7fb2f4d00ef08bab19,2024-10-23T15:13:25.583000
-CVE-2022-48982,0,0,2b231419453512dd11ff8c1000c255778689437792243f66ab1524a71b12fbdf,2024-10-23T15:13:25.583000
+CVE-2022-48980,0,1,847f9f7949c9e624eef3c5211fe6f9f34a42f62c669ae41cbeca15bb8a3e49f0,2024-10-25T18:36:00.703000
+CVE-2022-48981,0,1,edbe50226f61eeb3964ee5f01c48ece48013ec7f030ccd46e06c058038ce5163,2024-10-25T18:33:18.783000
+CVE-2022-48982,0,1,58fbd0b9b2a1580dc158a88315d6703348749f40d4fc009911acc30aa732771b,2024-10-25T18:12:52.270000
 CVE-2022-48983,0,0,dfa67a553ef1fa3c57f719e3548ad9b975bf5a0f74df240dd01055c881443dcd,2024-10-25T15:58:02.297000
 CVE-2022-48984,0,0,e51fd7e8de77f3a8cf163611cb2f09fc6b7014335c2a9168caf96cf9450b0b0f,2024-10-25T15:53:53.890000
 CVE-2022-48985,0,0,6cf11753a689d662f9255b9369c8210e89bb6def1b70b9ecf2bda7c020ae1116,2024-10-23T15:13:25.583000
 CVE-2022-48986,0,0,6c9de2cdc1f05896064512205d6a856f3488acd470650f11d2c15464c4a320e4,2024-10-23T15:13:25.583000
 CVE-2022-48987,0,0,7e41a00ba39093b717c7e7821e300a97872c374b14c3fe63fb5c52c9819075bf,2024-10-23T15:13:25.583000
 CVE-2022-48988,0,0,13aee4cb90261ef632b8011d536d4f4d81a59bc5186a33e9a1bb37d07ce9e2c4,2024-10-23T15:13:25.583000
-CVE-2022-48989,0,1,12f08708869bbe9ec063b7392e0e15042d70e2feeae860945b26c11deb45e931,2024-10-25T16:02:05.787000
+CVE-2022-48989,0,0,12f08708869bbe9ec063b7392e0e15042d70e2feeae860945b26c11deb45e931,2024-10-25T16:02:05.787000
 CVE-2022-4899,0,0,64070b82b08d57aace9b84f3711bc30a23fda3b7a68f2b187d0af07aa5382f53,2023-11-07T03:59:16.090000
-CVE-2022-48990,0,1,f3f5f9ba37039dd5bdebda25bf3b72aaf6156992a282b1be1c6dde6507784974,2024-10-25T16:03:41.527000
+CVE-2022-48990,0,0,f3f5f9ba37039dd5bdebda25bf3b72aaf6156992a282b1be1c6dde6507784974,2024-10-25T16:03:41.527000
 CVE-2022-48991,0,0,6a7cb21a3ac184136cd0ab4a861f7301f05b1785725a9d2367d58cd519d1b08f,2024-10-23T15:13:25.583000
 CVE-2022-48992,0,0,8f56e9ce177d276837e828e603f41b46405afcc8129dce28e104445db61b74c5,2024-10-25T15:51:38.037000
 CVE-2022-48993,0,0,ef216d3e2a04a71a8d804734065ba340ce4d331bb10df8d692bb266c02e77712,2024-10-23T09:15:02.593000
@@ -219837,7 +219837,7 @@ CVE-2023-26243,0,0,48cb445983df6e845460de44bcefe9b053ee215782ea6fb71062113286d3e
 CVE-2023-26244,0,0,3e14139b3a5d244c793fcf72da7c9d561b05de05bc6b4a0cc6be5180c7f30def,2023-05-08T14:15:15.390000
 CVE-2023-26245,0,0,755add3a1550f5f231ae6bc72bcb3689b3591a566d528b68a135543809ea17f8,2023-05-08T14:15:48.107000
 CVE-2023-26246,0,0,3968ee2416178f3373b173158130de8333d79f4b30871ec73ef61f489c3ad845,2023-05-08T14:15:42.497000
-CVE-2023-26248,1,1,1226826808b3a14467514cae889974b976a1cc373f34617329f41e9945ca0855,2024-10-25T16:15:09.500000
+CVE-2023-26248,0,0,1226826808b3a14467514cae889974b976a1cc373f34617329f41e9945ca0855,2024-10-25T16:15:09.500000
 CVE-2023-26249,0,0,67d1d0c7cd14c3e554469121f96a8b736060705fef121074c7fbb5229e25b180,2023-03-02T23:20:03.390000
 CVE-2023-2625,0,0,9986d8092e79a4b295b9781284b5a771179624be994dd8d9e9634af08ab34626,2023-07-06T16:10:43.413000
 CVE-2023-26253,0,0,1ae34e99a0e17ae55380be2767abcad6c3e45c70e14babf83d8ba52ebd904367,2023-11-07T04:09:31.830000
@@ -227576,7 +227576,7 @@ CVE-2023-36487,0,0,4ee451a0564756ffd2f87667dd3e053ca883a586efcb5e3646d6db8c84bbd
 CVE-2023-36488,0,0,8a8c94d3e56d54aa8236dd81881b8fd4e3b6cf6358546f3bd01ade2f9809eb94,2023-07-07T17:17:29.997000
 CVE-2023-36489,0,0,dc3b2a16fb93102da57c7283fbace2014f377f0bd7bc62fc2588a28c19875238,2023-09-11T13:36:35.507000
 CVE-2023-3649,0,0,e5601b17dd56710e279a251177061f0fafab9b420c2e2a77a3dbf0de88036ac3,2023-07-25T18:20:46.537000
-CVE-2023-36490,0,0,119165280024c3c9b9d70c125a0f3d01d53952b0224cf1691f9ab32fd4083c97,2024-02-14T15:01:46.050000
+CVE-2023-36490,0,1,212625366332af3d57eec534d617401802f3ed4def9de6e9a6bbc60e2168ff1f,2024-10-25T19:40:43.417000
 CVE-2023-36492,0,0,a6fdf1b6c1920694305ae38a0209cc3b60add5c0d6876bff239d05fef669fc26,2023-09-08T16:48:06.590000
 CVE-2023-36493,0,0,0616934dcaec5abb5bed6dc7f46ba3e7e0347b94b99ba052265b2e8e478656d0,2024-02-14T15:01:46.050000
 CVE-2023-36494,0,0,11b002c7660baf795f5041a7c39da6a423e11c613352f9cd1ef2e12fe703cd9a,2023-08-07T20:03:35.267000
@@ -228026,7 +228026,7 @@ CVE-2023-3703,0,0,068e0b1f7843fd3f40e1bbb100dd81035cac75a5a96efe260c2bf4520dd681
 CVE-2023-3704,0,0,793d9220d2da7f9b3fa1a1422d71c1aea286d4f76d2d1332891021d1253c90f6,2023-09-01T17:12:08.027000
 CVE-2023-37049,0,0,5bb9a8e44ea747874aa62b6c776677530d8780a6d693b25786035510152b5bb7,2023-07-31T18:12:44.960000
 CVE-2023-3705,0,0,dd535da15bc24d4772bb9fea1dd1db9053b8e85cfda0d0123768f455a693d9fa,2024-10-02T21:35:11.020000
-CVE-2023-37057,0,0,e1223f8efcbaf7ddeedc5d28ed13cdf256cc28b55524c35baa26ced5559f6966,2024-07-03T01:40:30.133000
+CVE-2023-37057,0,1,cb4dabaa18f8952e184ff41a265048d993a683ef833689b31804b434bc233812,2024-10-25T19:35:02.943000
 CVE-2023-37058,0,0,eff855c03dbccfeeb722602f8747e282673b8e0d20673a6a13b2384c9bf3aeea,2024-08-26T13:21:34.693000
 CVE-2023-3706,0,0,bf0c4659730cc64b8185baa2687b08807130d9eec2e6a62373b00bff897cec78,2023-11-07T04:19:25.570000
 CVE-2023-37061,0,0,ae38a5d48720b8f86c566ccc68715d9acf86f46115f38bfd0cd8f1590bd4a3ab,2023-07-12T20:58:22.373000
@@ -228887,7 +228887,7 @@ CVE-2023-38130,0,0,a4d937a40ab1906cc70a377b2965fb97adc8d21f6a7f14d60e6427d2863f3
 CVE-2023-38131,0,0,f92c1cb176fd142005f4dc8e0e46e473f799f5268800d2a119ca21923a92c65b,2023-11-17T04:12:48.530000
 CVE-2023-38132,0,0,2e29d7e4390895d75db8d14175ecf954c2b73938ed2c37d00fe12fa95aed044a,2024-10-08T15:35:11.083000
 CVE-2023-38133,0,0,af06ef913649a6ee499e8e12b5e3cc4498907d0af745e1aa77e34a778995abf1,2024-01-05T14:15:47.027000
-CVE-2023-38135,0,0,7749fcad167ae61d0a929abd3f0312ffd64f30caed31dcd80ffa2deee6ad5f51,2024-02-14T15:01:46.050000
+CVE-2023-38135,0,1,b66dcf3e36b08e5b13174eb7fed300f364e2b75f26ae57383f7f638fe3f07136,2024-10-25T19:41:09.790000
 CVE-2023-38136,0,0,554f39e979a0861d4175b39a9164da3690299a760aaac82981d94d1c4d3b2c13,2023-08-03T16:56:20.357000
 CVE-2023-38137,0,0,1cec05d7be20edcda40f67c7c6ac8d770b26a8316863ab68482af52d2669688c,2024-02-14T18:15:45.880000
 CVE-2023-38138,0,0,f3ec9c077a05429868cf76734f4c4d6cff4d508294e155ff19fe386e5f02db74,2023-08-07T19:11:51.917000
@@ -229298,7 +229298,7 @@ CVE-2023-38558,0,0,41531cacb1de233098d32b79fd9efecebdba07a9595f0a633638e81ec8b2c
 CVE-2023-38559,0,0,f4de074d6255bba1adaf1a2af72abedea97811f23e11ff71de6632665bc659e7,2024-09-16T13:15:05.667000
 CVE-2023-3856,0,0,31b604aceaf14703f21a8b47a664ff4f650adc31c83b4a1251209c844c970874,2024-05-17T02:27:54.067000
 CVE-2023-38560,0,0,247e24b5ab5349d123f13aa4bc5ee89bef8684469506b9c7e635be9f6283daaa,2023-11-07T04:17:21.293000
-CVE-2023-38561,0,0,c8e08cb46ebd1aa35ebd189dc0663df0fa88b7acddaf3601d5cae603037f46b4,2024-02-14T15:01:46.050000
+CVE-2023-38561,0,1,ff406c0079fec6c6ff77b3655776dbd132debe9e16a7e020eb07ce8fdc933cca,2024-10-25T19:58:38.973000
 CVE-2023-38562,0,0,127d1a2b630856d5538c1ca38a31578c3089871c39c5f3a8684c910dd7a424b2,2024-02-20T19:50:53.960000
 CVE-2023-38563,0,0,cd5653006ddb237fe74acb1487f8018dcc309b748db7c43e87d0e1655d65393a,2023-09-11T13:39:23.730000
 CVE-2023-38564,0,0,b6614995561f59800bbe304c9a4bb6f0df0678257f2d10dccc98201621f1d3d9,2023-08-03T16:48:13.720000
@@ -230512,7 +230512,7 @@ CVE-2023-40152,0,0,dcacc5b44050cb59d212435fbba4b589e052e87e87f7f380cddbb6affa05e
 CVE-2023-40153,0,0,68082b8d0b1cd673ce13fc831779593073884ad14dff8278795b2977ab85be34,2023-10-25T13:39:43.797000
 CVE-2023-40154,0,0,0c21ee8c4fe867d7637a5b5eae7ca984d29457115dd9276ce93b2b7de45045a8,2024-10-23T14:07:44.730000
 CVE-2023-40155,0,0,6607ef25c31938b51bd9b5bc14fc82ea7b9d6e01e850e1c2a7260709004a339f,2024-07-03T01:41:05.087000
-CVE-2023-40156,0,0,5e8f76b298822e89ccc8b4a43484c8f474a98f9ca30f47e72c0a6bb7cf341fbd,2024-02-14T15:01:46.050000
+CVE-2023-40156,0,1,bfae4b687c53df49e6861b02d4b223c8701c3005138ddfe5fc25e8f5f182b643,2024-10-25T19:59:00.933000
 CVE-2023-40158,0,0,f5c33dd671eaea6944f90c9c2dcc1f233b63eb3f3d167e9fce8fa1f154c769a3,2024-10-11T22:35:00.770000
 CVE-2023-40159,0,0,f23653787b2c8d1c7ab49dff62eab2cb6aa12e31e549c1c4d79a1506883bf305,2024-09-05T20:41:09.723000
 CVE-2023-4016,0,0,fd0766ac93b2d18ad336657f47ddb29d4b25b76da4cba12e55388717e6b8762f,2023-12-15T18:19:03.787000
@@ -235007,7 +235007,7 @@ CVE-2023-46518,0,0,50a6b72c9eca27d9118865834eb8eeb2d6571605663676a98cbc4bc277ffc
 CVE-2023-4652,0,0,5222738c738474475cc77f6118c2f194c8e026777ab00d0851e9cdbfda77bd35,2023-09-01T18:39:07.780000
 CVE-2023-46520,0,0,6785302a5c9677ea2ec7e929767d096b2f5d09c9a984620f2dcaf9963a74132f,2024-09-11T16:35:15.170000
 CVE-2023-46521,0,0,ba0fc3a8fc3510daceca92d9bd55661d2ae155990d59b773f724fdc9ba1fc058,2024-09-11T16:35:15.977000
-CVE-2023-46522,0,1,75a62eb161b75a20276cda0b22a36582e143f545fbcc95881a2a51df6fa24c24,2024-10-25T17:15:03.790000
+CVE-2023-46522,0,0,75a62eb161b75a20276cda0b22a36582e143f545fbcc95881a2a51df6fa24c24,2024-10-25T17:15:03.790000
 CVE-2023-46523,0,0,b32818064f5423969c5b5a7f2c46b5f76f2b50349f4ee7c69655f3693d2d7bac,2024-09-11T16:35:17.560000
 CVE-2023-46525,0,0,536995641d0eae55a415097fbcf59d5e1023235e14ee48c525d45b6b231dab64,2024-09-11T16:35:18.350000
 CVE-2023-46526,0,0,330f6130a88e73fcf05e8b87b6f746fc59d12c849d672aa5a5aad838ccd9b5c1,2024-09-11T16:35:19.150000
@@ -236059,7 +236059,7 @@ CVE-2023-48068,0,0,d2ed6581af62c4b74ef3f8171b12ae6e16910b36aa9ccf062a942fd093c09
 CVE-2023-4807,0,0,3de0d677ebbf00153cefbfa374c0ecc381ecf722c89be68b57b7df074a7f14d7,2024-10-14T15:15:12.213000
 CVE-2023-48078,0,0,0d9dcf5cb116c36b06b2365e4b759d1ca0ba54345b6daa32e108a2d9f4c48031,2024-08-14T19:35:13.890000
 CVE-2023-4808,0,0,4a43f94f49b00a1ded4942c432a3569f5fcf99624dd900f508f8d30286fbcfa9,2023-11-27T16:33:33.237000
-CVE-2023-48082,0,1,ea4291e271299bc9548bf3dbd598a1caf33674d80f8f961b04db68b3e8ba972b,2024-10-25T17:15:03.903000
+CVE-2023-48082,0,0,ea4291e271299bc9548bf3dbd598a1caf33674d80f8f961b04db68b3e8ba972b,2024-10-25T17:15:03.903000
 CVE-2023-48084,0,0,459a90979a07550a284aa3e1863b171726a2debcb2ae1cda3b39790a2d652b29,2023-12-19T18:41:44.493000
 CVE-2023-48085,0,0,ad24d46a2c7d3c2e30b77344324b90919c3f0291c86071ef906b236a00e55787,2023-12-19T18:41:59.183000
 CVE-2023-48087,0,0,9729ddec6f348b3a3c6a59a1ffe393a6cd2fd40ee60944b2ab3b3e235f9546cb,2023-11-21T02:42:52.163000
@@ -237965,7 +237965,7 @@ CVE-2023-5080,0,0,e74b710ac5ce55c8b64e5a605db4534fb958b292680076cb58f4eecbcfdcbd
 CVE-2023-50803,0,0,39b8457e6689f19cf0cfb42bf6f8f9bc85c44a7256b507e6e2e5e4502e82fde8,2024-06-25T21:15:51.453000
 CVE-2023-50804,0,0,39f75e54eac34ee2309659a8b63ea3ce44f3663e0d436459f4acb23eb679f665,2024-06-27T16:42:15.310000
 CVE-2023-50805,0,0,6a1b68eb1c84b0e9c0411e8c2b1c211a94333de961886c775bd464a3e1dc9ade,2024-07-11T13:06:13.187000
-CVE-2023-50806,0,0,b76f16dc23feb49e04f1b42035094c51dba4a883093ee0167c8a3ca387a724ae,2024-07-11T15:05:15.190000
+CVE-2023-50806,0,1,ecfb4db274c5901b7304546aec7b66276cb9bab5714351e0c4fb60a29c3cf84b,2024-10-25T18:35:02.050000
 CVE-2023-50807,0,0,49d7ddd672f2ace5a4bacad8e9a69ecb67c1f752bb20673689176d58cf559602,2024-07-11T15:05:15.990000
 CVE-2023-50808,0,0,eb111853188ca06e9540385134be25115b61d3ae24652382189ac577efef0822,2024-10-17T14:35:01.797000
 CVE-2023-50809,0,0,bc071172f4263c6ad714cd837284dbe1dad1416a743fc7cfef6ab03d74ce787e,2024-10-24T20:35:04.223000
@@ -240835,7 +240835,7 @@ CVE-2023-6597,0,0,ac8c057de6d1c11d6944b0b9d92513a5893025dbfa0d30575569eb524fd5d8
 CVE-2023-6598,0,0,44646d82b677b24aa988874a2f513c7a55374b6fc5e8239b526ea32f6db36822,2024-01-17T21:24:33.233000
 CVE-2023-6599,0,0,87adfeaa904a3f0139fc2bf2ce135f454b340363d2ac212c6a95e9e2242d91ba,2023-12-12T17:22:17.503000
 CVE-2023-6600,0,0,6558933adcd201cd8955c6c229da3bb8a7b6988f9263957fe0fdcc657ce47eed,2024-01-10T01:15:38.327000
-CVE-2023-6606,0,1,4cfdb26fdec003d889123845126cfb79253e8be899795563b1b4e029b0ad3ad6,2024-10-25T16:37:21.847000
+CVE-2023-6606,0,0,4cfdb26fdec003d889123845126cfb79253e8be899795563b1b4e029b0ad3ad6,2024-10-25T16:37:21.847000
