diff --git a/CVE-2020/CVE-2020-256xx/CVE-2020-25659.json b/CVE-2020/CVE-2020-256xx/CVE-2020-25659.json index bffd6bc45a3..25bae8e9400 100644 --- a/CVE-2020/CVE-2020-256xx/CVE-2020-25659.json +++ b/CVE-2020/CVE-2020-256xx/CVE-2020-25659.json @@ -2,8 +2,8 @@ "id": "CVE-2020-25659", "sourceIdentifier": "secalert@redhat.com", "published": "2021-01-11T16:15:15.040", - "lastModified": "2023-02-09T02:25:50.887", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:10:54.837", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -95,8 +95,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:python-cryptography_project:python-cryptography:3.2:*:*:*:*:*:*:*", - "matchCriteriaId": "3140ADD7-95CF-4087-8E09-BF6EC4836E7C" + "criteria": "cpe:2.3:a:cryptography.io:cryptography:3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "4A8D52B0-326F-479B-A3F2-6BA7333256FD" } ] } diff --git a/CVE-2020/CVE-2020-362xx/CVE-2020-36242.json b/CVE-2020/CVE-2020-362xx/CVE-2020-36242.json index 4addc960b8b..1dd2fc7e953 100644 --- a/CVE-2020/CVE-2020-362xx/CVE-2020-36242.json +++ b/CVE-2020/CVE-2020-362xx/CVE-2020-36242.json @@ -2,7 +2,7 @@ "id": "CVE-2020-36242", "sourceIdentifier": "cve@mitre.org", "published": "2021-02-07T20:15:12.090", - "lastModified": "2023-11-07T03:22:08.227", + "lastModified": "2024-09-05T16:09:10.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -89,9 +89,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:cryptography_project:cryptography:*:*:*:*:*:python:*:*", + "criteria": "cpe:2.3:a:cryptography.io:cryptography:*:*:*:*:*:python:*:*", "versionEndExcluding": "3.3.2", - "matchCriteriaId": "C0951FE7-BCCA-4ACB-B773-B6EF1C17AF5B" + "matchCriteriaId": "CA823DED-BFFE-4DBC-878D-5316EE987208" } ] } diff --git a/CVE-2022/CVE-2022-458xx/CVE-2022-45805.json b/CVE-2022/CVE-2022-458xx/CVE-2022-45805.json index 0d254ca8d46..96f916f769c 100644 --- a/CVE-2022/CVE-2022-458xx/CVE-2022-45805.json +++ b/CVE-2022/CVE-2022-458xx/CVE-2022-45805.json @@ -2,8 +2,8 @@ "id": "CVE-2022-45805", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-03T13:15:08.227", - "lastModified": "2023-11-09T19:17:27.470", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:01.640", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-475xx/CVE-2022-47588.json b/CVE-2022/CVE-2022-475xx/CVE-2022-47588.json index f52ce3213c1..3734348b2b3 100644 --- a/CVE-2022/CVE-2022-475xx/CVE-2022-47588.json +++ b/CVE-2022/CVE-2022-475xx/CVE-2022-47588.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47588", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-03T12:15:08.490", - "lastModified": "2023-11-13T18:29:39.327", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:02.347", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-488xx/CVE-2022-48877.json b/CVE-2022/CVE-2022-488xx/CVE-2022-48877.json index adffcd9aab3..e93578c02a0 100644 --- a/CVE-2022/CVE-2022-488xx/CVE-2022-48877.json +++ b/CVE-2022/CVE-2022-488xx/CVE-2022-48877.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48877", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:04.563", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:47:28.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,144 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: evitemos el p\u00e1nico si no se crea extend_tree. Este parche evita el siguiente p\u00e1nico. pc: __lookup_extent_tree+0xd8/0x760 lr: f2fs_do_write_data_page+0x104/0x87c sp: ffffffc010cbb3c0 x29: ffffffc010cbb3e0 x28: 0000000000000000 x27: ffffff8803e7f020 : ffffff8803e7ed40 x25: ffffff8803e7f020 x24: ffffffc010cbb460 x23: ffffffc010cbb480 x22: 0000000000000000 x21: 0000000000000000 x20: ffffffff22e9090 0x19: 0000000000000000 x18: ffffffc010c5d080 x17: 0000000000000000 x16: 0000000000000020 x15: ffffffdb1acdbb88 x14: ffffff888759e2b0 x13: 0000000000000000 x12: 02da49000 x11: 000000000a001200 x10: ffffff8803e7ed40 x9: ffffff8023195800 x8: ffffff802da49078 x7: 0000000000000001 x6: 0000000000000000 x5 000000000000006 x4: ffffffc010cbba28 x3: 0000000000000000 x2: ffffffc010cbb480 x1: 0000000000000000 x0: ffffff8803e7ed40 Rastreo de llamadas: __lookup_extent_tree+0xd8/0x760 f2fs_do_write_data_page+0x104/0x87c f2fs_write_single_data_page+0x420/0xb60 f 2fs_write_cache_pages+0x418/0xb1c __f2fs_write_data_pages+0x428/0x58c f2fs_write_data_pages+0x30/0x40 do_writepages+0x88/0x190 __writeback_single_inode+0x48/0x448 writeback_sb_inodes+0x468/0x9e8 __writeback_inodes_wb+0xb8/0x2a4 wb_writeback+0x33c/0x740 wb_do_writeback+0x2b4/0x400 wb_workfn+0xe4/0x34c Process_one_work+0x24c/0x5bc trabajador_thread+0x3e8/0xa 50 khilo+0x150/0x1b4" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.14.304", + "matchCriteriaId": "E8A9B982-D3D6-49CA-BF0A-196ED7947B3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.271", + "matchCriteriaId": "D86DA289-B5BC-4629-BD56-AB453D481393" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.230", + "matchCriteriaId": "9DB7398D-9781-49C5-B2AE-1969B694B614" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.165", + "matchCriteriaId": "C6002D5B-9B6A-4788-B943-E3EE01E01303" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.90", + "matchCriteriaId": "E995CDA5-7223-4FDB-BAD3-81B22C763A43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.8", + "matchCriteriaId": "A6AFE6C9-3F59-4711-B2CF-7D6682FF6BD0" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1c38cdc747f00daf7394535eae5afc4c503c59bb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2c129e868992621a739bdd57a5bffa3985ef1b91", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/557e85ff9afef6d45020b6f09357111d38033c31", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/72009139a661ade5cb1da4239734ed02fa1cfff0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dd83a9763e29ed7a21c8a43f7a62cd0a6bf74692", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/df9d44b645b83fffccfb4e28c1f93376585fdec8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ff85a1dbd90d29f73033177ff8d8de4a27d9721c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20702.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20702.json index ade2d89f27b..22d9e4b2c89 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20702.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20702.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20702", "sourceIdentifier": "security@mediatek.com", "published": "2023-11-06T04:15:07.653", - "lastModified": "2023-11-13T18:48:09.407", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:02.980", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-239xx/CVE-2023-23931.json b/CVE-2023/CVE-2023-239xx/CVE-2023-23931.json index b1af16e0644..2cb846fb020 100644 --- a/CVE-2023/CVE-2023-239xx/CVE-2023-23931.json +++ b/CVE-2023/CVE-2023-239xx/CVE-2023-23931.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23931", "sourceIdentifier": "security-advisories@github.com", "published": "2023-02-07T21:15:09.850", - "lastModified": "2023-02-16T16:57:18.890", + "lastModified": "2024-09-05T16:09:10.430", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -76,10 +76,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:cryptography_project:cryptography:*:*:*:*:*:python:*:*", + "criteria": "cpe:2.3:a:cryptography.io:cryptography:*:*:*:*:*:python:*:*", "versionStartIncluding": "1.8", "versionEndExcluding": "39.0.1", - "matchCriteriaId": "35C254EF-097A-4C4B-A36F-C512D1565900" + "matchCriteriaId": "D620CB15-986D-4955-BCE9-5CC459F01289" } ] } diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28748.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28748.json index c644280bf4c..2e36c51e4fe 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28748.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28748.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28748", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-06T09:15:07.790", - "lastModified": "2023-11-10T04:19:54.407", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:04.003", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-328xx/CVE-2023-32818.json b/CVE-2023/CVE-2023-328xx/CVE-2023-32818.json index 0430a062f9c..3bdc84c4459 100644 --- a/CVE-2023/CVE-2023-328xx/CVE-2023-32818.json +++ b/CVE-2023/CVE-2023-328xx/CVE-2023-32818.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32818", "sourceIdentifier": "security@mediatek.com", "published": "2023-11-06T04:15:07.713", - "lastModified": "2023-11-13T18:52:16.527", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:04.620", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-328xx/CVE-2023-32838.json b/CVE-2023/CVE-2023-328xx/CVE-2023-32838.json index bf921ffd3f2..8e2697ae168 100644 --- a/CVE-2023/CVE-2023-328xx/CVE-2023-32838.json +++ b/CVE-2023/CVE-2023-328xx/CVE-2023-32838.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32838", "sourceIdentifier": "security@mediatek.com", "published": "2023-11-06T04:15:08.013", - "lastModified": "2023-11-08T23:50:22.660", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:06.560", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34383.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34383.json index 9ae4f129b7a..b116858fc46 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34383.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34383.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34383", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-03T12:15:08.583", - "lastModified": "2023-11-13T18:29:48.217", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:07.860", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38325.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38325.json index 149ace371e5..01391d5942e 100644 --- a/CVE-2023/CVE-2023-383xx/CVE-2023-38325.json +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38325.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38325", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-14T20:15:09.157", - "lastModified": "2023-11-07T04:17:14.413", + "lastModified": "2024-09-05T16:09:10.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -56,10 +56,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:cryptography_project:cryptography:*:*:*:*:*:python:*:*", + "criteria": "cpe:2.3:a:cryptography.io:cryptography:*:*:*:*:*:python:*:*", "versionStartIncluding": "40.0.0", "versionEndExcluding": "41.0.2", - "matchCriteriaId": "48A5429D-9342-49D8-B431-85389BF965B3" + "matchCriteriaId": "25486FE9-75C9-4B7A-844F-B627F115137D" } ] } diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39042.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39042.json index 6a165a43c73..741b5096c91 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39042.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39042.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39042", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-02T22:15:08.700", - "lastModified": "2023-11-10T04:10:50.210", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:08.263", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39047.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39047.json index 77ccd0fb78d..1b8a6229ad0 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39047.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39047.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39047", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-02T22:15:08.750", - "lastModified": "2023-11-10T04:10:59.547", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:09.043", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39048.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39048.json index e0f9185cb2d..544a9c63173 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39048.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39048.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39048", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-02T22:15:08.797", - "lastModified": "2023-11-10T04:11:07.203", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:09.877", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39050.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39050.json index e222b7e85ba..419e583ac2d 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39050.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39050.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39050", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-02T22:15:08.840", - "lastModified": "2023-11-10T04:11:23.803", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:10.590", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39051.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39051.json index 542aa11c327..1bcf687eaa8 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39051.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39051.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39051", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-02T22:15:08.887", - "lastModified": "2023-11-10T04:11:41.413", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:11.323", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39053.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39053.json index eb7482bba2b..aac05d7563d 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39053.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39053.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39053", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-02T22:15:08.933", - "lastModified": "2023-11-10T04:11:48.573", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:12.070", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39054.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39054.json index 11aeb5e6841..55a825f7087 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39054.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39054.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39054", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-02T22:15:08.980", - "lastModified": "2023-11-10T04:11:57.213", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:12.807", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39057.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39057.json index 61ca9883de0..01923501625 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39057.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39057.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39057", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-02T22:15:09.023", - "lastModified": "2023-11-10T04:12:05.497", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:13.513", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-416xx/CVE-2023-41652.json b/CVE-2023/CVE-2023-416xx/CVE-2023-41652.json index ad03a2d22d0..d5b2b7eeee8 100644 --- a/CVE-2023/CVE-2023-416xx/CVE-2023-41652.json +++ b/CVE-2023/CVE-2023-416xx/CVE-2023-41652.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41652", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-03T12:15:08.737", - "lastModified": "2023-11-13T18:31:03.343", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:14.493", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-416xx/CVE-2023-41685.json b/CVE-2023/CVE-2023-416xx/CVE-2023-41685.json index 82ad82f8a30..43ba9f3f504 100644 --- a/CVE-2023/CVE-2023-416xx/CVE-2023-41685.json +++ b/CVE-2023/CVE-2023-416xx/CVE-2023-41685.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41685", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-06T09:15:08.367", - "lastModified": "2023-11-10T04:18:08.210", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:14.713", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42655.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42655.json index 0b43cc1c913..6592819f783 100644 --- a/CVE-2023/CVE-2023-426xx/CVE-2023-42655.json +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42655.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42655", "sourceIdentifier": "security@unisoc.com", "published": "2023-11-01T10:15:10.657", - "lastModified": "2023-11-08T23:16:27.247", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:15.060", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45001.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45001.json index 2cfe78b7746..f14dda0114b 100644 --- a/CVE-2023/CVE-2023-450xx/CVE-2023-45001.json +++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45001.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45001", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-06T09:15:08.427", - "lastModified": "2023-11-10T04:18:01.923", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:16.000", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45046.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45046.json index 13db9b1ec47..9809733dffa 100644 --- a/CVE-2023/CVE-2023-450xx/CVE-2023-45046.json +++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45046.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45046", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-06T09:15:08.493", - "lastModified": "2023-11-10T04:17:55.987", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:16.210", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45055.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45055.json index a2e8cc8d214..fd36cc5407b 100644 --- a/CVE-2023/CVE-2023-450xx/CVE-2023-45055.json +++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45055.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45055", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-06T09:15:08.553", - "lastModified": "2023-11-10T04:17:47.710", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:16.437", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45657.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45657.json index 1a5ec958b67..449ab0f4879 100644 --- a/CVE-2023/CVE-2023-456xx/CVE-2023-45657.json +++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45657.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45657", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-06T09:15:08.730", - "lastModified": "2023-11-14T15:28:24.893", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:16.643", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46084.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46084.json index 34ae0849ce3..c78d2b7ee08 100644 --- a/CVE-2023/CVE-2023-460xx/CVE-2023-46084.json +++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46084.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46084", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-06T10:15:07.917", - "lastModified": "2023-11-14T15:28:12.030", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:17.453", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46775.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46775.json index 10801eef16e..f19bf5dc743 100644 --- a/CVE-2023/CVE-2023-467xx/CVE-2023-46775.json +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46775.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46775", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-06T11:15:09.347", - "lastModified": "2023-11-14T17:04:19.490", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:17.790", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46776.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46776.json index 5a2313518c8..8e4c71fa851 100644 --- a/CVE-2023/CVE-2023-467xx/CVE-2023-46776.json +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46776.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46776", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-06T12:15:08.380", - "lastModified": "2023-11-14T16:23:57.467", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:18.017", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46777.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46777.json index 67c986c6afa..04e4e38ae9d 100644 --- a/CVE-2023/CVE-2023-467xx/CVE-2023-46777.json +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46777.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46777", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-06T12:15:08.450", - "lastModified": "2023-11-15T20:21:23.860", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:18.237", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46778.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46778.json index 0f690dc79ff..c1029fb714f 100644 --- a/CVE-2023/CVE-2023-467xx/CVE-2023-46778.json +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46778.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46778", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-06T12:15:08.513", - "lastModified": "2024-09-05T15:35:17.763", + "lastModified": "2024-09-05T16:35:18.537", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,16 +69,6 @@ "value": "CWE-352" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-352" - } - ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46821.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46821.json index 9d424a8de51..ce19a8e79bd 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46821.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46821.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46821", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-06T10:15:08.130", - "lastModified": "2023-11-14T17:06:01.507", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:18.747", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47182.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47182.json index e6b5ab979c7..96c87f80b7b 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47182.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47182.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47182", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-06T10:15:08.470", - "lastModified": "2023-11-14T17:04:32.890", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:35:18.960", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-490xx/CVE-2023-49083.json b/CVE-2023/CVE-2023-490xx/CVE-2023-49083.json index 37e49077612..6bdca7c62ec 100644 --- a/CVE-2023/CVE-2023-490xx/CVE-2023-49083.json +++ b/CVE-2023/CVE-2023-490xx/CVE-2023-49083.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49083", "sourceIdentifier": "security-advisories@github.com", "published": "2023-11-29T19:15:07.967", - "lastModified": "2024-02-17T02:15:45.350", + "lastModified": "2024-09-05T16:09:10.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -80,10 +80,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:cryptography_project:cryptography:*:*:*:*:*:python:*:*", + "criteria": "cpe:2.3:a:cryptography.io:cryptography:*:*:*:*:*:python:*:*", "versionStartIncluding": "3.1", "versionEndExcluding": "41.0.6", - "matchCriteriaId": "D82EE66F-7D6B-4710-8F2B-08F1819F6860" + "matchCriteriaId": "EB8793E0-61EC-45EC-8818-44A40DB08658" } ] } diff --git a/CVE-2023/CVE-2023-507xx/CVE-2023-50782.json b/CVE-2023/CVE-2023-507xx/CVE-2023-50782.json index 07995caeb00..dc75cb5823f 100644 --- a/CVE-2023/CVE-2023-507xx/CVE-2023-50782.json +++ b/CVE-2023/CVE-2023-507xx/CVE-2023-50782.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50782", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-05T21:15:11.183", - "lastModified": "2024-07-26T22:15:03.550", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-05T16:43:20.083", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -140,9 +140,29 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:python-cryptography_project:python-cryptography:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:cryptography.io:cryptography:*:*:*:*:*:python:*:*", "versionEndExcluding": "42.0.0", - "matchCriteriaId": "3840C0A9-EF24-48AF-B0EE-93E452931D60" + "matchCriteriaId": "A7B7EA1D-8C2A-4C40-B9FC-E83F4E87C62B" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:couchbase:couchbase_server:7.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DE39595E-F4B2-4CEC-A405-809B75E71E36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:couchbase:couchbase_server:7.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "B84B0C96-07C4-44ED-A291-94CEAAF6FFB6" } ] } @@ -167,7 +187,10 @@ }, { "url": "https://www.couchbase.com/alerts/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51712.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51712.json new file mode 100644 index 00000000000..6b799a77c6a --- /dev/null +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51712.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51712", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-05T16:15:06.970", + "lastModified": "2024-09-05T17:44:56.007", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Trusted Firmware-M through 2.0.0. The lack of argument verification in the logging subsystem allows attackers to read sensitive data via the login function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.trustedfirmware.org/TF-M/trusted-firmware-m.git/", + "source": "cve@mitre.org" + }, + { + "url": "https://trustedfirmware-m.readthedocs.io/en/latest/security/security_advisories/debug_log_vulnerability.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1151.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1151.json index 6cda06e3e31..bf89c3c476b 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1151.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1151.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1151", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-11T15:15:07.890", - "lastModified": "2024-09-05T14:17:17.603", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-05T16:15:07.097", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -189,27 +189,6 @@ "Third Party Advisory" ] }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3LZROQAX7Q7LEP4F7WQ3KUZKWCZGFFP2/", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GS7S3XLTLOUKBXV67LLFZWB3YVFJZHRK/", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, { "url": "https://lore.kernel.org/all/20240207132416.1488485-1-aconole@redhat.com/", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22441.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22441.json index 6bef4a4f4e4..20e576648c7 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22441.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22441.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22441", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-06-13T16:15:10.493", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-05T17:42:43.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,75 @@ "value": "El servicio de lanzamiento de aplicaciones paralelas (PALS) de HPE Cray est\u00e1 sujeto a una omisi\u00f3n de autenticaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hpe:cray_parallel_application_launch_service:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "1.2.14", + "matchCriteriaId": "50B4198C-41E6-49BC-8664-AF841D38FC3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hpe:cray_parallel_application_launch_service:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.3.0", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "91E967BC-8477-43A4-83F3-428AC266AC36" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbcr04653en_us&docLocale=en_US", - "source": "security-alert@hpe.com" + "source": "security-alert@hpe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22442.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22442.json index 2a88a6ea929..6bd32852315 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22442.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22442.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22442", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-07-16T16:15:04.017", - "lastModified": "2024-08-01T13:46:56.070", + "lastModified": "2024-09-05T17:12:12.433", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-alert@hpe.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hpe:3par_service_provider:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.1.2", + "matchCriteriaId": "939B605C-A7C5-4AF1-9A66-7536C6100BB2" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04663en_us&docLocale=en_US", - "source": "security-alert@hpe.com" + "source": "security-alert@hpe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24507.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24507.json index 81cbcc56407..4ffb879b2f3 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24507.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24507.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24507", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-22T22:15:02.200", - "lastModified": "2024-07-24T12:55:13.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T16:59:07.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,67 @@ "value": " La vulnerabilidad de Cross Site Scripting en Act-On 2023 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro newUser en el componente login.jsp." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:act-on:act-on:2023:*:*:*:*:*:*:*", + "matchCriteriaId": "814C9DE3-806A-4A7F-BA70-D07E48D17B57" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Xandsz/2b409acb81e846fc3478600f984785a1", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24759.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24759.json new file mode 100644 index 00000000000..a77ed00cdf2 --- /dev/null +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24759.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-24759", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-09-05T17:15:12.380", + "lastModified": "2024-09-05T17:44:56.007", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 23.12.4.2, a threat actor can bypass the server-side request forgery protection on the whole website with DNS Rebinding. The vulnerability can also lead to denial of service. Version 23.12.4.2 contains a patch." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/mindsdb/mindsdb/commit/5f7496481bd3db1d06a2d2e62c0dce960a1fe12b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/mindsdb/mindsdb/security/advisories/GHSA-4jcv-vp96-94xr", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28087.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28087.json index 99ab886b7c7..b06ea4dd715 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28087.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28087.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28087", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-15T17:15:10.643", - "lastModified": "2024-08-20T14:35:07.653", + "lastModified": "2024-09-05T16:15:07.437", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://documentation.bonitasoft.com/bonita/2024.1/release-notes#_fixes_in_bonita_2024_1_u0_2024_04_11", + "source": "cve@mitre.org" + }, { "url": "https://documentation.bonitasoft.com/bonita/latest/release-notes#_fixes_in_bonita_2024_1_2024_04_11", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33664.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33664.json index 682bc2f872d..15cf87418d8 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33664.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33664.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33664", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T00:15:09.060", - "lastModified": "2024-08-07T14:35:02.110", + "lastModified": "2024-09-05T16:15:07.570", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,6 +59,10 @@ { "url": "https://github.com/mpdavis/python-jose/pull/345", "source": "cve@mitre.org" + }, + { + "url": "https://www.vicarius.io/vsociety/posts/jwt-bomb-in-python-jose-cve-2024-33664", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34650.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34650.json index b1a347e3f63..851825d9e7a 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34650.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34650.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34650", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-09-04T06:15:14.583", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:59:36.770", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,212 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=09", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34651.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34651.json index 420fceacc12..9d6707a6233 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34651.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34651.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34651", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-09-04T06:15:14.810", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:59:25.