diff --git a/CVE-2004/CVE-2004-07xx/CVE-2004-0798.json b/CVE-2004/CVE-2004-07xx/CVE-2004-0798.json index 4186861b9ab..35ecab47da9 100644 --- a/CVE-2004/CVE-2004-07xx/CVE-2004-0798.json +++ b/CVE-2004/CVE-2004-07xx/CVE-2004-0798.json @@ -2,7 +2,7 @@ "id": "CVE-2004-0798", "sourceIdentifier": "cve@mitre.org", "published": "2004-10-20T04:00:00.000", - "lastModified": "2017-10-05T01:29:00.540", + "lastModified": "2024-08-27T17:48:24.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,33 +63,33 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5A24ABE9-0407-4E49-8A80-38BA2F99DE20" + "criteria": "cpe:2.3:a:progress:whatsup_gold:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A7C10A30-D662-4966-92F5-02D34CE5FC45" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:7.03:*:*:*:*:*:*:*", - "matchCriteriaId": "78E7BF57-15BF-42B2-A827-70A4D5D39E84" + "criteria": "cpe:2.3:a:progress:whatsup_gold:7.03:*:*:*:*:*:*:*", + "matchCriteriaId": "091C2AE0-9CED-4DFB-800C-EBB0421A8D8A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:7.04:*:*:*:*:*:*:*", - "matchCriteriaId": "0EE784E9-4DE1-44CF-B34B-37E4593CAC1A" + "criteria": "cpe:2.3:a:progress:whatsup_gold:7.04:*:*:*:*:*:*:*", + "matchCriteriaId": "803BB386-7134-4973-9942-0EDCEFA3B75A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "F6133F0A-79DB-4807-AB78-42DC24BDD99A" + "criteria": "cpe:2.3:a:progress:whatsup_gold:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "82B1C462-0B2F-4A5D-883C-BEFB09F3A9C2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:8.01:*:*:*:*:*:*:*", - "matchCriteriaId": "A6DF612F-C263-42D6-8A82-623FE85D8E1F" + "criteria": "cpe:2.3:a:progress:whatsup_gold:8.01:*:*:*:*:*:*:*", + "matchCriteriaId": "216E89A5-6C61-477F-9AB7-655DB59EE7BE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:8.03:*:*:*:*:*:*:*", - "matchCriteriaId": "8664FBC4-4440-44FA-8F7F-F7EACEBBBDBF" + "criteria": "cpe:2.3:a:progress:whatsup_gold:8.03:*:*:*:*:*:*:*", + "matchCriteriaId": "07ACE682-33FF-4DCC-8CE0-E8549228480B" } ] } diff --git a/CVE-2004/CVE-2004-07xx/CVE-2004-0799.json b/CVE-2004/CVE-2004-07xx/CVE-2004-0799.json index 6f373aef531..e2fed167e6f 100644 --- a/CVE-2004/CVE-2004-07xx/CVE-2004-0799.json +++ b/CVE-2004/CVE-2004-07xx/CVE-2004-0799.json @@ -2,7 +2,7 @@ "id": "CVE-2004-0799", "sourceIdentifier": "cve@mitre.org", "published": "2004-10-20T04:00:00.000", - "lastModified": "2017-07-11T01:30:29.057", + "lastModified": "2024-08-27T17:48:24.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -61,40 +61,40 @@ "operator": "OR", "negate": false, "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:7.0:*:*:*:*:*:*:*", - "matchCriteriaId": "5A24ABE9-0407-4E49-8A80-38BA2F99DE20" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:7.03:*:*:*:*:*:*:*", - "matchCriteriaId": "78E7BF57-15BF-42B2-A827-70A4D5D39E84" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:7.04:*:*:*:*:*:*:*", - "matchCriteriaId": "0EE784E9-4DE1-44CF-B34B-37E4593CAC1A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:8.0:*:*:*:*:*:*:*", - "matchCriteriaId": "F6133F0A-79DB-4807-AB78-42DC24BDD99A" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:8.01:*:*:*:*:*:*:*", - "matchCriteriaId": "A6DF612F-C263-42D6-8A82-623FE85D8E1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:8.03:*:*:*:*:*:*:*", - "matchCriteriaId": "8664FBC4-4440-44FA-8F7F-F7EACEBBBDBF" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:8.03_hotfix_1:*:*:*:*:*:*:*", "matchCriteriaId": "6289B868-6745-459C-9236-6E07D48C84CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A7C10A30-D662-4966-92F5-02D34CE5FC45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:7.03:*:*:*:*:*:*:*", + "matchCriteriaId": "091C2AE0-9CED-4DFB-800C-EBB0421A8D8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:7.04:*:*:*:*:*:*:*", + "matchCriteriaId": "803BB386-7134-4973-9942-0EDCEFA3B75A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "82B1C462-0B2F-4A5D-883C-BEFB09F3A9C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:8.01:*:*:*:*:*:*:*", + "matchCriteriaId": "216E89A5-6C61-477F-9AB7-655DB59EE7BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:8.03:*:*:*:*:*:*:*", + "matchCriteriaId": "07ACE682-33FF-4DCC-8CE0-E8549228480B" } ] } diff --git a/CVE-2007/CVE-2007-26xx/CVE-2007-2602.json b/CVE-2007/CVE-2007-26xx/CVE-2007-2602.json index 2c82d4a2d02..b6cbab85501 100644 --- a/CVE-2007/CVE-2007-26xx/CVE-2007-2602.json +++ b/CVE-2007/CVE-2007-26xx/CVE-2007-2602.json @@ -2,7 +2,7 @@ "id": "CVE-2007-2602", "sourceIdentifier": "cve@mitre.org", "published": "2007-05-11T10:19:00.000", - "lastModified": "2018-10-16T16:44:42.447", + "lastModified": "2024-08-27T17:48:24.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,8 +63,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:11:*:*:*:*:*:*:*", - "matchCriteriaId": "24F9D8E9-F5FE-43D4-9238-DD1A322D3970" + "criteria": "cpe:2.3:a:progress:whatsup_gold:11:*:*:*:*:*:*:*", + "matchCriteriaId": "0CB68BF8-899B-4473-A29C-DFADAA70A64B" } ] } diff --git a/CVE-2012/CVE-2012-26xx/CVE-2012-2601.json b/CVE-2012/CVE-2012-26xx/CVE-2012-2601.json index 1f8a3b23497..ee4f4a3a93e 100644 --- a/CVE-2012/CVE-2012-26xx/CVE-2012-2601.json +++ b/CVE-2012/CVE-2012-26xx/CVE-2012-2601.json @@ -2,7 +2,7 @@ "id": "CVE-2012-2601", "sourceIdentifier": "cret@cert.org", "published": "2012-08-15T22:55:02.400", - "lastModified": "2017-08-29T01:31:38.383", + "lastModified": "2024-08-27T17:48:24.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,8 +63,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:15.02:*:*:*:*:*:*:*", - "matchCriteriaId": "3E064A31-CAB7-4EE3-B1CA-41419B00B43A" + "criteria": "cpe:2.3:a:progress:whatsup_gold:15.02:*:*:*:*:*:*:*", + "matchCriteriaId": "26F26C84-97D6-47E4-8AEC-27BF272BA17F" } ] } diff --git a/CVE-2012/CVE-2012-43xx/CVE-2012-4344.json b/CVE-2012/CVE-2012-43xx/CVE-2012-4344.json index 4a637fb6be6..d56d9bc1e8d 100644 --- a/CVE-2012/CVE-2012-43xx/CVE-2012-4344.json +++ b/CVE-2012/CVE-2012-43xx/CVE-2012-4344.json @@ -2,7 +2,7 @@ "id": "CVE-2012-4344", "sourceIdentifier": "cve@mitre.org", "published": "2012-08-15T22:55:02.447", - "lastModified": "2017-08-29T01:32:16.557", + "lastModified": "2024-08-27T17:48:24.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,8 +63,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:15.02:*:*:*:*:*:*:*", - "matchCriteriaId": "3E064A31-CAB7-4EE3-B1CA-41419B00B43A" + "criteria": "cpe:2.3:a:progress:whatsup_gold:15.02:*:*:*:*:*:*:*", + "matchCriteriaId": "26F26C84-97D6-47E4-8AEC-27BF272BA17F" } ] } diff --git a/CVE-2015/CVE-2015-60xx/CVE-2015-6004.json b/CVE-2015/CVE-2015-60xx/CVE-2015-6004.json index 0fcfb53efe1..f79f2f6cd73 100644 --- a/CVE-2015/CVE-2015-60xx/CVE-2015-6004.json +++ b/CVE-2015/CVE-2015-60xx/CVE-2015-6004.json @@ -2,7 +2,7 @@ "id": "CVE-2015-6004", "sourceIdentifier": "cret@cert.org", "published": "2015-12-27T03:59:00.113", - "lastModified": "2016-12-06T03:03:05.087", + "lastModified": "2024-08-27T17:48:24.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -84,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", "versionEndIncluding": "16.3", - "matchCriteriaId": "33D94C28-430E-40D1-91D4-D9B5FD6989D2" + "matchCriteriaId": "0956392B-9072-4C26-BB8A-9DFD92594C57" } ] } diff --git a/CVE-2015/CVE-2015-60xx/CVE-2015-6005.json b/CVE-2015/CVE-2015-60xx/CVE-2015-6005.json index a80029f2669..edefa01c3a8 100644 --- a/CVE-2015/CVE-2015-60xx/CVE-2015-6005.json +++ b/CVE-2015/CVE-2015-60xx/CVE-2015-6005.json @@ -2,7 +2,7 @@ "id": "CVE-2015-6005", "sourceIdentifier": "cret@cert.org", "published": "2015-12-27T03:59:01.097", - "lastModified": "2016-12-06T03:03:06.243", + "lastModified": "2024-08-27T17:48:24.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", "versionEndIncluding": "16.3", - "matchCriteriaId": "33D94C28-430E-40D1-91D4-D9B5FD6989D2" + "matchCriteriaId": "0956392B-9072-4C26-BB8A-9DFD92594C57" } ] } diff --git a/CVE-2015/CVE-2015-82xx/CVE-2015-8261.json b/CVE-2015/CVE-2015-82xx/CVE-2015-8261.json index 1e30b81477f..76190b94aca 100644 --- a/CVE-2015/CVE-2015-82xx/CVE-2015-8261.json +++ b/CVE-2015/CVE-2015-82xx/CVE-2015-8261.json @@ -2,7 +2,7 @@ "id": "CVE-2015-8261", "sourceIdentifier": "cret@cert.org", "published": "2016-01-08T02:59:04.467", - "lastModified": "2017-09-10T01:29:03.217", + "lastModified": "2024-08-27T17:48:24.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -84,8 +84,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:16.3:*:*:*:*:*:*:*", - "matchCriteriaId": "509DB586-2238-4542-B3A3-45223A77C4C6" + "criteria": "cpe:2.3:a:progress:whatsup_gold:16.3:*:*:*:*:*:*:*", + "matchCriteriaId": "EAC7603C-E1CB-4B00-917E-A32B426F8311" } ] } diff --git a/CVE-2016/CVE-2016-10000xx/CVE-2016-1000000.json b/CVE-2016/CVE-2016-10000xx/CVE-2016-1000000.json index 9f8a7d423ef..4c999a2715c 100644 --- a/CVE-2016/CVE-2016-10000xx/CVE-2016-1000000.json +++ b/CVE-2016/CVE-2016-10000xx/CVE-2016-1000000.json @@ -2,7 +2,7 @@ "id": "CVE-2016-1000000", "sourceIdentifier": "cve@mitre.org", "published": "2016-10-06T14:59:15.583", - "lastModified": "2017-11-03T01:29:01.497", + "lastModified": "2024-08-27T17:48:24.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", "versionEndIncluding": "16.4", - "matchCriteriaId": "0F2BA7BF-889B-4DA0-AF8C-2219DEAE18E9" + "matchCriteriaId": "7997B627-ECE4-4528-AB9F-4FDC33AA3CE6" } ] } diff --git a/CVE-2018/CVE-2018-57xx/CVE-2018-5777.json b/CVE-2018/CVE-2018-57xx/CVE-2018-5777.json index 98afb2e5a56..7192d4402e9 100644 --- a/CVE-2018/CVE-2018-57xx/CVE-2018-5777.json +++ b/CVE-2018/CVE-2018-57xx/CVE-2018-5777.json @@ -2,7 +2,7 @@ "id": "CVE-2018-5777", "sourceIdentifier": "cve@mitre.org", "published": "2018-01-24T15:29:01.277", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2024-08-27T17:48:24.383", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", "versionEndExcluding": "17.1.1", - "matchCriteriaId": "14E4912C-E0D3-46C6-9EC0-B99D899D5A80" + "matchCriteriaId": "81EB981D-4AB3-468B-8C9A-71F2FE2AE369" } ] } diff --git a/CVE-2018/CVE-2018-57xx/CVE-2018-5778.json b/CVE-2018/CVE-2018-57xx/CVE-2018-5778.json index 7656660d56a..3f54ab9fb11 100644 --- a/CVE-2018/CVE-2018-57xx/CVE-2018-5778.json +++ b/CVE-2018/CVE-2018-57xx/CVE-2018-5778.json @@ -2,7 +2,7 @@ "id": "CVE-2018-5778", "sourceIdentifier": "cve@mitre.org", "published": "2018-01-24T15:29:01.340", - "lastModified": "2018-02-09T18:08:07.017", + "lastModified": "2024-08-27T17:48:24.383", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", "versionEndExcluding": "17.1.1", - "matchCriteriaId": "14E4912C-E0D3-46C6-9EC0-B99D899D5A80" + "matchCriteriaId": "81EB981D-4AB3-468B-8C9A-71F2FE2AE369" } ] } diff --git a/CVE-2018/CVE-2018-89xx/CVE-2018-8938.json b/CVE-2018/CVE-2018-89xx/CVE-2018-8938.json index ccb16a2ef6b..1f4d1fd77ff 100644 --- a/CVE-2018/CVE-2018-89xx/CVE-2018-8938.json +++ b/CVE-2018/CVE-2018-89xx/CVE-2018-8938.json @@ -2,7 +2,7 @@ "id": "CVE-2018-8938", "sourceIdentifier": "cve@mitre.org", "published": "2018-05-01T16:29:00.443", - "lastModified": "2018-06-13T14:20:45.237", + "lastModified": "2024-08-27T17:48:24.383", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", "versionEndExcluding": "18.0", - "matchCriteriaId": "E5400871-5BDA-4A91-9B19-245DE0DFB5BA" + "matchCriteriaId": "65B6A821-3150-41CA-BCB4-DF7337014496" } ] } diff --git a/CVE-2018/CVE-2018-89xx/CVE-2018-8939.json b/CVE-2018/CVE-2018-89xx/CVE-2018-8939.json index bcb1a79c694..afab74f5ea4 100644 --- a/CVE-2018/CVE-2018-89xx/CVE-2018-8939.json +++ b/CVE-2018/CVE-2018-89xx/CVE-2018-8939.json @@ -2,7 +2,7 @@ "id": "CVE-2018-8939", "sourceIdentifier": "cve@mitre.org", "published": "2018-05-01T16:29:00.507", - "lastModified": "2018-06-13T14:18:25.247", + "lastModified": "2024-08-27T17:48:24.383", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", "versionEndExcluding": "18.0", - "matchCriteriaId": "E5400871-5BDA-4A91-9B19-245DE0DFB5BA" + "matchCriteriaId": "65B6A821-3150-41CA-BCB4-DF7337014496" } ] } diff --git a/CVE-2021/CVE-2021-475xx/CVE-2021-47590.json b/CVE-2021/CVE-2021-475xx/CVE-2021-47590.json index 19e678a7acc..8ab41ce076a 100644 --- a/CVE-2021/CVE-2021-475xx/CVE-2021-47590.json +++ b/CVE-2021/CVE-2021-475xx/CVE-2021-47590.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47590", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T15:15:53.610", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T16:14:56.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: mptcp: corrige el punto muerto en __mptcp_push_pending() __mptcp_push_pending() puede llamar a mptcp_flush_join_list() con el bloqueo del socket de subflujo retenido. Si dicha llamada llega a mptcp_sockopt_sync_all(), posteriormente __mptcp_sockopt_sync() podr\u00eda intentar bloquear el socket de subflujo por s\u00ed mismo, provocando un punto muerto. sysrq: Mostrar estado bloqueado tarea: estado del servidor ss: D pila: 0 pid: 938 ppid: 1 banderas: 0x00000000 Seguimiento de llamadas: __schedule+0x2d6/0x10c0? __mod_memcg_state+0x4d/0x70 ? csum_partial+0xd/0x20? _raw_spin_lock_irqsave+0x26/0x50 horario+0x4e/0xc0 __lock_sock+0x69/0x90 ? do_wait_intr_irq+0xa0/0xa0 __lock_sock_fast+0x35/0x50 mptcp_sockopt_sync_all+0x38/0xc0 __mptcp_push_pending+0x105/0x200 mptcp_sendmsg+0x466/0x490 sock_sendmsg+0x57/0x60 __sys_sendto+0xf0/0x160? do_wait_intr_irq+0xa0/0xa0? fpregs_restore_userregs+0x12/0xd0 __x64_sys_sendto+0x20/0x30 do_syscall_64+0x38/0x90 Entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f9ba546c2d0 RSP: dc3b762d8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c RAX: ffffffffffffffda RBX: 00007f9ba56c8060 RCX: 00007f9ba546c2d0 RDX: 000000000000077a RSI: 0000000000e5e180 RDI: 0000000000000234 RBP: 0000000000cc57f0 R08: 0000000000000000 R09: 00000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9ba56c8060 R13: 0000000000b6ba60 R14: 0000000000cc7840 R15: 41d8685b1d7901b8 Solucione el problema usando __mptcp_flush_join_list() en su lugar de mptcp_flush_join_list() simple dentro __mptcp_push_pending(), como sugiere Florian. La sincronizaci\u00f3n de sockopt se aplazar\u00e1 a la cola de trabajo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.13", + "versionEndExcluding": "5.15.11", + "matchCriteriaId": "D42075C1-1BC2-41C8-B06D-3A7E0EDABE84" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/23311b92755ffa9087332d1bb8c71c0f6a10cc08", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3d79e3756ca90f7a6087b77b62c1d9c0801e0820", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-475xx/CVE-2021-47598.json b/CVE-2021/CVE-2021-475xx/CVE-2021-47598.json index 58793c918c4..98fb011386b 100644 --- a/CVE-2021/CVE-2021-475xx/CVE-2021-47598.json +++ b/CVE-2021/CVE-2021-475xx/CVE-2021-47598.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47598", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T15:15:54.383", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T16:14:48.593", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: sch_cake: no llamar a cake_destroy() desde cake_init() Se supone que las qdiscs no deben llamar a su propio m\u00e9todo destroy() desde init(), porque la pila central ya lo hace. syzbot pudo activar el use-after-free: DEBUG_LOCKS_WARN_ON(lock->magic != lock) ADVERTENCIA: CPU: 0 PID: 21902 en kernel/locking/mutex.c:586 __mutex_lock_common kernel/locking/mutex.c:586 [en l\u00ednea] ADVERTENCIA: CPU: 0 PID: 21902 en kernel/locking/mutex.c:586 __mutex_lock+0x9ec/0x12f0 kernel/locking/mutex.c:740 M\u00f3dulos vinculados en: CPU: 0 PID: 21902 Comm: syz-executor189 No contaminado 5.16 .0-rc4-syzkaller #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 RIP: 0010:__mutex_lock_common kernel/locking/mutex.c:586 [en l\u00ednea] RIP: 0010:__mutex_lock+ 0x9ec/0x12f0 kernel/locking/mutex.c:740 C\u00f3digo: 08 84 d2 0f 85 19 08 00 00 8b 05 97 38 4b 04 85 c0 0f 85 27 f7 ff ff 48 c7 c6 20 00 ac 89 48 c7 c7 a0 fe ab 89 e8 bf 76 ba ff <0f> 0b e9 0d f7 ff ff 48 8b 44 24 40 48 8d b8 c8 08 00 00 48 89 f8 RSP: 0018:ffffc9000627f290 EFLAGS: 00010282 RAX: 0000000 RBX: 0000000000000000 RCX: 0000000000000000 RDX: ffff88802315d700 RSI: ffffffff815f1db8 RDI: fffff52000c4fe44 RBP: ffff88818f28e000 R08: 0000000000000000 R09: 0000000000000000 R10: ffffffff815ebb5e R11: 00000 R12: 0000000000000000 R13: dffffc0000000000 R14: ffffc9000627f458 R15: 0000000093c30000 FS: 000055556abc400(0000) GS:ffff8880b9c0000 0(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fda689c3303 CR3: 000000001cfbb000 CR4: 0000000000350ef0 Seguimiento de llamadas: tcf_chain0_head_change_cb_del+0x2e/0 x3d0 net/sched/cls_api.c:810 tcf_block_put_ext net/sched/cls_api.c:1381 [ en l\u00ednea] tcf_block_put_ext net/sched/cls_api.c:1376 [en l\u00ednea] tcf_block_put+0xbc/0x130 net/sched/cls_api.c:1394 cake_destroy+0x3f/0x80 net/sched/sch_cake.c:2695 qdisc_create.constprop.0+0x9da /0x10f0 net/sched/sch_api.c:1293 tc_modify_qdisc+0x4c5/0x1980 net/sched/sch_api.c:1660 rtnetlink_rcv_msg+0x413/0xb80 net/core/rtnetlink.c:5571 netlink_rcv_skb+0x153/0x420 net/netlink/ af_netlink. c:2496 netlink_unicast_kernel net/netlink/af_netlink.c:1319 [en l\u00ednea] netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1345 netlink_sendmsg+0x904/0xdf0 net/netlink/af_netlink.c:1921 sock_sendmsg_nosec net/socket.c :704 [en l\u00ednea] sock_sendmsg+0xcf/0x120 net/socket.c:724 ____sys_sendmsg+0x6e8/0x810 net/socket.c:2409 ___sys_sendmsg+0xf3/0x170 net/socket.c:2463 __sys_sendmsg+0xe5/0x1b 0 red/toma. c:2492 do_syscall_x64 arch/x86/entry/common.c:50 [en l\u00ednea] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 Entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f1bb06badb9 C\u00f3digo: No se puede acceder al c\u00f3digo de operaci\u00f3n bytes en RIP 0x7f1bb06bad8f. RSP: 002b:00007fff3012a658 EFLAGS: 00000246 ORIG_RAX: 000000000000002e RAX: ffffffffffffffda RBX: 00000000000000003 RCX: 00007f1bb06badb9 RDX: 000000000 RSI: 00000000200007c0 RDI: 0000000000000003 RBP: 0000000000000000 R08: 0000000000000003 R09: 0000000000000003 R10: 00000003 R11: 0000000000000246 R12: 00007fff3012a688 R13: 00007fff3012a6a0 R14: 00007fff3012a6e0 R15: 00000000000013c2 " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19", + "versionEndExcluding": "4.19.222", + "matchCriteriaId": "7F8B745E-51F4-4477-BF7A-D3ACB37D2D70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.168", + "matchCriteriaId": "195EBAA1-4CCE-4898-9351-F4A0DBCAA022" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.88", + "matchCriteriaId": "A657B2D0-5B9D-42BE-A3BF-228DBC1B057C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.11", + "matchCriteriaId": "11274E95-438A-449A-B100-01B2B0046669" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0d80462fbdcafd536dcad7569e65d3d14a7e9f2f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/20ad1ef02f9ad5e1dda9eeb113e4c158b4806986", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4e388232e630ebe4f94b4a0715ec98c0e2b314a3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ab443c53916730862cec202078d36fd4008bea79", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f6deae2e2d83bd267e1986f5d71d8c458e18fd99", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47600.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47600.json index d69dc2ba66c..2eb193d9e32 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47600.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47600.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47600", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T15:15:54.567", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T16:14:38.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,158 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dm btree remove: corrige el use after free en rebalance_children() Mueve dm_tm_unlock() despu\u00e9s de dm_tm_dec()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4.296", + "matchCriteriaId": "1FF3BCF2-4788-45E7-BDAC-845DEBF8922F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.294", + "matchCriteriaId": "BEC14782-2EE3-4635-A927-91559E4F451C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.259", + "matchCriteriaId": "390D64FF-1DB7-4DD1-ADEF-CE96BEA2607C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.222", + "matchCriteriaId": "2D0D89BC-6CF8-4BFB-8C91-472348052528" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.168", + "matchCriteriaId": "195EBAA1-4CCE-4898-9351-F4A0DBCAA022" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.88", + "matchCriteriaId": "A657B2D0-5B9D-42BE-A3BF-228DBC1B057C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.11", + "matchCriteriaId": "11274E95-438A-449A-B100-01B2B0046669" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0e21e6cd5eebfc929ac5fa3b97ca2d4ace3cb6a3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1b8d2789dad0005fd5e7d35dab26a8e1203fb6da", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/293f957be5e39720778fb1851ced7f5fba6d51c3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/501ecd90efdc9b2edc6c28852ecd098a4adf8f00", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/607beb420b3fe23b948a9bf447d993521a02fbbb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/66ea642af6fd4eacb5d0271a922130fcf8700424", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a48f6a2bf33734ec5669ee03067dfb6c5b4818d6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b03abd0aa09c05099f537cb05b8460c4298f0861", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47601.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47601.json index 9bc3838c167..42f516d33c9 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47601.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47601.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47601", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T15:15:54.670", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T16:14:33.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tee: amdtee: corrige un error IS_ERR() vs NULL La funci\u00f3n __get_free_pages() no devuelve punteros de error, devuelve NULL, as\u00ed que corrija esta condici\u00f3n para evitar una desreferencia a NULL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.6", + "versionEndExcluding": "5.10.88", + "matchCriteriaId": "38A89EC4-168A-4514-A383-6B85436E12DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.11", + "matchCriteriaId": "11274E95-438A-449A-B100-01B2B0046669" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/640e28d618e82be78fb43b4bf5113bc90d6aa442", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/832f3655c6138c23576ed268e31cc76e0f05f2b1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9d7482771fac8d8e38e763263f2ca0ca12dd22c6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47604.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47604.json index 105d0ff3a48..4aa92a1e651 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47604.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47604.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47604", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T15:15:54.973", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T16:14:27.793", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vduse: verifique que el desplazamiento est\u00e9 dentro de los l\u00edmites en get_config() Esta condici\u00f3n verifica \"len\" pero no verifica \"desplazamiento\" y eso podr\u00eda resultar en una lectura fuera de los l\u00edmites si \" desplazamiento > dev->config_size\". El problema es que, dado que ambas variables no est\u00e1n firmadas, la resta \"dev->config_size - offset\" dar\u00eda como resultado un valor sin firmar muy alto. Creo que estas comprobaciones podr\u00edan no ser necesarias porque se supone que \"len\" y \"offset\" ya se han validado mediante la funci\u00f3n vhost_vdpa_config_validate(). Pero no conozco el c\u00f3digo a la perfecci\u00f3n y me gusta estar seguro." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.11", + "matchCriteriaId": "7A70FD7B-2EDC-4C3B-ADE0-880AA759CDD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/dc1db0060c02d119fd4196924eff2d1129e9a442", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ebbbc5fea3f648175df1aa3f127c78eb0252cc2a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47610.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47610.json index 47f2279aaec..c3915f36e87 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47610.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47610.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47610", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T15:15:55.557", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T16:14:20.873", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,74 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/msm: corrige el acceso ptr nulo msm_ioctl_gem_submit() Corrige la siguiente desreferencia del puntero nulo en msm_ioctl_gem_submit(): 26545.260705: Rastreo de llamadas: 26545.263223: kref_put+0x1c/0x60 26545.266452 msm: _ioctl_gem_submit+ 0x254/0x744 26545.270937: drm_ioctl_kernel+0xa8/0x124 26545.274976: drm_ioctl+0x21c/0x33c 26545.278478: drm_compat_ioctl+0xdc/0xf0 : __arm64_compat_sys_ioctl+0xc8/0x100 26545.287169: el0_svc_common+0xf8/0x250 26545.291025: do_el0_svc_compat+0x28/0x54 26545.295066: 0 /0x1c 26545.298838: el0_sync_compat_handler+0xa8/0xcc 26545.303403: el0_sync_compat+0x188/0x1c0 26545.307445: C\u00f3digo: d503201f d503201f 52800028 4b0803e8 680008) 26545.318799: P\u00e1nico del kernel: no se sincroniza: Ups: excepci\u00f3n fatal" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.10", + "matchCriteriaId": "01BE9EFD-9022-4AA5-9D0A-09797C299737" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/26d776fd0f79f093a5d0ce1a4c7c7a992bc3264c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f6db3d98f876870c35e96693cfd54752f6199e59", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47612.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47612.json index 257060b3990..d931178e9ce 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47612.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47612.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47612", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T15:15:55.750", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T16:14:13.877", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,158 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfc: corrige el error de segmentaci\u00f3n en nfc_genl_dump_devices_done Cuando falla kmalloc en nfc_genl_dump_devices(), entonces el error de segmentaci\u00f3n de nfc_genl_dump_devices_done() se muestra a continuaci\u00f3n KASAN: null-ptr-deref en el rango [0x0000000000000008-0x00 0000000000000f] CPU: 0 PID : 25 Comm: kworker/0:1 Not tainted 5.16.0-rc4-01180-g2a987e65025e-dirty #5 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.14.0-6.fc35 04/01/ 2014 Cola de trabajo: eventos netlink_sock_destruct_work RIP: 0010:klist_iter_exit+0x26/0x80 Seguimiento de llamadas: class_dev_iter_exit+0x15/0x20 nfc_genl_dump_devices_done+0x3b/0x50 genl_lock_done+0x84/0xd0 estructura+0x8f/0x270 __sk_destruct+0x64/0x3b0 sk_destruct+0xa8/0xd0 __sk_free+0x2e8/0x3d0 sk_free+0x51/0x90 netlink_sock_destruct_work+0x1c/0x20 Process_one_work+0x411/0x710 trabajador_thread+0x6fd/0xa80" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4.296", + "matchCriteriaId": "1FF3BCF2-4788-45E7-BDAC-845DEBF8922F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.294", + "matchCriteriaId": "BEC14782-2EE3-4635-A927-91559E4F451C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.259", + "matchCriteriaId": "390D64FF-1DB7-4DD1-ADEF-CE96BEA2607C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.222", + "matchCriteriaId": "2D0D89BC-6CF8-4BFB-8C91-472348052528" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.167", + "matchCriteriaId": "942818CD-79A1-41C4-8695-4C9BA6D2A2DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.87", + "matchCriteriaId": "CFD35461-7F6C-4537-840D-5ED5BAB2D315" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.10", + "matchCriteriaId": "D4F036E6-108C-4D1F-A4E0-234DC09AA0E2" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/214af18abbe39db05beb305b2d11e87d09a6529c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2a8845b9603c545fddd17862282dc4c4ce0971e3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6644989642844de830f9b072cd65c553cb55946c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c602863ad28ec86794cb4ab4edea5324f555f181", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d731ecc6f2eaec68f4ad1542283bbc7d07bd0112", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d89e4211b51752daf063d638af50abed2fd5f96d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ea55b3797878752aa076b118afb727dcf79cac34", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fd79a0cbf0b2e34bcc45b13acf962e2032a82203", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47614.