 CVE-2023-6607,0,0,81fceb5d2210d094481ebc286d221197231e631e432fc51c3654e75c6bb55dc3,2024-05-17T02:33:48.050000
 CVE-2023-6608,0,0,5487174dec87235f3204bcb9adcbf0d2d725602df0e746e9cda4254f8d663296,2024-05-17T02:33:48.163000
 CVE-2023-6609,0,0,c7bba61fa49512bdfc6e42061c9ccef0b9628ee7268c0dc198f2bd1bce9b1d84,2024-05-17T02:33:48.270000
@@ -241412,7 +241412,7 @@ CVE-2023-7256,0,0,4d31b5d621cc269e867da095170b22428e07c2ba7854722005d4b162e4ce2e
 CVE-2023-7258,0,0,743a17302c5d0deefce3c9c18515bc1a780c1d3e967dd943e69bc9c091c417e4,2024-05-15T18:35:11.453000
 CVE-2023-7259,0,0,4927c73cd38943cc915f51b0766c09a76100affe33b1049612344f19331c1f96,2024-08-02T09:15:55.730000
 CVE-2023-7260,0,0,320b55d1f034809d79e51e192994ba6b2fe9aaa6c60b445d7c661747328ccbb2,2024-10-16T12:53:08.807000
-CVE-2023-7261,0,0,44080cc2bc0d6a25d80bc7855327b03309b2d9def17d97f1c55e50122c67ac97,2024-07-03T01:44:30.563000
+CVE-2023-7261,0,1,d82bd77293e7c621816dc935a927a719f351e834364e213cfbe4997d396227f8,2024-10-25T19:35:03.273000
 CVE-2023-7264,0,0,51dd8b83703649c91504628a1d95022ef41c77d28d8363a527e775cafaba1511,2024-06-11T13:54:12.057000
 CVE-2023-7265,0,0,fb43e2fc7ead32f16ab1a40e592be4835649042e83490e66c86a7fe9f44ca4b0,2024-09-06T16:38:04.533000
 CVE-2023-7268,0,0,cddf00fb75fb363308068c92d4a58df3d516324074a1a2ced29fd3b08d0ccedc,2024-08-01T13:45:52.747000
@@ -242347,7 +242347,7 @@ CVE-2024-10033,0,0,c0a9b2336bab3102cd006cc0abae51c59fa7520aa657f85607505772ed524
 CVE-2024-1004,0,0,be9a3a60f238fd673f4d3f1f166af1f9400f4582d193359c16f232ef2b1c02fa,2024-05-17T02:35:09.263000
 CVE-2024-10040,0,0,e60010f49ca3103740274faae9ff6204ef5e8179ea2561631dfe21b2ee350ec3,2024-10-18T12:52:33.507000
 CVE-2024-10041,0,0,d3a5fc70054a78d48c6ae937cda2967a3e628fbc08e88f2a331a6962f073bdec,2024-10-23T15:12:34.673000
-CVE-2024-10045,0,0,df53331c9b7607363b5960cd2fb00b418f72be4924f4b02eb17d04eadab916e2,2024-10-23T15:12:34.673000
+CVE-2024-10045,0,1,a817f3402cf6055b1a750108ad8efeb9be1dc186e8fac94b1b8b513bcc47b228,2024-10-25T18:52:30.337000
 CVE-2024-10049,0,0,53720c9da49b26dcdd62ca517621f91bdc81303aa9036eed1b0a1b7834addde0,2024-10-18T12:52:33.507000
 CVE-2024-1005,0,0,1191b4a20d5b719ff3ba58b8e13bb4278d19f2133e7221e782230a58acb2d18f,2024-05-17T02:35:09.367000
 CVE-2024-10050,0,0,d8b5aaf0fed099523fa2ba7c0c86d11fc479440388170ed27b77f7313b983d74,2024-10-25T12:56:07.750000
@@ -242442,13 +242442,13 @@ CVE-2024-10201,0,0,fc2d027d5ae19fe93b2c62f794fd44c91138a3ac85ba03fab3fa5acc683a1
 CVE-2024-10202,0,0,bbf4778e12a2d6f664529db53cb3cf049c2b3a3bf45111e5ee15b039098bfbd2,2024-10-24T13:55:46.110000
 CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000
 CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4debd,2024-05-17T02:35:11.070000
-CVE-2024-10229,0,1,d8b7c88d62022a9dc51348547e30f2a14480969b9761e4820e45f77df3ca533b,2024-10-25T17:04:54.080000
+CVE-2024-10229,0,0,d8b7c88d62022a9dc51348547e30f2a14480969b9761e4820e45f77df3ca533b,2024-10-25T17:04:54.080000
 CVE-2024-1023,0,0,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c4116,2024-07-25T21:15:10.280000
-CVE-2024-10230,0,1,7c95dfcca31fe3a59bb8904d131576d1f25eece1df462a8bd9caf648b1fe5671,2024-10-25T17:02:56.843000
-CVE-2024-10231,0,1,eb0443e51721212742591278ce3f179ecbfdd0bb144d3d1886157523275588e9,2024-10-25T17:01:55.633000
+CVE-2024-10230,0,0,7c95dfcca31fe3a59bb8904d131576d1f25eece1df462a8bd9caf648b1fe5671,2024-10-25T17:02:56.843000
+CVE-2024-10231,0,0,eb0443e51721212742591278ce3f179ecbfdd0bb144d3d1886157523275588e9,2024-10-25T17:01:55.633000
 CVE-2024-10234,0,0,f0f874ebc55e8dfa4acd91fc71f3ef8e531ff2aafbcdb23e5894b5f6702649bb,2024-10-23T15:12:34.673000
 CVE-2024-1024,0,0,d47b3d3840cd70db883d335219cea52b6b4fa0e3fdfc3f4d41efc4b833dff6a1,2024-05-17T02:35:11.210000
-CVE-2024-10250,0,1,8accb693817c35c7e4f9fa710076ead819720d8653e5052fbeeec31b3a5b47d2,2024-10-25T16:37:32.777000
+CVE-2024-10250,0,0,8accb693817c35c7e4f9fa710076ead819720d8653e5052fbeeec31b3a5b47d2,2024-10-25T16:37:32.777000
 CVE-2024-1026,0,0,e127bb5d00442b36eed0e6ff6513a3a42c45706876a3a5f2167365447fb898e7,2024-05-17T02:35:11.320000
 CVE-2024-1027,0,0,7cdd04f65f65ce162dee4b0e860b968e4c1a6b7f21d53e978519c8259363a858,2024-05-17T02:35:11.427000
 CVE-2024-10276,0,0,5e7ff159e65586309659d6baff08f635e7f7065d36341ca3fc8957b4d9175dc0,2024-10-23T15:12:34.673000
@@ -242472,11 +242472,11 @@ CVE-2024-10293,0,0,97810b693c214de7eba440fa721337a0acab1625229c9faa2817690aeba72
 CVE-2024-10295,0,0,05be2217733c9dc82e0ab847a99213d443b6eb2416a14b489bddd760491fe8e9,2024-10-25T12:56:07.750000
 CVE-2024-10296,0,0,3731dd63766ea164d82646758d87e47e2e2d1ca9061034b26ec431458662311d,2024-10-25T12:56:36.827000
 CVE-2024-10297,0,0,7059e1e2bb8cf8e51a328b566020cbc23abd446f188f444527bfee9442b2adad,2024-10-25T12:56:36.827000
-CVE-2024-10298,0,0,182fddfc46dce2e154a9d7232dcd133e34601980b0699619ad9ebc89c9d41132,2024-10-25T12:56:07.750000
-CVE-2024-10299,0,0,3f9d2a84b81fd1d46a6bc0dc8cb6a067838da188f2f1d1614d47c67215bc1829,2024-10-25T12:56:07.750000
+CVE-2024-10298,0,1,a0e9f6b5e6c68ad8ada3edbba009974fda145ba113b49020fdab65d252296669,2024-10-25T18:51:44.370000
+CVE-2024-10299,0,1,8f6bbd417e81aed931d66aa709de124d671c1a1cb50b9fa501b1939928e9cb42,2024-10-25T18:51:17.047000
 CVE-2024-1030,0,0,34264c5a1a4e97f6ee4441192a69e3a5aa9d9614a8467bdc88cd76d1a9884fe0,2024-05-17T02:35:11.737000
-CVE-2024-10300,0,0,0f1c3dcfa436dddf319fa507de84a27903859bee7806d8166e59b8ed4cf9916b,2024-10-25T12:56:07.750000
-CVE-2024-10301,0,0,774b09626a31a7a9cb638e2934cb9a21776b22d0dba749d89f118e1850f05197,2024-10-25T12:56:07.750000
+CVE-2024-10300,0,1,ca0242a4c58ba5eb41987558653c1fad0eefdb856c34de56d3278680f413cd2c,2024-10-25T18:49:01.953000
+CVE-2024-10301,0,1,43e47cf56bc671ed7b90e0f04f420138e8362a6d949261d9acbcdf888c921aa2,2024-10-25T18:47:54.033000
 CVE-2024-1031,0,0,6576162a78ac686f55e5931a6b8f02ff6c7312ac04792581e6d78da8a91700d4,2024-05-17T02:35:11.843000
 CVE-2024-10313,0,0,0a692e743da8a6f5929e9a5e61a16c962249b9fbffffedea4a154098bf7390c0,2024-10-25T12:56:07.750000
 CVE-2024-1032,0,0,06925fc416f8ceea7fb895efc2e3f765d4f064c5150968a9409448741aa1fb78,2024-05-17T02:35:11.947000
@@ -242515,8 +242515,8 @@ CVE-2024-10379,0,0,3c7753aa53a7f490ce21f7358197ba3a7c5845bca9dfc769528ab53d2e506
 CVE-2024-1038,0,0,c7b47d6608546def6f3304631405edc76ac6151bae95644217fe0b19e7498b5e,2024-03-13T18:16:18.563000
 CVE-2024-10380,0,0,fbc6bdf17d1189e11e8b0a1f98f107dfa2f1f98f4113f4f2078dda76042f5da0,2024-10-25T13:15:17.547000
 CVE-2024-10381,0,0,6ffe44cfcb0700d41680c7c9242cba169e32dff153adc942340c76d32ff0166c,2024-10-25T13:15:17.810000
-CVE-2024-10386,1,1,620f9606b4947e68d786b63bc64226dc49af2c78c3961a92113a83d41fde8506,2024-10-25T17:15:03.987000
-CVE-2024-10387,1,1,1d314c1f04eb0f6b0e625a4b66f38d6fe480b0f44899159cd155926983f5770f,2024-10-25T17:15:04.230000
+CVE-2024-10386,0,0,620f9606b4947e68d786b63bc64226dc49af2c78c3961a92113a83d41fde8506,2024-10-25T17:15:03.987000
+CVE-2024-10387,0,0,1d314c1f04eb0f6b0e625a4b66f38d6fe480b0f44899159cd155926983f5770f,2024-10-25T17:15:04.230000
 CVE-2024-1039,0,0,823ba846a6d7c1759f085b54cf23829cdbadd28135927175e007d2b5df85a6ad,2024-02-07T14:09:47.017000
 CVE-2024-1040,0,0,b32f85342f197693d2db41df3bf264f5b00d802b0a5fb12822762c63c498621d,2024-02-07T17:11:40.623000
 CVE-2024-1041,0,0,991d5a9e7f9515845650bb9d6b0cbb707e5b40a6073b13e973f0804460a34ef9,2024-04-10T13:23:38.787000
@@ -243127,7 +243127,7 @@ CVE-2024-1690,0,0,43710398ffbfd97fd2d2298464d22f4652f5075ca69bcdcca56d9f56aad3c2
 CVE-2024-1691,0,0,2ef9826de93209d069c81e6ab358d8eb246774f7a80e6c411cef0c396fac265e,2024-03-13T18:15:58.530000
 CVE-2024-1692,0,0,e629a44d67e992e57af157f5aea9a741f288cdc07f581fddcf0fc8e93b27323f,2024-04-01T01:12:59.077000
 CVE-2024-1693,0,0,7d3cbcfec88fed9681b32070817b963b8ddcb473d92ad7474c8d67a492ce3782,2024-05-14T16:13:02.773000
-CVE-2024-1694,0,0,bf85801f0832fa365d7f8985fe10eb8a950958f13710e85ca1e046f87150cc0b,2024-08-01T13:46:10.687000
+CVE-2024-1694,0,1,4e4bca9b1ddbeb95cb8c742cbf6cbd0b885366c38f0d6f8f8d4aaf7488401fd4,2024-10-25T19:35:03.987000
 CVE-2024-1695,0,0,040d25b8839514ef94a30e51fac7a9ab85a44004216413bd5b5709553eab9e32,2024-08-15T19:35:04.110000
 CVE-2024-1696,0,0,a663827cac86b281a6bafba3681725496e03564ad841117e5d12a480311031fd,2024-03-12T12:40:13.500000
 CVE-2024-1697,0,0,122d0b7b2464b5cdb9c8634ff2a556f4e654f017fc1c1b4f9f5a42e2fdd2fc2b,2024-03-25T01:51:01.223000
@@ -244868,7 +244868,7 @@ CVE-2024-21738,0,0,ee493f18830fa61778a839e41065e0a164cfc7a69da412e6c6babcc4b17cc
 CVE-2024-21739,0,0,74c51cc55d726fea23dbc7423ad28b618c0ad3e8f250404a9e572e22bf0444c5,2024-06-26T12:44:29.693000
 CVE-2024-2174,0,0,69f2854ef3602f6c241fc54636cb33b9aa524ada04f0df9d9cfac3f6048da2a0,2024-08-28T15:35:20.553000
 CVE-2024-21740,0,0,578e6e77253937b45696dc5f6043eefe34a835f238564d1fe1369311381e46c2,2024-07-11T15:05:22.467000
-CVE-2024-21741,0,0,abad64de70c0fef6bdf30dcd2634a39b659714e71a96cc61f74db71b448be2aa,2024-07-03T01:46:46.537000
+CVE-2024-21741,0,1,276c90d557a1ddbd7ef0f820219f4441d781301bc74a468f8ee48dc1b2e4d8b9,2024-10-25T18:35:03.493000
 CVE-2024-21742,0,0,fae1ce375f3fcebe0111b56738c6b02117d77d438c12e42f2ce0251b9cb2427c,2024-02-29T01:44:04.040000
 CVE-2024-21743,0,0,0796f228a255a8494ca4bcb581e49158cafa8b24400e4f1dc60b4a4d36771963,2024-09-20T12:30:51.220000
 CVE-2024-21744,0,0,2932a891b0379b8b90b4b42aa5b769696f0f306f989668b0b1182de9207b4937,2024-01-11T18:45:53.040000
@@ -244944,7 +244944,7 @@ CVE-2024-21824,0,0,7aa5726f0c5574af74e9f5a3cf3ffd6696b10e95ff2f5e13938ce9966974f
 CVE-2024-21825,0,0,d4fc704324754f387b029d9f0684cd28f1fe50758fd7d66af26180f7c807a125,2024-02-26T18:15:07.390000
 CVE-2024-21826,0,0,e4665c6424ea4b61934e3bcd1ab7ddf62869802487f99534f2a3f3dd7a0149b4,2024-03-04T13:58:23.447000
 CVE-2024-21827,0,0,8263bac5597e4519006a0d1acc911f20f09ec3c50860f85a35f4c00493288d2b,2024-06-25T18:50:42.040000
-CVE-2024-21828,0,0,88cb5c9903fd1c4f16d4af828768cbf95671e28587a038a573d470994b7962b2,2024-07-03T01:46:50.690000
+CVE-2024-21828,0,1,0198d53936750e8cf0a58e2c2aae43911345deb4d12d37a3a779e588c3b4ab30,2024-10-25T19:35:04.160000
 CVE-2024-21829,0,0,baceae2e87b9c4b6697075d910bfce042bad89e889f8ed957911e0763d7f587d,2024-09-16T18:03:16.707000
 CVE-2024-2183,0,0,b1a8bdb0521ceaa401c4ef49664ed1eca0fdb532f6e98da751ce529fa93d2e00,2024-04-10T13:23:38.787000
 CVE-2024-21831,0,0,9403a3b9e0cc57695dbc8303d38fe710d2e07914a8ff134cb0d06a991e5fb5bc,2024-07-03T01:46:51.433000
@@ -245065,7 +245065,7 @@ CVE-2024-22017,0,0,bd2434479505f25ba61ded39e252a137caec1b8140356d38e69aae2c52d44
 CVE-2024-22018,0,0,4fae4a09ff6c97462c219a17730a6b02641ce527ea4e228be02726c5015758d3,2024-07-19T14:15:05.763000
 CVE-2024-22019,0,0,5ea5d0f669fc75d99f03776806b9fffc572153dc1c8ef34725dc8bf55b3cedce,2024-05-01T18:15:13.800000
 CVE-2024-2202,0,0,07ee8ffdc3e2c6571649a2da17705092fde8ccafb25f9e28d35a275c632c563a,2024-03-25T01:51:01.223000
-CVE-2024-22020,0,0,debd2a01716784fdc798c1002cfd1de2c7ec7af620c6ad131da757aceaba0623,2024-07-19T14:15:05.863000
+CVE-2024-22020,0,1,b8b8fb44696fc1f3b47b955eac0aff79a4a0b20e8a4ef5f07ba12dfc66d0b5d4,2024-10-25T18:35:03.697000
 CVE-2024-22021,0,0,638048027337936cbd408ce99df3409e0af8fc4be0132d034339cad92c33270d,2024-02-29T01:44:04.690000
 CVE-2024-22022,0,0,520151bf342f8e1b6d0df34d3bdc80dc16c1dfc15f7f487e84d9dadfaf67b99c,2024-02-15T18:45:30.887000
 CVE-2024-22023,0,0,11d74a9331c831e739405cc0841308e5bee17f7f9ac670af4c4e9f14b6af019b,2024-10-03T22:35:01.533000
@@ -245627,7 +245627,7 @@ CVE-2024-22851,0,0,bca50b43839bb5a9440c8cbeb408fd89f180d58427aad27d09e9a965c6eb8
 CVE-2024-22852,0,0,8ae9b682c67cb845884ddd035899d91b91d18dec5a1d45bf6dc8c5eb275039b7,2024-02-13T18:16:51.790000
 CVE-2024-22853,0,0,bc89e715c02ccddcdd7224ca8b312fb06ea03063bc4da2eba5ae6389033cf42c,2024-02-12T17:50:31.950000
 CVE-2024-22854,0,0,fe4766229122c652e0af3232fbea71e93fb7b09fb4336c021b2a5471e8b1a0a8,2024-08-16T18:35:04.633000