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,562 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F1525232-54F0-467F-9575-2445F73F43B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2E61388E-2542-4198-8BC6-ABB20930F01A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "06092D16-EBD5-489C-81D2-F6E0F922AE7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E070DA79-8F09-4877-BFBA-3F23564DD8C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D80C2C7A-6F48-48B8-ACAD-720FC797F836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "EE03013A-AAB3-4426-BB22-E1487D3B3F6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDE4D65E-8F9B-4810-AED6-95564A97D741" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0AF1EDA0-2712-4C3C-8D8A-89E154BB63DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6239D93F-CA0E-4120-96A1-FB63276EAEE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "CD382E2D-0B51-4908-989A-88E083FC85BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "61D507C0-086B-4139-A560-126964DFA579" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "57B125ED-D939-4CBC-9E96-BBCF02402A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF85AA7B-E1C7-4946-92B4-E4D545CAACDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B6871BC1-19F4-4F0C-88D8-4000590D8D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9FA72654-2389-4709-BC70-59EC4349A826" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "79C89A24-B07F-43D2-AE83-8F4F03D6C114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E4187BA1-226E-4976-A642-2F6DAE85538E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BFB2B338-5E04-4136-939F-749A3B163656" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C17A088-2CA1-4818-940F-2FEFA881D598" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=09", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34652.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34652.json index 97d63ee1bbe..19eb6af2944 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34652.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34652.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34652", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-09-04T06:15:15.040", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:59:08.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,562 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F1525232-54F0-467F-9575-2445F73F43B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2E61388E-2542-4198-8BC6-ABB20930F01A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "06092D16-EBD5-489C-81D2-F6E0F922AE7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E070DA79-8F09-4877-BFBA-3F23564DD8C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D80C2C7A-6F48-48B8-ACAD-720FC797F836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "EE03013A-AAB3-4426-BB22-E1487D3B3F6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDE4D65E-8F9B-4810-AED6-95564A97D741" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0AF1EDA0-2712-4C3C-8D8A-89E154BB63DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6239D93F-CA0E-4120-96A1-FB63276EAEE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "CD382E2D-0B51-4908-989A-88E083FC85BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "61D507C0-086B-4139-A560-126964DFA579" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "57B125ED-D939-4CBC-9E96-BBCF02402A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF85AA7B-E1C7-4946-92B4-E4D545CAACDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B6871BC1-19F4-4F0C-88D8-4000590D8D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9FA72654-2389-4709-BC70-59EC4349A826" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "79C89A24-B07F-43D2-AE83-8F4F03D6C114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E4187BA1-226E-4976-A642-2F6DAE85538E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BFB2B338-5E04-4136-939F-749A3B163656" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C17A088-2CA1-4818-940F-2FEFA881D598" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=09", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34661.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34661.json index 3d060327c4a..98721aa429f 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34661.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34661.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34661", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-09-04T06:15:17.003", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:57:44.563", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:samsung:assistant:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.1.00.7", + "matchCriteriaId": "C84786FD-F2FB-4511-9561-C60B734E42CE" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=09", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36972.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36972.json index 3d118dc2f63..b9d22d30b7a 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36972.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36972.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36972", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-10T15:15:52.617", - "lastModified": "2024-07-03T02:03:56.627", + "lastModified": "2024-09-05T16:35:20.120", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: af_unix: actualice unix_sk(sk)->oob_skb bajo el bloqueo sk_receive_queue. Billy Jheng Bing-Jhong inform\u00f3 de una ejecuci\u00f3n entre __unix_gc() y queue_oob(). __unix_gc() intenta recolectar basura de sockets en vuelo close()d, y luego, si el socket tiene MSG_OOB en unix_sk(sk)->oob_skb, GC eliminar\u00e1 la referencia y establecer\u00e1 NULL sin bloqueo. Sin embargo, el socket del par a\u00fan puede enviar el mensaje MSG_OOB y queue_oob() puede actualizar unix_sk(sk)->oob_skb simult\u00e1neamente, lo que lleva a la desreferencia del puntero NULL. [0] Para solucionar el problema, actualicemos unix_sk(sk)->oob_skb bajo el bloqueo de sk_receive_queue y lo llevemos a todos los lugares donde toquemos oob_skb. Tenga en cuenta que posponemos kfree_skb() en Manage_oob() para silenciar el falso positivo de Lockdep (consulte [1]). [0]: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000008 PF: acceso de escritura del supervisor en modo kernel PF: error_code(0x0002) - p\u00e1gina no presente PGD 8000000009f5e067 P4D 8000000009f5e067 PUD 9f5d067 PMD 0 Ups: 02 [#1] SMP ADELANTADO PTI CPU: 3 PID: 50 Comm: kworker/3:1 No contaminado 6.9.0-rc5-00191-gd091e579b864 #110 Nombre del hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0- gd239552ce722-prebuilt.qemu.org 01/04/2014 Cola de trabajo: eventos retrasados_fput RIP: 0010:skb_dequeue (./include/linux/skbuff.h:2386 ./include/linux/skbuff.h:2402 net/core/skbuff. c:3847) C\u00f3digo: 39 e3 74 3e 8b 43 10 48 89 ef 83 e8 01 89 43 10 49 8b 44 24 08 49 c7 44 24 08 00 00 00 00 49 8b 14 24 49 c7 04 24 00 0 00 00 <48 > 89 42 08 48 89 10 e8 e7 c5 42 00 4c 89 e0 5b 5d 41 5c c3 cc cc RSP: 0018:ffffc900001bfd48 EFLAGS: 00000002 RAX: 0000000000000000 RBX: 80088f5ae8 RCX: 00000000361289f9 RDX: 0000000000000000 RSI: 0000000000000206 RDI: ffff8880088f5b00 RBP: ffff8880088f5b00 R08: 0000000000080000 R09: 0000000000000001 R10: 0000000000000003 R11: 00000000000000001 R12: ffff8880056b6a00 R13: ffff8880088f5280 R14: 0000000000000001 R15: ffff8880088f5a80 FS: 0000000000000000(0000) GS:ffff88807dd80000(0000) knlGS:00000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0 : 0000000080050033 CR2: 0000000000000008 CR3: 0000000006314000 CR4: 00000000007506f0 PKRU: 55555554 Seguimiento de llamadas: unix_release_sock (net/unix/af_unix.c:654) ix_release (net/unix/af_unix.c:1050) __sock_release (net/socket. c:660) sock_close (net/socket.c:1423) __fput (fs/file_table.c:423) retrasado_fput (fs/file_table.c:444 (discriminador 3)) Process_one_work (kernel/workqueue.c:3259) trabajador_thread ( kernel/workqueue.c:3329 kernel/workqueue.c:3416) kthread (kernel/kthread.c:388) ret_from_fork (arch/x86/kernel/process.c:153) ret_from_fork_asm (arch/x86/entry/entry_64.S :257) M\u00f3dulos vinculados en: CR2: 0000000000000008" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38482.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38482.json index 35b196e0d1d..2cdc8003ee5 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38482.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38482.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38482", "sourceIdentifier": "security_alert@emc.com", "published": "2024-08-02T04:17:27.750", - "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-05T16:04:53.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "security_alert@emc.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security_alert@emc.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "security_alert@emc.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:cloudlink:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.1", + "versionEndExcluding": "8.1", + "matchCriteriaId": "C3117E62-5F21-4DC3-8164-3CAD329DC225" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000227493/dsa-2024-343-security-update-for-dell-cloudlink-vulnerability", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40645.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40645.json index 964a790e613..11eae6962f6 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40645.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40645.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40645", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T19:15:11.870", - "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-05T17:09:16.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,18 +81,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fogproject:fogproject:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.5.10", + "versionEndIncluding": "1.5.10.41", + "matchCriteriaId": "DDC1FAD4-EE15-41FF-BDF0-685E7885E4F6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/FOGProject/fogproject/blob/a4bb1bf39ac53c3cbe623576915fbc3b5c80a00f/packages/web/lib/pages/fogconfigurationpage.class.php#L2860-L2896", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/FOGProject/fogproject/commit/9469606a18bf8887740cceed6593a2e0380b5e0c", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/FOGProject/fogproject/security/advisories/GHSA-59mq-q8g5-2f4f", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4079.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4079.json index 11cf6cf1ec7..72687c12a01 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4079.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4079.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4079", "sourceIdentifier": "security@ni.com", "published": "2024-07-23T14:15:14.353", - "lastModified": "2024-07-24T12:55:13.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:12:19.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "security@ni.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + }, { "source": "security@ni.com", "type": "Secondary", @@ -51,10 +81,71 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2020", + "matchCriteriaId": "E9BBCA76-7B4C-4CC5-A782-489CA4223C04" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2021:-:*:*:*:*:*:*", + "matchCriteriaId": "9F184512-5D11-47F4-8555-EA6FF93C106F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2021:sp1:*:*:*:*:*:*", + "matchCriteriaId": "BF28259A-30A6-4BB1-B262-A006AB74AFFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*", + "matchCriteriaId": "4D12D6CF-802F-47BA-ADF9-9E52C071BD7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*", + "matchCriteriaId": "340F61E5-D1ED-4C29-A894-8BC5C5B90ACE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*", + "matchCriteriaId": "D7DD2022-CFB7-4F38-B459-C1AFB55B5B68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*", + "matchCriteriaId": "18AB0B07-72FE-4861-B69D-AD2E87C5382E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*", + "matchCriteriaId": "044C4B51-C641-41F2-ACA0-834C99D63285" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*", + "matchCriteriaId": "7753CCDF-BAF8-4F91-B85B-EBB2B88F6F30" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-read-due-to-missing-bounds-check-in-labview.html", - "source": "security@ni.com" + "source": "security@ni.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4080.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4080.json index 1d0311b9d80..21f2cd27f60 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4080.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4080.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4080", "sourceIdentifier": "security@ni.com", "published": "2024-07-23T14:15:14.590", - "lastModified": "2024-07-24T12:55:13.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:16:23.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "security@ni.com", "type": "Secondary", @@ -84,6 +104,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "security@ni.com", "type": "Secondary", @@ -95,10 +125,71 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2020", + "matchCriteriaId": "E9BBCA76-7B4C-4CC5-A782-489CA4223C04" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2021:-:*:*:*:*:*:*", + "matchCriteriaId": "9F184512-5D11-47F4-8555-EA6FF93C106F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2021:sp1:*:*:*:*:*:*", + "matchCriteriaId": "BF28259A-30A6-4BB1-B262-A006AB74AFFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*", + "matchCriteriaId": "4D12D6CF-802F-47BA-ADF9-9E52C071BD7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*", + "matchCriteriaId": "340F61E5-D1ED-4C29-A894-8BC5C5B90ACE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*", + "matchCriteriaId": "D7DD2022-CFB7-4F38-B459-C1AFB55B5B68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*", + "matchCriteriaId": "18AB0B07-72FE-4861-B69D-AD2E87C5382E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*", + "matchCriteriaId": "044C4B51-C641-41F2-ACA0-834C99D63285" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*", + "matchCriteriaId": "7753CCDF-BAF8-4F91-B85B-EBB2B88F6F30" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/memory-corruption-issues-due-to-improper-length-checks-in-labview.html", - "source": "security@ni.com" + "source": "security@ni.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41108.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41108.json index 841ddf96d56..c7e106ec507 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41108.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41108.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41108", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T19:15:12.110", - "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-05T16:27:50.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,18 +81,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fogproject:fogproject:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.5.10", + "versionEndExcluding": "1.5.10.41", + "matchCriteriaId": "0DD7BD8A-1B66-4868-92EC-0C2A142B937E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/FOGProject/fogproject/blob/a4bb1bf39ac53c3cbe623576915fbc3b5c80a00f/packages/web/service/hostinfo.php", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/FOGProject/fogproject/blob/a4bb1bf39ac53c3cbe623576915fbc3b5c80a00f/packages/web/service/hostname.php", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/FOGProject/fogproject/security/advisories/GHSA-p3f9-4jj4-fm2g", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41123.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41123.json index 8c4dbc3a8f3..6de8416c618 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41123.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41123.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41123", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-01T15:15:13.213", - "lastModified": "2024-08-01T16:45:25.400", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-05T16:12:21.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,22 +81,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruby-lang:rexml:*:*:*:*:*:ruby:*:*", + "versionEndExcluding": "3.3.3", + "matchCriteriaId": "E5CFEABA-B7D5-4D35-9C56-CC81B839DD36" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ruby/rexml/security/advisories/GHSA-4xqq-m2hx-25v8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/ruby/rexml/security/advisories/GHSA-r55c-59qm-vjw6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/ruby/rexml/security/advisories/GHSA-vg3r-rm7w-2xgh", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41123", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41946.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41946.json index eae7f9d0440..2dcc19f2c2d 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41946.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41946.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41946", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-01T15:15:14.100", - "lastModified": "2024-08-01T16:45:25.400", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-05T16:09:45.503", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,22 +81,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruby-lang:rexml:*:*:*:*:*:ruby:*:*", + "versionEndExcluding": "3.3.3", + "matchCriteriaId": "E5CFEABA-B7D5-4D35-9C56-CC81B839DD36" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ruby/rexml/commit/033d1909a8f259d5a7c53681bcaf14f13bcf0368", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/ruby/rexml/security/advisories/GHSA-5866-49gr-22v4", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41946", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41954.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41954.json index 579b1d5bd5d..af2bfdd83d2 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41954.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41954.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41954", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-31T20:15:06.587", - "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-05T16:18:09.940", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +81,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fogproject:fogproject:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.5.10", + "versionEndIncluding": "1.5.10.41", + "matchCriteriaId": "DDC1FAD4-EE15-41FF-BDF0-685E7885E4F6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/FOGProject/fogproject/commit/97ed6d51608e52fc087ca1d2f03d6b8df612fc90", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/FOGProject/fogproject/security/advisories/GHSA-pcqm-h8cx-282c", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42063.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42063.json index a4db577503a..039c0db41b6 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42063.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42063.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42063", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-29T16:15:06.053", - "lastModified": "2024-07-29T16:21:52.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:42:12.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,102 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bpf: marcar la pila de programas bpf con kmsan_unposion_memory en modo int\u00e9rprete syzbot inform\u00f3 usos de memoria uninit durante map_{lookup,delete}_elem. ========== ERROR: KMSAN: valor uninit en __dev_map_lookup_elem kernel/bpf/devmap.c:441 [en l\u00ednea] ERROR: KMSAN: valor uninit en dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap. c:796 __dev_map_lookup_elem kernel/bpf/devmap.c:441 [en l\u00ednea] dev_map_lookup_elem+0xf3/0x170 kernel/bpf/devmap.c:796 ____bpf_map_lookup_elem kernel/bpf/helpers.c:42 [en l\u00ednea] bpf_map_lookup_elem+0x5c/0x80 kernel / bpf/helpers.c:38 ___bpf_prog_run+0x13fe/0xe0f0 kernel/bpf/core.c:1997 __bpf_prog_run256+0xb5/0xe0 kernel/bpf/core.c:2237 ========== El reproductor debe estar en el modo int\u00e9rprete. El reproductor de C est\u00e1 intentando ejecutar el siguiente programa bpf: 0: (18) r0 = 0x0 2: (18) r1 = map[id:49] 4: (b7) r8 = 16777216 5: (7b) *(u64 * )(r10 -8) = r8 6: (bf) r2 = r10 7: (07) r2 += -229 ^^^^^^^^^^ 8: (b7) r3 = 8 9: (b7) r4 = 0 10: (85) llamar a dev_map_lookup_elem#1543472 11: (95) salir Se debe a la \"clave * vac\u00eda\" (r2) pasada al ayudante. bpf permite el acceso a la memoria de pila uninit para el programa bpf con los privilegios correctos. Este parche usa kmsan_unpoison_memory() para marcar la pila como inicializada. Esto deber\u00eda abordar diferentes informes de syzbot sobre el argumento uninit \"void *key\" durante map_{lookup,delete}_elem." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.1.97", + "matchCriteriaId": "11DA4D7A-BB0A-4555-8D1D-ECCC5108F772" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.37", + "matchCriteriaId": "D72E033B-5323-4C4D-8818-36E1EBC3535F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.8", + "matchCriteriaId": "E95105F2-32E3-4C5F-9D18-7AEFD0E6275C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3189983c26108cf0990e5c46856dc9feb9470d12", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b30f3197a6cd080052d5d4973f9a6b479fd9fff5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d812ae6e02bd6e6a9cd1fdb09519c2f33e875faf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e8742081db7d01f980c6161ae1e8a1dbc1e30979", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42148.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42148.json index 939aea2b6df..c1d263e2ba6 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42148.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42148.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42148", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-30T08:15:06.453", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:46:27.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,159 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bnx2x: corrige m\u00faltiples \u00edndices de matriz UBSAN fuera de los l\u00edmites. Corrige las advertencias de UBSAN que ocurren cuando se usa un sistema con 32 n\u00facleos de CPU f\u00edsicos o m\u00e1s, o cuando el usuario define un n\u00famero. de colas Ethernet mayores o iguales a FP_SB_MAX_E1x usando el par\u00e1metro del m\u00f3dulo num_queues. Actualmente hay una lectura/escritura fuera de los l\u00edmites que se produce en la matriz \"struct stats_query_entry query\" presente dentro de la estructura \"bnx2x_fw_stats_req\" en \"drivers/net/ethernet/broadcom/bnx2x/bnx2x.h\". Mirando la definici\u00f3n de la matriz \"struct stats_query_entry query\": struct stats_query_entry query[FP_SB_MAX_E1x+ BNX2X_FIRST_QUEUE_QUERY_IDX]; FP_SB_MAX_E1x se define como el n\u00famero m\u00e1ximo de interrupciones de ruta r\u00e1pida y tiene un valor de 16, mientras que BNX2X_FIRST_QUEUE_QUERY_IDX tiene un valor de 3, lo que significa que la matriz tiene un tama\u00f1o total de 19. Dado que los accesos a \"struct stats_query_entry query\" est\u00e1n compensados por BNX2X_FIRST_QUEUE_QUERY_IDX, eso significa que el n\u00famero total de colas Ethernet no debe exceder FP_SB_MAX_E1x (16). Sin embargo, una de estas colas est\u00e1 reservada para FCOE y, por lo tanto, el n\u00famero de colas Ethernet debe establecerse en [FP_SB_MAX_E1x -1] (15) si FCOE est\u00e1 habilitado o [FP_SB_MAX_E1x] (16) si no lo est\u00e1. Esto tambi\u00e9n se describe en un comentario en el c\u00f3digo fuente en drivers/net/ethernet/broadcom/bnx2x/bnx2x.h justo encima de la definici\u00f3n de macro de FP_SB_MAX_E1x. A continuaci\u00f3n se muestra la parte de esta explicaci\u00f3n que es importante para este parche /* * El n\u00famero total de colas L2, vectores MSIX y contextos HW (CID) est\u00e1 * controlado por el n\u00famero de bloques de estado de ruta r\u00e1pida admitidos por el * dispositivo (HW /FW). Cada bloque de estado de ruta r\u00e1pida (FP-SB), tambi\u00e9n conocido como bloque de estado no predeterminado *, representa un contexto de interrupciones independiente que puede * servir a una cola de red L2 normal. Sin embargo, las colas L2 especiales, como * como la cola FCoE, no requieren un FP-SB y otros componentes como * el CNIC pueden consumir FP-SB, lo que reduce el n\u00famero de colas L2 posibles * * Si el n\u00famero m\u00e1ximo de FP-SB disponibles es X, entonces : * a. Si se admite CNIC, consume 1 FP-SB, por lo que el n\u00famero m\u00e1ximo de * colas L2 regulares es Y=X-1 * b. En el modo MF, el n\u00famero real de colas L2 es Y= (X-1/MF_factor) * c. Si se admite la cola FCoE L2, el n\u00famero real de colas L2 * es Y+1 * d. El n\u00famero de irqs (vectores MSIX) es Y+1 (uno adicional para * interrupciones de ruta lenta) o Y+2 si se admite CNIC (un contexto de interrupci\u00f3n * FP adicional para el CNIC). * e. El n\u00famero de contexto de HW (recuento de CID) siempre es X o X+1 si se admite la cola FCoE * L2. El cid para la cola FCoE L2 siempre es X. */ Sin embargo, este controlador tambi\u00e9n admite NIC que usan el controlador E2, que puede manejar m\u00e1s colas debido a que tiene m\u00e1s FP-SB representado por FP_SB_MAX_E2. Al observar las confirmaciones cuando se agreg\u00f3 el soporte E2, originalmente se usaban los par\u00e1metros E1x: commit f2e0899f0f27 (\"bnx2x: Add 57712 support\"). En aquel entonces, FP_SB_MAX_E2 se configur\u00f3 en 16 al igual que E1x. Sin embargo, el controlador se actualiz\u00f3 posteriormente para aprovechar al m\u00e1ximo el E2 en lugar de limitarlo a las capacidades del E1x. Pero hasta donde sabemos, la \"consulta stats_query_entry\" de la matriz todav\u00eda se limitaba a usar el FP-SB disponible para las tarjetas E1x como parte de una sobrese\u00f1al cuando se actualiz\u00f3 el controlador para aprovechar al m\u00e1ximo el E2, y ahora con el Al ser consciente el controlador del mayor tama\u00f1o de cola admitido por las NIC E2, se generan las advertencias de UBSAN que se ven en los seguimientos de pila a continuaci\u00f3n. Este parche aumenta el tama\u00f1o de la matriz \"stats_query_entry query\" reemplazando FP_SB_MAX_E1x con FP_SB_MAX_E2 para que sea lo suficientemente grande como para manejar ambos tipos de NIC. Seguimientos de pila: UBSAN: ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3", + "versionEndExcluding": "4.19.318", + "matchCriteriaId": "CB7FC3A4-F8FE-40B5-B8D0-0DE2A8D111A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.280", + "matchCriteriaId": "625DBFAB-C3D0-4309-A27F-12D6428FB38F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.222", + "matchCriteriaId": "00696AC5-EE29-437F-97F9-C4D66608B327" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.163", + "matchCriteriaId": "A97DEB09-4927-40F8-B5C6-F5BD5EAE0CFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.98", + "matchCriteriaId": "E09E92A5-27EF-40E4-926A-B1CDC8270551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.39", + "matchCriteriaId": "29E894E4-668F-4DB0-81F7-4FB5F698E970" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.9", + "matchCriteriaId": "ADCC1407-0CB3-4C8F-B4C5-07F682CD7085" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0edae06b4c227bcfaf3ce21208d49191e1009d3b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/134061163ee5ca4759de5c24ca3bd71608891ba7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8b17cec33892a66bbd71f8d9a70a45e2072ae84f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9504a1550686f53b0bab4cab31d435383b1ee2ce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b9ea38e767459111a511ed4fb74abc37db95a59d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cbe53087026ad929cd3950508397e8892a6a2a0f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cfb04472ce33bee2579caf4dc9f4242522f6e26e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f1313ea92f82451923e28ab45a4aaa0e70e80b98", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42288.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42288.json index 299860588fd..cb672e20a21 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42288.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42288.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42288", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:09.523", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:38:38.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,144 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: qla2xxx: Correcci\u00f3n de posible corrupci\u00f3n de la memoria Init Control Block est\u00e1 desreferenciada incorrectamente. Desreferenciar correctamente ICB" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.4.282", + "matchCriteriaId": "9B9D49AA-E82F-497B-A047-F07DF6F16995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.224", + "matchCriteriaId": "5CCEDF13-293D-4E64-B501-4409D0365AFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.165", + "matchCriteriaId": "B4E2B568-3171-41DE-B519-F2B1A3600D94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.103", + "matchCriteriaId": "E45EAC72-8329-4F99-8276-86AF9BB3496A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.44", + "matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2a15b59a2c5afac89696e44acf5bbfc0599c6c5e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/571d7f2a08836698c2fb0d792236424575b9829b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8192c533e89d9fb69b2490398939236b78cda79b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/87db8d7b7520e99de71791260989f06f9c94953d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b0302ffc74123b6a99d7d1896fcd9b2e4072d9ce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c03d740152f78e86945a75b2ad541bf972fab92a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dae67169cb35a37ecccf60cfcd6bf93a1f4f5efb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42289.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42289.json index 03deebf6c56..1a27e71cc43 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42289.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42289.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42289", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:09.590", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:37:49.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,158 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: scsi: qla2xxx: durante la eliminaci\u00f3n de vport, env\u00ede el cierre de sesi\u00f3n as\u00edncrono expl\u00edcitamente. Durante la eliminaci\u00f3n de vport, se observa que durante la descarga sufrimos un bloqueo debido a entradas obsoletas en la matriz de comandos pendientes. Para todas estas entradas de E/S obsoletas, se emiti\u00f3 y cancel\u00f3 eh_abort (fast_fail_io = 2009h), pero las E/S no se pudieron completar mientras la eliminaci\u00f3n de vport estaba en proceso de eliminaci\u00f3n. ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 000000000000001c #PF: acceso de lectura del supervisor en modo kernel #PF: c\u00f3digo_error(0x0000) - p\u00e1gina no presente PGD 0 P4D 0 Vaya: 0000 [#1] Cola de trabajo PREEMPT SMP NOPTI: qla2xxx_wq qla_do_work [ qla2xxx] RIP: 0010:dma_direct_unmap_sg+0x51/0x1e0 RSP: 0018:ffffa1e1e150fc68 EFLAGS: 00010046 RAX: 00000000000000000 RBX: 0000000000000021 RCX: 0000000001 RDX: 0000000000000021 RSI: 0000000000000000 RDI: ffff8ce208a7a0d0 RBP: ffff8ce208a7a0d0 R08: 0000000000000000 R09: 10: ffff8ce378aac8a0 R11 : ffffa1e1e150f9d8 R12: 0000000000000000 R13: 0000000000000000 R14: ffff8ce378aac9c8 R15: 00000000000000000 FS: 0000000000000000(0000) ffff8d217f000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000000001c CR3: 0000002089acc000 0000000000350ee0 Seguimiento de llamadas: qla2xxx_qpair_sp_free_dma+0x417/0x4e0 ? qla2xxx_qpair_sp_compl+0x10d/0x1a0 ? qla2x00_status_entry+0x768/0x2830? newidle_balance+0x2f0/0x430? dequeue_entity+0x100/0x3c0? qla24xx_process_response_queue+0x6a1/0x19e0? __programaci\u00f3n+0x2d5/0x1140 ? qla_do_work+0x47/0x60 ? proceso_one_work+0x267/0x440? proceso_one_work+0x440/0x440? hilo_trabajador+0x2d/0x3d0? proceso_one_work+0x440/0x440? khilo+0x156/0x180? set_kthread_struct+0x50/0x50? ret_from_fork+0x22/0x30 Env\u00eda el cierre de sesi\u00f3n as\u00edncrono expl\u00edcitamente para todos los puertos durante la eliminaci\u00f3n de vport." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.19.320", + "matchCriteriaId": "0B4EF915-550B-45E5-B2CA-648FEACD60FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.282", + "matchCriteriaId": "A8961D98-9ACF-4188-BA88-44038B14BC28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.224", + "matchCriteriaId": "5CCEDF13-293D-4E64-B501-4409D0365AFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.165", + "matchCriteriaId": "B4E2B568-3171-41DE-B519-F2B1A3600D94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.103", + "matchCriteriaId": "E45EAC72-8329-4F99-8276-86AF9BB3496A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.44", + "matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/086489256696eb774654a5410e86381c346356fe", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/171ac4b495f9473bc134356a00095b47e6409e52", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/76f480d7c717368f29a3870f7d64471ce0ff8fb2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/87c25fcb95aafabb6a4914239f4ab41b07a4f9b7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b12c54e51ba83c1fbc619d35083d7872e42ecdef", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b35d6d5a2f38605cddea7d5c64cded894fbe8ede", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d28a2075bb530489715a3b011e1dd8765ba20313", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e5ed6a26ffdec0c91cf0b6138afbd675c00ad5fc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42307.