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47614.json index b819bf1e04d..4378ce32c69 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47614.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47614.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47614", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T15:15:55.943", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T16:14:06.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: RDMA/irdma: corrige un user-after-free en add_pble_prm Cuando falla irdma_hmc_sd_one, el 'fragmento' se libera mientras todav\u00eda est\u00e1 en la lista de informaci\u00f3n de PBLE. Agregue la entrada del fragmento a la lista de informaci\u00f3n de PBLE solo despu\u00e9s de configurar correctamente la SD en irdma_hmc_sd_one." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.14", + "versionEndExcluding": "5.15.10", + "matchCriteriaId": "1BBBBDA5-DDE7-4287-A1A6-9AABA5BC584D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/11eebcf63e98fcf047a876a51d76afdabc3b8b9b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1e11a39a82e95ce86f849f40dda0d9c0498cebd9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-476xx/CVE-2021-47616.json b/CVE-2021/CVE-2021-476xx/CVE-2021-47616.json index 6954194d373..ea4bbc1b299 100644 --- a/CVE-2021/CVE-2021-476xx/CVE-2021-47616.json +++ b/CVE-2021/CVE-2021-476xx/CVE-2021-47616.json @@ -2,8 +2,8 @@ "id": "CVE-2021-47616", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T15:15:56.130", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T16:13:59.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: RDMA: corrige el use-after-free en rxe_queue_cleanup En la ruta de manejo de errores en rxe_qp_from_init() qp->sq.queue se libera y luego rxe_create_qp() eliminar\u00e1 la \u00faltima referencia a este objeto. La funci\u00f3n de limpieza qp intentar\u00e1 liberar esta cola una vez y provocar\u00e1 un error UAF. Solucionarlo poniendo a cero el puntero de la cola despu\u00e9s de liberar la cola en rxe_qp_from_init()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.10", + "matchCriteriaId": "CE684464-9205-451D-854A-11B8BBA99AF7" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/84b01721e8042cdd1e8ffeb648844a09cd4213e0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/acb53e47db1fbc7cd37ab10b46388f045a76e383", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-298xx/CVE-2022-29845.json b/CVE-2022/CVE-2022-298xx/CVE-2022-29845.json index dc55ea61906..5d39070257d 100644 --- a/CVE-2022/CVE-2022-298xx/CVE-2022-29845.json +++ b/CVE-2022/CVE-2022-298xx/CVE-2022-29845.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29845", "sourceIdentifier": "cve@mitre.org", "published": "2022-05-11T18:15:29.020", - "lastModified": "2022-05-20T16:53:03.717", + "lastModified": "2024-08-27T17:48:24.383", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,18 +85,18 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:21.1.0:*:*:*:*:*:*:*", - "matchCriteriaId": "991E2217-BDD6-4877-80C4-08627DB64622" + "criteria": "cpe:2.3:a:progress:whatsup_gold:21.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2A4EF91B-C2C8-4378-975D-3D3DD10F8906" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:21.1.1:*:*:*:*:*:*:*", - "matchCriteriaId": "B3C8CC66-1602-4FC1-97C0-9B301DE50A7A" + "criteria": "cpe:2.3:a:progress:whatsup_gold:21.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2C563F9E-97A8-4791-B3F7-5D3B380C7066" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:22.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "EBC0E622-05F0-4098-8920-B17644AB9490" + "criteria": "cpe:2.3:a:progress:whatsup_gold:22.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9BD18B7A-B6F3-4459-8DA8-7F7F1EE7A426" } ] } diff --git a/CVE-2022/CVE-2022-298xx/CVE-2022-29846.json b/CVE-2022/CVE-2022-298xx/CVE-2022-29846.json index 2131374052f..267880ef3f7 100644 --- a/CVE-2022/CVE-2022-298xx/CVE-2022-29846.json +++ b/CVE-2022/CVE-2022-298xx/CVE-2022-29846.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29846", "sourceIdentifier": "cve@mitre.org", "published": "2022-05-11T18:15:29.057", - "lastModified": "2023-08-08T14:22:24.967", + "lastModified": "2024-08-27T17:48:24.383", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,15 +85,15 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", "versionStartIncluding": "16.1", "versionEndIncluding": "21.1.1", - "matchCriteriaId": "D2BF265A-8B48-47FA-9AAD-6EBDF672C1BD" + "matchCriteriaId": "13A33F03-8B7B-4894-9BCA-A651ED440944" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:22.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "EBC0E622-05F0-4098-8920-B17644AB9490" + "criteria": "cpe:2.3:a:progress:whatsup_gold:22.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9BD18B7A-B6F3-4459-8DA8-7F7F1EE7A426" } ] } diff --git a/CVE-2022/CVE-2022-298xx/CVE-2022-29847.json b/CVE-2022/CVE-2022-298xx/CVE-2022-29847.json index 5711bb731c1..45a07bb0ff1 100644 --- a/CVE-2022/CVE-2022-298xx/CVE-2022-29847.json +++ b/CVE-2022/CVE-2022-298xx/CVE-2022-29847.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29847", "sourceIdentifier": "cve@mitre.org", "published": "2022-05-11T18:15:29.097", - "lastModified": "2022-05-20T14:36:16.007", + "lastModified": "2024-08-27T17:48:24.383", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,15 +85,15 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", "versionStartIncluding": "21.0.0", "versionEndIncluding": "21.1.1", - "matchCriteriaId": "1BA6AF5F-7102-45E9-B7D5-B1E1554FC78F" + "matchCriteriaId": "60452848-68FE-4047-BBDA-98FB98090649" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:22.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "EBC0E622-05F0-4098-8920-B17644AB9490" + "criteria": "cpe:2.3:a:progress:whatsup_gold:22.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9BD18B7A-B6F3-4459-8DA8-7F7F1EE7A426" } ] } diff --git a/CVE-2022/CVE-2022-298xx/CVE-2022-29848.json b/CVE-2022/CVE-2022-298xx/CVE-2022-29848.json index b5f115cb7af..6a747d2ebf1 100644 --- a/CVE-2022/CVE-2022-298xx/CVE-2022-29848.json +++ b/CVE-2022/CVE-2022-298xx/CVE-2022-29848.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29848", "sourceIdentifier": "cve@mitre.org", "published": "2022-05-11T18:15:29.133", - "lastModified": "2022-05-20T14:37:08.813", + "lastModified": "2024-08-27T17:48:24.383", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,15 +85,15 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", "versionStartIncluding": "17.0.0", "versionEndIncluding": "21.1.1", - "matchCriteriaId": "49CC49BF-4115-4B77-B64D-02136216811D" + "matchCriteriaId": "FA0FBE52-07D5-4734-B392-839B7B04A778" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ipswitch:whatsup_gold:22.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "EBC0E622-05F0-4098-8920-B17644AB9490" + "criteria": "cpe:2.3:a:progress:whatsup_gold:22.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9BD18B7A-B6F3-4459-8DA8-7F7F1EE7A426" } ] } diff --git a/CVE-2022/CVE-2022-470xx/CVE-2022-47036.json b/CVE-2022/CVE-2022-470xx/CVE-2022-47036.json index 7e66cd09d94..9a8f8900fd4 100644 --- a/CVE-2022/CVE-2022-470xx/CVE-2022-47036.json +++ b/CVE-2022/CVE-2022-470xx/CVE-2022-47036.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47036", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-18T03:15:05.957", - "lastModified": "2024-03-18T12:38:25.490", + "lastModified": "2024-08-27T17:35:01.233", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Los dispositivos Siklu TG Terragraph anteriores a aproximadamente 2.1.1 tienen una contrase\u00f1a de root codificada que se ha revelado mediante un ataque de fuerza bruta en un hash MD5. Un administrador puede utilizarlo para \"iniciar sesi\u00f3n de depuraci\u00f3n\". NOTA: la vulnerabilidad no se soluciona con el firmware 2.1.1; en cambio, se soluciona en hardware m\u00e1s nuevo, que normalmente se usar\u00eda con el firmware 2.1.1 o posterior." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://semaja2.net/2023/06/11/siklu-tg-auth-bypass.html", diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48912.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48912.json index 7545f7aea5b..3b790e14297 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48912.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48912.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48912", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-22T02:15:05.550", - "lastModified": "2024-08-22T12:48:02.790", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T16:12:47.173", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,145 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netfilter: corrige el use-after-free en __nf_register_net_hook() No debemos eliminar la referencia a @new_hooks despu\u00e9s de que se haya lanzado nf_hook_mutex, porque es posible que otros subprocesos ya hayan liberado nuestros ganchos asignados. ERROR: KASAN: use-after-free en nf_hook_entries_get_hook_ops include/linux/netfilter.h:130 [en l\u00ednea] ERROR: KASAN: use-after-free en ganchos_validate net/netfilter/core.c:171 [en l\u00ednea] ERROR: KASAN: use-after-free en __nf_register_net_hook+0x77a/0x820 net/netfilter/core.c:438 Lectura de tama\u00f1o 2 en la direcci\u00f3n ffff88801c1a8000 por tarea syz-executor237/4430 CPU: 1 PID: 4430 Comm: syz-executor237 No contaminado 5.17.0 -rc5-syzkaller-00306-g2293be58d6a1 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Seguimiento de llamadas: __dump_stack lib/dump_stack.c:88 [en l\u00ednea] dump_stack_lvl+0xcd/ 0x134 lib/dump_stack.c:106 print_address_description.constprop.0.cold+0x8d/0x336 mm/kasan/report.c:255 __kasan_report mm/kasan/report.c:442 [en l\u00ednea] kasan_report.cold+0x83/0xdf mm/ kasan/report.c: 459 nf_hook_entries_get_hook_ops include/linux/netfilter.h: 130 [inline] gooks_validate net/netfilter/core.c: 171 [inline] __nf_register_net_hook+0x77a/0x820 net/netfilter/core.c: 438 nf_net_hook+0x77a/0x820 net/netfilter/core.c: 438 nf_net_hook+0x77a/0x820 net/netfilter/core.c: 438 nfhhook_net_net+0x11 /0x170 net/netfilter/core.c:571 nf_register_net_hooks+0x59/0xc0 net/netfilter/core.c:587 nf_synproxy_ipv6_init+0x85/0xe0 net/netfilter/nf_synproxy_core.c:1218 synproxy_tg6_check+0x30d/0x560 ipv6/filtro de red/ ip6t_SYNPROXY.c:81 xt_check_target+0x26c/0x9e0 net/netfilter/x_tables.c:1038 check_target net/ipv6/netfilter/ip6_tables.c:530 [en l\u00ednea] find_check_entry.constprop.0+0x7f1/0x9e0 net/ipv6/netfilter/ip6_tables .c:573 traducir_table+0xc8b/0x1750 net/ipv6/netfilter/ip6_tables.c:735 do_replace net/ipv6/netfilter/ip6_tables.c:1153 [en l\u00ednea] do_ip6t_set_ctl+0x56e/0xb90 net/ipv6/netfilter/ip6_tables.c: 1639 nf_setsockopt+0x83/0xe0 net/netfilter/nf_sockopt.c:101 ipv6_setsockopt+0x122/0x180 net/ipv6/ipv6_sockglue.c:1024 rawv6_setsockopt+0xd3/0x6a0 net/ipv6/raw.c:1084 ys_setsockopt+0x2db/0x610 neto/ socket.c:2180 __do_sys_setsockopt net/socket.c:2191 [en l\u00ednea] __se_sys_setsockopt net/socket.c:2188 [en l\u00ednea] __x64_sys_setsockopt+0xba/0x150 net/socket.c:2188 do_syscall_x64 arch/x86/entry/common.c : 50 [en l\u00ednea] do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 Entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f65a1ace7d9 C\u00f3digo: 28 00 00 00 75 05 48 83 c4 28 c3 e8 1 15 00 00 90 48 89 F8 48 89 F7 48 89 D6 48 89 CA 4D 89 C2 4D 89 C8 4C 8B 4C 24 08 0F 05 <48> 3D 01 F0 FF FF 73 01 C3 48 C7 C1 B8 FF FF FF F7 D8 64 89 01 48 RSP: 002b:00007f65a1a7f308 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 RAX: ffffffffffffffda RBX: 00000000000000006 RCX: 00007f65a1ace7d9 RDX: 00000040 RSI: 0000000000000029 RDI: 0000000000000003 RBP: 00007f65a1b574c8 R08: 0000000000000001 R09: 000000000000000 R10: 000000002 0000000 R11: 0000000000000246 R12: 00007f65a1b55130 R13: 00007f65a1b574c0 R14: 00007f65a1b24090 R15: 0000000000022000 La direcci\u00f3n del error pertenece a la p\u00e1gina: p\u00e1gina:ffffea0000706a00 refcount:0 mapcount:0 mapeo:0000000000000000 index:0x0 pfn:0x1c1a8 flags: 0xfff000000 00000(nodo=0|zona=1|lastcpupid=0x7ff) crudo: 00fff00000000000 ffffea0001c1b108 ffffea000046dd08 0000000000000000 crudo: 0000000000000000 00000000000000000 00000000ffffffff 00000000000 00000 p\u00e1gina volcada porque: kasan: mal acceso detectado page_owner rastrea la p\u00e1gina como p\u00e1gina liberada asignada por \u00faltima vez mediante orden 2, migrar tipo Inamovible, gfp_mask 0x52dc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_ZERO) , pid 4430, ts 1061781545818, free_ts 1061791488993 prep_new_page mm/page_alloc.c:2434 [en l\u00ednea] ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.14", + "versionEndExcluding": "4.14.270", + "matchCriteriaId": "64D82A2D-7E3F-4739-BADB-F611732BE6C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.233", + "matchCriteriaId": "B59A7E33-6262-458E-AC76-E8CC4E812344" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.183", + "matchCriteriaId": "76A7616E-E6B9-4A7F-AA7C-1D47F774215F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.104", + "matchCriteriaId": "764998FC-D1F7-4BAA-BD56-A553C7AB8F08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.27", + "matchCriteriaId": "B3A8E092-3021-4A34-8DCE-B89D2238818B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.13", + "matchCriteriaId": "B871B667-EDC0-435D-909E-E918D8D90995" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/05f7927b25d2635e87267ff6c79db79fb46cf313", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/49c24579cec41e32f13d57b337fd28fb208d4a5b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/56763f12b0f02706576a088e85ef856deacc98a0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5a8076e98dde17224dd47283b894a8b1dbe1bc72", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8b0142c4143c1ca297dcf2c0cdd045d65dae2344", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bd61f192a339b1095dfd6d56073a5265934c2979", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bdd8fc1b826e6f23963f5bef3f7431c6188ec954", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48913.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48913.json index a9b2e6d77df..a340392e2fe 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48913.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48913.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48913", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-22T02:15:05.613", - "lastModified": "2024-08-22T12:48:02.790", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T16:12:58.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: blktrace: corrige el use after free para struct blk_trace Al rastrear todo el disco, se crear\u00e1n 'dropped' y 'msg' en 'q->debugfs_dir' y 'bt->dir ' es NULL, por lo tanto blk_trace_free() no eliminar\u00e1 esos archivos. Lo que es peor, el siguiente UAF se puede activar debido al acceso a 'soltado' y 'msg' obsoletos: ============================== ===================================== ERROR: KASAN: use after free en blk_dropped_read+0x89 /0x100 Lectura de tama\u00f1o 4 en la direcci\u00f3n ffff88816912f3d8 por tarea blktrace/1188 CPU: 27 PID: 1188 Comm: blktrace Not tainted 5.17.0-rc4-next-20220217+ #469 Nombre de hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996) , BIOS ?-20190727_073836-4 Seguimiento de llamadas: dump_stack_lvl+0x34/0x44 print_address_description.constprop.0.cold+0xab/0x381 ? blk_dropped_read+0x89/0x100? blk_dropped_read+0x89/0x100 kasan_report.cold+0x83/0xdf ? blk_dropped_read+0x89/0x100 kasan_check_range+0x140/0x1b0 blk_dropped_read+0x89/0x100 ? blk_create_buf_file_callback+0x20/0x20? kmem_cache_free+0xa1/0x500 ? do_sys_openat2+0x258/0x460 full_proxy_read+0x8f/0xc0 vfs_read+0xc6/0x260 ksys_read+0xb9/0x150 ? vfs_write+0x3d0/0x3d0? fpregs_assert_state_consistent+0x55/0x60? exit_to_user_mode_prepare+0x39/0x1e0 do_syscall_64+0x35/0x80 Entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7fbc080d92fd C\u00f3digo: ce 20 00 00 75 10 b8 00 00 00 00 0f 5 48 3d 01 f0 ff ff 73 31 c3 48 83 1 RSP: 002b :00007fbb95ff9cb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000000 RAX: ffffffffffffffda RBX: 00007fbb95ff9dc0 RCX: 00007fbc080d92fd RDX: 0000000000000100 R SI: 00007fbb95ff9cc0 RDI: 0000000000000045 RBP: 0000000000000045 R08: 0000000000406299 R09: 00000000fffffffd R10: 000000000153afa0 R11: 000000000293 R12: 00007fbb780008c0 R13: 00007fbb78000938 R14: 0000000000608b30 R15: 00007fbb780029c8 Asignado por tarea 1050: kasan_save_stack+0x1e/0x40 __kasan_kmalloc+0x81/0xa0 do_blk_trace_setup+0xcb/0x410 __blk_trace_setup+0xac/0x130 e9/0x1c0 blkdev_ioctl+0xf1/0x390 __x64_sys_ioctl+0xa5/0xe0 do_syscall_64+0x35 /0x80 Entry_SYSCALL_64_after_hwframe+0x44/0xae Liberado por la tarea 1050: kasan_save_stack+0x1e/0x40 kasan_set_track+0x21/0x30 kasan_set_free_info+0x20/0x30 __kasan_slab_free+0x103/0x180 kfree+0x9a/0x4c 0 __blk_trace_remove+0x53/0x70 blk_trace_ioctl+0x199/0x1c0 blkdev_common_ioctl+0x5e9 /0xb30 blkdev_ioctl+0x1a5/0x390 __x64_sys_ioctl+0xa5/0xe0 do_syscall_64+0x35/0x80 Entry_SYSCALL_64_after_hwframe+0x44/0xae La direcci\u00f3n con errores pertenece al objeto en ffff88816912f380 que pertenece al cach\u00e9 kmalloc- 96 de tama\u00f1o 96 La direcci\u00f3n del error se encuentra 88 bytes dentro de regi\u00f3n de 96 bytes [ffff88816912f380, ffff88816912f3e0) La direcci\u00f3n con errores pertenece a la p\u00e1gina: p\u00e1gina:000000009a1b4e7c refcount:1 mapcount:0 mapeo:00000000000000000 \u00edndice:0x0f banderas: 0x17ffffc0000200(slab|node= 0|zona=2|\u00faltimopupid=0x1fffff ) sin procesar: 0017ffffc0000200 ffffea00044f1100 muerto000000000002 ffff88810004c780 sin procesar: 0000000000000000 0000000000200020 00000001ffffffff 000000000000 0000 p\u00e1gina volcada porque: kasan: mal acceso detectado Estado de la memoria alrededor de la direcci\u00f3n con errores: ffff88816912f280: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc ffff88816912f300: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc >ffff88816912f380: fa fb fb fb fb fb fb fb fb fb fb fc fc fc fc ^ ffff88816912f400: fa fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc ffff88816912f480: fa fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc =============================== =======================================" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.15.27", + "matchCriteriaId": "0124F44D-3165-4025-A6AD-1C47145E6B2A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.13", + "matchCriteriaId": "B871B667-EDC0-435D-909E-E918D8D90995" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/30939293262eb433c960c4532a0d59c4073b2b84", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6418634238ade86f2b08192928787f39d8afb58c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/78acc7dbd84a8c173a08584750845c31611160f2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48915.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48915.json index e6136812ac4..8d224d00449 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48915.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48915.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48915", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-22T02:15:05.747", - "lastModified": "2024-08-22T12:48:02.790", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T16:07:09.037", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Thermal: Core: corrige la desreferencia del puntero TZ_GET_TRIP NULL No llame a get_trip_hyst() desde Thermal_genl_cmd_tz_get_trip() si la zona t\u00e9rmica no define una." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.9", + "versionEndExcluding": "5.10.104", + "matchCriteriaId": "A3C09401-A1DB-46D7-AC56-3179A3FA83C1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.27", + "matchCriteriaId": "B3A8E092-3021-4A34-8DCE-B89D2238818B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.13", + "matchCriteriaId": "B871B667-EDC0-435D-909E-E918D8D90995" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1c0b51e62a50e9291764d022ed44549e65d6ab9c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3dafbf915c05f83469e791949b5590da2aca2afb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4c294285cec3964b3291772ac0642c2bf440bd1b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5838a14832d447990827d85e90afe17e6fb9c175", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48918.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48918.json index b8a7c8b4b4d..bcfb5993fbd 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48918.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48918.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48918", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-22T02:15:05.920", - "lastModified": "2024-08-22T12:48:02.790", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T16:07:19.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iwlwifi: mvm: verifique debugfs_dir ptr antes de usarlo Cuando se usa \"debugfs=off\" en la l\u00ednea de comando del kernel, el m\u00f3dulo mvm de iwiwifi usa un puntero debugfs_dir no v\u00e1lido/no verificado y causa un ERROR: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 000000000000004f #PF: acceso de lectura del supervisor en modo kernel #PF: c\u00f3digo_error(0x0000) - p\u00e1gina no presente PGD 0 P4D 0 Ups: 0000 [#1] PREEMPT SMP CPU: 1 PID: 503 Comunicaci\u00f3n: modprobe Contaminado: GW 5.17.0-rc5 #7 Nombre del hardware: Dell Inc. Inspiron 15 5510/076F7Y, BIOS 2.4.1 05/11/2021 RIP: 0010:iwl_mvm_dbgfs_register+0x692/0x700 [iwlmvm] C\u00f3digo: 69 a0 be 80 01 00 00 48 c7 c7 50 73 6a a0 e8 95 cf ee e0 48 8b 83 b0 1e 00 00 48 c7 c2 54 73 6a a0 be 64 00 00 00 48 8d 7d 8c <48> 8b 48 50 e8 22 07 e1 48 8b 43 28 48 8d 55 8c 48 c7 c7 5f 73 RSP: 0018:ffffc90000a0ba68 EFLAGS: 00010246 RAX: ffffffffffffffff RBX: ffff88817d6e3328 RCX: ffff88817d6e332 8 RDX: fffffffa06a7354 RSI: 0000000000000064 RDI: ffffc90000a0ba6c RBP: ffffc90000a0bae0 R08: ffffffff824e4880 R09: fffffffa069d620 R10 : ffffc90000a0ba00 R11: ffffffffffffffff R12: 0000000000000000 R13: ffffc90000a0bb28 R14: ffff88817d6e3328 R15: ffff88817d6e3320 FS: 00007f64dd92d74 0(0000) GS:ffff88847f640000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000000000004f CR3: fc79001 CR4: 0000000000770ee0 PKRU: 55555554 Seguimiento de llamadas: ? iwl_mvm_mac_setup_register+0xbdc/0xda0 [iwlmvm] iwl_mvm_start_post_nvm+0x71/0x100 [iwlmvm] iwl_op_mode_mvm_start+0xab8/0xb30 [iwlmvm] _iwl_op_mode_start+0x6f/0xd0 [iwlwifi] _opmode_register+0x6a/0xe0 [iwlwifi] ? 0xffffffffa0231000 iwl_mvm_init+0x35/0x1000 [iwlmvm]? 0xffffffffa0231000 do_one_initcall+0x5a/0x1b0? kmem_cache_alloc+0x1e5/0x2f0? do_init_module+0x1e/0x220 do_init_module+0x48/0x220 load_module+0x2602/0x2bc0 ? __kernel_read+0x145/0x2e0? kernel_read_file+0x229/0x290 __do_sys_finit_module+0xc5/0x130 ? __do_sys_finit_module+0xc5/0x130 __x64_sys_finit_module+0x13/0x20 do_syscall_64+0x38/0x90 Entry_SYSCALL_64_after_hwframe+0x44/0xae RIP: 0033:0x7f64dda564dd C\u00f3digo: 5b 41 c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 1b 29 0f 00 f7 d8 64 89 01 48 RSP:0 0007ffdba393f88 EFLAGS: 00000246 ORIG_RAX: 0000000000000139 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f64dda564dd RDX: 0000000000000000 RSI: 00005575399e2ab2 RDI: 0000000000000001 RBP: 000055753a91c5e0 R08: 0000000000000000 R09: 0000000000000002 R10: 0000000000000001 R11: 00000000000000246 R12: 00005575399e2ab2 R13: 000055753a91ceb0 R14: 0000000000000000 R15: 000055753a923018 < /TASK> M\u00f3dulos vinculados en: btintel(+) btmtk bluetooth vfat snd_hda_codec_hdmi fat snd_hda_codec_realtek snd_hda_codec_generic iwlmvm(+) snd_sof_pci_intel_tgl mac80211 snd_sof_intel_hda_common soundwire_intel soundwire_generic_allocation soundwire_cade nce soundwire_bus snd_sof_intel_hda snd_sof_pci snd_sof snd_sof_xtensa_dsp snd_soc_hdac_hda snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi snd_soc_core btrfs snd_compress snd_hda_intel tel_dspcfg snd_intel_sdw_acpi snd_hda_codec raid6_pq iwlwifi snd_hda_core snd_pcm snd_timer snd soundcore cfg80211 intel_ish_ipc(+) thunderbolt rfkill intel_ishtp ucsi_acpi wmi i2c_hid_acpi i2c_hid evdev CR2: 000000000000004f ---[ end trace 00000000000000000 ]--- Verifique el puntero debugfs_dir para ver si hay un error antes de usarlo . [cambiar para hacer ambos condicionales]" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12", + "versionEndExcluding": "5.15.27", + "matchCriteriaId": "0124F44D-3165-4025-A6AD-1C47145E6B2A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.13", + "matchCriteriaId": "B871B667-EDC0-435D-909E-E918D8D90995" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5a6248c0a22352f09ea041665d3bd3e18f6f872c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7de1ed755e1ace30d97a724bad32452ed86b653b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fe51975ff13831e794e1bcd0039b305dcad3d7ba", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48919.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48919.json index 24128c9770c..7d3daa88018 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48919.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48919.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48919", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-22T02:15:05.987", - "lastModified": "2024-08-22T12:48:02.790", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T16:07:32.