-CVE-2024-22855,0,0,978cea221cbe34e7be3e94946577d6e11833682bc78df01e6099f3765bab7431,2024-07-22T20:12:59.693000
+CVE-2024-22855,0,1,8ee1e01d04ee73e5ce31c7f7bbb3f977167c1250df872de067e1d7cdf4762aa8,2024-10-25T18:41:33.187000
 CVE-2024-22856,0,0,6a3f29bbeb760b1b5f19c8ae7d193c6384c770b41fcb22b793b9dc616df88d1a,2024-07-03T01:47:29.290000
 CVE-2024-22857,0,0,90837a66d9e6be33e61afe64f3e09fe9073b2ba728f4bd27a877f40b8e8bec96,2024-08-27T20:35:09.263000
 CVE-2024-22859,0,0,c789fd1319ae29200cfda38411ba15b951620161f2106b97557558350eee1281,2024-08-01T23:15:38.057000
@@ -246240,7 +246240,7 @@ CVE-2024-23705,0,0,ead7fe198af09437794c6077c888124fa1580ba6ce0d00067776236205768
 CVE-2024-23706,0,0,babe5ff56a1d4a28f81247fdfc7205f6cd9fa2ddbe2826f5bdf18ddb36d0d2f0,2024-07-03T01:48:01.407000
 CVE-2024-23707,0,0,de06c54b01b50c7ee8eaf57e83c8e50f0519388a760daadedf65fa62d4cccb8c,2024-07-03T01:48:02.287000
 CVE-2024-23708,0,0,4d59e4f4929ae2353651e29b21457a04e0165e60511aebb470f63de6c6b68d06,2024-07-03T01:48:03.097000
-CVE-2024-23709,0,0,dc400007ea16188eacfc9466b22ae75237bff556adf9f34ba5e4a0201918c134,2024-07-03T01:48:03.920000
+CVE-2024-23709,0,1,6083bf0f0d1ceb0cc50a3d0ad67764af70d38b4988ab6d8b3fcba635f794c892,2024-10-25T19:35:04.277000
 CVE-2024-2371,0,0,c0989400ce8a0213fb359b764ed40ca0a5e234cbe2249418689e4cdb3beac647,2024-03-12T12:40:13.500000
 CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582caf9,2024-07-03T01:48:04.733000
 CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000
@@ -246288,7 +246288,7 @@ CVE-2024-23762,0,0,dccea0d0f4f72e935db3cd4738ae0afc7e81200fb78885cb904f8f8d8505b
 CVE-2024-23763,0,0,fd6bb7068b643be895795866753868b545c9ff02dc3b3575d3900d3b7ddc29be,2024-02-15T04:49:47.153000
 CVE-2024-23764,0,0,e6776799806671e89b40fb29cea011f49ce6380839da8b1fc02e631b1db62327,2024-02-15T17:57:25.633000
 CVE-2024-23765,0,0,06c410fc3cf16eeddff78c760088188768ab51319095babe2779c4b543e1454d,2024-06-27T12:47:19.847000
-CVE-2024-23766,0,0,745046bc01c8fb779d22eb65856beb7240cd099e103c65a0cc993dacce583ed7,2024-07-03T01:48:06.303000
+CVE-2024-23766,0,1,5f5a0ec5e5d0bbb4ae98974aaf53d329daaf5cd414e4b4f2a2a0e897689a4b74,2024-10-25T18:35:03.847000
 CVE-2024-23767,0,0,6f43d09d7d5e03bec0de213ab6d6435f3d55689189694bafd3c00cc2823ce4ac,2024-07-11T15:05:27.593000
 CVE-2024-23768,0,0,cfab380f6caada116bf310137e7bf68190f1658747da2207737dea42a2db4a9c,2024-01-26T19:15:05.400000
 CVE-2024-23769,0,0,dda5f503e252df13be658288b8df8a7c295023d6b8d6a36e330610bd6bb10025,2024-02-15T15:40:20.690000
@@ -249881,7 +249881,7 @@ CVE-2024-28798,0,0,a6356458c4f4311bbbb434bcb07b82d4a8232904c746806c3a615b0a52481
 CVE-2024-28799,0,0,7b5116d22118620746e99fb01d2c120abfeb878a1b857004ae9b1cd3fd81fff2,2024-09-21T10:15:05.253000
 CVE-2024-2880,0,0,c617aabe27a476530f11dd1aff9d0e70b8bc9314c3647a1cac79a81958f4d9d1,2024-07-12T16:55:30.137000
 CVE-2024-28804,0,0,f7e3d6c3e14215e831a96b931ea15f5f72cb16cc7bfabd09d8b34530beca586f,2024-08-01T13:49:18.607000
-CVE-2024-28805,0,0,57ffe0c5396b469d1d6aea3771a149218b95fafbad9b52c6f522fc5113787118,2024-08-01T13:49:19.450000
+CVE-2024-28805,0,1,cb27f95e8662e6f56b138761747243a7826d2330470c48886448473bebd0bb3c,2024-10-25T18:35:04.053000
 CVE-2024-28806,0,0,b0870c92c612bc52e55ac5da958c74e320d7e205346206836a7ae598363f9d27,2024-08-05T11:35:01.757000
 CVE-2024-28807,0,0,5a4650d9d919dd00d60ada425df7221ee51ecb76af44fdd9eca355c706e3553b,2024-10-04T13:51:25.567000
 CVE-2024-28808,0,0,e2707d0256028ba4fdef94248719fe3b54bec857fab5ab8ef9c9d36dc0c8edcd,2024-10-04T13:51:25.567000
@@ -249895,7 +249895,7 @@ CVE-2024-28815,0,0,a66a592511ffd5b563fa083295811494fe79ce7c34bc79ae02ae7f38cd9af
 CVE-2024-28816,0,0,75a949219f8a896ffef945213a1610d3de2a2cf64da977b1d4287b567e2864da,2024-09-06T17:35:06.960000
 CVE-2024-28818,0,0,553ea080520e3ef7d7c194b1130a084d77d8e937a2b2bb8942609e2870cc98f5,2024-06-27T16:43:48.633000
 CVE-2024-2882,0,0,ac3db032a55af245aeee4f2522d2c10c01bd50b8ed58cf00aeea2dd39d0cf75d,2024-06-27T19:25:12.067000
-CVE-2024-28820,0,0,095fd29e11db669f6714a4a5dc4339712d67abbd0b3541df2a561e8f599caac0,2024-07-03T01:51:51.323000
+CVE-2024-28820,0,1,0570fa594a35dba860ba454a62deb89787849f22b04a2bbfc96e6ee6293fe6a9,2024-10-25T18:35:04.300000
 CVE-2024-28823,0,0,637bac634141463600503c91e4b5796abd8273b1efd793dd400cf02a2e3fa972,2024-03-11T12:47:42.653000
 CVE-2024-28824,0,0,eef4aea08ae10a65f9268e3694b2e67d70c352841b8880eff507640248495160,2024-03-22T12:45:36.130000
 CVE-2024-28825,0,0,2060c8862968982d4a6159b0b62313dec95ecc020293b85f137ce41396383f90,2024-04-24T13:39:42.883000
@@ -250851,11 +250851,11 @@ CVE-2024-30135,0,0,434c5499719264a4e2ad07af1f36d8ed1af6151b19467e0009865806919ae
 CVE-2024-3014,0,0,c46983235075ad6c61a858c21d5be28ec226124df8363686d4a4d1cade05d3fc,2024-05-17T02:39:40.800000
 CVE-2024-3015,0,0,cf3ef36018f814f81d7c4b278b721ac941c52c0f1c0bedc65491406707b51ee6,2024-05-17T02:39:40.887000
 CVE-2024-30156,0,0,3d53855c757ad6b4fdec1c866bc6a474f7a081008c29fdfc2556616a5702f89d,2024-03-25T01:51:01.223000
-CVE-2024-30157,0,1,03c40ae2d6bb5fbe19cdcb81ee9473f77e02194f7cb98d03508973afcb5f65ab,2024-10-25T16:29:11.307000
-CVE-2024-30158,0,1,1234308b996a92cbaf899b21ed405616cb44f1f3637c58c6a67ec8b7390e221e,2024-10-25T16:30:09.927000
-CVE-2024-30159,0,1,c2f69c82c310c4c7d423021fb3a365e7918cd3a612018ed272a3cf1ea353956c,2024-10-25T16:30:47.127000
+CVE-2024-30157,0,0,03c40ae2d6bb5fbe19cdcb81ee9473f77e02194f7cb98d03508973afcb5f65ab,2024-10-25T16:29:11.307000
+CVE-2024-30158,0,0,1234308b996a92cbaf899b21ed405616cb44f1f3637c58c6a67ec8b7390e221e,2024-10-25T16:30:09.927000
+CVE-2024-30159,0,0,c2f69c82c310c4c7d423021fb3a365e7918cd3a612018ed272a3cf1ea353956c,2024-10-25T16:30:47.127000
 CVE-2024-3016,0,0,365b1d8bd40146c56247f165cad66ba9032ab62d7024128ecd437112ab8f9af3,2024-08-22T15:35:08.600000
-CVE-2024-30160,0,1,a5cbd8b397241e2bf3153583f5284054bbcdf44919115ac1136f24883a861194,2024-10-25T16:30:53.613000
+CVE-2024-30160,0,0,a5cbd8b397241e2bf3153583f5284054bbcdf44919115ac1136f24883a861194,2024-10-25T16:30:53.613000
 CVE-2024-30161,0,0,1923ba0ba6f178ce866a1a8ca8f64984391bfd8920138b4d8c36e03ff657287b,2024-04-11T14:15:12.083000
 CVE-2024-30162,0,0,bfc1b2dd1f9f0516f5fde509ec8f6b937e3d3043c9b38e8e614a15ddc80d79a3,2024-07-03T01:53:51.970000
 CVE-2024-30163,0,0,a73a629b03deb6cd2f20f667428a8c95efd54363034c035eeeed31541b8e07f7,2024-08-08T21:25:19.010000
@@ -251432,7 +251432,7 @@ CVE-2024-3087,0,0,69d2e87c7c87bdc5c6a0aa1788aa50fe5b44316fc88ba1cd34f51a4a48534d
 CVE-2024-30870,0,0,30e1e140bee6b30095d3a05cd84fe8f82c3aa6e140f2eb4d0b7d811e3ca16636,2024-08-16T19:35:10.750000
 CVE-2024-30871,0,0,a922b83af83720bdaf0bdaf6a8fbbd91cfae311a46841e866add85841910b19e,2024-08-19T17:35:14.410000
 CVE-2024-30872,0,0,f4c68436231336d4dfed85be3bb02cc34ef76405f018ff6a0b0b786c7062708e,2024-04-01T15:53:18.060000
-CVE-2024-30875,0,1,1cda1f7e96707733b42fb351c9353bb46bc4382d5324d37a18f42fe89fb4a47a,2024-10-25T16:15:09.693000
+CVE-2024-30875,0,0,1cda1f7e96707733b42fb351c9353bb46bc4382d5324d37a18f42fe89fb4a47a,2024-10-25T16:15:09.693000
 CVE-2024-30878,0,0,21b1e9cb6e80d2eff229006b5f8418d6d6360e70820dbf7044b36f5f56cc5c12,2024-07-09T16:22:30.387000
 CVE-2024-30879,0,0,1301a0d53d8ce6102d32b653bb55ca8eae261084329d07814fddadd6bf631c71,2024-04-11T12:47:44.137000
 CVE-2024-3088,0,0,8c7469f878ec7cd8b5c24cda6fed51b2dd10606a6076102ea910b62b21ab4a7c,2024-08-27T18:35:09.493000
@@ -251778,7 +251778,7 @@ CVE-2024-31325,0,0,a9bcdbd792a6ed8c686901e49872aa0bea6152484f11f86c22b43dfd437d3
 CVE-2024-31326,0,0,97d123c2aa1e1e9a7489aadcba3a4341ca3ee3d2d31afc6659975d4411771d64,2024-08-19T16:35:12.080000
 CVE-2024-31327,0,0,6cb945d11f8664a0277f1157bd8eac8d374886bfe8f127c66f41c26468520cf9,2024-07-11T15:05:41.523000
 CVE-2024-3133,0,0,a5199a1ff93b7f0b9b2c8f7c4014dbfb416c9e59a9d9caab3f26a064ce40a24e,2024-06-07T19:15:24.213000
-CVE-2024-31331,0,0,d63ee06c884fadbebb4e0ffd30f7de42c6d5483b78b8ccdaba35e5ffeb309e42,2024-07-12T16:11:33.867000
+CVE-2024-31331,0,1,1e74e89a9634cca12a894d6fde78d348f2e1f0a48ba44578aea7a1fe82acc729,2024-10-25T18:35:04.490000
 CVE-2024-31332,0,0,fe533958eb1f5014a983744e26d4dc56008592fb4b2dc96ebd425a317d9ee5f4,2024-07-11T15:05:41.733000
 CVE-2024-31333,0,0,fffa52c47c5b8e1c2bcdc9fe3c080f43dd069e7ef7813f142892cae434fbd8ff,2024-08-19T13:00:23.117000
 CVE-2024-31334,0,0,69828e729ce39e0f18173fda19e01cf9f4d39333d7345a58dacf94a302bbacd6,2024-07-11T15:05:41.960000
@@ -253205,7 +253205,7 @@ CVE-2024-3337,0,0,61d2bfcc2d7fd47838831dec2e0c7db020f3b69cc3626c76d24aae7640ac48
 CVE-2024-33371,0,0,e62923a0247293e9f796432d7299bfd32c3f9d7f0037d1c3b023058b5d67d80f,2024-08-01T13:51:54.193000
 CVE-2024-33373,0,0,1310aa8488d26ba93bc57409318880dd75ff8c9ca32bcabb44ee33f3844ee015,2024-06-17T18:15:15.920000
 CVE-2024-33374,0,0,243e9f210ed37aee6e82391955d78875fcc399a2a4a1c88574efbf4fc6f1f077,2024-07-03T01:57:58.047000
-CVE-2024-33375,0,0,5d7df8240369da1ea82d816f49a8798a22ce4828b4c1dbb3062e5d8eb520b928,2024-08-01T13:51:54.967000
+CVE-2024-33375,0,1,de8e1352d7131bede7a3e7df21528b3c50d741bdac0f3347d0114838c7b14af2,2024-10-25T19:35:05.053000
 CVE-2024-33377,0,0,5c66eca70fd229829a7599a954669068b1cb2c9f37ae66f1e849ed753dd8febc,2024-09-06T17:35:09.517000
 CVE-2024-3338,0,0,b2327c11e1d762220f8764f83498076a393d83520a65cf1a3ec9854d72e0d01a,2024-05-02T18:00:37.360000
 CVE-2024-33382,0,0,dc1b896c815bbb6d05d98ce7170409486d331681fef4f2caee5818b69d11fbd6,2024-05-09T13:05:45.620000
@@ -253480,7 +253480,7 @@ CVE-2024-33774,0,0,6f292020d7adae9637fe533dad1837a596af7348622d3ee140dd37eaf1c8c
 CVE-2024-33775,0,0,7ea36af513c1579a89db448065ac36bc3c10f0e65b879ce7520d408ffbf766c8,2024-07-03T01:58:43.587000
 CVE-2024-3378,0,0,8befaa6be8f3b8c8430cad46a1e49c322e7c667fd428df502463d5be35761acf,2024-06-06T19:43:40.377000
 CVE-2024-33780,0,0,c16faa38fa2e3cb315427d6e5330ce2610c63349f4a81ec54bc650473e873a60,2024-07-03T01:58:44.400000
-CVE-2024-33781,0,0,f92b3d1e80a012680436fd49e5bab657fd2a9b945e08254832c1c45257ab0ec0,2024-07-03T01:58:45.220000
+CVE-2024-33781,0,1,f25247eaf0d169b3289142514410c6853680fdc2b7e71bcacdd07bcc75733002,2024-10-25T19:35:05.260000
 CVE-2024-33782,0,0,d54261586afd08a5185da8c98a333efe96e77b0a86120ba9d5a8acb87e82f8b3,2024-07-03T01:58:46.057000
 CVE-2024-33783,0,0,ab3a37415f38062c8c0433a787e71d9de7161e1a21f1c7c7424bb11f9e8ff724,2024-07-03T01:58:46.247000
 CVE-2024-33786,0,0,4c34eaaeb6404bd11728362ca0ccaf1f06d8896bfaa0a8e30f5a7055f9db9f9d,2024-08-01T13:52:06.273000
@@ -253876,7 +253876,7 @@ CVE-2024-34313,0,0,5e7685d85b9be01539c2df2509259cab02217b4b071e1347f30175d5b9d70
 CVE-2024-34314,0,0,229621e4389765698bde4ee87838cb1f181d4467573c64759d3cb34848f22f9d,2024-05-07T20:07:58.737000
 CVE-2024-34315,0,0,2da9a3f01679d1f45f0bab05fdfd699ff25c9ffa82f02a145c0a3654a4071435,2024-07-03T01:59:52.883000
 CVE-2024-3432,0,0,e551b49681f8859ae36cb659ecb1c23b498009c34da11d9120924e791a83c404,2024-05-17T02:39:55.693000
-CVE-2024-34329,0,0,5172a316043ee9e75055b2f826441189fde5eb6a90f1810a0be2672c1d7dbfd2,2024-08-01T13:52:19.990000
+CVE-2024-34329,0,1,41a7f5395746b238b78024ca151752d8fbac15716c701f047eb67a43590b2636,2024-10-25T18:35:04.677000
 CVE-2024-3433,0,0,edcd29ee74449d6852e66c4b5448756dccce5e71a9bad9a5025cf08aebadb09b,2024-05-17T02:39:55.780000
 CVE-2024-34331,0,0,e9e9c5dfb1f97d7d959d603e7ca8311b7235683652ebe96931c8c00fed413160,2024-09-26T13:32:55.343000
 CVE-2024-34332,0,0,8f6c683335644bc93205234e59c96ea37a2e6389fa2dea8d8666173975a538e9,2024-07-03T01:59:53.650000
@@ -254239,7 +254239,7 @@ CVE-2024-34720,0,0,d5f9e320876749ef63f3ae3fd855102efef7812668f3ea77cca5b86835b0f
 CVE-2024-34721,0,0,f71307059aeed2acc9a5b096fe278629e1ab4f96dc0c7de77c8899892fd1b7e5,2024-07-11T13:05:54.930000
 CVE-2024-34722,0,0,cf8aa681488fcb61e6053338c1005fbdb8a07b1c3e2be30881c9597f7f06ab3b,2024-07-12T16:11:37.803000
 CVE-2024-34723,0,0,9ee1e9ea0079333d8123e1479d0c1b548d28a892d3601137f6e64ded9880a7ff,2024-07-12T16:11:38.633000