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42307.json index 10e5ff0b4cf..0cd2be62e07 100644 --- a/CVE-2024/CVE-2024-423xx/CVE-2024-42307.json +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42307.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42307", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T09:15:10.843", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:49:58.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: cifs: corrige el posible uso de puntero nulo en destroy_workqueue en la ruta de error init_cifs Dan Carpenter inform\u00f3 una advertencia del verificador est\u00e1tico de Smack: fs/smb/client/cifsfs.c:1981 error init_cifs(): Anteriormente asumimos que 'serverclose_wq' podr\u00eda ser nulo (ver l\u00ednea 1895). El parche que introdujo la cola de trabajo serverclose utiliz\u00f3 un orden incorrecto en las rutas de error en init_cifs() para liberarlo de errores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.85", + "versionEndExcluding": "6.1.103", + "matchCriteriaId": "42EE7040-F6B8-41B6-B886-9DB62292B991" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.26", + "versionEndExcluding": "6.6.44", + "matchCriteriaId": "F1D7BCB0-C58B-481A-9E7D-8CAD84EF38AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8.5", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "E6C7329B-0935-4016-B115-BC78DC87A38E" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/160235efb4f9b55212dedff5de0094c606c4b303", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/193cc89ea0ca1da311877d2b4bb5e9f03bcc82a2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3739d711246d8fbc95ff73dbdace9741cdce4777", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6018971710fdc7739f8655c1540832b4bb903671", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42885.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42885.json new file mode 100644 index 00000000000..69d1b233569 --- /dev/null +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42885.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42885", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-05T16:15:07.720", + "lastModified": "2024-09-05T17:44:56.007", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection vulnerability in ESAFENET CDG 5.6 and before allows an attacker to execute arbitrary code via the id parameter of the data.jsp page." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://supervisor0.notion.site/ESAFENET-CDG-SQL-Injection-17d7e244810147f697c3c42a884f932b", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44383.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44383.json index 52a7e9d94cb..1614410bb69 100644 --- a/CVE-2024/CVE-2024-443xx/CVE-2024-44383.json +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44383.json @@ -2,17 +2,41 @@ "id": "CVE-2024-44383", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-04T13:15:06.753", - "lastModified": "2024-09-04T16:09:24.827", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-05T17:38:48.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WAYOS FBM-291W v19.09.11 is vulnerable to Command Execution via msp_info_htm." + }, + { + "lang": "es", + "value": "WAYOS FBM-291W v19.09.11 es vulnerable a la ejecuci\u00f3n de comandos a trav\u00e9s de msp_info_htm." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:wayos:fbm-291w_firmware:19.09.11:*:*:*:*:*:*:*", + "matchCriteriaId": "82D73CBC-D075-4232-8E11-BCF9E1D4AB8A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:wayos:fbm-291w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F9373FFB-B5E8-4761-8946-9E8FC27FC38A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/GroundCTL2MajorTom/pocs/blob/main/wayos_%20FBM_291W.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-444xx/CVE-2024-44400.json b/CVE-2024/CVE-2024-444xx/CVE-2024-44400.json index d3a562ee4ef..f6e1a33c585 100644 --- a/CVE-2024/CVE-2024-444xx/CVE-2024-44400.json +++ b/CVE-2024/CVE-2024-444xx/CVE-2024-44400.json @@ -2,17 +2,41 @@ "id": "CVE-2024-44400", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-04T13:15:06.867", - "lastModified": "2024-09-04T16:09:24.827", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-05T17:37:42.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "D-Link DI-8400 16.07.26A1 is vulnerable to Command Injection via upgrade_filter_asp." + }, + { + "lang": "es", + "value": "D-Link DI-8400 16.07.26A1 es vulnerable a la inyecci\u00f3n de comandos a trav\u00e9s de upgrade_filter_asp." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:di-8400_firmware:16.07.26a1:*:*:*:*:*:*:*", + "matchCriteriaId": "7293D6F3-30C0-4805-A662-ADAC551BAB7A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:di-8400:a1:*:*:*:*:*:*:*", + "matchCriteriaId": "75CE4566-1587-4A8E-8D4E-8693149670DF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/lonelylonglong/openfile-/blob/main/D-link_DI_8400-16.07.26A1_Command_Injection.md/D-link_DI_8400-16.07.26A1_Command_Injection.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-445xx/CVE-2024-44587.json b/CVE-2024/CVE-2024-445xx/CVE-2024-44587.json index d89258a3240..9afc318bc43 100644 --- a/CVE-2024/CVE-2024-445xx/CVE-2024-44587.json +++ b/CVE-2024/CVE-2024-445xx/CVE-2024-44587.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44587", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-05T14:15:10.700", - "lastModified": "2024-09-05T14:35:24.337", - "vulnStatus": "Received", + "lastModified": "2024-09-05T17:44:56.007", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44727.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44727.json new file mode 100644 index 00000000000..e1fb4e4ad87 --- /dev/null +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44727.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-44727", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-05T17:15:12.617", + "lastModified": "2024-09-05T17:44:56.007", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sourcecodehero Event Management System1.0 is vulnerable to SQL Injection via the parameter 'username' in /event/admin/login.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/AslamMahi/CVE-Aslam-Mahi/blob/main/Sourcecodehero%20Event%20Management%20System/CVE-2024-44727.MD", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44728.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44728.json new file mode 100644 index 00000000000..77978c56e4b --- /dev/null +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44728.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-44728", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-05T17:15:12.730", + "lastModified": "2024-09-05T17:44:56.007", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sourcecodehero Event Management System 1.0 allows Stored Cross-Site Scripting via parameters Full Name, Address, Email, and contact# in /clientdetails/admin/regester.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/AslamMahi/CVE-Aslam-Mahi/blob/main/Sourcecodehero%20Event%20Management%20System/CVE-2024-44728.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44931.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44931.json index 68307db66df..f5a7fa23aa0 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44931.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44931.json @@ -2,28 +2,101 @@ "id": "CVE-2024-44931", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T11:15:05.447", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:58:45.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: prevent potential speculation leaks in gpio_device_get_desc()\n\nUserspace may trigger a speculative read of an address outside the gpio\ndescriptor array.\nUsers can do that by calling gpio_ioctl() with an offset out of range.\nOffset is copied from user and then used as an array index to get\nthe gpio descriptor without sanitization in gpio_device_get_desc().\n\nThis change ensures that the offset is sanitized by using\narray_index_nospec() to mitigate any possibility of speculative\ninformation leaks.\n\nThis bug was discovered and resolved using Coverity Static Analysis\nSecurity Testing (SAST) by Synopsys, Inc." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: gpio: evita posibles fugas de especulaci\u00f3n en gpio_device_get_desc() El espacio de usuario puede desencadenar una lectura especulativa de una direcci\u00f3n fuera de la matriz de descriptores de gpio. Los usuarios pueden hacerlo llamando a gpio_ioctl() con un desplazamiento fuera de rango. La compensaci\u00f3n se copia del usuario y luego se usa como \u00edndice de matriz para obtener el descriptor de gpio sin desinfecci\u00f3n en gpio_device_get_desc(). Este cambio garantiza que la compensaci\u00f3n se desinfecte mediante el uso de array_index_nospec() para mitigar cualquier posibilidad de fugas de informaci\u00f3n especulativa. Este error fue descubierto y resuelto utilizando Coverity Static Analysis Security Testing (SAST) por Synopsys, Inc." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.46", + "matchCriteriaId": "84C35A98-08C9-4674-8AC8-9CC0757B7699" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "D074AE50-4A5E-499C-A2FD-75FD60DEA560" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/1b955f786a4bcde8c0ccb2b7d519def2acb6f3cc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d776c0486b03a5c4afca65b8ff44573592bf93bb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d795848ecce24a75dfd46481aee066ae6fe39775", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44936.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44936.json index ba520b2cd82..c612189cdd6 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44936.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44936.json @@ -2,24 +2,98 @@ "id": "CVE-2024-44936", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T11:15:05.700", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:53:43.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npower: supply: rt5033: Bring back i2c_set_clientdata\n\nCommit 3a93da231c12 (\"power: supply: rt5033: Use devm_power_supply_register() helper\")\nreworked the driver to use devm. While at it, the i2c_set_clientdata\nwas dropped along with the remove callback. Unfortunately other parts\nof the driver also rely on i2c clientdata so this causes kernel oops.\n\nBring the call back to fix the driver." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: power: Supply: rt5033: traer de vuelta i2c_set_clientdata Commit 3a93da231c12 (\"power: Supply: rt5033: Use devm_power_supply_register() helper\") reelabor\u00f3 el controlador para usar devm. Mientras lo hac\u00eda, i2c_set_clientdata se elimin\u00f3 junto con la devoluci\u00f3n de llamada de eliminaci\u00f3n. Desafortunadamente, otras partes del controlador tambi\u00e9n dependen de los datos del cliente i2c, por lo que esto provoca fallos en el kernel. Devuelva la llamada para reparar el controlador." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "F07BD0FF-07AF-4DAD-8EB1-09FB50ABDC47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/3c5d0871b0af0184abc6f7f52f8705b39a6251ae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d3911f1639e67fc7b12aae0efa5a540976d7443b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44971.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44971.json index 8e619087a74..dd3381b8e75 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44971.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44971.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44971", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T19:15:31.367", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:54:36.607", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,141 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: dsa: bcm_sf2: Se corrige una posible p\u00e9rdida de memoria en bcm_sf2_mdio_register() bcm_sf2_mdio_register() llama a of_phy_find_device() y luego a phy_device_remove() en un bucle para eliminar los dispositivos PHY existentes. of_phy_find_device() finalmente llama a bus_find_device(), que llama a get_device() en el struct device * devuelto para incrementar el refcount. La implementaci\u00f3n actual no disminuye el refcount, lo que causa una p\u00e9rdida de memoria. Esta confirmaci\u00f3n agrega la llamada phy_device_free() faltante para disminuir el refcount a trav\u00e9s de put_device() para equilibrar el refcount." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10", + "versionEndExcluding": "5.10.224", + "matchCriteriaId": "3723F85C-99C4-4BA1-A411-426E0591769E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.165", + "matchCriteriaId": "B4E2B568-3171-41DE-B519-F2B1A3600D94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.105", + "matchCriteriaId": "89BEB24B-0F37-4C92-A397-564DA7CD8EE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.46", + "matchCriteriaId": "FA11941E-81FB-484C-B583-881EEB488340" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "D074AE50-4A5E-499C-A2FD-75FD60DEA560" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/7feef10768ea71d468d9bbc1e0d14c461876768c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a7d2808d67570e6acae45c2a96e0d59986888e4c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b7b8d9f5e679af60c94251fd6728dde34be69a71", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c05516c072903f6fb9134b8e7e1ad4bffcdc4819", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e3862093ee93fcfbdadcb7957f5f8974fffa806a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f3d5efe18a11f94150fee8b3fda9d62079af640a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44974.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44974.json index 4592054158d..f01b4c5ddf2 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44974.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44974.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44974", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T20:15:07.100", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:54:29.037", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,109 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mptcp: pm: evitar posible UaF al seleccionar endp select_local_address() y select_signal_address() seleccionan una entrada de endpoint de la lista dentro de una secci\u00f3n protegida de RCU, pero devuelven una referencia a ella, para leerla m\u00e1s tarde. Si se desreferencia la entrada despu\u00e9s del desbloqueo de RCU, leer informaci\u00f3n podr\u00eda causar un Use-after-Free. Una soluci\u00f3n simple es copiar la informaci\u00f3n requerida mientras se est\u00e1 dentro de la secci\u00f3n protegida de RCU para evitar cualquier riesgo de UaF m\u00e1s adelante. Es posible que el ID de la direcci\u00f3n deba modificarse m\u00e1s tarde para manejar el caso ID0 m\u00e1s tarde, por lo que una copia parece ser una buena opci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.7", + "versionEndExcluding": "6.6.48", + "matchCriteriaId": "3C120709-9CC8-4B99-81CC-CA805D1EABD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.7", + "matchCriteriaId": "D2AFDFD1-D95A-4EB7-843B-5E7659518B67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0201d65d9806d287a00e0ba96f0321835631f63f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/48e50dcbcbaaf713d82bf2da5c16aeced94ad07d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9a9afbbc3fbfca4975eea4aa5b18556db5a0c0b8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44981.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44981.json index 5b5201aee78..447505e1311 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44981.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44981.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44981", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T20:15:07.533", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:54:19.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,95 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: workqueue: Se corrige el error de 'desbordamiento de sustracci\u00f3n' de UBSAN en shift_and_mask() UBSAN informa el siguiente error de 'desbordamiento de sustracci\u00f3n' al arrancar en una m\u00e1quina virtual en Android: | Error interno: UBSAN: desbordamiento de sustracci\u00f3n de enteros: 00000000f2005515 [#1] PREEMPT SMP | M\u00f3dulos vinculados en: | CPU: 0 PID: 1 Comm: swapper/0 No contaminado 6.10.0-00006-g3cbe9e5abd46-dirty #4 | Nombre del hardware: linux,dummy-virt (DT) | pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--) | pc : cancel_delayed_work+0x34/0x44 | lr : cancelar_trabajo_retrasado+0x2c/0x44 | sp : ffff80008002ba60 | x29: ffff80008002ba60 x28: 0000000000000000 x27: 0000000000000000 | x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000 | x23: 0000000000000000 x22: 0000000000000000 x21: ffff1f65014cd3c0 | x20: ffffc0e84c9d0da0 x19: ffffc0e84cab3558 x18: ffff800080009058 | x17: 00000000247ee1f8 x16: 00000000247ee1f8 x15: 00000000bdcb279d | x14: 0000000000000001 x13: 0000000000000075 x12: 00000a0000000000 | x11: ffff1f6501499018 x10: 00984901651fffff x9 : ffff5e7cc35af000 | x8 : 0000000000000001 x7 : 3d4d455453595342 x6 : 000000004e514553 | x5 : ffff1f6501499265 x4 : ffff1f650ff60b10 x3 : 0000000000000620 | x2 : ffff80008002ba78 x1 : 0000000000000000 x0 : 0000000000000000 | Rastreo de llamadas: | cancel_delayed_work+0x34/0x44 | deferred_probe_extend_timeout+0x20/0x70 | driver_register+0xa8/0x110 | __platform_driver_register+0x28/0x3c | syscon_init+0x24/0x38 | hacer_una_initcall+0xe4/0x338 | hacer_initcall_level+0xac/0x178 | hacer_initcalls+0x5c/0xa0 | hacer_configuraci\u00f3n_b\u00e1sica+0x20/0x30 | kernel_init_freeable+0x8c/0xf8 | kernel_init+0x28/0x1b4 | ret_from_fork+0x10/0x20 | C\u00f3digo: f9000fbf 97fffa2f 39400268 37100048 (d42aa2a0) | ---[ fin de seguimiento 000000000000000 ]--- | P\u00e1nico del n\u00facleo: no se sincroniza: UBSAN: desbordamiento de sustracci\u00f3n de enteros: excepci\u00f3n fatal Esto se debe a que shift_and_mask() usa una funci\u00f3n inmediata con signo para construir la m\u00e1scara y se la llama con un desplazamiento de 31 (WORK_OFFQ_POOL_SHIFT), por lo que termina disminuyendo desde INT_MIN. Use una constante sin signo '1U' para generar la m\u00e1scara en shift_and_mask()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10", + "versionEndExcluding": "6.10.7", + "matchCriteriaId": "E55C1263-DF43-41EF-8DA8-2BA68DF4FFFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/38f7e14519d39cf524ddc02d4caee9b337dad703", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/90a6a844b2d9927d192758438a4ada33d8cd9de5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44985.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44985.json index cf3abf3ad0c..2b90c78eefa 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44985.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44985.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44985", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T20:15:07.777", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:54:11.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,137 @@ "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: ipv6: evitar posible UAF en ip6_xmit() Si skb_expand_head() devuelve NULL, skb se ha liberado y el dst/idev asociado tambi\u00e9n podr\u00eda haberse liberado. Debemos utilizar rcu_read_lock() para evitar un posible UAF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.166", + "matchCriteriaId": "1E86C365-0589-4961-B85C-B76395A12CC0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.107", + "matchCriteriaId": "53954FF8-CB48-4302-BC4C-9DA7A88F44A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.48", + "matchCriteriaId": "9DE9201A-CE6B-4726-BABB-8265EA0F8AE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.7", + "matchCriteriaId": "D2AFDFD1-D95A-4EB7-843B-5E7659518B67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/124b428fe28064c809e4237b0b38e97200a8a4a8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2d5ff7e339d04622d8282661df36151906d0e1c7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/38a21c026ed2cc7232414cb166efc1923f34af17", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/975f764e96f71616b530e300c1bb2ac0ce0c2596", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fc88d6c1f2895a5775795d82ec581afdff7661d1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44986.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44986.json index 53e2aab04a8..b141e77682e 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44986.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44986.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44986", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T20:15:07.833", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:54:04.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,137 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv6: se ha corregido un posible UAF en ip6_finish_output2() Si skb_expand_head() devuelve NULL, se ha liberado skb y tambi\u00e9n se podr\u00eda haber liberado el dst/idev asociado. Necesitamos mantener rcu_read_lock() para asegurarnos de que el dst y el idev asociado est\u00e9n activos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.14", + "versionEndExcluding": "5.15.166", + "matchCriteriaId": "9F971490-28BA-4CF2-B6ED-DC618507AC3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.107", + "matchCriteriaId": "53954FF8-CB48-4302-BC4C-9DA7A88F44A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.48", + "matchCriteriaId": "9DE9201A-CE6B-4726-BABB-8265EA0F8AE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.7", + "matchCriteriaId": "D2AFDFD1-D95A-4EB7-843B-5E7659518B67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3574d28caf9a09756ae87ad1ea096c6f47b6101e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/56efc253196751ece1fc535a5b582be127b0578a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6ab6bf731354a6fdbaa617d1ec194960db61cf3b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/da273b377ae0d9bd255281ed3c2adb228321687b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e891b36de161fcd96f12ff83667473e5067b9037", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44987.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44987.json index c5c49bd8603..202a1bfa6bf 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44987.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44987.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44987", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T20:15:07.890", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:53:54.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,179 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv6: evitar UAF en ip6_send_skb() syzbot inform\u00f3 de un UAF en ip6_send_skb() [1] Despu\u00e9s de que ip6_local_out() haya regresado, ya no podemos desreferenciar rt de forma segura, a menos que mantengamos rcu_read_lock(). Se ha solucionado un problema similar en el commit a688caa34beb (\"ipv6: tomar bloqueo rcu en rawv6_send_hdrinc()\") Otro problema potencial en ip6_finish_output2() se maneja en un parche independiente. [1] ERROR: KASAN: slab-use-after-free en ip6_send_skb+0x18d/0x230 net/ipv6/ip6_output.c:1964 Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff88806dde4858 por la tarea syz.1.380/6530 CPU: 1 UID: 0 PID: 6530 Comm: syz.1.380 No contaminado 6.11.0-rc3-syzkaller-00306-gdf6cbc62cc9b #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Seguimiento de llamadas: __dump_stack lib/dump_stack.c:93 [en l\u00ednea] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119 descripci\u00f3n_direcci\u00f3n_impresi\u00f3n mm/kasan/report.c:377 [en l\u00ednea] informe_impresi\u00f3n+0x169/0x550 mm/kasan/report.c:488 informe_kasan+0x143/0x180 mm/kasan/report.c:601 ip6_send_skb+0x18d/0x230 net/ipv6/ip6_output.c:1964 tramas_pendientes_de_env\u00edo_sin_formato_v6+0x75c/0x9e0 net/ipv6/raw.c:588 env\u00edo_sin_formato_v6+0x19c7/0x23c0 net/ipv6/raw.c:926 env\u00edo_sin_formato_v6_nosec net/socket.c:730 [en l\u00ednea] __sock_sendmsg+0x1a6/0x270 net/socket.c:745 sock_write_iter+0x2dd/0x400 net/socket.c:1160 do_iter_readv_writev+0x60a/0x890 vfs_writev+0x37c/0xbb0 fs/read_write.c:971 do_writev+0x1b1/0x350 fs/read_write.c:1018 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f DESCANSE EN P\u00c9RDIDA: 0033:0x7f936bf79e79 C\u00f3digo: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f936cd7f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000014 RAX: ffffffffffffffda RBX: 00007f936c115f80 RCX: 00007f936bf79e79 RDX: 0000000000000001 RSI: 0000000020000040 RDI: 0000000000000004 RBP: 00007f936bfe7916 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 00000000000000246 R12: 00000000000000000 R13: 0000000000000000 R14: 00007f936c115f80 R15: 00007fff2860a7a8 Asignado por la tarea 6530: kasan_save_stack mm/kasan/common.c:47 [en l\u00ednea] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 unpoison_slab_object mm/kasan/common.c:312 [en l\u00ednea] __kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:338 kasan_slab_alloc include/linux/kasan.h:201 [en l\u00ednea] slab_post_alloc_hook mm/slub.c:3988 [en l\u00ednea] slab_alloc_node mm/slub.c:4037 [en l\u00ednea] kmem_cache_alloc_noprof+0x135/0x2a0 mm/slub.c:4044 dst_alloc+0x12b/0x190 net/core/dst.c:89 ip6_blackhole_route+0x59/0x340 net/ipv6/route.c:2670 make_blackhole net/xfrm/xfrm_policy.c:3120 [en l\u00ednea] xfrm_lookup_route+0xd1/0x1c0 net/xfrm/xfrm_policy.c:3313 ip6_dst_lookup_flow+0x13e/0x180 net/ipv6/ip6_output.c:1257 rawv6_sendmsg+0x1283/0x23c0 net/ipv6/raw.c:898 sock_sendmsg_nosec net/socket.c:730 [en l\u00ednea] __sock_sendmsg+0x1a6/0x270 net/socket.c:745 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2597 ___sys_sendmsg net/socket.c:2651 [en l\u00ednea] __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2680 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Liberado por la tarea 45: kasan_save_stack mm/kasan/common.c:47 [en l\u00ednea] kasan_save_track+0x3f/0x80 mm/kasan/common.c:68 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579 poison_slab_object+0xe0/0x150 mm/kasan/common.c:240 __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256 kasan_slab_free include/linux/kasan.h:184 [en l\u00ednea] slab_free_hook mm/slub.c:2252 ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.32", + "versionEndExcluding": "4.19.321", + "matchCriteriaId": "9ADDB000-FDCD-401B-AD98-165AB6788080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.283", + "matchCriteriaId": "8E6B390A-0CE6-44FC-8CD5-BE8226D6D24C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.225", + "matchCriteriaId": "C57B46A9-B105-4792-8481-1870DEFB436A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.166", + "matchCriteriaId": "913ED6CD-8ACF-48AF-AA18-7880881DD402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.107", + "matchCriteriaId": "53954FF8-CB48-4302-BC4C-9DA7A88F44A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.48", + "matchCriteriaId": "9DE9201A-CE6B-4726-BABB-8265EA0F8AE4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.7", + "matchCriteriaId": "D2AFDFD1-D95A-4EB7-843B-5E7659518B67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*", + "matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/24e93695b1239fbe4c31e224372be77f82dab69a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/571567e0277008459750f0728f246086b2659429", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9a3e55afa95ed4ac9eda112d4f918af645d72f25", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af1dde074ee2ed7dd5bdca4e7e8ba17f44e7b011", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cb5880a0de12c7f618d2bdd84e2d985f1e06ed7e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ce2f6cfab2c637d0bd9762104023a15d0ab7c0a8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e44bd76dd072756e674f45c5be00153f4ded68b2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/faa389b2fbaaec7fd27a390b4896139f9da662e3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45096.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45096.json new file mode 100644 index 00000000000..c69f6be0573 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45096.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45096", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-09-05T16:15:07.810", + "lastModified": "2024-09-05T17:44:56.007", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Aspera Faspex 5.0.0 through 5.0.9 could allow a user with access to the package to obtain sensitive information through a directory listing." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-548" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7167255", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45097.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45097.json new file mode 100644 index 00000000000..079e8833bd1 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45097.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45097", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-09-05T16:15:08.050", + "lastModified": "2024-09-05T17:44:56.007", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Aspera Faspex 5.0.0 through 5.0.9 could allow a user to bypass intended access restrictions and conduct resource modification." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-650" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7167255", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45098.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45098.json new file mode 100644 index 00000000000..9e1db06bada --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45098.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45098", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-09-05T16:15:08.283", + "lastModified": "2024-09-05T17:44:56.007", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Aspera Faspex 5.0.0 through 5.0.9 could allow a user to bypass intended access restrictions and conduct resource modification." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-650" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7167255", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45171.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45171.json new file mode 100644 index 00000000000..63c4feef871 --- /dev/null +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45171.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-45171", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-05T16:15:08.477", + "lastModified": "2024-09-05T17:44:56.007", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in za-internet C-MOR Video Surveillance 5.2401. Due to improper user input validation, it is possible to upload dangerous files, for instance PHP code, to the C-MOR system. By analyzing the C-MOR web interface, it was found out that the upload functionality for backup files allows an authenticated user to upload arbitrary files. The only condition is that the filename contains a .cbkf string. Therefore, webshell.cbkf.php is considered a valid file name for the C-MOR web application. Uploaded files are stored within the directory \"/srv/www/backups\" on the C-MOR system, and can thus be accessed via the URL https:///backup/upload_. Due to broken access control, low-privileged authenticated users can also use this file upload functionality." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-026.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://www.syss.de/pentest-blog/mehrere-sicherheitsschwachstellen-in-videoueberwachungssoftware-c-mor-syss-2024-020-bis-030", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45173.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45173.json index b5da6a76a31..b71aa35e355 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45173.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45173.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45173", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-05T15:15:16.680", - "lastModified": "2024-09-05T15:15:16.680", - "vulnStatus": "Received", + "lastModified": "2024-09-05T17:44:56.007", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45175.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45175.json new file mode 100644 index 00000000000..2cbfed477d0 --- /dev/null +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45175.