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,158 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: corrige doble ejecuci\u00f3n libre cuando falla el montaje en cifs_get_root() Cuando cifs_get_root() falla durante cifs_smb3_do_mount() llamamos a deactivate_locked_super() que eventualmente llamar\u00e1 a delay_free() que liberar\u00e1 el contexto. En esta situaci\u00f3n no debemos proceder a ingresar a la secci\u00f3n out: en cifs_smb3_do_mount() y liberar los mismos recursos por segunda vez. [Jueves 10 de febrero 12:59:06 2022] ERROR: KASAN: use-after-free en rcu_cblist_dequeue+0x32/0x60 [Jueves 10 de febrero 12:59:06 2022] Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff888364f4d110 por task swapper/1/ 0 [jueves 10 de febrero 12:59:06 2022] CPU: 1 PID: 0 Comm: swapper/1 Tainted: G OE 5.17.0-rc3+ #4 [jueves 10 de febrero 12:59:06 2022] Nombre del hardware: Microsoft Corporation M\u00e1quina virtual/M\u00e1quina virtual, BIOS Hyper-V UEFI versi\u00f3n v4.0 17/12/2019 [jueves 10 de febrero 12:59:06 2022] Seguimiento de llamadas: [jueves 10 de febrero 12:59:06 2022] [jueves 10 de febrero 12:59:06 2022] dump_stack_lvl+0x5d/0x78 [jueves 10 de febrero 12:59:06 2022] print_address_description.constprop.0+0x24/0x150 [jueves 10 de febrero 12:59:06 2022] ? rcu_cblist_dequeue+0x32/0x60 [jueves 10 de febrero 12:59:06 2022] kasan_report.cold+0x7d/0x117 [jueves 10 de febrero 12:59:06 2022] ? rcu_cblist_dequeue+0x32/0x60 [jueves 10 de febrero 12:59:06 2022] __asan_load8+0x86/0xa0 [jueves 10 de febrero 12:59:06 2022] rcu_cblist_dequeue+0x32/0x60 [jueves 10 de febrero 12:59:06 2022] rcu_core+ 0x547/0xca0 [jueves 10 de febrero 12:59:06 2022]? call_rcu+0x3c0/0x3c0 [jueves 10 de febrero 12:59:06 2022]? __this_cpu_preempt_check+0x13/0x20 [jueves 10 de febrero 12:59:06 2022] ? lock_is_held_type+0xea/0x140 [jueves 10 de febrero 12:59:06 2022] rcu_core_si+0xe/0x10 [jueves 10 de febrero 12:59:06 2022] __do_softirq+0x1d4/0x67b [jueves 10 de febrero 12:59:06 2022] salida_rcu+ 0x100/0x150 [jueves 10 de febrero 12:59:06 2022] irq_exit_rcu+0xe/0x30 [jueves 10 de febrero 12:59:06 2022] sysvec_hyperv_stimer0+0x9d/0xc0 ... [jueves 10 de febrero 12:59:07 2022] Liberado por tarea 58179: [jueves 10 de febrero 12:59:07 2022] kasan_save_stack+0x26/0x50 [jueves 10 de febrero 12:59:07 2022] kasan_set_track+0x25/0x30 [jueves 10 de febrero 12:59:07 2022] kasan_set_free_info+0x24 /0x40 [jueves 10 de febrero 12:59:07 2022] ____kasan_slab_free+0x137/0x170 [jueves 10 de febrero 12:59:07 2022] __kasan_slab_free+0x12/0x20 [jueves 10 de febrero 12:59:07 2022] xb3/0x1d0 [Jueves 10 de febrero 12:59:07 2022] kfree+0xcd/0x520 [Jueves 10 de febrero 12:59:07 2022] cifs_smb3_do_mount+0x149/0xbe0 [cifs] [Jueves 10 de febrero 12:59:07 2022] smb3_get_tree+0x1a0/ 0x2e0 [cifs] [jueves 10 de febrero 12:59:07 2022] vfs_get_tree+0x52/0x140 [jueves 10 de febrero 12:59:07 2022] path_mount+0x635/0x10c0 [jueves 10 de febrero 12:59:07 2022] __x64_sys_mount+ 0x1bf /0x210 [jueves 10 de febrero 12:59:07 2022] do_syscall_64+0x5c/0xc0 [jueves 10 de febrero 12:59:07 2022] Entry_SYSCALL_64_after_hwframe+0x44/0xae [jueves 10 de febrero 12:59:07 2022] \u00daltima creaci\u00f3n de trabajo potencialmente relacionado : [jueves 10 de febrero 12:59:07 2022] kasan_save_stack+0x26/0x50 [jueves 10 de febrero 12:59:07 2022] __kasan_record_aux_stack+0xb6/0xc0 [jueves 10 de febrero 12:59:07 2022] kasan_record_aux_stack_noalloc+0 xb/0x10 [ Jueves 10 de febrero 12:59:07 2022] call_rcu+0x76/0x3c0 [Jueves 10 de febrero 12:59:07 2022] cifs_umount+0xce/0xe0 [cifs] [Jueves 10 de febrero 12:59:07 2022] cifs_kill_sb+0xc8/0xe0 [CIFS] [Jue 10 de febrero 12:59:07 2022] Deactivate_Locked_super+0x5d/0xd0 [justo 10 de febrero 12:59:07 2022] CIFS_SMB3_DO_MOUNT+0XAB9/0XBE0 [CIFS] [THU FEB 10 12:59:07 2022] SMB3 +0x1a0/0x2e0 [cifs] [jueves 10 de febrero 12:59:07 2022] vfs_get_tree+0x52/0x140 [jueves 10 de febrero 12:59:07 2022] path_mount+0x635/0x10c0 [jueves 10 de febrero 12:59:07 2022] __x64_sys_mount+0x1bf/0x210 [jueves 10 de febrero 12:59:07 2022] do_syscall_64+0x5c/0xc0 [jueves 10 de febrero 12:59:07 2022] Entry_SYSCALL_64_after_hwframe+0x44/0xae" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.9.305", + "matchCriteriaId": "2812DEB9-FC99-48E3-ABCB-F07B62FBBCA9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.270", + "matchCriteriaId": "51C0B6F2-A904-4FE6-B06B-CE26226B22B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.233", + "matchCriteriaId": "B59A7E33-6262-458E-AC76-E8CC4E812344" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.183", + "matchCriteriaId": "76A7616E-E6B9-4A7F-AA7C-1D47F774215F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.104", + "matchCriteriaId": "764998FC-D1F7-4BAA-BD56-A553C7AB8F08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.27", + "matchCriteriaId": "B3A8E092-3021-4A34-8DCE-B89D2238818B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.13", + "matchCriteriaId": "B871B667-EDC0-435D-909E-E918D8D90995" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/147a0e71ccf96df9fc8c2ac500829d8e423ef02c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2fe0e281f7ad0a62259649764228227dd6b2561d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3d6cc9898efdfb062efb74dc18cfc700e082f5d5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/546d60859ecf13380fcabcbeace53a5971493a2b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/563431c1f3c8f2230e4a9c445fa23758742bc4f0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/da834d6c1147c7519a9e55b510a03b7055104749", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/df9db1a2af37f39ad1653c7b9b0d275d72d0bc67", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e208668ef7ba23efcbf76a8200cab8deee501c4d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48924.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48924.json index 88615724670..18723faad81 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48924.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48924.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48924", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-22T02:15:08.527", - "lastModified": "2024-08-22T12:48:02.790", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T16:07:43.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,145 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: t\u00e9rmica: int340x: corrige la p\u00e9rdida de memoria en int3400_notify() Es f\u00e1cil solucionar las siguientes p\u00e9rdidas de memoria en mi plataforma TigerLake: objeto sin referencia 0xffff927c8b91dbc0 (tama\u00f1o 32): comm \"kworker/0 :2\", pid 112, santiam\u00e9n 4294893323 (edad 83.604s) volcado hexadecimal (primeros 32 bytes): 4e 41 4d 45 3d 49 4e 54 33 34 30 30 20 54 68 65 NAME=INT3400 The 72 6d 61 6c 00 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b a5 rmal.kkkkkkkkkk. seguimiento: [] __kmalloc_track_caller+0x2fe/0x4a0 [] kvasprintf+0x65/0xd0 [] kasprintf+0x4e/0x70 [] notificar+0x82/0x120 [int3400_thermal] [] acpi_ev_notify_dispatch+0x54/0x71 [] acpi_os_execute_deferred+0x17/0x30 [] Process_one_work+0x21a/0x3f0 [] trabajador_thread+0x4a/0x3b0 ffffffff9c2cb4dd>] kthread+0xfd/0x130 [] ret_from_fork+0x1f/0x30 Solucionarlo llamando a kfree() en consecuencia." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.14", + "versionEndExcluding": "4.14.274", + "matchCriteriaId": "66FD29ED-3573-4532-BDEF-8D09E54DFC2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.237", + "matchCriteriaId": "C479DB4A-41B9-4940-B214-841C74E2C1FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.188", + "matchCriteriaId": "670BCB59-E3C8-496D-BD17-297C113776FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.103", + "matchCriteriaId": "1A95B717-3110-4D4F-B8FC-373919BB514D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.26", + "matchCriteriaId": "9AB342AE-A62E-4947-A6EA-511453062B2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.12", + "matchCriteriaId": "C76BAB21-7F23-4AD8-A25F-CA7B262A2698" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2e798814e01827871938ff172d2b2ccf1e74b355", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/33c73a4d7e7b19313a6b417152f5365016926418", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3abea10e6a8f0e7804ed4c124bea2d15aca977c8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ba9efbbf6745750d34c1e87c9539ce9db645ca0a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c3fa6d1937a8d0828131a04ae2cd2c30d0668693", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e098933866f9e1dd3ef4eebbe2e3d504f970f599", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f0ddc5184b0127038d05008e2a69f89d1e13f980", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42893.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42893.json index 22d286c8fdc..ebb0583a933 100644 --- a/CVE-2023/CVE-2023-428xx/CVE-2023-42893.json +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42893.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42893", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-28T16:15:07.903", - "lastModified": "2024-06-10T18:15:23.210", + "lastModified": "2024-08-27T17:35:02.800", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42942.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42942.json index 592fe541dcd..500591579f6 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42942.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42942.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42942", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:50.963", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-08-27T16:35:01.703", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Este problema se solucion\u00f3 mejorando el manejo de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en watchOS 10.1, macOS Sonoma 14.1, tvOS 17.1, iOS 16.7.2 y iPadOS 16.7.2, iOS 17.1 y iPadOS 17.1, macOS Ventura 13.6.1. Es posible que una aplicaci\u00f3n maliciosa pueda obtener privilegios de root." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/HT213981", diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42974.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42974.json index 1c0e5b6a83f..20696668331 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42974.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42974.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42974", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-28T16:15:08.480", - "lastModified": "2024-03-28T20:53:20.813", + "lastModified": "2024-08-27T17:35:03.187", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se solucion\u00f3 una condici\u00f3n de ejecuci\u00f3n con un mejor manejo del estado. Este problema se solucion\u00f3 en macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.2 y iPadOS 17.2, iOS 16.7.3 y iPadOS 16.7.3, macOS Sonoma 14.2. Una aplicaci\u00f3n puede ejecutar c\u00f3digo arbitrario con privilegios del kernel." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT214034", diff --git a/CVE-2023/CVE-2023-481xx/CVE-2023-48127.json b/CVE-2023/CVE-2023-481xx/CVE-2023-48127.json index 030e2e907a7..a96d931ba68 100644 --- a/CVE-2023/CVE-2023-481xx/CVE-2023-48127.json +++ b/CVE-2023/CVE-2023-481xx/CVE-2023-48127.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48127", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-26T07:15:56.860", - "lastModified": "2024-01-29T22:58:28.277", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-27T16:35:02.480", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49582.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49582.json index 5bcdc3ac424..51f5701d1db 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49582.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49582.json @@ -2,16 +2,43 @@ "id": "CVE-2023-49582", "sourceIdentifier": "security@apache.org", "published": "2024-08-26T14:15:07.050", - "lastModified": "2024-08-26T15:15:23.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-27T16:04:58.657", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Lax permissions set by the Apache Portable Runtime library on Unix platforms would allow local users read access to named shared memory segments, potentially revealing sensitive application data. \n\nThis issue does not affect non-Unix platforms, or builds with\u00a0APR_USE_SHMEM_SHMGET=1 (apr.h)\n\nUsers are recommended to upgrade to APR version 1.7.5, which fixes this issue." + }, + { + "lang": "es", + "value": "Los permisos laxos establecidos por la librer\u00eda Apache Portable Runtime en plataformas Unix permitir\u00edan a los usuarios locales acceso de lectura a segmentos de memoria compartida con nombre, lo que podr\u00eda revelar datos confidenciales de la aplicaci\u00f3n. Este problema no afecta a plataformas que no son Unix ni a compilaciones con APR_USE_SHMEM_SHMGET=1 (apr.h). Se recomienda a los usuarios actualizar a la versi\u00f3n 1.7.5 de APR, que soluciona este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -24,10 +51,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:portable_runtime:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.9.0", + "versionEndExcluding": "1.7.5", + "matchCriteriaId": "CD6DB048-3EE7-4014-80B7-B6935B2B5661" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/sntjc04t1rvjhdzz2tzmtz2zdnmv7dc4", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-518xx/CVE-2023-51812.json b/CVE-2023/CVE-2023-518xx/CVE-2023-51812.json index 2d81ddcc0ed..81085efd9f6 100644 --- a/CVE-2023/CVE-2023-518xx/CVE-2023-51812.json +++ b/CVE-2023/CVE-2023-518xx/CVE-2023-51812.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51812", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-04T19:15:08.920", - "lastModified": "2024-01-10T15:57:32.953", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-27T16:35:04.757", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52105.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52105.json index 80b93108ffe..e3c4a6e9222 100644 --- a/CVE-2023/CVE-2023-521xx/CVE-2023-52105.json +++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52105.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52105", "sourceIdentifier": "psirt@huawei.com", "published": "2024-01-16T10:15:07.880", - "lastModified": "2024-01-19T19:49:22.037", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-27T16:35:04.960", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,20 @@ "value": "CWE-269" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52114.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52114.json index 6fdf3652b5b..a41c32d26c1 100644 --- a/CVE-2023/CVE-2023-521xx/CVE-2023-52114.json +++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52114.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52114", "sourceIdentifier": "psirt@huawei.com", "published": "2024-01-16T09:15:07.883", - "lastModified": "2024-01-19T19:16:40.973", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-27T16:35:05.753", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,20 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5880.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5880.json index 08c78e2d15f..f2d69359138 100644 --- a/CVE-2023/CVE-2023-58xx/CVE-2023-5880.json +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5880.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5880", "sourceIdentifier": "cve@rapid7.com", "published": "2024-01-03T20:15:21.833", - "lastModified": "2024-01-11T18:26:04.750", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-27T16:35:06.783", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.3 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.3 } ] }, diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1274.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1274.json index 5df1df3965c..092413e53ee 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1274.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1274.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1274", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-02T06:15:12.050", - "lastModified": "2024-04-02T12:50:42.233", + "lastModified": "2024-08-27T16:35:07.453", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento My Calendar de WordPress anterior a la versi\u00f3n 3.4.24 no desinfecta ni escapa a algunos par\u00e1metros, lo que podr\u00eda permitir a los usuarios con un rol tan bajo como Suscriptor realizar ataques de cross-site scripting (dependiendo de los permisos establecidos por el administrador)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/91dba45b-9930-4bfb-a7bf-903c46864e9f/", diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21896.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21896.json index 0ea85d5ecab..4f5b95fe1f8 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21896.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21896.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21896", "sourceIdentifier": "support@hackerone.com", "published": "2024-02-20T02:15:50.770", - "lastModified": "2024-05-01T18:15:13.687", + "lastModified": "2024-08-27T16:35:07.720", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-27" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/11/1", diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2263.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2263.json index 4a293a1feef..d284327107b 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2263.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2263.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2263", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-01T05:15:07.990", - "lastModified": "2024-04-01T12:49:00.877", + "lastModified": "2024-08-27T16:35:11.257", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Themify de WordPress anterior a 1.4.4 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera una cross-site scripting reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/ec092ed9-eb3e-40a7-a878-ab854104e290/", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23234.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23234.json index 0583513fa61..f2a923ccfd6 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23234.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23234.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23234", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:47.927", - "lastModified": "2024-03-13T23:15:46.387", + "lastModified": "2024-08-27T16:35:08.620", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se solucion\u00f3 un problema de escritura fuera de los l\u00edmites con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. Una aplicaci\u00f3n puede ejecutar c\u00f3digo arbitrario con privilegios del kernel." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", diff --git a/CVE-2024/CVE-2024-294xx/CVE-2024-29432.json b/CVE-2024/CVE-2024-294xx/CVE-2024-29432.json index 6a1b56fa4f5..aa2946ca771 100644 --- a/CVE-2024/CVE-2024-294xx/CVE-2024-29432.json +++ b/CVE-2024/CVE-2024-294xx/CVE-2024-29432.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29432", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-02T21:15:46.117", - "lastModified": "2024-04-03T12:38:04.840", + "lastModified": "2024-08-27T16:35:10.203", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Alldata v0.4.6 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro nombre de tabla en /data/masterdata/datas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Raybye/4b377eb06b5f9c324f090d39a0d25c2b", diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29937.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29937.json index 94e0a614ac3..f1c49475c03 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29937.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29937.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29937", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-11T01:25:15.210", - "lastModified": "2024-04-11T12:47:44.137", + "lastModified": "2024-08-27T16:35:11.020", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "NFS en una base de c\u00f3digo derivada de BSD, como se usa en OpenBSD hasta 7.4 y FreeBSD hasta 14.0-RELEASE, permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un error que no est\u00e1 relacionado con la corrupci\u00f3n de la memoria." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://news.ycombinator.com/item?id=39778203", diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30865.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30865.json index 715f547a5df..01934340713 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30865.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30865.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30865", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-01T15:15:55.440", - "lastModified": "2024-04-01T15:53:18.060", + "lastModified": "2024-08-27T17:35:06.970", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "netentsec NS-ASG 6.3 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de /admin/edit_user_login.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-edit_user_login.md", diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30867.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30867.json index 57f53c9d449..9a6b9292e4a 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30867.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30867.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30867", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-01T16:15:54.380", - "lastModified": "2024-04-02T12:50:42.233", + "lastModified": "2024-08-27T16:35:11.577", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "netentsec NS-ASG 6.3 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de /admin/edit_virtual_site_info.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-edit_virtual_site_info.md", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31002.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31002.json index 73f6d0136dc..460641d5256 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31002.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31002.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31002", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-02T08:15:59.863", - "lastModified": "2024-04-02T12:50:42.233", + "lastModified": "2024-08-27T16:35:12.380", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en Bento4 Bento v.1.6.0-641 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente AP4 BitReader::ReadCache() en Ap4Utils.cpp." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/axiomatic-systems/Bento4/issues/939", diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33671.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33671.json index 00ec75897fc..6dad98a2784 100644 --- a/CVE-2024/CVE-2024-336xx/CVE-2024-33671.json +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33671.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33671", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-26T02:15:06.410", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-08-27T16:35:13.193", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], "references": [ { "url": "https://www.veritas.com/support/en_US/security/VTS24-002#H1", diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36268.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36268.json index fda57f17ea9..3426afce36b 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36268.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36268.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36268", "sourceIdentifier": "security@apache.org", "published": "2024-08-02T10:16:00.367", - "lastModified": "2024-08-22T20:35:12.037", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T17:19:43.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -61,10 +81,33 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.10.0", + "versionEndExcluding": "1.13.0", + "matchCriteriaId": "60AA3A03-AF35-41BE-8671-5C75CC7C82A2" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/1w1yp1bg5sjvn46dszkf00tz1vfs0frc", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37370.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37370.json index ce4eaf16eaf..c305dc6857e 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37370.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37370.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37370", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-28T22:15:02.293", - "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-27T17:48:12.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,74 @@ "value": "En MIT Kerberos 5 (tambi\u00e9n conocido como krb5) anterior a 1.21.3, un atacante puede modificar el campo Extra Count de texto plano de un token de envoltura GSS krb5 confidencial, lo que hace que el token desenvuelto aparezca truncado para la aplicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.21.3", + "matchCriteriaId": "9882067B-E1AC-4800-AB8E-541B937B498A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://web.mit.edu/kerberos/www/advisories/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37371.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37371.json index 3e58018711f..df24909941b 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37371.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37371.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37371", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-28T23:15:11.603", - "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-27T17:47:30.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,74 @@ "value": "En MIT Kerberos 5 (tambi\u00e9n conocido como krb5) anterior a 1.21.3, un atacante puede provocar lecturas de memoria no v\u00e1lidas durante el manejo de tokens de mensajes GSS al enviar tokens de mensajes con campos de longitud no v\u00e1lidos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.21.3", + "matchCriteriaId": "9882067B-E1AC-4800-AB8E-541B937B498A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/krb5/krb5/commit/55fbf435edbe2e92dd8101669b1ce7144bc96fef", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://web.mit.edu/kerberos/www/advisories/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38600.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38600.json index 727f4198dc6..7a4c3d54270 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38600.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38600.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38600", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:19.990", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T16:02:47.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,130 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: soluciona interbloqueos con eliminaciones de kctl al desconectar fin. La devoluci\u00f3n de llamada puede eliminar un elemento kctl y esto puede provocar un punto muerto cuando el dispositivo estaba en estado suspendido. Es decir: * Un proceso espera el encendido en snd_power_ref_and_wait() en snd_ctl_info() o lectura/escritura() dentro de card->controls_rwsem. * Mientras tanto, el sistema se desconecta y el controlador intenta eliminar un kctl mediante snd_ctl_remove*(); intenta tomar card->controls_rwsem nuevamente, pero esto ya est\u00e1 bloqueado por lo anterior. Como el durmiente no se despierta, esto se bloquea. Una soluci\u00f3n f\u00e1cil es despertar a los durmientes antes de procesar las devoluciones de llamada de desconexi\u00f3n del controlador, pero justo despu\u00e9s de configurar la tarjeta->indicador de apagado. Entonces todos los durmientes abortar\u00e1n inmediatamente y el c\u00f3digo fluir\u00e1 nuevamente. B\u00e1sicamente, este parche mueve la llamada wait_event() en el momento adecuado. Mientras estamos en esto, solo para estar seguros, llame a wait_event_all() en lugar de wait_event(), aunque no usamos eventos exclusivos en esta cola por ahora." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.161", + "matchCriteriaId": "25AD0ABB-C49D-49FD-8856-CB897759F5DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.93", + "matchCriteriaId": "EEFB78EE-F990-4197-BF1C-156760A55667" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.33", + "matchCriteriaId": "FCE796DF-3B50-4DC6-BAE5-95271068FC9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.12", + "matchCriteriaId": "80550309-67AB-4FD1-AC07-3DED5C4F01B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.9.3", + "matchCriteriaId": "E07124C1-19E8-4D21-828D-9932A01D3011" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2f103287ef7960854808930499d1181bd0145d68", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6b55e879e7bd023a03888fc6c8339edf82f576f4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/87988a534d8e12f2e6fc01fe63e6c1925dc5307c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/88ce3fe255d58a93624b467af036dc3519f309c7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c2fb439f4f1425a961d20bec818fed2c2d9ef70a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ff80185e7b7b547a0911fcfc8aefc61c3e8304d7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38602.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38602.json index 0176ecee537..ecae3966032 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38602.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38602.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38602", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:20.183", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T16:01:39.983", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,117 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ax25: soluciona problemas de p\u00e9rdida de recuento de referencias de ax25_dev. Ax25_addr_ax25dev() y ax25_dev_device_down() existen un problema de p\u00e9rdida de recuento de referencias del objeto \"ax25_dev\". Problema de p\u00e9rdida de memoria en ax25_addr_ax25dev(): el recuento de referencias del objeto \"ax25_dev\" se puede aumentar varias veces en ax25_addr_ax25dev(). Esto provocar\u00e1 una p\u00e9rdida de memoria. Problemas de p\u00e9rdida de memoria en ax25_dev_device_down(): el recuento de referencias de ax25_dev se establece en 1 en ax25_dev_device_up() y luego aumenta el recuento de referencias cuando se agrega ax25_dev a ax25_dev_list. Como resultado, el recuento de referencia de ax25_dev es 2. Pero cuando el dispositivo se est\u00e1 apagando. El ax25_dev_device_down() reduce el recuento de referencias una o dos veces dependiendo de si vamos a unlock_put o no, lo que provocar\u00e1 una p\u00e9rdida de memoria. En cuanto al problema de ax25_addr_ax25dev(), es imposible que un puntero est\u00e9 en una lista dos veces. Entonces agregue una interrupci\u00f3n en ax25_addr_ax25dev(). En cuanto al problema de ax25_dev_device_down(), aumente el recuento de referencias de ax25_dev una vez en ax25_dev_device_up() y disminuya el recuento de referencias de ax25_dev despu\u00e9s de que se elimine de ax25_dev_list." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "6.1.93", + "matchCriteriaId": "899D7A4F-A23D-4FA2-84B4-4BAA03F98BBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.33", + "matchCriteriaId": "FCE796DF-3B50-4DC6-BAE5-95271068FC9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.8.12", + "matchCriteriaId": "80550309-67AB-4FD1-AC07-3DED5C4F01B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.9.3", + "matchCriteriaId": "E07124C1-19E8-4D21-828D-9932A01D3011" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1ea02699c7557eeb35ccff2bd822de1b3e09d868", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/38eb01edfdaa1562fa00429be2e33f45383b1b3a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/81d8240b0a243b3ddd8fa8aa172f1acc2f7cc8f3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ae467750a3765dd1092eb29f58247950a2f9b60c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b505e0319852b08a3a716b64620168eab21f4ced", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-390xx/CVE-2024-39097.json b/CVE-2024/CVE-2024-390xx/CVE-2024-39097.json index 7441d74caa5..da75b89f8d7 100644 --- a/CVE-2024/CVE-2024-390xx/CVE-2024-39097.json +++ b/CVE-2024/CVE-2024-390xx/CVE-2024-39097.json @@ -2,16 +2,55 @@ "id": "CVE-2024-39097", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-26T15:15:08.333", - "lastModified": "2024-08-26T15:15:23.727", + "lastModified": "2024-08-27T16:35:13.930", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "There is an Open Redirect vulnerability in Gnuboard v6.0.4 and below via the `url` parameter in login path." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de Open Redirect en Gnuboard v6.0.4 y versiones anteriores a trav\u00e9s del par\u00e1metro `url` en la ruta de inicio de sesi\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/Letm3through/1c7a422aa93b587fe63254e06b7f2977", diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39427.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39427.json index 33bf3009680..f137db3f452 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39427.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39427.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39427", "sourceIdentifier": "security@unisoc.com", "published": "2024-07-01T09:15:06.493", - "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-27T17:33:15.990", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + }, { "source": "security@unisoc.com", "type": "Secondary", @@ -39,10 +59,378 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unisoc:sc7731e_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52A02668-6A09-4D48-B224-4700F3BC7538" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unisoc:sc9832e_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D10E2ED6-0B1A-41AF-BE6B-E32BF5DF529B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unisoc:sc9863a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6110F3F3-713E-4DC2-A70A-E13C5C315685" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unisoc:t310_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FB62FC4-66EB-4E4C-AD88-4E9205411D38" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unisoc:t606_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F005C8C-3515-48F6-AD73-8CD5DFC351FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unisoc:t612_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF7DAD66-AFC2-434E-B7E8-2C92E3F8564F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unisoc:t616_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1C094C1-8EEB-4777-95B8-2FB802A2D74E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unisoc:t610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387350DE-965C-4FA7-9DC5-ABEEE94C39A0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unisoc:t618_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F184416-73D8-4790-8D15-11C5D3D440DE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unisoc:t760_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "280225F7-554C-43BA-8D7F-9C250CEEAEBE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unisoc:t770_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8550BDEB-442B-4D22-8BCE-53CE81F85ABF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unisoc:t820_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "695395BB-E6BC-4B2D-9CE4-015CCF5E81CF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:unisoc:s8000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B28EDE1D-4737-4703-9896-1B6AC6D3BA2A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1807576926177525762", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39428.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39428.json index 89ab319cb90..a33a0db9e66 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39428.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39428.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39428", "sourceIdentifier": "security@unisoc.com", "published": "2024-07-01T09:15:06.720", - "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-27T17:39:29.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + }, { "source": "security@unisoc.com", "type": "Secondary", @@ -39,10 +59,124 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1807576926177525762", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39429.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39429.json index 1f5adcaa456..63191379370 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39429.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39429.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39429", "sourceIdentifier": "security@unisoc.com", "published": "2024-07-01T09:15:06.893", - "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-27T17:44:02.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + }, { "source": "security@unisoc.com", "type": "Secondary", @@ -39,10 +59,94 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1807576926177525762", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39430.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39430.json index 8c35e2f002d..e37dcba1053 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39430.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39430.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39430", "sourceIdentifier": "security@unisoc.com", "published": "2024-07-01T09:15:07.070", - "lastModified": "2024-07-01T12:37:24.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-27T17:44:25.593", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + }, { "source": "security@unisoc.com", "type": "Secondary", @@ -39,10 +59,94 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1807576926177525762", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39717.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39717.json index 71033951da8..8b7952fc959 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39717.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39717.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39717", "sourceIdentifier": "support@hackerone.com", "published": "2024-08-22T19:15:09.173", - "lastModified": "2024-08-26T17:21:38.443", - "vulnStatus": "Analyzed", + "lastModified": "2024-08-27T16:15:07.400", + "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2024-08-23", "cisaActionDue": "2024-09-13", @@ -12,7 +12,7 @@ "descriptions": [ { "lang": "en", - "value": "The Versa Director GUI provides an option to customize the look and feel of the user interface. This option is only available for a user logged with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin. (Tenant level users do not have this privilege). The \u201cChange Favicon\u201d (Favorite Icon) option can be mis-used to upload a malicious file ending with .png extension to masquerade as image file. This is possible only after a user with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin has successfully authenticated and logged in. \r\n\r\nSeverity: HIGH\r\n \r\nExploitation Status:\r\n\r\nVersa Networks is aware of one confirmed customer reported instance where this vulnerability was exploited because the Firewall guidelines which were published in 2015 & 2017 were not implemented by that customer. This non-implementation resulted in the bad actor being able to exploit this vulnerability without using the GUI. In our testing (not exhaustive, as not all numerical versions of major browsers were tested) the malicious file does not get executed on the client. There are reports of others based on backbone telemetry observations of a 3rd party provider, however these are unconfirmed to date." + "value": "The Versa Director GUI provides an option to customize the look and feel of the user interface. This option is only available for a user logged with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin. (Tenant level users do not have this privilege). The \u201cChange Favicon\u201d (Favorite Icon) option can be mis-used to upload a malicious file ending with .png extension to masquerade as image file. This is possible only after a user with Provider-Data-Center-Admin or Provider-Data-Center-System-Admin has successfully authenticated and logged in." }, { "lang": "es", @@ -126,32 +126,8 @@ ], "references": [ { - "url": "https://support.versa-networks.com/support/solutions/articles/23000024323-release-21-2-3", - "source": "support@hackerone.com", - "tags": [ - "Permissions Required" - ] - }, - { - "url": "https://support.versa-networks.com/support/solutions/articles/23000025680-release-22-1-2", - "source": "support@hackerone.com", - "tags": [ - "Permissions Required" - ] - }, - { - "url": "https://support.versa-networks.com/support/solutions/articles/23000026033-release-22-1-3", - "source": "support@hackerone.com", - "tags": [ - "Permissions Required" - ] - }, - { - "url": "https://support.versa-networks.com/support/solutions/articles/23000026724-versa-director-ha-port-exploit-discovery-remediation", - "source": "support@hackerone.com", - "tags": [ - "Permissions Required" - ] + "url": "https://versa-networks.com/blog/versa-security-bulletin-update-on-cve-2024-39717-versa-director-dangerous-file-type-upload-vulnerability/", + "source": "support@hackerone.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40395.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40395.json new file mode 100644 index 00000000000..f107b0ff157 --- /dev/null +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40395.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40395", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-27T16:15:07.583", + "lastModified": "2024-08-27T16:15:07.583", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Insecure Direct Object Reference (IDOR) in PTC ThingWorx v9.5.0 allows attackers to view sensitive information, including PII, regardless of access level." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://pastebin.com/9dc4LYGA", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-412xx/CVE-2024-41285.json b/CVE-2024/CVE-2024-412xx/CVE-2024-41285.json index c9b6e10752f..2582661a46d 100644 --- a/CVE-2024/CVE-2024-412xx/CVE-2024-41285.json +++ b/CVE-2024/CVE-2024-412xx/CVE-2024-41285.json @@ -2,17 +2,41 @@ "id": "CVE-2024-41285", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-26T16:15:08.990", - "lastModified": "2024-08-26T19:10:18.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-27T16:03:16.043", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack overflow in FAST FW300R v1.3.13 Build 141023 Rel.61347n allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via a crafted file path." + }, + { + "lang": "es", + "value": "Un desbordamiento de pila en FAST FW300R v1.3.13 Build 141023 Rel.61347n permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una ruta de archivo manipulada." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,18 +81,56 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fastcom:fw300r_firmware:1.3.13_build_141023_rel.61347n:*:*:*:*:*:*:*", + "matchCriteriaId": "9DC2BD23-1CF5-444B-9092-A4426A72313B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:fastcom:fw300r:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9C3F519-11ED-4EBF-9988-D4C411CE72BC" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Giles-one/834b2becd7abebc3cabea0484301d149", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/Giles-one/FW300RouterCrack/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://www.fastcom.com.cn/product-8.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41622.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41622.json new file mode 100644 index 00000000000..88a9bee892b --- /dev/null +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41622.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-41622", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-27T16:15:07.673", + "lastModified": "2024-08-27T16:15:07.673", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via the tomography_ping_address parameter in /HNAP1/ interface." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-846W", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/yali-1002/some-poc/blob/main/CVE-2024-41622", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43336.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43336.json index 069988bab49..b246307371b 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43336.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43336.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43336", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-26T21:15:28.340", - "lastModified": "2024-08-27T13:01:52.723", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T16:00:25.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpusermanager:wp_user_manager:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.9.10", + "matchCriteriaId": "5EDEB6C0-7AB5-4754-95D7-83A29855AA7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-user-manager/wordpress-wp-user-manager-user-profile-builder-membership-plugin-2-9-10-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43788.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43788.json new file mode 100644 index 00000000000..a0badeb9518 --- /dev/null +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43788.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-43788", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-08-27T17:15:07.967", + "lastModified": "2024-08-27T17:15:07.967", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Webpack is a module bundler. Its main purpose is to bundle JavaScript files for usage in a browser, yet it is also capable of transforming, bundling, or packaging just about any resource or asset. The webpack developers have discovered a DOM Clobbering vulnerability in Webpack\u2019s `AutoPublicPathRuntimeModule`. The DOM Clobbering gadget in the module can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an `img` tag with an unsanitized `name` attribute) are present. Real-world exploitation of this gadget has been observed in the Canvas LMS which allows a XSS attack to happen through a javascript code compiled by Webpack (the vulnerable part is from Webpack). DOM Clobbering is a type of code-reuse attack where the attacker first embeds a piece of non-script, seemingly benign HTML markups in the webpage (e.g. through a post or comment) and leverages the gadgets (pieces of js code) living in the existing javascript code to transform it into executable code. This vulnerability can lead to cross-site scripting (XSS) on websites that include Webpack-generated files and allow users to inject certain scriptless HTML tags with improperly sanitized name or id attributes. This issue has been addressed in release version 5.94.0. All users are advised to upgrade. There are no known workarounds for this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/webpack/webpack/commit/955e057abc6cc83cbc3fa1e1ef67a49758bf5a61", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/webpack/webpack/security/advisories/GHSA-4vvj-4cpr-p986", + "source": "security-advisories@github.com" + }, + { + "url": "https://research.securitum.com/xss-in-amp4email-dom-clobbering", + "source": "security-advisories@github.com" + }, + { + "url": "https://scnps.co/papers/sp23_domclob.pdf", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43911.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43911.json index cb83cf81c78..3a6479fde35 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43911.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43911.json @@ -2,24 +2,87 @@ "id": "CVE-2024-43911", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T11:15:05.227", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-27T16:08:52.493", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix NULL dereference at band check in starting tx ba session\n\nIn MLD connection, link_data/link_conf are dynamically allocated. They\ndon't point to vif->bss_conf. So, there will be no chanreq assigned to\nvif->bss_conf and then the chan will be NULL. Tweak the code to check\nht_supported/vht_supported/has_he/has_eht on sta deflink.\n\nCrash log (with rtw89 version under MLO development):\n[ 9890.526087] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[ 9890.526102] #PF: supervisor read access in kernel mode\n[ 9890.526105] #PF: error_code(0x0000) - not-present page\n[ 9890.526109] PGD 0 P4D 0\n[ 9890.526114] Oops: 0000 [#1] PREEMPT SMP PTI\n[ 9890.526119] CPU: 2 PID: 6367 Comm: kworker/u16:2 Kdump: loaded Tainted: G OE 6.9.0 #1\n[ 9890.526123] Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB3WW (2.73 ) 11/28/2018\n[ 9890.526126] Workqueue: phy2 rtw89_core_ba_work [rtw89_core]\n[ 9890.526203] RIP: 0010:ieee80211_start_tx_ba_session (net/mac80211/agg-tx.c:618 (discriminator 1)) mac80211\n[ 9890.526279] Code: f7 e8 d5 93 3e ea 48 83 c4 28 89 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc 49 8b 84 24 e0 f1 ff ff 48 8b 80 90 1b 00 00 <83> 38 03 0f 84 37 fe ff ff bb ea ff ff ff eb cc 49 8b 84 24 10 f3\nAll code\n========\n 0:\tf7 e8 \timul %eax\n 2:\td5 \t(bad)\n 3:\t93 \txchg %eax,%ebx\n 4:\t3e ea \tds (bad)\n 6:\t48 83 c4 28 \tadd $0x28,%rsp\n a:\t89 d8 \tmov %ebx,%eax\n c:\t5b \tpop %rbx\n d:\t41 5c \tpop %r12\n f:\t41 5d \tpop %r13\n 11:\t41 5e \tpop %r14\n 13:\t41 5f \tpop %r15\n 15:\t5d \tpop %rbp\n 16:\tc3 \tretq\n 17:\tcc \tint3\n 18:\tcc \tint3\n 19:\tcc \tint3\n 1a:\tcc \tint3\n 1b:\t49 8b 84 24 e0 f1 ff \tmov -0xe20(%r12),%rax\n 22:\tff\n 23:\t48 8b 80 90 1b 00 00 \tmov 0x1b90(%rax),%rax\n 2a:*\t83 38 03 \tcmpl $0x3,(%rax)\t\t<-- trapping instruction\n 2d:\t0f 84 37 fe ff ff \tje 0xfffffffffffffe6a\n 33:\tbb ea ff ff ff \tmov $0xffffffea,%ebx\n 38:\teb cc \tjmp 0x6\n 3a:\t49 \trex.WB\n 3b:\t8b \t.byte 0x8b\n 3c:\t84 24 10 \ttest %ah,(%rax,%rdx,1)\n 3f:\tf3 \trepz\n\nCode starting with the faulting instruction\n===========================================\n 0:\t83 38 03 \tcmpl $0x3,(%rax)\n 3:\t0f 84 37 fe ff ff \tje 0xfffffffffffffe40\n 9:\tbb ea ff ff ff \tmov $0xffffffea,%ebx\n e:\teb cc \tjmp 0xffffffffffffffdc\n 10:\t49 \trex.WB\n 11:\t8b \t.byte 0x8b\n 12:\t84 24 10 \ttest %ah,(%rax,%rdx,1)\n 15:\tf3 \trepz\n[ 9890.526285] RSP: 0018:ffffb8db09013d68 EFLAGS: 00010246\n[ 9890.526291] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffff9308e0d656c8\n[ 9890.526295] RDX: 0000000000000000 RSI: ffffffffab99460b RDI: ffffffffab9a7685\n[ 9890.526300] RBP: ffffb8db09013db8 R08: 0000000000000000 R09: 0000000000000873\n[ 9890.526304] R10: ffff9308e0d64800 R11: 0000000000000002 R12: ffff9308e5ff6e70\n[ 9890.526308] R13: ffff930952500e20 R14: ffff9309192a8c00 R15: 0000000000000000\n[ 9890.526313] FS: 0000000000000000(0000) GS:ffff930b4e700000(0000) knlGS:0000000000000000\n[ 9890.526316] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 9890.526318] CR2: 0000000000000000 CR3: 0000000391c58005 CR4: 00000000001706f0\n[ 9890.526321] Call Trace:\n[ 9890.526324] \n[ 9890.526327] ? show_regs (arch/x86/kernel/dumpstack.c:479)\n[ 9890.526335] ? __die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434)\n[ 9890.526340] ? page_fault_oops (arch/x86/mm/fault.c:713)\n[ 9890.526347] ? search_module_extables (kernel/module/main.c:3256 (discriminator\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mac80211: corrige la desreferencia NULL al comprobar la banda al iniciar la sesi\u00f3n tx ba En la conexi\u00f3n MLD, link_data/link_conf se asignan din\u00e1micamente. No apuntan a vif->bss_conf. Entonces, no habr\u00e1 ning\u00fan chanreq asignado a vif->bss_conf y luego el chan ser\u00e1 NULL. Modifique el c\u00f3digo para verificar ht_supported/vht_supported/has_he/has_eht en sta deflink. Registro de fallos (con la versi\u00f3n rtw89 bajo desarrollo MLO): [9890.526087] ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000000 [9890.526102] #PF: acceso de lectura del supervisor en modo kernel [9890.526105] #PF: error_code(0x0000) - no presente p\u00e1gina [ 9890.526109] PGD 0 P4D 0 [ 9890.526114] Ups: 0000 [#1] PREEMPT SMP PTI [ 9890.526119] CPU: 2 PID: 6367 Comm: kworker/u16:2 Kdump: cargado Contaminado: G OE 6.9.0 #1 [ 0010: ieee80211_start_tx_ba_session (net/mac80211/agg-tx.c:618 (discriminador 1)) mac80211 [ 9890.526279] C\u00f3digo: f7 e8 d5 93 3e ea 48 83 c4 28 89 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc 49 8b 84 24 e0 f1 ff ff 48 8b 80 90 1b 00 00 <83> 38 03 0f 84 37 fe ff ff bb ea ff ff ff eb cc 49 8b 84 24 10 f3 Todo el c\u00f3digo ======== 0: f7 e8 imul %eax 2: d5 (malo) 3: 93 xchg %eax,%ebx 4: 3e ea ds (malo) 6: 48 83 c4 28 add $0x28,%rsp a: 89 d8 mov %ebx,%eax c: 5b pop %rbx d: 41 5c pop %r12 f: 41 5d pop %r13 11: 41 5e pop %r14 13: 41 5f pop %r15 15: 5d pop %rbp 16: c3 retq 17: cc int3 18: cc int3 19: cc int3 1a: cc int3 1b : 49 8b 84 24 e0 f1 ff mov -0xe20(%r12),%rax 22: ff 23: 48 8b 80 90 1b 00 00 mov 0x1b90(%rax),%rax 2a:* 83 38 03 cmpl $0x3,( %rax) <-- instrucci\u00f3n de captura 2d: 0f 84 37 fe ff ff je 0xfffffffffffffe6a 33: bb ea ff ff ff mov $0xffffffea,%ebx 38: eb cc jmp 0x6 3a: 49 rex.WB 3b: 8b .byte 0x8b 3c : 84 24 10 test %ah,(%rax,%rdx,1) 3f: f3 repz C\u00f3digo que comienza con la instrucci\u00f3n err\u00f3nea ======================== ==================== 0: 83 38 03 cmpl $0x3,(%rax) 3: 0f 84 37 fe ff ff je 0xfffffffffffffe40 9: bb ea ff ff mov $0xffffffea,%ebx e: eb cc jmp 0xffffffffffffffdc 10: 49 rex.WB 11: 8b .byte 0x8b 12: 84 24 10 prueba %ah,(%rax,%rdx,1) 15: f3 repz [ 9890.526285] RSP : 0018:ffffb8db09013d68 EFLAGS: 00010246 [ 9890.526291] RAX: 0000000000000000 RBX: 00000000000000000 RCX: ffff9308e0d656c8 [ 9890.526295] X: 0000000000000000 RSI: ffffffffab99460b RDI: ffffffffab9a7685 [ 9890.526300] RBP: ffffb8db09013db8 R08: 00000000000000000 R09: 0000000000000873 [ 9 890.526304] R10: ffff9308e0d64800 R11 : 000000000000000002 R12: FFFF9308E5FF6E70 [9890.526308] R13: FFFF930952500E20 R14: FFFF9309192A8C00 R15: 000000000000000000 [9890.526313] 4E700000 (0000) KNLGS: 000000000000000000 [9890.526316] CS: 0010 DS: 0000 ES: 0000 CR0: 00000080050033 [ 9890.526318] CR2: 0000000000000000 CR3: 0000000391c58005 CR4: 00000000001706f0 [ 9890.526321] Seguimiento de llamadas: [ 9890.526324] [ 9890.526327] ? show_regs (arch/x86/kernel/dumpstack.c:479) [9890.526335]? __die (arch/x86/kernel/dumpstack.c:421 arch/x86/kernel/dumpstack.c:434) [ 9890.526340] ? page_fault_oops (arch/x86/mm/fault.c:713) [9890.526347]? search_module_extables (kernel/module/main.c:3256 (discriminador ---truncado---" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "E4CB0927-C720-465B-99F2-3E47215515F2" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/021d53a3d87eeb9dbba524ac515651242a2a7e3b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a5594c1e03b0df3908b1e1202a1ba34422eed0f6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44340.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44340.json new file mode 100644 index 00000000000..639a29a3f67 --- /dev/null +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44340.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-44340", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-27T16:15:07.760", + "lastModified": "2024-08-27T16:15:07.760", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via keys smartqos_express_devices and smartqos_normal_devices in SetSmartQoSSettings." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-846W", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/yali-1002/some-poc/blob/main/CVE-2024-44340", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44341.