-CVE-2024-34724,0,0,0452aa45e04971f6e547ee694d42ca35f85625c1031b931eba0ca8059efefaef,2024-07-12T16:11:39.470000
+CVE-2024-34724,0,1,913fd057cda1c7d4c484876a49aa72529e900891c98a4a2d61e29b59d94441ca,2024-10-25T18:35:04.870000
 CVE-2024-34725,0,0,71c51510eb6c519ede5c0bd5b935ecb821799239014d1b6c0035512d0bff6cbf,2024-08-01T13:52:25.887000
 CVE-2024-34726,0,0,148667699b7fd62da52cb8a62c1c3c6fd756ca900c40298f1823e1d94f76998b,2024-07-11T15:05:45.340000
 CVE-2024-34727,0,0,75befb2ba24a3b4b3047b7cd5fae93e6c869e1a4a8df4db9070d6b118a79dd7b,2024-09-11T12:43:45.260000
@@ -254586,7 +254586,7 @@ CVE-2024-35304,0,0,6034918ad52f93d1da2bc26a38d2a41af1cec6e4b2633afd9a4c11faed3e6
 CVE-2024-35305,0,0,e31f5a2153df0748351b63d3b29145f978c7628ebc2659ea3282a1f078dca5e0,2024-06-10T18:06:22.600000
 CVE-2024-35306,0,0,ad90645c7ad3fc3d00a11af0348fe264fd3520d218ef28c934a8abfa42cbedb9,2024-06-10T18:06:22.600000
 CVE-2024-35307,0,0,b73247d3e5b323866c011ccf7e1f39f41293535811b1ef82260b19c7e0a4c21f,2024-06-10T18:06:22.600000
-CVE-2024-35308,0,0,79e7327977df0aea45e2e6e1fe499b2de02adb1ea26d766fd37180400d1b0cfe,2024-10-23T15:12:34.673000
+CVE-2024-35308,0,1,6321cc28d6dd78c933cd913b6aa72a191bb42ebafe4f0197b96f22ae54b8e1a2,2024-10-25T19:06:14.100000
 CVE-2024-3531,0,0,a342a9958ba8d00c279b1676525284c1cab302a477225f05f9d97b5deb071134,2024-05-17T02:39:59.430000
 CVE-2024-35311,0,0,94751a7e140c2a3ff83ee374530e5919b0823edf97b2e344646a9709229c503b,2024-05-29T19:50:25.303000
 CVE-2024-35312,0,0,81ee7e5cffa0828718ff42985b5f71e3223019ea36fce71fb3a2d6856e31b3e3,2024-05-20T13:00:34.807000
@@ -255172,7 +255172,7 @@ CVE-2024-36033,0,0,8911dfc666d23e1c126e3abba0a30a2fed5f5b6caff101c24ce4eb4be9e3d
 CVE-2024-36034,0,0,4c959fcfa233ae27a9c3f47b39a3f7ddc9a28a9c57a26789bd7acdd84b3e47d4,2024-08-16T20:21:06.120000
 CVE-2024-36035,0,0,3fdb254cbf2b10e7d511633eed06bbb7c03953c8f2eb713a72f26b7556cced7e,2024-08-16T20:23:29.943000
 CVE-2024-36036,0,0,7da0ef0412625002a493959e0f4b9d5a2d61be8a7aa9a2a45b491bb215f046f7,2024-05-28T12:39:28.377000
-CVE-2024-36037,0,0,f0155f25f53452aadad745932abbc5146f9299ef5a143d0b20572ef3287fefe1,2024-10-07T20:15:05.720000
+CVE-2024-36037,0,1,38e293cc8c09dc94fd987a33e5a092088fcec9402eddbf56938ce37dd2a7c640,2024-10-25T19:35:06.023000
 CVE-2024-36038,0,0,ed3921618390576c9219c98f6a3f7baf8a0d13ec50c49da12a34a4e745352466,2024-06-24T12:57:36.513000
 CVE-2024-36039,0,0,d5f6bc43648106f8c0710f8301f59ed0f37eac1af0c9c7b161995113609db70a,2024-06-24T07:15:15.230000
 CVE-2024-3604,0,0,2f82d9621c7da51111c7599a59e672098e964c892eb2588f225c0e98c5e45cbd,2024-08-01T17:39:33.907000
@@ -255545,9 +255545,9 @@ CVE-2024-36537,0,0,5f930f9ed55795838127e0e3777c1d69912524f2615f541a92461ae3dca81
 CVE-2024-36538,0,0,2c2f89c6add65eaa7fe73370f2b6ea6e66fa3976602a2c3fae08fdc086d59130,2024-08-01T13:53:02.957000
 CVE-2024-36539,0,0,4a0be599c84b4fdc4a373e9fea743448da6ea5dfc7c56ce644077bbc1d54be9e,2024-08-01T13:53:03.723000
 CVE-2024-3654,0,0,a7708e7e436d988a91abde36ee9f26c2df705dde9b78c457b8712b905cf4dc6a,2024-04-19T16:19:49.043000
-CVE-2024-36540,0,0,3e3503c7f79b3195337d8b0f1e38320534b7157865481ac23c232b4e96a5cb95,2024-08-01T13:53:04.590000
+CVE-2024-36540,0,1,de534e526837cb522fb82cf562565010fe73cf9fd1bef920aea8b6c454f1800b,2024-10-25T18:35:05.643000
 CVE-2024-36541,0,0,b5291ecad28b9af4ed1704c2ed0f9af422de7d38da1fbc69723e312c6c52ab9c,2024-08-01T13:53:05.347000
-CVE-2024-36542,0,0,4df09cc2abdf3caca422217226bc2f709ae2db68bdb5b96a0a920b5965caf0bc,2024-08-01T13:53:06.130000
+CVE-2024-36542,0,1,dc63b890116e2af8ac1d66c7a9bd57fd6a0a3a86d9dc76224890314ebd97a04e,2024-10-25T18:35:05.827000
 CVE-2024-36543,0,0,dbb1c819537d5d2e6ccb57b6fa0d1307530721c713dab080cb8c7f78417a5f63,2024-07-03T02:03:16.430000
 CVE-2024-36547,0,0,1b4cc0318f47a7d1f45dacca15d9b24343df7af637add62667d3afc6feef36f0,2024-08-19T17:35:18.467000
 CVE-2024-36548,0,0,e144d04945e12f1b5c400dc40c85f1ddfbf9c8356b7dd5897c3f62cd196828a6,2024-08-19T16:35:18.257000
@@ -256022,7 +256022,7 @@ CVE-2024-37283,0,0,07a52ca714a9a80e3a78bead6f35fc6d30e576ab4ba6daa4bcb81e93f175a
 CVE-2024-37286,0,0,6382030145a65eaac3e6c890da740dca7c4a6af69dff82fb27db89389bebb54f,2024-09-11T20:20:34.503000
 CVE-2024-37287,0,0,a9d3453fb1c9fe3cd5af0cb7ff0109d98a345ff76f4539de093f05db9c477ffa,2024-08-22T13:33:12.477000
 CVE-2024-37288,0,0,665135dee06da174ac43bb1366ac01932e76fc67d054a27a8125a1a355fb458d,2024-09-16T13:29:06.023000
-CVE-2024-37289,0,0,2976747a57097020fbcd1f162347209565208622cbfbb8b77b0b7237b06e86b8,2024-07-03T02:04:12.080000
+CVE-2024-37289,0,1,c2aed8b5e160df798b39cb68c5926e3d1a79953e1858659f2c8710785015aa57,2024-10-25T19:35:06.150000
 CVE-2024-3729,0,0,3415ccd7b93278c163a46fc8f742b8dd4fa5f770790b8aa49be2a2c1ba3b0c85,2024-05-02T18:00:37.360000
 CVE-2024-37293,0,0,b38c9bef2ce8854b8f0a9c288c7acec55e60fa5af9100539279c24f2cbecf35c,2024-08-16T16:11:53.287000
 CVE-2024-37294,0,0,b35339309cfb6110892ba6e3580c3b860149dc89948cc54efd20172fbcf6cac8,2024-06-13T18:36:45.417000
@@ -256241,7 +256241,7 @@ CVE-2024-37565,0,0,e464b9f5d1b6751d8f05b2f30904029569bd814d202d52a27f0ddb9877153
 CVE-2024-37568,0,0,f2cf556c58317250bc2c2e32d55d7d2250f892a6ccdb5a364803d78d5a6c2fd9,2024-08-15T16:35:12.900000
 CVE-2024-37569,0,0,d72ceb83b037eeec35f3e81abfdf503a49618e4aba004fb3f45e6970df347f2e,2024-07-03T02:04:20.517000
 CVE-2024-3757,0,0,d3e75f8205a45aeb6c1cb5b9efd4d99998e027f23a100dabf40ce218744ea3e8,2024-05-07T13:39:32.710000
-CVE-2024-37570,0,0,c193fee7dc1a9f16da69c8e0950cd823d6e1aa62ce8d8888b2d1531f1f227667,2024-08-01T13:53:45.687000
+CVE-2024-37570,0,1,3d4360fa9467e8eab1b52b173ed2069d0c82ea4d63ef454bbfc16c6908108d82,2024-10-25T19:35:06.277000
 CVE-2024-37571,0,0,67e7b2412f8af956bea28aab4c57aae5f7e196be8f9b19162aa5c75b5cf90c89,2024-06-27T12:47:19.847000
 CVE-2024-3758,0,0,9133e9ab6c91a5523f7a6c3075b39d739f115990ca9d090ea03db032b6c7f7e8,2024-05-07T13:39:32.710000
 CVE-2024-3759,0,0,228c14dd97b4dcf6507c1901dec59f930e3b9b578ef9455bb0b7881e5199f2f8,2024-05-07T13:39:32.710000
@@ -256261,7 +256261,7 @@ CVE-2024-37630,0,0,b73fafa23f6f8f8d3f613797e56521f00b8303c2808cdb99d411fdd5c8f71
 CVE-2024-37631,0,0,a5cd8ddcd7ce699acdac9f3f2fda8f6d11cc509e6dadfd80153c488cb1c74926,2024-07-03T02:04:24.127000
 CVE-2024-37632,0,0,d01b52b8e66490156eb3a16ca33b4814211737a83815b462a53e59e26de8e387,2024-08-07T16:43:37.570000
 CVE-2024-37633,0,0,99956c5373735a5feafab5f8f91db462df7c04d480ce88e052b279d716c258f7,2024-07-03T02:04:24.930000
-CVE-2024-37634,0,0,6e16f0f95dfcf255097e7dd652ce7848499c89be47e371aaa754251b1b9e9021,2024-07-03T02:04:25.770000
+CVE-2024-37634,0,1,4081cc7ab580a9299c7ffef215ba137926eeb6d1f981e2078cdbabf89132ed38,2024-10-25T19:35:07.043000
 CVE-2024-37635,0,0,bc407e83f05b7c8f9bd8802eae4a82a8e6966063def27bcc1e49acc27f521f01,2024-08-13T15:35:11.883000
 CVE-2024-37637,0,0,4382c3c11477cb9c0c98c6b36d4d6a080861c8e7a12e5a542c24ab931706be1f,2024-07-03T02:04:26.567000
 CVE-2024-37639,0,0,faac05558a999374b477194ccded752579ad2da62ef52225a1808c93fa007076,2024-07-03T02:04:27.370000
@@ -256275,7 +256275,7 @@ CVE-2024-37645,0,0,34d8cced57780441610f62d6af434c6d9470f47af1755e23758fa357fcc20
 CVE-2024-3765,0,0,c051b63b3dec9d4081d844e4544651061bce58c568511d432e52d12af5fb8047,2024-05-17T02:40:06.923000
 CVE-2024-37654,0,0,7407bd364d22c8dcd819097303b9dde5a80019ad44dcc6e140b90521c8753ce7,2024-06-24T12:57:36.513000
 CVE-2024-3766,0,0,0b2c4eb9631c7021b81225c2fb00e637faa5f43f79bca7f1f91ab6ad96dfad12,2024-06-20T16:15:14.380000
-CVE-2024-37661,0,0,6db168d2f3ae431d826f69a05b16f3210dc133b79cd809abcdc976904db6eec2,2024-07-03T02:04:33.177000
+CVE-2024-37661,0,1,c74e63bb441fb8171e408570fea34647bbe045e761d33fb25f185e1128ad10b0,2024-10-25T19:35:07.220000
 CVE-2024-37662,0,0,bb6f8e7d075ce8cc2661f5a874a4a5a881cd67a10164dc149927e6fe92640579,2024-08-14T14:35:29.050000
 CVE-2024-37663,0,0,01b3999a296dc990f7de7601c48f66af39da90c049c2b0eec4443d6e5080ce32,2024-08-01T13:54:09.780000
 CVE-2024-37664,0,0,262d89efd9586f8d9685582ca4f4936d4d0dff4dc96c611162b38556aa6e87b4,2024-08-01T13:54:10.727000
@@ -256346,6 +256346,10 @@ CVE-2024-37831,0,0,84d591b6c62e8531ddd444b16a032f0bcaaa039fd0dd2bdc2becb030b994a
 CVE-2024-3784,0,0,f0c80c77a0788aa17bf80578f54749ae490fe23c5161f7f9c165d9871caa60a2,2024-04-15T19:12:25.887000
 CVE-2024-37840,0,0,1ea05f0cae39cea91919dabf259bc43d4d53a339aa6352e9633c1155c24e02e9,2024-07-03T02:04:49.190000
 CVE-2024-37843,0,0,b2b97625cfd8538b070daf88e20efea752488fb698343ba1b69e8a5a31a226a9,2024-08-01T13:54:21.843000
+CVE-2024-37844,1,1,496b512bef97f12eeb3644f6875825f2babb3858bb5fa5b7bffaf9db215b4234,2024-10-25T19:15:03.897000
+CVE-2024-37845,1,1,e98c32bfb9d88e11b762acb88da42827a928d6fa1e210271b9fe28c035c83b61,2024-10-25T19:15:03.973000
+CVE-2024-37846,1,1,0df8407e8fb222721efdef46d431e9c16574ef2c1695bc50f4ed6a17403d40ae,2024-10-25T19:15:04.027000
+CVE-2024-37847,1,1,3e1a8bc941b9a408ca7d14276a75304e177fbf7e2a356cc57572be4e1f77546e,2024-10-25T19:15:04.087000
 CVE-2024-37848,0,0,b9654691620e5501baad2d1771338ac2aedaf89f42fcedfa6b269a2de242ad76,2024-07-03T02:04:49.977000
 CVE-2024-37849,0,0,7a15b5118e0a895a8306b103c51dd029b756d9600db3bef6c7132e3f601ee351,2024-08-15T15:35:11.593000
 CVE-2024-3785,0,0,e84209989b24c941d7c6f3eae4d5a1283a6975747744d670fcd7c761c7276a68,2024-04-15T19:12:25.887000
@@ -256984,7 +256988,7 @@ CVE-2024-38572,0,0,51daba4ae3afcf7c5fe55b093c1a3f72e1a3bceba37dea337e218e2c66da7
 CVE-2024-38573,0,0,ca8898dfb11b5dd535a57345209c5053ecbd565ef57ea10dbb17683dd19ec64e,2024-07-03T02:05:13.393000
 CVE-2024-38574,0,0,6afdc30adbe5999044de1cc76d2cc76289f74910e8879e6f74197c6ff1a2b954,2024-06-20T12:44:01.637000
 CVE-2024-38575,0,0,2bb1d17f38c40f1a364165b77b7ca5fceadcc7cb4b05f83746adb6eb31d29aa9,2024-06-20T12:44:01.637000
-CVE-2024-38576,0,0,2236920d60064e661a944c733eb2e7966e7c6fdf3b15109d7e99a4086a362b36,2024-07-03T02:05:14.340000
+CVE-2024-38576,0,1,477d4b02867a8a6171e5c0098a90e5077b46001fce931cc0647d4f2611054e40,2024-10-25T19:35:07.410000
 CVE-2024-38577,0,0,1efc1e7397f24359bd6439871f08b63ff432bc413f747234aacf9ee77a51c8fb,2024-09-12T12:15:47.620000
 CVE-2024-38578,0,0,59aca8de5dbd59caa444dd7e2a1cba02589d14b7e716ca8b1544730c92701d84,2024-07-15T07:15:10.620000
 CVE-2024-38579,0,0,b473c1338d077f4b1eb5b907c1fe49edff8282b40b79f122f252878eded18e82,2024-07-15T07:15:10.703000
@@ -257205,7 +257209,7 @@ CVE-2024-3887,0,0,7992ee60f5f26d3f15d818db21e67277dbf02ae9d208c24a54e5c01935424c
 CVE-2024-38870,0,0,4167db09a3d5f0d1fb37f47670f8f4f5bc2492675561171c559ebd86c6b84b27,2024-07-18T12:28:43.707000
 CVE-2024-38871,0,0,57edf361883e1d6a8acb97285bfd5cacdef0784f3b2cf35520ec84b56f0b6341,2024-09-11T15:29:50.230000
 CVE-2024-38872,0,0,6a652d0f00754e6ed4c8f746ec78ed9435eea30377e39cffec01179ba6a9a283,2024-09-11T15:29:16.677000
-CVE-2024-38873,0,0,6889a908915a370dc32eb3b9351070cdb3a634a1b8f52aac6863c833e22f79b2,2024-07-03T02:05:21.267000
+CVE-2024-38873,0,1,e9e8d1dba6eafaf915ddebcc080a55b1cc67bf8a1cbc318ab456e405181b2bdc,2024-10-25T19:35:07.527000
 CVE-2024-38874,0,0,1c1b28247d06b02b2f044fb942d8a6aa89aab3909bc7e48738a346b7a68e1cc9,2024-06-21T11:22:01.687000
 CVE-2024-38875,0,0,d18c0c1f05faa02ef048ee622890d874b54f8d91a4409a82414c9856f7ccdec0,2024-07-12T16:11:48.453000
 CVE-2024-38876,0,0,25480756813f020fa50f173d621e9d6fe38555b94130c33f850eba69c0fb613c,2024-09-17T14:45:04.577000
@@ -257231,9 +257235,9 @@ CVE-2024-38895,0,0,716e59d18f64015676dc141eff408f11adbd22a4a66efb34ed2b5a79bef7b
 CVE-2024-38896,0,0,e949d7f0d604812e0c7b71a22b8e4f3e31cd0c4c5e0e9ab86180bc45c3e0d030,2024-07-03T02:05:24.560000
 CVE-2024-38897,0,0,d5624b84699009a260fe1a98237ae1687fc4d1ba5c6044d2e051c4d97cd50e55,2024-07-03T02:05:25.367000
 CVE-2024-3890,0,0,e12639d0080d409836c0239fc937b27c8c64796cc206deb32f0595f7d19e1777,2024-04-26T12:58:17.720000
-CVE-2024-38902,0,0,ac988b882df018ca92e12c5877e77cfd875299a6f04c2e568bccd90f65b2e946,2024-07-03T02:05:26.170000
+CVE-2024-38902,0,1,1c3e99761119af86bfc08c133d200d98145139b24546fb36382532918e199885,2024-10-25T18:35:06