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-45175", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-05T16:15:08.553", + "lastModified": "2024-09-05T17:44:56.007", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in za-internet C-MOR Video Surveillance 5.2401. Sensitive information is stored in cleartext. It was found out that sensitive information, for example login credentials of cameras, is stored in cleartext. Thus, an attacker with filesystem access, for example exploiting a path traversal attack, has access to the login data of all configured cameras, or the configured FTP server." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-028.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://www.syss.de/pentest-blog/mehrere-sicherheitsschwachstellen-in-videoueberwachungssoftware-c-mor-syss-2024-020-bis-030", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45176.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45176.json new file mode 100644 index 00000000000..d61c817c362 --- /dev/null +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45176.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-45176", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-05T16:15:08.630", + "lastModified": "2024-09-05T17:44:56.007", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in za-internet C-MOR Video Surveillance 5.2401. Due to improper input validation, the C-MOR web interface is vulnerable to reflected cross-site scripting (XSS) attacks. It was found out that different functions are prone to reflected cross-site scripting attacks due to insufficient user input validation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-020.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://www.syss.de/pentest-blog/mehrere-sicherheitsschwachstellen-in-videoueberwachungssoftware-c-mor-syss-2024-020-bis-030", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45178.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45178.json index 7bd28da207d..3a02f3b3c37 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45178.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45178.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45178", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-05T15:15:16.780", - "lastModified": "2024-09-05T15:15:16.780", - "vulnStatus": "Received", + "lastModified": "2024-09-05T17:44:56.007", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -11,7 +11,42 @@ "value": "An issue was discovered in za-internet C-MOR Video Surveillance 5.2401. Due to improper user input validation, it is possible to download arbitrary files from the C-MOR system via a path traversal attack. It was found out that different functionalities are vulnerable to path traversal attacks, due to insufficient user input validation. For instance, the download functionality for backups provided by the script download-bkf.pml is vulnerable to a path traversal attack via the parameter bkf. This enables an authenticated user to download arbitrary files as Linux user www-data from the C-MOR system. Another path traversal attack is in the script show-movies.pml, which can be exploited via the parameter cam." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-025.txt", diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45195.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45195.json index 9c5cf85d785..d17912778cf 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45195.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45195.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45195", "sourceIdentifier": "security@apache.org", "published": "2024-09-04T09:15:04.397", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:44:25.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,7 +15,30 @@ "value": "Vulnerabilidad Direct Request (\"Navegaci\u00f3n forzada\") en Apache OFBiz. Este problema afecta a Apache OFBiz: anterior a la versi\u00f3n 18.12.16. Se recomienda a los usuarios que actualicen a la versi\u00f3n 18.12.16, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -28,22 +51,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.12.16", + "matchCriteriaId": "51868E3D-516B-4DF1-8889-161D53E47ACE" + } + ] + } + ] + } + ], "references": [ { "url": "https://issues.apache.org/jira/browse/OFBIZ-13130", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://lists.apache.org/thread/o90dd9lbk1hh3t2557t2y2qvrh92p7wy", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://ofbiz.apache.org/download.html", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Product" + ] }, { "url": "https://ofbiz.apache.org/security.html", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45392.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45392.json new file mode 100644 index 00000000000..18aaa433d72 --- /dev/null +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45392.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-45392", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-09-05T17:15:12.807", + "lastModified": "2024-09-05T17:44:56.007", + "vulnStatus": "Undergoing Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SuiteCRM is an open-source customer relationship management (CRM) system. Prior to version 7.14.5 and 8.6.2, insufficient access control checks allow a threat actor to delete records via the API. Versions 7.14.5 and 8.6.2 contain a patch for the issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://docs.suitecrm.com/admin/releases/7.14.x/#_7_14_5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-8qfx-h7pm-2587", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45507.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45507.json index 82dd2a02c50..444808f136e 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45507.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45507.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45507", "sourceIdentifier": "security@apache.org", "published": "2024-09-04T09:15:04.520", - "lastModified": "2024-09-04T16:35:11.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:53:39.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -55,22 +75,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.12.16", + "matchCriteriaId": "51868E3D-516B-4DF1-8889-161D53E47ACE" + } + ] + } + ] + } + ], "references": [ { "url": "https://issues.apache.org/jira/browse/OFBIZ-13132", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Issue Tracking", + "Patch", + "Vendor Advisory" + ] }, { "url": "https://lists.apache.org/thread/o90dd9lbk1hh3t2557t2y2qvrh92p7wy", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://ofbiz.apache.org/download.html", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Product" + ] }, { "url": "https://ofbiz.apache.org/security.html", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45589.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45589.json new file mode 100644 index 00000000000..9ad8ae3bfa3 --- /dev/null +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45589.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-45589", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-05T16:15:08.737", + "lastModified": "2024-09-05T17:44:56.007", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "RapidIdentity LTS through 2023.0.2 and Cloud through 2024.08.0 improperly restricts excessive authentication attempts and allows a remote attacker to cause a denial of service via the username parameters." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://benrogozinski.github.io/CVE-2024-45589/", + "source": "cve@mitre.org" + }, + { + "url": "https://help.rapididentity.com/docs/rapididentity-lts-release-notes", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5067.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5067.json index eac708e187a..8129ea0d859 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5067.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5067.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5067", "sourceIdentifier": "cve@gitlab.com", "published": "2024-07-24T23:15:09.610", - "lastModified": "2024-07-25T12:36:39.947", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:29:32.287", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -51,22 +81,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.11", + "versionEndExcluding": "17.0.5", + "matchCriteriaId": "2BF8BC38-C7F7-4123-A27A-0E77FBC9709E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.1", + "versionEndExcluding": "17.1.3", + "matchCriteriaId": "08FB7225-89F0-46D7-81AB-003D5D3BE137" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.2", + "versionEndExcluding": "17.2.1", + "matchCriteriaId": "579D177F-35DB-4988-82DD-0A5AA1AEDBA1" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/458504", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/462427", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://hackerone.com/reports/2462303", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://hackerone.com/reports/2502047", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6148.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6148.json index f018b154e88..512a809929f 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6148.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6148.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6148", "sourceIdentifier": "secure@citrix.com", "published": "2024-07-10T21:15:10.730", - "lastModified": "2024-07-11T13:05:54.930", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-05T17:51:48.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,12 +59,68 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:citrix:workspace:*:*:*:*:*:html5:*:*", + "versionEndExcluding": "2404.1", + "matchCriteriaId": "D74AF5CA-6403-4E3A-B651-C1C28389C562" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.citrix.com/article/CTX678037", - "source": "secure@citrix.com" + "source": "secure@citrix.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6945.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6945.json index 143ec3fdfaf..9a1d018afee 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6945.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6945.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6945", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-21T08:15:07.140", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T16:14:31.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:flute-cms:flute:0.2.2.4:alpha:*:*:*:*:*:*", + "matchCriteriaId": "3CA6F1D1-169A-4F33-9CD4-38470172278E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/DeepMountains/Mirage/blob/main/CVE5-1.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.272067", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.272067", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.375189", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6946.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6946.json index 52cf1680d9d..b192ab2073d 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6946.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6946.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6946", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-21T09:15:02.353", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T16:14:28.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:flute-cms:flute:0.2.2.4:alpha:*:*:*:*:*:*", + "matchCriteriaId": "3CA6F1D1-169A-4F33-9CD4-38470172278E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/DeepMountains/Mirage/blob/main/CVE5-2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.272068", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.272068", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.375214", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6947.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6947.json index 68ad49dc04e..353c0223c84 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6947.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6947.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6947", "sourceIdentifier": "cna@vuldb.com", "published": "2024-07-21T09:15:03.267", - "lastModified": "2024-07-22T13:00:31.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T16:14:25.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:flute-cms:flute:0.2.2.4:alpha:*:*:*:*:*:*", + "matchCriteriaId": "3CA6F1D1-169A-4F33-9CD4-38470172278E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/DeepMountains/Mirage/blob/main/CVE5-3.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.272069", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.272069", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.376785", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7057.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7057.json index c8a9b09d563..ad6f911752c 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7057.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7057.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7057", "sourceIdentifier": "cve@gitlab.com", "published": "2024-07-25T01:15:10.040", - "lastModified": "2024-07-25T12:36:39.947", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:33:21.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -51,14 +81,74 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "16.7", + "versionEndExcluding": "17.0.5", + "matchCriteriaId": "7D2AF178-30AD-4287-A7BE-881FBF897438" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "16.7", + "versionEndExcluding": "17.0.5", + "matchCriteriaId": "B7B134A8-6F60-4450-A98C-857ED5AD5BFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.1", + "versionEndExcluding": "17.1.3", + "matchCriteriaId": "2AAB2105-E23B-4B5B-B1FB-63E2B406C15D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.1", + "versionEndExcluding": "17.1.3", + "matchCriteriaId": "08FB7225-89F0-46D7-81AB-003D5D3BE137" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.2", + "versionEndExcluding": "17.2.1", + "matchCriteriaId": "BDEB6BD0-A0F9-4ECD-8BB1-DAD86FDB23DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.2", + "versionEndExcluding": "17.2.1", + "matchCriteriaId": "579D177F-35DB-4988-82DD-0A5AA1AEDBA1" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/458501", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://hackerone.com/reports/2475135", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7060.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7060.json index 768dbdce92c..25d24686b38 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7060.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7060.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7060", "sourceIdentifier": "cve@gitlab.com", "published": "2024-07-24T23:15:09.817", - "lastModified": "2024-07-25T12:36:39.947", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:30:34.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -51,10 +81,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "15.4", + "versionEndExcluding": "17.0.5", + "matchCriteriaId": "7B522ADA-8F6C-4824-8FE9-502D1DB8073A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "15.4", + "versionEndExcluding": "17.0.5", + "matchCriteriaId": "D429C82D-08BB-4729-B81E-9694960DA273" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.1", + "versionEndExcluding": "17.1.3", + "matchCriteriaId": "2AAB2105-E23B-4B5B-B1FB-63E2B406C15D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.1", + "versionEndExcluding": "17.1.3", + "matchCriteriaId": "08FB7225-89F0-46D7-81AB-003D5D3BE137" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.2", + "versionEndExcluding": "17.2.1", + "matchCriteriaId": "BDEB6BD0-A0F9-4ECD-8BB1-DAD86FDB23DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.2", + "versionEndExcluding": "17.2.1", + "matchCriteriaId": "579D177F-35DB-4988-82DD-0A5AA1AEDBA1" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/437894", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7091.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7091.json index 295b53f88cb..642bd3a4f8d 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7091.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7091.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7091", "sourceIdentifier": "cve@gitlab.com", "published": "2024-07-24T23:15:10.013", - "lastModified": "2024-07-25T12:36:39.947", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:32:20.553", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 1.4 + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "cve@gitlab.com", "type": "Secondary", @@ -51,10 +81,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "15.6", + "versionEndExcluding": "17.0.5", + "matchCriteriaId": "54882984-51EE-4D34-85F3-95446D04F86B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "15.6", + "versionEndExcluding": "17.0.5", + "matchCriteriaId": "7714A7CC-0AB7-4381-8F8F-A80685E39DC0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.1", + "versionEndExcluding": "17.1.3", + "matchCriteriaId": "2AAB2105-E23B-4B5B-B1FB-63E2B406C15D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.1", + "versionEndExcluding": "17.1.3", + "matchCriteriaId": "08FB7225-89F0-46D7-81AB-003D5D3BE137" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", + "versionStartIncluding": "17.2", + "versionEndExcluding": "17.2.1", + "matchCriteriaId": "BDEB6BD0-A0F9-4ECD-8BB1-DAD86FDB23DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "17.2", + "versionEndExcluding": "17.2.1", + "matchCriteriaId": "579D177F-35DB-4988-82DD-0A5AA1AEDBA1" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/408469", - "source": "cve@gitlab.com" + "source": "cve@gitlab.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7834.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7834.json index 3373e0eb6d0..0b3bdfd2810 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7834.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7834.json @@ -2,17 +2,41 @@ "id": "CVE-2024-7834", "sourceIdentifier": "a341c0d1-ebf7-493f-a84e-38cf86618674", "published": "2024-09-04T13:15:07.030", - "lastModified": "2024-09-04T16:09:24.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:52:06.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A local privilege escalation is caused by Overwolf\nloading and executing certain dynamic link library files from a user-writeable\nfolder in SYSTEM context on launch. This allows an attacker with unprivileged\naccess to the system to run arbitrary code with SYSTEM privileges by placing a\nmalicious .dll file in the respective location." + }, + { + "lang": "es", + "value": "Una escalada de privilegios locales se produce cuando Overwolf carga y ejecuta determinados archivos de librer\u00eda de v\u00ednculos din\u00e1micos desde una carpeta que permite la escritura del usuario en el contexto del SYSTEM al iniciarse. Esto permite que un atacante con acceso sin privilegios al sistema ejecute c\u00f3digo arbitrario con privilegios del SYSTEM colocando un archivo .dll malicioso en la ubicaci\u00f3n correspondiente." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "a341c0d1-ebf7-493f-a84e-38cf86618674", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + }, { "source": "a341c0d1-ebf7-493f-a84e-38cf86618674", "type": "Secondary", @@ -47,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:overwolf:overwolf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "250.1.1", + "matchCriteriaId": "CA50C3FD-7195-4480-B383-1340702378BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cirosec.de/sa/sa-2024-004", - "source": "a341c0d1-ebf7-493f-a84e-38cf86618674" + "source": "a341c0d1-ebf7-493f-a84e-38cf86618674", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7884.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7884.json index c5526b1eb1f..67f82b36357 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7884.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7884.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7884", "sourceIdentifier": "6b35d637-e00f-4228-858c-b20ad6e1d07b", "published": "2024-09-05T13:15:11.390", - "lastModified": "2024-09-05T13:15:11.390", - "vulnStatus": "Received", + "lastModified": "2024-09-05T17:45:07.877", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8289.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8289.json index 0f5eead8c00..ebddafba5a4 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8289.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8289.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8289", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-04T09:15:04.977", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:41:58.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,26 +51,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:multivendorx:multivendorx:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.2.1", + "matchCriteriaId": "39E4105E-53C3-4F72-8E05-1F0632E3E123" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.0/api/class-mvx-rest-vendors-controller.php#L382", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.0/api/class-mvx-rest-vendors-controller.php#L641", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.0/api/class-mvx-rest-vendors-controller.php#L705", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/trunk/api/class-mvx-rest-vendors-controller.php?rev=3145638", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a85fbaff-d566-4ed2-8943-c174e0c4d2d8?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8413.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8413.json index 503307c9220..a75bbfb950a 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8413.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8413.json @@ -2,17 +2,41 @@ "id": "CVE-2024-8413", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-09-04T11:15:12.780", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-05T17:40:36.953", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting (XSS) vulnerability through the action parameter in index.php. Affected product codebase https://github.com/Bioshox/Raspcontrol and forks such as https://github.com/harmon25/raspcontrol . An attacker could exploit this vulnerability by sending a specially crafted JavaScript payload to an authenticated user and partially hijacking their session details.\n\nReferences list" + }, + { + "lang": "es", + "value": "Vulnerabilidad de cross site scripting (XSS) a trav\u00e9s del par\u00e1metro action en index.php. C\u00f3digo base del producto afectado https://github.com/Bioshox/Raspcontrol y bifurcaciones como https://github.com/harmon25/raspcontrol. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando un payload de JavaScript especialmente manipulado a un usuario autenticado y secuestrando parcialmente los detalles de su sesi\u00f3n. Lista de referencias" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -47,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:raspcontrol_project:raspcontrol:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3292D8A2-245A-46AB-8E3F-687C66498853" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-xss-raspcontrol", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8445.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8445.json index 5b666c453b8..19bc446ed56 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8445.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8445.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8445", "sourceIdentifier": "secalert@redhat.com", "published": "2024-09-05T15:15:16.927", - "lastModified": "2024-09-05T15:15:16.927", - "vulnStatus": "Received", + "lastModified": "2024-09-05T17:44:56.007", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8461.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8461.json index 87ff7a5222a..63b6d881778 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8461.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8461.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8461", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-05T13:15:11.690", - "lastModified": "2024-09-05T13:15:11.690", - "vulnStatus": "Received", + "lastModified": "2024-09-05T17:45:07.877", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8462.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8462.json index a8bd318e7e0..a56bfdc07c9 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8462.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8462.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8462", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-05T13:15:12.050", - "lastModified": "2024-09-05T13:15:12.050", - "vulnStatus": "Received", + "lastModified": "2024-09-05T17:45:07.877", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8463.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8463.json index 1675e81a195..367d3f9fbf3 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8463.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8463.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8463", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-09-05T13:15:12.440", - "lastModified": "2024-09-05T13:15:12.440", - "vulnStatus": "Received", + "lastModified": "2024-09-05T17:45:07.877", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8464.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8464.json index 1d23a169a5f..71a9bc25772 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8464.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8464.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8464", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-09-05T13:15:12.730", - "lastModified": "2024-09-05T13:15:12.730", - "vulnStatus": "Received", + "lastModified": "2024-09-05T17:45:07.877", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8465.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8465.json index 974e23a8430..9b7db9567b6 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8465.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8465.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8465", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-09-05T13:15:13.020", - "lastModified": "2024-09-05T13:15:13.020", - "vulnStatus": "Received", + "lastModified": "2024-09-05T17:45:07.877", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8466.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8466.json index 767c34a95b3..47d1d315d5a 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8466.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8466.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8466", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-09-05T13:15:13.370", - "lastModified": "2024-09-05T13:15:13.370", - "vulnStatus": "Received", + "lastModified": "2024-09-05T17:45:07.877", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8467.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8467.json index db109018d0e..1c706252b46 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8467.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8467.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8467", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-09-05T13:15:13.680", - "lastModified": "2024-09-05T13:15:13.680", - "vulnStatus": "Received", + "lastModified": "2024-09-05T17:45:07.877", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8468.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8468.json index 2bdf5e58120..61964230dd6 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8468.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8468.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8468", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-09-05T13:15:13.943", - "lastModified": "2024-09-05T13:15:13.943", - "vulnStatus": "Received", + "lastModified": "2024-09-05T17:45:07.877", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8469.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8469.json index 508dc51c5e9..8469e069bdd 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8469.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8469.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8469", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-09-05T13:15:14.220", - "lastModified": "2024-09-05T13:15:14.220", - "vulnStatus": "Received", + "lastModified": "2024-09-05T17:45:07.877", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8470.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8470.json index f799a2ba1d5..aba5c19d130 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8470.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8470.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8470", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-09-05T13:15:14.490", - "lastModified": "2024-09-05T13:15:14.490", - "vulnStatus": "Received", + "lastModified": "2024-09-05T17:45:07.877", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8471.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8471.json index 9ca65e51f85..dd8eb2c4d87 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8471.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8471.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8471", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-09-05T13:15:14.777", - "lastModified": "2024-09-05T13:15:14.777", - "vulnStatus": "Received", + "lastModified": "2024-09-05T17:44:56.007", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8472.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8472.json index 0394e15944d..62eeb53683e 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8472.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8472.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8472", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-09-05T13:15:15.053", - "lastModified": "2024-09-05T13:15:15.053", - "vulnStatus": "Received", + "lastModified": "2024-09-05T17:44:56.007", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8473.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8473.json index 72eb071b11d..43bf780d147 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8473.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8473.