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44341.json new file mode 100644 index 00000000000..39ff3dc9599 --- /dev/null +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44341.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-44341", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-27T16:15:07.860", + "lastModified": "2024-08-27T16:15:07.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via the lan(0)_dhcps_staticlist parameter. This vulnerability is exploited via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-846W", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/yali-1002/some-poc/blob/main/CVE-2024-44341", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44342.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44342.json new file mode 100644 index 00000000000..3f29317b23d --- /dev/null +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44342.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-44342", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-27T16:15:07.993", + "lastModified": "2024-08-27T16:15:07.993", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "D-Link DIR-846W A1 FW100A43 was discovered to contain a remote command execution (RCE) vulnerability via the wl(0).(0)_ssid parameter. This vulnerability is exploited via a crafted POST request." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://www.dlink.com.cn/techsupport/ProductInfo.aspx?m=DIR-846W", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/yali-1002/some-poc/blob/main/CVE-2024-44342", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44932.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44932.json index 1752afd4a56..d221a17ae38 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44932.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44932.json @@ -2,24 +2,98 @@ "id": "CVE-2024-44932", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T11:15:05.500", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-27T16:08:45.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nidpf: fix UAFs when destroying the queues\n\nThe second tagged commit started sometimes (very rarely, but possible)\nthrowing WARNs from\nnet/core/page_pool.c:page_pool_disable_direct_recycling().\nTurned out idpf frees interrupt vectors with embedded NAPIs *before*\nfreeing the queues making page_pools' NAPI pointers lead to freed\nmemory before these pools are destroyed by libeth.\nIt's not clear whether there are other accesses to the freed vectors\nwhen destroying the queues, but anyway, we usually free queue/interrupt\nvectors only when the queues are destroyed and the NAPIs are guaranteed\nto not be referenced anywhere.\n\nInvert the allocation and freeing logic making queue/interrupt vectors\nbe allocated first and freed last. Vectors don't require queues to be\npresent, so this is safe. Additionally, this change allows to remove\nthat useless queue->q_vector pointer cleanup, as vectors are still\nvalid when freeing the queues (+ both are freed within one function,\nso it's not clear why nullify the pointers at all)." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: idpf: corrige UAF al destruir las colas. La segunda confirmaci\u00f3n etiquetada comenzaba a veces (muy raramente, pero posible) arrojando ADVERTENCIAS desde net/core/page_pool.c:page_pool_disable_direct_recycling(). Result\u00f3 que idpf libera los vectores de interrupci\u00f3n con NAPI incorporadas *antes* de liberar las colas, lo que hace que los punteros NAPI de page_pools conduzcan a la memoria liberada antes de que Libeth destruya estos grupos. No est\u00e1 claro si hay otros accesos a los vectores liberados al destruir las colas, pero de todos modos, generalmente liberamos vectores de cola/interrupci\u00f3n solo cuando las colas se destruyen y se garantiza que no se har\u00e1 referencia a las NAPI en ninguna parte. Invierta la l\u00f3gica de asignaci\u00f3n y liberaci\u00f3n haciendo que los vectores de cola/interrupci\u00f3n se asignen primero y se liberen al final. Los vectores no requieren la presencia de colas, por lo que esto es seguro. Adem\u00e1s, este cambio permite eliminar esa cola in\u00fatil->limpieza del puntero q_vector, ya que los vectores siguen siendo v\u00e1lidos al liberar las colas (+ ambos se liberan dentro de una funci\u00f3n, por lo que no est\u00e1 claro por qu\u00e9 anular los punteros)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "D074AE50-4A5E-499C-A2FD-75FD60DEA560" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/290f1c033281c1a502a3cd1c53c3a549259c491f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3cde714b0e77206ed1b5cf31f28c18ba9ae946fd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44933.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44933.json index 0af9d6e5f27..76fee40bfe1 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44933.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44933.json @@ -2,24 +2,91 @@ "id": "CVE-2024-44933", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T11:15:05.547", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-27T16:08:38.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nbnxt_en : Fix memory out-of-bounds in bnxt_fill_hw_rss_tbl()\n\nA recent commit has modified the code in __bnxt_reserve_rings() to\nset the default RSS indirection table to default only when the number\nof RX rings is changing. While this works for newer firmware that\nrequires RX ring reservations, it causes the regression on older\nfirmware not requiring RX ring resrvations (BNXT_NEW_RM() returns\nfalse).\n\nWith older firmware, RX ring reservations are not required and so\nhw_resc->resv_rx_rings is not always set to the proper value. The\ncomparison:\n\nif (old_rx_rings != bp->hw_resc.resv_rx_rings)\n\nin __bnxt_reserve_rings() may be false even when the RX rings are\nchanging. This will cause __bnxt_reserve_rings() to skip setting\nthe default RSS indirection table to default to match the current\nnumber of RX rings. This may later cause bnxt_fill_hw_rss_tbl() to\nuse an out-of-range index.\n\nWe already have bnxt_check_rss_tbl_no_rmgr() to handle exactly this\nscenario. We just need to move it up in bnxt_need_reserve_rings()\nto be called unconditionally when using older firmware. Without the\nfix, if the TX rings are changing, we'll skip the\nbnxt_check_rss_tbl_no_rmgr() call and __bnxt_reserve_rings() may also\nskip the bnxt_set_dflt_rss_indir_tbl() call for the reason explained\nin the last paragraph. Without setting the default RSS indirection\ntable to default, it causes the regression:\n\nBUG: KASAN: slab-out-of-bounds in __bnxt_hwrm_vnic_set_rss+0xb79/0xe40\nRead of size 2 at addr ffff8881c5809618 by task ethtool/31525\nCall Trace:\n__bnxt_hwrm_vnic_set_rss+0xb79/0xe40\n bnxt_hwrm_vnic_rss_cfg_p5+0xf7/0x460\n __bnxt_setup_vnic_p5+0x12e/0x270\n __bnxt_open_nic+0x2262/0x2f30\n bnxt_open_nic+0x5d/0xf0\n ethnl_set_channels+0x5d4/0xb30\n ethnl_default_set_doit+0x2f1/0x620" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bnxt_en: corrige la memoria fuera de los l\u00edmites en bnxt_fill_hw_rss_tbl() Una confirmaci\u00f3n reciente modific\u00f3 el c\u00f3digo en __bnxt_reserve_rings() para configurar la tabla de direccionamiento indirecto RSS predeterminada solo cuando el n\u00famero de Los anillos RX est\u00e1n cambiando. Si bien esto funciona para firmware m\u00e1s nuevo que requiere reservas de anillo RX, provoca la regresi\u00f3n en firmware m\u00e1s antiguo que no requiere reservas de anillo RX (BNXT_NEW_RM() devuelve falso). Con firmware anterior, no se requieren reservas de anillo RX y, por lo tanto, hw_resc->resv_rx_rings no siempre est\u00e1 configurado en el valor adecuado. La comparaci\u00f3n: if (old_rx_rings != bp->hw_resc.resv_rx_rings) en __bnxt_reserve_rings() puede ser falso incluso cuando los anillos RX est\u00e1n cambiando. Esto har\u00e1 que __bnxt_reserve_rings() omita la configuraci\u00f3n de la tabla de direccionamiento indirecto RSS predeterminada para que coincida con el n\u00famero actual de anillos RX. Posteriormente, esto puede provocar que bnxt_fill_hw_rss_tbl() utilice un \u00edndice fuera de rango. Ya tenemos bnxt_check_rss_tbl_no_rmgr() para manejar exactamente este escenario. Solo necesitamos moverlo hacia arriba en bnxt_need_reserve_rings() para que se llame incondicionalmente cuando usemos firmware anterior. Sin la soluci\u00f3n, si los anillos TX est\u00e1n cambiando, omitiremos la llamada a bnxt_check_rss_tbl_no_rmgr() y __bnxt_reserve_rings() tambi\u00e9n puede omitir la llamada a bnxt_set_dflt_rss_indir_tbl() por el motivo explicado en el \u00faltimo p\u00e1rrafo. Sin configurar la tabla de direccionamiento indirecto RSS predeterminada, se produce la regresi\u00f3n: ERROR: KASAN: slab-out-of-bounds in __bnxt_hwrm_vnic_set_rss+0xb79/0xe40 Lectura de tama\u00f1o 2 en la direcci\u00f3n ffff8881c5809618 mediante la tarea ethtool/31525 Call Trace: __bnxt_hwrm_vnic_set_rss+0 xb79 /0xe40 bnxt_hwrm_vnic_rss_cfg_p5+0xf7/0x460 __bnxt_setup_vnic_p5+0x12e/0x270 __bnxt_open_nic+0x2262/0x2f30 bnxt_open_nic+0x5d/0xf0 ethnl_set_channels+0x5d4/0 xb30 ethnl_default_set_doit+0x2f1/0x620" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10.4:*:*:*:*:*:*:*", + "matchCriteriaId": "00FEED69-9465-4F0C-870C-DE98C3FFFD94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/abd573e9ad2ba64eaa6418a5f4eec819de28f205", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/da03f5d1b2c319a2b74fe76edeadcd8fa5f44376", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44934.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44934.json index 3b9d6fac902..f11fac82435 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44934.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44934.json @@ -2,36 +2,140 @@ "id": "CVE-2024-44934", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T11:15:05.593", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-27T16:07:58.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: mcast: wait for previous gc cycles when removing port\n\nsyzbot hit a use-after-free[1] which is caused because the bridge doesn't\nmake sure that all previous garbage has been collected when removing a\nport. What happens is:\n CPU 1 CPU 2\n start gc cycle remove port\n acquire gc lock first\n wait for lock\n call br_multicasg_gc() directly\n acquire lock now but free port\n the port can be freed\n while grp timers still\n running\n\nMake sure all previous gc cycles have finished by using flush_work before\nfreeing the port.\n\n[1]\n BUG: KASAN: slab-use-after-free in br_multicast_port_group_expired+0x4c0/0x550 net/bridge/br_multicast.c:861\n Read of size 8 at addr ffff888071d6d000 by task syz.5.1232/9699\n\n CPU: 1 PID: 9699 Comm: syz.5.1232 Not tainted 6.10.0-rc5-syzkaller-00021-g24ca36a562d6 #0\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024\n Call Trace:\n \n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:114\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0xc3/0x620 mm/kasan/report.c:488\n kasan_report+0xd9/0x110 mm/kasan/report.c:601\n br_multicast_port_group_expired+0x4c0/0x550 net/bridge/br_multicast.c:861\n call_timer_fn+0x1a3/0x610 kernel/time/timer.c:1792\n expire_timers kernel/time/timer.c:1843 [inline]\n __run_timers+0x74b/0xaf0 kernel/time/timer.c:2417\n __run_timer_base kernel/time/timer.c:2428 [inline]\n __run_timer_base kernel/time/timer.c:2421 [inline]\n run_timer_base+0x111/0x190 kernel/time/timer.c:2437" + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net: bridge: mcast: espere los ciclos de gc anteriores al eliminar el puerto syzbot alcanz\u00f3 un use-after-free [1] que se debe a que el puente no se asegura de que todos Se ha recogido basura anterior al eliminar un puerto. Lo que sucede es: CPU 1 CPU 2 iniciar el ciclo de gc eliminar el puerto adquirir el bloqueo de gc primero esperar la llamada de bloqueo br_multicasg_gc() adquirir directamente el bloqueo ahora pero liberar el puerto el puerto se puede liberar mientras los temporizadores de grp a\u00fan se ejecutan Aseg\u00farese de que todos los ciclos de gc anteriores hayan finalizado usando flush_work antes de liberar el puerto. [1] ERROR: KASAN: slab-use-after-free en br_multicast_port_group_expired+0x4c0/0x550 net/bridge/br_multicast.c:861 Lectura de tama\u00f1o 8 en la direcci\u00f3n ffff888071d6d000 por tarea syz.5.1232/9699 CPU: 1 PID: 9699 Comm : syz.5.1232 No contaminado 6.10.0-rc5-syzkaller-00021-g24ca36a562d6 #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/06/2024 Seguimiento de llamadas: __dump_stack lib/dump_stack.c :88 [en l\u00ednea] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:114 print_address_description mm/kasan/report.c:377 [en l\u00ednea] print_report+0xc3/0x620 mm/kasan/report.c:488 kasan_report+0xd9/0x110 mm /kasan/report.c:601 br_multicast_port_group_expired+0x4c0/0x550 net/bridge/br_multicast.c:861 call_timer_fn+0x1a3/0x610 kernel/time/timer.c:1792 expire_timers kernel/time/timer.c:1843 [en l\u00ednea] __run_timers +0x74b/0xaf0 kernel/time/timer.c:2417 __run_timer_base kernel/time/timer.c:2428 [en l\u00ednea] __run_timer_base kernel/time/timer.c:2421 [en l\u00ednea] run_timer_base+0x111/0x190 kernel/time/timer. c:2437" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10", + "versionEndExcluding": "5.15.165", + "matchCriteriaId": "F3BF38C6-4F30-4588-B942-87545E62CA7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.105", + "matchCriteriaId": "89BEB24B-0F37-4C92-A397-564DA7CD8EE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.46", + "matchCriteriaId": "FA11941E-81FB-484C-B583-881EEB488340" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "D074AE50-4A5E-499C-A2FD-75FD60DEA560" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/0d8b26e10e680c01522d7cc14abe04c3265a928f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1e16828020c674b3be85f52685e8b80f9008f50f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/92c4ee25208d0f35dafc3213cdf355fbe449e078", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b2f794b168cf560682ff976b255aa6d29d14a658", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e3145ca904fa8dbfd1a5bf0187905bc117b0efce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44935.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44935.json index d73605394fd..94047fe8f51 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44935.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44935.json @@ -2,44 +2,168 @@ "id": "CVE-2024-44935", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T11:15:05.643", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-27T16:09:01.633", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsctp: Fix null-ptr-deref in reuseport_add_sock().\n\nsyzbot reported a null-ptr-deref while accessing sk2->sk_reuseport_cb in\nreuseport_add_sock(). [0]\n\nThe repro first creates a listener with SO_REUSEPORT. Then, it creates\nanother listener on the same port and concurrently closes the first\nlistener.\n\nThe second listen() calls reuseport_add_sock() with the first listener as\nsk2, where sk2->sk_reuseport_cb is not expected to be cleared concurrently,\nbut the close() does clear it by reuseport_detach_sock().\n\nThe problem is SCTP does not properly synchronise reuseport_alloc(),\nreuseport_add_sock(), and reuseport_detach_sock().\n\nThe caller of reuseport_alloc() and reuseport_{add,detach}_sock() must\nprovide synchronisation for sockets that are classified into the same\nreuseport group.\n\nOtherwise, such sockets form multiple identical reuseport groups, and\nall groups except one would be silently dead.\n\n 1. Two sockets call listen() concurrently\n 2. No socket in the same group found in sctp_ep_hashtable[]\n 3. Two sockets call reuseport_alloc() and form two reuseport groups\n 4. Only one group hit first in __sctp_rcv_lookup_endpoint() receives\n incoming packets\n\nAlso, the reported null-ptr-deref could occur.\n\nTCP/UDP guarantees that would not happen by holding the hash bucket lock.\n\nLet's apply the locking strategy to __sctp_hash_endpoint() and\n__sctp_unhash_endpoint().\n\n[0]:\nOops: general protection fault, probably for non-canonical address 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN PTI\nKASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]\nCPU: 1 UID: 0 PID: 10230 Comm: syz-executor119 Not tainted 6.10.0-syzkaller-12585-g301927d2d2eb #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024\nRIP: 0010:reuseport_add_sock+0x27e/0x5e0 net/core/sock_reuseport.c:350\nCode: 00 0f b7 5d 00 bf 01 00 00 00 89 de e8 1b a4 ff f7 83 fb 01 0f 85 a3 01 00 00 e8 6d a0 ff f7 49 8d 7e 12 48 89 f8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 0f 85 4b 02 00 00 41 0f b7 5e 12 49 8d 7e 14\nRSP: 0018:ffffc9000b947c98 EFLAGS: 00010202\nRAX: 0000000000000002 RBX: ffff8880252ddf98 RCX: ffff888079478000\nRDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000012\nRBP: 0000000000000001 R08: ffffffff8993e18d R09: 1ffffffff1fef385\nR10: dffffc0000000000 R11: fffffbfff1fef386 R12: ffff8880252ddac0\nR13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000\nFS: 00007f24e45b96c0(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffcced5f7b8 CR3: 00000000241be000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \n __sctp_hash_endpoint net/sctp/input.c:762 [inline]\n sctp_hash_endpoint+0x52a/0x600 net/sctp/input.c:790\n sctp_listen_start net/sctp/socket.c:8570 [inline]\n sctp_inet_listen+0x767/0xa20 net/sctp/socket.c:8625\n __sys_listen_socket net/socket.c:1883 [inline]\n __sys_listen+0x1b7/0x230 net/socket.c:1894\n __do_sys_listen net/socket.c:1902 [inline]\n __se_sys_listen net/socket.c:1900 [inline]\n __x64_sys_listen+0x5a/0x70 net/socket.c:1900\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7f24e46039b9\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f24e45b9228 EFLAGS: 00000246 ORIG_RAX: 0000000000000032\nRAX: ffffffffffffffda RBX: 00007f24e468e428 RCX: 00007f24e46039b9\nRDX: 00007f24e46039b9 RSI: 0000000000000003 RDI: 0000000000000004\nRBP: 00007f24e468e420 R08: 00007f24e45b96c0 R09: 00007f24e45b96c0\nR10: 00007f24e45b96c0 R11: 0000000000000246 R12: 00007f24e468e42c\nR13:\n---truncated---" + }, + { + "lang": "es", + "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: sctp: corrige null-ptr-deref en reuseport_add_sock(). syzbot inform\u00f3 un null-ptr-deref al acceder a sk2->sk_reuseport_cb en reuseport_add_sock(). [0] La reproducci\u00f3n primero crea un oyente con SO_REUSEPORT. Luego, crea otro oyente en el mismo puerto y al mismo tiempo cierra el primer oyente. El segundo listen() llama a reuseport_add_sock() con el primer oyente como sk2, donde no se espera que sk2->sk_reuseport_cb se borre al mismo tiempo, pero close() lo borra mediante reuseport_detach_sock(). El problema es que SCTP no sincroniza correctamente reuseport_alloc(), reuseport_add_sock() y reuseport_detach_sock(). La persona que llama a reuseport_alloc() y reuseport_{add,detach}_sock() debe proporcionar sincronizaci\u00f3n para los sockets que est\u00e1n clasificados en el mismo grupo de reuseport. De lo contrario, dichos sockets forman m\u00faltiples grupos de reutilizaci\u00f3n id\u00e9nticos y todos los grupos excepto uno quedar\u00edan silenciosamente muertos. 1. Dos sockets llaman a listening() simult\u00e1neamente 2. No se encuentra ning\u00fan socket en el mismo grupo en sctp_ep_hashtable[] 3. Dos sockets llaman a reuseport_alloc() y forman dos grupos de reuseport 4. Solo un grupo que llega primero en __sctp_rcv_lookup_endpoint() recibe paquetes entrantes tambi\u00e9n, podr\u00eda producirse el null-ptr-deref informado. TCP/UDP garantiza que eso no suceder\u00e1 si se mantiene el bloqueo del dep\u00f3sito hash. Apliquemos la estrategia de bloqueo a __sctp_hash_endpoint() y __sctp_unhash_endpoint(). [0]: Vaya: fallo de protecci\u00f3n general, probablemente para la direcci\u00f3n no can\u00f3nica 0xdffffc0000000002: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref en el rango [0x0000000000000010-0x0000000000000017] CPU: 1 UID: 0 PID: 230 Comm: syz-executor119 No contaminado 6.10.0-syzkaller-12585-g301927d2d2eb #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 27/06/2024 RIP: 0010:reuseport_add_sock+0x27e/0x5e0 net/core/ sock_reuseport.c:350 C\u00f3digo: 00 0f b7 5d 00 bf 01 00 00 00 89 de e8 1b a4 ff f7 83 fb 01 0f 85 a3 01 00 00 e8 6d a0 ff f7 49 8d 7e 12 48 89 f8 48 c1 e8 < 42> 0f b6 04 28 84 c0 0f 85 4b 02 00 00 41 0f b7 5e 12 49 8d 7e 14 RSP: 0018:ffffc9000b947c98 EFLAGS: 00010202 RAX: 0000000000000002 X: ffff8880252ddf98 RCX: ffff888079478000 RDX: 0000000000000000 RSI: 00000000000000001 RDI: 0000000000000012 RBP : 0000000000000001 R08: ffffffff8993e18d R09: 1ffffffff1fef385 R10: dffffc0000000000 R11: ffffbfff1fef386 R12: ffff8880252ddac0 R13: dffffc0000000000 : 0000000000000000 R15: 0000000000000000 FS: 00007f24e45b96c0(0000) GS:ffff8880b9300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007ffcced5f7b8 CR3: 00000000241be000 CR4: 00000000003506f0 DR0: 00000000000000000 DR1: 0000000000000000 DR2: 0000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Seguimiento de llamadas: __sctp_hash_endpoint net/sctp/input.c:762 [en l\u00ednea] sctp_hash_endpoint +0x52a/0x600 net/sctp/input.c:790 sctp_listen_start net/sctp/socket.c:8570 [en l\u00ednea] sctp_inet_listen+0x767/0xa20 net/sctp/socket.c:8625 __sys_listen_socket net/socket.c:1883 [en l\u00ednea ] __sys_listen+0x1b7/0x230 net/socket.c:1894 __do_sys_listen net/socket.c:1902 [en l\u00ednea] __se_sys_listen net/socket.c:1900 [en l\u00ednea] __x64_sys_listen+0x5a/0x70 net/socket.c:1900 arco x64/ x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 Entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f24e46039b9 C\u00f3digo: 28 00 00 00 75 05 8 83 c4 28 c3 e8 91 1a 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f24e45b9228 EFLAGS: 00000246 ORIG_RAX: 0000000000000032 RAX: ffffffffffffffda RBX: 00007f24e468e428 RCX: e46039b9 RDX: 00007f24e46039b9 RSI: 0000000000000003 RDI: 0000000000000004 ---truncado---" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0", + "versionEndExcluding": "5.4.282", + "matchCriteriaId": "8EE08822-1E23-4755-B06D-685DD829A450" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.224", + "matchCriteriaId": "5CCEDF13-293D-4E64-B501-4409D0365AFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.165", + "matchCriteriaId": "B4E2B568-3171-41DE-B519-F2B1A3600D94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.105", + "matchCriteriaId": "89BEB24B-0F37-4C92-A397-564DA7CD8EE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.46", + "matchCriteriaId": "FA11941E-81FB-484C-B583-881EEB488340" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "D074AE50-4A5E-499C-A2FD-75FD60DEA560" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/05e4a0fa248240efd99a539853e844f0f0a9e6a5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1407be30fc17eff918a98e0a990c0e988f11dc84", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/52319d9d2f522ed939af31af70f8c3a0f0f67e6c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/54b303d8f9702b8ab618c5032fae886b16356928", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9ab0faa7f9ffe31296dbb9bbe6f76c72c14eea18", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c9b3fc4f157867e858734e31022ebee8a24f0de7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e809a84c802377ef61525a298a1ec1728759b913", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44937.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44937.json index c2121a1b08a..08272014d9c 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44937.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44937.json @@ -2,24 +2,98 @@ "id": "CVE-2024-44937", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T11:15:05.753", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-27T16:10:11.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86: intel-vbtn: Protect ACPI notify handler against recursion\n\nSince commit e2ffcda16290 (\"ACPI: OSL: Allow Notify () handlers to run on\nall CPUs\") ACPI notify handlers like the intel-vbtn notify_handler() may\nrun on multiple CPU cores racing with themselves.\n\nThis race gets hit on Dell Venue 7140 tablets when undocking from\nthe keyboard, causing the handler to try and register priv->switches_dev\ntwice, as can be seen from the dev_info() message getting logged twice:\n\n[ 83.861800] intel-vbtn INT33D6:00: Registering Intel Virtual Switches input-dev after receiving a switch event\n[ 83.861858] input: Intel Virtual Switches as /devices/pci0000:00/0000:00:1f.0/PNP0C09:00/INT33D6:00/input/input17\n[ 83.861865] intel-vbtn INT33D6:00: Registering Intel Virtual Switches input-dev after receiving a switch event\n\nAfter which things go seriously wrong:\n[ 83.861872] sysfs: cannot create duplicate filename '/devices/pci0000:00/0000:00:1f.0/PNP0C09:00/INT33D6:00/input/input17'\n...\n[ 83.861967] kobject: kobject_add_internal failed for input17 with -EEXIST, don't try to register things with the same name in the same directory.\n[ 83.877338] BUG: kernel NULL pointer dereference, address: 0000000000000018\n...\n\nProtect intel-vbtn notify_handler() from racing with itself with a mutex\nto fix this." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: plataforma/x86: intel-vbtn: protege el controlador de notificaci\u00f3n ACPI contra la recursividad desde el commit e2ffcda16290 (\"ACPI: OSL: permitir que los controladores Notify () se ejecuten en todas las CPU\") Controladores de notificaci\u00f3n ACPI como intel-vbtn notify_handler() puede ejecutarse en m\u00faltiples n\u00facleos de CPU que compiten entre s\u00ed. Esta ejecuci\u00f3n se ve afectada en las tabletas Dell Venue 7140 al desacoplarlas del teclado, lo que hace que el controlador intente registrar priv->switches_dev dos veces, como se puede ver en el mensaje dev_info() que se registra dos veces: [83.861800] intel-vbtn INT33D6: 00: Registro de conmutadores virtuales Intel input-dev despu\u00e9s de recibir un evento de conmutador [ 83.861858] entrada: Conmutadores virtuales Intel como /devices/pci0000:00/0000:00:1f.0/PNP0C09:00/INT33D6:00/input/input17 [ 83.861865] intel-vbtn INT33D6:00: Registro de conmutadores virtuales Intel input-dev despu\u00e9s de recibir un evento de cambio Despu\u00e9s del cual las cosas van muy mal: [83.861872] sysfs: no se puede crear un nombre de archivo duplicado '/devices/pci0000:00/0000:00:1f .0/PNP0C09:00/INT33D6:00/input/input17' ... [83.861967] kobject: kobject_add_internal fall\u00f3 para input17 con -EEXIST, no intente registrar cosas con el mismo nombre en el mismo directorio. [83.877338] ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 00000000000000018... Proteja intel-vbtn notify_handler() para que no corra consigo mismo con un mutex para solucionar este problema." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "48E239A0-A959-4FAB-8475-D045FED3DDA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*", + "matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/5c9618a3b6ea94cf7bdff7702aca8bf2d777d97b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e075c3b13a0a142dcd3151b25d29a24f31b7b640", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44942.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44942.json index 3d2f1a5568a..f17357ff51d 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44942.