 CVE-2024-38903,0,0,2b94b77610c8a043c9d0ea06696528fdc7d9d24aef31329270a0121bf4f56367,2024-07-03T02:05:26.943000
-CVE-2024-38909,0,0,f29175e3e286d20a69ae84e0dcf87435063b2a199fee90e548d4dde17b39c0f0,2024-08-01T13:55:08.623000
+CVE-2024-38909,0,1,f6a5b574aebed08039f44fd76bb05493334edfb3318746bc09e1f467a2df0529,2024-10-25T18:35:06.223000
 CVE-2024-3891,0,0,f9d0b3848969a1acfea7b9a20331b02cfc9759078e69f46c5576c9e3267f4690,2024-05-02T18:00:37.360000
 CVE-2024-3892,0,0,635a0a9dff99d68a800a0815fade3930f3dac436f84c87dcff7c11db25dc6686,2024-05-15T18:35:11.453000
 CVE-2024-3893,0,0,8eb90c61219540666d23479f74a65575eaf5c1a0dbea88b697d9ac7cb634e024,2024-07-03T02:06:50.403000
@@ -257356,7 +257360,7 @@ CVE-2024-39210,0,0,a6968325552cf6cb6c7f302a071accd1facda0c07b9843340635e35e5b596
 CVE-2024-39211,0,0,c9d7c4325bba0a2ec1ec1fe3daef35d056c7407899b9cbce0b5c58ab7122a0da,2024-08-22T19:35:34.747000
 CVE-2024-3922,0,0,d93b594e75035330ffbe6c52b35218aa3c4c95531df86f73f7a2c93c08b19be8,2024-07-18T19:33:55.580000
 CVE-2024-39220,0,0,cffdc7781bb5a48c8af1f6973408b621ad60d81fad4d0ce74cb4feeeca56b86d,2024-07-09T16:22:52.750000
-CVE-2024-39223,0,0,883c34699a9736998d96a24eca81d41004d2627c06ccc61484d0f3062b934079,2024-07-09T16:22:53.590000
+CVE-2024-39223,0,1,f54ba99b81aef6a1a473e3f0b32cd7be01aae3fd33418d38ef44eeff204ead38,2024-10-25T18:35:06.463000
 CVE-2024-39225,0,0,967bd0a79163136bba6e3e394c24ab42a107f2cade4053bebd45ebbe7a971cdb,2024-08-15T16:15:19.317000
 CVE-2024-39226,0,0,795af5d2bfe7e0b32f75745d1bcb51aae69a7d95811f3267e75c2594cf597057,2024-08-15T16:15:19.493000
 CVE-2024-39227,0,0,9b9dd0fff6f6efe1b1b7968ed33a92edd9262d57a609d9726e0c0ac59c14becb,2024-08-15T16:15:19.650000
@@ -257372,7 +257376,7 @@ CVE-2024-39248,0,0,bd438370022685a4151ebf84eacd73dcdc5ba59d6ceb4a7e44b285f898cf5
 CVE-2024-39249,0,0,55419fdc735f4b5d3c5b1e858306972036cffb58a6300e012da45bf6f04a8bc8,2024-08-26T15:35:13.893000
 CVE-2024-3925,0,0,7eee90dddbc89d587d2add5ec583b68109d8e96ea070cac853f0344fab97474f,2024-06-13T18:36:09.010000
 CVE-2024-39250,0,0,57928bd3b6fed5e7ca24bfa49026f1317017d625b7d77802180f56e1fd67fb2c,2024-08-01T13:55:47.607000
-CVE-2024-39251,0,0,9df7da1e1e27461254efbb4f14985199d1f5c3e4c1c9dbcd995558e03e5bb519,2024-07-11T15:06:10.633000
+CVE-2024-39251,0,1,64af2157392d57f79850089f97cd12b9961f6851a323e46fd70206b4bebea7d4,2024-10-25T18:35:07.280000
 CVE-2024-3926,0,0,5b04461367e6759c792ebfb9ad8f25b57b29be658a49f3088676d8721c7c2f63,2024-05-22T18:59:20.240000
 CVE-2024-3927,0,0,c053c5f2098184ebda7812ad9ad17f8e9bcb0fa48f3cf62ccbd3c0beff2bc975,2024-05-22T12:46:53.887000
 CVE-2024-39274,0,0,6d4b03e5d97ff9e2231b9be6769126c78b619f16e46745a1adeaad7d24bf4316,2024-08-23T14:39:29.247000
@@ -258055,7 +258059,7 @@ CVE-2024-40486,0,0,4cd2f281e08f3291d37d3a4823af93070215d87d687ca41653f1c72ca427a
 CVE-2024-40487,0,0,41af7da83500c8a75e7df05fb6c9f48916ac5794006d346f5d5ff76e523c1408,2024-08-23T15:35:06.307000
 CVE-2024-40488,0,0,935bd1c3b9e22ad2c8e572783ed910d0a85a3508107693b6f595be8805553bbf,2024-08-13T01:13:53.230000
 CVE-2024-40492,0,0,887baeb8c822fbf96c83ae7c8317e551b9d380e125d5f646dfb0a8c0719647ab,2024-08-01T13:57:30.260000
-CVE-2024-40493,0,1,aaea0b22b1a9fd8ca62ceefb69cfb4d04acb9686bdbdbc9774da6bba4ba8925d,2024-10-25T17:01:22.433000
+CVE-2024-40493,0,0,aaea0b22b1a9fd8ca62ceefb69cfb4d04acb9686bdbdbc9774da6bba4ba8925d,2024-10-25T17:01:22.433000
 CVE-2024-40494,0,0,48a84fe0e443f816c7deb1ffb2fa8d49462b96b77d70d281cb18dcbf2a2ebfcd,2024-10-23T17:35:05.100000
 CVE-2024-40495,0,0,0c92b9527f5126e4b4bbf0d1f0a16c194305be9e806244080172bf727ded6b6a,2024-08-01T13:57:31.037000
 CVE-2024-40498,0,0,5810ed5aa59e12db14c51ce30325d1c0d70a5c997d2111b8b796a66ebc036219,2024-08-06T16:30:24.547000
@@ -258715,7 +258719,7 @@ CVE-2024-4145,0,0,704254773246494130c81e0600984df247a970411736d475449e315ca595ee
 CVE-2024-41459,0,0,9640a7afe79b79343a3929c52d836dc236bb14f56157fc3a97eeb523f4182cdc,2024-08-01T13:58:42.827000
 CVE-2024-4146,0,0,44d4e6fc76499583267ad9d2982965e0b01277c59cea588fc1c62cd739f32cf9,2024-08-30T16:15:09.813000
 CVE-2024-41460,0,0,c083c888decef1f6a25386395c954e7130328fe40eb807fb48aeb706487a4b23,2024-08-01T13:58:43.920000
-CVE-2024-41461,0,0,29e4ea2e6c0449f9c564b466527c20a02d07c4c6d50d9f1be0a40101bb5592e5,2024-08-01T13:58:44.983000
+CVE-2024-41461,0,1,aae828816594ac85aaa8be9fd3dede24e13fe31d859c851e8cc5b1861ae37720,2024-10-25T18:35:07.473000
 CVE-2024-41462,0,0,7dbe5aff525bed125a538ee4652d679dba96e46bb328711bc0224d78949e0a92,2024-08-01T13:58:45.997000
 CVE-2024-41463,0,0,a153f77c3b8e8afae6003ca7f5efd2bc999f5bab94d5319580e03183eccf746b,2024-08-01T13:58:46.833000
 CVE-2024-41464,0,0,fb783471109de1fb41b0e999af63416fe9b60360e3d7ca49fc0b68889080f79c,2024-08-01T13:58:47.627000
@@ -258774,7 +258778,7 @@ CVE-2024-41597,0,0,7bc1c683ecc7754ef9a4accb42f1f9f659f54572a438343a1c4fabae2a9df
 CVE-2024-41599,0,0,48a45c986c9579d7d3c0496e1b383e5802ce839d40edd99b19ede2ffd41e1b22,2024-08-22T18:27:45.397000
 CVE-2024-4160,0,0,02cbb5178621697de395e5bf97f83709ae910ce21eba24af27e6bc1b3971ae89,2024-05-31T13:01:46.727000
 CVE-2024-41600,0,0,ddd05664b5ee0043272f1a43166002722a6b163ed847eae777be121e2c652a5b,2024-08-22T18:27:15.310000
-CVE-2024-41601,0,0,bbe6fd3c72d7dad8c522d892fc1c0f9bacbb178b64f66555395886f778d90253,2024-08-01T13:58:55.750000
+CVE-2024-41601,0,1,4221cd1e430017fd47307441fb25a646ed9deb7bd75e8490c865278249c927d4,2024-10-25T18:35:08.280000
 CVE-2024-41602,0,0,3aaf8bd0d1359c5ef86792c331ff3b330f01dba788f9b1812b99e2f11e997bba,2024-08-01T13:58:56.507000
 CVE-2024-41603,0,0,274738d202695ad4f9eeac726dd842b3cdc47fbabba17edb5ee76c87292d7f32,2024-08-01T13:58:57.330000
 CVE-2024-41605,0,0,bb255aac120d8e7bcca665451b615d0034f2513afeb2d3aeb08551ca63d9661a,2024-09-30T12:46:20.237000
@@ -259823,7 +259827,7 @@ CVE-2024-43167,0,0,c4eae034ed90d957ee0d40ac6b75e1eb711889b4b8905f404c5783e222980
 CVE-2024-43168,0,0,ef0081344887975b429a2b0b7741a490ebb03d62e914345ff88e9fc7663b3374,2024-10-21T12:15:04.327000
 CVE-2024-4317,0,0,2ab51635ebb5a78f9093ee7220532c2f98c47bcb30186dfa33cf412783a7fe8e,2024-05-14T16:11:39.510000
 CVE-2024-43173,0,0,5fd3a7cd2e25eaa59bc7be29d2c1d5f9369e6e7564f4001a4cb0dbe8b47a7f52,2024-10-25T15:40:19.977000
-CVE-2024-43177,0,1,2e91df99c102e520c2bb937f75df1229588c30ac5f4c9282ac32d182ae56467a,2024-10-25T16:05:15.777000
+CVE-2024-43177,0,0,2e91df99c102e520c2bb937f75df1229588c30ac5f4c9282ac32d182ae56467a,2024-10-25T16:05:15.777000
 CVE-2024-4318,0,0,3bd63bc61468b7ca3d2d40c33a55eb01fa72ff95d7d5fb5f0e4f8d9b094da54b,2024-05-16T13:03:05.353000
 CVE-2024-43180,0,0,abb2e48a138ce8e840850ec2c73107ac445b622170d298531958775b0aa3e8a2,2024-09-20T17:28:06.617000
 CVE-2024-43188,0,0,e35d0111e2400440d7a3229650e46565d9a613f599bd61cb8e0041fbf0bfcd3f,2024-09-29T00:24:49.103000
@@ -260136,8 +260140,8 @@ CVE-2024-43567,0,0,b1aa8d4eda561d64c2d6cb4a7fbba0f5a1685cba00aff4889ad4b33556da9
 CVE-2024-4357,0,0,86e4d24bdc3dca7ecac9fc1438972a4a1617b1654b394ca919ca67f001ce2742,2024-05-15T18:35:11.453000
 CVE-2024-43570,0,0,cb1ebdbcc9f463b489680ee7f906a1b002e658802f44b1edfc93e77479cd3deb,2024-10-16T21:53:41.207000
 CVE-2024-43571,0,0,fa36d8639880a909bc9227e28caa319904ee146b710e8465c63988bc833161f8,2024-10-16T21:53:47.887000
-CVE-2024-43572,0,0,94efad9fab1aec1f1c3fad704766c71ab9f5733d1a2959a700e703dee09baee7,2024-10-10T15:25:33.310000
-CVE-2024-43573,0,0,7cb2a96662a466abf265ca3d01d38469acb4c1db062ef75727d0e2c8e1756007,2024-10-10T15:54:19.353000
+CVE-2024-43572,0,1,257e329a7c7fcc1c3aa59295d878c66b1ff93d840d2da33e0c77b5b8eb2e3746,2024-10-25T18:17:28.223000
+CVE-2024-43573,0,1,99c4b510e413885843aeaba4bd6f60319242cb24f5b664274f7f6f8822356c2d,2024-10-25T18:17:35.217000
 CVE-2024-43574,0,0,27cb32f4bd91a68a1d79359c4fa56d2ab297703b1b8d3a2c872a415c852b6007,2024-10-17T18:58:37.100000
 CVE-2024-43575,0,0,24f2c5a591586cc897a2d8a6a2db6f48b0fde505b74f11c59d7d9cf153abc125,2024-10-16T21:53:59.407000
 CVE-2024-43576,0,0,fe1fcad43644aa438f5b12fd73a64989a355f1461202f1bc35d3359c0344ca8c,2024-10-16T21:54:24.047000
@@ -260286,10 +260290,10 @@ CVE-2024-43840,0,0,23c960f08c72e92672042c1b393c21288af5920aee8a16c3fbfc5fa814adb
 CVE-2024-43841,0,0,e1a2c38a635a3f723bb13f01d4b145d0059affd305089e3a07adc4eba6ffd3eb,2024-08-19T12:59:59.177000
 CVE-2024-43842,0,0,79cd60e4a4023eb7c9a6d86176017ee449ccbc0688862836e1c280871c39de83,2024-09-30T13:55:17.007000
 CVE-2024-43843,0,0,a0131aafc1fe810a712c7a36d5efccca41cdcb3c562b11e8dec7755521d56b27,2024-08-19T12:59:59.177000
-CVE-2024-43844,0,0,a0d50b71edd9141ff92598003e1617be5ffa1f51ed6945e4adfc2aef19f1831c,2024-08-19T12:59:59.177000
-CVE-2024-43845,0,0,d80433b94567f7553ba59d5578ff0ab177cc617e43797bbfe0b461c6dff68752,2024-10-22T15:15:07.240000
-CVE-2024-43846,0,0,336ca6ce5d381bc8197cb8ae52aec5d82cb25fe9302c78389787b6ba92216525,2024-08-19T12:59:59.177000
-CVE-2024-43847,0,0,835246f4f393ea975e0a8495b92ecf4d0f17d69854486c3d470ee96289075a6e,2024-08-19T12:59:59.177000
+CVE-2024-43844,0,1,f8e0e9c6309b78819993f04abd3f0fabe15d23e7d433454c8fc7a70ef34d9adc,2024-10-25T19:49:05.987000
+CVE-2024-43845,0,1,caaa023c02e31720553b20117af210f2452fe00e9e2b31c2df183843a916f65c,2024-10-25T19:51:07.187000
+CVE-2024-43846,0,1,f266cac61831a851876149b3774436f495d75f984b51eb837eba29752a3f1863,2024-10-25T19:52:01.380000
+CVE-2024-43847,0,1,4e65a4d22ff6510c288db589631fb202b95ed61e906a43d1b3d8af8c2605b147,2024-10-25T19:55:53.963000
 CVE-2024-43848,0,0,574ca28c6f6f9483be8c689a91acf3081f69bbcf361ca8233d166c12381f4f93,2024-10-25T13:57:51.800000
 CVE-2024-43849,0,0,c09809025deb42d3e16ffa77bdd804cd5a554e28cbe29839183c2ce44189d8b9,2024-10-24T16:02:21.587000
 CVE-2024-4385,0,0,218d1e7a4ca055c9cc2f26803db027cb337ddeafcf5f646e236db9e9e217180d,2024-05-16T13:03:05.353000
@@ -260514,11 +260518,11 @@ CVE-2024-44094,0,0,745c42fe2d315a5bcee63bacf45ed85a137f90126e69b7519e917691efb99
 CVE-2024-44095,0,0,b00dc9986da442410ed4230403c0d5027e748adf40134501c33f35c9b4d16312,2024-10-15T14:35:04.083000
 CVE-2024-44096,0,0,9e10fae26ac71a12ed9f5239ac873ac3368309ebde15657c2661c84b3db39f54,2024-10-15T14:35:04.383000
 CVE-2024-44097,0,0,965cf9d05fda49947baa77cde6164ca7e937d7f38563ab41cd3e9e9bd0e5a36b,2024-10-04T13:50:43.727000
-CVE-2024-44098,0,1,1168004266a8f5e54e269c18ca4a45508b8876128dba4e929319900254f0936c,2024-10-25T17:35:01.100000
-CVE-2024-44099,0,0,cef1b52b87cb045fe362229d573416685e664fe9a620a39f6e73878a28bd66a1,2024-10-25T12:56:07.750000
+CVE-2024-44098,0,0,1168004266a8f5e54e269c18ca4a45508b8876128dba4e929319900254f0936c,2024-10-25T17:35:01.100000
+CVE-2024-44099,0,1,8b5d0671cd3c07c2e2fdb1ba85a34b0fab024886d0499cf4b6e612e91b95d5dd,2024-10-25T19:35:07.773000
 CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000
-CVE-2024-44100,0,0,e9777f3823ca5f020625b7de7657f183ca0a32ff11566ee15e67030df4347240,2024-10-25T14:15:11.590000
-CVE-2024-44101,0,0,583f76d53afea6250ddef045f5c30668d9eb48e1e8827b0f170aa5034ba6581d,2024-10-25T12:56:07.750000
+CVE-2024-44100,0,1,20d0415dcd9cbb9ed7789457496bacac14a274719770af0b32fd0cba6d6500f9,2024-10-25T19:35:08.533000
+CVE-2024-44101,0,1,38a10de066362f808ab5201dce6c06e3469b38a2adfd796214f3d1e7a2c50419,2024-10-25T19:35:09.280000
 CVE-2024-44103,0,0,709653e0e681c50169d2a31a1ca4fa07ba0b9e103bee0789c715365497e0794a,2024-09-18T17:18:39.040000
 CVE-2024-44104,0,0,929a3e88a508b197778cb9d698752e7d95d2a1fd6ba54e089d4187ada17accb8,2024-09-18T17:33:06.413000
 CVE-2024-44105,0,0,6ace8c54c3fc6c9b1684fd8d42f178f1cce19bf6d08f58b02fdc3857633db641,2024-09-18T17:48:11.193000
@@ -260749,7 +260753,7 @@ CVE-2024-44807,0,0,62c2b8a7567d7a7c61c3dd691038c78c799cdde1b88696256483cc85f3e66
 CVE-2024-44808,0,0,53ee5f88da9d15aa3ffd696fc5703153aab92dbb219aaccde4dc48186abdbb68,2024-09-05T12:53:21.110000
 CVE-2024-44809,0,0,424c650381a963ac60378eaa5a7cd36fd86829e33f994f3d0227dc416ec44e82,2024-09-04T14:35:12.707000