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8473", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-09-05T13:15:15.330", - "lastModified": "2024-09-05T13:15:15.330", - "vulnStatus": "Received", + "lastModified": "2024-09-05T17:44:56.007", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/README.md b/README.md index 30fc129d7ee..169266fe8f6 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-05T16:00:18.072175+00:00 +2024-09-05T18:00:18.857841+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-05T15:51:34.307000+00:00 +2024-09-05T17:59:36.770000+00:00 ``` ### Last Data Feed Release @@ -33,48 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -262014 +262027 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `13` -- [CVE-2024-44587](CVE-2024/CVE-2024-445xx/CVE-2024-44587.json) (`2024-09-05T14:15:10.700`) -- [CVE-2024-45173](CVE-2024/CVE-2024-451xx/CVE-2024-45173.json) (`2024-09-05T15:15:16.680`) -- [CVE-2024-45178](CVE-2024/CVE-2024-451xx/CVE-2024-45178.json) (`2024-09-05T15:15:16.780`) -- [CVE-2024-8445](CVE-2024/CVE-2024-84xx/CVE-2024-8445.json) (`2024-09-05T15:15:16.927`) +- [CVE-2023-51712](CVE-2023/CVE-2023-517xx/CVE-2023-51712.json) (`2024-09-05T16:15:06.970`) +- [CVE-2024-24759](CVE-2024/CVE-2024-247xx/CVE-2024-24759.json) (`2024-09-05T17:15:12.380`) +- [CVE-2024-42885](CVE-2024/CVE-2024-428xx/CVE-2024-42885.json) (`2024-09-05T16:15:07.720`) +- [CVE-2024-44727](CVE-2024/CVE-2024-447xx/CVE-2024-44727.json) (`2024-09-05T17:15:12.617`) +- [CVE-2024-44728](CVE-2024/CVE-2024-447xx/CVE-2024-44728.json) (`2024-09-05T17:15:12.730`) +- [CVE-2024-45096](CVE-2024/CVE-2024-450xx/CVE-2024-45096.json) (`2024-09-05T16:15:07.810`) +- [CVE-2024-45097](CVE-2024/CVE-2024-450xx/CVE-2024-45097.json) (`2024-09-05T16:15:08.050`) +- [CVE-2024-45098](CVE-2024/CVE-2024-450xx/CVE-2024-45098.json) (`2024-09-05T16:15:08.283`) +- [CVE-2024-45171](CVE-2024/CVE-2024-451xx/CVE-2024-45171.json) (`2024-09-05T16:15:08.477`) +- [CVE-2024-45175](CVE-2024/CVE-2024-451xx/CVE-2024-45175.json) (`2024-09-05T16:15:08.553`) +- [CVE-2024-45176](CVE-2024/CVE-2024-451xx/CVE-2024-45176.json) (`2024-09-05T16:15:08.630`) +- [CVE-2024-45392](CVE-2024/CVE-2024-453xx/CVE-2024-45392.json) (`2024-09-05T17:15:12.807`) +- [CVE-2024-45589](CVE-2024/CVE-2024-455xx/CVE-2024-45589.json) (`2024-09-05T16:15:08.737`) ### CVEs modified in the last Commit -Recently modified CVEs: `73` - -- [CVE-2024-43943](CVE-2024/CVE-2024-439xx/CVE-2024-43943.json) (`2024-09-05T15:10:48.663`) -- [CVE-2024-43957](CVE-2024/CVE-2024-439xx/CVE-2024-43957.json) (`2024-09-05T14:49:17.983`) -- [CVE-2024-43961](CVE-2024/CVE-2024-439xx/CVE-2024-43961.json) (`2024-09-05T14:39:38.957`) -- [CVE-2024-44819](CVE-2024/CVE-2024-448xx/CVE-2024-44819.json) (`2024-09-05T14:40:07.637`) -- [CVE-2024-45288](CVE-2024/CVE-2024-452xx/CVE-2024-45288.json) (`2024-09-05T14:35:25.337`) -- [CVE-2024-45506](CVE-2024/CVE-2024-455xx/CVE-2024-45506.json) (`2024-09-05T14:39:49.807`) -- [CVE-2024-45522](CVE-2024/CVE-2024-455xx/CVE-2024-45522.json) (`2024-09-05T14:29:32.737`) -- [CVE-2024-45692](CVE-2024/CVE-2024-456xx/CVE-2024-45692.json) (`2024-09-05T14:35:25.643`) -- [CVE-2024-6343](CVE-2024/CVE-2024-63xx/CVE-2024-6343.json) (`2024-09-05T14:35:34.780`) -- [CVE-2024-6473](CVE-2024/CVE-2024-64xx/CVE-2024-6473.json) (`2024-09-05T14:19:45.153`) -- [CVE-2024-6498](CVE-2024/CVE-2024-64xx/CVE-2024-6498.json) (`2024-09-05T15:30:12.140`) -- [CVE-2024-6710](CVE-2024/CVE-2024-67xx/CVE-2024-6710.json) (`2024-09-05T15:30:07.570`) -- [CVE-2024-6846](CVE-2024/CVE-2024-68xx/CVE-2024-6846.json) (`2024-09-05T14:35:26.730`) -- [CVE-2024-7076](CVE-2024/CVE-2024-70xx/CVE-2024-7076.json) (`2024-09-05T14:39:32.487`) -- [CVE-2024-7077](CVE-2024/CVE-2024-70xx/CVE-2024-7077.json) (`2024-09-05T14:39:17.510`) -- [CVE-2024-7078](CVE-2024/CVE-2024-70xx/CVE-2024-7078.json) (`2024-09-05T14:38:46.947`) -- [CVE-2024-7203](CVE-2024/CVE-2024-72xx/CVE-2024-7203.json) (`2024-09-05T14:33:17.567`) -- [CVE-2024-7345](CVE-2024/CVE-2024-73xx/CVE-2024-7345.json) (`2024-09-05T14:11:00.493`) -- [CVE-2024-7346](CVE-2024/CVE-2024-73xx/CVE-2024-7346.json) (`2024-09-05T14:03:24.040`) -- [CVE-2024-8407](CVE-2024/CVE-2024-84xx/CVE-2024-8407.json) (`2024-09-05T14:48:28.513`) -- [CVE-2024-8408](CVE-2024/CVE-2024-84xx/CVE-2024-8408.json) (`2024-09-05T14:41:14.603`) -- [CVE-2024-8409](CVE-2024/CVE-2024-84xx/CVE-2024-8409.json) (`2024-09-05T14:20:27.397`) -- [CVE-2024-8410](CVE-2024/CVE-2024-84xx/CVE-2024-8410.json) (`2024-09-05T14:20:08.100`) -- [CVE-2024-8411](CVE-2024/CVE-2024-84xx/CVE-2024-8411.json) (`2024-09-05T14:19:38.377`) -- [CVE-2024-8418](CVE-2024/CVE-2024-84xx/CVE-2024-8418.json) (`2024-09-05T14:18:49.537`) +Recently modified CVEs: `101` + +- [CVE-2024-6148](CVE-2024/CVE-2024-61xx/CVE-2024-6148.json) (`2024-09-05T17:51:48.560`) +- [CVE-2024-6945](CVE-2024/CVE-2024-69xx/CVE-2024-6945.json) (`2024-09-05T16:14:31.237`) +- [CVE-2024-6946](CVE-2024/CVE-2024-69xx/CVE-2024-6946.json) (`2024-09-05T16:14:28.857`) +- [CVE-2024-6947](CVE-2024/CVE-2024-69xx/CVE-2024-6947.json) (`2024-09-05T16:14:25.513`) +- [CVE-2024-7057](CVE-2024/CVE-2024-70xx/CVE-2024-7057.json) (`2024-09-05T17:33:21.630`) +- [CVE-2024-7060](CVE-2024/CVE-2024-70xx/CVE-2024-7060.json) (`2024-09-05T17:30:34.897`) +- [CVE-2024-7091](CVE-2024/CVE-2024-70xx/CVE-2024-7091.json) (`2024-09-05T17:32:20.553`) +- [CVE-2024-7834](CVE-2024/CVE-2024-78xx/CVE-2024-7834.json) (`2024-09-05T17:52:06.147`) +- [CVE-2024-7884](CVE-2024/CVE-2024-78xx/CVE-2024-7884.json) (`2024-09-05T17:45:07.877`) +- [CVE-2024-8289](CVE-2024/CVE-2024-82xx/CVE-2024-8289.json) (`2024-09-05T17:41:58.350`) +- [CVE-2024-8413](CVE-2024/CVE-2024-84xx/CVE-2024-8413.json) (`2024-09-05T17:40:36.953`) +- [CVE-2024-8445](CVE-2024/CVE-2024-84xx/CVE-2024-8445.json) (`2024-09-05T17:44:56.007`) +- [CVE-2024-8461](CVE-2024/CVE-2024-84xx/CVE-2024-8461.json) (`2024-09-05T17:45:07.877`) +- [CVE-2024-8462](CVE-2024/CVE-2024-84xx/CVE-2024-8462.json) (`2024-09-05T17:45:07.877`) +- [CVE-2024-8463](CVE-2024/CVE-2024-84xx/CVE-2024-8463.json) (`2024-09-05T17:45:07.877`) +- [CVE-2024-8464](CVE-2024/CVE-2024-84xx/CVE-2024-8464.json) (`2024-09-05T17:45:07.877`) +- [CVE-2024-8465](CVE-2024/CVE-2024-84xx/CVE-2024-8465.json) (`2024-09-05T17:45:07.877`) +- [CVE-2024-8466](CVE-2024/CVE-2024-84xx/CVE-2024-8466.json) (`2024-09-05T17:45:07.877`) +- [CVE-2024-8467](CVE-2024/CVE-2024-84xx/CVE-2024-8467.json) (`2024-09-05T17:45:07.877`) +- [CVE-2024-8468](CVE-2024/CVE-2024-84xx/CVE-2024-8468.json) (`2024-09-05T17:45:07.877`) +- [CVE-2024-8469](CVE-2024/CVE-2024-84xx/CVE-2024-8469.json) (`2024-09-05T17:45:07.877`) +- [CVE-2024-8470](CVE-2024/CVE-2024-84xx/CVE-2024-8470.json) (`2024-09-05T17:45:07.877`) +- [CVE-2024-8471](CVE-2024/CVE-2024-84xx/CVE-2024-8471.json) (`2024-09-05T17:44:56.007`) +- [CVE-2024-8472](CVE-2024/CVE-2024-84xx/CVE-2024-8472.json) (`2024-09-05T17:44:56.007`) +- [CVE-2024-8473](CVE-2024/CVE-2024-84xx/CVE-2024-8473.json) (`2024-09-05T17:44:56.007`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 08927350113..7258a4e8063 100644 --- a/_state.csv +++ b/_state.csv @@ -63236,7 +63236,7 @@ CVE-2013-6035,0,0,775726e13f770be8e4305b75cdd6ea38eaa601570c2991730a6297eb395b9b CVE-2013-6037,0,0,e7ecd503cfe6b686e1142c885888ea643ebeb786d9bb5281ae7a57acf3ca414a,2016-12-31T02:59:07.687000 CVE-2013-6038,0,0,1eb3fe605cb6e32064ef67782b90123621dcacc45dc2e4d68d845361b01f7eaf,2015-07-27T16:09:40.523000 CVE-2013-6039,0,0,aecbf28cd9c970cff6454e7b012dbee0a990eb064595b6b0164df3f8d164d771,2024-02-14T01:17:43.863000 -CVE-2013-6040,0,1,af3c73914d4f14cdc3e2093458d2882cd69a0787ffaec72196f9e625ecf76b79,2024-09-05T15:35:01.510000 +CVE-2013-6040,0,0,af3c73914d4f14cdc3e2093458d2882cd69a0787ffaec72196f9e625ecf76b79,2024-09-05T15:35:01.510000 CVE-2013-6041,0,0,66b1276a1ed99c3b9afde3354a4acf095029c592a80b2b9b0a32c9280811a520,2023-11-07T02:16:49.753000 CVE-2013-6042,0,0,0118fde54ee9e1aaecdd5ab66ff698df1b114b4cc877bce9cd00024170f7af1f,2023-11-07T02:16:49.807000 CVE-2013-6043,0,0,40fc49befa81a86e789c7fafa3e9aa4decc75838002c98d756300127b6c72bb8,2023-11-07T02:16:49.867000 @@ -154845,7 +154845,7 @@ CVE-2020-25655,0,0,e805a4e8dd952dce03a4ceed95f584444e1f5547d09390f25dd1dee93742e CVE-2020-25656,0,0,923f99456dc866a46261cd52c92b9e8c7b624548d49c3b8d3a9fbca5852fdc8f,2022-10-25T17:03:04.803000 CVE-2020-25657,0,0,ef75569b9a4e89e230c33f10a7b600a631ae8f063adbfb3cffdaec8ec7c9f589,2023-02-12T23:40:35.250000 CVE-2020-25658,0,0,52a1677685adf1c8de34af89b36e60d2d3fb3bac5335aa1b88cdd46c81e6b575,2023-02-12T23:40:35.463000 -CVE-2020-25659,0,0,5264c1b15939eb7681e9de6129ed62f50494f76dd158fa0282dc946a735cbafb,2023-02-09T02:25:50.887000 +CVE-2020-25659,0,1,eaf9b4aed2111b6494d8e721d23261704576caccd1fcd3a29b5917e2c100089a,2024-09-05T16:10:54.837000 CVE-2020-2566,0,0,5b3ace010328f69aa0712dda4da40d0e0f2a31b0e8293d37a32488aa3f00954d,2022-07-28T14:30:14.633000 CVE-2020-25660,0,0,8c440c4bb5dcd6c3968a4d737281c44e67233098d63c1771be9085669c2ed894,2023-11-07T03:20:20.120000 CVE-2020-25661,0,0,5e37c12faa8c3233f4aa1eceeef0dafee1c804852c074ab07a40bffcf72e011c,2023-02-12T23:40:35.860000 @@ -158840,7 +158840,7 @@ CVE-2020-36239,0,0,7b41ba7657ad73626dbdd86511b12d7f0170fd52dcfe35bd88b348cf3ed32 CVE-2020-3624,0,0,fc401c04769ad298ed6d3d2a6901ccde918f4132bfb35a25f7ed968bb6eaf41d,2020-09-10T13:22:35.710000 CVE-2020-36240,0,0,0a497f4d578072de340d2581f170cb8868527fd5785c43e1a9901dd077bfdbfe,2021-07-21T11:39:23.747000 CVE-2020-36241,0,0,f0aa7d0d8a8729b6e05784c98a61b71e3dcbda017b1970dbd8cf6428dbc8d84a,2023-11-07T03:22:08.167000 -CVE-2020-36242,0,0,8535ee6d541d8daf3aa8f4f8755fdfa2eba1748b33dd29bc816f3643fdda2ebf,2023-11-07T03:22:08.227000 +CVE-2020-36242,0,1,ad732bb2f49acc4a1bb3d22394ed60e61466a8436e7bcecae9597b6065590b9c,2024-09-05T16:09:10.430000 CVE-2020-36243,0,0,9ffbcf5c05c27cf2ab62212d25780e02045f859df907e11ee405a2ee94f4ecb6,2021-06-01T17:44:28.520000 CVE-2020-36244,0,0,44f221c538c58ea366b8b17522360a1659646f2bc396f303f7b5023ed65e6287,2023-02-03T19:12:53.277000 CVE-2020-36245,0,0,75d791c44f5f85789d19cec2bae3f6dcfc3d9f2e93847ea4e7a45cc028b94fd7,2021-07-21T11:39:23.747000 @@ -184405,7 +184405,7 @@ CVE-2021-43412,0,0,f5122fa10b04458d8ed190bf0b35102d42b14ee953281e17cb9350b117594 CVE-2021-43413,0,0,0cf50d4f641ec57243ec112dab745e427fda2f9dcd522da1ffb8e77395f22060,2023-11-07T03:39:21.430000 CVE-2021-43414,0,0,beedab7c75b4791837ad90dd052c3adda3ca2a531ed3d6c3a0ed05d50ac048a0,2023-11-07T03:39:21.500000 CVE-2021-43415,0,0,de8ea67f48311a98cb001e5923250a085de1adee5bf6f4de4ac4c692027c3884,2023-08-08T14:22:24.967000 -CVE-2021-43419,0,1,d504ab8d0bd90599f85c5002624b756e1989180f52724839158341d7ba70df2c,2024-09-05T14:35:00.810000 +CVE-2021-43419,0,0,d504ab8d0bd90599f85c5002624b756e1989180f52724839158341d7ba70df2c,2024-09-05T14:35:00.810000 CVE-2021-4342,0,0,eb220707e5b4c23c1981453f4b46e19824a6936b9c596d62f035ae22dd422837,2023-11-07T03:40:44.530000 CVE-2021-43420,0,0,921f48704fd079c6cb930f07c241563efa1162b559cc80bf25b902b89d7b32c9,2022-01-28T16:04:09.437000 CVE-2021-43421,0,0,689d5005af82d8d89b94ff2b83406c3c05290a294720251cca69332558142dc9,2022-04-13T20:30:14.030000 @@ -209906,7 +209906,7 @@ CVE-2022-45353,0,0,631d554df701d545c39878504ec13f5720a80f2ff385cc119e07649803a1a CVE-2022-45354,0,0,0467d7754c39fcacebcfbaec32f82bb31c17a2cd4a7498ebec3fb77f02cd7528,2024-01-11T19:57:20.993000 CVE-2022-45355,0,0,5721e0942b249dd7366274253ee35809bdc61b9ba6a7d572512b0b5a9b502055,2023-11-07T03:54:41.470000 CVE-2022-45356,0,0,83d350876a752cf437706a31e7b556fbd4ba9f694279a4ae3a851d5f8ede07a9,2024-03-25T13:47:14.087000 -CVE-2022-45357,0,1,21d43b7a755c7d5d1e989bd624eff534f65e03ba8f59e265603d540432138759,2024-09-05T15:35:03.913000 +CVE-2022-45357,0,0,21d43b7a755c7d5d1e989bd624eff534f65e03ba8f59e265603d540432138759,2024-09-05T15:35:03.913000 CVE-2022-45358,0,0,3911a0bf538e0bb63700317c3e40c1399df5a5b8310bd2286fe64f1f8d3d9368,2023-04-21T17:32:07.110000 CVE-2022-45359,0,0,3760be0513103df2975a6720e1826f81f6477a84252afc56ef231a1f72dc9801,2023-11-07T03:54:41.697000 CVE-2022-4536,0,0,8925c3b6d13b2b459b0ca7ff3425f95b73f13eff279533a27193713eafdac9e5,2024-09-03T12:59:02.453000 @@ -210239,7 +210239,7 @@ CVE-2022-45801,0,0,c808b2aef48cf39acc9dd41dac44a882f25b2fe23e6cda4e5fbaf8d0cb604 CVE-2022-45802,0,0,eaf1e2dfd0d966e6ae0663c2dccbfda6fe4dbaa6ca30e730e8dfd62fbbf8711d,2023-06-26T11:15:09.653000 CVE-2022-45803,0,0,efa1db42f69eee0460aade15ad353e13136adedd726800a1f2e310c8a9bb1912,2024-06-24T18:51:29.867000 CVE-2022-45804,0,0,320bcdc47b31f62d100a1cee6d46af8afbbc9a8e64e32f0dc990e728420bbadd,2023-11-07T03:54:50.113000 -CVE-2022-45805,0,0,456f7f03159dc3ef482452f41c480ada079d0e4a33176a7ff8ceadfc4b26e005,2023-11-09T19:17:27.470000 +CVE-2022-45805,0,1,fb0d479c9f7c3034cbd768e43f49157483a4b989ea9762df48bb49bb75471a89,2024-09-05T16:35:01.640000 CVE-2022-45807,0,0,5830d2d6b8c0118a933b424c04c9d33d9c4b6d8d4315937e0a490664dfcff809,2023-11-07T03:54:50.343000 CVE-2022-45808,0,0,f0992aaefa1bb485183a097d0a3443361d7eb97bad85ef726e7af080fcc9bc37,2023-11-07T03:54:50.520000 CVE-2022-45809,0,0,ad9b0991c605802b6f7a2b87420a3b262e2c0930ec91e9b19bc01ed3260503df,2023-12-22T20:38:04.883000 @@ -211500,7 +211500,7 @@ CVE-2022-47581,0,0,31a371bb55d699f8f9855cd1db50625c68028eb5659869e77981781f0cbad CVE-2022-47583,0,0,707f2cdab19bfa5285cf1bce776affd7887e366bd3220edb557a074f0fe1111c,2023-10-25T19:46:29.443000 CVE-2022-47586,0,0,9e6d0008a00adf0357bc05e23683b5e87a69def2fe444756ab63911e9bced78e,2023-06-27T13:52:24.327000 CVE-2022-47587,0,0,a76f98a79f6aa55a8e39607aafd2ac067b1f72911ae7a478fbba6ea62fd2e3fd,2023-05-16T19:06:11.433000 -CVE-2022-47588,0,0,8ee6490ef5c0ad3f764eccbb13c185232611c0589d91cc5f37a6e00018fe614d,2023-11-13T18:29:39.327000 +CVE-2022-47588,0,1,3a444d609756502c83c2d83bf25240ac7c789e7683f2b911e52f7c98f197dbcc,2024-09-05T16:35:02.347000 CVE-2022-47589,0,0,5e5d900b629606eb67c9181960f70fece43dfc9ac467920c50504cb91aad21db,2023-11-07T03:56:21.283000 CVE-2022-4759,0,0,71dd0fd35b7681e98fea353e60d1951250cc13d8c625e0bfac37dd78aac8700b,2023-11-07T03:58:49.920000 CVE-2022-47590,0,0,f8d07b1dd916c17de7d0fb6370862e3f4580e6c3718bb3cf08f6c586ca0d1094,2023-05-16T18:59:23.210000 @@ -212406,7 +212406,7 @@ CVE-2022-48873,0,0,126f5bc7205e96dcf9533a79fc89b99529bbfd5ccd8d6cb5c8905ec1069b3 CVE-2022-48874,0,0,b7c8e23068e04a991fde0d03cbdf1c4f3ccb10a413c897663da1c235e44314de,2024-08-29T02:42:02.070000 CVE-2022-48875,0,0,e2caa42e0dd6ec750fd9e46e92848849f463307e55477fd45d25751b4883f44b,2024-09-04T18:33:03.537000 CVE-2022-48876,0,0,dd7145c2e72a17454bb985d184ad79104309aabd2355fce75e49acbb3b771a5f,2024-08-29T02:41:34.627000 -CVE-2022-48877,0,0,d0140bada1488aff185a55a8ff5dbe996bed08880b8d163988e4a2d24f486b98,2024-08-21T12:30:33.697000 +CVE-2022-48877,0,1,d11f54e8721d999f4010dfed035c745a1f00d9c38d8712ff13d3d913ec9b5e66,2024-09-05T17:47:28.647000 CVE-2022-48878,0,0,dc5ce0bd32b8ccb2332f1196b92e2e8459522ffb0a315cbb495d373067aaa0dd,2024-08-29T02:39:54.480000 CVE-2022-48879,0,0,d5d8344aef841ed4cf0ad0cf8bbf51494ab02f4264415fbe94c42e89bb1db8e0,2024-08-29T02:39:34.370000 CVE-2022-4888,0,0,b679e23092f1369239dc0dfe1d4aeef981e952b9db5ffb43ed815e206bd3f53d,2023-11-07T03:59:13.600000 @@ -214923,7 +214923,7 @@ CVE-2023-20698,0,0,725fd3f54be0034b5dd927b804dd5c07af977d3ce59c29d59141be3b76d8f CVE-2023-20699,0,0,d76c1f33dd6f295d2816cee3b61ba84bd8f1396a165e91797836e2aade8b5b67,2023-05-22T17:56:06.320000 CVE-2023-20700,0,0,d3d02cee88168788b222b43135952f8320e029d214772924441a66d4e89a2e98,2023-05-22T17:55:48.497000 CVE-2023-20701,0,0,bfda2dc01e7428ddc1c4937a195f6f8250e1e6598d79f4f89182a7dbe286de6e,2023-05-22T17:55:23.993000 -CVE-2023-20702,0,0,139bb61721d11bea2607909964062f66d16883973e818c3a36b2ee6727ad8989,2023-11-13T18:48:09.407000 +CVE-2023-20702,0,1,82310fdd9c7ffa4a9c1eb1fe20b53f8bc930868d3161fe00b098e8b462f46dbc,2024-09-05T16:35:02.980000 CVE-2023-20703,0,0,d7595909793f635aeeb914d3cdd4961d4193b56e32519e1ba0a24e896173aea2,2023-05-22T17:55:07.977000 CVE-2023-20704,0,0,b2fcab781ed159f1088ac13b463eeb5d1bf35c6a3d6183e2fb8eae8366eba46c,2023-05-22T17:54:49.483000 CVE-2023-20705,0,0,996358ce65b8efc0919fb379cd4611952915919bdac829ca4a95a94b731ce2e4,2023-05-22T17:54:14.507000 @@ -216855,7 +216855,7 @@ CVE-2023-22715,0,0,9db5df2f062879f57719346a0c09d0a0a11b9ac119b0ea60f39dba508278c CVE-2023-22716,0,0,c96a2435b99dc33f55058fb3e5ae2324133e8afc4b31313de11a781c2f0d0817,2023-11-07T04:07:16.617000 CVE-2023-22717,0,0,f580dc0bbe4fd5f0eea9d92fe5a6120b38c0ffabedadf66d116946aa50492511,2023-05-22T17:09:28.550000 CVE-2023-22718,0,0,c23f575633f583b1c054d4e8d1ca214d1800bf32d630f821ba7ec5dd9fd9ae3a,2023-04-28T03:44:19.407000 -CVE-2023-22719,0,1,f54e1a21fb889578e9c4bd1267dc120db18d5c3a74241985581e73df1ef2750b,2024-09-05T15:35:05.790000 +CVE-2023-22719,0,0,f54e1a21fb889578e9c4bd1267dc120db18d5c3a74241985581e73df1ef2750b,2024-09-05T15:35:05.790000 CVE-2023-2272,0,0,622c6f8888bfe213563eb5066c33ede861c0a6907050ed84a62a69ce0266183f,2023-11-07T04:12:18.090000 CVE-2023-22720,0,0,4c5bc82868666a8b624532928b8934116d7e3d232a4bd5b2b3fb5a7eb720dae0,2023-05-17T12:58:27.107000 CVE-2023-22721,0,0,e51563b851d6365d62f30266aeb9273ff95cc258b53fd317b23f04106d43c3f3,2023-11-07T04:07:16.953000 @@ -217539,7 +217539,7 @@ CVE-2023-23674,0,0,fd6bf0d593088aa7739c8f2a41bcf154a4a6a757659fc7e11587dd09694ef CVE-2023-23675,0,0,c40b86b0397a6ba5109c5e980ff9aaeb01be30120fdd5fbe853bb0f16262da50,2023-11-07T04:07:51.507000 CVE-2023-23676,0,0,a4b3176a458a1a231751c17ae5f348cdb170cc1b1ca6d16bfa63980f035deaa4,2023-05-23T18:54:45.910000 CVE-2023-23677,0,0,9ddda8ad9da6c35c2c9c185af1d838c54dbf6e534f17abfc0fe489df1cd32b87,2023-11-07T04:07:51.620000 -CVE-2023-23678,0,1,c7d758313bd9ee9550f0065955a1801ba96616eab994830eefa4b655da277483,2024-09-05T15:35:06.023000 +CVE-2023-23678,0,0,c7d758313bd9ee9550f0065955a1801ba96616eab994830eefa4b655da277483,2024-09-05T15:35:06.023000 CVE-2023-23679,0,0,50bda67cd5bfdf141352eff893eeaae22b709b4f4970b0a219e8fe512caa2227,2023-07-05T13:13:22.423000 CVE-2023-2368,0,0,7b1f8babdb3c07f3a7f26642348547f54c0e0d1972e423a78a903ea20ca32de3,2024-05-17T02:22:53.520000 CVE-2023-23680,0,0,dbe3af967fd059d3de8308098f9e8de0ce853fb24a7b3044bb850d70a5903bed,2023-05-26T02:10:43.590000 @@ -217787,7 +217787,7 @@ CVE-2023-23928,0,0,8cec809a6ea1e183ef3864a8238df5fa0885b8b36886cf8c23f205e600d51 CVE-2023-23929,0,0,9fa43cc154e112d18276e30c8c23d333a61e73900ad58a05a0218eb2855d97cc,2023-11-07T04:08:06.713000 CVE-2023-2393,0,0,94e161db420399483064d273ecc9412c6e7471cdd249ed218a820212c6af368c,2024-05-17T02:22:56.353000 CVE-2023-23930,0,0,c4bd9cfa3052d18f889595f931403faea59f9abb597fb260a709b09caad8b1ed,2023-10-13T21:27:29.790000 -CVE-2023-23931,0,0,cd70993237ea83e3671fe421cb285bcbb120a9935177f946cd7f57ebe16eb7ed,2023-02-16T16:57:18.890000 +CVE-2023-23931,0,1,1c5887f017e1e95fdf5a7999a6a7f710494c087ff7799d31e8e15790fa8da006,2024-09-05T16:09:10.430000 CVE-2023-23932,0,0,8fc93077f43576d91932fe8251dc64b5a46a9c70591f52e4ec8785f398b0b922,2023-02-13T15:06:10.787000 CVE-2023-23933,0,0,c555aa865ab963013497233957e26f6d7dc5e28238e03fe01f862cc00e578f82,2023-02-15T15:55:59.113000 CVE-2023-23934,0,0,c2b426fab33075a561f0ab63966a75066763b2eecb66b9362156c34b28ff2e74,2023-08-18T14:15:20.553000 @@ -221701,7 +221701,7 @@ CVE-2023-28744,0,0,529bccea15835710c0c9c9944e83caa4697594ba4bcb8387dc88516f3f630 CVE-2023-28745,0,0,4077396779187937e876f052f977693e97c1ad9916bfac808f29425cef580d74,2024-02-14T15:01:55.963000 CVE-2023-28746,0,0,4c132b6936203c5f531b4d2db122ae3f271cd0d64d8adc5e54dea8e2508f2d55,2024-06-25T23:15:21.940000 CVE-2023-28747,0,0,38e04be86bdfefeb33b6cdadd665ca402071c197c5a9626ad61e5698103411f5,2023-12-01T03:48:15.443000 -CVE-2023-28748,0,0,7aa2497ecaf180e872d4c765a826baca8aa6911211eee6bd9c490de9db6974f6,2023-11-10T04:19:54.407000 +CVE-2023-28748,0,1,099462310b222c8c3eeb9044bd1359d35de6d38e7079c9bfbdbf3bc5e78860b5,2024-09-05T16:35:04.003000 CVE-2023-28749,0,0,4cf89dc3b5465df96cce5cc4e980aa464deaf57fe279e89d51a92042093adc1d,2023-11-27T22:08:00.970000 CVE-2023-2875,0,0,83dc4d39546eb611d54795208ec6f364b2d5166ce33a2367902e5e761b3aa2c6,2024-05-17T02:23:20.223000 CVE-2023-28750,0,0,5221eb4db9fe3c25974a6cbd82393532a60c97b7dc84a2ab2a1e87d8dacd8820,2023-06-28T07:14:55.810000 @@ -224782,7 +224782,7 @@ CVE-2023-32814,0,0,4feadb463c76a88ab596897a43377e7f80236c0d7ca7b35eb9093f0abea1d CVE-2023-32815,0,0,f16706f2fd269f898840a89aa7b1bcfb374da64c42c50c54517b41ca6551d06a,2023-09-07T14:43:12.923000 CVE-2023-32816,0,0,7a04471efc725408a6350f3f95b518109cdf40c59f4923080fa27fcbf51a5d1e,2023-09-07T14:43:32.837000 CVE-2023-32817,0,0,0eefc6e64ac1fb050c23aa5a8e959801408488f7719380b8c36f2efe304c4646,2023-09-07T14:43:42.350000 -CVE-2023-32818,0,0,2ebc2f89536a7d226d327d4786b676837c398e85a5f6f0c6e74b741888039e12,2023-11-13T18:52:16.527000 +CVE-2023-32818,0,1,4098ce5220411201c4b71c4b2fdce0323153651a53296d9cd8a77499ae29ea31,2024-09-05T16:35:04.620000 CVE-2023-32819,0,0,9d9f2bebbbec48a4a545174b4c7b6940e40d0f4ee10643ff418b3ae0842a5ed2,2023-10-03T00:59:45.713000 CVE-2023-3282,0,0,0e6251dffeccf8739a49cde30ea439b2b5c25c72afba7998bc8e091c9b16349d,2023-11-16T16:26:39.977000 CVE-2023-32820,0,0,b40cf694dc4eb04fb67c024de91f368af35e1766f860ebe77c30faf160b2418c,2023-10-03T01:07:27.053000 @@ -224802,9 +224802,9 @@ CVE-2023-32834,0,0,4f00cb7a2be19f938eb5f63bc1e783890c9bb501803843b99e5fc4824ea46 CVE-2023-32835,0,0,6be2b1975c27c18e72ec78796008bf22ae0f278ae78e1317f92afdd688bf5492,2023-11-13T18:49:25.807000 CVE-2023-32836,0,0,aea62418b06d0586916f078559c5e18c589e6ec97a9e78bf2315c56b94c3fc3a,2023-11-08T23:50:44.607000 CVE-2023-32837,0,0,f9c1f42bce999ffec6652467879a223f1343ee548e41822db6ec1ad3615cd36f,2023-11-14T03:15:08.797000 -CVE-2023-32838,0,0,14e6591f56cfe2bfd108d64357c4c7299f02c357febe4e5cb88535980a1be91e,2023-11-08T23:50:22.660000 -CVE-2023-32839,0,1,e1ccc9f7ce83a8ad99f8cbafb8516480e2a5dfe028121c0a1afe235c1061c26f,2024-09-05T15:35:06.927000 -CVE-2023-32840,0,1,d97af27e8e4f8e647e7feeffe747a3e1ea45a6c614d4f9bf4ee6aed67b8395b5,2024-09-05T15:35:07.837000 +CVE-2023-32838,0,1,46d27b13ffe58b7bf8049c3c733c5280fdbe9a68139eb7d148ea74ebc52b6b95,2024-09-05T16:35:06.560000 +CVE-2023-32839,0,0,e1ccc9f7ce83a8ad99f8cbafb8516480e2a5dfe028121c0a1afe235c1061c26f,2024-09-05T15:35:06.927000 +CVE-2023-32840,0,0,d97af27e8e4f8e647e7feeffe747a3e1ea45a6c614d4f9bf4ee6aed67b8395b5,2024-09-05T15:35:07.837000 CVE-2023-32841,0,0,43f55b30afe43285f2f4e9fe29fe92c036eca7b5e64a3c18b5a564f9db4bfa4f,2023-12-07T17:34:09.690000 CVE-2023-32842,0,0,8092759230b7f7e27be0295ab6713c13b91052948a7dbb8e509f2fbcb28c1494,2023-12-07T17:34:17.030000 CVE-2023-32843,0,0,b4ce3be4f6363b9b4726dbefca318bd14c104cc4412d1a80346304d9a68afedf,2023-12-07T17:33:58.747000 @@ -225311,11 +225311,11 @@ CVE-2023-3347,0,0,a723926bed15f7839c499a6cc8847a6e0b8aed6868ff9adee3647f2061979d CVE-2023-33472,0,0,a88e714c00c91b119d1197c1ae4473f07845779cdc1bb465822d892cbf9eac1b,2024-01-22T19:21:10.370000 CVE-2023-33476,0,0,4a297145be72f944481cc47e9f376d2cf456cf13a342260740e97ecbfcefc9c3,2023-11-25T11:15:16.937000 CVE-2023-33477,0,0,6db6ebce2662ad326ee213faec74c36ba5dbdc9868890686df97f67004511859,2023-06-13T19:14:00.687000 -CVE-2023-33478,0,1,f86f0231c2633e904d7fc0f691578684a54f744cc0b0ca1d1e7085ded3951116,2024-09-05T14:35:03.177000 -CVE-2023-33479,0,1,7d3ebeb37780828c39d0f0270bd7950a51ccd4c6e36fe4427449e32c4be0e3ab,2024-09-05T14:35:04.190000 +CVE-2023-33478,0,0,f86f0231c2633e904d7fc0f691578684a54f744cc0b0ca1d1e7085ded3951116,2024-09-05T14:35:03.177000 +CVE-2023-33479,0,0,7d3ebeb37780828c39d0f0270bd7950a51ccd4c6e36fe4427449e32c4be0e3ab,2024-09-05T14:35:04.190000 CVE-2023-3348,0,0,e8af9cb6e78f0eccf3ccf77c792221246e5940770951d82f76223f3085f3673f,2023-08-29T10:15:08.697000 -CVE-2023-33480,0,1,3299215a25caefffd44d9ba5cc5597db25795f3f5af0f0e32fff93666f593a5d,2024-09-05T14:35:05.053000 -CVE-2023-33481,0,1,274dd0f693d6737ab5e96c09d6c0aae1739e121039d6ce86ddb795cf6b8dc6ff,2024-09-05T14:35:05.867000 +CVE-2023-33480,0,0,3299215a25caefffd44d9ba5cc5597db25795f3f5af0f0e32fff93666f593a5d,2024-09-05T14:35:05.053000 +CVE-2023-33481,0,0,274dd0f693d6737ab5e96c09d6c0aae1739e121039d6ce86ddb795cf6b8dc6ff,2024-09-05T14:35:05.867000 CVE-2023-33485,0,0,0424ffd332d3fbbae6fb5f0362381c904b0f3731892b8402fd027aba96ac48b8,2023-06-06T20:01:27.337000 CVE-2023-33486,0,0,7069406175e8a464b9276c3f935129b7048847649b3cb45ca3f37d20efc2b584,2023-06-06T20:01:48.737000 CVE-2023-33487,0,0,aadebb9e26b9df5c2d49fc338a4c1fcc2df5bff85acc32343a08c97bc528f7f6,2023-06-06T20:02:00.027000 @@ -225931,7 +225931,7 @@ CVE-2023-34258,0,0,2e656b6b465dd8addf89d28d27a2f63785e04de044f2ca4973a2e285fba25 CVE-2023-34259,0,0,77865eb37ec9e879b884ab83d521cd0d5d91beca2dafdb28593025e053d2e1f8,2023-11-13T17:49:14.460000 CVE-2023-3426,0,0,935e9c3168851c6b164d09f4971cdc352a7eb4e1fb48d323d9ca5e3f69c4f253,2023-08-05T03:45:57.627000 CVE-2023-34260,0,0,c253d0086191543f48833b7cd2c6b64feac20efd450b29e43c25d5bd3f3dfe93,2023-11-13T17:38:02.170000 -CVE-2023-34261,0,1,1729daad30a7372c87b9ad3bf7407e2b7cbc075d6b545c22578d51675898073f,2024-09-05T15:35:08.697000 +CVE-2023-34261,0,0,1729daad30a7372c87b9ad3bf7407e2b7cbc075d6b545c22578d51675898073f,2024-09-05T15:35:08.697000 CVE-2023-34262,0,0,e781415bd7c8ab28701dd349c10478f0e9c97337cc272573568c5630115e9d21,2024-05-03T12:50:34.250000 CVE-2023-34263,0,0,f4f4a0f3c164eb98a8626e14ae0828a25faa092c3e423375afbc26babb9b1e48,2024-05-03T12:50:34.250000 CVE-2023-34264,0,0,755706b41d61f4307c4f2efa1c98b8df9a80933b1a8ef4be7ff214eb95ae407a,2024-05-03T12:50:34.250000 @@ -226057,7 +226057,7 @@ CVE-2023-34378,0,0,d0db587e672d29c22594b9c6449a04f13d77cad274d12604b932a4ef3bbaa CVE-2023-34379,0,0,12e74bb2b900839539dbfc3cf12772aa18833880fe9f8e45a58d843962f8da72,2024-01-24T18:45:01.177000 CVE-2023-3438,0,0,01ca2b9cb900d038224fcfd4a3c1725f14f1ba99292426381757980e36a7c633,2023-07-14T14:43:08.843000 CVE-2023-34382,0,0,109a28947ead22bf9a0b6c1735a6a82e2f3466e6baa3739d698708af3883640e,2023-12-28T19:55:45.243000 -CVE-2023-34383,0,0,42114b0017ae59c3dd73b7586c02c167e058b9488543b271d04f6f2c05489a3a,2023-11-13T18:29:48.217000 +CVE-2023-34383,0,1,8b35874cc16e57e446a5d4d10ab77e66997d5f22b1e9c24550da1c7f76c6a2b0,2024-09-05T16:35:07.860000 CVE-2023-34384,0,0,228bceeea50c06c9862391aab173eb1edfbfd1b8a61b99623ea2e1d79d708fca,2023-11-16T23:41:34.497000 CVE-2023-34385,0,0,02137400ce5e6d949084014a3603878bcd181b9dc9aef8acec440a9cf467db0a,2023-12-27T20:21:37.573000 CVE-2023-34386,0,0,ac5e2c22c4b1dfabd7a04e7bd99c4a33331127623013d46f2e896fb5dfff6218,2023-11-15T02:26:31.677000 @@ -227462,7 +227462,7 @@ CVE-2023-36617,0,0,2cdb1e0efb3c1fb9db8aeb10221e71fa4cf1528bbba0f2c6b0191c4b15779 CVE-2023-36618,0,0,e6a1824ad000dce8398ab11c08bfd3991c183c1aac1a09a44b2ddd80d5e420ba,2023-10-06T22:32:14.727000 CVE-2023-36619,0,0,15e2eb8f8a441ffd1a9031012c4a8d5c8b77a6c358c620ea545ee72d2001cc7b,2023-10-06T22:32:37.880000 CVE-2023-3662,0,0,4353d795d431549f3a2fb58a5d412a9f1357fe1f7dc818202bd566a35cb4fca1,2023-08-08T15:44:56.483000 -CVE-2023-36620,0,1,8d5765e8b974a3d61a3f8027b9e2664cd5b6eb9361b47c0d3e3e665ff91c55f0,2024-09-05T15:35:09.477000 +CVE-2023-36620,0,0,8d5765e8b974a3d61a3f8027b9e2664cd5b6eb9361b47c0d3e3e665ff91c55f0,2024-09-05T15:35:09.477000 CVE-2023-36621,0,0,b11e24c73c6e97f818a680e305527ebafe66f07f1a85feb7fe4515d2e327ae04,2023-11-09T21:55:49.257000 CVE-2023-36622,0,0,adff92992a7d1725d728ffbdbc1f0f2815e4f2dd744439be59a069104d62d7f7,2023-07-11T20:09:49.050000 CVE-2023-36623,0,0,3a2f323d6956387043e3215c64ae27d050f1a349b3598d1d588c6a603a47259c,2023-07-12T17:30:41.997000 @@ -228832,7 +228832,7 @@ CVE-2023-38321,0,0,2364897ad256a089e560a5c277aed13c770cfa4b8a1e46c7dada224576d9e CVE-2023-38322,0,0,77e7e3d5a563508f13f0709e4ee7c69fab03baa5a2bfa7bd6a08c1fe7dfa4b55,2024-06-20T18:15:10.980000 CVE-2023-38323,0,0,ad97029b16bc011eb71c7e299d2191bff1ba334035158326513bf24b95b2b0cb,2024-02-02T15:53:56.563000 CVE-2023-38324,0,0,996f612e0d755a728e6b16fc439b80eb300f664d281ae40ecab4678d08d1b776,2024-06-20T18:15:11.083000 -CVE-2023-38325,0,0,881327572c48aa3cb42135a3c6f853dc7f68ace49b8d3183f8517dd2d42b7b94,2023-11-07T04:17:14.413000 +CVE-2023-38325,0,1,0b300e7d7d992565fe952ede42cf48d5190e256b49e2c83a479e6d519cb7c850,2024-09-05T16:09:10.430000 CVE-2023-38326,0,0,6d00947a4d8e65431323d4bded79ddde12b58c8d8303c29367007396b0819b2e,2023-11-07T04:17:15.360000 CVE-2023-38328,0,0,3fdd0d7b92273a0af868b89414e7cec547ca2a9839d2e90f953da30982a8ede7,2023-11-07T17:08:51.110000 CVE-2023-3833,0,0,5fa3d7d06a864dc2983c58f7f3d6b7bec73c1a3e7a139d8bb3afc82942721017,2024-05-17T02:27:51.733000 @@ -229423,21 +229423,21 @@ CVE-2023-39039,0,0,47385f5e9b5ed13def18a31cf60e6a33ea7b074079d93ac445fb4e29d354a CVE-2023-3904,0,0,18f8c98b02c050d4df508a2e8dc4cff68b1f53b80a0c697873994607b33a2930,2023-12-19T21:41:11.020000 CVE-2023-39040,0,0,0d8786dd0c36fb996bae1c553c981aa3c7c75ac40c7d00cab157f9d00685f8a1,2023-09-19T21:24:29.890000 CVE-2023-39041,0,0,4d2d80ed29ee24b6cf6a78aa3d12d1c146d9a3291971e1efcab61cd8aac904b0,2023-09-22T22:46:09.727000 -CVE-2023-39042,0,0,5463c4f558ef73e431b8f74e1e8ac30eb3573f8191f1fa237f17e7f54205ccd3,2023-11-10T04:10:50.210000 +CVE-2023-39042,0,1,a7a48f880646aadc134f0732e1d990e50286c7395769d5435f8dbb80591cc8d2,2024-09-05T16:35:08.263000 CVE-2023-39043,0,0,ba87098ff2bd45dc807c6b3c45c4d66fca97b5b793c3dc3373facd890703338e,2023-09-22T13:22:19.643000 CVE-2023-39044,0,0,50243e0bac844c04b7b4f63fd226a1af22956f7d9c562fd19fa07b15eb962106,2023-09-25T16:36:04.260000 CVE-2023-39045,0,0,57f8d443ae49abb4059d194043c2165dc9e6feffc529b819537bbcd4bb4e7744,2023-09-22T23:04:32.703000 CVE-2023-39046,0,0,143f854cafec6743bb41bfbb8e25ead3a2d45ac15cdc3b4a97748ef03fb13246,2023-09-20T20:49:29.943000 -CVE-2023-39047,0,0,82e55a497e691502e1c2826f1ea3eb547132b86185823a46f42f441fd809df76,2023-11-10T04:10:59.547000 -CVE-2023-39048,0,0,5065e937f2ef8665c05af1ec336a581d70dfd099e1a8418fc99ec19b55a81d24,2023-11-10T04:11:07.203000 +CVE-2023-39047,0,1,330bee41b764040dd805e09cfff457ad69307d4794890a3decee0e8a8207a24f,2024-09-05T16:35:09.043000 +CVE-2023-39048,0,1,e78542bc4874a647db5adf59501a708f98fb1b693a6bb7216920949ea0533622,2024-09-05T16:35:09.877000 CVE-2023-39049,0,0,809254c4165396ed66f5a32dd34a4aab6595e82531f077d332dff6cf723a8a62,2023-09-19T21:24:54.373000 -CVE-2023-39050,0,0,31c2001e2be84b7d137791ef0bd2ded0e64fdf0fda5515768962d66645807853,2023-11-10T04:11:23.803000 -CVE-2023-39051,0,0,2a42de3de3c1a100ea5b4fb00f1717013947776317e2ea8729d4ebdfa9d2442e,2023-11-10T04:11:41.413000 +CVE-2023-39050,0,1,e7472c093b9dc2c1966019ab015bbe60ef31b5b90f7d5b9c82a9f6bc68317138,2024-09-05T16:35:10.590000 +CVE-2023-39051,0,1,90f5c92359e58c527fc9bc86c4114f487c8b1eb26e7cbfeab808968e37b970d6,2024-09-05T16:35:11.323000 CVE-2023-39052,0,0,536097665e44ef3aaf6c6293891a2c7b53d3caa21ca8589186bd6edc5f8ecc75,2023-09-22T23:03:03.047000 -CVE-2023-39053,0,0,8a46641f24d827e2e5deb69582e4db9d7ad2d550ebdb6a38a6002b3bd697459e,2023-11-10T04:11:48.573000 -CVE-2023-39054,0,0,6be77a10dcd3434ceee55d840fa1151dec7507d8d0b072293f43fe7a4105aa82,2023-11-10T04:11:57.213000 +CVE-2023-39053,0,1,4128e6ce1aff3fe19dea6d73ba32021ef8d79cc7cb49183324271d2c30a9e6c3,2024-09-05T16:35:12.070000 +CVE-2023-39054,0,1,f833ae43e0ade72388da1f9c7c8f6fb4e7cdfde8ad9a67b03dab336fcef592ff,2024-09-05T16:35:12.807000 CVE-2023-39056,0,0,a31be9e1f2f2ce024577389a44b0d64791d4f8214fe68fa844dd6e3e825d2389,2023-09-19T21:25:03.967000 -CVE-2023-39057,0,0,a51d8b0411604d8e14528cb2b4e6645e1760c5d0a5ae1a01b7c36f490f0443bc,2023-11-10T04:12:05.497000 +CVE-2023-39057,0,1,601d99c09f27b5ba170ec8ad96aa1bdfa16724520be499f1107219c96e2eca70,2024-09-05T16:35:13.513000 CVE-2023-39058,0,0,c859360d758c635b4461bde9305dfc7f921e430c4f43b04685530cd4ee9bde54,2023-09-21T19:33:37.093000 CVE-2023-39059,0,0,d03db2419f848e834209670dfaa88b40205ec6bc4b60cbbbae6e240d2976015d,2023-08-30T00:30:06.513000 CVE-2023-3906,0,0,0ea4f9c458c7cefbf14811ad5f7e6a91096f5efdcc77090d83066140a3405bde,2023-10-02T19:42:18.340000 @@ -231190,9 +231190,9 @@ CVE-2023-41254,0,0,053f3f1fdc74f454b96a90ade74b907f424357619cf33f56eb5487b30b002 CVE-2023-41255,0,0,e107ac907b537ef5369f3a814b6b67f3ff048acf89073d6fb94c322aa8a80490,2023-11-06T14:33:10.043000 CVE-2023-41256,0,0,ded1d40a11b9067d8ae86944728b211a9248f59406331f0a083a5c78ca059d26,2023-09-15T17:38:24.403000 CVE-2023-41257,0,0,301829516e80e0270b8bfecff0eeaf69618e32f2e68a6a873999d3d9a4d9f580,2023-12-01T20:51:01.553000 -CVE-2023-41259,0,1,626680f159225c556e3da45534ab282e9e4019c2fff5d9ad1f4e7fbe064f98af,2024-09-05T15:35:11.020000 +CVE-2023-41259,0,0,626680f159225c556e3da45534ab282e9e4019c2fff5d9ad1f4e7fbe064f98af,2024-09-05T15:35:11.020000 CVE-2023-4126,0,0,a64e7ebcc1fcda3393a886c6842abb8e37791589299e30c43435dccf739fa142,2023-08-08T16:51:35.293000 -CVE-2023-41260,0,1,9a4bdd5ab99396651515a01606ea828e4271a7df687d8622ef675959d5ceaba3,2024-09-05T15:35:12.020000 +CVE-2023-41260,0,0,9a4bdd5ab99396651515a01606ea828e4271a7df687d8622ef675959d5ceaba3,2024-09-05T15:35:12.020000 CVE-2023-41261,0,0,c86ec737c54286565878c0093ce9504e1fada31e29d26dee85c4e63bc188613b,2023-10-16T18:25:05.140000 CVE-2023-41262,0,0,cfb0f64cf093138f784d94aa803de4c5937e23efd43dcd1055a31ba029128054,2023-10-16T18:17:04.240000 CVE-2023-41263,0,0,094720288d882b16bce74f8a3c21bbb4ef8d8223e12c5536de0e0c5d491cc3b8,2023-10-16T18:24:04.600000 @@ -231317,7 +231317,7 @@ CVE-2023-4141,0,0,cfabbdf153d697b750d96986fbca8cafeb367daf88b9d44cbad697bfd5a084 CVE-2023-41419,0,0,f042d10d643625638e7b0883235c3c75ee6d7906f519eda18510c3d7d0f9e7cf,2023-12-08T20:51:32.543000 CVE-2023-4142,0,0,6c3f0419dee3cdd35f3d242f69b5627fd4a861fe9b8da51f4fd6fb53dfa612fd,2023-11-07T04:22:10.883000 CVE-2023-41423,0,0,2808bb51078e1bc802e9a2ca8921f1bb119998a2ea30a7a9cc89d8590dad8fb6,2023-09-15T13:06:25.403000 -CVE-2023-41425,0,1,69994a214cacbe3ce41b5c0407aeb96da8bab9a6b0fac4082cf014d1c9493ac2,2024-09-05T14:35:08.080000 +CVE-2023-41425,0,0,69994a214cacbe3ce41b5c0407aeb96da8bab9a6b0fac4082cf014d1c9493ac2,2024-09-05T14:35:08.080000 CVE-2023-41436,0,0,6104697528afd518f43397278353fb6a8e799c2cf77ba129aa0652f77d9826a7,2023-09-20T13:14:37.207000 CVE-2023-41442,0,0,c3af2afbe542a49895dc1d335e4c022ad496903681aeb9f3e9b1c375db3fb92c,2023-12-01T16:56:41.467000 CVE-2023-41443,0,0,633c04fef4ee55230140d09c75467925e1b6dfb4bc98a8a72a440e2b7a0c6e5a,2023-09-20T20:31:29.413000 @@ -231418,7 +231418,7 @@ CVE-2023-41648,0,0,6bf651288f8f48d6e7bd0f570ddccc7da1115d082fe9c3d770b06ce04a797 CVE-2023-4165,0,0,36ccb4130cb92f45a9d556a87456881f35e8a84734e25bd9e08f38366da9027b,2024-05-17T02:31:22.977000 CVE-2023-41650,0,0,7f0878d5215600ba1fe3710754f7196f1e8eb146c52dcba3f3c83482570f4774,2023-10-10T19:22:25.553000 CVE-2023-41651,0,0,94c1855905b63ab77edff2e6e03253ec5f10a5237438fad9e6016428e112c196,2024-05-08T13:15:00.690000 -CVE-2023-41652,0,0,bd5b71b531db776081b28335726a873c3ff58ba7a55bf3786484a8f53c2e6729,2023-11-13T18:31:03.343000 +CVE-2023-41652,0,1,baf8b9b6138f449fd5e2675d3c07ebcc8095795c237dc7dbc3dc81f9fe43d000,2024-09-05T16:35:14.493000 CVE-2023-41653,0,0,773db479f5a2ca70f292bd8c81a8aeb9abf5c2ce2c7df7c46a234553abfbb0d8,2023-09-28T17:16:29.787000 CVE-2023-41654,0,0,765aed3c6658d9e8b70c7086a6781d9ab11b9ccfc344a9188472c21d7e2c0251,2023-10-10T19:22:19.100000 CVE-2023-41655,0,0,956921e0c1b29ffa4676ec1d5558f455e7197781484fd40c463aab65a651b178,2023-10-02T19:32:07.347000 @@ -231449,7 +231449,7 @@ CVE-2023-41680,0,0,cf992c9691cd7d432af5c0a22c6a426a9e77ca49df5eeb9e03e61a243011c CVE-2023-41681,0,0,c7021d8fbcb8186f85a9c19dbf989d6be720331b94d4b0edf626b2e96e755bcc,2023-11-07T04:21:04.867000 CVE-2023-41682,0,0,f9029ae088ce0bf59d50c5cc7af84e437a4e0d9b07d3cb88c61e197f53cc9629,2023-11-07T04:21:04.987000 CVE-2023-41684,0,0,9eed5083559421b8e7d7641415df77b822264027219368c68e14e85659bf50ac,2023-10-12T18:41:06.240000 -CVE-2023-41685,0,0,7e077b9b0295adf2fca8b4162b7cde6a03f125a8660f7c135b992fb7d1029d77,2023-11-10T04:18:08.210000 +CVE-2023-41685,0,1,e2cf814898c6e3999ac8db49f2329b5fb7e40b4826eb24d428b0a0ba0633a93b,2024-09-05T16:35:14.713000 CVE-2023-41687,0,0,cec4570e0965e0fc537e7535f556ed487f76102fa4391af89db5d9441375b0db,2023-10-02T20:05:38.330000 