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44942.json @@ -2,28 +2,101 @@ "id": "CVE-2024-44942", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T12:15:06.157", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-27T16:09:10.010", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to do sanity check on F2FS_INLINE_DATA flag in inode during GC\n\nsyzbot reports a f2fs bug as below:\n\n------------[ cut here ]------------\nkernel BUG at fs/f2fs/inline.c:258!\nCPU: 1 PID: 34 Comm: kworker/u8:2 Not tainted 6.9.0-rc6-syzkaller-00012-g9e4bc4bcae01 #0\nRIP: 0010:f2fs_write_inline_data+0x781/0x790 fs/f2fs/inline.c:258\nCall Trace:\n f2fs_write_single_data_page+0xb65/0x1d60 fs/f2fs/data.c:2834\n f2fs_write_cache_pages fs/f2fs/data.c:3133 [inline]\n __f2fs_write_data_pages fs/f2fs/data.c:3288 [inline]\n f2fs_write_data_pages+0x1efe/0x3a90 fs/f2fs/data.c:3315\n do_writepages+0x35b/0x870 mm/page-writeback.c:2612\n __writeback_single_inode+0x165/0x10b0 fs/fs-writeback.c:1650\n writeback_sb_inodes+0x905/0x1260 fs/fs-writeback.c:1941\n wb_writeback+0x457/0xce0 fs/fs-writeback.c:2117\n wb_do_writeback fs/fs-writeback.c:2264 [inline]\n wb_workfn+0x410/0x1090 fs/fs-writeback.c:2304\n process_one_work kernel/workqueue.c:3254 [inline]\n process_scheduled_works+0xa12/0x17c0 kernel/workqueue.c:3335\n worker_thread+0x86d/0xd70 kernel/workqueue.c:3416\n kthread+0x2f2/0x390 kernel/kthread.c:388\n ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n\nThe root cause is: inline_data inode can be fuzzed, so that there may\nbe valid blkaddr in its direct node, once f2fs triggers background GC\nto migrate the block, it will hit f2fs_bug_on() during dirty page\nwriteback.\n\nLet's add sanity check on F2FS_INLINE_DATA flag in inode during GC,\nso that, it can forbid migrating inline_data inode's data block for\nfixing." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: f2fs: correcci\u00f3n para realizar una verificaci\u00f3n de integridad en el indicador F2FS_INLINE_DATA en el inodo durante GC syzbot informa un error de f2fs como se muestra a continuaci\u00f3n: ------------[ cortar aqu\u00ed ] ------------ \u00a1ERROR del kernel en fs/f2fs/inline.c:258! CPU: 1 PID: 34 Comm: kworker/u8:2 No contaminado 6.9.0-rc6-syzkaller-00012-g9e4bc4bcae01 #0 RIP: 0010:f2fs_write_inline_data+0x781/0x790 fs/f2fs/inline.c:258 Seguimiento de llamadas: f2fs_write_single_data _p\u00e1gina +0xb65/0x1d60 fs/f2fs/data.c:2834 f2fs_write_cache_pages fs/f2fs/data.c:3133 [en l\u00ednea] __f2fs_write_data_pages fs/f2fs/data.c:3288 [en l\u00ednea] f2fs_write_data_pages+0x1efe/0x3a90 fs/f2 fs/datos. c:3315 do_writepages+0x35b/0x870 mm/page-writeback.c:2612 __writeback_single_inode+0x165/0x10b0 fs/fs-writeback.c:1650 writeback_sb_inodes+0x905/0x1260 fs/fs-writeback.c:1941 wb_writeback+0x457/ 0xce0 fs/fs-writeback.c:2117 wb_do_writeback fs/fs-writeback.c:2264 [en l\u00ednea] wb_workfn+0x410/0x1090 fs/fs-writeback.c:2304 Process_one_work kernel/workqueue.c:3254 [en l\u00ednea] Process_scheduled_works+0xa12 /0x17c0 kernel/workqueue.c:3335 trabajador_thread+0x86d/0xd70 kernel/workqueue.c:3416 kthread+0x2f2/0x390 kernel/kthread.c:388 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm +0x1a/0x30 arch/x86/entry/entry_64.S:244 La causa principal es: el inodo inline_data puede ser difuso, de modo que pueda haber un blkaddr v\u00e1lido en su nodo directo, una vez que f2fs activa el GC en segundo plano para migrar el bloque, lo har\u00e1 presione f2fs_bug_on() durante la reescritura de la p\u00e1gina sucia. Agreguemos una verificaci\u00f3n de cordura en el indicador F2FS_INLINE_DATA en el inodo durante la GC, de modo que pueda prohibir la migraci\u00f3n del bloque de datos del inodo inline_data para su reparaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.47", + "matchCriteriaId": "CF4F8EA7-C643-4B9C-8E32-BD81930A5E8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.6", + "matchCriteriaId": "C1CDF130-CCA6-47F6-9718-8949BF4E05CC" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/26c07775fb5dc74351d1c3a2bc3cdf609b03e49f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ae00e6536a2dd54b64b39e9a39548870cf835745", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fc01008c92f40015aeeced94750855a7111b6929", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45264.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45264.json new file mode 100644 index 00000000000..366adc2a35f --- /dev/null +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45264.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-45264", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-08-27T16:15:08.070", + "lastModified": "2024-08-27T17:35:08.307", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site request forgery (CSRF) vulnerability in the admin panel in SkySystem Arfa-CMS before 5.1.3124 allows remote attackers to add a new administrator, leading to escalation of privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/TheHermione/CVE-2024-45264", + "source": "cve@mitre.org" + }, + { + "url": "https://skyss.ru", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5182.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5182.json index 465c4341f4a..e3809c34af6 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5182.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5182.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5182", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-20T00:15:09.487", - "lastModified": "2024-06-20T12:43:25.663", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T17:30:21.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,14 +73,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mudler:localai:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.16.0", + "matchCriteriaId": "82A38415-0349-46CD-850C-677CDDDC7DAD" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mudler/localai/commit/1a3dedece06cab1acc3332055d285ac540a47f0e", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/f7a87f29-c22a-48e8-9fce-b6d5a273e545", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6052.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6052.json index 64143df704d..92a5fe0d8d9 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6052.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6052.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6052", "sourceIdentifier": "security@checkmk.com", "published": "2024-07-03T15:15:06.223", - "lastModified": "2024-07-12T13:15:21.680", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T17:56:02.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "security@checkmk.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security@checkmk.com", "type": "Secondary", @@ -51,10 +81,541 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.0.0", + "matchCriteriaId": "C59985CE-68DF-433D-87BD-97EDCA81E039" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*", + "matchCriteriaId": "1AE224D8-742B-4D1F-ABBE-3DDA3EA5C5AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*", + "matchCriteriaId": "1E6FCE7B-7ECE-42A4-82C5-12A647B0CCC8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*", + "matchCriteriaId": "923AA113-D5E7-4F78-88BA-B72EF250F3EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*", + "matchCriteriaId": "B1984F57-A313-48AC-B8F9-F352D82824D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*", + "matchCriteriaId": "A38DB527-72A6-40B8-B46F-B8E78BFFDB1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*", + "matchCriteriaId": "67643E11-91A1-4580-BC4C-574074C862CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*", + "matchCriteriaId": "350B7E0F-D234-4D7C-91E4-F35E73579A24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*", + "matchCriteriaId": "DE58ACA9-8078-46A7-8487-C06E4E38F372" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*", + "matchCriteriaId": "B3D8CF4D-E1F8-4D8D-A8A9-1783CAC869E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*", + "matchCriteriaId": "58B0B051-7D3C-4EC7-96B0-38A1CC108D61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "B783A741-AAF2-43EE-8272-9239133A01E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*", + "matchCriteriaId": "A5F275A3-A99E-40E1-BD77-694FA568541F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*", + "matchCriteriaId": "3A44BF1A-5BE0-4412-B51D-055445758B61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*", + "matchCriteriaId": "A31BAE94-9096-4320-AC19-AA204E8EC08D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*", + "matchCriteriaId": "1B0784EA-98E8-4490-B97B-894F188A223D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*", + "matchCriteriaId": "A56A901F-1040-4DB9-9BE3-FE1999C514CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*", + "matchCriteriaId": "58A904FC-C015-469D-8502-E678D5FDBD06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*", + "matchCriteriaId": "1B5D109C-60AA-4FA4-9B10-2191AAF109F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*", + "matchCriteriaId": "37297866-24BB-4044-8744-EC0A8C29F152" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*", + "matchCriteriaId": "F9D4A171-CCB3-43B8-8B70-78610423E7C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*", + "matchCriteriaId": "5E1145FF-426D-407C-9F4B-EF773BD191EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "4DA8F776-A724-48FC-B7EF-13788BC69753" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*", + "matchCriteriaId": "46F42A22-99F2-4DF5-9B00-3123396F87AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*", + "matchCriteriaId": "1C59D4D3-D526-4E6B-B3AA-FE485D030190" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*", + "matchCriteriaId": "65E5CAE6-DC8B-47B3-84A0-D79B0C33EB45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*", + "matchCriteriaId": "8B9E0D89-79E2-476A-8A3E-8443316BC310" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*", + "matchCriteriaId": "38EA0591-C30B-4102-8A06-1B922FD3A0C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*", + "matchCriteriaId": "5E9AF0D3-8DD6-4EC7-BB33-54401D4025FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*", + "matchCriteriaId": "983604CC-DD2C-42A9-8B9D-A9A261CE8BA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*", + "matchCriteriaId": "224960F7-695C-415B-B991-E8C01859AA80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:*", + "matchCriteriaId": "1F6D86E4-738B-4ADA-858E-C12CCED9FAAA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:*", + "matchCriteriaId": "BD8EBF09-9B70-4972-85B1-82F41488BE3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "076463AA-195F-4CD6-861B-72FE1C8A407F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:*", + "matchCriteriaId": "009D2C7B-39B8-400F-80A5-06D56319232C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:*", + "matchCriteriaId": "3D5AEB8D-772E-401F-975C-61BDD30B481E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p32:*:*:*:*:*:*", + "matchCriteriaId": "2ECAB6C5-518C-4CA4-8B2B-D51115612A8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p33:*:*:*:*:*:*", + "matchCriteriaId": "FECC252C-02AA-41EC-BB84-5C1A6BC0FB8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p34:*:*:*:*:*:*", + "matchCriteriaId": "238324F5-7225-40DD-82E8-52F30F0D3776" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p35:*:*:*:*:*:*", + "matchCriteriaId": "4F3C9510-BD43-4F67-9C30-4F82B5D230E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p36:*:*:*:*:*:*", + "matchCriteriaId": "51941654-F6FF-4323-AECA-5D1D84308CD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p37:*:*:*:*:*:*", + "matchCriteriaId": "6E800133-1D28-41D1-8D73-9437D741F83B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p38:*:*:*:*:*:*", + "matchCriteriaId": "8A34B28B-2BD9-4F28-9428-8CF7FCEAD7C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p39:*:*:*:*:*:*", + "matchCriteriaId": "D3FC491E-DE27-4C8F-B699-DB5260935D51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "63043834-98E5-47C2-91F1-41B98270ABCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p40:*:*:*:*:*:*", + "matchCriteriaId": "0BE2C8FE-20CC-4B7E-B27B-54C873DC7530" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p41:*:*:*:*:*:*", + "matchCriteriaId": "5C3C3714-C696-4456-88AA-B6E4EFC73C92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p42:*:*:*:*:*:*", + "matchCriteriaId": "BFF9D1C9-C340-4C31-A3EA-74EF85C6F34D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p43:*:*:*:*:*:*", + "matchCriteriaId": "A70FBA9D-F7DF-4961-9518-F7AE14FE174D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p44:*:*:*:*:*:*", + "matchCriteriaId": "FB38424F-0955-4FE3-9C1D-69D21A08AA8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "FCF745D0-2EA6-4414-90BC-99D3ED08BB01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*", + "matchCriteriaId": "4823087F-D7FA-4594-8FD3-412DE5EA1F02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*", + "matchCriteriaId": "6429F9CE-D477-4CFF-B6E0-4BF11B61ED0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*", + "matchCriteriaId": "A50C58F9-94ED-4D85-8331-2D81F8E0760A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*", + "matchCriteriaId": "9A6AC0BD-FB65-4FAA-B344-66F87F16F8B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*", + "matchCriteriaId": "C66704F1-0B5E-4B43-8748-987022F378F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*", + "matchCriteriaId": "B068974F-6F67-4CBB-B567-FCED86E28F22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*", + "matchCriteriaId": "EA70F36A-EEF6-48DC-B15E-055D0DE8A052" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*", + "matchCriteriaId": "B2017F38-38DB-4E96-B34F-160BC731CBBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*", + "matchCriteriaId": "0949F399-371B-409C-AF9F-32690D881440" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*", + "matchCriteriaId": "42E1E31A-B5CC-45F2-A2E5-3EEF735499BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*", + "matchCriteriaId": "4B364FCA-500C-458E-B997-82CD0B1D24F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*", + "matchCriteriaId": "0B32E657-917B-482B-B6A4-3D3746992A4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*", + "matchCriteriaId": "2119C732-E024-4DA6-8E47-9E08E5E12602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*", + "matchCriteriaId": "4F0B99A8-A124-43BD-B8AA-EECC9112346F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "3FB7221E-BE9F-4529-8E07-8AD547FA3208" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*", + "matchCriteriaId": "30A074AD-9499-46E3-AB67-D6CEE3AA01C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*", + "matchCriteriaId": "A8BD0240-A22B-4273-BD47-C35A8C12E127" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*", + "matchCriteriaId": "DAA5680F-1DD0-48AA-BB7F-15B27365F0FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*", + "matchCriteriaId": "BC2F31CA-D4EB-44E6-9A09-5255D33F4A88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*", + "matchCriteriaId": "CD80BD69-20C6-4E17-B165-98689179A5A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*", + "matchCriteriaId": "B044D43B-0233-4A0D-A356-B9F9324E2777" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*", + "matchCriteriaId": "7DE79896-EBE5-42F2-A126-2A871BBA1071" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*", + "matchCriteriaId": "51A44E69-EEA1-4B01-B7B3-5BF7B39819E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*", + "matchCriteriaId": "BCB65AEB-CF52-410B-92B1-2DCFB914FFA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*", + "matchCriteriaId": "B7E17FA6-9011-489C-9FA9-368CA2D86FAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "7BCEB6FF-668F-4313-9264-0BF021AFC45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*", + "matchCriteriaId": "F8B27218-A4FF-47BE-B578-6DB704478921" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*", + "matchCriteriaId": "8735357F-16A7-4408-9DDD-1C6796BADBE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*", + "matchCriteriaId": "4505098C-0A2B-481E-A3DF-D6DF8EFA4DE7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*", + "matchCriteriaId": "C12AFCCF-014E-4EEB-8F04-F1ACE182BA98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*", + "matchCriteriaId": "66B85557-D5EC-4AF4-B97A-D2B80A58B3B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*", + "matchCriteriaId": "233ECD21-FA72-43AF-8E4C-DAC27CC18F3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*", + "matchCriteriaId": "8B4DB8EE-C10A-4097-8E66-2932BAEB732E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*", + "matchCriteriaId": "8653402A-C5AA-4CB1-8742-A12CCBE59373" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*", + "matchCriteriaId": "77047A82-E6D5-4E84-9BEC-ACD2FDA91FAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "E2342E2D-58B0-43E7-8C01-DF4678520F39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "1871B646-CA69-477F-B113-B901AC7B3934" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "EEC65A72-CAE1-4E28-83EF-7ECAFE921BB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*", + "matchCriteriaId": "D8FDECBC-8213-495F-A932-C4310F7C1F87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*", + "matchCriteriaId": "CB49BC95-6AA8-4F53-A3D6-E199BF756AAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*", + "matchCriteriaId": "050B6617-8FD4-47A6-BE4A-A52503A65812" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*", + "matchCriteriaId": "4CA0FEC5-7036-47AF-A341-873B6C324B58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*", + "matchCriteriaId": "83202950-840A-4CB7-AD96-CE62E84FABD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "310A2FA2-633A-48FB-A5C2-9A9A922E72E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "7D1993E3-C4F9-4D78-BD02-A0B22D93BF1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "B28A0C9D-072A-413C-8587-CD57CB918190" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "DF22D0A7-82B1-4598-B8C5-BDFE523D07F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "20035AFB-75B4-4164-9833-A2FCAE24B577" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*", + "matchCriteriaId": "8BCBACEB-7130-455D-B4BE-243053C116DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*", + "matchCriteriaId": "156384E2-E04B-4153-A91F-3F307C9FEAE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*", + "matchCriteriaId": "EEC0ED95-F43B-46D7-9AA0-A0FB1C32EF1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*", + "matchCriteriaId": "91C194C1-5292-4E2A-BB71-9C5CD3CE6194" + } + ] + } + ] + } + ], "references": [ { "url": "https://checkmk.com/werk/17010", - "source": "security@checkmk.com" + "source": "security@checkmk.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6978.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6978.json index b3906326e27..3fa4b59fa36 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6978.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6978.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6978", "sourceIdentifier": "2505284f-8ffb-486c-bf60-e19c1097a90b", "published": "2024-07-31T17:15:12.090", - "lastModified": "2024-08-01T12:42:36.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-08-27T16:17:54.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + }, { "source": "2505284f-8ffb-486c-bf60-e19c1097a90b", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "2505284f-8ffb-486c-bf60-e19c1097a90b", "type": "Secondary", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:catonetworks:cato_client:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "5.10.34", + "matchCriteriaId": "ADCE09F5-AC75-454D-847F-23A6E11C145D" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.catonetworks.com/hc/en-us/articles/19767051500957-CVE-2024-6978-Windows-SDP-Client-Local-root-certificates-can-be-installed-with-low-privileged-users", - "source": "2505284f-8ffb-486c-bf60-e19c1097a90b" + "source": "2505284f-8ffb-486c-bf60-e19c1097a90b", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8081.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8081.json index 4f8ed63aa28..736dd13b9af 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8081.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8081.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8081", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-22T22:15:05.510", - "lastModified": "2024-08-23T16:18:28.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-27T16:12:33.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kevinwong:payroll_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "493685F6-0114-46FA-A25F-7B05A7D5ACDB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ppp-src/ha/issues/6", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://itsourcecode.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.275563", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.275563", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.396110", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8083.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8083.json index 4da2e1190f7..22baa51629f 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8083.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8083.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8083", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-22T22:15:05.760", - "lastModified": "2024-08-23T16:18:28.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-27T16:11:35.730", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_computer_and_laptop_store:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "284E8925-2C48-4D47-9A9E-67D70F61CB61" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/0xffaaa/cve/blob/main/php-ocls-Arbitrary%20Sqli.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.275564", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.275564", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.396315", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8084.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8084.json index a2fd15664c9..d2617f26b40 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8084.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8084.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8084", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-22T22:15:06.010", - "lastModified": "2024-08-23T16:18:28.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-27T16:11:11.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_computer_and_laptop_store:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "284E8925-2C48-4D47-9A9E-67D70F61CB61" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/0xffaaa/cve/blob/main/php-ocls-Arbitrary%20Stored%20Cross-Site%20Scripting(XSS).md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.275565", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.275565", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.396318", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8170.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8170.json index b3a563b2123..5066d0eb6f8 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8170.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8170.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8170", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-26T16:15:11.007", - "lastModified": "2024-08-26T19:10:09.607", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-27T16:02:50.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in SourceCodester Zipped Folder Manager App 1.0. This affects an unknown part of the file /endpoint/add-folder.php. The manipulation of the argument folder leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en SourceCodester Zipped Folder Manager App 1.0 y clasificada como problem\u00e1tica. Esto afecta a una parte desconocida del archivo /endpoint/add-folder.php. La manipulaci\u00f3n de la carpeta de argumentos conduce a una carga sin restricciones. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,26 +140,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rems:zipped_folder_manager_app:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "11CAA396-44A5-4777-94DD-AAC0ACD8668F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jadu101/CVE/blob/main/SourceCodester_Zipped_Folder_Manager_App_File_Upload.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.275769", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.275769", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.397719", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8171.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8171.json index 9b6bad7196a..257891df33d 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8171.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8171.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8171", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-26T16:15:11.273", - "lastModified": "2024-08-26T19:10:09.607", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-27T16:02:19.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. This vulnerability affects unknown code of the file staffcatedit.php. The manipulation of the argument title leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en el c\u00f3digo fuente Tailoring Management System 1.0 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo staffcatedit.php. La manipulaci\u00f3n del t\u00edtulo del argumento conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,26 +140,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D6D27827-5554-4FAB-8460-52599930F4FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/t4rrega/cve/issues/6", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://itsourcecode.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.275770", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.275770", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.397720", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8172.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8172.json index ce771ed6126..ffb4a5df5e7 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8172.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8172.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8172", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-26T16:15:11.543", - "lastModified": "2024-08-26T19:10:09.607", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-08-27T16:01:35.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in SourceCodester QR Code Attendance System 1.0. This issue affects some unknown processing of the file /endpoint/delete-student.php. The manipulation of the argument student/attendance leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en SourceCodester QR Code Attendance System 1.0 y clasificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo /endpoint/delete-student.php. La manipulaci\u00f3n del argumento estudiante/asistencia conduce a cross-site scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,30 +140,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rems:qr_code_attendance_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E7D40A47-27B6-4C27-8D2A-9ECA90C9245F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jadu101/CVE/blob/main/SourceCodester_QR_Code_Attendance_System_delete_attendance_XSS.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/jadu101/CVE/blob/main/SourceCodester_QR_Code_Attendance_System_delete_student_XSS.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.275771", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.275771", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.397724", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8199.