 CVE-2024-4481,0,0,c2852db732c7c65c13524ea22e5406663429c55dff3bfe0d5bbffa299f48bbd3,2024-05-14T16:11:39.510000
-CVE-2024-44812,0,1,26c90ab8a711eee71d3b78116577aa5e43694ec9f3cafc1dd7ab46be708a1d95,2024-10-25T16:56:11.150000
+CVE-2024-44812,0,0,26c90ab8a711eee71d3b78116577aa5e43694ec9f3cafc1dd7ab46be708a1d95,2024-10-25T16:56:11.150000
 CVE-2024-44815,0,0,b542c0b8057471e724100a6582edd807f2b604eab9a88d4411aa24f995571f97,2024-09-25T19:17:02.237000
 CVE-2024-44817,0,0,69deaa4e7ecbf919037754dfd86d6f5f34bcd33ff645863b7e5f14d08ab18721,2024-09-05T12:53:21.110000
 CVE-2024-44818,0,0,d174c0799ffdbf965fa98c057c949d0dd19f8293fcbd2dc7f74d6c2c59752335,2024-09-05T12:53:21.110000
@@ -261522,7 +261526,7 @@ CVE-2024-46237,0,0,89c70f938f955e8f8794daf2309e374bb81a18bcff912f949189945353ae1
 CVE-2024-46238,0,0,c0b3aa1e64f4a91b9c4da7e2401f4fe18d33534691ef378a47cfa822f9a55266,2024-10-23T15:13:25.583000
 CVE-2024-46239,0,0,725c4cefa2ca2647a32f2bf2b322ce53dedacf1976287dda499bc36c65d5a603,2024-10-23T15:13:25.583000
 CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000
-CVE-2024-46240,0,0,e1fabb07f498fd1cd5336ee19dd4a0cded9959b31a2fc1d149406578714fa211,2024-10-23T15:12:34.673000
+CVE-2024-46240,0,1,3dfb8006578d7ba4d6d34c3d67455dcd6450605a9bdc241e6a377f0c41b90870,2024-10-25T19:00:20.737000
 CVE-2024-46241,0,0,e8f867d722224165a0936937fdbb3a70034985bd08f25a28d6b30ab6a32199ce,2024-09-26T13:32:55.343000
 CVE-2024-46256,0,0,8bf470a14240bc761051ec27ff055fa64e8fa7727cdd73b13c40b5c555057a54,2024-10-24T17:15:16.690000
 CVE-2024-46257,0,0,77ff81579b9686846d30b6279f2f3ca51486f319de7ee8b1a0a61768d1f232f7,2024-10-24T18:15:08.617000
@@ -261975,9 +261979,9 @@ CVE-2024-47009,0,0,264b3f36a46fb3043a7ff13a0518523aa897b1a061a2770490e43d56fad1b
 CVE-2024-4701,0,0,5f841f0540b46f49c80d409ca526b0c08d190fe4f1f5bc2d7cfb115b5ba38647,2024-05-14T16:11:39.510000
 CVE-2024-47010,0,0,ee58b9d0b7d45ffa465af597d034eab50b110dc72368e1b0d3bbec3fe3bad3d6,2024-10-16T13:28:07.393000
 CVE-2024-47011,0,0,834715db0c973116652eef0dcc6e7b991e8d6c4d096b7d3fa0496c73f0d11b86,2024-10-16T13:28:40.480000
-CVE-2024-47012,0,0,48ee9c2e60f1c3fdbb797fe7506ae5bd29a96b346912b9784e7b5f21c1040cfe,2024-10-25T12:56:07.750000
-CVE-2024-47013,0,0,190f11c14ed590e07e01ba9516bee238cab256108bd9f907d6f67a20bc3a2f78,2024-10-25T12:56:07.750000
-CVE-2024-47014,0,0,517bfa885256428630aad0993b455784cae5e87712cb97182016a861f18bb976,2024-10-25T14:15:11.783000
+CVE-2024-47012,0,1,51b296eca2295acd5a1d0247cca9b894804b420f2f6637dab75d64e90b1a99f2,2024-10-25T19:35:10.183000
+CVE-2024-47013,0,1,c79edd60fa0cb1b64b4333b41bac8a25c3b687d03a9279b3c4a732c53b04973e,2024-10-25T19:35:10.947000
+CVE-2024-47014,0,1,2588aa48a53d7f12c66f0a23d0984f4a68a355479a0bdb5afb4d6899e7323bbd,2024-10-25T19:35:11.740000
 CVE-2024-47015,0,0,ff96cfa0d9f88263fbfdd79733732a9ff330d97dcf8ab9375596378f10ba09df,2024-10-25T15:35:13.317000
 CVE-2024-47016,0,0,5bb480ec0e9fd631ee64eb7e86f79fadf399ca14a987be83ebc334f12731b432,2024-10-25T15:35:14.487000
 CVE-2024-47017,0,0,ec48a73c66b69cfdbd33128fb6e18b5a985fdcc5efbe00cd3212f49f8adb9439,2024-10-25T15:35:16.170000
@@ -261988,20 +261992,20 @@ CVE-2024-47020,0,0,8cc56588fa67c6488d48725ca463b6e7c5121aa699e52d967ec763322c988
 CVE-2024-47021,0,0,c76dc6b96a46993f8506ca6606d4ca47360f6031b2daa317a23260ae58f459eb,2024-10-25T12:56:07.750000
 CVE-2024-47022,0,0,0021a56385b34320390d37d93b6b70f267a8ab1d92243aadd4981880ae362c7f,2024-10-25T14:15:11.877000
 CVE-2024-47023,0,0,a160120633f566da41dca5c1d4166256c3ed06e850b8cbe662f2b94d506ea18c,2024-10-25T12:56:07.750000
-CVE-2024-47024,0,1,fdd8db96887c49e8c2dd0a2345448533fa22363bcdc70296d3714d8b8a1d05c9,2024-10-25T17:35:01.947000
-CVE-2024-47025,0,1,cc755d2dfa83d9b00f84dc441cc05031865cf46bc6d4474051ebb8a299ce8934,2024-10-25T17:35:02.767000
-CVE-2024-47026,0,1,0dd3b1d0ee282e446b5ffdb7f0e22e1a75573914f3e5e07cd15aeb5631127479,2024-10-25T17:35:03.593000
-CVE-2024-47027,0,1,9176463edf9ab1fb44b78c2bf720fcfcc8a97ada3de811f156f19e6c5968310b,2024-10-25T17:35:04.390000
-CVE-2024-47028,0,1,8e6ccd9449d1650f43ce21de8f3b71bac79f34933413bae4fdbe703e619e4a81,2024-10-25T17:35:05.147000
-CVE-2024-47029,0,1,6ceacea7b31d9c08df562719f0aea3b0f5dcfad40eadbbbd9c8bcf984e54b881,2024-10-25T16:35:07.850000
+CVE-2024-47024,0,0,fdd8db96887c49e8c2dd0a2345448533fa22363bcdc70296d3714d8b8a1d05c9,2024-10-25T17:35:01.947000
+CVE-2024-47025,0,0,cc755d2dfa83d9b00f84dc441cc05031865cf46bc6d4474051ebb8a299ce8934,2024-10-25T17:35:02.767000
+CVE-2024-47026,0,0,0dd3b1d0ee282e446b5ffdb7f0e22e1a75573914f3e5e07cd15aeb5631127479,2024-10-25T17:35:03.593000
+CVE-2024-47027,0,0,9176463edf9ab1fb44b78c2bf720fcfcc8a97ada3de811f156f19e6c5968310b,2024-10-25T17:35:04.390000
+CVE-2024-47028,0,0,8e6ccd9449d1650f43ce21de8f3b71bac79f34933413bae4fdbe703e619e4a81,2024-10-25T17:35:05.147000
+CVE-2024-47029,0,0,6ceacea7b31d9c08df562719f0aea3b0f5dcfad40eadbbbd9c8bcf984e54b881,2024-10-25T16:35:07.850000
 CVE-2024-4703,0,0,7e57d47de6048bcd912b4c77aa51d488946887d89315e68305481f1a25780324,2024-06-11T18:06:31.967000
 CVE-2024-47030,0,0,3be2a305b27576be0e6560e95b9293dd29db11df97610966c4be76782dd4afda,2024-10-25T14:15:11.917000
 CVE-2024-47031,0,0,b3e1a11628b63eb1d5c738aa227e8f278147c031544256d5366c807174523df5,2024-10-25T14:15:11.960000
-CVE-2024-47033,0,1,9c2cd5b06235ca8b45a07f3d037aabc911bbc4d5c31162114495fe851d679b35,2024-10-25T17:35:05.913000
-CVE-2024-47034,0,1,d59fd6f166a400963fc3af740fda9e91c610700fad7ee93dfce3994dca94702a,2024-10-25T16:35:08.630000
-CVE-2024-47035,0,1,a3e48751355d497c6d8bf42ca7764bc77732d3fbfe4fec392271ffd450fa111b,2024-10-25T16:35:09.407000
+CVE-2024-47033,0,0,9c2cd5b06235ca8b45a07f3d037aabc911bbc4d5c31162114495fe851d679b35,2024-10-25T17:35:05.913000
+CVE-2024-47034,0,0,d59fd6f166a400963fc3af740fda9e91c610700fad7ee93dfce3994dca94702a,2024-10-25T16:35:08.630000
+CVE-2024-47035,0,0,a3e48751355d497c6d8bf42ca7764bc77732d3fbfe4fec392271ffd450fa111b,2024-10-25T16:35:09.407000
 CVE-2024-4704,0,0,9637a93e192a5f32142e05687e31ff3688b029254561fc4728d18bbfa1666d6b,2024-07-03T02:07:57.433000
-CVE-2024-47041,0,1,badb113c52ad3f26fac9981faa6ebae8f0444af7e7657f49674083947f90d206,2024-10-25T16:35:10.220000
+CVE-2024-47041,0,0,badb113c52ad3f26fac9981faa6ebae8f0444af7e7657f49674083947f90d206,2024-10-25T16:35:10.220000
 CVE-2024-47044,0,0,ee5fa186fb8ea19ca537298bbe2b5e712b21f44e9ac5aca4b5f7e41e68f91755,2024-10-17T02:15:02.840000
 CVE-2024-47045,0,0,f477b3cad8608c11a6f4e2c578041877872bac107a164ee977d83ddf752336b4,2024-09-26T15:35:29.950000
 CVE-2024-47046,0,0,7869fbf4e097ddf562d122b002ca5484caa2f32ab0ccc92f893d14cc4f35f687,2024-10-10T12:56:30.817000
@@ -262651,12 +262655,12 @@ CVE-2024-48119,0,0,6022221da5fd10d70715948b01fe2f7f8a0f43256a22ac2ee84f2922fba50
 CVE-2024-4812,0,0,96f0244e64d02e8b825789000f88a75dd5b3d67c4d6e5fa4b2230b6ad5599e15,2024-06-18T18:49:19.783000
 CVE-2024-48120,0,0,9504bbf5097a8042aa622e4bcffcd74f79e5a7cbeebb7a1d1951fd43248d522c,2024-10-15T16:35:09.650000
 CVE-2024-4813,0,0,ffced1bec51c6384e79d75317b856f32e05abf0a3cdd3adf718b586086ffad4a,2024-06-04T19:20:50.970000
-CVE-2024-48139,0,0,58adfd4ad5d14e9290c7beb94672bc1925877b47c221370b67aede32a9c4bfaf,2024-10-25T12:56:07.750000
+CVE-2024-48139,0,1,4498e53310bd0f1ddf9c5f5a2ccdf773885d2c9acdbd970572ebc94239438a82,2024-10-25T19:35:12.730000
 CVE-2024-4814,0,0,6ed65b628d782e4c0035f27d12907232951228fb5dd63de02df922628089b508,2024-06-04T19:20:51.077000
-CVE-2024-48140,0,0,ab88a4cea76b588e8807c35674ca34539cb7760a2303af2de3fe7ea49b8e90c9,2024-10-25T12:56:07.750000
-CVE-2024-48141,0,0,f853a3b6514a9f113366f907dcf08a8f876356fd18da6498484194ba625e807e,2024-10-25T12:56:07.750000
-CVE-2024-48142,0,0,4fb50954b1384ca3c2474625ffe298309170fdf75242d5b2db0493bcc203c6ec,2024-10-25T12:56:07.750000
-CVE-2024-48143,0,0,26c2b4a358e23b06a48f32e76ebfbc4bba3d0f8b03c430e00d9c294cff3bf09a,2024-10-25T12:56:07.750000
+CVE-2024-48140,0,1,7bdd1e284971ed20bbd566db3c44806f986d48a3fa213bf0dc8436945e28930e,2024-10-25T19:35:13.497000
+CVE-2024-48141,0,1,cc4782a8f0951c87e98422618b067d64816a658947d4a8eca9697f1d8a5b003c,2024-10-25T19:35:14.257000
+CVE-2024-48142,0,1,cae437d6fee1555558b712ee6c06f3021c0f2d9f12fdcac6beaa6daa4a343e39,2024-10-25T18:35:08.560000
+CVE-2024-48143,0,1,5545db23ed22335df1a529c388d9711e2b5fcb2994cec0953d6220a72ae8ba76,2024-10-25T18:35:09.327000
 CVE-2024-48144,0,0,fdb4eecf8121a078afe76760eccc74cd2b7d4a296fa77eb553646edbcf93e74b,2024-10-25T12:56:07.750000
 CVE-2024-48145,0,0,a7822e773b5e8b97e44909da5983b8285f14b3b7031fc690fa121b3e6000150c,2024-10-25T12:56:07.750000
 CVE-2024-4815,0,0,a12a3714528f7b768c4c9101b510e3e25b21fa14abf883b4fca5d245888d3088,2024-06-04T19:20:51.183000
@@ -262670,7 +262674,7 @@ CVE-2024-48180,0,0,5891665b96e5bb6f8325528a26dbdcd36c2f7a69e9155272862a28dae07f4
 CVE-2024-4819,0,0,bc26e072d222c9731ee42bb1198fec18f8f3236e713c07e319d531bbf6577caa,2024-06-04T19:20:51.613000
 CVE-2024-48192,0,0,50ca3857fa6f25fe2966bfab9679a90bf80eec0b1a66f64f4eaab1d030168651,2024-10-18T12:52:33.507000
 CVE-2024-4820,0,0,832738c431d4032e72cf5367ea2c2310b7c6cd840d9bc0fc3f10b9e1f0e05ed2,2024-06-04T19:20:51.710000
-CVE-2024-48204,1,1,2d0833879720aba0f189d98abf08c386855c552d12207fd3da114e189cd9f34d,2024-10-25T16:15:09.873000
+CVE-2024-48204,0,0,2d0833879720aba0f189d98abf08c386855c552d12207fd3da114e189cd9f34d,2024-10-25T16:15:09.873000
 CVE-2024-48208,0,0,b02f86f1b335b3183358f07d84617fba93d01a0b465de0ef3561929c34125b92,2024-10-25T12:56:07.750000
 CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093af,2024-06-11T17:29:33.213000
 CVE-2024-48213,0,0,117f3b040dc13bc06ba79e6afb4438d02d6453981e7ddab2f51ac57958bb9036,2024-10-25T12:56:07.750000
@@ -262692,6 +262696,7 @@ CVE-2024-48279,0,0,734681838e14fea506d33d2e5cffcb45e5208b2ff1232248e90dbda0d4737
 CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b92f9,2024-10-16T16:38:43.170000
 CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b694,2024-10-16T16:38:43.170000
 CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000
+CVE-2024-48343,1,1,5656db22df2b3676700d39c69c4e1b01dffc629287daa5fe07ebec03a2fcdc3a,2024-10-25T18:15:04.250000
 CVE-2024-4835,0,0,b63c1e2c2f2232a6ba415444f30303ee4e5ea1a45d737d79b2133d2755ec709c,2024-05-24T01:15:30.977000
 CVE-2024-4836,0,0,6397d82c08a27dc6d1e4828623f7dccd401e56dd97e62d291cde8c73c9f6f8bd,2024-07-02T12:09:16.907000
 CVE-2024-4837,0,0,e7f6212a3767856f93e80078aa36a8d58ae9b0d6d87727b0b71ea9bfd6a3b44b,2024-05-15T18:35:11.453000
@@ -262700,7 +262705,7 @@ CVE-2024-4839,0,0,b71f0924b0409cbf87c224c453882d6c9b4eee1b8a725627eb630ec6587a6e
 CVE-2024-4840,0,0,e883b61cf74d34d59484fc9e98d49b7c4a3e1a85aadae7b936258fde00012f35,2024-05-14T16:11:39.510000
 CVE-2024-4841,0,0,65ebfdfe2681835a6b4ece6477d685d2c79df9dc285d61b3c6847a6703ab5189,2024-06-24T12:57:36.513000
 CVE-2024-48411,0,0,f02f5a173c68a1066ae1d0ad3ecb091448747ebc7ae5d98814db8ad4f2b7f72f,2024-10-16T19:35:11.290000
-CVE-2024-48415,0,1,74b10390d002ade4800e5d7a55f6d3a4ceb198a0f7cd7077ee2455a630a69b9d,2024-10-25T16:55:26.083000
+CVE-2024-48415,0,0,74b10390d002ade4800e5d7a55f6d3a4ceb198a0f7cd7077ee2455a630a69b9d,2024-10-25T16:55:26.083000
 CVE-2024-4842,0,0,266948939b8663b41b45dca8cb12f3f3247c17eab2663a8a73d7a0fbf198d426,2024-05-30T20:15:09.703000
 CVE-2024-48423,0,0,8c282145a9dde1964a7595668e5968537e68f0c62ec8f7f792ca8b027908f113,2024-10-25T12:56:07.750000
 CVE-2024-48424,0,0,ee533150d47efc3108cae9b82d77aeffc985ad6f31e1c299d1eaedfbcdbff2c3,2024-10-25T12:56:07.750000
@@ -262713,9 +262718,11 @@ CVE-2024-4844,0,0,b1cdfd63abb8075cb2a12dc44eacca2f75c6048adf9c4ea8b8b7c607266903
 CVE-2024-48440,0,0,5219db498a563dd1c6489094539901c4defdd8cd94636f8687a9af5fa80de2ee,2024-10-25T12:56:07.750000
 CVE-2024-48441,0,0,224bc247fd5f1747eb1e946da5b3115767d16a53740175a2dfcb73dea07b1575,2024-10-25T12:56:07.750000
 CVE-2024-48442,0,0,084bb62aa7e367eaa572c5f66b2188f35788a01f98625b5dbdc0959d7e2c72e8,2024-10-25T12:56:07.750000