CVE-2023-4169,0,0,799e75d71fa3c66ce536b52dc7d55f4708278d1be0ceb0cb8355a76c08ec58a1,2024-05-17T02:31:23.410000 CVE-2023-41691,0,0,34c26b6e65a7c8ea730805c930d8e698bc37a764e8fcac387285454fb330eb39,2023-09-30T02:16:37.970000 @@ -231480,7 +231480,7 @@ CVE-2023-41720,0,0,0093919089e89ef5358fa71b3834e693e345c61cd72f1576c7fde67f41fd4 CVE-2023-41721,0,0,9d8300dea3629f20fa77b98b3cf509692439737c0069e95af62a9f4fff6b933b,2023-10-31T20:02:00.777000 CVE-2023-41723,0,0,aaa0ff80b06e16db3127d59a5b19fb8c6f1bb032144613ccb8f008f360fd5606,2023-11-14T20:30:54.470000 CVE-2023-41724,0,0,fb1604319899a68549be540318d0c25739412976b98d9685e4f321322d31d223,2024-08-01T13:44:44.643000 -CVE-2023-41725,0,1,188227db5f1bdbcb9fa793a5415f81f08b29487ded2b95ecfb0402e0b9f1fad1,2024-09-05T15:35:12.987000 +CVE-2023-41725,0,0,188227db5f1bdbcb9fa793a5415f81f08b29487ded2b95ecfb0402e0b9f1fad1,2024-09-05T15:35:12.987000 CVE-2023-41726,0,0,30c993c3ee0a3c7e30527a9a7949e66acb3c53715cf1bc872dec60b0ec5f36b4,2023-11-09T20:47:03.140000 CVE-2023-41727,0,0,5d0c6fa0e81b175511881d91062e902367c1e24e2675c1fd014a7b6126680648,2023-12-21T04:48:25.067000 CVE-2023-41728,0,0,e6794869757aa85102f7da9312a9b116142834bf034ca6e17c80c945c3564743,2024-04-29T09:15:07.277000 @@ -232141,7 +232141,7 @@ CVE-2023-42651,0,0,8d59f1302a332b4472bb8786413f0b6123a904112d9c92fff603507f06d30 CVE-2023-42652,0,0,ae0c416b51e22f5f35191d6b7e099f30e23aaa20614c4c57b9860425ac86e927,2023-11-08T03:02:36.173000 CVE-2023-42653,0,0,7e2620958435beaeeb0198711116ff5972d64b549b68c57d96d74362d00245dc,2023-11-08T23:16:13.907000 CVE-2023-42654,0,0,cfd37bb95f0260279cd98f4f6efb8c9d152b39db4d043ae520daa2503945d64b,2023-11-08T03:18:12.517000 -CVE-2023-42655,0,0,9a84f5ac6aeec91a8c3769d1cf0a365fa91ec6c92250df5d55671167a50efd10,2023-11-08T23:16:27.247000 +CVE-2023-42655,0,1,31425f99b2628a0aeaae68129310f19017bb5df8a366427dfa34420962ee7fef,2024-09-05T16:35:15.060000 CVE-2023-42656,0,0,c5fc94e487b562311db6aee24b16abe85085f853bd339a39183303f35808a206,2023-09-22T18:32:05.967000 CVE-2023-42657,0,0,26d28baef309543e0ff59e3d862dc6661f6e05a76145c5b4ff6ae3e21c85ba64,2023-09-29T14:34:24.630000 CVE-2023-42658,0,0,4c2c6607912f8952d09a8b68577f46c62f1d97b2e6779e6b5205791f4c006ad3,2023-11-08T17:38:06.957000 @@ -233628,7 +233628,7 @@ CVE-2023-44998,0,0,f6c45e83b122f8e819355d1b2b29ddd09138f4401f0489e9bec412c624027 CVE-2023-44999,0,0,d3cf023e5e2c41519939ca627d71c8b76bc76b6e3081ead454f70ce5c6cfdaa3,2024-03-27T15:49:41.437000 CVE-2023-4500,0,0,826061b7b404f2e0f4a524e3baee1d94bf9f75a68a4ea3e6777eb48c4f1c5974,2023-11-07T04:22:40.307000 CVE-2023-45000,0,0,6250955f44036735f67b9334307aeeab848f6c6db1e433430d10560275e6c2a3,2024-04-17T12:48:31.863000 -CVE-2023-45001,0,0,cd83f61d13c103a1f11ca4aec1603f72cb369bc5f6410e2815b72e4c17ec2250,2023-11-10T04:18:01.923000 +CVE-2023-45001,0,1,21e0dfa5e2dd0f57c60ccb75d3430330f2fd1e1d210ecc0ddcb35bc72a00f1b2,2024-09-05T16:35:16 CVE-2023-45003,0,0,fb850b1e5b9a06c73ff085d3a202e2eeb1cef10829b1f8b4d0ffc868fbe9f1aa,2023-10-20T18:08:51.807000 CVE-2023-45004,0,0,bacaab19f56bdb5d4bc6299bb435607202f05bd30e440b8c33a6b65f7a98f0e3,2023-10-24T17:13:10.327000 CVE-2023-45005,0,0,f8b28828bdcec002a31dc3b8afb20503633e1e34fb16f600fb4d12cf9b9a5f26,2023-10-20T18:11:32.280000 @@ -233664,7 +233664,7 @@ CVE-2023-45041,0,0,b61ff560cd80d1443c9826e47ee3b8f1433252a8302d31a2da68348886a52 CVE-2023-45042,0,0,a008f07831aca781d9531ebd3b99947832f11cf626f27712a786c08077d5e5ce,2024-01-10T16:57:07.187000 CVE-2023-45043,0,0,7f3b59f56208b2cd6e6aae2bbb5cf8c0ce492014e32bcbbe30f3e44e905e58bb,2024-01-10T16:54:50.930000 CVE-2023-45044,0,0,750980ec05121b72a03d567c061b34546235f9d21583d091e8f34706b772a00a,2024-01-10T16:54:34.517000 -CVE-2023-45046,0,0,75ec522bbc1d9ddc1b9b675b5e3a8856d4cd57d8081944a4d6c3846d1d50ffe8,2023-11-10T04:17:55.987000 +CVE-2023-45046,0,1,d8758727abf6db35618ce2b0ca1174bb63c8ca1cf9840eb1534c8deeb6438f6d,2024-09-05T16:35:16.210000 CVE-2023-45047,0,0,c0bf566680660866f4739c2e0ccc3b8918c4bb7f99c268c200f275a844481e59,2023-10-14T02:19:12.007000 CVE-2023-45048,0,0,34d43cc59fc387752b3cac2b6878f885266be8623b1dd5a911e51cf1c3bfb2c1,2023-10-17T18:40:47.370000 CVE-2023-45049,0,0,61eecb641451b335bbf01e438e16a434f293dde10c100a944001b6204a0e789e,2023-10-25T17:38:26.757000 @@ -233674,7 +233674,7 @@ CVE-2023-45051,0,0,756ca67263178a38fe29b94a76b9769b4f15dee1bc0d6427286f626cebd18 CVE-2023-45052,0,0,d0a968b6501702e331f836f9e9d8203debdfcf394fbe5d3f6cf355977f5ba33e,2023-10-17T18:46:40.420000 CVE-2023-45053,0,0,5346506130a390e5bbcca703318288a00029d8f999c4501d8f3da2fb158bf992,2024-06-04T16:57:41.053000 CVE-2023-45054,0,0,1773b7afb8473e4efe890b70f20cc5144958a667e023ae470376ffe710857526,2023-10-25T17:38:17.183000 -CVE-2023-45055,0,0,d099c6bb93dc9e98496a142bb98e49ca7b4e30e0e3d480b3dbb91c78dbeb3665,2023-11-10T04:17:47.710000 +CVE-2023-45055,0,1,a01521a7d8f5121fefcd25ef5ce91dbfe841289941c84fb8bbc4393d9f3ef041,2024-09-05T16:35:16.437000 CVE-2023-45056,0,0,ae9a02691dc6a81399179bb5e23557346136ed37e975b571aacbdfe52b2bee21,2023-10-25T17:38:11.073000 CVE-2023-45057,0,0,98ee00a19d21c741ad3d33e12cc68e459ece35cb5e0997701bdb880f5b4ac73f,2023-10-25T17:38:03.887000 CVE-2023-45058,0,0,41f62f3fc0adb134a627eff17322b3f15873ee6a85b3fec9e181558c2f76f459,2023-10-17T18:58:04.030000 @@ -233762,9 +233762,9 @@ CVE-2023-45158,0,0,f1e88d960d31812b341076adfe7a10a89b31c0389cbb660c84ef641809a47 CVE-2023-45159,0,0,7cec78c6b973fb91a8cc61903d6602210d8639650b50bd4ea84fffaab987df90,2023-10-19T13:15:10.080000 CVE-2023-4516,0,0,36f5c91438e7be6c7cd230e483bb59d76b5aef36cb7aa98d5c3d1b3f3b46a90d,2023-09-20T14:03:29.980000 CVE-2023-45160,0,0,186a0733a8d43477b11df0374f22d0fd64c9e0cf601ee9280d4d8b3e99d17426,2023-11-02T10:15:14.503000 -CVE-2023-45161,0,1,481689bcf7cf1b44f95b9ea99d8efe383f5bcdb75b62404df628d501d042826d,2024-09-05T14:35:10.047000 +CVE-2023-45161,0,0,481689bcf7cf1b44f95b9ea99d8efe383f5bcdb75b62404df628d501d042826d,2024-09-05T14:35:10.047000 CVE-2023-45162,0,0,9c680a1575cb70c8538ecd1d5918efb41f21ed490aef5e184babc8e2fd8e0a4d,2023-10-20T20:12:37.577000 -CVE-2023-45163,0,1,e9315833b0ae6443a0c6b9bf3361dcd7d25de75782a82c94503156cca1f45634,2024-09-05T14:35:10.813000 +CVE-2023-45163,0,0,e9315833b0ae6443a0c6b9bf3361dcd7d25de75782a82c94503156cca1f45634,2024-09-05T14:35:10.813000 CVE-2023-45165,0,0,4fdb9b80923feed65143bdf1c9ee9ba277c4339f142333eb4fad2caa4c4e7593,2023-12-29T05:54:59.177000 CVE-2023-45166,0,0,6f9b228eee7d5aa51c16c459d9e93450b3f6829caf90bf06fcbc2c4c3e01c972,2023-12-19T02:19:16.323000 CVE-2023-45167,0,0,2032728e037a8ae9e4dfab10a703c6b206ae43090f8a4324f98a5789bf66f3ec,2024-09-03T18:35:04.040000 @@ -233946,7 +233946,7 @@ CVE-2023-45377,0,0,8a38d8223faf098b86051796f3101a98163b9ac34429e2c21be3610b867c9 CVE-2023-45378,0,0,a4479427dce840bf161508b35cac8e456dbb4d44d648e39e6049f28e6efb5c76,2023-11-08T02:56:41.480000 CVE-2023-45379,0,0,5fab1aa395a37889037cb48a8199b0c14a95261fca0011c60045d125b80148c6,2023-10-25T15:30:26.320000 CVE-2023-4538,0,0,756489917e70f2629c5f812654e33eac6501a2db799ad5ecae2e9ddf18a8bac5,2024-02-15T14:28:31.380000 -CVE-2023-45380,0,1,60ff2ed725f784d40b65d9168417f036ec74796647ab0cb2bb5a50ce156ff23c,2024-09-05T15:35:14.800000 +CVE-2023-45380,0,0,60ff2ed725f784d40b65d9168417f036ec74796647ab0cb2bb5a50ce156ff23c,2024-09-05T15:35:14.800000 CVE-2023-45381,0,0,2d019e1af8fd7ecd48890af7c6e954d53bb2caa1e75f3f5f61ed40395cf3844c,2023-10-25T20:04:27.023000 CVE-2023-45382,0,0,310b7a21131e4320bd98ce59a3ec46f5fcc1a88b6db83cf3234b6312ccf37914,2024-08-12T14:35:01.743000 CVE-2023-45383,0,0,3b63557d49883b5d127b21fc6d955005bee3ad40062e5be0b5d7c114ec010779,2023-10-25T01:24:51.267000 @@ -234091,7 +234091,7 @@ CVE-2023-45653,0,0,3e2d48b181c48be89173149374633ab541ada0ea7d9db20e97b7bfd05db9c CVE-2023-45654,0,0,7c4975b33eb319f9537ba636fb85599904fa1b6d957949d5c8c9d1617b04c0f1,2023-10-19T17:30:30.677000 CVE-2023-45655,0,0,c6f0a17b1dbce0b7177a6ab2271281b9c0fb79f9e9ffefae8c2e9192c95e0c43,2023-10-19T17:56:36.927000 CVE-2023-45656,0,0,af75069100cd97d6cda2be03886d1cd3582bc4d7d31d7756e932081b5e5b79b8,2023-10-19T18:07:45.763000 -CVE-2023-45657,0,0,38d1896a9f9413274027f5c27e601531c77a8a72ed488836aef169cbf6ddccb9,2023-11-14T15:28:24.893000 +CVE-2023-45657,0,1,7ef36b392d896a83da5b84fbdb1e9d50712da7a7ea07a6b0225affa77ce09f17,2024-09-05T16:35:16.643000 CVE-2023-45658,0,0,5bc5f104aa10958fb6d1e8357fb33f601a3b45a510309f1a91406ccfa1281fb6,2024-06-20T12:44:01.637000 CVE-2023-45659,0,0,1b2e580134a0f7d62c2b51bb4c0851afff2f4355af9eac646fdb90d7414a42f9,2023-10-30T18:03:57.393000 CVE-2023-4566,0,0,874f9eed87304bf938613d4a0d2d96c53db7503829c6d29e9ced7593c9da0424,2024-01-19T16:12:13.313000 @@ -234350,7 +234350,7 @@ CVE-2023-45992,0,0,5a96e31f066d538da55eb567ded8edf217df62017ef019db337d24fd441fb CVE-2023-45996,0,0,7834e1945de75d51d58853c49b6445087943141d665b28652b07d60f12314c41,2023-11-08T03:02:39.613000 CVE-2023-45998,0,0,3106f76192cd8ce4b1559ceb333fbb692a6d042bd80a94954016aff02f096769,2023-10-30T11:36:31.693000 CVE-2023-4600,0,0,fe38334123b1c26502d7f454e0ae2002dc7d6e9de531d5408984dcc380d60457,2023-11-07T04:22:47.293000 -CVE-2023-46001,0,1,7011c5ec841edb1339a120639840f67b7dc67c25a8942f1247421f121d0db9f1,2024-09-05T15:35:15.857000 +CVE-2023-46001,0,0,7011c5ec841edb1339a120639840f67b7dc67c25a8942f1247421f121d0db9f1,2024-09-05T15:35:15.857000 CVE-2023-46003,0,0,60c0035eaaf96e84010840fe81f8c04f6f4e30a27a9594f9d514ea702a4e1cd3,2023-11-07T04:21:50.397000 CVE-2023-46004,0,0,4a84245c66ee94383d523b8c3ae8838fb0a69c2bb33b8f17f293fa279cf8889c,2023-10-25T01:23:59.683000 CVE-2023-46005,0,0,fe646e5243b94967ab136a987d59056f217d2aed6e78cf1094b51ac9a900e856,2023-10-25T01:27:12.410000 @@ -234409,7 +234409,7 @@ CVE-2023-46077,0,0,113ffd1ba435dbfafbdacbfe80e86010c4d2131a7efc775c70b54ff59b0f4 CVE-2023-46078,0,0,cb745203ade48e48f064d52933c22c5ba3e80c4c1bff415537d218d84ed92c3b,2023-10-27T19:33:21.057000 CVE-2023-4608,0,0,bce34d36d9c20677a08a64cd956212f83ea8fd04b1f582d275913bcce839deb1,2023-11-07T19:15:44.413000 CVE-2023-46081,0,0,cd53552ed7abc207ab09d018e27339211db75578b722c62784706c0bbfed1599,2023-10-30T16:29:47.100000 -CVE-2023-46084,0,0,1f2d275abb15d2109ef183e0eadd4e56b64699044bdb8d935e5a65797f25550b,2023-11-14T15:28:12.030000 +CVE-2023-46084,0,1,baa8b5bc8952b98256a22e47f3ea34b0f723fcb5d229b9c87003865eff8e4cd3,2024-09-05T16:35:17.453000 CVE-2023-46085,0,0,9dc4c2f5c683d49b05b7d8b97a6e8ece306b0768582fb10edaa3cdccb50d784f,2023-10-30T19:29:46.057000 CVE-2023-46086,0,0,8b579f5a7315305a342f8a15fcea16ca5b391d7ffb7c2326d32cfdc260928f1a,2023-12-06T00:39:07.323000 CVE-2023-46087,0,0,8fc482c1e0ce144644419fd37959e19dbd6783827ba3100e4c454e1da27ff61d,2023-10-19T20:16:43.900000 @@ -234736,7 +234736,7 @@ CVE-2023-46497,0,0,8b10cc812a253b8420b049a4202f4dd8c8000282bc3378ad32825242ecc9f CVE-2023-46498,0,0,6c2e35fa160b35749ba12f9a1a87bbe3b0f1b5be4cc8a46ad0646c1042228173,2023-12-12T22:22:27.287000 CVE-2023-46499,0,0,f10e6081e45fc45beec28fc77ee0df11a0c82ba87d969275475eb4cbdaac1893,2023-12-12T22:22:42.330000 CVE-2023-4650,0,0,a98375f77955197db45ba842eea079847a4b7d8f6d23883aea5e89eb4d948159,2023-09-05T19:14:55.743000 -CVE-2023-46501,0,1,72a1b78f5bc2d67d057e83785fba438195ed1d6ddc1f84c4f8b9ca5f4ee5ed2b,2024-09-05T15:35:16.687000 +CVE-2023-46501,0,0,72a1b78f5bc2d67d057e83785fba438195ed1d6ddc1f84c4f8b9ca5f4ee5ed2b,2024-09-05T15:35:16.687000 CVE-2023-46502,0,0,10c20547c194bc54d048295fa68547cdcd34af629ae5b68db47a04ff5be3f45a,2023-11-06T20:15:07.887000 CVE-2023-46503,0,0,6aad2b11adbdf63ee2b98f2f9874d22294e8a21b124457d8975e7ab396baabb6,2023-11-03T21:50:17.803000 CVE-2023-46504,0,0,b1a792f6a001c3d4624673f603358c1faf3cbc35add3c27ad7ea5f5fb8811653,2023-11-03T21:49:46.150000 @@ -234960,10 +234960,10 @@ CVE-2023-46771,0,0,ff7e8107056ac40d3a75affee781a6f0b6057f1a67f4262c626e5326a010e CVE-2023-46772,0,0,0dac565abf640461f2d329b6c68e8308bbc45aba4a38448b0c8d502a445ad2f5,2024-09-04T19:35:07.837000 CVE-2023-46773,0,0,ca9bcc99fc127ca69b0a6c672aebe92fd6468c81b50651408fe18f527dbc3d5c,2023-12-11T16:14:54.787000 CVE-2023-46774,0,0,e069ad0656ced8cb8a3e80bcd64bbf8dc3e14daf29ef1e512ab38211ed7d6ed6,2024-09-04T20:35:10.633000 -CVE-2023-46775,0,0,31785820fa6079b1d6c8af86a3f5165c3033d3153ed9fcdfb00e2691b8407939,2023-11-14T17:04:19.490000 -CVE-2023-46776,0,0,9b7a913657cbe82989a072b4e599a2e9cbc3f6149dfdd0d2cb7c46d341cf7d27,2023-11-14T16:23:57.467000 -CVE-2023-46777,0,0,9b7be18d7155a450d2998f3f3c90b408cb4a79a57e309e27593be89b685b1b99,2023-11-15T20:21:23.860000 -CVE-2023-46778,0,1,96f8bd0b1b74c8ad751d156457055ee9ce1e8384e4c382bd43d2369d47c6c424,2024-09-05T15:35:17.763000 +CVE-2023-46775,0,1,cd02bc19884781a7989d5c489146831133ae45a35b380d030d4c6ba277a6b928,2024-09-05T16:35:17.790000 +CVE-2023-46776,0,1,9c30b4fda47a3f731339000c1bf8f5493340341fb5291e3323035e0727204280,2024-09-05T16:35:18.017000 +CVE-2023-46777,0,1,13e34ea99551bfa30a90363cbaf68d0f00e1dbb7938a0367b34dd70cf203dddf,2024-09-05T16:35:18.237000 +CVE-2023-46778,0,1,91cc5159857274c4d34b400e32efa3ac951dcd5180258fbf86ac0c129a8da81c,2024-09-05T16:35:18.537000 CVE-2023-46779,0,0,fb8dd4588744165f72717c6f7064a9d35a0fc366824ae88742f0b14ef2388494,2023-11-14T16:23:35.977000 CVE-2023-4678,0,0,38248279f2fa62a8482191e3a53fbfd6c141788a325046ef84e5cd7c6951e6d6,2023-09-05T16:25:18.257000 CVE-2023-46780,0,0,0536a1d17e54dea2e10342aada2843adfc4a23b9b52a8f274b4302542fae52d4,2023-11-14T16:23:28.687000 @@ -235007,7 +235007,7 @@ CVE-2023-46818,0,0,f234f9e3a48282f81299c3ff6ed7b1a1d071eb6e821f675508ca8b30a7e7e CVE-2023-46819,0,0,b9144c8b43b7e50be02f0a7adb87559b3a81cc8b960f11a9c9b61dc6bebac590,2024-09-04T19:35:08.043000 CVE-2023-4682,0,0,c1c0d3bcf2f406c6bcb06b0a440260f9dabf84e5ad23fa025bbfa655e8c647fb,2023-09-05T16:24:54.687000 CVE-2023-46820,0,0,aa393ad58ea962d201742c7c0922f5354d3e88c5c877ebf040d42c8c1854c0a0,2023-12-06T17:29:13.157000 -CVE-2023-46821,0,0,565a434aaffda440f0abfe8e876d538e60c3e8bcc4c7c70f0b23ae29dde8ffb0,2023-11-14T17:06:01.507000 +CVE-2023-46821,0,1,b9ae41bf73dc8c4d515dffe86f079303167a84f4c65b46ae0b6be2ddb87f9d76,2024-09-05T16:35:18.747000 CVE-2023-46822,0,0,8c05d50ce279914b9368614ca9374ab94d572c57106adaeb969171d9e37b0bc1,2023-11-14T17:05:20.447000 CVE-2023-46823,0,0,838996d884d75f252032956fee2566dbd07b3e32228ec936beec7708a42ee70d,2023-11-14T17:05:47.417000 CVE-2023-46824,0,0,e6fd14c677d2928a78738bda0cb11b0c31e9600c7371df7212465bdfb458e0aa,2023-11-14T17:05:13.743000 @@ -235184,7 +235184,7 @@ CVE-2023-47099,0,0,876f65e49ce2139d32b009e810e0bf4ff23c563f488b91a5ee2b49486c6e8 CVE-2023-4710,0,0,a0224298208f34ca4769d5a2c8e14a419e604cd59ba4d8dc5f730e20dc163acf,2024-06-04T19:17:54.807000 CVE-2023-47100,0,0,ff970e0bbee0da60d74f669b9fb5cb216763ce026187e12f8579e05200812a64,2023-12-14T05:15:07.690000 CVE-2023-47101,0,0,6c9a48d40a1055fceb3f17ec6c8c256e3f1e32b0cee934d441466afc6f7344b0,2023-11-07T23:53:29.037000 -CVE-2023-47102,0,1,bb32c5cb2274f695bb77b1dcabc1de081035b480bea1daa5bd9c69bcfd55cd77,2024-09-05T15:35:18.967000 +CVE-2023-47102,0,0,bb32c5cb2274f695bb77b1dcabc1de081035b480bea1daa5bd9c69bcfd55cd77,2024-09-05T15:35:18.967000 CVE-2023-47104,0,0,e30bdb183e8612d2b8bb0765fc25c7dab84daae352a903ad00c50b64df43a7ea,2023-11-07T23:11:46.987000 CVE-2023-47106,0,0,274f9f8003b54fe6ff33410b194e51c238d7f0e1d1e6019e27d3ee23d36974d3,2023-12-07T21:01:57.647000 CVE-2023-47107,0,0,62b3eb30757fd38e881b6505c45a9191d7dd7c665bbdd43f636c7f315820da31,2023-11-16T14:27:03.320000 @@ -235249,7 +235249,7 @@ CVE-2023-47177,0,0,fdca9aecea882266a46004c6f5c24cc4c8a1a12b8670913d232d4092578a5 CVE-2023-47178,0,0,86f510c83613716e8f6a022be6a02e2beb32ed09a61a6b2eab7f5b7cb2dcf49e,2024-05-17T18:36:05.263000 CVE-2023-4718,0,0,b03d0f7acfe699b0ac20de2a399cf8afe19aca9042668571b8871cffdd0352d1,2023-11-07T04:22:53.677000 CVE-2023-47181,0,0,3dc2ca3ba78467f5ca9480d1c4743c913cb482b9d92370c750a2f20f50ecf96d,2023-11-15T17:31:40.323000 -CVE-2023-47182,0,0,4530c63754f83baa6d92e81763d076d1f116f9c70fd207d4560a94fc1b35467d,2023-11-14T17:04:32.890000 +CVE-2023-47182,0,1,85fcb91c870e2334633467c6bc6ee8fc4a29a3a885f25d1406309244f9dd5ced,2024-09-05T16:35:18.960000 CVE-2023-47184,0,0,0e34483beb08ccb1705267d4deffbf80344ddf7ad18151e69346821974010f90,2023-11-14T17:04:27.783000 CVE-2023-47185,0,0,31d0ed95ef79eb7f0380ae191ec187467609370f123f9ca972b43bb5e4c6eb08,2023-11-14T17:04:12.320000 CVE-2023-47186,0,0,bebfc46319f229be3067c1071524052c7ba3b45f40025f4ace9bbd6b4fac1423,2023-11-14T16:23:05.433000 @@ -235415,8 +235415,8 @@ CVE-2023-4745,0,0,145f98fc073ebf05e724a7f3156e900bb8061cafe1b7f340f6b7e3f0644fb2 CVE-2023-47452,0,0,c006b66fa65f28153e689c864b32b187000ffb519b3d97f5ea4e177be7c362e0,2023-12-06T17:02:02.023000 CVE-2023-47453,0,0,40e9a49bd70adac587d3f7bab698105f42529404384c743efd5c5b71ec4e1bda,2023-12-06T17:01:25.083000 CVE-2023-47454,0,0,8fed701b71b44ba4cba8a37edc62ce63fc8fe0656ad2f371a4585ebaec460ada,2023-12-06T16:55:22.653000 -CVE-2023-47455,0,1,00ea5e5a14d78764ae969919353ec39cb126f3e4a8aa9c79d6ca44d6d641046e,2024-09-05T14:35:12.283000 -CVE-2023-47456,0,1,d43eb8ca075166c5e7fbd67a3bc1fff1cc4a52b01c33b988b8a299ebf6973bb3,2024-09-05T14:35:17.953000 +CVE-2023-47455,0,0,00ea5e5a14d78764ae969919353ec39cb126f3e4a8aa9c79d6ca44d6d641046e,2024-09-05T14:35:12.283000 +CVE-2023-47456,0,0,d43eb8ca075166c5e7fbd67a3bc1fff1cc4a52b01c33b988b8a299ebf6973bb3,2024-09-05T14:35:17.953000 CVE-2023-47458,0,0,0007614786d252207bf5606a309453a78c6c30291555854be9f51258aea455b6,2024-01-08T19:29:49.160000 CVE-2023-47459,0,0,7e45b8dbba72569a5cb67ce1a8e0b7467604a9784f2ff9ca32c5218334a2a7f9,2024-01-23T20:27:43.677000 CVE-2023-4746,0,0,26013a430c4d4a7078676100edab0baa509c5bca37f8938011599d579aca0e9e,2024-05-17T02:31:46.187000 @@ -236602,7 +236602,7 @@ CVE-2023-4908,0,0,2157a1992986fbdb556ff3b644e13f19766c3aff76203a54b7f145a49dc7ed CVE-2023-49080,0,0,78bcfe48eb6e40c7b429674a2a599644b879fa688721a08bda1a08d7d7897b45,2023-12-14T03:15:36.243000 CVE-2023-49081,0,0,8fa769ede6f9fa1ffb05b8bf5929ed5fc24808c793c96bf2da8d1c711710cdca,2024-01-29T14:15:08.373000 CVE-2023-49082,0,0,68c06e42bbd9df7a51655743e033791cd35243155ed9ebf100c9c773fb9d2e4a,2024-01-29T14:15:08.580000 -CVE-2023-49083,0,0,5e52bca90d6890cd3247eb03061d3c728c96e2f1ec3750ffa0a4ceec9a1a23c0,2024-02-17T02:15:45.350000 +CVE-2023-49083,0,1,3dd46686ff8f9453426b69f56a07285783aeceaf52630ca5e49644ff03c7c3fa,2024-09-05T16:09:10.430000 CVE-2023-49084,0,0,2f2213d16a3ce8be9409cefbf98b10505fab1cb6bbe5cd697ea6f6b6a59cf001,2024-06-10T17:16:15.150000 CVE-2023-49085,0,0,6a9bd4750d287dae816695df35b6fabd5f3ca1a04f47cbbf3222fc8327892b86,2024-06-10T17:16:15.307000 CVE-2023-49086,0,0,5e84115449ffcaccacec5822563c5d4c42dbf9c46fbbe9165fbda83eb336a989,2024-06-10T17:16:15.433000 @@ -237682,7 +237682,7 @@ CVE-2023-50778,0,0,4c2b380d1452ab879c0bb2f5c89c5ce489b1f3e5d975b71bfe4549f784edb CVE-2023-50779,0,0,a0c5abaaea21dffc7e5a857a3cc8d6fdf18a54e29bad4eca92e474cb6a42116d,2023-12-18T19:09:28.547000 CVE-2023-5078,0,0,df1630d406513e5e98f689a68136c5e13ac7072ff4d1809632880572b8c33161,2023-11-16T18:01:15.060000 CVE-2023-50781,0,0,4cd11cbf33226a1d3a67a681c39cb955b0d7b7bd73503eb21db0ba61d3e9a3f9,2024-02-26T16:27:47.760000 -CVE-2023-50782,0,0,315916370f386a201b25a21080b7835087ab172a8af9bbdc447c4e22d9c155b1,2024-07-26T22:15:03.550000 +CVE-2023-50782,0,1,75e4b5549217f027f3387947d4db2096cb79eedec4a878f9b0a87ffba322d82a,2024-09-05T16:43:20.083000 CVE-2023-50783,0,0,6b32c482163913116bd4c154365475f6fbb1c73c4268388823017e442458c167,2023-12-28T13:45:11.130000 CVE-2023-50784,0,0,310bd016f72a55e87952759915b2328751f88f7e5a355286cf6eeaceebb855b6,2023-12-26T03:15:08.927000 CVE-2023-50785,0,0,95069a7af58cd3ada76ed23cb42a6b26c34f9d8527e1cd720c0edc9a0997e9b2,2024-01-31T19:16:46.520000 @@ -238024,7 +238024,7 @@ CVE-2023-51399,0,0,dc08a4d08a5cc5293be41869eac57c6727440d18c0571d07e862147d070b7 CVE-2023-5140,0,0,066b1ede0076df42542c74ba56d5d635f3d8a3cff298f29d4f81efa1c53798ac,2023-11-24T18:49:51.220000 CVE-2023-51401,0,0,5924e22b4143fd61d70082cbd83b3b3b579d9e8b5be7f7fc9538ddf3b1156db2,2024-05-17T18:36:05.263000 CVE-2023-51402,0,0,970aa84c6b6b415854b593361861ec020e2a23fc8021333d47d19fa7d6160471,2024-01-05T18:24:53.843000 -CVE-2023-51403,0,1,b4f2e7307cecf40ed39b76de5398a6fa158dd9554e5c15c6527d51603fd06b4d,2024-09-05T14:24:36.200000 +CVE-2023-51403,0,0,b4f2e7307cecf40ed39b76de5398a6fa158dd9554e5c15c6527d51603fd06b4d,2024-09-05T14:24:36.200000 CVE-2023-51404,0,0,6fe66be111b736ad1956b74d653d54ab55954ebf192bc434caf7ae6f4e5ee7ad,2024-02-15T06:26:06.387000 CVE-2023-51405,0,0,9d7aa3b8a8bd4ad5c27ea38af064f7d8540cae5f55054eb98b91f67c7dd664d8,2024-04-24T17:16:50.397000 CVE-2023-51406,0,0,99547e5e86e2ff00add5038fc7d7da1ad075a7d662e68209f6b24e13ed4c1beb,2024-01-12T15:58:15.567000 @@ -238338,6 +238338,7 @@ CVE-2023-51708,0,0,0dfdbb5d7cb1389f759816e9ad4172bb998d429b0df64366077376582584d CVE-2023-5171,0,0,8948c3d814290078c1c43176052421493848da5536f54700b55247d4792fc4ee,2023-10-12T02:52:09.820000 CVE-2023-51710,0,0,79ce6e5c96d55165aab5c91dac2a06a015fe7d1749cae928be620bf7f109c0a4,2024-07-03T01:43:17.330000 CVE-2023-51711,0,0,f4ab5b198dd0eb861779e76dca93509630faca36266948295b7495303f7c685b,2024-01-30T21:10:53.387000 +CVE-2023-51712,1,1,c8ebea51f5725f79d9a2d66e527f595f0a0142f1b753aa0d944b15d999be8fca,2024-09-05T17:44:56.007000 CVE-2023-51713,0,0,fdd6a3aefaeb63afebacb6e639ea6879a7a88ac0ffa6f2349591e85a6c3dc899,2024-01-08T19:06:50.837000 CVE-2023-51714,0,0,a476f3917c564d9c6b203fc32aafdf2c3833beb73f4e6eda8679d21661ce79ce,2024-05-01T01:15:06.390000 CVE-2023-51717,0,0,0e2a37f76ad2a0357193c8d2d90c0f37b2227f38264031d1f3750abc9dcb17d0,2024-01-12T15:17:16.457000 @@ -242142,7 +242143,7 @@ CVE-2024-1147,0,0,5da69e40e8a720c3c3c366cde1a8363ffbcff6346e82168cfd4c7602d33328 CVE-2024-1148,0,0,55b3cfe72144d3f21629750ac052bc7072169844e3b194a6a00d557d611fa424,2024-03-21T12:58:51.093000 CVE-2024-1149,0,0,b02f2ba30bfd9b077afbf478cdb43cc9b464ca358abc4a5e9f7416d9d1b2fcff,2024-02-15T17:52:08.970000 CVE-2024-1150,0,0,b47a3c09b3a331a50594ab70df2061c7818f30992462806b6f5b7a310a00b60b,2024-02-15T17:42:08.113000 -CVE-2024-1151,0,1,996d77104b7e1cea4eb775f5ecdcb3b372c096dfee4bdc14acec208e36fd5325,2024-09-05T14:17:17.603000 +CVE-2024-1151,0,1,4bd96d45d8577f9810851348ab4eeb008c26399957744dd5c6d2cb4a43cb1738,2024-09-05T16:15:07.097000 CVE-2024-1153,0,0,f63803b078e32875d89d575d4b462673565a6d5cdf9ae1c5582d3c5142b3f8aa,2024-06-27T17:11:52.390000 CVE-2024-1155,0,0,d758d36f3a75477090d9513d8ce1d0fb91b0226929e863bd461e737f3d8138d1,2024-02-20T19:50:53.960000 CVE-2024-1156,0,0,d72992d03594c16afadbf16a64f145c65aa8548416754605a40b83a0941682ae,2024-02-20T19:50:53.960000 @@ -242412,7 +242413,7 @@ CVE-2024-1429,0,0,e6662f9b0f545f55c7ee8bcb23a23604a89d336e239381f2a1bde6ff8a2452 CVE-2024-1430,0,0,5f572c70d25522d061e4003dc5db707a19ced2389745e1d9c2e010c648602583,2024-08-25T06:15:03.247000 CVE-2024-1431,0,0,dffeae7ac141470af7be0b2328a469b677a187755a6f5b33a0e207b69e8951ff,2024-05-17T02:35:26.750000 CVE-2024-1432,0,0,c5cced34d488ad6451a389f4ef94ad47e3a692cf248f0465497b6f18a4764cd4,2024-08-01T19:15:36.183000 -CVE-2024-1433,0,1,503a018f7e508b949fa5ae2c0e1e3e22da9064184ebb2ea7c4936c65441a3c5e,2024-09-05T14:00:21.660000 +CVE-2024-1433,0,0,503a018f7e508b949fa5ae2c0e1e3e22da9064184ebb2ea7c4936c65441a3c5e,2024-09-05T14:00:21.660000 CVE-2024-1434,0,0,8f4b723cc8bcc253e7abca4c3ce372412b89e93a6da0e1178f0b19732a73b539,2024-02-29T13:49:29.390000 CVE-2024-1435,0,0,fbebcdb94898a9ad3a34bddb8b900855d9e93e435e1b0c1e93fc82b26df0f7eb,2024-02-29T13:49:29.390000 CVE-2024-1436,0,0,8d8b4f87f68e8ffd37df5a69f50b66808f1e1dec30f5aea12f028a89c8c9184a,2024-02-26T16:32:25.577000 @@ -243018,12 +243019,12 @@ CVE-2024-20080,0,0,90f248eed6a75fce7971996f28983ff9968e454d013e84d03f8b65c25bdd5 CVE-2024-20081,0,0,c71489cf0f2bedca59bdc5569ddfc23bc345fff8731fd4100ad31f358075b686,2024-07-01T12:37:24.220000 CVE-2024-20082,0,0,56503a8297b29c06a4779b6ce0cb09b68c0c4128ced5292c021ec15204e93c22,2024-08-14T15:35:04.003000 CVE-2024-20083,0,0,d9b832ff5357fbfb0bb330afe0c52fd472ba2f26e66518e0a2caf3dcf4f28daf,2024-08-21T18:35:02.057000 -CVE-2024-20084,0,1,d1fc561ac457a6acb1dfbf96e2747750bce0b9bac0ec9cd44908561bfe9c7ff6,2024-09-05T14:25:01.243000 -CVE-2024-20085,0,1,06080930cc511fe21fc406bc21b717ffeaefd6b8f98ff8de0fa40292e8bcab54,2024-09-05T14:26:04.570000 -CVE-2024-20086,0,1,8780d075b25aa8bf05c3510517bcecefce7f85de8ebc6159682cf3ebd530eace,2024-09-05T14:26:34.557000 -CVE-2024-20087,0,1,2f5d7a31aa34aa82f766600cc0380d879410c6c21363c39a9c898fbc9d48ecde,2024-09-05T14:26:51.497000 -CVE-2024-20088,0,1,32cc03fb498193be949fe1ffa83586a9683f15b97311ca3d66ce33be6ac946fe,2024-09-05T14:27:24.840000 -CVE-2024-20089,0,1,f13b8ab21b15dc030dc24d817cc35e46777b9ef3b81f1ca22a499430278aeff9,2024-09-05T14:28:02.713000 +CVE-2024-20084,0,0,d1fc561ac457a6acb1dfbf96e2747750bce0b9bac0ec9cd44908561bfe9c7ff6,2024-09-05T14:25:01.243000 +CVE-2024-20085,0,0,06080930cc511fe21fc406bc21b717ffeaefd6b8f98ff8de0fa40292e8bcab54,2024-09-05T14:26:04.570000 +CVE-2024-20086,0,0,8780d075b25aa8bf05c3510517bcecefce7f85de8ebc6159682cf3ebd530eace,2024-09-05T14:26:34.557000 +CVE-2024-20087,0,0,2f5d7a31aa34aa82f766600cc0380d879410c6c21363c39a9c898fbc9d48ecde,2024-09-05T14:26:51.497000 +CVE-2024-20088,0,0,32cc03fb498193be949fe1ffa83586a9683f15b97311ca3d66ce33be6ac946fe,2024-09-05T14:27:24.840000 +CVE-2024-20089,0,0,f13b8ab21b15dc030dc24d817cc35e46777b9ef3b81f1ca22a499430278aeff9,2024-09-05T14:28:02.713000 CVE-2024-2009,0,0,e315bb187496fdfbd237809339603453c22bbf947712d2f37b8c2f26c500e401,2024-05-17T02:37:59.337000 CVE-2024-2011,0,0,4150023a6f5b05ff7bb1f10e004dac522c292e22a6fa4bc68fed9003ca68fddf,2024-08-15T21:25:45.037000 CVE-2024-2012,0,0,02707995e28bba3e21e37a0cc9698bd91832709b25d71785b53bd5ea8c9a7518,2024-08-15T21:19:03.770000 @@ -244094,7 +244095,7 @@ CVE-2024-21652,0,0,e0d7be5546ef01efa9704280134988508a565f3e7e562069f235bc79c8e45 CVE-2024-21653,0,0,ce4af85c3427e8e239faa818c1af79d7b1adc1dc1f140ac9db4d80e88fa5042a,2024-02-08T17:33:27.273000 CVE-2024-21654,0,0,ff7ec2b8812a327818c17013b24cdd0ef431c4abd14d7dd5a8537adb8ccd1d32,2024-01-22T19:45:11.213000 CVE-2024-21655,0,0,e05ae57984fd3423a83e9c7cb5d50a52bb4d06f33337e122d8d866553309143d,2024-01-25T15:36:21.337000 -CVE-2024-21658,0,1,22e5e8cc10afa93809b8c28027ffdea5956dc4bcf07294bc4314615b494c0e4d,2024-09-05T14:39:07.033000 +CVE-2024-21658,0,0,22e5e8cc10afa93809b8c28027ffdea5956dc4bcf07294bc4314615b494c0e4d,2024-09-05T14:39:07.033000 CVE-2024-2166,0,0,9b7c2ee80b4285a4950a2fb64ee1dbeef549dd197f4f8cb63c40c8b7251bf8a5,2024-09-05T12:53:21.110000 CVE-2024-21661,0,0,d5e0d946b3d41760ea6570a14473ae0108c9da74849db85d955568f34a0a7e8b,2024-03-18T19:40:00.173000 CVE-2024-21662,0,0,6c6f15e19e16a5ef9a32b04238e6288a5bcabd1c5ac78c1dc5b6aa6699d17dcf,2024-03-18T19:40:00.173000 @@ -244713,8 +244714,8 @@ CVE-2024-22438,0,0,c546f064f96022d9cfcb345a02091ae2e116d064186c8d0e1fc01e2de8eec CVE-2024-22439,0,0,d7a7b572beee53b66512fc19be17c3d6cb68344acbd1d99f9e2956209263c65c,2024-04-15T13:15:31.997000 CVE-2024-2244,0,0,41aec355f079deb3c815718a9277f010e5e21c50317c0cc2fa902ffd2d6d5133,2024-03-27T12:29:30.307000 CVE-2024-22440,0,0,3d70b2afb8c1daefa939392497f652da82a7db6224ab8e08ddbf5f360293d915,2024-04-17T12:48:07.510000 -CVE-2024-22441,0,0,d974db705829cf05b22e157df217440dd5d74842713d9bc45c9eb02f022d665b,2024-06-13T18:35:19.777000 -CVE-2024-22442,0,0,2e0b0f4766af07c0d6b3ff6e8268c5353293e8f6325a14598f04babe00a2c3d3,2024-08-01T13:46:56.070000 +CVE-2024-22441,0,1,b624581828dca72606ce8eda6c6382b6dd6de672924291674c98df7718b61e7b,2024-09-05T17:42:43.337000 +CVE-2024-22442,0,1,466e9dae5de9dd0d6abffd7401018ab4afc624390239247802cfe4eb99ae2e28,2024-09-05T17:12:12.433000 CVE-2024-22443,0,0,27a67673b7c0ae8982f980390674c80990ca93968fa9f3b73c7d5ad9ff61d8d2,2024-08-01T13:46:57.173000 CVE-2024-22444,0,0,1378366e0b636efd3e2101cecabd93b96114212b319eff1d0d59da40fea2e792,2024-08-01T13:46:57.887000 CVE-2024-22445,0,0,a6af5c7306e37f1c831f19f1accec343bae2ff2fdb348ced0577263d09a6b8e1,2024-02-27T16:51:44.013000 @@ -245924,7 +245925,7 @@ CVE-2024-24498,0,0,0aa227dc68d56b6857000c562a4cac27071ca2f47030d798b9bd4912ab131 CVE-2024-24499,0,0,e4ff37cd2db9d4d32f1157041bef41498f67a3696e29884293222c73e4e39b9b,2024-04-24T21:15:47.147000 CVE-2024-2450,0,0,755e866a7b0db6589d3e0a883887ca70c54bd78a033c510c6d171025dcde46e1,2024-03-15T12:53:06.423000 CVE-2024-24506,0,0,300162b102880c909fef7627ff3cbf7be694917201d061517c5fddd5106c6c17,2024-08-15T20:35:02.267000 -CVE-2024-24507,0,0,db6d74810f343dc9083835da56a72771c241b14db21b5bd25cdd0f323d95a56d,2024-07-24T12:55:13.223000 +CVE-2024-24507,0,1,df900bfc618cee6fc96303e9e74a6c7f402219022adee42ced57945155073210,2024-09-05T16:59:07.437000 CVE-2024-2451,0,0,ed8963260b73d0c2914199c7ccad86d4c10e40338037d43fae0b6a4b737eaa20,2024-05-28T17:11:55.903000 CVE-2024-24511,0,0,19e56e69a02039183df0e76b3f6b366a0c7fe610ce5511009ebec6b3e2899678,2024-08-06T16:35:04.493000 CVE-2024-24512,0,0,46fb434c74a35036e4b3e461f16bf1067dceccece23e9aa7bd866d4f9010f0c7,2024-08-15T21:35:05.897000 @@ -246061,6 +246062,7 @@ CVE-2024-24755,0,0,e4708ab22e90c108e98e9aa20d9e6f52aac9c365db4852f4f377c09577dad CVE-2024-24756,0,0,a8c8a136cbb94318b9ac39b1cf6ca26aedd9fd478d8deeb2b541a1b5348e8aea,2024-02-09T19:47:10.213000 CVE-2024-24757,0,0,cf8db7e707a60167d50958ed833b092b480adb19351f319a3150e724530329a6,2024-02-10T04:10:36.420000 CVE-2024-24758,0,0,4afdd9a8b1527f6df073ab9304d324073fd35a999bf5b108c831c515c647ab95,2024-05-01T18:15:14.833000 +CVE-2024-24759,1,1,1fc2ee80ff047419905c3bf79cf54eedd9e4196b456b6e433fbb1ed0279a73d6,2024-09-05T17:44:56.007000 CVE-2024-2476,0,0,80675065379b57841f9cc91f89004ea3a59650c216e07d02b5d96eca99c32b3c,2024-03-29T12:45:02.937000 CVE-2024-24760,0,0,712e50ebe0dfd036080457db09cbfac631236bade7f3aab0fefe0bd1d6c7650e,2024-02-10T04:04:55.743000 CVE-2024-24761,0,0,b1f2bf902e5fec122e2292b6e3e60586d417fb53e3af18ffd9589198f195ec1f,2024-03-06T21:42:48.053000 @@ -246196,7 +246198,7 @@ CVE-2024-24885,0,0,7a43d600d033d18ff5a631d3c78e01918ca77dcf41ffa14f3f93f7c9b4bb4 CVE-2024-24886,0,0,07792f7aa43278f631451e24100471b838930227e2960a56c45baad7e36474f5,2024-02-15T05:03:32.117000 CVE-2024-24887,0,0,3fa205656c57f3b8cc1d4a749bb5081ff0cd7206e500d6babbaa7ff6268845cb,2024-02-12T14:19:54.330000 CVE-2024-24888,0,0,b2279e9f3983cebdf60d9673f5c59010be319c6bdc9838b075c80c6c5f9d13dc,2024-04-02T20:31:58.463000 -CVE-2024-24889,0,1,eb653f1757b8d0ecc405604c127746de8af7f70043137ce0e6c52c2d047ea3f6,2024-09-05T14:25:21.160000 +CVE-2024-24889,0,0,eb653f1757b8d0ecc405604c127746de8af7f70043137ce0e6c52c2d047ea3f6,2024-09-05T14:25:21.160000 CVE-2024-2489,0,0,5384ec5793386f56145dcd2b7ed1bdc0cd85415e6fc1bf2ba31c17023cb1db63,2024-05-17T02:38:15.500000 CVE-2024-24890,0,0,a79c55b4bff5953d0a0c9eb0d02474b07a57cd541d2fbe3f5c8e8035b3d095ef,2024-03-25T13:47:14.087000 CVE-2024-24891,0,0,5b92e62ad0ac2eb052b30642a8f7421d5e010393de5d994c56396702f4f33a75,2024-04-15T13:15:31.997000 @@ -248642,7 +248644,7 @@ CVE-2024-28077,0,0,05e3d3ecbdb0ca6ba2a68c8f8dd34e1892d6007f9bb748a6ad071a677edfd CVE-2024-2808,0,0,e0d3d3b9e325ca6ee7276bd88e3baf37c479e9082bd582fafdd638b137fbd54f,2024-05-17T02:38:31.233000 CVE-2024-28084,0,0,0adeb03c9958c0a142a2b711719e67fc11a910aa963939e76d45a1c62626692a,2024-03-23T03:15:11.583000 CVE-2024-28085,0,0,eda19307ca318b29329ee67501b0a732155c41fd23b517fccac0883629e2c1d0,2024-08-26T21:35:09.310000 -CVE-2024-28087,0,0,a8c4832eda657cc0d8018b3ce0a9acbfe5de138c01b7547503479ec3cae0cd6a,2024-08-20T14:35:07.653000 +CVE-2024-28087,0,1,7d1e7fc9998a545b97a99bde83eca225ea08b2d2bd96cb17f305adc67ff6c996,2024-09-05T16:15:07.437000 CVE-2024-28088,0,0,7621167029939a351662bffd11ebe0b64eaef26da83ba8e299fe7ca6c0872c73,2024-08-26T20:35:16.413000 CVE-2024-28089,0,0,8dcfc5f0af6bda2c62c3d6583b98af8806f63e5c3b009d2d4c4b9e591fef1377,2024-08-19T20:35:09.170000 CVE-2024-2809,0,0,82a495e20989f000a99f2c2b597fd459041cdf90f3f5905ac9eb213a6d9d3a11,2024-05-17T02:38:31.340000 @@ -252446,7 +252448,7 @@ CVE-2024-33657,0,0,4304e9ad6a833f4e772f3f337e66d35550f113c5280de638d62e655b681eb CVE-2024-3366,0,0,a2c419b6dceb854c8524f6fea56c90f31e3f9047e1890ead74a66fe52a9e4023,2024-05-17T02:39:53.090000 CVE-2024-33661,0,0,1fe83f392b56cfa5102f5ff20013157b18140b66b95ef00cb93915789153e2d5,2024-07-03T01:58:33.073000 CVE-2024-33663,0,0,e1e5e3bf2bfb6f84f42175dcb29cc9799e837d7e631a8436167d9acbf72c8e21,2024-09-03T20:15:07.433000 -CVE-2024-33664,0,0,440f3b356aa3864ad0c1183799aec89a4bb9f6d6cc531f552f11b1162ec3c321,2024-08-07T14:35:02.110000 +CVE-2024-33664,0,1,fa102b47e0b0f78985d310d8b8074ad26f7b0a8f6e346244359d7ca87f4b731d,2024-09-05T16:15:07.570000 CVE-2024-33665,0,0,5ca9bdea72a653edb26c9763ca65ae33540673cea00ec4859ff84abbb4dc8bf9,2024-08-02T03:15:30.310000 CVE-2024-33666,0,0,8e982c6a0c03f8b5d1cbd58e6d45d8ee40f43b5fb9ebc6cbaefdef7cc6467b9d,2024-07-03T01:58:33.837000 CVE-2024-33667,0,0,d9a60490b5a47ab58d6800af0e868d69fb5acbd4454834ffe597651ec1e47cdb,2024-04-26T12:58:17.720000 @@ -253176,9 +253178,9 @@ CVE-2024-34647,0,0,e317ed6496e4aa586bd11047d35b17feef7523f86ecd05c9da2f725afcae7 CVE-2024-34648,0,0,1e6dbbe77ed97622b756d3057162d26db67ca4ea112b590ffb36caf47d43295f,2024-09-04T13:05:36.067000 CVE-2024-34649,0,0,cb8c945b910593bb4442f9829c0aeb4b899de2f73eda03e4758d8aecda2a79cd,2024-09-04T13:05:36.067000 