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8199.json new file mode 100644 index 00000000000..edefe52ee54 --- /dev/null +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8199.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-8199", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-27T16:15:08.173", + "lastModified": "2024-08-27T16:15:08.173", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Reviews Feed \u2013 Add Testimonials and Customer Reviews From Google Reviews, Yelp, TripAdvisor, and More plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_api_key' function in all versions up to, and including, 1.1.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update API Key options." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/reviews-feed/tags/1.1.2/class/Common/Builder/SBR_Feed_Saver_Manager.php#L699", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3125315/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dc3e89e5-2e7e-497e-b340-b787ebdf3711?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8200.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8200.json new file mode 100644 index 00000000000..79b97b2426d --- /dev/null +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8200.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-8200", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-27T16:15:08.383", + "lastModified": "2024-08-27T16:15:08.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Reviews Feed \u2013 Add Testimonials and Customer Reviews From Google Reviews, Yelp, TripAdvisor, and More plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the 'update_api_key' function. This makes it possible for unauthenticated attackers to update an API key via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/reviews-feed/tags/1.1.2/class/Common/Builder/SBR_Feed_Saver_Manager.php#L699", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3125315/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5d9e20f7-813c-4691-bce4-d0ff4774ae48?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index ee104ee9d75..656ed6264b8 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-27T16:00:17.994817+00:00 +2024-08-27T18:00:17.823769+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-27T15:59:57.127000+00:00 +2024-08-27T17:56:02.507000+00:00 ``` ### Last Data Feed Release @@ -33,47 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -261294 +261303 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `9` -- [CVE-2024-6632](CVE-2024/CVE-2024-66xx/CVE-2024-6632.json) (`2024-08-27T15:15:17.300`) -- [CVE-2024-6633](CVE-2024/CVE-2024-66xx/CVE-2024-6633.json) (`2024-08-27T15:15:17.513`) -- [CVE-2024-7071](CVE-2024/CVE-2024-70xx/CVE-2024-7071.json) (`2024-08-27T14:15:20.193`) +- [CVE-2024-40395](CVE-2024/CVE-2024-403xx/CVE-2024-40395.json) (`2024-08-27T16:15:07.583`) +- [CVE-2024-41622](CVE-2024/CVE-2024-416xx/CVE-2024-41622.json) (`2024-08-27T16:15:07.673`) +- [CVE-2024-43788](CVE-2024/CVE-2024-437xx/CVE-2024-43788.json) (`2024-08-27T17:15:07.967`) +- [CVE-2024-44340](CVE-2024/CVE-2024-443xx/CVE-2024-44340.json) (`2024-08-27T16:15:07.760`) +- [CVE-2024-44341](CVE-2024/CVE-2024-443xx/CVE-2024-44341.json) (`2024-08-27T16:15:07.860`) +- [CVE-2024-44342](CVE-2024/CVE-2024-443xx/CVE-2024-44342.json) (`2024-08-27T16:15:07.993`) +- [CVE-2024-45264](CVE-2024/CVE-2024-452xx/CVE-2024-45264.json) (`2024-08-27T16:15:08.070`) +- [CVE-2024-8199](CVE-2024/CVE-2024-81xx/CVE-2024-8199.json) (`2024-08-27T16:15:08.173`) +- [CVE-2024-8200](CVE-2024/CVE-2024-82xx/CVE-2024-8200.json) (`2024-08-27T16:15:08.383`) ### CVEs modified in the last Commit -Recently modified CVEs: `115` +Recently modified CVEs: `81` -- [CVE-2024-6813](CVE-2024/CVE-2024-68xx/CVE-2024-6813.json) (`2024-08-27T15:01:38.630`) -- [CVE-2024-6814](CVE-2024/CVE-2024-68xx/CVE-2024-6814.json) (`2024-08-27T15:03:09.817`) -- [CVE-2024-6973](CVE-2024/CVE-2024-69xx/CVE-2024-6973.json) (`2024-08-27T15:34:18.620`) -- [CVE-2024-6974](CVE-2024/CVE-2024-69xx/CVE-2024-6974.json) (`2024-08-27T15:36:40.667`) -- [CVE-2024-6975](CVE-2024/CVE-2024-69xx/CVE-2024-6975.json) (`2024-08-27T15:40:05.223`) -- [CVE-2024-6977](CVE-2024/CVE-2024-69xx/CVE-2024-6977.json) (`2024-08-27T15:41:15.443`) -- [CVE-2024-7062](CVE-2024/CVE-2024-70xx/CVE-2024-7062.json) (`2024-08-27T14:00:21.543`) -- [CVE-2024-7940](CVE-2024/CVE-2024-79xx/CVE-2024-7940.json) (`2024-08-27T15:52:01.317`) -- [CVE-2024-7941](CVE-2024/CVE-2024-79xx/CVE-2024-7941.json) (`2024-08-27T15:52:01.317`) -- [CVE-2024-8127](CVE-2024/CVE-2024-81xx/CVE-2024-8127.json) (`2024-08-27T14:53:45.257`) -- [CVE-2024-8128](CVE-2024/CVE-2024-81xx/CVE-2024-8128.json) (`2024-08-27T15:32:47.997`) -- [CVE-2024-8129](CVE-2024/CVE-2024-81xx/CVE-2024-8129.json) (`2024-08-27T15:33:23.187`) -- [CVE-2024-8130](CVE-2024/CVE-2024-81xx/CVE-2024-8130.json) (`2024-08-27T15:34:08.287`) -- [CVE-2024-8131](CVE-2024/CVE-2024-81xx/CVE-2024-8131.json) (`2024-08-27T15:34:36.710`) -- [CVE-2024-8132](CVE-2024/CVE-2024-81xx/CVE-2024-8132.json) (`2024-08-27T15:35:01.557`) -- [CVE-2024-8133](CVE-2024/CVE-2024-81xx/CVE-2024-8133.json) (`2024-08-27T15:35:20.063`) -- [CVE-2024-8134](CVE-2024/CVE-2024-81xx/CVE-2024-8134.json) (`2024-08-27T15:39:53.537`) -- [CVE-2024-8135](CVE-2024/CVE-2024-81xx/CVE-2024-8135.json) (`2024-08-27T15:41:47.080`) -- [CVE-2024-8136](CVE-2024/CVE-2024-81xx/CVE-2024-8136.json) (`2024-08-27T15:43:27.937`) -- [CVE-2024-8137](CVE-2024/CVE-2024-81xx/CVE-2024-8137.json) (`2024-08-27T15:50:24.853`) -- [CVE-2024-8138](CVE-2024/CVE-2024-81xx/CVE-2024-8138.json) (`2024-08-27T15:51:40.590`) -- [CVE-2024-8162](CVE-2024/CVE-2024-81xx/CVE-2024-8162.json) (`2024-08-27T14:28:46.927`) -- [CVE-2024-8174](CVE-2024/CVE-2024-81xx/CVE-2024-8174.json) (`2024-08-27T14:32:08.607`) -- [CVE-2024-8181](CVE-2024/CVE-2024-81xx/CVE-2024-8181.json) (`2024-08-27T15:52:01.317`) -- [CVE-2024-8182](CVE-2024/CVE-2024-81xx/CVE-2024-8182.json) (`2024-08-27T15:52:01.317`) +- [CVE-2024-38602](CVE-2024/CVE-2024-386xx/CVE-2024-38602.json) (`2024-08-27T16:01:39.983`) +- [CVE-2024-39097](CVE-2024/CVE-2024-390xx/CVE-2024-39097.json) (`2024-08-27T16:35:13.930`) +- [CVE-2024-39427](CVE-2024/CVE-2024-394xx/CVE-2024-39427.json) (`2024-08-27T17:33:15.990`) +- [CVE-2024-39428](CVE-2024/CVE-2024-394xx/CVE-2024-39428.json) (`2024-08-27T17:39:29.090`) +- [CVE-2024-39429](CVE-2024/CVE-2024-394xx/CVE-2024-39429.json) (`2024-08-27T17:44:02.903`) +- [CVE-2024-39430](CVE-2024/CVE-2024-394xx/CVE-2024-39430.json) (`2024-08-27T17:44:25.593`) +- [CVE-2024-39717](CVE-2024/CVE-2024-397xx/CVE-2024-39717.json) (`2024-08-27T16:15:07.400`) +- [CVE-2024-41285](CVE-2024/CVE-2024-412xx/CVE-2024-41285.json) (`2024-08-27T16:03:16.043`) +- [CVE-2024-43336](CVE-2024/CVE-2024-433xx/CVE-2024-43336.json) (`2024-08-27T16:00:25.177`) +- [CVE-2024-43911](CVE-2024/CVE-2024-439xx/CVE-2024-43911.json) (`2024-08-27T16:08:52.493`) +- [CVE-2024-44932](CVE-2024/CVE-2024-449xx/CVE-2024-44932.json) (`2024-08-27T16:08:45.020`) +- [CVE-2024-44933](CVE-2024/CVE-2024-449xx/CVE-2024-44933.json) (`2024-08-27T16:08:38.973`) +- [CVE-2024-44934](CVE-2024/CVE-2024-449xx/CVE-2024-44934.json) (`2024-08-27T16:07:58.727`) +- [CVE-2024-44935](CVE-2024/CVE-2024-449xx/CVE-2024-44935.json) (`2024-08-27T16:09:01.633`) +- [CVE-2024-44937](CVE-2024/CVE-2024-449xx/CVE-2024-44937.json) (`2024-08-27T16:10:11.423`) +- [CVE-2024-44942](CVE-2024/CVE-2024-449xx/CVE-2024-44942.json) (`2024-08-27T16:09:10.010`) +- [CVE-2024-5182](CVE-2024/CVE-2024-51xx/CVE-2024-5182.json) (`2024-08-27T17:30:21.127`) +- [CVE-2024-6052](CVE-2024/CVE-2024-60xx/CVE-2024-6052.json) (`2024-08-27T17:56:02.507`) +- [CVE-2024-6978](CVE-2024/CVE-2024-69xx/CVE-2024-6978.json) (`2024-08-27T16:17:54.077`) +- [CVE-2024-8081](CVE-2024/CVE-2024-80xx/CVE-2024-8081.json) (`2024-08-27T16:12:33.580`) +- [CVE-2024-8083](CVE-2024/CVE-2024-80xx/CVE-2024-8083.json) (`2024-08-27T16:11:35.730`) +- [CVE-2024-8084](CVE-2024/CVE-2024-80xx/CVE-2024-8084.json) (`2024-08-27T16:11:11.460`) +- [CVE-2024-8170](CVE-2024/CVE-2024-81xx/CVE-2024-8170.json) (`2024-08-27T16:02:50.577`) +- [CVE-2024-8171](CVE-2024/CVE-2024-81xx/CVE-2024-8171.json) (`2024-08-27T16:02:19.150`) +- [CVE-2024-8172](CVE-2024/CVE-2024-81xx/CVE-2024-8172.json) (`2024-08-27T16:01:35.047`) ## Download and Usage diff --git a/_state.csv b/_state.csv index e3908550ec2..241923b6278 100644 --- a/_state.csv +++ b/_state.csv @@ -9079,8 +9079,8 @@ CVE-2004-0794,0,0,163c19d20b60e50663edd4dca4c8f1c9df85839e62a8f6956089e16b7dfcd6 CVE-2004-0795,0,0,cb5662012dd15d25f542a169f7d5d2428776c7736cb1456a4e8af553f0091610,2017-07-11T01:30:28.840000 CVE-2004-0796,0,0,9745aab5b7c15c50fdbb87e13d138d16defefb448b5088459387fd1115934bb5,2017-10-11T01:29:34.183000 CVE-2004-0797,0,0,bcd7f1392f534f288b5a2e0845691a53a790c5d440541f1ea15319d0cc30fa7a,2022-06-22T16:40:46.360000 -CVE-2004-0798,0,0,2523c0a7401f027499c6fb34aa918b0ab3bd0a1620956645e37b993ea420900c,2017-10-05T01:29:00.540000 -CVE-2004-0799,0,0,b25deefc8020f72a7e4695f5930cb90ce725a474d94a2f28c6aa2dab5d371260,2017-07-11T01:30:29.057000 +CVE-2004-0798,0,1,b90b949f3e9826944d679d0efdd79e0b6ac1f9a334518750cad16eff207e988c,2024-08-27T17:48:24.383000 +CVE-2004-0799,0,1,be73d577a3a7a24c6364c3f91e0c1b88942531e58e4cab61d076c24735e07f0f,2024-08-27T17:48:24.383000 CVE-2004-0800,0,0,9047c5996e65eb0dea79925035da28284a309dfbe01d3fb4221b168be8a16b57,2018-10-30T16:25:37.090000 CVE-2004-0801,0,0,204c36bf5851538e0d03bacf435c8fa31aa61b498f2e466a3d6b1e0ad518a124,2017-07-11T01:30:29.183000 CVE-2004-0802,0,0,cabea4e1cc5a6b2ec2b31323b794274f09c6ecb3d3e71c73a88b7fea286ff381,2017-07-11T01:30:29.277000 @@ -25498,7 +25498,7 @@ CVE-2007-2598,0,0,5c299455243ea4038ff6a8e1486acd7941a7e4cc3d1ffdf79883772c491dce CVE-2007-2599,0,0,618b3eb3ff2113fdca3ba4d282e35f296d21ea767295deb4333c1be44337d0a4,2017-10-11T01:32:17.940000 CVE-2007-2600,0,0,8d26681174f85fedfd1fc2896c99fa3c433e89057060ff763ac87a2e9b7867da,2017-10-11T01:32:17.987000 CVE-2007-2601,0,0,7ef34180b586721473b59a8eb609828aec655ede03f8a6c0c20a8ee88ad8229f,2017-10-11T01:32:18.050000 -CVE-2007-2602,0,0,df8c73f3195d5fae48f110411b36da0a26037f895a74b2c75e872b46ef0037dd,2018-10-16T16:44:42.447000 +CVE-2007-2602,0,1,73953573944a9da8fedceaf0e98e77841dfdab6cd1cef38efb3cc438cfcebabb,2024-08-27T17:48:24.383000 CVE-2007-2603,0,0,46a9dd23434bcace8ce55c225b0baef5af36e2c9f8bc1d16c82143c39b65d32d,2018-10-16T16:44:42.650000 CVE-2007-2604,0,0,d8dca3b7b83707fd9dff31519acf7c49d7a3e5be8d451855470c3a437f4c601c,2018-10-16T16:44:42.993000 CVE-2007-2605,0,0,fcbbb978caf598ee643b4494fc470bd5620cc71f17faba1620fc267526bdcad6,2018-10-16T16:44:43.323000 @@ -54165,7 +54165,7 @@ CVE-2012-2596,0,0,8b7a3e6c55b8e5cb39525be84c4f0b60187b69af69bfb8a1c11f78bdd705fd CVE-2012-2597,0,0,58a64df34f4ca9e37c4a061158b4e0b46b6964dd19823adc5f8f1e7897e7da05,2012-06-12T04:00:00 CVE-2012-2598,0,0,1957f6d0983b267e4882fbcd84cc1d4c2c7f163652fccd112407ce90a67d34e2,2012-06-12T04:00:00 CVE-2012-2599,0,0,7f0a81b6f02abf08b561dfb9b64d92fdb00de97e6fa039807538b8602d7dbe11,2023-11-07T02:10:38.473000 -CVE-2012-2601,0,0,d9f006f53c76599c9c1a6190607da116f7aebb791ea730b0404c6aaed869b5c4,2017-08-29T01:31:38.383000 +CVE-2012-2601,0,1,27b91d722f52fadaa313127a269d53e760c594616dd874afa64295e35862ee69,2024-08-27T17:48:24.383000 CVE-2012-2602,0,0,9f4a2a2d301084684f8fd7ed9fdd6f4428d44850435bd7c679a01ed02498b3a1,2012-08-13T04:00:00 CVE-2012-2603,0,0,3ba0a20622c897320d860960a863df1fe645b178f74fc78fbb6160c045fc7605,2012-06-28T04:00:00 CVE-2012-2604,0,0,dd42440cc37ed1bff58d600a2b407addd4a737c3614e18b70fb9b58fe0533932,2012-06-13T15:55:01.290000 @@ -55698,7 +55698,7 @@ CVE-2012-4340,0,0,77d28833cf96f92d96d41dc5db0926a75a492a47ae21d8226f3994fa315dbb CVE-2012-4341,0,0,404e67c3628b4d6ca272c64110a3ea484b37b6af795ce906a35c3efe847df98d,2023-11-07T02:11:50.587000 CVE-2012-4342,0,0,e86fd45827576c41f14174273ca8912e031852003eca3f83a0f57412dfed13e9,2012-10-09T04:00:00 CVE-2012-4343,0,0,8f2123066aee412fda9822d4f858250a3ff798eaf6c56ca312b8ddc19ca25c32,2012-08-16T04:00:00 -CVE-2012-4344,0,0,73c41e24ba2224b762f14cb24c3aff24643c45af2b05abd37f063406dc6be40f,2017-08-29T01:32:16.557000 +CVE-2012-4344,0,1,0585e30e348cd2b8bcd3d8b19495c930bcfaa3338ee16f63062d43aaced1273b,2024-08-27T17:48:24.383000 CVE-2012-4345,0,0,1c0e36f1fd436d4ac503b42031575dce078cd92b59451c94e5b9d0dd20983a98,2013-04-02T03:20:04.500000 CVE-2012-4347,0,0,8e6ebe91e2ed52ebaa78aea3f5547fbc1a3264419b797fd4bfe77714e73cc329,2013-10-11T13:18:21.300000 CVE-2012-4348,0,0,901dbe3227d936f6c9e770630716b59792dca4bd51056b7017fa5f0888a4f742,2013-03-14T03:10:09.620000 @@ -78931,8 +78931,8 @@ CVE-2015-5998,0,0,e2016e8115d1173b4867aee71dff44d48d9bf3bac7494347936af2226a36f6 CVE-2015-5999,0,0,992cd24b2070de0b6f73e99076ecb0a36ed3249a36839c688cdb6e8be8ce8f37,2023-04-26T19:27:52.350000 CVE-2015-6000,0,0,a490964f0ff17f30ae9266be53e484b1f14509b0ebc9b606a32e4baa4a69f381,2020-02-10T15:05:02.030000 CVE-2015-6003,0,0,b45fe7f1e9d2ceb4ed97ad8d468beed27631504227d40e9c2f09946338edadf9,2016-12-08T03:11:38.533000 -CVE-2015-6004,0,0,0b2afc0b249286407784c97279a6f6a4744906b5a52c353702b004919aa4dc4c,2016-12-06T03:03:05.087000 -CVE-2015-6005,0,0,89f11542901417198ab260c3a5a6f616839b5dc530a173ce8c2d32a61ae711ac,2016-12-06T03:03:06.243000 +CVE-2015-6004,0,1,d54f9f69f308cb8d84baf9819b4f09fde2207dddd1b550f27d590fdee810e453,2024-08-27T17:48:24.383000 +CVE-2015-6005,0,1,c7e326bc9c8ab1dff1aebb96a0d3b06804e18d77ca19936c1cb8a5540322574f,2024-08-27T17:48:24.383000 CVE-2015-6006,0,0,814d1190c4b7f215e95d54c6295419ad15d47409dc04af5131c9677ba4490dea,2015-10-30T19:56:44.867000 CVE-2015-6007,0,0,aea779329fb5bc86ae5be15d0539c979e13b5096744be7f23103f5846f52cf49,2015-09-29T00:48:40.560000 CVE-2015-6008,0,0,6f5b0ebd21630fc969d6866f082e4e2d8e04c378943a9700dbb3f33cb76cbea6,2017-09-16T01:29:02.607000 @@ -80988,7 +80988,7 @@ CVE-2015-8255,0,0,e5b81857fbd77415fdeb2da1705675d9f9ce3049f4801dac0c15cca4a75730 CVE-2015-8256,0,0,b7938990c4dae2759bbce8d37e729fe40a8d131bba0c1c6fe66e9db5afd103bc,2017-04-25T00:40:12.587000 CVE-2015-8257,0,0,b7f4328f8dd799a4b98c3061c1661ddf56aca0ee18380e51619cb5fd9d3df217,2017-05-16T15:27:35.623000 CVE-2015-8258,0,0,61012124b4bdcc5c1791d772f393cab7a88b2766d5bb91e57cd64ed3ad6abeed,2017-04-13T19:57:41.517000 -CVE-2015-8261,0,0,e95d1c7cd6e49568177ba1ad39c8580a8f0b32518f895ddb2dca400e3f63675d,2017-09-10T01:29:03.217000 +CVE-2015-8261,0,1,501f7e1c27c79b059b2bdcd9f7955ffcff2934c2c1ba48db574e1dd7e4f591f9,2024-08-27T17:48:24.383000 CVE-2015-8262,0,0,7867b4bb0d42fab5e9b78321ec16c126af191cd62c8eedb6de18f33f0ab76e94,2016-11-28T19:46:14.217000 CVE-2015-8263,0,0,28acb775af9bee71bab626432a3bc99898070e9e519cd26aba29402fb10097cd,2016-11-28T19:46:15.407000 CVE-2015-8264,0,0,3a5576017e6485cd468f43e7ab120b21ea87b18c3dbc10c6705c73302884f1a0,2018-10-09T19:58:23.877000 @@ -83187,7 +83187,7 @@ CVE-2016-0997,0,0,c9c540b7f4561f306ac8623f9c2f61a4a4bc5e344240e576147e9f99f4437c CVE-2016-0998,0,0,f0db90f7a852fc51d1a530bff8d27e19070f467f107b457720d9332b8d59a661,2022-12-14T19:49:49.317000 CVE-2016-0999,0,0,94ef9a6e303f0ba143826857a36e5150f9573c36c5073af9bf0ba26f747dfbb8,2023-04-26T18:38:13.597000 CVE-2016-1000,0,0,077e3986ecd0d72b483ca6529c71f2e78e8e5b76f25d6605f16995180ef41be5,2022-12-14T19:44:00.990000 -CVE-2016-1000000,0,0,6ba72798efe59c6210decca2e3ec60cdf26b21e8bbb53ecbed2e7470292ddf7e,2017-11-03T01:29:01.497000 +CVE-2016-1000000,0,1,58ff8711e2bdb0d3f3c714c5aba03477e2446b6ab3b88339356efa88941b9af8,2024-08-27T17:48:24.383000 CVE-2016-1000001,0,0,71ea9635b1dca1cddaebf2537cf611c0f10115db08be9f7d9e6ebfa5315185a0,2017-02-19T06:16:19.183000 CVE-2016-1000002,0,0,ec6d38e64248f6c9e5f75d24be69ef7c2c0e200b56f5c323b02c9d04fa426d41,2020-08-18T15:05:49.313000 CVE-2016-1000003,0,0,e323e8c5d9643e53478b9782f337c226b246045674be49edf120bbe397a74f0e,2016-12-22T14:40:13.323000 @@ -114313,7 +114313,7 @@ CVE-2018-13489,0,0,fd0c2f114bf33acac8eef5278981622b12c505e9f4cae5c63d8955c86a126 CVE-2018-1349,0,0,ab64815557a1dcc9a3281388d1e3e61413c861036489cfa3c28c7c0adc3ea490,2023-11-07T02:56:01.573000 CVE-2018-13490,0,0,14ed2e384023b3ee2a0986c0eea78b65cbc415da4ee693e1ef7cd91d158e3607,2018-08-28T17:22:55.727000 CVE-2018-13491,0,0,60a70ea59ff157d8997b1f558bffcfbba82885fb5e35ebeb2f0988c792d691f5,2018-08-28T15:27:37.523000 -CVE-2018-13492,0,1,329dd9327c01961991fc5ebd980b39cdf86263a26f92c5a8a014082140ce1889,2024-08-27T14:12:58.250000 +CVE-2018-13492,0,0,329dd9327c01961991fc5ebd980b39cdf86263a26f92c5a8a014082140ce1889,2024-08-27T14:12:58.250000 CVE-2018-13493,0,0,21d56c037349a3142d5507e3ff1af4bb0054bc2dcb596cc0dbfdc967bdacac7d,2018-08-28T15:21:48.997000 CVE-2018-13494,0,0,beaafe5665912b0390c8d6418372cd55d9ececb384612b1da6046e5f3f4cbcf5,2018-08-28T15:18:57.117000 CVE-2018-13495,0,0,99bf82e14b5895f834e8eee020a0d70a510e2d84f29dee94a99292587e72719d,2020-02-12T14:24:27.163000 @@ -124125,8 +124125,8 @@ CVE-2018-5770,0,0,58d430fee21f7439ac54bb211457c66f33e92e05ae78c59b4e105bed11d70c CVE-2018-5772,0,0,06a40f006931bbb740f8fdb56475cbfebc72104286d88541d14d47f8feefea52,2019-10-03T00:03:26.223000 CVE-2018-5773,0,0,af352159d17d25ce783286fd70f03358efaa67f2dd26b3ee935bc7eff090d82b,2018-02-06T13:39:20.187000 CVE-2018-5776,0,0,4bfe6e71b24b40e27a4ad4452b7cda4199ee569d9040b56ba9a648adb3e72c45,2018-02-01T15:06:19.830000 -CVE-2018-5777,0,0,05575ab6f2521a1fd1d33f4b585c620ab623b483255fe5e388c070c509f659e7,2019-10-03T00:03:26.223000 -CVE-2018-5778,0,0,c6439218fdf147f475276abf233ba7e7e9c55a3cab770ff14bdb91d044e4f2ef,2018-02-09T18:08:07.017000 +CVE-2018-5777,0,1,11166f64e3f04a98a2a325bd20cc7e5eadbf0226d659a055f3b34d4e14fa0906,2024-08-27T17:48:24.383000 +CVE-2018-5778,0,1,6e77dd790c0dd829904651c15f9fd3b892dd5ec3a7802e6df837ac9ef28a32d1,2024-08-27T17:48:24.383000 CVE-2018-5779,0,0,cfcc8188b2e31cd8338f0d7863692309c403849463fecce565ddc62ffbfb4c00,2018-09-07T18:29:00.700000 CVE-2018-5780,0,0,d94b420aba35e6599a6579918c56642f16392c889b8ff93c3ad752b2e8c2ddb2,2018-09-07T18:29:00.797000 CVE-2018-5781,0,0,d3d64ae79cb03138a6e559cb7d5b3d603d6db0ca2510d314ddb200c711bf426c,2018-09-07T18:29:00.873000 @@ -126568,8 +126568,8 @@ CVE-2018-8934,0,0,d91a4b5c40d75539d64f51e326eed018f8e9f926053051a68c23f8e68edfb9 CVE-2018-8935,0,0,e7fb291f9ff76205bf30cf392b24737cf326b9626d956d63183c901c3c902cc0,2019-10-03T00:03:26.223000 CVE-2018-8936,0,0,53d52e5bcf53077278de33471625e49e1ce6e2d37de0f9e66dc24e0495fc3758,2019-10-03T00:03:26.223000 CVE-2018-8937,0,0,1bf0f252c1721f61fd25863a01462de0c9a74ea41e51b871f5d32b425e2ae32c,2018-04-20T17:58:35.227000 -CVE-2018-8938,0,0,251603de3db160e8b911203f01eb11a0cb00bfb74ca07240c2c5e4166cbd1ead,2018-06-13T14:20:45.237000 -CVE-2018-8939,0,0,3f84169747e2e079c4853917bc92c868058e4a1709a74bd9b01ad67f43a49ffb,2018-06-13T14:18:25.247000 +CVE-2018-8938,0,1,3de70ae8a646cce0bb75447fbd6256e5cdfa1ae505c51bf47162660ebd77c264,2024-08-27T17:48:24.383000 +CVE-2018-8939,0,1,5f4e9199a4b3f391112b59125cc541701fb8329d6dba4890bbfc6dd556db4f8d,2024-08-27T17:48:24.383000 CVE-2018-8940,0,0,cf53680e796e6e718ff28b95e06f17b1361de4cd4b9ca095ad0f75187909b24c,2019-05-15T13:48:12.647000 CVE-2018-8941,0,0,09d2c74d2809c40de539b2b4ea7bf0de653f800fdaace965088e4ccace3de4f0,2023-04-26T18:55:30.893000 CVE-2018-8942,0,0,677206f207a9cacd94f539b988a16dbb84890a7895021d2b6ca9aaf4d3c0ed6b,2018-04-18T01:38:26.767000 @@ -187425,7 +187425,7 @@ CVE-2021-47572,0,0,2ea0acefa1856f5fa4c9c09feed15cd84aa22e8c4780cd548081be54082de CVE-2021-47573,0,0,7678b16e12c82de15205c08eaf6c4efe3147b0c132bdfc75ef038fdcffbb90c5,2024-06-20T09:15:10.660000 CVE-2021-47574,0,0,fb510e0de5c16540c28aafbb11dc6447df4650a07171ce8b06dc3ecc0ad86ec2,2024-06-20T09:15:10.850000 CVE-2021-47575,0,0,1190580e8b98f1fb3213b57001e63f689d55d9f65670cdf88262d5324141308a,2024-06-20T09:15:10.953000 -CVE-2021-47576,0,1,a79375be9dd000b3d3216a61a3add24004d37015bfda8f4d6c5d95373a50f150,2024-08-27T15:47:25.537000 +CVE-2021-47576,0,0,a79375be9dd000b3d3216a61a3add24004d37015bfda8f4d6c5d95373a50f150,2024-08-27T15:47:25.537000 CVE-2021-47577,0,0,d0face38e2762beb7e28363ee5ff98795dd4f46c8e6afb2c345789d3f1fe5542,2024-06-20T12:43:25.663000 CVE-2021-47578,0,0,2b81563df18159ccacdf1d60c9b3e336ea801dd9f67b5d514205223d8fb7aa4e,2024-08-27T03:18:45.253000 CVE-2021-47579,0,0,214fa59c33ed22b9398868c401e997995a9f0f8c8cbab8497c48f31736b1004e,2024-06-20T12:43:25.663000 @@ -187439,7 +187439,7 @@ CVE-2021-47586,0,0,43a350738cd92215883dae2d0f75b2537927b72a55c6c8b78e20374301831 CVE-2021-47587,0,0,b30550a10bae30fdaddfdf1118241fdecdb0aac764064035e93107f946fad012,2024-06-20T12:43:25.663000 CVE-2021-47588,0,0,0f7c2ddebf5230cc4da6aa5555c1f5261002923073136fff5e4910d65af55ae8,2024-06-20T12:43:25.663000 CVE-2021-47589,0,0,90b76d41b40e586a29ff9e2db3957fc07fd2120cba5363d84fdec4e79fc74d37,2024-08-27T03:16:19 -CVE-2021-47590,0,0,726cea40316793171537866d837fe3d747c8cb3266d32af4450bad9f997fcfaa,2024-06-20T12:43:25.663000 +CVE-2021-47590,0,1,f39be5f78d966c2d22d67b4496d2a7538ff62fc77cf57a6c71df81c4fb431fce,2024-08-27T16:14:56.530000 CVE-2021-47591,0,0,075ff96a49ab3870794068c07184348561582a3968bb161ed2673754442a5134,2024-06-20T12:43:25.663000 CVE-2021-47592,0,0,3e6a900f856612ffa91a686567e21f4c94ed7d6a279efc65d48294ed49768d05,2024-06-20T12:43:25.663000 CVE-2021-47593,0,0,d7a43d01ab4a125b4e19b7cc66507d59f9c795640b357b5f69d8e118285d751e,2024-06-20T12:43:25.663000 @@ -187447,25 +187447,25 @@ CVE-2021-47594,0,0,39ee68b0bea20520811a251d6cea7a263960b1fe82747511fa8952fffe9e3 CVE-2021-47595,0,0,a5c7de083f6b9294a72a621ab5d4d3b5d2e23f529c737eb80cb272e2bd0ff631,2024-06-20T12:43:25.663000 CVE-2021-47596,0,0,1907e3f165fb4e5b48753df6fccdd2af7df1251b38a69b71dafcd90b678b1e72,2024-08-19T18:22:13.667000 CVE-2021-47597,0,0,17331943a100612a59f274fb29e9b045b8ef7bffba10c35fde978c62c3806ef0,2024-08-19T18:15:30.577000 -CVE-2021-47598,0,0,21e282fdd964b9a228dcc02e1e2c60a3629504bb51d8b8f2adc72441625580e4,2024-06-20T12:43:25.663000 +CVE-2021-47598,0,1,f212e8f5248b2a91eca1c18c921ffe8dcf284ef4e373f68a8749d1452432a2be,2024-08-27T16:14:48.593000 CVE-2021-47599,0,0,08ed62254e7ecb9b8e7d1adde943234640f9a513c87ff0831ce11a99dd48bc77,2024-06-20T12:43:25.663000 -CVE-2021-47600,0,0,3b3ecceb8300251e14a9ff827efac5b9af8bfdf56c0c23c51b44a6fccd29fff0,2024-06-20T12:43:25.663000 -CVE-2021-47601,0,0,73aa29c67f6953955b16e15b67b8d9f3c09d0a467b155924d88640070cfb6ab2,2024-06-20T12:43:25.663000 +CVE-2021-47600,0,1,75cc3b8f9f4b82a2dba36cc9c8cf2cf73a752aa22859fcd049e14203568be90d,2024-08-27T16:14:38.423000 +CVE-2021-47601,0,1,7e4eec57dea85ff7c42442dd774d3b6a4d991000ef8c50e5b20a9ac0d710c596,2024-08-27T16:14:33.227000 CVE-2021-47602,0,0,217373f24d1538113364e9a20807c56c528cffaaabacdafeb2f2e23412f68cc3,2024-06-20T12:43:25.663000 CVE-2021-47603,0,0,86761f5d59a68c4485664bbeeb1962970f5d48b4cf7067142a29c796a3fa71e8,2024-06-20T12:43:25.663000 -CVE-2021-47604,0,0,987e8231a524e17762335207db340bb9d0897d09089702fb98028d5eb56f4997,2024-06-20T12:43:25.663000 +CVE-2021-47604,0,1,ac31811ff3ea9487872dcb752719657552aafd373d8cbc184273811f43ff1778,2024-08-27T16:14:27.793000 CVE-2021-47605,0,0,3081571158d2338d282550bef6eda6211517213c80f981c9a10c8de92b5f09f9,2024-06-20T12:43:25.663000 CVE-2021-47606,0,0,1b6f001fc78e7d894961d1d6e1b1ad17df9148ecf02509aefb567ce294393bba,2024-06-20T12:43:25.663000 CVE-2021-47607,0,0,466cf23ad91b2e040a4c28e81e3756fd6709b746cea60e8522b3eb46b652dfcc,2024-06-20T12:43:25.663000 CVE-2021-47608,0,0,d78dccafcd258413b1f868a68330ca12fdd652e4eb37e67094a9c1b95992d5aa,2024-06-20T12:43:25.663000 CVE-2021-47609,0,0,82e9d9e4dc88258f06db32a057ccbff5c841ba6eb746d42ce1540884ba946ffa,2024-06-20T12:43:25.663000 -CVE-2021-47610,0,0,1572705a4c2fd9435647dd2993855e4509f7e02253954f984fb1b93d5293ee91,2024-06-20T12:43:25.663000 +CVE-2021-47610,0,1,37f0f9bf2a6c534057e2bd73a9a69b473a415dbff8fc146dda3211d4f97f8e8d,2024-08-27T16:14:20.873000 CVE-2021-47611,0,0,665b802f589a4b4258cb4c8345015ba4e79bab1d249e832af66b710e7098928b,2024-06-20T12:43:25.663000 -CVE-2021-47612,0,0,3369235a22d9ea85de62e41aed6917d106709fd3265aa7c3e1e4274d9185b08d,2024-06-20T12:43:25.663000 +CVE-2021-47612,0,1,ac5be9c7b1ebb02dafa61f249fef1152946222a41f8528a41d51e457e08535d1,2024-08-27T16:14:13.877000 CVE-2021-47613,0,0,642703d9671fc407abe219c3770e567651dc20dc07d591d5ba5177a9d5d4e40b,2024-06-20T12:43:25.663000 -CVE-2021-47614,0,0,1612616c06481ff8011e92b62fa00960c8cf656c92701e788dbfeea172fd0fed,2024-06-20T12:43:25.663000 +CVE-2021-47614,0,1,ef802c1c34c90a0409b0849796fe5ab3fdfe8e1064cf9d9b5bcc370d68a7918d,2024-08-27T16:14:06.177000 CVE-2021-47615,0,0,3bc3df92b69fdab3bdde99978f3d8804c002c34343decddd85839db0c37e920e,2024-06-20T12:43:25.663000 -CVE-2021-47616,0,0,3ac3dba0c01a5947a603c28bc21ab715bd0d508b8242c4debc32b49834882591,2024-06-20T12:43:25.663000 +CVE-2021-47616,0,1,df02274307ce6160ecca6b3896e04e852b158704d05111c568a6cd060f1afb3e,2024-08-27T16:13:59.120000 CVE-2021-47617,0,0,174885baf195ea856ab0f44445ac6a3f70dd31281a9cea4d13f0e12108a3d3c2,2024-06-20T12:43:25.663000 CVE-2021-47618,0,0,2a314532463f641de5a1abcd70cc0a94c3a5563bdb37f6cd3ebfada5f84160e6,2024-06-20T12:43:25.663000 CVE-2021-47619,0,0,3423ea9cbab93af03ecb9855e0285f5e2851c0e4b6812bafeb4e82921247592c,2024-06-20T12:43:25.663000 @@ -197918,10 +197918,10 @@ CVE-2022-29841,0,0,5ee48a0acad75beb9c9637549f898463d63cf74e6b116f2e22c2ff7dc8966 CVE-2022-29842,0,0,655acfcf379e7cda595391c75eeefdc2819af14a7c86bff55440d30380c0b91c,2023-05-18T21:19:29.820000 CVE-2022-29843,0,0,024c288cac34c5f477f8328d1aa8a246401905ca6a9a056b84946282aa3fdd65,2023-02-01T16:47:13.087000 CVE-2022-29844,0,0,04bf709e8a9b88005c01e33af9f0e9102733b1472aafba9b853aa8ca254ab738,2023-02-01T16:48:43.937000 -CVE-2022-29845,0,0,a00577304f4c787d3632bf96cd145e79c1f062c53fce52e35028eb811fd8b622,2022-05-20T16:53:03.717000 -CVE-2022-29846,0,0,c798bae68e9857e1443080662482b31396b868c9849d5f9abebc804f525137b8,2023-08-08T14:22:24.967000 -CVE-2022-29847,0,0,a63cd933096141048b699f35b53bfd0c984c6596f35cfdabec06bbdb745f8817,2022-05-20T14:36:16.007000 -CVE-2022-29848,0,0,5b6fa9a646c6f1550fafbc2388760d452cf867cce0c14d603c22208faec6ae2c,2022-05-20T14:37:08.813000 +CVE-2022-29845,0,1,527302715d9c2013eee4604a30bcd97a044234a440ee0c0b8d0ac862a9f284ce,2024-08-27T17:48:24.383000 +CVE-2022-29846,0,1,230dec6e4f22f7c2098c7177cef6e0e277d8bde1700253ee6e86e84f809f68b2,2024-08-27T17:48:24.383000 +CVE-2022-29847,0,1,e2f92767a3824e8d87f773d6bbf292b80803018d50a88940fce316f05abe0e35,2024-08-27T17:48:24.383000 +CVE-2022-29848,0,1,e10e3c265341ba044f8cf386c45aeb03db3ef9598c0adc930fd4428b84dfda42,2024-08-27T17:48:24.383000 CVE-2022-29849,0,0,07257c98d5c9b16c03338c85c1a35da20248b6fc1f4d1ce6f52ebd50284bdf8d,2023-08-08T14:22:24.967000 CVE-2022-2985,0,0,b008ba547fef5040a8e3641045d6457c5ec7d2566393e005278e0a7fdde6f4a7,2022-10-18T19:33:57.623000 CVE-2022-29850,0,0,02add66e4e241bd4e7017271009354644c5b95f153657073eb55af9031b6ca1e,2023-08-08T14:22:24.967000 @@ -209015,7 +209015,7 @@ CVE-2022-43909,0,0,fb5ee18fcc4a7c8f963a93a6115537cf0182728f4dba8a3bd049fa37f66ac CVE-2022-4391,0,0,55ba1ee53ba287fa9a331eec36653bf0e64371d30780a415458f598732c5d396,2023-11-07T03:57:43.970000 CVE-2022-43910,0,0,7268ce6dc82f1278149e45c0b95732486f595712c6fa46116abdc68639690719,2023-07-27T23:43:13.553000 CVE-2022-43914,0,0,6c5d00c75cae4288b9b3f94ea7847750a80fcdaddd67481674372df2bd89e663,2023-11-07T03:54:07.493000 -CVE-2022-43915,0,1,5bf05b68f88d28cb31b7ff740af9d56051297de0c351e6e73ab3ac7b1b28e0d1,2024-08-27T15:30:57.437000 +CVE-2022-43915,0,0,5bf05b68f88d28cb31b7ff740af9d56051297de0c351e6e73ab3ac7b1b28e0d1,2024-08-27T15:30:57.437000 CVE-2022-43917,0,0,38b0633885bd70099b602418a9f6cf51c4440b53dd83d61edf447fd9b1fdb596,2023-11-07T03:54:07.590000 CVE-2022-43919,0,0,3aa92fee108b80de2c2a30af75bd50fa8417c3cffedb4ff0feec49c8f960e3aa,2023-05-11T14:37:10.943000 