+CVE-2024-48448,1,1,aab36c7efa4d3cefca6b8cb68026c1ed9e940d94877b0f17e3d7005f8bd77c6c,2024-10-25T18:15:04.330000
 CVE-2024-4845,0,0,f8e5a569577a931ed62905431d3e7dc57f80df89344697bf8fc7f196d4c6a1d9,2024-07-23T17:23:41.597000
+CVE-2024-48450,1,1,c87cb9a823527d7ad40eff56b320ed10998d734b68c031022d699dd9986e1481,2024-10-25T19:15:04.373000
 CVE-2024-48454,0,0,6b6ca49a060c554891c90c2e114c529f7522d5800fbd375e9b33b5c669ae0f53,2024-10-25T12:56:07.750000
-CVE-2024-48459,1,1,a7d1ee8f457b4cb4b257b6751d2a0c81826e21b458157c0b6ac00441abd5283c,2024-10-25T17:15:04.703000
+CVE-2024-48459,0,0,a7d1ee8f457b4cb4b257b6751d2a0c81826e21b458157c0b6ac00441abd5283c,2024-10-25T17:15:04.703000
 CVE-2024-4846,0,0,354213cecebbad5d2830809199864dadc70a5508c38afeb47a24b8f17c4c0fe1,2024-06-25T18:50:42.040000
 CVE-2024-4847,0,0,3e175fcde7743d0dafc07697dcd3c0585505cba50a8840c440513434f4a1e2f1,2024-05-15T16:40:19.330000
 CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000
@@ -262727,7 +262734,7 @@ CVE-2024-4853,0,0,7e943be0a2434f6362f67f453fe22910f05fecde26076344b21d97f20b2d6e
 CVE-2024-48538,0,0,d00c6ae109958170edcc3a2c583c2ac0637abae567969e57f7b9a648e6c8cb40,2024-10-25T12:56:07.750000
 CVE-2024-48539,0,0,1d5c8fdf188ef55366358121671809693c2ffcac98329c253bc948034dac981b,2024-10-25T12:56:07.750000
 CVE-2024-4854,0,0,9d5d733c00183e47994464da1b76a252c7e4b8268459cd8a1634b1fda6297d73,2024-08-29T15:15:31.797000
-CVE-2024-48540,0,1,d28fdb22fce9e3091e2d534ef960f29e698a35b76fafedab91937579287ab000,2024-10-25T16:35:11.093000
+CVE-2024-48540,0,0,d28fdb22fce9e3091e2d534ef960f29e698a35b76fafedab91937579287ab000,2024-10-25T16:35:11.093000
 CVE-2024-48541,0,0,445987ffb9995efed065af6e947aa780367ff397aa0e6a5c5154f3922a65938e,2024-10-25T12:56:07.750000
 CVE-2024-48542,0,0,3cd5de49086c2c00210e7dab5fa3a8eb1e801db273093814abbd4185d4a7eeaf,2024-10-25T12:56:07.750000
 CVE-2024-48544,0,0,066e44948f9e780845364a134f83700eb451ac395786b145ae7dc4bd6c567b2e,2024-10-25T12:56:07.750000
@@ -262738,11 +262745,11 @@ CVE-2024-48548,0,0,ec80620fd2405092cb652dc2117913ce945d52911c33fb7583254b23a981c
 CVE-2024-4855,0,0,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f872,2024-08-29T15:15:31.893000
 CVE-2024-4856,0,0,01234b09ea1a4585c989c1dc87d23ed182241e8a50536214983ade66b15e19f8,2024-06-04T16:57:41.053000
 CVE-2024-4857,0,0,1a28f92c79b598b55521235359a1d50b478306861b37a5a0ef0abc4d3160ef4c,2024-06-04T16:57:41.053000
-CVE-2024-48570,0,0,a07030a76cd88cf2d077be21611e593db567eb3ed2799d5f3776bbda7ecbaf36,2024-10-23T15:12:34.673000
-CVE-2024-48579,1,1,050bf08496731e9fa01ddddf10f6c383539d6e884fee1d3101c51c157c56909c,2024-10-25T16:15:09.940000
+CVE-2024-48570,0,1,7446ae4df00f32873e4ee72b4a315b4accd5c33a83ff9b6be395bc57cb3e12c5,2024-10-25T18:59:22.033000
+CVE-2024-48579,0,0,050bf08496731e9fa01ddddf10f6c383539d6e884fee1d3101c51c157c56909c,2024-10-25T16:15:09.940000
 CVE-2024-4858,0,0,3cb9bd8b6c75f95328665e9ee04ad5356aa75f69b8a71bb4682aa7bcb86b9454,2024-05-28T12:39:42.673000
-CVE-2024-48580,1,1,38c4000b35372237ef9186873e78fb7b43739235dd7422171df3719331b79af0,2024-10-25T16:15:09.993000
-CVE-2024-48581,1,1,7e02d80033b3f21fbfe923c81e59e73fdce925d6814b23c4e7dbaf3d3da8d2ec,2024-10-25T16:15:10.047000
+CVE-2024-48580,0,0,38c4000b35372237ef9186873e78fb7b43739235dd7422171df3719331b79af0,2024-10-25T16:15:09.993000
+CVE-2024-48581,0,0,7e02d80033b3f21fbfe923c81e59e73fdce925d6814b23c4e7dbaf3d3da8d2ec,2024-10-25T16:15:10.047000
 CVE-2024-4859,0,0,8383b8e86eb4a4e5b90aae7f1f2380c0c5e94dbe99d2c93d082bf89d93f61e82,2024-05-14T19:17:55.627000
 CVE-2024-48597,0,0,72aec40fe60a6c8353dc32b60169cb2bc295b2fc07fd4d45cd6ccc7e559fc86b,2024-10-23T15:12:34.673000
 CVE-2024-4860,0,0,51415b9207d508daf9b92cfd5981ba904e23fd57e3ad30c10a4a3319cff2429d,2024-05-14T19:17:55.627000
@@ -262765,9 +262772,9 @@ CVE-2024-48638,0,0,93a9606c88551eca2a43d58a9a18871f8de782bd448d66dc6474dd57c860a
 CVE-2024-48644,0,0,767bea0974441fd2cc19792b3d98e4d360220265a6636145290e8043d3dbc5a5,2024-10-23T19:35:12.593000
 CVE-2024-48645,0,0,68a6d6f0e4b4f7bc96fb65a4350b69a13ff6b55f133c0422ecbf10590166619b,2024-10-23T15:12:34.673000
 CVE-2024-4865,0,0,df8706c5d26e485ec9b623150b314bb58c6338346ba72ce79d78a6dbca58bc77,2024-05-20T13:00:34.807000
-CVE-2024-48652,0,1,de9357326c4ec67fec06a2f6916117e7d67385a63ec8c48f3929233398d3928a,2024-10-25T16:51:57.013000
-CVE-2024-48654,1,1,e34310090447184f0e074f6a144ad626d589255dd6d7d0c385a44ba8bdec3cb5,2024-10-25T17:15:04.763000
-CVE-2024-48655,1,1,01169986f94a33ed859c0940866e2417c4a2c0d0d0863258a06e31477c3e9a96,2024-10-25T17:15:04.817000
+CVE-2024-48652,0,0,de9357326c4ec67fec06a2f6916117e7d67385a63ec8c48f3929233398d3928a,2024-10-25T16:51:57.013000
+CVE-2024-48654,0,0,e34310090447184f0e074f6a144ad626d589255dd6d7d0c385a44ba8bdec3cb5,2024-10-25T17:15:04.763000
+CVE-2024-48655,0,0,01169986f94a33ed859c0940866e2417c4a2c0d0d0863258a06e31477c3e9a96,2024-10-25T17:15:04.817000
 CVE-2024-48656,0,0,7991ecc43dfce32475e8e1d32ee086228d1cf510284114bf3bd76e22363c0bc1,2024-10-24T14:37:36.353000
 CVE-2024-48657,0,0,92137caf7714ad77e1f5fbc8130edf53e1c7b0ac9e690fd892c8d5cb42ccb1b6,2024-10-24T14:38:41.620000
 CVE-2024-48659,0,0,74eba10fd7e373cc2157a8c68b69a750c73226aa0e75d8a35ccb512ee7fa62b0,2024-10-23T15:12:34.673000
@@ -262775,9 +262782,10 @@ CVE-2024-4866,0,0,1fd2c3b939730f1522c70c99454a98badb9f05648f1c0fa9438c4abc3e506e
 CVE-2024-4868,0,0,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a13,2024-07-09T18:19:14.047000
 CVE-2024-4869,0,0,c966893d60f3d2b834063ff6490a8006deca39b71769e89345f5be1133a2f10c,2024-06-26T12:44:29.693000
 CVE-2024-4870,0,0,34dc62fe0d9ee09fd087b0b9ccdcdae4c15125668207018dedb4b3cfd451baf0,2024-06-04T16:57:41.053000
-CVE-2024-48706,0,0,f713530be88e39bc26678bb907cef38003dcec08f4e06d8324296c8e4ff23ce3,2024-10-23T15:12:34.673000
-CVE-2024-48707,0,0,11d7dda87282e1f93592f9ed17a7b792c848338d8fc8576caa83ed8e9a59d7c5,2024-10-23T15:12:34.673000
-CVE-2024-48708,0,0,a3d087492c40739451e8f1e17f6bd6f3fe16ba5866242fef2c3de1daa457a1c3,2024-10-23T15:12:34.673000
+CVE-2024-48700,1,1,9be6619a603858f176cb422702afce112f0c83e8f944ab9cb6b18eb6af3ba813,2024-10-25T18:15:04.407000
+CVE-2024-48706,0,1,e747f2815f744d2574a2c914482979e92abcb175ce526e54d28ad054b049d395,2024-10-25T18:58:35.380000
+CVE-2024-48707,0,1,fd9b1d38f6684577739099dad2b9e541d52b6b52c575d76793119672c0ee0220,2024-10-25T19:11:54.310000
+CVE-2024-48708,0,1,117d10f4a9b96b209a6f5e6f3097728d8a65264e256ad998e6bda4d438b21882,2024-10-25T19:10:08.457000
 CVE-2024-48709,0,0,09a0506fcee26889d94982710596f7bcc50ff18fa38b0b5a0230c066edc673cb,2024-10-23T15:13:25.583000
 CVE-2024-4871,0,0,27d58887099f376e93909bb4c2214524b0789bbba79f05cabea36e120d5295ee,2024-08-12T16:15:17.313000
 CVE-2024-48710,0,0,2fbd0f8c58cb24ce52b0e5c8d654e92a74d3cd7c1aadc3c4c977083a33ba41b8,2024-10-16T17:35:03.423000
@@ -262787,7 +262795,7 @@ CVE-2024-48714,0,0,5966fa7e4cea1148b0617541f87717ad0f7359afa5da2d98079f2bad16d0d
 CVE-2024-4872,0,0,c60d4ff9e5499bf7427bb540017644c2677aac5e300662a3bf0eae497fb13b4d,2024-09-05T09:15:03.743000
 CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000
 CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000
-CVE-2024-48743,1,1,990afaada28bfd6eaecf6c0573daeeeeb4ff3c6941fad6d144122478a8f4e339,2024-10-25T17:15:04.873000
+CVE-2024-48743,0,0,990afaada28bfd6eaecf6c0573daeeeeb4ff3c6941fad6d144122478a8f4e339,2024-10-25T17:15:04.873000
 CVE-2024-48744,0,0,424c481c5fd1d12d1736019bf9f8804bc723e4ae30a5fde28dbb02cb380182de,2024-10-16T18:35:07.013000
 CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000
 CVE-2024-48758,0,0,a0017ffb6fab9626ea62b98de0c6903a7dbb8c74f73f1e588de68b4bc17a833d,2024-10-18T12:53:04.627000
@@ -262854,9 +262862,9 @@ CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752da
 CVE-2024-48920,0,0,a03bdbd7875951f84a0ddd56d8e819e54834e1b20b1220c7604c44f7db3ea361,2024-10-18T12:52:33.507000
 CVE-2024-48924,0,0,e474b369eaf4331d2ff3a579fbee4e63e8ec29b93749a9c533ecb0a1775a3de6,2024-10-18T12:52:33.507000
 CVE-2024-48925,0,0,c9fcd7e04639957ea66d2331abf3d50745ade802e21b5a3409a8d69b208718a8,2024-10-25T14:12:18.833000
-CVE-2024-48926,0,1,d45a9da5f6f1b245a6d729f168d41330fc51c968405a1c91c3b061c128e5b29d,2024-10-25T16:19:17.073000
-CVE-2024-48927,0,1,23a6232a362c7fb17e2b0c22da571a466ad2d8607917844c1edab564eae3beac,2024-10-25T16:15:13.327000
-CVE-2024-48929,0,1,9634f8a920413f581a19c3b63c79c0b9d222c6607f7ac0361bee3f54dbad7500,2024-10-25T16:12:15.897000
+CVE-2024-48926,0,0,d45a9da5f6f1b245a6d729f168d41330fc51c968405a1c91c3b061c128e5b29d,2024-10-25T16:19:17.073000
+CVE-2024-48927,0,0,23a6232a362c7fb17e2b0c22da571a466ad2d8607917844c1edab564eae3beac,2024-10-25T16:15:13.327000
+CVE-2024-48929,0,0,9634f8a920413f581a19c3b63c79c0b9d222c6607f7ac0361bee3f54dbad7500,2024-10-25T16:12:15.897000
 CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000
 CVE-2024-48930,0,0,c7b6cd0340da2631ccf07a7015b8cf581a1e5f29f6a6b1ff9f3168b16f8d9c48,2024-10-21T17:09:45.417000
 CVE-2024-48931,0,0,cb76da7947433082044eb8eab7c26fb2f1f77c9a2e73af320a6686276ae68e56,2024-10-25T12:56:07.750000
@@ -263316,12 +263324,12 @@ CVE-2024-49992,0,0,552b9e8ee31b9d2986b015547bb9a5ad1516a945b66e9c2d1491a0c82371c
 CVE-2024-49993,0,0,173745e8fc0b2f51f6583b765f43b75fc7379f37eeab514e19093d1e0bbc2187,2024-10-25T14:52:19.167000
 CVE-2024-49994,0,0,b259470c6938b01fe0b06a9ea53deb1f1b59fb7f77762cb60813754903d6329f,2024-10-25T14:52:32.877000
 CVE-2024-49995,0,0,b14274080bc6cde5e18285c4271101e0fd75dd4ad1b68ac92642bd34920a24f9,2024-10-23T15:13:25.583000
-CVE-2024-49996,0,0,09919f5bd92b6ffa4ceeb00f48af54ba697342e221271cbab43696a2c7a40ce0,2024-10-23T15:13:25.583000
+CVE-2024-49996,0,1,81c0545f780fa695d599970a227ba85a22409c164ec567cfb530b43ba7149524,2024-10-25T19:56:10.320000
 CVE-2024-49997,0,0,4f0d5cbc938668da4cca12e8619053d4fe51e93b90646e0ffb3c7559200d809e,2024-10-23T15:13:25.583000
 CVE-2024-49998,0,0,dc2b1c1752af1746445d713a06a03643e693f616cacbb49fca8b0a6d6c19fcfd,2024-10-23T15:13:25.583000
 CVE-2024-49999,0,0,78b6148f41a15652bfa26256a49a5e5917d5dbd35564ac4e51ba7d691f423879,2024-10-23T15:13:25.583000
 CVE-2024-5000,0,0,78aa4b3aa9bab8131501fa8740489ecb0fe42637a1055cb7cfa2d7935a7c9e42,2024-06-04T16:57:41.053000
-CVE-2024-50000,0,0,cec02897eadd69642a8478330d38fa15edaf3633d0d107bb46ad0cb4bf889d34,2024-10-23T15:13:25.583000
+CVE-2024-50000,0,1,40a554287361de92ee1140e71e9aeb78cfdfe71967eace32a2e7d700fc182c42,2024-10-25T19:55:55.357000
 CVE-2024-50001,0,0,886b8a582aeed728b3b4fd74e088fd22423f5fc4d8231c2d820afabe46d603d5,2024-10-23T15:13:25.583000
 CVE-2024-50002,0,0,7e826e0b3de3d65693e9dcc09edb35c05892be528b111a68d82dd8a04b1f2994,2024-10-23T15:13:25.583000
 CVE-2024-50003,0,0,318b4134c29bf882eea2c3b90b36a6f001c79495854be1fa1cd17567830c7826,2024-10-23T15:13:25.583000
@@ -263334,8 +263342,8 @@ CVE-2024-50009,0,0,b25c89b587ef8f767a118a888203f26c1813b03ccfac66d7b88c177a8b952
 CVE-2024-5001,0,0,d13fccabd833b06301db98a96a793d9305ac650b09885bcad3ab7a5e90e7be86,2024-07-23T20:32:50.207000
 CVE-2024-50010,0,0,719c9dfbef8438b722e214bb4144425701839515de68fd900ca2439cbf367998,2024-10-23T15:13:25.583000
 CVE-2024-50011,0,0,980130793609ba85d978ac3897743b36e06d03e5578449cd8463c6a50ef6140e,2024-10-23T15:13:25.583000
-CVE-2024-50012,0,0,6824ea7cd046916e5a46602bc6bf106039cd8c4524a0aa5c1d68ccb97cc90580,2024-10-23T15:13:25.583000
-CVE-2024-50013,0,0,e7dcb33b5a8b3baabdc44a24528c311c52a525f369b10c0876273d89b7dc19b8,2024-10-23T15:13:25.583000
+CVE-2024-50012,0,1,0b464fdf78181eaa99a743288b56773d15a2abd5d273a31aea10de63165e8299,2024-10-25T19:55:40.217000
+CVE-2024-50013,0,1,eefeead007890563f349e532e89dba096326c5095afb27c53d3f32df4440455c,2024-10-25T19:49:36.863000
 CVE-2024-50014,0,0,1b9d9129c629d7a256ee3df690e7fe663397d99e76b77d5144d84fc7840136c0,2024-10-23T15:13:25.583000
 CVE-2024-50015,0,0,6d4bf18cde3e91eef710a5b6ca23cc98ba4179d8758cab4bc07f83164bcd0fab,2024-10-23T15:13:25.583000