CVE-2024-3465,0,0,6e61814cfea547ec37c26ad0e88e359beda44dc20babd4ed16862aa3d501f9c6,2024-05-17T02:39:57.623000 -CVE-2024-34650,0,0,0bea05dfb800e065e239837393fd426986271bdca74d1d554e7707545e631960,2024-09-04T13:05:36.067000 -CVE-2024-34651,0,0,4b29c983209fc312cb62ffd70012cb09e72c5e6d69abdd40f27d469d56f429f3,2024-09-04T13:05:36.067000 -CVE-2024-34652,0,0,030d7fbafcab024f4f738079100dd15a72be63cfa630026ec72f58598e2aaa97,2024-09-04T13:05:36.067000 +CVE-2024-34650,0,1,8797381424653e69272b40924388c1155306dbb9ee2a15fbf1039c6208c5975a,2024-09-05T17:59:36.770000 +CVE-2024-34651,0,1,3a20d3629137de84b12f6ced22ad825416197d4c55039595219fc5b45329b2cf,2024-09-05T17:59:25.727000 +CVE-2024-34652,0,1,5fcd4fa460cbaeec0f8df845e452b826bda7eb569c47b7926c3e1d9633ab54dd,2024-09-05T17:59:08.393000 CVE-2024-34653,0,0,c3a7e954eae03c5034f7310465d52a6d651a7628b08f94570c9641d6a004f62f,2024-09-04T13:05:36.067000 CVE-2024-34654,0,0,1d61292010af329608ba714089b18097d9f4fab29ea3188e580a21180dff7fc9,2024-09-04T13:05:36.067000 CVE-2024-34655,0,0,2b9a720979634d406c7a6ab85768813b9644c17199100988da7cc12ecbddf162,2024-09-04T13:05:36.067000 @@ -253188,7 +253190,7 @@ CVE-2024-34658,0,0,0bdbae0b2b42061a8353c4769a7cf5c4aeee0cbc7bbbfd2a997adcca4577f CVE-2024-34659,0,0,dd3f9420e24bf859148c793c2123fe1fcf6f82da97ec67367518f44415c24946,2024-09-05T13:48:55.767000 CVE-2024-3466,0,0,0337eeb2bb11dc2971562c8acd5fd5c98aad745dda4239343a7e69d2339c0489,2024-05-17T02:39:57.717000 CVE-2024-34660,0,0,0b2d2bea24d7fa6e914da9f7286c2cb2a544faaaec97dda10fa17e8966604e75,2024-09-05T13:30:28.343000 -CVE-2024-34661,0,0,86fb073227a0dd613057f3719ad39bcd8598c9a473c97cebd24947114c578627,2024-09-04T13:05:36.067000 +CVE-2024-34661,0,1,39eda7ed3fc18d4431971deb4f86b7b12866001e42dbec50f2575ba9405dbbce,2024-09-05T17:57:44.563000 CVE-2024-3467,0,0,f97f520f5797999559b92a7c0577ac536f47706a8739d6dd391d5611a09166cd,2024-06-13T18:36:09.010000 CVE-2024-3468,0,0,b143f709020bfa0c4d31a3d3e75dcacae5f0344d8dcf22b8e7a02c60ed5e45e0,2024-06-13T18:36:09.010000 CVE-2024-34683,0,0,9d29c0ceca80aeb9ddf34072d48291a9d5d5d5decac1bcbe5defe30bff14c867,2024-08-09T20:04:44.060000 @@ -254729,7 +254731,7 @@ CVE-2024-36969,0,0,e622ab8131a3dbc40ec2fb2b416de8073d7058b237c224b8ddf44dea78c18 CVE-2024-3697,0,0,6e56c636d90d09536d9c0a6418223e2755a5c4ad9d107f96b9c5e19a7cee17c5,2024-06-04T19:20:23.323000 CVE-2024-36970,0,0,71019bd2eae5fd365be1f562acf6569962a155e7ea79c468fc47a7884a32f8dd,2024-06-10T02:52:08.267000 CVE-2024-36971,0,0,19a783e743bca7b704f26b9e2c301763abbc69d1adcc4e7bcc3cfec2328bc2ff,2024-08-08T14:49:52.603000 -CVE-2024-36972,0,0,a2ab0e02a9dc38f992f1abc892dfaba943164f0fa5c0a17bc8e30ba95822955c,2024-07-03T02:03:56.627000 +CVE-2024-36972,0,1,7bbba9a70bef2603cbb612a3ea6c357acf950e5c749701ab5770f0ee97a6dac2,2024-09-05T16:35:20.120000 CVE-2024-36973,0,0,ad2c4092d909690c4766323dda96dac09439cf4ae37914f4902c28191444a81a,2024-06-21T14:15:12.250000 CVE-2024-36974,0,0,aa342464f56df4c331d398bcc0f3e68d9c36f35501b54bcc80e29a36fedbdd6a,2024-07-05T08:15:02.943000 CVE-2024-36975,0,0,5fee8a8667371d6492e42fc16656270b45581df0fcea64415a84141dc6966f70,2024-06-20T12:44:01.637000 @@ -255727,7 +255729,7 @@ CVE-2024-38477,0,0,f870fe888c8d23cfdfdc0433edf103c8cad01a9d525dd04e1a70d1ea4bc3e CVE-2024-3848,0,0,3a1e7dbb50cc54ecdbcc89881c429869965f00f9d2e1eb9f088acc297fe8920f,2024-05-16T13:03:05.353000 CVE-2024-38480,0,0,04c4f9e75ecb94da8a57533882d0899c4c9616c45f6d4f0fa40fb0af2c036f64,2024-07-01T12:37:24.220000 CVE-2024-38481,0,0,a84ef873be05988cbfb5d94abd02b4ab54b65ea0e48ede31f1ebc6095538ede7,2024-08-02T13:54:44.360000 -CVE-2024-38482,0,0,8ee6959d7a30823b850064776bf7b0de352ea772f41670edbb7ec14c9ec45a23,2024-08-02T12:59:43.990000 +CVE-2024-38482,0,1,9abc0a21b4d338765e493606e519fec01088c089d21089e2acce085b7e1d0261,2024-09-05T16:04:53.577000 CVE-2024-38483,0,0,d89f0c1af2745eaf3307200f5493e8a825a53b577d01487f0db0b0e51a7359ef,2024-08-14T13:00:37.107000 CVE-2024-38489,0,0,93d5075288eb71dc5e05de45f3028a8abf40e549af9e7f74c8d90c91ab2994de,2024-08-02T13:54:55.697000 CVE-2024-3849,0,0,5306fee696144db88733a07d80a07ecf85ac2a8ec15f60e756615ae8c2f2566c,2024-05-02T18:00:37.360000 @@ -256653,8 +256655,8 @@ CVE-2024-39911,0,0,ce593cca829f23641e34802a63c29a224f25ec101baa494868b880f46f8db CVE-2024-39912,0,0,4436d60855b958a3375758a6aab42c07e9fab81e2780af44769632fe57f2c7e5,2024-07-16T13:43:58.773000 CVE-2024-39914,0,0,02387d67ec6b5ae42576fd903e8c611ccc330a426fa97d240f1f6c354444a7e1,2024-07-12T16:34:58.687000 CVE-2024-39915,0,0,5ec2bdefe8c5cab79f2425e6d7423ca1431bc3eed9fc27e781bc8d91b05089c7,2024-07-16T13:43:58.773000 -CVE-2024-39916,0,1,0bacb2a6eaead56f96203570d4af508efec37e1c5b4249ba088a1678c749d5cb,2024-09-05T15:34:36.877000 -CVE-2024-39917,0,1,8c92c82207f1de5e5e44be521e17240297f18740ef2f4872c5e417832d7241c9,2024-09-05T15:43:23.117000 +CVE-2024-39916,0,0,0bacb2a6eaead56f96203570d4af508efec37e1c5b4249ba088a1678c749d5cb,2024-09-05T15:34:36.877000 +CVE-2024-39917,0,0,8c92c82207f1de5e5e44be521e17240297f18740ef2f4872c5e417832d7241c9,2024-09-05T15:43:23.117000 CVE-2024-39918,0,0,a01d13ae0b603735ac5bf07d7a2e68692283e08ddeecd7e6f7dcec848231b550,2024-07-16T13:43:58.773000 CVE-2024-39919,0,0,ef22e6bc228ea2cf3764fb5e5dab9f5aabfb0f60858f62004efb01879ab42cf0,2024-07-16T13:43:58.773000 CVE-2024-3992,0,0,d59b458f7245a3919fa8340af270cf293071474241b7e0b0583fac012fe7336d,2024-08-07T19:08:22.713000 @@ -256874,7 +256876,7 @@ CVE-2024-40640,0,0,7e1f28a17873c57850e387e604bc4923eccdf39126e84bd67e6dd03b6e2f6 CVE-2024-40641,0,0,522a4579f3ed40c8409e84cbd3831ae35d4e964d4b63997db7ecee22d7238032,2024-07-18T12:28:43.707000 CVE-2024-40642,0,0,52188ba83c5687a42ca6bf3b40cbb605fd36febbce87a10af01b131e81625f9d,2024-07-19T13:01:44.567000 CVE-2024-40644,0,0,8d0ece2aba41191aa8cffc7ae7308207db8244882c164f6563e6a939c3d6015e,2024-07-19T13:01:44.567000 -CVE-2024-40645,0,0,8b31a06059a494455269a3b8eb929ceb21e3b755bbaa920739df5d0b92330056,2024-08-01T12:42:36.933000 +CVE-2024-40645,0,1,c5d696c93dacee54aa97dfea7bb392eb61945c1f1d80336104e770237e779504,2024-09-05T17:09:16.947000 CVE-2024-40647,0,0,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000 CVE-2024-40648,0,0,e2349aa5f69c8421d1802e501ed70a5d9670cb28532fa26d74d83879e98ba750,2024-07-19T13:01:44.567000 CVE-2024-4065,0,0,e9243298c32ccba8ab1ac6d427150517ee98217790d2dec0b1b5ec685d8cbc83,2024-06-04T19:20:29.227000 @@ -256941,14 +256943,14 @@ CVE-2024-40786,0,0,1d5a22dc485257f61ad56f387446230ed28d8c6d76c2d4bb7e66185337af2 CVE-2024-40787,0,0,e7872c59114f8bc6e1d61059bacac8cf94d2c897fdc9c325ee9cdaea3ebeeed2,2024-08-26T17:47:24.847000 CVE-2024-40788,0,0,51328768774901f71a8cfa9e0731eec2a8688c92707f2ca0771dadf5f755cde3,2024-08-26T17:49:39.517000 CVE-2024-40789,0,0,d0cba5a2db3863932e9e1a9c379737076ce24b22d2521d505090b6fa80e9acdf,2024-08-23T15:38:01.380000 -CVE-2024-4079,0,0,77480512c155cc1ba9c6d21d28dd3b07d5f78d0d04ff147411735ae27b258bce,2024-07-24T12:55:13.223000 +CVE-2024-4079,0,1,bb93991a44f221a491ad95feb924066985bee7115b17c98782fedf8bbd66c067,2024-09-05T17:12:19.830000 CVE-2024-40793,0,0,e270b48bbfb7457af71d2df8b98374cdb1521bf4ad146ca87a93b5903c957504,2024-08-23T15:55:17.410000 CVE-2024-40794,0,0,0846f939e0e7c288e34ad63bc25a9b5387bb5773e036a49319e63c41d5246c45,2024-08-23T15:18:40.450000 CVE-2024-40795,0,0,ecb3737fc9c1d9258aa88dabfa79d9f92976c4e445700e54c3486854d82d2502,2024-08-23T15:23:45.990000 CVE-2024-40796,0,0,167dda6d5b53df5808d22d86ff64345a4ddef11147328dbbb9b5e6428b829c22,2024-08-23T15:11:50.193000 CVE-2024-40798,0,0,6d1152787dcea537c7e301ba90812de2a5fee24ebce973ba886712a223c78f27,2024-08-23T15:10:16.290000 CVE-2024-40799,0,0,30d98ec87bf2d9634952ceda39a0df401d585b86f88feda233e1fd632794577c,2024-08-23T15:08:08.647000 -CVE-2024-4080,0,0,6e71df6568bf77146867d1944749c9d0835b7b19c10d04222a53e49f387410f0,2024-07-24T12:55:13.223000 +CVE-2024-4080,0,1,3208a4e2c1701a8955389b97eb99ba9a08ddab88da9fab5dc755bfee24643da9,2024-09-05T17:16:23.233000 CVE-2024-40800,0,0,8982c6397894b1dc7853d99d7f7ed84917fd2baa65d0f955e452134c8e783d29,2024-08-01T13:58:06.780000 CVE-2024-40802,0,0,2f077053b399c3f7f7833d620863c41648e3e5560dfd43fbc619d567c4540b58,2024-08-01T13:58:07.597000 CVE-2024-40803,0,0,250e23643ab70825c88d787d0aaf9fc9eb4a1612199960dbb1b65e0a8601ad01,2024-08-23T15:04:55.627000 @@ -257211,7 +257213,7 @@ CVE-2024-41096,0,0,e27d9a9f6ddb33e4e88e9e812b9df7d691fa3ced83e8d0561956e8d8df8a0 CVE-2024-41097,0,0,8ffa9b9e856e2e1225333d7bfce6fb672cf2f57b102ea514cd3f552a0421fd70,2024-08-22T13:14:48.640000 CVE-2024-41098,0,0,237dbea03703cdca512eadfee5b46e503b7d4deeacfff8f1388ee9743f950b5e,2024-09-04T12:15:04.447000 CVE-2024-41107,0,0,915f86d966f5052f8f4738594970b5192d92a928e05127ecefed6fd25d76d731,2024-08-01T13:58:18.103000 -CVE-2024-41108,0,0,daaf049d75854e89d8d3d930835471f8a7387b1098b5ea5bfe30ca4174f38e4e,2024-08-01T12:42:36.933000 +CVE-2024-41108,0,1,a789f7b30bfa16589037e73208bf53d149517f9d21b7a48a75aded9d6e98d22f,2024-09-05T16:27:50.103000 CVE-2024-41109,0,0,6e64213670db8f08136c5da3a157b68e75923efed5e9eb7ffeadc18fa0a3ced8,2024-07-31T12:57:02.300000 CVE-2024-4111,0,0,a3e4bcb39778569b3be84e8d38a6497dbc2fc6b5a3693d9cc21532b8df994ada,2024-06-04T19:20:29.827000 CVE-2024-41110,0,0,73fe8c24dc51cc9ae0d0f228bfd2d081609568fbc3ab82eb1b26156020a860c9,2024-07-30T20:15:04.567000 @@ -257228,7 +257230,7 @@ CVE-2024-4112,0,0,66f333e775e64b1480506fa97b6a827bfd5dac62e9e10520346f3a867cac6c CVE-2024-41120,0,0,a70d4faa55c7ddaaf93976569e1c96bdce498cb1f9f22f75468c1ec57f8b4cef,2024-08-26T17:33:33.787000 CVE-2024-41121,0,0,91cb53bc29963f11fdf64645513c1c2c3bf3f9456a5f423e3cb1f394f830e271,2024-07-22T13:00:53.287000 CVE-2024-41122,0,0,a6a8383a81cf09c9b153a0323d2516ac8ce416bc61d76a25c8333778bb40d081,2024-07-22T13:00:53.287000 -CVE-2024-41123,0,0,8618b7a16f64f0870336097fbc285992a3f592ba239b8c1dae204e252fa5afbd,2024-08-01T16:45:25.400000 +CVE-2024-41123,0,1,f4b244c723cc06d0f1b3d984c60a3f38c5bb280615f1544b263a60aa7e5203a1,2024-09-05T16:12:21.557000 CVE-2024-41124,0,0,545390f2812fb35069d3dbe35e40ac5aea11b2900ce09299ced750b1f5fdfac1,2024-07-22T13:00:53.287000 CVE-2024-41127,0,0,2519293e8a68005ce52133a682e98e20cf58a0421db4f824efb1564386790de3,2024-08-05T12:41:45.957000 CVE-2024-41129,0,0,49760c4facba24da14310a8aaec7d506bc9460cea62e06abe7615580f897df69,2024-07-24T12:55:13.223000 @@ -257622,7 +257624,7 @@ CVE-2024-41942,0,0,7923ac40921d31d0296434cafefbd05115f6a6de46c0d45a5dcdea9f8a327 CVE-2024-41943,0,0,e9522f5ef1fc490dfac21cbf940a07ce3841f4fb783f1339fe71b8d4141a64db,2024-07-31T12:57:02.300000 CVE-2024-41944,0,0,135d3dced80bc39762656a548dac91a6dee89920c44affdb521ffafdd868d70c,2024-07-31T12:57:02.300000 CVE-2024-41945,0,0,58045736441484d7b962c82a633dc9fabe3d1461c0f6ea954d229d59ebf06f9d,2024-07-31T12:57:02.300000 -CVE-2024-41946,0,0,c52c7facc60e4f3a9ee8c47105e340c262737ef60ffcec357a602905ad66b349,2024-08-01T16:45:25.400000 +CVE-2024-41946,0,1,0c8984641c723ad5c183e5dd0f3ccca9c504d7530b3c6a092508aec5b06adaf1,2024-09-05T16:09:45.503000 CVE-2024-41947,0,0,489889ea045ed7e83ddaa8e74cc5bef9c95d6933aa19a93d66e14365f9a47770,2024-08-01T12:42:36.933000 CVE-2024-41948,0,0,95b8e7bd495b369e148a4aee32aaebfe7255dd0e1bf38771c2e96e2af8f6ed4e,2024-08-09T18:38:47.533000 CVE-2024-41949,0,0,ca775db8fe7ff2b3f65a9b7415410183458d660652f7e7a24514bfd892cb0821,2024-08-09T18:32:53.153000 @@ -257631,7 +257633,7 @@ CVE-2024-41950,0,0,cb384ef22df022e960189f7f7e44ba5570748379fe4c550a69c77cdcfc6ae CVE-2024-41951,0,0,910c7c4704e08c3f5b0d889d255d1be4f852c58d3205446fe8bb45ac562a1a8e,2024-08-01T12:42:36.933000 CVE-2024-41952,0,0,a2a2d5c0bd3ad0150caa88e61ff72fdc96306c7692a8efbe895ab20341c07bae,2024-08-01T12:42:36.933000 CVE-2024-41953,0,0,3ffcc67e099bb316ff94f5a9cc1845c210666241b20cca92f52aec30809b8fe6,2024-08-01T12:42:36.933000 -CVE-2024-41954,0,0,93352fab81d54ba7d01179899803c8640d36e5f65730e1a9dce8a0309247dc87,2024-08-01T12:42:36.933000 +CVE-2024-41954,0,1,12ebe240a4a0966847a3fede7a35454b626561fae59f5ff3a5c94f1913b7c9e6,2024-09-05T16:18:09.940000 CVE-2024-41955,0,0,5ad0263667cf66f8813b7d99a3968b8a2424832b6c51b00aba139fada06ab3c1,2024-08-15T14:10:40.157000 CVE-2024-41956,0,0,b72cd1a22a28d2303229b868afdc5fd2adbef42d25416f48e13276835bed80e5,2024-08-02T12:59:43.990000 CVE-2024-41957,0,0,f207a653c0f0f9d782c3e5585f7eb5df8054bd1cd710ccb1397440f0e840612a,2024-08-09T14:14:01.190000 @@ -257687,14 +257689,14 @@ CVE-2024-42053,0,0,a6062e6a4bcd11b760655238c4a48736a58caa8e1af15eed073e37dfa3063 CVE-2024-42054,0,0,c42d43c53c1cba0b73693fd7267a0550fcf147a433b2caa751a167565e636401,2024-08-29T18:10:04.747000 CVE-2024-42055,0,0,8a78ba41d377bdb827ec713a20b75c7470ce65883ded00b1b140a62404f7c216,2024-08-29T18:10:30.470000 CVE-2024-42056,0,0,09375415bf9183672b6163fe2c8648c358781f72609968fbfe75ab19ffe9a5b2,2024-08-26T15:15:07.853000 -CVE-2024-42057,0,1,e512fec2cc3736749f1d9f5d46ee0738ea1552281c1c520bb2a40e12dc17d817,2024-09-05T14:40:39.073000 -CVE-2024-42058,0,1,09c32889f1fda2a9ac23ec8e7fa1dab392fe5811e750859907c4ef877b916daa,2024-09-05T14:39:35.480000 -CVE-2024-42059,0,1,8bc741d7bdfaaf9d2da11c07689da148a970f0d71cd8bf616b239e5bbf7cc48c,2024-09-05T14:38:26.533000 +CVE-2024-42057,0,0,e512fec2cc3736749f1d9f5d46ee0738ea1552281c1c520bb2a40e12dc17d817,2024-09-05T14:40:39.073000 +CVE-2024-42058,0,0,09c32889f1fda2a9ac23ec8e7fa1dab392fe5811e750859907c4ef877b916daa,2024-09-05T14:39:35.480000 +CVE-2024-42059,0,0,8bc741d7bdfaaf9d2da11c07689da148a970f0d71cd8bf616b239e5bbf7cc48c,2024-09-05T14:38:26.533000 CVE-2024-4206,0,0,094d5b07d12006961f56a1900b69d613595338528ec5cf7d408eb10d270cfa9f,2024-06-11T10:15:13.553000 -CVE-2024-42060,0,1,ff15c22376c8dde36cedf61eeb3084b3bf28f3c70c1acd3697d4c1f3846960a2,2024-09-05T14:37:03.387000 -CVE-2024-42061,0,1,ac3d3c8fb09e0caaee82bc4a33d8dd91e2bd7a37069679b697256fa9ff42392a,2024-09-05T14:32:24.620000 +CVE-2024-42060,0,0,ff15c22376c8dde36cedf61eeb3084b3bf28f3c70c1acd3697d4c1f3846960a2,2024-09-05T14:37:03.387000 +CVE-2024-42061,0,0,ac3d3c8fb09e0caaee82bc4a33d8dd91e2bd7a37069679b697256fa9ff42392a,2024-09-05T14:32:24.620000 CVE-2024-42062,0,0,3922ac166d4741c0e9e1f40d2e41e54b1ba7c14a58359ae6075c326b0cd4fd8b,2024-09-03T20:35:17.017000 -CVE-2024-42063,0,0,ab1fc80f4d5a337fc787a5927c5a2799f0f954cb8192994c0bb80d8c74f4b1de,2024-07-29T16:21:52.517000 +CVE-2024-42063,0,1,fb176955212cbbe386510b916a6cf2daadc2bf4a1d6f4bce61554db1fd1f0fc1,2024-09-05T17:42:12.670000 CVE-2024-42064,0,0,aff9875e6448c473c643bff3b6337ebbd7539dcae5f98d4517c155e837f00f5d,2024-07-30T19:03:25.797000 CVE-2024-42065,0,0,f0f03032a73aa86560acd839e088b479e13d13725614d9ef0b38fd19889bc64c,2024-07-30T19:02:59.217000 CVE-2024-42066,0,0,13367e8042c7deb50de62c4bc97d68b98aeec4d6d8b79660880bbd2b9f9751ee,2024-07-30T19:02:32.857000 @@ -257786,7 +257788,7 @@ CVE-2024-42144,0,0,e5c21b4c9eddff64d5a0d83eb17a4af393a8e8cc5218a1d4bd948e45a6afb CVE-2024-42145,0,0,a448e3c1383099fefdc00f942a6c3fb1a7a8eacac6267abd9d8600f8c195e000,2024-07-30T13:32:45.943000 CVE-2024-42146,0,0,5965ab1472d6386a707c678e04edf7b1fc9b55dd002222344e4b70614b23a1bb,2024-07-30T13:32:45.943000 CVE-2024-42147,0,0,e2fd4695f400d20f040989dbb1fd9b7b08c61afb65d2c6bfd95fc31d8cbb9fd3,2024-07-30T13:32:45.943000 -CVE-2024-42148,0,0,13cdcddb2ea129df068d9b06b785f1e0644e94c99e0171d7d45e772af79f82c0,2024-07-30T13:32:45.943000 +CVE-2024-42148,0,1,aa7a751d2d2744139ce0c7fafc16a784272427e696dbcdb6ab1cc36c4bae1c23,2024-09-05T17:46:27.683000 CVE-2024-42149,0,0,649ede760b2b7270506bd2e8f6e94a8f5d04fb5a4016b73e8b26514807ad0c08,2024-07-30T13:32:45.943000 CVE-2024-4215,0,0,9e7e3a04514a4f3c8325efbee683d76ee50f1989bb723741735a5cc60f766fa9,2024-08-01T13:59:27.703000 CVE-2024-42150,0,0,b0367ccbbd7e8c81c36eb7016e076190b057ac84efe63dcc25d8aac079dad32d,2024-07-30T13:32:45.943000 @@ -257886,8 +257888,8 @@ CVE-2024-42284,0,0,3de089e862fb9363cf440d4ddcd6c7f62488df29d936c169ac7a6ab7bc964 CVE-2024-42285,0,0,4ec0160442d1538b95cde72767ac70bc274486d2ce7c96c2406c062e83be4de0,2024-08-19T19:45:41.590000 CVE-2024-42286,0,0,24061156d805ced1339b1724f8564154074076c09f5e325f327fdc585683f93a,2024-08-19T12:59:59.177000 CVE-2024-42287,0,0,ab99cb2182c9d6159d40449c7d07218d1774759ae812acadb1ae409447b25c10,2024-08-19T12:59:59.177000 -CVE-2024-42288,0,0,0473e6d533869d02183417e6ce6ab07ac8e6bd7cacb1e11495e5002891b0aae2,2024-08-19T12:59:59.177000 -CVE-2024-42289,0,0,cfe283d951c108ff98e5103d44cbfe5e3199d1997008b40b8fbd57fde9f2c743,2024-08-19T12:59:59.177000 +CVE-2024-42288,0,1,3bca3bb153b051d1e9a150826b5840d5f5c16eca31e67293c4ec7eba9cd334b4,2024-09-05T17:38:38.383000 +CVE-2024-42289,0,1,04c815d082050729894440e6e2a5f87ed59b488996e57849be0708360c5605bb,2024-09-05T17:37:49.057000 CVE-2024-42290,0,0,d27aca27562195d04490643fa18705d7b7ed22675306a86b123d07597c93e3ce,2024-08-19T12:59:59.177000 CVE-2024-42291,0,0,72aa73e566f0b3c5cb157f1659781e489a73109e53174d8bea3ddc4964e85fe8,2024-08-19T12:59:59.177000 CVE-2024-42292,0,0,8310aa9a5630623a5a144ae735b237b95b640aed6f25022423101f353e6f84b0,2024-08-19T12:59:59.177000 @@ -257905,7 +257907,7 @@ CVE-2024-42303,0,0,dcf78b75f0f625f0e1e5df3b0bc433e9d8484bdabfad7ed343c7012b7aaaf CVE-2024-42304,0,0,d173e622eb62d973d07785876ea39085958d8e911790210e06238340260b1d9a,2024-08-19T12:59:59.177000 CVE-2024-42305,0,0,2a0027efaf18337e14a39532daab3b0d02ba1e240704105fd7925f4d1b755c9a,2024-08-19T12:59:59.177000 CVE-2024-42306,0,0,ecd4db3e8cdd17b10ea08b2eca0729317a2688c0bef58523ae201bb7d84633e3,2024-08-19T12:59:59.177000 -CVE-2024-42307,0,0,021c1bf3b0b2f8d64c924e06216b8a74c38217276f58a374fe838603733c4495,2024-08-19T12:59:59.177000 +CVE-2024-42307,0,1,979ad70f7e00ffa1bd38ea1452c16c437681ce079eb10d014525c56c5760da58,2024-09-05T17:49:58.257000 CVE-2024-42308,0,0,6d17eb1d30ed4c277ed040e1cbcd780b2faf7a8a39bdbdb95054b558731ed40e,2024-09-03T13:56:44.633000 CVE-2024-42309,0,0,620e4db2a37ec65908b26f0c89994589b6187d0cfe5ed9c47a2f3dc54d759d19,2024-08-22T16:01:29.287000 CVE-2024-4231,0,0,c87a42b4dfede9046d13b34e260c0c7ec4e51f68f0fbfb8755010b78e39f405d,2024-08-01T13:59:28.843000 @@ -257994,7 +257996,7 @@ CVE-2024-42440,0,0,19ccc0e809e3e2bf1e830128a29110680f7fa87923d96851d116e1e89bcae CVE-2024-42441,0,0,f25ce01d00bee15651b5d0ef3b027baaf54cad0dca0cb0ace6ef530480ea5aeb,2024-08-28T23:58:06.960000 CVE-2024-42447,0,0,68027c21ffcefe32f56a7a559d44cc2a1c6b0b32c4ec80fa56a1f1b8e20a917b,2024-08-30T17:35:29.533000 CVE-2024-4245,0,0,bc150cb423e680075dcbfa7aff18f43429f7c6ca789bf05cb5f53de998c993ba,2024-06-04T19:20:33.693000 -CVE-2024-42458,0,1,92fe6004383d793b0d5cb11f4d02a69450774ac5606c98f7e6de587e1b590522,2024-09-05T15:51:34.307000 +CVE-2024-42458,0,0,92fe6004383d793b0d5cb11f4d02a69450774ac5606c98f7e6de587e1b590522,2024-09-05T15:51:34.307000 CVE-2024-42459,0,0,1b31e68c1b4d33528b48a03fd6d9767f75dade645a7a5642b37f7704ee8ff193,2024-08-02T15:35:44.213000 CVE-2024-4246,0,0,d1ecb5c9b82db83c5f960ba668d8749b982008f4e59e30cf96ab22ab0b209b32,2024-06-04T19:20:33.790000 CVE-2024-42460,0,0,7cc8f5c50a101241ded3ad554de6ff811573b60cf374e61565e85a5cfdefc0e9,2024-08-02T16:35:53.760000 @@ -258083,7 +258085,7 @@ CVE-2024-42583,0,0,8fd0440f353ad964c47cf3a77100747b6a669fde220cd35bfe86af45e7c13 CVE-2024-42584,0,0,1d49fc6ba26b04e6a414935584dbbc10ccedbe7e9c02f914a1b9e55e373062b9,2024-08-21T13:37:57.767000 CVE-2024-42585,0,0,3c9766848a3d0dc2a785519b3d46597ab4102c1eaf2dd7169ea58b893472cc10,2024-08-20T16:35:31.307000 CVE-2024-42586,0,0,84ddc75a268862e20703c32296c4e0c5c5464ddd0e80b7169e0f9a5456bad368,2024-08-20T16:35:33.523000 -CVE-2024-4259,0,1,c83575c4577029ee8a00729a10fd99dd87edba3b582070451fa3200e7a07fe3e,2024-09-05T14:14:50.920000 +CVE-2024-4259,0,0,c83575c4577029ee8a00729a10fd99dd87edba3b582070451fa3200e7a07fe3e,2024-09-05T14:14:50.920000 CVE-2024-42598,0,0,f71051f9c507db6076bf3717820c0c67d1cab35bfba6f04f909801baaae9d568,2024-08-22T18:15:10.187000 CVE-2024-42599,0,0,bc7b0e7f2c21565caa07821f9152d38c9c71f4fbc6da4b18920137c73573fbe4,2024-08-26T17:35:07.137000 CVE-2024-4260,0,0,16d46a0b5bcb66a093fc7ed1472e8a955d65f29368360dc29eff1d3d84145b9b,2024-08-01T13:59:29.547000 @@ -258123,7 +258125,7 @@ CVE-2024-42637,0,0,91efd00f3a0c93af0bfc6d360416502bb044589161185dddb1564bcf24f65 CVE-2024-42638,0,0,f8a971101f7cdf9fa56d822dabf1a1d2d2e6eccbd0431f9555d3577ca133854c,2024-08-19T13:00:23.117000 CVE-2024-42639,0,0,1a5c2259211b7b8d7a3c9ad7a85700d339edaffc744195b682680689ea5c39c4,2024-08-19T18:35:13.310000 CVE-2024-4264,0,0,aceade487dcdf82d5a23a178a070b3c07d4cce69337175854977fa24341a320c,2024-05-20T13:00:34.807000 -CVE-2024-42642,0,1,e307d10e1309e890fbeb05e130d5092d504b8b5415ada945d3ff90fa2fad740e,2024-09-05T15:35:21 +CVE-2024-42642,0,0,e307d10e1309e890fbeb05e130d5092d504b8b5415ada945d3ff90fa2fad740e,2024-09-05T15:35:21 CVE-2024-4265,0,0,674cb78ce8c95e07c05495b52772b5d4a079c608362a6e67c2dfb567e6b8517a,2024-05-02T18:00:37.360000 CVE-2024-42657,0,0,7a9e5456dd66d94be3a75e811d67a1de5788317e788930f1ba2e8b5887d23144,2024-08-20T16:13:12.413000 CVE-2024-42658,0,0,54060235edd9bcf5ce68f6b48efde0940a62552fb8b9f2dcc8d06d163b4ded88,2024-08-20T16:12:50.290000 @@ -258213,6 +258215,7 @@ CVE-2024-42852,0,0,a01c2a98e1188b6b13c1dcf03329d746e5ba476590f73862f604a3ade35f9 CVE-2024-4286,0,0,4b983e074dfcf6df9bba7e92a07b4865c0022e26c41bba4144154cfeae541d31,2024-05-28T12:39:28.377000 CVE-2024-4287,0,0,e4eaa9cc0eedd48e962bf47bbdeb2988e2d50ccd6011525ef3609c758b0c263c,2024-05-20T15:17:54.513000 CVE-2024-4288,0,0,98dba4b61502f5abd6b75fde706ee82a9bae31a5b0be7db458ed8cfdf0d8bfc6,2024-05-16T13:03:05.353000 +CVE-2024-42885,1,1,bf3cbbf400e6178fb46075999d38c431cfe8361deab39495b00740e627ca8d78,2024-09-05T17:44:56.007000 CVE-2024-4289,0,0,00867bfd0f1ec036543766f70ad029cfafef69b68de16bba7569db7276222c78,2024-05-21T12:37:59.687000 CVE-2024-4290,0,0,96468cd9b26f589eaa99a2991d568962f6532fbc65b02b2950965134d65bb1ac,2024-08-01T13:59:30.177000 CVE-2024-42900,0,0,a581afacf971ea3c7e1f415a11d8d3e50a8cfeb83f82ad9071f65c9958d77bb9,2024-08-29T13:25:27.537000 @@ -258722,8 +258725,8 @@ CVE-2024-43936,0,0,13ff2ee8ac37d656ed3cfb9bac7c332b5831e52f7ec68739f3804a7d224b4 CVE-2024-43939,0,0,d426ea6c624de2aac782301aee13dd37ea340c14d42e40cc8485be204e0f41b4,2024-08-30T16:29:15.177000 CVE-2024-43940,0,0,1c00f3798e1667265ee707181635deee289bf65cd84317a4bdc295f8b6b4065a,2024-08-30T16:27:22.270000 CVE-2024-43941,0,0,65eb65a5b19127de85b2ed3f09e3f3a2fc43c5d3fc64b0022b1df003f93a2eb1,2024-09-04T13:40:41.620000 -CVE-2024-43942,0,1,e66d301ff91d4e3d6c85080e28c55dc563393fe5e437a624aa40d0cb331e6a52,2024-09-05T15:25:59.153000 -CVE-2024-43943,0,1,0708a62e7be84f809da9677b73fc0a902b7d605c03fc359ea64fa95773946d2e,2024-09-05T15:10:48.663000 +CVE-2024-43942,0,0,e66d301ff91d4e3d6c85080e28c55dc563393fe5e437a624aa40d0cb331e6a52,2024-09-05T15:25:59.153000 +CVE-2024-43943,0,0,0708a62e7be84f809da9677b73fc0a902b7d605c03fc359ea64fa95773946d2e,2024-09-05T15:10:48.663000 CVE-2024-43944,0,0,3b43949b67e3b5293c2c106f6d4c5bf9b7b47da0cd6c64d08fad13e8014c08a4,2024-08-30T13:00:05.390000 CVE-2024-43946,0,0,f240acba317febcf1e96ae7507bd3580d8fecd1103a0412511da00f09d6e888f,2024-09-03T15:21:07.167000 CVE-2024-43947,0,0,00adf93b652a6a1fea9f57602f2aa8edc17efc755f7abf02b222226d3eb2a44e,2024-09-04T14:16:00.423000 @@ -258736,10 +258739,10 @@ CVE-2024-43952,0,0,2e8649a5292a35453d82489b6a0bd45c22add9f038806d90bd84b3869928b CVE-2024-43953,0,0,56af89b2bc051a2a3fa3c2433004559f7117fb9158a81b84197c9f70495951ba,2024-08-30T16:16:01.360000 CVE-2024-43954,0,0,76c216e4287ea3e21df8a5c42687b7643218c83658145d7a54c571f2f9829fc0,2024-08-30T16:24:37.460000 CVE-2024-43955,0,0,4ede473467403747b1a04930906c4ff684161a593463954ac3ec5bae261e5e01,2024-08-30T16:23:35.187000 -CVE-2024-43957,0,1,e37eee71e6d3d39b6eee1646ea93bd080fe2f853ce321f65d1106d4fc89b111e,2024-09-05T14:49:17.983000 +CVE-2024-43957,0,0,e37eee71e6d3d39b6eee1646ea93bd080fe2f853ce321f65d1106d4fc89b111e,2024-09-05T14:49:17.983000 CVE-2024-43958,0,0,3f3bf4212bc2e74c074c138fa03eac2a971b658d4caf8d2e0f7172d721ab1b4b,2024-08-30T16:15:19.047000 CVE-2024-43960,0,0,980e57c6c61444ba89ee403d9dc5147321c211af37703070f5947ad7256ca9de,2024-08-30T16:12:24.113000 -CVE-2024-43961,0,1,c6e06e0e8287f3f53bd61136fa1d8e035e3cae74e7a2040db5ee6246ae551f29,2024-09-05T14:39:38.957000 +CVE-2024-43961,0,0,c6e06e0e8287f3f53bd61136fa1d8e035e3cae74e7a2040db5ee6246ae551f29,2024-09-05T14:39:38.957000 CVE-2024-43963,0,0,8cafba6a4e67df3e09626ea7dfefbf7e4a0c7f737e6ec03304fa7b4223f26fb3,2024-08-30T16:10:16.647000 CVE-2024-43964,0,0,a296e79bf666a02822318fa0afa97e1b25cabc20d3cd08936c2b6152e8d8f9a3,2024-09-03T18:30:23.437000 CVE-2024-43965,0,0,878d660798d5f5ce29d081268f89e41be6b018fcbed5e4625677b64fd6bbb9af,2024-09-04T16:02:57.427000 @@ -258791,13 +258794,13 @@ CVE-2024-4437,0,0,8daf6b009e7d35d5422b21cbeb277c609e9541d61900da1da050701f495da6 CVE-2024-4438,0,0,c9e78eceead232fab4ea3d7a8e75969ea230a5ce0230a2d24b6f718c51f9cf30,2024-05-30T02:15:47.537000 CVE-2024-44381,0,0,5438484fcd25b70dee09679309f07d28dc505312c58efc8ab06b735004b552d3,2024-08-26T13:55:17.583000 CVE-2024-44382,0,0,45b577083d43c0421b1d54dae9544e627a5b225f87472e2d79037d6a727e8546,2024-08-26T13:58:17.047000 -CVE-2024-44383,0,0,5676f7c6d975bd4d44089fb5df20bb59a5b6b65543e7f4bed153e4d595f276d7,2024-09-04T16:09:24.827000 +CVE-2024-44383,0,1,61161f14ee9e1bbc10672e1fab2e09d74d9f284407ea43d9a42db04391985d02,2024-09-05T17:38:48.020000 CVE-2024-44386,0,0,22e44353838544d5af3c6c1b599355e6c28d0abe3355a29bf08b92b0bac131e5,2024-08-23T19:35:18.987000 CVE-2024-44387,0,0,f40bbfc4dd5c4303dcc7ceb337218443a73c6de292a9dc96408915cc8c9cbcd7,2024-08-27T14:48:04.820000 CVE-2024-4439,0,0,18d544a04352d4558f54a1793cd800ab605d9132c8464460d2f7ebbde183ef12,2024-07-03T02:07:34.593000 CVE-2024-44390,0,0,6367b383b322d2f53bd8e6d4e8d76904ca1c75a20fddee8fd1295aedac6b8243,2024-08-27T14:48:18.393000 CVE-2024-4440,0,0,32e49728cdc055a1dbfbd90b8e03664859c56d56e36afdc46644ff6b145c71da,2024-05-14T19:17:55.627000 -CVE-2024-44400,0,0,a9f251243d2e913fc377ef9cc225910fb86929ca2f400890a42b305553a465e7,2024-09-04T16:09:24.827000 +CVE-2024-44400,0,1,0c3e5b1800b447d6bd6ab238fd2bacb82ed9f30c0c18da18f32396adadb223dc,2024-09-05T17:37:42.787000 CVE-2024-4441,0,0,ac0779300bad801b6c25a6a11418596c16f707acafd8505b85edf037d6de9dc4,2024-05-14T16:11:39.510000 CVE-2024-4442,0,0,9c1eda6fa3435f8c4d08218c5481ff931fe1467531bf106c3f2c1021638ef5a8,2024-05-21T12:37:59.687000 CVE-2024-4443,0,0,844cc6ae76fc91b0a9b2c7cc836e7c7382ecc4895f252d76709d68a22aac17cb,2024-05-22T12:46:53.887000 @@ -258826,7 +258829,7 @@ CVE-2024-4456,0,0,4944908816b0dabd168db28a33c87155bafc589f1ccdd7f87c25aad569cea4 CVE-2024-44563,0,0,6dbd76e0f089d60e056938eea08be0958b9b4b0e2739be9b2567dba585143e70,2024-08-27T13:43:26.300000 CVE-2024-44565,0,0,e25f465e010d5d48f951ee0faaea27800251f5ba71d3aee72b61ca7f81604b74,2024-08-27T13:43:46.897000 CVE-2024-4458,0,0,0a429f9bf96fae3ee6bbb1cf09933ff34e8fcd6340740204bd4095a557c4fb2e,2024-07-24T20:23:12.307000 -CVE-2024-44587,1,1,5b227cafc2d69b36c6aaea443cb9f6f408b023bb36123db10d4ae7c63268fb41,2024-09-05T14:35:24.337000 +CVE-2024-44587,0,1,01244a38583c2f8e633cdff3a6f8ce1c3f4046ffa2bbe3e14639d70f292fabe5,2024-09-05T17:44:56.007000 CVE-2024-4459,0,0,b17743adc54c2996e578e7c399fafb8182f2604175c352726fa92e67f639f3de,2024-07-24T18:00:21.097000 CVE-2024-4460,0,0,91888f8bde5a4d48a24dfa2195fe74c4db2ec96b9dcf1f6b0a4392132da82baa,2024-07-17T11:15:10.240000 CVE-2024-4461,0,0,51250da8bcd9ecf720caf9f3a7efd550d6e47af21e57f982fabb8237238dcfce,2024-05-03T12:48:41.067000 @@ -258843,6 +258846,8 @@ CVE-2024-4470,0,0,3c0fcce343f2a1d09f74dfb9be1570b18bd3555368134445c358e736dab037 CVE-2024-4471,0,0,44899070168831f8c9dbf9959b26f4abead5dc804569bf5f22dbe3807408cb0d,2024-05-24T01:15:30.977000 CVE-2024-44716,0,0,063e41b42ec84a26fe3901d267f8097e94d2443a9dc25f00cc37c917e4db50e7,2024-09-03T18:32:45.427000 CVE-2024-44717,0,0,4633d8ec58d1349f11ca257535d78e1a19dae6e8b84c1661ccc3922a9791eefb,2024-09-03T18:32:54.357000 +CVE-2024-44727,1,1,31d82a3ac296075a78d5be20f1665bbcab34b69a56ef7468a068c355340e3560,2024-09-05T17:44:56.007000 +CVE-2024-44728,1,1,e5ad593eb57d8f8ad2050c6d2221fdea3c5f1858d0679a0cebdd6d2797dcd4ac,2024-09-05T17:44:56.007000 CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000 CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000 CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000 @@ -258866,7 +258871,7 @@ CVE-2024-44809,0,0,424c650381a963ac60378eaa5a7cd36fd86829e33f994f3d0227dc416ec44 CVE-2024-4481,0,0,c2852db732c7c65c13524ea22e5406663429c55dff3bfe0d5bbffa299f48bbd3,2024-05-14T16:11:39.510000 CVE-2024-44817,0,0,69deaa4e7ecbf919037754dfd86d6f5f34bcd33ff645863b7e5f14d08ab18721,2024-09-05T12:53:21.110000 CVE-2024-44818,0,0,d174c0799ffdbf965fa98c057c949d0dd19f8293fcbd2dc7f74d6c2c59752335,2024-09-05T12:53:21.110000 -CVE-2024-44819,0,1,fb850f7977d16cbee039f22251cb3645c89cd534504aa87478038b012f6c8acc,2024-09-05T14:40:07.637000 +CVE-2024-44819,0,0,fb850f7977d16cbee039f22251cb3645c89cd534504aa87478038b012f6c8acc,2024-09-05T14:40:07.637000 CVE-2024-4482,0,0,30c719bdf44110f5d77595f668147507c21a010645f412257434e159bd101a38,2024-07-03T18:24:41.627000 CVE-2024-44820,0,0,f15637d2ac032c543e5fcbbe9f5d1cb1b7c83c8e990be9337cf6d7655fcc3e7a,2024-09-04T19:35:13.010000 CVE-2024-44821,0,0,ff3428c7064f35632ec8516d4f1ffbf8326fb53cbc8ff73f0451f03ff4bad1c7,2024-09-05T12:53:21.110000 @@ -258891,12 +258896,12 @@ CVE-2024-44920,0,0,12f1b6eb8fb8d99f08a0b224eeeb570d2ee08178391a3e25e8980965db9b7 CVE-2024-44921,0,0,b581e2c2532137589de006c20122d6cbe14e56f4b907946bd0416f760b5174f5,2024-09-04T15:00:15.103000 CVE-2024-4493,0,0,890374eb1d5a1051bad1d8c630ec03ea130ffcf654be5d03c4d1c85a0ebc3c87,2024-06-04T19:20:39.143000 CVE-2024-44930,0,0,81ff02371a55a44df0a682ce0b18f3f2c62d0a039ce7ca02ce228b72e51fdea1,2024-09-04T19:35:13.800000 -CVE-2024-44931,0,0,a811432be893129eec1153f2a1f5cf79e00f6cda4409f2898f7f29e87e49d41f,2024-08-26T12:47:20.187000 +CVE-2024-44931,0,1,fedd8ff9b4ae1a6a2e15976a48c1769aa25628bd9ca3ea3eb582f8cceef9ddec,2024-09-05T17:58:45.847000 CVE-2024-44932,0,0,34330dfb165e1fba6e46b58c01253474b02f0143013b4d7b232046de617ca50b,2024-08-27T16:08:45.020000 CVE-2024-44933,0,0,4b8d6d8796496a10942df74ea36b0343a95a4c8e561f02a6a6cf79113627fbd2,2024-08-27T16:08:38.973000 CVE-2024-44934,0,0,c02ef0b8f3f4254298df3ea9cd3b57ad77027d83bf4e5f989954ab58227e0bc4,2024-08-27T16:07:58.727000 CVE-2024-44935,0,0,d95aec9e91962acc52eb3e384a6783d63909024bc92ab328e0dd424f360e30ba,2024-08-27T16:09:01.633000 -CVE-2024-44936,0,0,b9963badb762ccd078f0ff0276e3a054720ee02adaf519a8ed2637b289dbf485,2024-08-26T12:47:20.187000 +CVE-2024-44936,0,1,f9815d599f28fad94981996d900e9d02a0d2f13fbfa06d4ba10d6ebc83ea02d0,2024-09-05T17:53:43.867000 CVE-2024-44937,0,0,d456b794ce05568f4cfe23042c645d8e132bd17f43b2774d90973742618e150d,2024-08-27T16:10:11.423000 CVE-2024-44938,0,0,78c7eb7f4b70b2193d6a764b661f1c4b34c66de744f08d6fe3e652c84bf9ba47,2024-08-29T17:15:08.753000 CVE-2024-44939,0,0,77e340056998b85a0edb6eda2bb5776e7eba0084412d6173fbb841dbdf80b07a,2024-08-29T17:15:08.837000 @@ -258935,10 +258940,10 @@ CVE-2024-44968,0,0,125d9977c95cd27fad067d65cfceb4b033cca732bc912f36769ab80d59342 CVE-2024-44969,0,0,66b82aa80b6cd92846532cef33b442d38baf22d6911e941514910b3c6f435cd4,2024-09-05T12:53:21.110000 CVE-2024-4497,0,0,6a1d6365c146727895628930cc6e441179a183396cbc0224f0d3e640240772d3,2024-06-04T19:20:39.437000 CVE-2024-44970,0,0,70414797c7f1420a60b48e34277f5530ec1aa67aed6a07d8d2aaeded9223b4e0,2024-09-05T12:53:21.110000 -CVE-2024-44971,0,0,e476c5ff4bfb7f56378011b6da889acf56f093fdae76e21577f5ad24037fac99,2024-09-05T12:53:21.110000 +CVE-2024-44971,0,1,44403d9889954211cee528d64ed0dc86351f6fa04277308e5630c2d58c6cab86,2024-09-05T17:54:36.607000 CVE-2024-44972,0,0,0b967112ef26e3fe5b0935b427f88208867173c88daf36aa5bd2c336c4f07e64,2024-09-05T12:53:21.110000 CVE-2024-44973,0,0,add414a58e878f3aee3366f7678bfde348bdae69c48419c508ba030f370d1ae1,2024-09-05T12:53:21.110000 -CVE-2024-44974,0,0,cfad70b0308a8635463d2a3c3550e9a5bed8bac82db7da8bea8e669c50c96ce0,2024-09-05T12:53:21.110000 +CVE-2024-44974,0,1,d30d58207e6dfca8da341794aff27a7e2b32517cb9fbd6823ea9a20a4528e0d8,2024-09-05T17:54:29.037000 CVE-2024-44975,0,0,012dcb6db335aa97afa1ef9268f931ab68a445b973fc3f10a7843af27070943c,2024-09-05T12:53:21.110000 CVE-2024-44976,0,0,8c7b930f69a8eac68da6855eedc8b3a97b1051cdf631749b93c2aaf1d2a28ef8,2024-09-05T12:53:21.110000 CVE-2024-44977,0,0,8267c668040f19c89ab2180e788476dee75d30c69bd18b77721b380cd5039fc4,2024-09-05T12:53:21.110000 @@ -258946,13 +258951,13 @@ CVE-2024-44978,0,0,750dfff7f3690d54d4412faa52af936afcd2098a8aaeee06d2a7378cfc77e CVE-2024-44979,0,0,c564230a8b2dad8ceef7ebf62fdc806efd7fe79c5ccf1d638e23d29d49c547ed,2024-09-05T12:53:21.110000 CVE-2024-4498,0,0,237405bb434f57b5ee3d93725ee504cc093cf6521d831301400a29eebde53ae2,2024-06-26T12:44:29.693000 CVE-2024-44980,0,0,47cbb2b80b64a9e65a634f164af37fe8f9bbf35b2a4763627fcb954d1d43d5f1,2024-09-05T12:53:21.110000 -CVE-2024-44981,0,0,6dba815833c9420434096a44702ab8874c664c8f58d21a83ff9a1a2f410cd61a,2024-09-05T12:53:21.110000 +CVE-2024-44981,0,1,bc3bb172f7a0023a22356964618a5541429c999634289482e09bbe39c56b8053,2024-09-05T17:54:19.377000 CVE-2024-44982,0,0,097b402de9531ebf5ca1f6aae63ba13bda02a74939ff8ca55ac9e7a6db69946f,2024-09-05T12:53:21.110000 CVE-2024-44983,0,0,690629c42f711182358e1764655aca93c3a6bdc31e0702c9218202b7b3762339,2024-09-05T12:53:21.110000 CVE-2024-44984,0,0,c055413ce64b83c18979ac6480bb0a27c5e68feb3d290ff4c7ff28dc7f6a5b89,2024-09-05T12:53:21.110000 -CVE-2024-44985,0,0,e1b0ead85d5e7f6b5f9b29b7fadad04bcc2a6d3fa08bfa4a602715fc84abe9af,2024-09-05T12:53:21.110000 -CVE-2024-44986,0,0,ecb6d7ae1526c81b87b823f2743972fa1bb30c7e171e19f779a4dd2bf5b3cd06,2024-09-05T12:53:21.110000 -CVE-2024-44987,0,0,ff0dd7dd29ccda4d931135aeace4f2cc7ac219771748eff045dba7a854d78fb1,2024-09-05T12:53:21.110000 +CVE-2024-44985,0,1,89614f0dc5a1bc1e42d274d3ec6531500905f54e1226dc3d0cfa558fdaf45e82,2024-09-05T17:54:11.313000 +CVE-2024-44986,0,1,7b1b7f962a5dde2e3112c86530d9327efd0060e0a73a92ec7225981af2f022b4,2024-09-05T17:54:04.127000 +CVE-2024-44987,0,1,80c7ee92eb0c64e1bc51cb1cea659b21d515983723260d3a4a67be7790dea749,2024-09-05T17:53:54.687000 CVE-2024-44988,0,0,88c9242491758cb5cb40dacc794baa4f1069a31af76a02349607187c0ed57054,2024-09-05T12:53:21.110000 CVE-2024-44989,0,0,66cb11edf9d1909542342085f72a5573b26127c4e7900cbcb71ee304cabd5de7,2024-09-05T12:53:21.110000 CVE-2024-4499,0,0,570303fc4016a4dd92480bffd8c28af92c74f4e1e3602b750ed7335c1012dd3c,2024-06-24T12:57:36.513000 @@ -259006,6 +259011,9 @@ CVE-2024-45075,0,0,970063a21cc69312ed5905047a4f8f95237496df40f08985a6b50e18ab5ad CVE-2024-45076,0,0,0d010c89a424f0e84ebaa9873d815dffe8bb1375c669731f5cae4948fe4c87e7,2024-09-05T12:53:21.110000 CVE-2024-4508,0,0,26388c420646a8ddc4ee2de628a691e0fa51808e2f848ae0f9b7aad58ccb1298,2024-05-17T02:40:26.220000 CVE-2024-4509,0,0,996942a0a2c59f4d53067a2868fbad35944719504585e3998bbd4d788c545588,2024-06-04T19:20:40.347000 +CVE-2024-45096,1,1,aefd09806b336e2caaa00d3cc13f091974b030964f04a96dfe32ea746427b842,2024-09-05T17:44:56.007000 +CVE-2024-45097,1,1,d534536acedfcf8d566d2118b26f8511c001022f1401d52b72be23dbc0714685,2024-09-05T17:44:56.007000 +CVE-2024-45098,1,1,8a18f22e4607fe5f99e79577abcbf75e27fc6f0e2998a1be4745f780b866a16b,2024-09-05T17:44:56.007000 CVE-2024-4510,0,0,e609022dce213b03ba687f592023f15f3e261f085d88e9ff14f3b7ffe9969d1b,2024-05-17T02:40:26.417000 CVE-2024-45107,0,0,5e2ac9906d55f0e5240ab60036468d760c6dd02ed6b1d647a490b90389e8644b,2024-09-05T12:53:21.110000 CVE-2024-4511,0,0,4d9dcedc762dab13753e2b0a6fba06d0880c8f0afe543668ff587ed1c4cea3d1,2024-06-04T19:20:40.443000 @@ -259022,11 +259030,14 @@ CVE-2024-45168,0,0,6124dea0f408bc63748f989f7ce4cf06d1deb9da69f42ab4bdcfa64b8daa0 CVE-2024-45169,0,0,9c1ccfed5f8c51cc81c5cd2eec094329fe2aa7c6c132e4f4099baad9dc306193,2024-08-22T15:35:13.507000 CVE-2024-4517,0,0,3fa4b03e407f8fc963e6e42e2d6f56f1c6623d21471e9883bdedad7e9bb00507,2024-06-04T19:20:41.030000 CVE-2024-45170,0,0,8fe4b9ac86882f3df66af526948de512a679162d1d237b054f8ec9bd99499824,2024-09-05T12:53:21.110000 +CVE-2024-45171,1,1,aa9262ec591f67c9e699cd3bc0e4bbae747ed0a50d00a5f403b06f8a9adb7261,2024-09-05T17:44:56.007000 CVE-2024-45172,0,0,68b3dace475f9bcf51f79da5da4aa2b3c04841de6dc44424481c2470782012ce,2024-09-05T12:53:21.110000 -CVE-2024-45173,1,1,a6df7d759e3fd427037ffde968a7f45184528765ebead1738754b5399fc0e9b6,2024-09-05T15:15:16.680000 +CVE-2024-45173,0,1,acc511e53cc2bafc7488cc4a9e5e621e07dca55234855cf7c1f473f527f2b903,2024-09-05T17:44:56.007000 CVE-2024-45174,0,0,2ba63c333cfe37e6c7dca9f72909d21c7893acb52b292b0e6cf7a4a15b777141,2024-09-05T12:53:21.110000 +CVE-2024-45175,1,1,ddc8b1aab13e99a4881a398b18dd58a8ecf970f7ec51023c0c4d80cab7d33da5,2024-09-05T17:44:56.007000 +CVE-2024-45176,1,1,9e73e17f2400f9bdfca790d758456123eeb89e9be09d282f0b477b1245f7890f,2024-09-05T17:44:56.007000 CVE-2024-45177,0,0,e16e0cc027b9a1ab0f5d9f5e0b79a7c42660772108242f226798fd93c099bafc,2024-09-05T12:53:21.110000 -CVE-2024-45178,1,1,af698e91f7cb525ae7f42c6f3eed32181798007533a6233a5a27842599e5c047,2024-09-05T15:15:16.780000 +CVE-2024-45178,0,1,77e586d9f02b3ffe2b74a389a48d41c9b2c2fdb379ac71b90c85072739a0a732,2024-09-05T17:44:56.007000 CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af1355,2024-05-17T02:40:27.187000 CVE-2024-45180,0,0,972956c14c3744d5d70c795422903443a3c866a60353a62faa079ebc718a4b11,2024-09-04T13:05:36.067000 CVE-2024-45187,0,0,b29c34a9281e147a1f2b33bdd2a8c272cd39081d36dd9d0273787cf191e54024,2024-08-26T12:47:20.187000 @@ -259037,7 +259048,7 @@ CVE-2024-45190,0,0,d66cd4c54a74e68d49ead3a1a738b5a5af6006ce6c10ee38db19e97b19943 CVE-2024-45191,0,0,8410bc983e36e5828d4c81d5e10811b72eb1342d768b1b1249b7ba20875ec3a3,2024-09-01T22:15:13.697000 CVE-2024-45192,0,0,5da4aeb150ce1f250e3c04f3741f974ba0c69f3ea24005aed7598a0020d8fabe,2024-09-01T22:15:13.880000 CVE-2024-45193,0,0,1554745324792bf9e818f523be327d3eb138b0a7e9f93b1f1c9abf081b45aade,2024-09-01T22:15:13.943000 -CVE-2024-45195,0,0,95907c73b5510b864422388cc99943bd86b2dcf627d10d8651e99fe7186587bb,2024-09-04T13:05:36.067000 +CVE-2024-45195,0,1,34c5e59a697b1b18d598c708f966cb61644746f7a7560c269f56903739b49916,2024-09-05T17:44:25.040000 CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000 CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b04a,2024-08-23T16:18:28.547000 CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000 @@ -259066,7 +259077,7 @@ CVE-2024-4527,0,0,c7ad79186f39af6c4287cf90f197f2ec298291b738fc5af7e4ddede8b4e9ad CVE-2024-45270,0,0,c7af37af49333c30529c68858eecc171381f5cb95414149d25997e187a81c107,2024-09-04T11:51:30.887000 CVE-2024-4528,0,0,7b720d00d965c73e07e6aefd4c36ac932b079840a05c5efc530ca8c4800fb595,2024-06-04T19:20:41.917000 CVE-2024-45287,0,0,b8f5d1a4e2e5997ea2c47b168fd9a9add6545241bf0ce8d4616381f847e8f565,2024-09-05T13:35:02.927000 -CVE-2024-45288,0,1,955296d26f6688a711bb67949962e8bc8a5c80938f39e5cdb2e043fe3c66ded8,2024-09-05T14:35:25.337000 +CVE-2024-45288,0,0,955296d26f6688a711bb67949962e8bc8a5c80938f39e5cdb2e043fe3c66ded8,2024-09-05T14:35:25.337000 CVE-2024-4529,0,0,5fbb4c14219ef7d51954458b7780a68dbee769876e9489db6e9ba34bd68834fa,2024-07-03T02:07:42.220000 CVE-2024-4530,0,0,6b78f15ba2a60e96a20ff176cd49d228ee37f0e30a4b3e696092a717f8a23e27,2024-05-28T12:39:28.377000 CVE-2024-45302,0,0,81d543b8058ec9a64648a785b7fa014c697fce5846d6cc78b75fe051c3ed2104,2024-08-30T13:00:05.390000 @@ -259095,6 +259106,7 @@ CVE-2024-45389,0,0,9f0fa9283a2a5f874fd0dba70c8232c3ec84e221a6ccb67b23537b0164ce9 CVE-2024-4539,0,0,55abcbe26e411ca656e6a32a2a4f1ff2caad1b7d092df554c28514564a925650,2024-05-14T16:11:39.510000 CVE-2024-45390,0,0,332342778ea7f712e3a75a5f422837c59f0b8fc1cd3d7840f34f23531141c0dc,2024-09-04T13:05:36.067000 CVE-2024-45391,0,0,9c5789b02ec0149b6dd4c299f7c2076a4f5ab5f425e6ba50511de158538b434d,2024-09-04T13:05:36.067000 +CVE-2024-45392,1,1,af416bc436367ecd17d4327e2c9724f545247e3dec23ef3d729c2f2318a24710,2024-09-05T17:44:56.007000 CVE-2024-45394,0,0,2ba0026e07469dbf430ebd158b45587c8559adbe0d6d259ad77063b3124f324c,2024-09-04T13:05:36.067000 CVE-2024-45395,0,0,e86751a06dbfe92039318153ae3e40334cccb8072cf74037173dfdb8955c4b2b,2024-09-05T12:53:21.110000 CVE-2024-45399,0,0,a1cf7f5ebf189fb42f167aadd6e82f696503abfd38953cb1d8591d5d8cf1b025,2024-09-05T12:53:21.110000 @@ -259126,13 +259138,13 @@ CVE-2024-4549,0,0,e09f9cdaebb6118867e13a9d3ab643eb98c9f9e356cd137ad04d5c4afde157 CVE-2024-45490,0,0,4a9544858f8ad52701885faaacc054b024c5e1d139687b3f21fcc2ee9f6ad4a9,2024-09-04T14:28:19.313000 CVE-2024-45491,0,0,e460156ea6419a80b45a0f265018e72555b70e117c8be4ee37cb347a447d976e,2024-09-04T14:28:33.953000 CVE-2024-45492,0,0,073ca72c9147ce0bd071ae42dd069b817368a461c31ddb6a6a85b43c752a5921,2024-09-04T14:28:41.760000 -CVE-2024-45506,0,1,f825d7097befd0ec70ad07a8a6b4c2f13762a67e5f358f9d2ab15de2e8f395af,2024-09-05T14:39:49.807000 -CVE-2024-45507,0,0,5207727bb4afd7438623693c1ea5fc2bbcdfe0f0eac8159e94ecafe5c7c7370a,2024-09-04T16:35:11.547000 +CVE-2024-45506,0,0,f825d7097befd0ec70ad07a8a6b4c2f13762a67e5f358f9d2ab15de2e8f395af,2024-09-05T14:39:49.807000 +CVE-2024-45507,0,1,b2cf0920dcb75db868de7b4afd51449cea360da72164b9b7e7a575176b0c17c4,2024-09-05T17:53:39.760000 CVE-2024-45508,0,0,a7bf13ff5f2bf318e53d0cc8b12c1b5ac7eae45f1991e7b683a2e3673a166bb9,2024-09-04T16:44:08.247000 CVE-2024-45509,0,0,2da4a07b41eb99a3059398ff74aeb7ba3be7995744fd94f415c5c3e9d41f0b5f,2024-09-04T16:45:08.597000 CVE-2024-4551,0,0,5eadeaa2a7f21f0b3297f45277617c137a52e984170b931f9145e745d378c040,2024-06-17T12:42:04.623000 CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000 -CVE-2024-45522,0,1,cfbe5f5b4866198ecf4773ddc4ec07a576ac517554c3c987f558bc88648f0e9a,2024-09-05T14:29:32.737000 +CVE-2024-45522,0,0,cfbe5f5b4866198ecf4773ddc4ec07a576ac517554c3c987f558bc88648f0e9a,2024-09-05T14:29:32.737000 CVE-2024-45527,0,0,0ed4b7876171a991bf7220f1ee96f2007c9fed522b397370892e632e0f15c024,2024-09-03T15:35:13.673000 CVE-2024-45528,0,0,b726a60695697377572ea54be1902b1c537e8da89a7623e441b7aa9130d0fc17,2024-09-03T15:35:14.480000 CVE-2024-4553,0,0,a1e8f5bd1acd4a97b93bbbe85c146f94099965137fad1ebd49acd106c4b8e00a,2024-05-21T12:37:59.687000 @@ -259144,6 +259156,7 @@ CVE-2024-4558,0,0,f33120bad100499bf0c3c5e20b119cff8d6ade1c8324fe8cac904ff1ff2e14 CVE-2024-45586,0,0,e206a9f9f52d6df31e8745674bc07b4799319b79462f9d7a84cd2e9a2bd105dc,2024-09-04T12:15:05.320000 CVE-2024-45587,0,0,0131eba1114d110e01e395a66f8c68816d231f10bed8e8f9e00161c4edaf0484,2024-09-04T12:15:05.530000 CVE-2024-45588,0,0,7fb04f846e0d14b9a2876b98b70ef6e3701ca14d55fb8c54290d798cd0a7dd22,2024-09-04T12:15:05.673000 +CVE-2024-45589,1,1,41abacedcfdd00ab4b5a0216e0ff43c3500515b41f98e551b04e2144d0f36672,2024-09-05T17:44:56.007000 CVE-2024-4559,0,0,bf46d9d7302afe42ee4323175537eeb1eb701f6d945f2b96b5e6acc4bfa04589,2024-07-03T02:07:46.003000 CVE-2024-4560,0,0,3d2b06b4cd5ab2760bd3f364e15c96b4f7456a14baec47a1cd857fe992686648,2024-05-14T16:11:39.510000 CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000 @@ -259165,7 +259178,7 @@ CVE-2024-4567,0,0,55b6508070b71672e22c57660afab28e7ebc1a40a37655965c41825cdc3bc1 CVE-2024-45678,0,0,693ea2059e5782af88748cb6a47ab17c5e2b747f0badd3c534ee2c1a86fd5624,2024-09-04T13:05:36.067000 CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec4236,2024-05-07T13:39:32.710000 CVE-2024-4569,0,0,2e4b27b05be8561bd3f260b3ccf0eed0d11ea74483878f5df5227737faa1c038,2024-06-28T13:10:05.153000 -CVE-2024-45692,0,1,c61390c0856808224db6575867d9d5251f4f2811610dea2847a3a0a554ee1da7,2024-09-05T14:35:25.643000 +CVE-2024-45692,0,0,c61390c0856808224db6575867d9d5251f4f2811610dea2847a3a0a554ee1da7,2024-09-05T14:35:25.643000 CVE-2024-4570,0,0,c1cc5ae154200d1c8cbc554d2bd91b7f0d0e2fb1c25faf550303ad23eb2c106c,2024-06-28T13:38:13.630000 CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250ae,2024-05-14T15:44:05.750000 CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000 @@ -259601,7 +259614,7 @@ CVE-2024-5063,0,0,3ea00cb3f53084b2393e5a818811e5957f116b348338ce87a59f64292b187a CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000 CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000 CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000 -CVE-2024-5067,0,0,56585b0ce9f784dbc8ab86cc74f5ff5060c47522a4c46703c86331478587fddc,2024-07-25T12:36:39.947000 +CVE-2024-5067,0,1,7a5f09523c1a14d6651905f1f8853395c32eebb526caa99a81fddc9a443e16ea,2024-09-05T17:29:32.287000 CVE-2024-5069,0,0,9472ccb93cc67e368452ccbd7690fcdac2e9c6bf3a0a4c1febdda7b23dc05b96,2024-06-04T19:20:58.080000 CVE-2024-5071,0,0,785631f9585d5c4be650f1d6b68cd50ecc66584beb25a8693cb2019c0e550973,2024-06-26T12:44:29.693000 CVE-2024-5072,0,0,b208332fdeb0349d564f3ae12700e597664b77bbcd409305187f03a8e1be9ee8,2024-05-17T18:35:35.070000 @@ -260518,7 +260531,7 @@ CVE-2024-6144,0,0,34fdda404a75a4c4d6599bec7541c145a061f61832fb3538fd14d272d1558c CVE-2024-6145,0,0,0767033006dde7f1e31949fe9ea410ea11be731c165d491f81ceb3f3403cdf19,2024-06-20T12:44:01.637000 CVE-2024-6146,0,0,0c77daedfbd4e49c0eeb90a8aaa7aad7729663e49a90d6bbd8f152a780888f21,2024-06-20T12:44:01.637000 CVE-2024-6147,0,0,f7966fe4963078c94cc06d4ad1659f2089dae235f15bb89901bea1c6d027f9fd,2024-06-21T11:22:01.687000 -CVE-2024-6148,0,0,37dad4439e954b5fda1e7a46b5e258ce35fecc0538d233a4c0c651911f157029,2024-07-11T13:05:54.930000 +CVE-2024-6148,0,1,0d880e6b6ac71f1aa1894a805c806f3c97327dea504b66e4e22e92cfc0d33c58,2024-09-05T17:51:48.560000 CVE-2024-6149,0,0,395390c0a4a5af6048ec84a02f15cc9b9a14b14eb29f0028558366dc9a6418d3,2024-07-11T13:05:54.930000 CVE-2024-6150,0,0,30b18aa77850d40723cb96c8947a52293009392d2d627d33f4d73aaa85165004,2024-07-11T13:05:54.930000 CVE-2024-6151,0,0,12ec1aee3f7de6ecf0a62e21606cbd6e357a6a7e92793df8af534b3f4e67d73f,2024-08-01T14:00:12.180000 @@ -260684,7 +260697,7 @@ CVE-2024-6338,0,0,8956384d5cc966970e625ecbde4127bb4f84d940fa059b7aaed0155a833fd9 CVE-2024-6339,0,0,900c18b99c3b938f801abc6ad5fe5a877c8e068ea7f11186df65574c46246a21,2024-08-21T12:30:33.697000 CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec10a,2024-07-03T18:27:40.903000 CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000 -CVE-2024-6343,0,1,38ac9303003845967860125853ac4494a8fe1ecd1fc8d7c1fa719ce9a13c5dc8,2024-09-05T14:35:34.780000 +CVE-2024-6343,0,0,38ac9303003845967860125853ac4494a8fe1ecd1fc8d7c1fa719ce9a13c5dc8,2024-09-05T14:35:34.780000 CVE-2024-6344,0,0,ddc89c494afe0b7b80a518e0bed96070c096d29b8a0f403bdd242f60ce193de2,2024-06-27T00:15:13.360000 CVE-2024-6345,0,0,fc166d5e44485020c9b016f580b4f1c78befbdae01a9e6ec8b7e6b8d01a2e1ea,2024-07-15T13:00:34.853000 CVE-2024-6346,0,0,dd2451b3228a249be11318435f5e384b8c60f44f7f9b400e6ba532a21de9b77f,2024-08-01T12:42:36.933000 @@ -260784,7 +260797,7 @@ CVE-2024-6469,0,0,8a9cc14cdc15687cebe1f067587bd279bfc289daac6283040462018576c0d5 CVE-2024-6470,0,0,c9a33c23ec7370c50b4df58ad71ec5e181cf8d29947a984c43804e0a58dc7723,2024-07-05T12:55:51.367000 CVE-2024-6471,0,0,09d48a1225aac8158aa4c1ca2c8aef77a523ae62ed5b11e34f01b64da625d366,2024-08-23T16:47:32.537000 CVE-2024-6472,0,0,06cfc3c26e9764572c1adb3e446cad13cb9599b02c4c47946f6698a134e25867,2024-08-06T16:31:05.780000 -CVE-2024-6473,0,1,9d329dd670917bde4dfbebd26b87a1f0ac64a0b550d97fba6854ff35150aadd6,2024-09-05T14:19:45.153000 +CVE-2024-6473,0,0,9d329dd670917bde4dfbebd26b87a1f0ac64a0b550d97fba6854ff35150aadd6,2024-09-05T14:19:45.153000 CVE-2024-6477,0,0,af465e59718721c7b727c1ec6a265ade947c829c05464c1090814aa1a74a6b13,2024-08-05T12:41:45.957000 CVE-2024-6481,0,0,8a6ed16cb15e9b1be7b8ecc3c869a269748ddec5ecbc3504e8d7f068ea116af3,2024-08-08T14:35:14.190000 CVE-2024-6484,0,0,bc633abd6bfb9da06585afdfb273066dfbc508847026385eb612d46f7c70ed29,2024-07-11T18:09:58.777000 @@ -260799,7 +260812,7 @@ CVE-2024-6494,0,0,5d616b6f04502e7b8421d6bcde94ff1c84cc44e101748b87939c18b401c713 CVE-2024-6495,0,0,b5144ce6ead337054723bddaa938cbde5875226dc2ad6f1282d875ef6548d915,2024-07-12T16:34:58.687000 CVE-2024-6496,0,0,4f2145d6969061de095037c65c4c02c00a89d2331ecd0d31a6eacfc030927f42,2024-08-07T14:35:07.403000 CVE-2024-6497,0,0,b980a8afca3367d307f1b8ae084c1de1478e48fcb0a6d42a16be67c3823c34b0,2024-07-22T13:00:31.330000 -CVE-2024-6498,0,1,0f1ed999e5654b64108e6e5c9f85a2f8467da7fabfe3576cf3b3aac330109b23,2024-09-05T15:30:12.140000 +CVE-2024-6498,0,0,0f1ed999e5654b64108e6e5c9f85a2f8467da7fabfe3576cf3b3aac330109b23,2024-09-05T15:30:12.140000 CVE-2024-6499,0,0,692791d166e405b753065debb373657f70139bba5a26e85530dc737d8a19a270,2024-08-26T12:47:20.187000 CVE-2024-6500,0,0,d6e17cf29259cccc059c07e88e123ff08e9fd8308cfe5e11844bc5a9a1491c18,2024-08-19T13:00:23.117000 CVE-2024-6501,0,0,45d58d6fcd90c3b83531e796541078a549af17f7a81eb1fbfe7d6944aa2bc8ac,2024-07-11T13:06:13.187000 @@ -260950,7 +260963,7 @@ CVE-2024-6705,0,0,1e166467558902cf3ff2211f8b1aa347feb308f999c65053186e5a13806e83 CVE-2024-6706,0,0,368fe1c3fab739e74a8a813ffbef4887e8ddb48011a739592f2aed7de5e469c4,2024-08-08T19:05:03.057000 CVE-2024-6707,0,0,0dfe7a21a9f5f3f2c918856e8a22bd010b2f6875b837d373eb17e1778a3c8459,2024-08-08T20:55:55.453000 CVE-2024-6709,0,0,6fe2e770615cb1cdf14ac6a1be894b0afc1b11da8138a88bedb96b5baf70b602,2024-08-05T12:41:45.957000 -CVE-2024-6710,0,1,15723f1159765d2df51d51f86ea6c2b0352834c9348348b3be772081416c28c6,2024-09-05T15:30:07.570000 +CVE-2024-6710,0,0,15723f1159765d2df51d51f86ea6c2b0352834c9348348b3be772081416c28c6,2024-09-05T15:30:07.570000 CVE-2024-6714,0,0,11b717ebe6f787348133e2783f9d140b140bb610f91df0dde9f6c41f4dbdce83,2024-07-24T12:55:13.223000 CVE-2024-6715,0,0,d290c381da39798f53cf462904e8106c0aead5b473a12d3d5e5f927ed1696225,2024-08-26T15:35:18.010000 CVE-2024-6716,0,0,ca1708114f36d8444701fefa878a89a05247338f5f098a766e8f3a056ffc732b,2024-09-04T14:15:14.457000 @@ -261038,7 +261051,7 @@ CVE-2024-6834,0,0,23e85f57c9b7230818a4425261a24fd150d79ea72676d6bce04d47efdd6963 CVE-2024-6835,0,0,3165e681a9ea2e444ee96ca49c0cd059d5708ccec2fca01dca61b4e69f2dc31e,2024-09-05T12:53:21.110000 CVE-2024-6836,0,0,94c1bcaa18f7036265464de8eba36ccdaae9b63d5d20f60a8cc42904bb485160,2024-07-29T20:20:30.867000 CVE-2024-6843,0,0,aec077e7d49dac8e1cb0382a7568b4a4d58cd66583979c6d1347903e4ac17bee,2024-08-21T15:35:12.407000 -CVE-2024-6846,0,1,3f14d31d382a54a260125fd51294d960031d5921ae608f837ae240e5738c3bfd,2024-09-05T14:35:26.730000 +CVE-2024-6846,0,0,3f14d31d382a54a260125fd51294d960031d5921ae608f837ae240e5738c3bfd,2024-09-05T14:35:26.730000 CVE-2024-6847,0,0,3aed5f2ad75c2a50eaefca5c72002315f9d747456f8615efa188f54be39bf54d,2024-08-20T19:35:15.040000 CVE-2024-6848,0,0,e171c12c58967922126feefb09977b436bb9e206684562a37899ca6ed3e35d20,2024-07-22T13:00:31.330000 CVE-2024-6864,0,0,469a0ad039e39ca71e90d0d65b529134e06346783388106a10d2fa7d0b356379,2024-09-03T20:22:16.433000 @@ -261104,9 +261117,9 @@ CVE-2024-6941,0,0,955595fb76450a1a62e813d4c45133328a8676f5ccb18fb825b649a76bb01c CVE-2024-6942,0,0,f1725fdd1399ca72ea0b8d2f93c5340e502f9438fb6787b344812a3c8e0bd515,2024-07-22T13:00:31.330000 CVE-2024-6943,0,0,7309c2d9079ce590094e11ba25e488d6ae9c04f61c2a745c926407505228412a,2024-07-22T13:00:31.330000 CVE-2024-6944,0,0,7b965a61c0ec04909ebf3b2d64fc3cac19dfdf0980bcfd6393e8e0769c3fc723,2024-07-22T13:00:31.330000 -CVE-2024-6945,0,0,574dea36b9b2b1e3a3ffb6df6d595a4dab870fd1a8eda57a517dc9e6e75b97ea,2024-07-22T13:00:31.330000 -CVE-2024-6946,0,0,14318f87bc46c0ad4a38fa1fbd23dc24f12b405fa713a14933bc693b52150d90,2024-07-22T13:00:31.330000 -CVE-2024-6947,0,0,f36a1df3259beee7d31a4643dc4fbd02db27e2571d5c24ce962e3f3a377289ff,2024-07-22T13:00:31.330000 +CVE-2024-6945,0,1,fe7643eb8a7b51df3743099b1ad67c8dd1ce3b9c85ea5a20c342990508ec4fba,2024-09-05T16:14:31.237000 +CVE-2024-6946,0,1,df228dd2d7200de27b517d29f9641805aeb6beb3f4080f036d115266cf455158,2024-09-05T16:14:28.857000 +CVE-2024-6947,0,1,d9680f8f56c52ed66ccf8eaad5c9080a87e7a6242d8c371c2239db66f7a5aa2b,2024-09-05T16:14:25.513000 CVE-2024-6948,0,0,0b9fbb236c6e3f5ea21d1e35e20ae66f7f191a5cc171b7ef9247f18011e040b5,2024-07-22T13:00:31.330000 CVE-2024-6949,0,0,50fb9ada1c84c7692d0a258888bcfbeb043b4a29416a40cdc9f5aa2aa0edc74b,2024-07-22T13:00:31.330000 CVE-2024-6950,0,0,eef15633338af4a4d46f21c9ea1976ad7775894e17137260e2d107902fc3b3ff,2024-07-22T13:00:31.330000 @@ -261170,8 +261183,8 @@ CVE-2024-7050,0,0,f402c0a89ba2917236fe6639793bd54ee4751807250eba7a4dde84d4a362ff CVE-2024-7051,0,0,d0158d1d3b2cdd12dcaf8ff0c61b0f7cdef559e08a0a05011bfe1940648c764c,2024-08-30T16:15:10.960000 CVE-2024-7054,0,0,c2f192d88d8b2a817d17540b8fda16fcd38e463cdb3b6d5e52e3cf243830add6,2024-08-20T15:44:20.567000 CVE-2024-7055,0,0,b0e8b0793ccc61abbc70699af6d91421241877ab1f640f57d490cff121ecbcd0,2024-08-06T16:30:24.547000 -CVE-2024-7057,0,0,e86292da776d8c2eee12db885a241ac453174252cdfea8e6058f6d373bd4dc19,2024-07-25T12:36:39.947000 -CVE-2024-7060,0,0,2e0c92013c1ddde1bca0ad9e62aa50d23e69e1a598796a2170f54fccf61e7f4b,2024-07-25T12:36:39.947000 +CVE-2024-7057,0,1,a6551db1efaa6d27001f0a9bd261718973ddbbed12b7a664704cb76182efd9f6,2024-09-05T17:33:21.630000 +CVE-2024-7060,0,1,99f05c9e70d96dfd810da0f220a22b8ca1f2d257118941ef3fe99789faa8dacc,2024-09-05T17:30:34.897000 CVE-2024-7061,0,0,c3926c914ac99fe62f5bebfc1891b2d96043768b2289b704236ec0dafd824355,2024-08-28T18:25:38.217000 CVE-2024-7062,0,0,95520405d89c9e85e2e20b19a5c4882dbc79fcc2537e689d2c94915f74a470cf,2024-08-27T14:00:21.543000 CVE-2024-7063,0,0,0d05b5614f7552a1191547d1c63e6af55c9bef6fb9e919ea51ef069e5df2841d,2024-08-15T13:01:10.150000 @@ -261182,16 +261195,16 @@ CVE-2024-7067,0,0,edbddb223a917ac8e1a9e4a55d4a5029d93724357fc61dc50ee8384e13f8f4 CVE-2024-7068,0,0,d3dd5dc06b13cea6ca5e0ca06538fc2c3e10b3dda31b16ef6e21ea77c7fa728b,2024-07-25T17:47:18.717000 CVE-2024-7069,0,0,739e886131312a7d1c8ccd6a4f98d25c3687954f1471fb4fef37a66c2cb88966,2024-07-25T17:33:53.777000 CVE-2024-7071,0,0,aa4d5566fa9986369b04898e3cb9a48a60e9dce9bca40572b84743b3df14ef33,2024-08-30T13:56:33.083000 -CVE-2024-7076,0,1,946a1d901be5e53a430b33836289b857a65e6ba0adf8d1f0800179da55d6f751,2024-09-05T14:39:32.487000 -CVE-2024-7077,0,1,0df9c3aa04251d094f4c8f367a1652c4c149867d3c5e28bd833f85f57c0db8b6,2024-09-05T14:39:17.510000 -CVE-2024-7078,0,1,512b093146b430a3bc5d3dce59599e5dd0ff7bbcf726ce315b82fff221d16013,2024-09-05T14:38:46.947000 +CVE-2024-7076,0,0,946a1d901be5e53a430b33836289b857a65e6ba0adf8d1f0800179da55d6f751,2024-09-05T14:39:32.487000 +CVE-2024-7077,0,0,0df9c3aa04251d094f4c8f367a1652c4c149867d3c5e28bd833f85f57c0db8b6,2024-09-05T14:39:17.510000 +CVE-2024-7078,0,0,512b093146b430a3bc5d3dce59599e5dd0ff7bbcf726ce315b82fff221d16013,2024-09-05T14:38:46.947000 CVE-2024-7079,0,0,432b6c38d04c17da8e2aeea6e5677915e33a84f70f04ebe0988a953bc8892b6d,2024-07-26T10:15:02.840000 CVE-2024-7080,0,0,e8f51ead66f7469f7e63dc63102236554262bdfa2e68b9dc33e11c14a1ca04d2,2024-07-26T13:22:43.387000 CVE-2024-7081,0,0,6a139e489a9ff084a663269dd9c842c08d77e29c45f0c2d71d596839a517bb01,2024-07-26T13:18:21.957000 CVE-2024-7082,0,0,7f537cf9e56a23a456a2abd974bf40cbc8fb8378373545e42b0269e937581d9d,2024-08-06T16:30:24.547000 CVE-2024-7084,0,0,3a2aa9dec6c248febe470c8d1edface773b4a9804761de6b43694a8997eff852,2024-08-06T16:30:24.547000 CVE-2024-7090,0,0,3d2aabad43a36db418269bf4caffe0ea33f51a81aff1bd4a0b06249046f5e156,2024-08-21T12:30:33.697000 -CVE-2024-7091,0,0,ea018e26f872aadaa59f554aafa24269e38ad2d18885b5619000c0f610b93be1,2024-07-25T12:36:39.947000 +CVE-2024-7091,0,1,068f40b9775b7a1af5c1f8fd253806f6c329a370c68d78b52ba455d7a8a57314,2024-09-05T17:32:20.553000 CVE-2024-7092,0,0,e9e7e1c22eeddb38238cff178e26d1e84cd16a1ecd7c31190a29d77a32325d08,2024-08-13T12:58:25.437000 CVE-2024-7093,0,0,2af97c55d7ffe283d233de8149da5391663d6c7f2b6f21acff51e16815034b7f,2024-08-02T12:59:43.990000 CVE-2024-7094,0,0,d8ce6991dc787cf1fc8f383d7f348b0cc8c833a282f09c60355b50a58a302aa6,2024-08-13T12:58:25.437000 @@ -261276,7 +261289,7 @@ CVE-2024-7199,0,0,7ea69c706ca37b2dda1e80a6b544bb8bc45945ecc4407a97bc445bda686ee9 CVE-2024-7200,0,0,562ee7e89d7efcb6c366bd01f0dce90b526172f7ec9c4cf62a24dcbb3dc30d8c,2024-08-12T14:36:06.033000 CVE-2024-7201,0,0,ada84f4b903b0c95dc45be4013db2022612c9fdb66b840b2138f16a8a9061fa8,2024-07-29T14:12:08.783000 CVE-2024-7202,0,0,47ee30ff0ebecde915aadd7cf1bd702d0bebf04cac4786411e427c0fde39b1f2,2024-07-29T14:12:08.783000 -CVE-2024-7203,0,1,9623065bb1076b933803b0136efc271bca239649fdbd7e41cb52d273c630ecf2,2024-09-05T14:33:17.567000 +CVE-2024-7203,0,0,9623065bb1076b933803b0136efc271bca239649fdbd7e41cb52d273c630ecf2,2024-09-05T14:33:17.567000 CVE-2024-7204,0,0,1772f71824e8e67d08dd960b8980267be3eb60b7db474bb1b3294ba0efdcc4fb,2024-08-02T12:59:43.990000 CVE-2024-7205,0,0,f8b1cbec46ea51b223aac866d1ac39ee6fa7b6e832e6e62020df5a45e4b00643,2024-07-31T15:15:10.993000 CVE-2024-7208,0,0,23976b9c97cfc390397ceda1fa9cd6b5d178a3b311c11fb9c9f129febf7d4e73,2024-08-02T15:16:37.420000 @@ -261376,8 +261389,8 @@ CVE-2024-7339,0,0,57ec1e872e2326d7636a6cda3d278abfe9440d76240320c6c9e4335e8a9416 CVE-2024-7340,0,0,a3f98c82759b3c1463da2160a8c456e9c18de4cdd89227049824622069589bfd,2024-08-01T14:01:07.677000 CVE-2024-7342,0,0,92ad1e6857e9b0cace198602fda8e3b1ec6edbf7f40f7b078718810def4495b5,2024-08-15T18:40:22.537000 CVE-2024-7343,0,0,b6b73fa45089899a04dcf5d8ab6e4cd843be4b35e1b528d7d577722e09cd2c25,2024-08-15T18:40:52.707000 -CVE-2024-7345,0,1,c89352b78a1b7efddda76024ace56eb1677600f94378ef8d33d34c3c91ac1800,2024-09-05T14:11:00.493000 -CVE-2024-7346,0,1,cef11b112b151333dc0322cebc750df5acd76278a7b270f016213e5f5d953fa0,2024-09-05T14:03:24.040000 +CVE-2024-7345,0,0,c89352b78a1b7efddda76024ace56eb1677600f94378ef8d33d34c3c91ac1800,2024-09-05T14:11:00.493000 +CVE-2024-7346,0,0,cef11b112b151333dc0322cebc750df5acd76278a7b270f016213e5f5d953fa0,2024-09-05T14:03:24.040000 CVE-2024-7347,0,0,bf8562cb670939d7931c5691727a53bfc7fe78942e30ee3ed14dd0e17a8cc5f7,2024-08-20T19:25:17.513000 CVE-2024-7348,0,0,3d1228f3ad08ea7cfe68d4df8a31a5ae3b9df9b86e858b3756b13b4b2c220a8e,2024-08-12T15:54:52.320000 CVE-2024-7350,0,0,d4174556ac92d5e9a2a8dc8d5eec461477866543996df72c5d41b5df846ab0dc,2024-08-08T13:04:18.753000 @@ -261694,7 +261707,7 @@ CVE-2024-7830,0,0,15816e5591b0055e413556de4122a2d11e287a96847234968b58cf6b2bb80f CVE-2024-7831,0,0,eb69cd4a0800be9661e71c87c21be96f36edebb1b6acd7d144479ba831d4e240,2024-08-19T18:35:25.813000 CVE-2024-7832,0,0,d4a13ef09d831987125a8ecb9cb6f57fc4d78d65bea0a84d0e17ca92ee69e7ef,2024-08-19T16:02:17.383000 CVE-2024-7833,0,0,b984e9fbf1df09267f07d264c50d0ef7583d91d54c2e1f8dd098a2d9fc6334c8,2024-08-19T16:00:21.393000 -CVE-2024-7834,0,0,bb6041fdc90ed0ede48f2775fbde97b9cb7755ed7ffa0b36424db41a10432469,2024-09-04T16:09:24.827000 +CVE-2024-7834,0,1,ebe9de8b36536d4820911cd556ba678f6b7b55833622e60cf4b49b06fccd4ac0,2024-09-05T17:52:06.147000 CVE-2024-7836,0,0,7f956604655d7e703b4d07ab139348e9fe93ea32a8fc5e7f3d323a6d1a3366d7,2024-08-22T12:48:02.790000 CVE-2024-7838,0,0,27df02a5cc65e831a93d364f5957ee1462f1aebc7844c7c31edfb410cb0a1545,2024-08-20T19:16:59.373000 CVE-2024-7839,0,0,188e96c2e6da74526fb5bd6714aa4962487dce47bff2bfe2c2ee9934d7c43ce6,2024-08-19T21:18:14.097000 @@ -261718,7 +261731,7 @@ CVE-2024-7867,0,0,cc4e8e2cbae6cc9c2393332b56b3dc1a7160836d4b3b7919e8d1234e73599a CVE-2024-7868,0,0,426aac72107d4f020c4b4c2ec1e49b6873953f44556989351b1605a1e98035d8,2024-08-19T13:00:23.117000 CVE-2024-7870,0,0,4141f264a23149fdea486ca620816f1c3f41138cabf6c23297e955fee3254fb2,2024-09-04T13:05:36.067000 CVE-2024-7871,0,0,d47ede6ca23d1578a9b705a8257da890832c1e69392e6414a190c6fb054ce14f,2024-09-04T17:34:14.630000 -CVE-2024-7884,0,0,8e292d491d191ba69532e9583dbb3b890c2ddfc2cd7474182d0699bee6f45e30,2024-09-05T13:15:11.390000 +CVE-2024-7884,0,1,c6af974e27eca5f26a6a3dbae74174709521379e7c4b14b7d417db95dd9f1e61,2024-09-05T17:45:07.877000 CVE-2024-7885,0,0,53926a53ab4f71fc31c04b79b6d61e8c39bb180f373c05a721578db45aa87a6a,2024-08-23T17:05:24.343000 CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000 CVE-2024-7887,0,0,ba2ac28c88e5c856e9fa78c00b11f37e0df98a3508bf609dc9edbaa04a8fdb8e,2024-08-19T12:59:59.177000 @@ -261930,7 +261943,7 @@ CVE-2024-8260,0,0,80de48284b9b1f60542ccd162f62ac34372df44b6034ef82705622d907f322 CVE-2024-8274,0,0,81f15088246893eaf3249a3304ee5d5199071263c8883a7f9f22c293a16a376a,2024-09-03T14:28:06.853000 CVE-2024-8276,0,0,6d091b531458424cc4635f6e051f410dabbe91d1101fd761130b66815a93f34d,2024-09-03T12:59:02.453000 CVE-2024-8285,0,0,3b0be068594bf7034dac9ef4fa68f5d83c55fdc692ee8082bd0a6e0eca73c78a,2024-09-03T12:59:02.453000 -CVE-2024-8289,0,0,467fc9efc781d965e4dfcdbf18dc548134b443dd6865d68147179f804aa4f762,2024-09-04T13:05:36.067000 +CVE-2024-8289,0,1,900bfbd861154484ed59254bdbec992d28a9742381ab830cf631e50b7fa985ab,2024-09-05T17:41:58.350000 CVE-2024-8294,0,0,76cafe7a1838d9cd0244706a299f12cd4ba69ef653952654db2fa070ca07bd0d,2024-08-30T15:38:13.437000 CVE-2024-8295,0,0,907331a3a97a6618443e3aff92f4e758c3135b25ca0d9fb01d74d067e9cd6716,2024-08-30T15:37:41.510000 CVE-2024-8296,0,0,e31c225486c181d770097ee2f86386b9a5d776a033c8c4a5860d3ba550c9de51,2024-08-30T15:36:36.383000 @@ -261986,30 +261999,30 @@ CVE-2024-8388,0,0,c9864eb6d3c315590c52d0b0a1a482222ad75576dc8d176a33dcc59976d2f9 CVE-2024-8389,0,0,b86f9dffcb24008ea2fc4581b98019930f23a761524133d12e1b7b2aa1f8008a,2024-09-04T15:50:02.933000 CVE-2024-8391,0,0,6ffd51df6432b1e5cadf1919587edc296707fce8f9413505ec3bec8317c9d0a8,2024-09-05T12:53:21.110000 CVE-2024-8399,0,0,3faa142573b2658da1828ae3d2ac176955aecf342f632daae5bde690c496cf4c,2024-09-04T13:05:36.067000 -CVE-2024-8407,0,1,190893f5b3da05c3b04f6347e8d36e88eb22b5329ec3a82949674ad3abb1a15d,2024-09-05T14:48:28.513000 -CVE-2024-8408,0,1,9f87fcd812f2a0614c81edf26c59a3fd5158e6ac48b1ed6a5cdb904e931cd196,2024-09-05T14:41:14.603000 -CVE-2024-8409,0,1,9f46c5adb31a6d87824a8eab48e9d2e947ae9b31368ae468d358816a64d27b2e,2024-09-05T14:20:27.397000 -CVE-2024-8410,0,1,2e5ace471a9894647ef29b6ebd87c70c70869b886444866dda4ae993cd050d69,2024-09-05T14:20:08.100000 -CVE-2024-8411,0,1,b4f7e89f5a480939e3a01a132dc8fe8e09d6e0d2ced62a743c053df55b7374b3,2024-09-05T14:19:38.377000 +CVE-2024-8407,0,0,190893f5b3da05c3b04f6347e8d36e88eb22b5329ec3a82949674ad3abb1a15d,2024-09-05T14:48:28.513000 +CVE-2024-8408,0,0,9f87fcd812f2a0614c81edf26c59a3fd5158e6ac48b1ed6a5cdb904e931cd196,2024-09-05T14:41:14.603000 +CVE-2024-8409,0,0,9f46c5adb31a6d87824a8eab48e9d2e947ae9b31368ae468d358816a64d27b2e,2024-09-05T14:20:27.397000 +CVE-2024-8410,0,0,2e5ace471a9894647ef29b6ebd87c70c70869b886444866dda4ae993cd050d69,2024-09-05T14:20:08.100000 +CVE-2024-8411,0,0,b4f7e89f5a480939e3a01a132dc8fe8e09d6e0d2ced62a743c053df55b7374b3,2024-09-05T14:19:38.377000 CVE-2024-8412,0,0,d0351d4c1c74894581bf0ef5deff245493bcbfdb0a46fd49491e896953e0c3d1,2024-09-05T12:53:21.110000 -CVE-2024-8413,0,0,900f1056e9a2a3b1e1d77cb3bdcbf9982b6395625770ef6d932b5516213c20a5,2024-09-04T13:05:36.067000 +CVE-2024-8413,0,1,c7339b673131014f9dfb6c78c5b0192adccb852147a0c7cbd0ff5fa07a785425,2024-09-05T17:40:36.953000 CVE-2024-8414,0,0,c7a278942d1133117f185ab4b3c94fa3f349e952cb00264f39f6a8b179d4c200,2024-09-05T12:53:21.110000 CVE-2024-8415,0,0,d8c5585e64bc4323fcda510a16df97bcb1ec11253c5d38c080bb7195e38687ce,2024-09-05T12:53:21.110000 CVE-2024-8416,0,0,c7d13bc001a0210b2e719e08e8651ac5ae2e4ed0ee9e6e0088ac4a7e467de1ca,2024-09-05T12:53:21.110000 CVE-2024-8417,0,0,a9619e26c595954087d9c9b458e78703071fbd5bf87ff4a22ec6d8ecc7076fcb,2024-09-05T12:53:21.110000 -CVE-2024-8418,0,1,f7342b1aaf36f471815aa50c659bed6ce97deba1a8dc8297ac025dec31c9e421,2024-09-05T14:18:49.537000 -CVE-2024-8445,1,1,8d98bbeb16aa5e87ff1befe68a3ff44055fe2eb43c8b072f7ea5cb8c3ebef950,2024-09-05T15:15:16.927000 +CVE-2024-8418,0,0,f7342b1aaf36f471815aa50c659bed6ce97deba1a8dc8297ac025dec31c9e421,2024-09-05T14:18:49.537000 +CVE-2024-8445,0,1,11be885f11a2f2b8a202932b0e16edeb442a7212afe3a0c8e195900656f3fddf,2024-09-05T17:44:56.007000 CVE-2024-8460,0,0,9f3f8eceb3112773f2710cd04ce3ea02c4b8eea37add051a54caa5d3f11f68a4,2024-09-05T12:53:21.110000 -CVE-2024-8461,0,0,3ccf802c718ae8533bae76a032e73c351cb2b1bd92726ef0917704e95c34a231,2024-09-05T13:15:11.690000 -CVE-2024-8462,0,0,d51e34c710c0669216f179c5593ebd90c254e41355e12a7d7d2c1aa988360eba,2024-09-05T13:15:12.050000 -CVE-2024-8463,0,0,e17b2171682fe67a660d7b538ab35563cabb0097ed8af22449d3b6b373598133,2024-09-05T13:15:12.440000 -CVE-2024-8464,0,0,63c7ea231d27a7c85aa817f977a08060fbf518513e2d3e723a165a0a3d41c4e7,2024-09-05T13:15:12.730000 -CVE-2024-8465,0,0,1597c504836bdd913d82bf56a1def68a91a1cd524a66a93e2ad15f3115d0d340,2024-09-05T13:15:13.020000 -CVE-2024-8466,0,0,6014eb761b35d901bc933d19640a0238d2c094fd8e3e03f13159c12ea2dbbd6b,2024-09-05T13:15:13.370000 -CVE-2024-8467,0,0,42658ccebecd49370f0a5c580f0a98fb4a741cc87b60815741004c040f99150e,2024-09-05T13:15:13.680000 -CVE-2024-8468,0,0,5d63d7d7ac852cf3eb6c092686ca579af1c8a9d5c87302941aa55787572fcd2b,2024-09-05T13:15:13.943000 -CVE-2024-8469,0,0,06ffae906c3761304a5a8c4296e24abc57d394a2f2d0029ecd5db73fa06179e1,2024-09-05T13:15:14.220000 -CVE-2024-8470,0,0,be807df78df2f479971cb77eb5166c859fac4984969f202cc8774e32679e9c4b,2024-09-05T13:15:14.490000 -CVE-2024-8471,0,0,bf0acd95f66e5064f359e913a46fed0e125e232bacad6f48914a3dd1c3035cc4,2024-09-05T13:15:14.777000 -CVE-2024-8472,0,0,967dee72e9e36dfe672e610778d21b7b5f9f561c4501de86fd459af254aba549,2024-09-05T13:15:15.053000 -CVE-2024-8473,0,0,025d8d41664979a082286dba9311d4feae392f9de1a9b339a0cb404fb7681dee,2024-09-05T13:15:15.330000 +CVE-2024-8461,0,1,e49804a708251a77ac276dc2c87288b6f990bf8f9a9704c388f55d96a1de96d3,2024-09-05T17:45:07.877000 +CVE-2024-8462,0,1,8682862ce3f64006ead2b5107e241d40db31c5fa4d83c6d6ef7e924f1f4b5669,2024-09-05T17:45:07.877000 +CVE-2024-8463,0,1,f4cdf675d6b0eb7f01f77f31a8fd89b2a766f7cce7cb1cccf094868a09c458d5,2024-09-05T17:45:07.877000 +CVE-2024-8464,0,1,61ce8b9aed9baba98076045261c954dba5e25afc32dc472de46bd5181f0cb734,2024-09-05T17:45:07.877000 +CVE-2024-8465,0,1,aff88c1afcbcfb60feafc34cce7db2da4e688f46ce323be409462c7eba39283a,2024-09-05T17:45:07.877000 +CVE-2024-8466,0,1,3295994b36f5ce6fc39e587e9c4c3775f816ee9866be04c460f4bdcc29954e72,2024-09-05T17:45:07.877000 +CVE-2024-8467,0,1,d1b32b2a2420547f04666abaf7f537c271c50cbdb68eb44a40d173c98f7f1391,2024-09-05T17:45:07.877000 +CVE-2024-8468,0,1,e00a5e0503157cf890dafde0af92a6974faaa85216cb0f8d41e020ff1173f90d,2024-09-05T17:45:07.877000 +CVE-2024-8469,0,1,11c4fcf92a7eb7d5edf52263fc218194cae4f062ee6648d86209831687f49fa8,2024-09-05T17:45:07.877000 +CVE-2024-8470,0,1,956507eff563dfb5dc2d763a7fe06da01a484a013fe76d06d998d5ee320dc85d,2024-09-05T17:45:07.877000 +CVE-2024-8471,0,1,f34bbd71761fef46adc756fc351feed22408fd26153f4113affb8a1936920967,2024-09-05T17:44:56.007000 +CVE-2024-8472,0,1,885bea6a62a60a6033a0ab44c8323d53a4e9fd268816a1f761f34f0327640851,2024-09-05T17:44:56.007000 +CVE-2024-8473,0,1,218b88700e46a6ed9b36b25211b02ba98a7bb737dcfbb815905fd6fc793977c1,2024-09-05T17:44:56.007000