 CVE-2024-50016,0,0,150cc155a5101207172a6ab21de9b50c216ceecbad4a50f73bb2b1561ac16362,2024-10-23T15:13:25.583000
@@ -263531,7 +263539,7 @@ CVE-2024-5155,0,0,bda9a47dace36470fd3600985ed47f5579d8b3230222d03e314a73ac1655d7
 CVE-2024-5156,0,0,15fe916f4b576f7b7dc0d841e2e4a8f8e08add666a82cde7e5fe7e09d48d907a,2024-06-20T16:07:50.417000
 CVE-2024-5157,0,0,24d31b037c5fbef35f77d9be746cd537f78e6f1e98b9c21955d97a62fe59949f,2024-07-03T02:08:34.407000
 CVE-2024-5158,0,0,b58e7eaee1d1dd9c5e85390b8596c36aa736d240ceb0715ad1a8e256309daea1,2024-09-15T19:35:04.757000
-CVE-2024-5159,0,0,9a9b3de45c6c36099e2df42ed5c739b91b4960d213fd6f345b99527b20e821e8,2024-07-03T02:08:35.967000
+CVE-2024-5159,0,1,6487690749e64572084b0b1ffb84b7950e8b682c3129ca3d21d0dbc204e9ec91,2024-10-25T19:35:15.010000
 CVE-2024-5160,0,0,761bdadb9ac3f89d156978519ca326c5704c62592c7f03e703ecc7e802a865d7,2024-07-03T02:08:36.807000
 CVE-2024-5161,0,0,f120c7db938e25c7983d6c400da502880d5ffbc93ab4e5e05351c3fca8fbd038,2024-07-24T17:54:42.387000
 CVE-2024-5162,0,0,b916c521cfe3c1fb21956086b784f2a8541eeb514496e084206ecc726f921efe,2024-07-24T17:53:33.277000
@@ -264136,7 +264144,7 @@ CVE-2024-5832,0,0,fcc8d912e6c8c38175ccea7150b16b62e2ce7eae3dd1539b01b9bf831f40b8
 CVE-2024-5833,0,0,a74d6cce3a1790ef74d3836450506e9a7e306cd07532907e8300bc8d9a8bd7ba,2024-07-03T02:09:19.737000
 CVE-2024-5834,0,0,3eaebe678be109cf432cf27c742c2b9362970e430c21bfb473c7c2fbeada267f,2024-07-03T02:09:20.643000
 CVE-2024-5835,0,0,3e524b82e8ed0b84d2c482cdc0cfce05ebf5d76c695278d4bcb9110adcb244b7,2024-07-03T02:09:21.673000
-CVE-2024-5836,0,0,2f98f47f48e7e5263684bded9a2beb714e548c5c355a03358e37a18e2fe16ed7,2024-08-01T14:00:02.493000
+CVE-2024-5836,0,1,2445453ac51184d720119a34e3e0f2d4a922733fec600942629d4a7fb75a8f4b,2024-10-25T19:35:15.787000
 CVE-2024-5837,0,0,a3430952c8e48f90bf943b78b484234954723d493f275584419eeb04849b7796,2024-07-03T02:09:22.720000
 CVE-2024-5838,0,0,7c76efe71220708ee702a73816746926766b357630940d525e4a60a2a76d2e61,2024-07-03T02:09:23.820000
 CVE-2024-5839,0,0,9130876cb95f097dbdaed8649c52744f55bb9ad261dd630433bc625ccdf7d124,2024-07-03T02:09:24.927000
@@ -264806,7 +264814,7 @@ CVE-2024-6607,0,0,e0f051eabf509802774447af80a0c738a4502496130b70b32bcf3185bbfd56
 CVE-2024-6608,0,0,246c9ba89ed8e01f5cf842e2ef0777e6ce9e95831d341293bd5aa49bcd990f4d,2024-08-29T18:34:20.043000
 CVE-2024-6609,0,0,e0015ee4b4061bd74c9f14d02e039fc61e2646b8b8a922c9f2cb851cbba76ddf,2024-08-29T18:32:56.240000
 CVE-2024-6610,0,0,e7175b3f300966611850e9b1403e59c253bcbbb5dce9d539450c19b2bca9cfd3,2024-08-29T18:22:37.277000
-CVE-2024-6611,0,0,1cb6de18228bc7b87d48b8533959bdfa42c6b3371da5b304bf872662b7a458e0,2024-07-16T18:15:09.590000
+CVE-2024-6611,0,1,102d605bb189ea442954feec50cbc1b79d4cb5728b389bfc836cc71d32e19f50,2024-10-25T18:35:10.737000
 CVE-2024-6612,0,0,d34a2e10bc1c43655aa28f997fd8d7918b9d5919fcfded6bd9a7bc48a40520a0,2024-07-16T18:15:09.667000
 CVE-2024-6613,0,0,2c9248a7ca42e8738ab702e9dc188d19870d6e260e6ad7403e7b1f4010624eaa,2024-07-16T18:15:09.747000
 CVE-2024-6614,0,0,92c74753eb3da74f24a895083a8e9cff7c2fc2f9bf400831c94c14936544ed9b,2024-07-16T18:15:09.813000
@@ -265929,7 +265937,7 @@ CVE-2024-8030,0,0,b6f55198da4c8a890918e236b9cb91502d6b60f60aed340690526a7aff836e
 CVE-2024-8033,0,0,bc1d961345030012faa7942ae80f05081f947cf441680ad49c3fcb3512e2fcdc,2024-08-27T19:39:04.953000
 CVE-2024-8034,0,0,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a38,2024-08-22T17:35:30.003000
 CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000
-CVE-2024-8036,1,1,73a83d7777d531c09b678c37584a8f8f23997d17ca11c3ed80d660a03af8ff47,2024-10-25T17:15:04.963000
+CVE-2024-8036,0,0,73a83d7777d531c09b678c37584a8f8f23997d17ca11c3ed80d660a03af8ff47,2024-10-25T17:15:04.963000
 CVE-2024-8037,0,0,ad453071137fae9bcec080d9b16736ac997e7f592728683f801a0fad0292f9ca,2024-10-04T13:50:43.727000
 CVE-2024-8038,0,0,57ce29f0b3931b72a63ae8ef2369330769f4bf264a0163aeabfd65f65e14fa82,2024-10-04T13:50:43.727000
 CVE-2024-8039,0,0,75dd15cbf64fe4bb3f25b4e678f58a350c7ac0d4791106998aa5586c640f03c8,2024-09-17T02:35:59.503000
@@ -266263,7 +266271,7 @@ CVE-2024-8488,0,0,0a3c72da0e3d6042858531d99f20f7d46ebd7634c2988e0b42f58011241f99
 CVE-2024-8490,0,0,5ff62dababbd8edfb72d0a97e4807df424b78f87491e2373479d6c84fbd14d32,2024-09-27T18:36:00.053000
 CVE-2024-8497,0,0,903ccc83158de7417bc6f3ffdca83d1bf1fc40ad14228b01a3e1e063e242f9a9,2024-09-26T13:32:02.803000
 CVE-2024-8499,0,0,a066f12eb0db45b577c1044e88855b3e531b0d4e8e1575f5845b6487effebb39,2024-10-04T13:50:43.727000
-CVE-2024-8500,0,1,4a6f945879b83f03905c3f0642d30c4c3935515f8d05579f7adc4234c4210fca,2024-10-25T16:43:24.040000
+CVE-2024-8500,0,0,4a6f945879b83f03905c3f0642d30c4c3935515f8d05579f7adc4234c4210fca,2024-10-25T16:43:24.040000
 CVE-2024-8503,0,0,9f803200a857fcdb413b5557fdfb30066c33963fff9f6132df8887c5f7ded0b9,2024-09-11T16:26:11.920000
 CVE-2024-8504,0,0,8357da8291f04353fac31874868f2eb40b31e26be1555ef771437bf9554e80e3,2024-09-12T14:35:23.173000
 CVE-2024-8505,0,0,1c04e90354babae2df3035dc354852183330b8445c04d1f2331a89a32b3e4a48,2024-10-07T19:26:53
@@ -266868,7 +266876,7 @@ CVE-2024-9520,0,0,043b00f2bf4932488b29ee05bd55762d90704159cb97bf4c710160da6d1296
 CVE-2024-9521,0,0,09a594ea849fc5009e458f6cc46742d3176f440810ef4457104bfe2103f1d0c7,2024-10-16T16:38:14.557000
 CVE-2024-9522,0,0,884c9004d667a145fae3b3526c4cb56c9d9a1365bd2a57b2af580c0e3b9c19a1,2024-10-15T14:27:41.553000
 CVE-2024-9528,0,0,ad76266403ba94311c1f58d7258b765d914c39ddcd1148706c2e05f82ca92e87,2024-10-07T17:48:28.117000
-CVE-2024-9530,0,0,c8501e0bb039e166d52c4ac8c3106fb221a4406a702b0c3915afb70bff44dc96,2024-10-23T15:12:34.673000
+CVE-2024-9530,0,1,a4f4ec0ca4c538513c522bc25437bdee95aa200ea2c8ddaeaa2d301c3f668205,2024-10-25T18:52:10.810000
 CVE-2024-9531,0,0,2d32cff16aa07ef9767a12c3b335b7a483cb4a13b1ba87080414d4508df82841,2024-10-25T12:56:07.750000
 CVE-2024-9532,0,0,b7f2aba05edad35ecf41f43ec9640effe332d3189a3ed38d97f2bf49866ac50d,2024-10-09T11:18:49.027000
 CVE-2024-9533,0,0,483ea201fb3f13623de51b6a803ec3c9d4b4a9f8d222ab5b1546c8a9a88ca771,2024-10-09T11:18:34.560000
@@ -266913,7 +266921,9 @@ CVE-2024-9575,0,0,902a179ba291c73f1ff19f974c0569ed05c8dbb3d8914c4f7409455feb2bd5
 CVE-2024-9576,0,0,7a96a155cd09492144b259aa00c523497a7aeb66fdb84ed492d68f7654aa3880,2024-10-07T17:47:48.410000
 CVE-2024-9581,0,0,fb1d34fab9f94525003a0f26c830b830dcb7b4bdc92dd8a95590c26db891e7c3,2024-10-15T14:28:35.283000
 CVE-2024-9582,0,0,6ec198135418f168eaebdeafd2e2fe73c3f44201fb3d949937a7b4e70c974bf6,2024-10-16T16:38:14.557000
-CVE-2024-9583,0,1,04369671dcdc0ba41b402439013a80918f2a6c5ddfb5fc47088dd1f892929f97,2024-10-25T16:28:17.497000
+CVE-2024-9583,0,0,04369671dcdc0ba41b402439013a80918f2a6c5ddfb5fc47088dd1f892929f97,2024-10-25T16:28:17.497000
+CVE-2024-9584,1,1,a992d61a5cdd03ad2d3b77cb6df10059852a63ac606a482384dba94358966cf7,2024-10-25T18:15:04.673000
+CVE-2024-9585,1,1,9855271ce8249d7c27d8b4a0f9f33c61ad619d88deb5f63a9da742af390b07ae,2024-10-25T18:15:04.907000
 CVE-2024-9586,0,0,a482a25f032ea940edbd74f8dc11272d0d4fecf517c5613466c04b8bd798dc3e,2024-10-15T12:58:51.050000
 CVE-2024-9587,0,0,081ae6ebdba381265a40b327141c3458d6ec1c5b94d7fb86236bf633a93923d3,2024-10-15T12:58:51.050000
 CVE-2024-9588,0,0,65aff2b1cd3b1280d8083f78d790697b85257a07a6c6e6516ccebd73625a92dc,2024-10-23T15:12:34.673000
@@ -266937,7 +266947,7 @@ CVE-2024-9621,0,0,9e376b0f3dfa34027ae088e771a22694180917eee238e690ac2f4896caf46a
 CVE-2024-9622,0,0,616f2c897f0ea8915fa743288697302d927eccd4a4b981ffaaf2224bd032869d,2024-10-10T12:56:30.817000
 CVE-2024-9623,0,0,86dd85464498f6d194e548538328537f5fc627208085718de66c1a06e69de686,2024-10-16T16:59:36.817000
 CVE-2024-9627,0,0,ab5726be759a332c53fc28be3ad1e688481f8077248af16a587354d8ff7a5b98,2024-10-23T15:12:34.673000
-CVE-2024-9628,0,1,61a27472b9da741357728e2747c61581a42641370f854cfe14defa2dd6861d0b,2024-10-25T16:15:10.160000
+CVE-2024-9628,0,0,61a27472b9da741357728e2747c61581a42641370f854cfe14defa2dd6861d0b,2024-10-25T16:15:10.160000
 CVE-2024-9630,0,0,95cf42fc9d833aab63558caaeb38c94fd9570f2d1a1e45300ec7feb07db9cd04,2024-10-25T12:56:07.750000
 CVE-2024-9634,0,0,d64c376a2cd176bba19f7a8121026bf8ac88c7cb95243ab4e56bfc5d5fa1c1d3,2024-10-16T16:38:14.557000
 CVE-2024-9647,0,0,6da0b5c2c888d90e6f29cb1f98cdc0c7a4315eaaa058e1c781c3c46d5b8615f9,2024-10-16T16:38:14.557000
@@ -267004,7 +267014,7 @@ CVE-2024-9821,0,0,847982287e8db8d54661c5522d18fa833c3d9091b2ddb2afe78ab1e8077a47
 CVE-2024-9822,0,0,3245ced109c1c371c55834b9b14d881a9e8b7fd7c32c19b6e9a742506d7d4c79,2024-10-15T12:58:51.050000
 CVE-2024-9823,0,0,918595934cb9b43f50abc93ebc9bbb9148088fae18c39570ebc344ac634d3e40,2024-10-15T12:57:46.880000
 CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca424894a,2024-10-15T12:57:46.880000
-CVE-2024-9829,0,1,ea980a1e481fc86407edeb6f0040d6f4a6ff2d17edcbe8d18dd95381292ad49b,2024-10-25T16:30:44.520000
+CVE-2024-9829,0,0,ea980a1e481fc86407edeb6f0040d6f4a6ff2d17edcbe8d18dd95381292ad49b,2024-10-25T16:30:44.520000
 CVE-2024-9837,0,0,bb6af129df538114e71c369a037f26903d10504dcd81ada4fc7f4b05786c12dd,2024-10-15T12:57:46.880000
 CVE-2024-9848,0,0,b402d34d635014e43cf3d9b875728458bb9e45308a715285ac01e2036b42d252,2024-10-22T16:42:25.867000
 CVE-2024-9855,0,0,f4067d5f9739a4a46f27ed071acd023bca1d9a27db9968d98f329af2e8d70e8b,2024-10-15T12:58:51.050000
@@ -267050,13 +267060,13 @@ CVE-2024-9922,0,0,5b3f4f94b058e10394fda050af76e1c62dd106f0eebadd14ac4c752deaa614
 CVE-2024-9923,0,0,e0957ae0002d68f1b955241f204c0150727bb34721e8b9ed064776340efa0183,2024-10-24T13:24:23.430000
 CVE-2024-9924,0,0,4d0aa49bc1047e2e0a23ab80e176dbdf70a0af5e82bea53f63a116cd5905286e,2024-10-15T12:57:46.880000
 CVE-2024-9925,0,0,d9114846b6ab22497d9820c775f40ff778b3a4311afada5c7a947fe6aafbbadc,2024-10-17T18:09:40.537000
-CVE-2024-9927,0,1,247470617823bbc670f145b2243babfdfbfd8541e02092a27795136533b63780,2024-10-25T16:29:27.300000
+CVE-2024-9927,0,0,247470617823bbc670f145b2243babfdfbfd8541e02092a27795136533b63780,2024-10-25T16:29:27.300000
 CVE-2024-9936,0,0,9b9410743fe1ca2f5a844c24ad20043ec989ced54414fa626e93bdc74b6425ff,2024-10-15T12:57:46.880000
 CVE-2024-9937,0,0,4e7ae54d6a9c5099857ac0a66ba44c96220fc2ab3e1844c918c371d4dbb6d38d,2024-10-16T16:38:14.557000
 CVE-2024-9940,0,0,0591f213f2bec6924fef18017d23419024c9c5bdc4c598c1e0fd80a492ebb13b,2024-10-18T12:53:04.627000
 CVE-2024-9943,0,0,2b1bd0bf17ad8265b1c648445115c5e7c1a49eb398158e5a8ef4b45ea9c6d38b,2024-10-25T12:56:07.750000
 CVE-2024-9944,0,0,0b8e9f26d6b78f71e8a64eb7650f72f57e1c6a31a17ce0fafe5b6b8377b71371,2024-10-17T20:47:35.817000
-CVE-2024-9947,0,1,88ec45aa6bd99a52db1c3f2ce1757c1650b55146fad6304733cc20a8df4a46b2,2024-10-25T16:53:12.867000
+CVE-2024-9947,0,0,88ec45aa6bd99a52db1c3f2ce1757c1650b55146fad6304733cc20a8df4a46b2,2024-10-25T16:53:12.867000
 CVE-2024-9949,0,0,7baff7b9a9118e82abe3afe4a5ae476b8e56ff4f2cbd456d4ba563053750f9b6,2024-10-25T12:56:07.750000
 CVE-2024-9951,0,0,5d941c75af8c4072e469beaa1d6ae2855b0ca23ecdce87314ecd326f6a54014a,2024-10-18T12:52:33.507000
 CVE-2024-9952,0,0,d5c643eb1b76a39b13753ce231704557bf9fa9c82efce6d96f1e313e65eab479,2024-10-16T15:05:13.467000
@@ -267092,5 +267102,5 @@ CVE-2024-9983,0,0,05b40e9cfe77e2a0c57e66e13edd76f3cb7232b22c3913645dde67dce84859
 CVE-2024-9984,0,0,8e8b1dff68b77e14ce417f91873fee227d0458654a790688014355062c7539a9,2024-10-16T22:03:23.407000
 CVE-2024-9985,0,0,35f031595deb3bfd21882874fada51cff590c3c6a37f03f4259fa4136f5b9157,2024-10-16T22:02:08.117000
 CVE-2024-9986,0,0,f83b3609bd670a0cfc3a1c687a45465cc896c6d69e9f1c37efb33a43ca882e79,2024-10-21T13:07:47.700000
-CVE-2024-9987,0,0,2fc9d3fa3d6f4a94d8c02299e2f4be1487dde9c0790750bfc65dc5695ac94c18,2024-10-23T15:12:34.673000
+CVE-2024-9987,0,1,b4e78fb8d0c1bab610593085dcb79fb387a1d85dc24b4ac387edaf5184ee7742,2024-10-25T19:06:35.350000
 CVE-2024-9991,0,0,135856d748c7daa954bd600476aafa57f64f806d190f4c4bca162ba71620ec7a,2024-10-25T13:15:18.250000