CVE-2022-4392,0,0,8486468fc2864376f0d7d2d2c7f6ecbf29ceed955d0af959f0ef5ea5913b1984,2023-11-07T03:57:44.170000 @@ -211098,7 +211098,7 @@ CVE-2022-47029,0,0,dac88acc9e43cb003b1a7430fff934a8916419fa700cf52d04932dd0cb2b6 CVE-2022-4703,0,0,f78248b31accf080599354486580964f551255ff6ed6ef09d177a7a907159dd7,2023-11-07T03:58:37.930000 CVE-2022-47034,0,0,98aa3b88fe44ebebdd6f3403032d5dd494d3c3f436ddb19e226483cbe52d4913,2023-02-22T20:14:11.913000 CVE-2022-47035,0,0,9c17a783de3d1c4fb79c08594df7b8d1d253df4680033940ecf4fcd5e91855a7,2023-02-07T21:48:39.107000 -CVE-2022-47036,0,0,d2949ed4b0aeb5e6062edd38f93263f4100a539133f4438634e37ca72320787f,2024-03-18T12:38:25.490000 +CVE-2022-47036,0,1,84ccdae8945fd71a15ab9452a4e4d6a0a8c398529c2b242f0fb11dc552cd514c,2024-08-27T17:35:01.233000 CVE-2022-47037,0,0,4642170ef4d1d57857d2c14f41831941268cb1a303a79e288c7bfcfddc1fd411,2024-08-01T13:43:04.093000 CVE-2022-4704,0,0,46af92468c03d8a14d68056eeb3062570290bd5634248e988990bd16456ff359,2023-11-07T03:58:38.160000 CVE-2022-47040,0,0,17f0056871c82cc5c6c5c59f8133dacdaed97db32f71e20007f765b1815456cf,2023-02-06T16:23:30.867000 @@ -212423,20 +212423,20 @@ CVE-2022-48909,0,0,60753974402d7b9dc0b7da2840cff75c54ff83e7db7e3cd742fa083f4cbfd CVE-2022-4891,0,0,a455b0842f19c717ee670b5db60155cb5018f293a7aaf3547e3c50a0a475a09d,2024-05-17T02:17:01.767000 CVE-2022-48910,0,0,c49907901e2444dc6fb276986d8fa7581490f1e186329d0375e706884b0faf75,2024-08-22T12:48:02.790000 CVE-2022-48911,0,0,67b19231003646107ba5487b8e675d3ea3a96bd38a2a1b84a09cad34ba506685,2024-08-22T12:48:02.790000 -CVE-2022-48912,0,0,ab3e5ac60dc63ae02f0e910f3ab243038656fe3ed9ae8519bcbbc07abb7657fd,2024-08-22T12:48:02.790000 -CVE-2022-48913,0,0,75f9be1fa593d268869e9a32d42a38a404d97ccce9f4a4b7065b9e8f82f59915,2024-08-22T12:48:02.790000 +CVE-2022-48912,0,1,4685b9e0b04647e6391699b48fe4ec760b8fb2a11c99c401b692a1b301b0a4c2,2024-08-27T16:12:47.173000 +CVE-2022-48913,0,1,713c03b83b436a4ed81d31fa61e38a9c0b02c5d54599e753ca949890fd4f7312,2024-08-27T16:12:58.620000 CVE-2022-48914,0,0,17a954177f70a24d9987d801118d084e4480c7c3850b7fa42f10a93117b17e59,2024-08-22T12:48:02.790000 -CVE-2022-48915,0,0,addecd1092d20b146a7a3d8a8daffe34ba9ddad537b616265f53f605e1885557,2024-08-22T12:48:02.790000 +CVE-2022-48915,0,1,c80b107b935c48929981801a893b263b71560ca74e5ba8b7bdc00b678cfcbb35,2024-08-27T16:07:09.037000 CVE-2022-48916,0,0,8f20ce1d1c5363f5f68e39b98839eaf52bfa07c01964cca89491dcdb59190093,2024-08-22T12:48:02.790000 CVE-2022-48917,0,0,58439b65e36dbb2ade45a1620a3a14ca27906f33b947d1f0a9005280949a5eee,2024-08-22T12:48:02.790000 -CVE-2022-48918,0,0,ec7f85d603f52c1498e5f67856d54f94cb8d33fc28d00b2bcac29c9ad6d98909,2024-08-22T12:48:02.790000 -CVE-2022-48919,0,0,0685e9c5a13290ed9ca1f7d5c924e767f76fb6f79874dbf3d1b3c957d52251b9,2024-08-22T12:48:02.790000 +CVE-2022-48918,0,1,dcfb706418ae75fe3a7007d02977541ca10039ee009c0974217f4396febbaf6a,2024-08-27T16:07:19.127000 +CVE-2022-48919,0,1,e5790babb6da0b073ed5bbf67690020a0aac3bba58730f51363a0ef2d8059741,2024-08-27T16:07:32.900000 CVE-2022-4892,0,0,a02afb40fce024abebfb05a40298b81994dfc2b7567f3762fdb2b328cbdbe6a9,2024-05-17T02:17:01.897000 CVE-2022-48920,0,0,b393f9096ec2dd749ea58d3cba07e0b6170f7ce1e47bde6c059e20f2b353f3a4,2024-08-22T12:48:02.790000 CVE-2022-48921,0,0,565ba181b0f1f2dfc9fe72312b91e9931d175894bd53f2b2a8229bd70f9ca157,2024-08-22T12:48:02.790000 CVE-2022-48922,0,0,485fd7b1352c6198add8f08095b571046478ed9662200df59a8f5eef93ca9987,2024-08-22T12:48:02.790000 CVE-2022-48923,0,0,7c871d7f7fad4b7b8cc0fef537eadf3094068942b00174225e14cad2e67b8948,2024-08-22T12:48:02.790000 -CVE-2022-48924,0,0,ff439129944507511dd1b191848cba235ca749641f87363571207cdbfcb6ec5d,2024-08-22T12:48:02.790000 +CVE-2022-48924,0,1,7b72b5b3779cbd334a58cc81c4e33f1856c26dfe0ed7b0b6108d32c9ead83b93,2024-08-27T16:07:43.660000 CVE-2022-48925,0,0,12c2847f9c2abd72fae449a80a3efdbc821679cca9a301519e7e3dab31ee93f8,2024-08-23T02:07:41.047000 CVE-2022-48926,0,0,7c14eba9301c644179737e4ff06c47dd3ab70d7b7dc5b7cdc8ddbc7cbe0a8516,2024-08-23T02:05:14.960000 CVE-2022-48927,0,0,47e842d42ecdc6f5e3e98c1aff8de17fbd61e972b7162f3074a8851d06b3bf55,2024-08-23T02:05:45.170000 @@ -223592,7 +223592,7 @@ CVE-2023-31305,0,0,d9246761767dbfcb2e2f558fb5fc5e1cec565f0df8c900e55c4f4f1cf420c CVE-2023-31307,0,0,927363a24df9ec7431f47a682d4205fb756e21f24bd0cd30e96e1e5c0bf4352a,2024-08-14T02:07:05.410000 CVE-2023-3131,0,0,92b0e6ff89d88f5d5d16464713458f8b0d9ad7ab63634417462d4acc9effd23f,2023-11-07T04:17:57.837000 CVE-2023-31310,0,0,8ccc7e5931d6d6bfc42a95a6f042175145d5e916bbb9dcb62980650f9827dfe9,2024-08-14T02:07:05.410000 -CVE-2023-31315,0,1,44428fbe3e922a7707ac2901dc10ee48452105458214ad8f550b81ed93b19a27,2024-08-27T15:35:00.983000 +CVE-2023-31315,0,0,44428fbe3e922a7707ac2901dc10ee48452105458214ad8f550b81ed93b19a27,2024-08-27T15:35:00.983000 CVE-2023-3132,0,0,52ab34552d4912b51189535960f33c42d601a676c80cf99d393d54a820deb2f0,2023-11-07T04:17:58.010000 CVE-2023-31320,0,0,94626c9fd18f585c07331302f269c549777a5d34517f86a0946e1593aaaba7c1,2023-11-30T15:10:43.827000 CVE-2023-3133,0,0,003d70726348f1765d3e8bbdc7b1fe8c778d5248156227efcf8dfd6079b65e42,2023-11-07T04:17:58.197000 @@ -232342,7 +232342,7 @@ CVE-2023-4289,0,0,97e9dbfb002f991c9b0c7bb56513ad2ad7a34e2cc2f1908f40b15808fc4c7b CVE-2023-42890,0,0,5b8aebb147e55c36aa77d8987a88db8f5e314c8eb5e78fd8ff6fd1567e1228f8,2024-06-12T10:15:26.693000 CVE-2023-42891,0,0,9e832a9c79650ad0321f807def388413064ff2ab68c6ecbf9bb18e2496c75004,2023-12-13T17:46:10.560000 CVE-2023-42892,0,0,45868be9e713d43fbe1857fd521e7819eff03e6332a2f62faa55e58f6a79244c,2024-08-21T23:35:00.660000 -CVE-2023-42893,0,0,86228f691d8da355bd3b4438de2093b85f4b2664c66e7c4126c31aa66313d765,2024-06-10T18:15:23.210000 +CVE-2023-42893,0,1,3980591866774d66d6fd5796746be691a489cc5b2a82a91788fc3f19d39afc21,2024-08-27T17:35:02.800000 CVE-2023-42894,0,0,19edfaff52695d01eee4c17779921e72e391b6f067c5c5cef1a5eb99c74b0e19,2024-02-02T03:11:25.083000 CVE-2023-42896,0,0,3c59c8410e091ed4d59b2693bab0a1053ef27cc19824731090305958b40e4a73,2024-04-08T22:45:48.987000 CVE-2023-42897,0,0,0c9d3154fb34bdac1bb2062b91c9da25d4cc8ebcbefa6ce9c83d620dc434b94c,2023-12-13T20:57:23.147000 @@ -232371,7 +232371,7 @@ CVE-2023-42917,0,0,15549d591e10c4a0f8e1ae1b9de5e6d4081ffb5c46b1b7c185d2789ea21a2 CVE-2023-42918,0,0,e7908c8ff0df70036d83a2992880cac479113ceab891ae7f56021128a2de4e5a,2024-08-01T13:44:48.283000 CVE-2023-42919,0,0,f9a3b1dae89bc9cf392d1cf8dea65cc44606d99a0ff0603d430f6ace7681b3a7,2023-12-14T14:08:16.317000 CVE-2023-4292,0,0,3ea59f0e5840e07b56bc2aae1b281e2ab80136b2b379398236c012d0899a4d88,2023-09-22T13:48:01.647000 -CVE-2023-42920,0,1,1ce86369e4c2745e63a124c7edbd28566110229d06a6bb4f5dd4751a265f15ee,2024-08-27T14:35:00.590000 +CVE-2023-42920,0,0,1ce86369e4c2745e63a124c7edbd28566110229d06a6bb4f5dd4751a265f15ee,2024-08-27T14:35:00.590000 CVE-2023-42922,0,0,d462ec8a37d9ad76a8353a6b4d7d79094fede2b875e86ffc84e579e57a42a188,2023-12-14T14:05:30.140000 CVE-2023-42923,0,0,2718c43e187a8424615b9f8de717d1e9605fa64e6eb699c03e6b09fc5d5d64d5,2023-12-13T21:19:46.137000 CVE-2023-42924,0,0,ee67d224e135add0a3ebe533e99aadef1fb79612269a77d92db5afc056caa779,2023-12-13T21:17:10.803000 @@ -232394,7 +232394,7 @@ CVE-2023-42939,0,0,0ce71ea134fae56f84234486eae9cf0279fa4b51651ae0082aafa52d86a86 CVE-2023-4294,0,0,38ff20ab6e7f39daf98662734eba5d7abaeaa55eac46be3d5953e77ce63f803c,2023-11-07T04:22:25.913000 CVE-2023-42940,0,0,d1747dccf9be170d7d2459f45012020f08d4eb5ce17698d439f59de70dd43655,2024-01-04T14:56:32.530000 CVE-2023-42941,0,0,07ef4c50d699b2c4d697e69c7eba84c968b3abecdc0454485729209830f2d05b,2024-01-16T23:54:14.273000 -CVE-2023-42942,0,0,47b3808be894c1e814ff21abb00505dba924600cc2ad1b2661621841b4e6dcc5,2024-02-22T19:07:27.197000 +CVE-2023-42942,0,1,5f3d335907b121452b79893baeef6c48d60a98bb67df4e841c089c4a7d2bce1f,2024-08-27T16:35:01.703000 CVE-2023-42943,0,0,8790183efd35acc800e913b3464e91f8a65e51f27e9353b2a98f8ccb4e333257,2024-08-12T15:44:12.630000 CVE-2023-42945,0,0,ded1b5c2e0337280b23c4c9aa988849a090fc35ab214c2519d212d959fafba41,2024-08-22T14:35:01.547000 CVE-2023-42946,0,0,cc0d621d8703ec59422ebc54c6cd13379fdeace179303d8f3bcd98bed0924a19,2024-02-22T19:07:27.197000 @@ -232415,7 +232415,7 @@ CVE-2023-42959,0,0,12f3e1f633059524305473e9c00809cb86b8280a007b09c56c5f657aca98d CVE-2023-4296,0,0,3d00ed163c8e5c949ecd1a08dbe73fb55471b00b7765a672fc6fbeae6eca925e,2023-11-07T04:22:26.050000 CVE-2023-42962,0,0,35794e89578ee19a4b7d15e17dbc849654eef14cc3d488dadb444cc2c1961a1a,2024-04-08T22:47:42.510000 CVE-2023-4297,0,0,047ed4f9023e2ddaed83a6b2684e12e7cb9df8581e91d1a9b5f1e7175f976ace,2024-07-12T16:11:19.193000 -CVE-2023-42974,0,0,6ba5409450c7e2c8d3c9e86a786a9cca288656fd3556f12fe30dc962860b53d3,2024-03-28T20:53:20.813000 +CVE-2023-42974,0,1,e533b89095e00307725a1fdb223f251263e9bb3179273e0faa91ad23e594fafb,2024-08-27T17:35:03.187000 CVE-2023-4298,0,0,ab810df76a2277202e9d137fbb6d468184ab03ce560db2111fcd8ea05340303c,2023-11-07T04:22:26.147000 CVE-2023-4299,0,0,56850848a0f7603aacc0a3b3f382ad7d3b749b8b52a9e1dddedc509864d473c9,2023-09-06T20:13:32.917000 CVE-2023-4300,0,0,8817ce258a8663a85f68378b3ba202ca1a6a1e67b5082493ade435e56ecc4599,2023-11-07T04:22:26.350000 @@ -235793,7 +235793,7 @@ CVE-2023-48122,0,0,d7663799271d9b8671c9e8024632d9a1befdf8c12075b57be56623e3b111f CVE-2023-48123,0,0,dd1aea47245fa2d050518fc4fc3449f6781cc40a54dabd7011f438fd7622068f,2023-12-12T16:11:35.730000 CVE-2023-48124,0,0,866d32958e3d7a2db79a2e717cbe1c07ce9af2b659dbc952114d9f926c90d469,2023-11-29T16:59:36.717000 CVE-2023-48126,0,0,e2b7ffa93043f668ea6fa72c22c0d0bc5af3237373db0412a2934afe676daa0d,2024-01-29T22:58:18.460000 -CVE-2023-48127,0,0,db31653caaa71b63fa1404304a9a07bbb55eeabbf061b18fad74ed9b263894c9,2024-01-29T22:58:28.277000 +CVE-2023-48127,0,1,03652ce141961eeb1f38d87703d2353e4c04e568761d2425b0d101640aa1c3c9,2024-08-27T16:35:02.480000 CVE-2023-48128,0,0,3486511bc881101feb6722e4f06b94e77581a3c23eeec58635d0e7ab55ad6ea3,2024-01-29T22:58:33.717000 CVE-2023-48129,0,0,25e7ef256d120b221e541b49e58e27cf776efaab036d84b5c7226691b00b8eaa,2024-01-29T22:59:32.340000 CVE-2023-4813,0,0,a3129b3c7c051a7be512cd888ca923b35f285314ef7523597960184a4b4b1ad6,2024-01-21T01:49:46.697000 @@ -236932,7 +236932,7 @@ CVE-2023-49578,0,0,554376a4a5e89af7792fb2e3caaee83c155712344a4b55572197b12bfc2f7 CVE-2023-4958,0,0,b9fc19622ba6df397f2314bb1498399d57a97d8d3d77e1be35cc528df3591ff4,2024-05-03T16:15:11.227000 CVE-2023-49580,0,0,815954f9407b74402abcfb36fe3f08f951a3ae3d064781c18823d1ab5df6702f,2023-12-19T14:50:39.843000 CVE-2023-49581,0,0,c752d9c8b49d3a50b30e010fb1e627be8921c15cd9f5ebf74ca53588cf11cd1e,2024-01-16T14:15:48.123000 -CVE-2023-49582,0,0,31eedd25a72a8d35e32bbabc907391d34c6022ba7f8aaf363e6e5532bc43e947,2024-08-26T15:15:23.727000 +CVE-2023-49582,0,1,254586a5bd35da117db3a87fcbf0665709da9c852d76af64aed9d2b7bc82d1ec,2024-08-27T16:04:58.657000 CVE-2023-49583,0,0,2bbc4069f5dd786f8918873219f212a951808fc3c08912cfca16a05ba9ea4494,2024-01-09T02:15:45.140000 CVE-2023-49584,0,0,12b0484dfd67af5cdba226de40078067413392935bfd8575322e5980ac90dd4f,2023-12-15T14:26:47.663000 CVE-2023-49587,0,0,b72e8cc0e0b1f24503bc21b9e5a03faa03723a19fc8b810902b73346efe7215f,2023-12-14T15:41:25.777000 @@ -238397,7 +238397,7 @@ CVE-2023-51806,0,0,a032ea9a655cbbf71e4c406d3dd2f2f2f5ee97657ff9aa1dac7294e33e2f2 CVE-2023-51807,0,0,99ef3d3c49895d82fb2535441c0e6ff60b70aecdee167dcb6dc525cb985ee546,2024-01-23T14:45:29.080000 CVE-2023-5181,0,0,64c0855e85d2fc43a5b611f652f0c3c44d9ac91c82903da4e09b03bb5ac71756,2023-11-14T15:33:05.033000 CVE-2023-51810,0,0,09cae7d3e16d061e8a2e4ef47f5597db8c1b0ae9bb9a7c67d9f3865adbf309fb,2024-01-22T21:00:02.100000 -CVE-2023-51812,0,0,a1faf3b7e11c441a276800e37e49d872997f92398e1584b475b1523728d4b137,2024-01-10T15:57:32.953000 +CVE-2023-51812,0,1,120a768b771acbdbd4019fafe4ebf29261cfea75f6ed1dddf1d261acbd21c2c7,2024-08-27T16:35:04.757000 CVE-2023-51813,0,0,03a8407f76670dad8ee2f735bc03f059a1f48e563cfaabefcea4d8c0a87c4b78,2024-02-05T18:39:54.630000 CVE-2023-5182,0,0,36783ba17dd3ddcfa5aa268dccb5a3d40636c21121d2899e424b957a713f6407,2023-10-11T18:05:32.093000 CVE-2023-51820,0,0,7aa0f7d98725dd77268f0caeb4fb8d7e759133db0c7956115ba3b94b4e25c668,2024-02-10T04:11:00.587000 @@ -238532,7 +238532,7 @@ CVE-2023-52101,0,0,3c9ff6a037b24ee13732ed793e4e2445283898e3d6528f27e793968417483 CVE-2023-52102,0,0,56d96f80f7a616015abfd0c89b86c846d05ab3920ecd70af77dd2284e6faa7c3,2024-01-19T19:30:49.283000 CVE-2023-52103,0,0,ac629cc1c4afe2140dbfbeed5793356e2c4d88820065a9c68c818f7eeb511749,2024-01-19T19:44:15.580000 CVE-2023-52104,0,0,f049ca940874eb58ba54cef68934d63a04e4b3378dc9ae1bb4954f25a44ee8d5,2024-01-19T19:45:11.830000 -CVE-2023-52105,0,0,577e4fa64a75e4f0bbf94cac906f0a6cb5c336bd8405a28c393bea66bf5a47cd,2024-01-19T19:49:22.037000 +CVE-2023-52105,0,1,7fca37ca631a27b8dc8fe3b9940e54b91efedf447c5fd0587d260b590112a217,2024-08-27T16:35:04.960000 CVE-2023-52106,0,0,8de975f58ebbe51b2b85cc1f1b45e0159aee5fee2d513835532c7a6ebc5ba60f,2024-01-19T19:33:20.873000 CVE-2023-52107,0,0,39206048e7d03c3372434b8186baf63858d5630fd81395c6a9393dcdf17a567c,2024-01-19T19:11:57.207000 CVE-2023-52108,0,0,d0ef93e4677a93a0950f5cbdee0799c1f0c0115e139c4cf9d328ddbe6231bbf9,2024-01-19T19:07:12.283000 @@ -238542,7 +238542,7 @@ CVE-2023-52110,0,0,96323098c9ea834d4a730f7f43afa5f6533440312e55c10c9bdcf4d918aa3 CVE-2023-52111,0,0,cdc38abd8bbfb59f44eeca63e5577ead02e993e1300e7af858fa500cb0d20fec,2024-01-19T19:13:42.033000 CVE-2023-52112,0,0,e75e854e3bc26755af7f80b46565bb4f5a216aca1f3fc34672efd34977391ccf,2024-01-19T19:13:08.447000 CVE-2023-52113,0,0,b97f3ffb948686565ce41dcbc6e0a8c05a47c70185627a50914b7ac047b6fb68,2024-01-19T19:12:32.047000 -CVE-2023-52114,0,0,6d6982e7a425413b6a79195487fcab0a1291a6d8e7f9024374796282179445a8,2024-01-19T19:16:40.973000 +CVE-2023-52114,0,1,a3f4ee633445fd514ccd6a15903cfffd32dcbd42a48c03d1d56d3860c928aaf2,2024-08-27T16:35:05.753000 CVE-2023-52115,0,0,7e79c146fa74c777963a88ff3c064006c2d544ca21b33bb411b563977d09201a,2024-01-19T19:16:18.290000 CVE-2023-52116,0,0,0f432e26b81d6517447194a85ebee37d4b1514144ffa2535ef4fd5261b8d26e5,2024-01-19T19:15:46.013000 CVE-2023-52117,0,0,549bc792efb68ff9d9c74645bd61512615bfad33eacacf714efed0139a6956b0,2024-07-29T18:15:59.007000 @@ -238818,7 +238818,7 @@ CVE-2023-52453,0,0,b6dec776a1692f2e65027e50e2e09b7570553bea67513b5c060a2e7d8928e CVE-2023-52454,0,0,af6f33fa2b32d82246edc150f79392a42d145225e13f1db5ba4d22992d49aa36,2024-06-25T21:15:52.690000 CVE-2023-52455,0,0,d3b2d0172af1909bb1ac4d4d7acce5d1d9bc2dc937cead8ad30dfd0402e832db,2024-04-30T19:34:34.080000 CVE-2023-52456,0,0,72f64fa488b7dd5d5f95908609ce1c3cfb729a3fb95dcf84219136a92850b81c,2024-06-25T21:15:52.800000 -CVE-2023-52457,0,1,065a68b67f1fbaccefc4dd74cc747c36750e398b312baf715cfa0de30dacc2ef,2024-08-27T15:26:27.347000 +CVE-2023-52457,0,0,065a68b67f1fbaccefc4dd74cc747c36750e398b312baf715cfa0de30dacc2ef,2024-08-27T15:26:27.347000 CVE-2023-52458,0,0,060256b208b2567414e56cf0f83448fa2c1e19310c9cf4b5204a34532ed6f181,2024-06-25T22:15:15.043000 CVE-2023-52459,0,0,350ab48aa5487f2fa8284fafbf84f571c733c91ca8bbe04060c4bef0fc22caf6,2024-04-19T18:49:47.087000 CVE-2023-5246,0,0,892718b6dd4e4e1e580b4dd5fe666c7b8e248e4cb28e3ed3abb5a82ba43a4ac5,2023-10-31T11:58:05.363000 @@ -239371,7 +239371,7 @@ CVE-2023-5340,0,0,8d3270c83d9231ec654054c6bf70eef62dd976948ccc59766b8027441dba4e CVE-2023-5341,0,0,224bb5fa3dbd9484d0fea46da2d38f4ff6bea94b4848f123f90f7a20412f6404,2024-02-22T11:15:08.650000 CVE-2023-5343,0,0,74b5e5d136fb7ed6900e2036d4d8d933da0e002ca8a63a378971e1d103e239e8,2024-07-12T16:11:21.533000 CVE-2023-5344,0,0,b6a3c914bedffe0f0366d0134b6113cd59d9c05fc16ee7f7200798903b0c614a,2023-12-13T01:15:11.123000 -CVE-2023-5345,0,1,0c9fe2eb44befb8175ed832fcbb8dceadd3e95f2819ba834b904557e87010e26,2024-08-27T15:26:15.777000 +CVE-2023-5345,0,0,0c9fe2eb44befb8175ed832fcbb8dceadd3e95f2819ba834b904557e87010e26,2024-08-27T15:26:15.777000 CVE-2023-5346,0,0,a76b949c709b804214dfa2886e68c4eff57b795b280b5d9a7c7f07a1ed39118e,2024-01-31T17:15:18.533000 CVE-2023-5347,0,0,804e4645968b4bbe69ab265a2144a22973348de14ab28db7bc6df2627077afc9,2024-01-17T17:50:09.620000 CVE-2023-5348,0,0,1f71423163924e76a270ed9e38fb0bdae6921fde5399837f146e87169bf98963,2023-12-21T19:48:38.117000 @@ -239715,7 +239715,7 @@ CVE-2023-5713,0,0,8491d2f03566bf34009b700115c5350ec2e8c0fbf305d7831b16109b099bc5 CVE-2023-5714,0,0,d994fc385dea83a4d77256ab286b12cd202a5b906ab6ab08e4b11e5172f136ca,2023-12-11T17:51:11.777000 CVE-2023-5715,0,0,2d6923fb501964ed5e4428f1dcf142048443a587671a5cd376dd7bf0e3b39b94,2023-11-29T19:50:49.370000 CVE-2023-5716,0,0,1211a3b90cf870c7162347e6d275320620d3c686d6157dd9c6abcad32ab00956,2024-01-29T15:33:19.493000 -CVE-2023-5717,0,1,680cef698bb8af0d4a9c3a3eba421018f7b9f14739fbb2a140f6f47022f8894a,2024-08-27T15:21:29.377000 +CVE-2023-5717,0,0,680cef698bb8af0d4a9c3a3eba421018f7b9f14739fbb2a140f6f47022f8894a,2024-08-27T15:21:29.377000 CVE-2023-5718,0,0,ca3a392a6db8689bdf3e820a456b31d961de6828f354ba39cec5f147de927593,2023-10-31T14:20:21.687000 CVE-2023-5719,0,0,971b5890c6534ae28c61415ab2eedf73ebecd2ed1c705f5603af8af0b90f3fec,2023-11-14T19:29:07.007000 CVE-2023-5720,0,0,c4bf78bddbd612dbe29813d8b68641dad8e7a00b0da2523960977039bee55639,2023-11-30T16:26:16.073000 @@ -239868,7 +239868,7 @@ CVE-2023-5875,0,0,f2c8ef142a9434046bbcde5934014da0496914fabd5fc32933d6b6e4b6f9dd CVE-2023-5876,0,0,15630470fb49e7e58a4a76c10feb92bcc4ffca0123c850c1d1dd3392b7b5a3fe,2023-11-09T17:52:34.940000 CVE-2023-5877,0,0,cae6ea24083edc0a9230f73e09527d3b166867e7375913b75a03f99c65ab96fb,2024-01-08T17:23:26.717000 CVE-2023-5879,0,0,01d855585e8e4dcb5976d609eaf70dee60d5f96f852935b14c230795b259aea6,2024-01-10T19:30:37.647000 -CVE-2023-5880,0,0,6b26e6ab2f8b682f74a2f7ee4aaaa86807ecf442a1188bb1adc42775262d1c61,2024-01-11T18:26:04.750000 +CVE-2023-5880,0,1,af93876f292357a1cc430e87b699356327189d8165c165b0934bc8945eb81e63,2024-08-27T16:35:06.783000 CVE-2023-5881,0,0,76c545895df6f4a825518ed006672e96b141cbbaa09742fe59c1d7cece581b8c,2024-01-10T20:26:45.550000 CVE-2023-5882,0,0,4959d9dfc73e7a34c96632349b138d2c951e4c354db8d4e6848b0dc18864c099,2023-12-21T19:50:45.183000 CVE-2023-5884,0,0,8ba598598db51592abc8d0d1ad7ed586ff334c41f47bc13ba93d7fe4d2805681,2023-12-08T14:49:31.140000 @@ -240018,7 +240018,7 @@ CVE-2023-6036,0,0,624079a57f534e36c772e6964e8e60c90dc9a19bf5c3a3ef70952d63f68a6a CVE-2023-6037,0,0,64f4ad52fb4acc00baed6bbfdf7dce01bf4ebf4db6912c1d3649458f97d661bb,2024-01-08T15:06:29.210000 CVE-2023-6038,0,0,8768be36e71173b4770cb92877d06dafed621d93624a0b2767e2ef05fc8e0bd9,2024-04-16T12:15:08.780000 CVE-2023-6039,0,0,cb40afc45334b480f355050d0c59c160d8a64ca923211ef3163e81949e123561,2023-11-16T17:59:48.420000 -CVE-2023-6040,0,1,bf1fb6f83f2a47a3ec4f6dba46af90a4c091065cdd225020a20fe7495d7adb0a,2024-08-27T15:15:30.177000 +CVE-2023-6040,0,0,bf1fb6f83f2a47a3ec4f6dba46af90a4c091065cdd225020a20fe7495d7adb0a,2024-08-27T15:15:30.177000 CVE-2023-6042,0,0,a5af299b7e4938d6b1454de2838a7d40e4f554e2989c8c6c38fe49068eafcfdb,2024-01-11T19:57:29.590000 CVE-2023-6043,0,0,8d8887811eaceb1320ad09920d820a72afab16f49f3194f4a1f0a45a8b1f039f,2024-01-26T16:03:21.607000 CVE-2023-6044,0,0,f48871ebaaf45238c34428d45492bdeca4439fb21a1fde867542c6d14f4bcb20,2024-01-26T15:56:47.883000 @@ -240079,7 +240079,7 @@ CVE-2023-6105,0,0,82435afa25eb7550d0e45ccbf0eba9061b370409fae39d8090a99844af1a15 CVE-2023-6106,0,0,ae91015644451dfca9c79cc801f41a8f42f29bbb36bdfedf4a0231658f4cb3a9,2023-11-14T00:15:09.157000 CVE-2023-6107,0,0,e811d92eba6ac3deb110f0cf4cc81f419a250d458faa228969121b465199206c,2023-11-14T00:15:09.193000 CVE-2023-6109,0,0,a744b3064096685c694a02401e0433f531812ac3fb3fd9d6e9f0d5115e399cc3,2023-11-20T17:44:03.723000 -CVE-2023-6111,0,1,47cd61f7586b016ccc4fffdba30d6fdbb7a21baf1123d9b978442365f2b434d6,2024-08-27T15:10:01.897000 +CVE-2023-6111,0,0,47cd61f7586b016ccc4fffdba30d6fdbb7a21baf1123d9b978442365f2b434d6,2024-08-27T15:10:01.897000 CVE-2023-6112,0,0,b8d1d79eb6ef2513ba0ef61ffb8f237ee6a6b925021c5d5a8bf64d39fa9a231d,2024-01-31T17:15:22.707000 CVE-2023-6113,0,0,40596376e95b50f33f80c119c844af68d86e0219e8c6355bb1d5865e23549a46,2024-01-08T19:05:26.813000 CVE-2023-6114,0,0,193bad889e7a653d80e01b5ca7f54d24373302c1c4aadbf2130b634dddd1b716,2024-01-05T15:08:00.537000 @@ -241556,7 +241556,7 @@ CVE-2024-0558,0,0,96aeb8cf0dce546f9584e58671ff7f7715396792b70e3d901492554bc823ea CVE-2024-0559,0,0,2b489be9f48e4f4ee88dba228aac75e67986dc57254496c8abc860aa2bdd75c1,2024-03-12T12:40:13.500000 CVE-2024-0560,0,0,409c0d8e6471fa649d49f48b1bab7c329ea2d720630383d0d79cff1c14ca2598,2024-02-29T13:49:47.277000 CVE-2024-0561,0,0,09bd47669bfb1d5000475a8644f9647b8b9cfe657a0a22ee3ca31f75fdadd4e7,2024-03-12T12:40:13.500000 -CVE-2024-0562,0,1,da76ada5e80bb87b4a110a9fa03a565bf9113fd5412b976afa32604e08bd486f,2024-08-27T14:57:10.957000 +CVE-2024-0562,0,0,da76ada5e80bb87b4a110a9fa03a565bf9113fd5412b976afa32604e08bd486f,2024-08-27T14:57:10.957000 CVE-2024-0563,0,0,9ec355fcf8c2bfde63e8cd3b32f6b09899d66d999623867d4585cdbccddf2e84,2024-08-27T11:15:04.277000 CVE-2024-0564,0,0,9f4cf532f2df225cad861ce2ec08ab9ceb4e29633d51c64f31796eb4bcd7e01c,2024-02-08T16:36:48.837000 CVE-2024-0565,0,0,cb81ffb1520e3c0a05e75acd9e7bf937d57dba9cb713c9c9cb41b55fc0986288,2024-07-08T18:15:06.387000 @@ -241632,7 +241632,7 @@ CVE-2024-0641,0,0,65eded4d16aec7accb7f6502f2049811c8c28b8c00f13f2b790f15971a21b9 CVE-2024-0642,0,0,015121aefe6958e10648c2f414972825fefb755d8d649c4c15f3edc1a228b9ed,2024-01-24T19:29:41.893000 CVE-2024-0643,0,0,40527bb444455f1148a87e26d7767c451ed5afb4beb3d0e2db91b98b906aa04a,2024-01-24T19:27:40.553000 CVE-2024-0645,0,0,9edf776dd2a288822d7555994ea5d2d0472b774fe6a1f1d2d90864238eedc130,2024-01-24T19:24:06.717000 -CVE-2024-0646,0,1,a5547f471ce956cc59f9850dafd931964adca974c4928a6d2be5e4fa53c58d19,2024-08-27T14:55:47.617000 +CVE-2024-0646,0,0,a5547f471ce956cc59f9850dafd931964adca974c4928a6d2be5e4fa53c58d19,2024-08-27T14:55:47.617000 CVE-2024-0647,0,0,4342ee4e022da42dd14f7efff309eca411eedf49e01c3392607c214bf4e2c8ae,2024-05-17T02:34:50.107000 CVE-2024-0648,0,0,e765db4044e052d1da0ceb6682de48302ec32362748433b0a28b107b8f33a1ab,2024-05-17T02:34:50.217000 CVE-2024-0649,0,0,8817af05ac2e9ae88a24a135fe7609a1e8335ab7555312026caa5e9a07edf341,2024-05-17T02:34:50.330000 @@ -241819,7 +241819,7 @@ CVE-2024-0837,0,0,7bfac1e22acffb0a184b593e40514b77abae9f2890782fad20b9317457b8d0 CVE-2024-0838,0,0,42315cf4521d12889912cff1c85a301801b04fdac5417dd948a88540f6fba390,2024-02-29T13:49:29.390000 CVE-2024-0839,0,0,8d88255c4e5443aeff75b477726b775ced865793d0853cdbb79545b2aee78498,2024-03-13T18:16:18.563000 CVE-2024-0840,0,0,9078cee19016ff99f6316d01588830a1de32f2a2e70468f86ffd65c16b6e07e0,2024-04-30T13:11:16.690000 -CVE-2024-0841,0,1,bc28115efe9e531b7366492169aa15f63fa19e200c260297224c2109315c272a,2024-08-27T14:42:46.947000 +CVE-2024-0841,0,0,bc28115efe9e531b7366492169aa15f63fa19e200c260297224c2109315c272a,2024-08-27T14:42:46.947000 CVE-2024-0842,0,0,4210cdc4d6e5b4c77c695a0006ea1b3761c085f39cf3f5e8e834b3dfab9d04fb,2024-02-15T19:11:14.253000 CVE-2024-0844,0,0,5710abfde87264801cb6724b4c6fe48d5e6aaa7ab9e4722684f52ede3f04eeea,2024-02-08T16:15:39.903000 CVE-2024-0845,0,0,e2d64147b9dd7a8d3079a1c37dbd9729e37a9ad5f80b1672f255d14d99a17688,2024-07-05T13:32:05.783000 @@ -242220,7 +242220,7 @@ CVE-2024-1268,0,0,3535bc05eb7cd6037c1775f90518b1602949681d745c741de602c9d81d4b80 CVE-2024-1269,0,0,a76abee2be9909f0abd99b89e430ded39ff1049f1ebeb84a48acd793ed83933a,2024-05-17T02:35:22.143000 CVE-2024-1272,0,0,b4d437cd136cc5d8abdc015e8eb4f6f631c3baee4f3e6fc8647d6a8bbf952472,2024-06-11T17:34:25.347000 CVE-2024-1273,0,0,77e426e491189decb08be6f5f41b23b0e6b37212aa753cdfd723b534f74aeb9c,2024-03-12T12:40:13.500000 -CVE-2024-1274,0,0,3b87bd82e03085c79e6ca7f13846e84c7cf62cb4dd367c2ba5502208ee1f7afd,2024-04-02T12:50:42.233000 +CVE-2024-1274,0,1,f8f7b3b52d888145d0c39dedcf6973ca7bc2bbccc06122fd76d9a28a5b8124d7,2024-08-27T16:35:07.453000 CVE-2024-1275,0,0,95a0e980d47091d0f18245b57293289b11e86ae76da8634b5db343d37a5bd8e3,2024-06-05T15:15:10.990000 CVE-2024-1276,0,0,5efaeac71a6f7c429ba2363a965edbe2ab6bb62c658e6eb49f5a8f8756c23656,2024-02-29T13:49:29.390000 CVE-2024-1277,0,0,fcab6e2e8f9b1f75d9aaae39d5201b9bda4fa39864a91dea7ad9be7bc3ae0884,2024-02-29T13:49:29.390000 @@ -244209,7 +244209,7 @@ CVE-2024-21891,0,0,43cd3c587046828ef679aa8aab18a78abfa7e42f02c7b966a4e2fcb63257f CVE-2024-21892,0,0,b66f3720c2f8a6ca915b3a29134f8ea92c61757569ab02f4e0972950cde5a9ef,2024-05-01T18:15:13.610000 CVE-2024-21893,0,0,5d8ce33d1c55fcf2beea2facee684393ccb80962bcd0328324d1b1c6e19de8a2,2024-08-14T19:51:42.643000 CVE-2024-21894,0,0,99d4be035674fd6f5aa2e0bb3c54ccc20c81ba516b5e4a7075a4f68df66ede3d,2024-07-03T01:46:56.430000 -CVE-2024-21896,0,0,aedc413754244063cac7ac88c06a517124411e990d68f30cb3cebd716039b92a,2024-05-01T18:15:13.687000 +CVE-2024-21896,0,1,e5ee458c4fdcb804ce384ce01bebd179e3ae066792496cc0c6eb52547c53fb06,2024-08-27T16:35:07.720000 CVE-2024-21899,0,0,ea2bec435e523de6db6aefd008c9f2a8d3114c121ab32f7f7c7d657ac45c9cc0,2024-03-13T14:25:02.043000 CVE-2024-21900,0,0,4a0954c4dc8c82825eb9602fc119b1b6a8fa3cc787c21459fb57ecdb0f42c7e0,2024-03-13T14:24:02.157000 CVE-2024-21901,0,0,2e3365239da0866c80c17edf651e9957c764643b06c562ba356a811a2c94a337,2024-03-13T14:23:12.393000 @@ -244254,7 +244254,7 @@ CVE-2024-21993,0,0,bec1cb1a899f83d01555cece7d7239988767e734e499b33253776f6b7390f CVE-2024-2200,0,0,d5a4c544d7b3fb05e31b9bd6329cd0f60f6524be79f4f8737689831ac183f031,2024-04-10T13:23:38.787000 CVE-2024-22002,0,0,3f46bf566ffde9830b437d34f578da579affa782f9e33834d952fd66d67c0a78,2024-07-03T01:46:58.073000 CVE-2024-22004,0,0,b52e7465a30d7c5ebe6c493dd6cc2d67cc064cc642f18d912a28d694a4c404f1,2024-04-08T18:49:25.863000 -CVE-2024-22005,0,1,02fc8069f8978aa827b292cf9e7ba3e738360e5ceb416fadd3312b055dda6bbb,2024-08-27T15:35:04.370000 +CVE-2024-22005,0,0,02fc8069f8978aa827b292cf9e7ba3e738360e5ceb416fadd3312b055dda6bbb,2024-08-27T15:35:04.370000 CVE-2024-22006,0,0,9db530d54f3e0b6eeed21f2d20e1fc7569473f02c8a78e672208ec470c1d339f,2024-03-15T20:15:07.573000 CVE-2024-22007,0,0,2479ced51fb83261e64a00a1f223b2d29fd1fe799fa62b23006611131f326136,2024-03-12T12:40:13.500000 CVE-2024-22008,0,0,6c890483b6824de06d1dd219a50dd94a51e16527823b55b553e6e2498de2507f,2024-08-01T13:46:51.077000 @@ -244481,7 +244481,7 @@ CVE-2024-22259,0,0,1619807ca0dd0d25e590483ba5fe046c92691b86131dda52a5fc321e717fd CVE-2024-2226,0,0,d1bdd7002c5ec8a69fcb10676a03d7f656c6960181e2ea18b4c07683d5e897e3,2024-04-10T13:23:38.787000 CVE-2024-22260,0,0,e3a7574003b5b18daf6b51fa1429cdd15224050e7a447a5b564d582e7ec99a92,2024-06-28T10:27:00.920000 CVE-2024-22261,0,0,e2aaf47933f2c31b10d9c24b8a02f4ff589724ecabd25b937075f097414a083e,2024-06-11T13:54:12.057000 -CVE-2024-22262,0,1,9be2a689a86ef414fbeac1ac9f909b61f22c440769cce8c765f035b3a2b5a24f,2024-08-27T14:35:01.160000 +CVE-2024-22262,0,0,9be2a689a86ef414fbeac1ac9f909b61f22c440769cce8c765f035b3a2b5a24f,2024-08-27T14:35:01.160000 CVE-2024-22263,0,0,f896fa0a79a81d0e9a59972a76bdb3f38491a193f39dfa7074f7f8bf4c5f9aad,2024-07-03T01:47:11.083000 CVE-2024-22264,0,0,da64849d2957217dbd58b402df143805ad49bce0404b0354f2693ab5943acfc2,2024-05-08T13:15:00.690000 CVE-2024-22266,0,0,7a45a562175f1b0e6f06e82f821f4e4994fe2ab78b9077c639f2593436129283,2024-05-08T13:15:00.690000 @@ -244733,7 +244733,7 @@ CVE-2024-22625,0,0,09ba919b555657d9041c71d104040a9638ad2a55d4ac570ca3cb5ff9ca4f3 CVE-2024-22626,0,0,b2d09ee8205b56693dca117236e4222a308d96c05721ec5e28000a67ed25cfd7,2024-01-19T14:40:09.903000 CVE-2024-22627,0,0,7de1240a28417cbc53b0ae0bc15d5725aafb2c30be8715fae81f72db699db31b,2024-01-19T14:38:53.237000 CVE-2024-22628,0,0,c48e2ec55f18b02d5d682e8e3830e76341123221faa60f4082cbda6cff78fe53,2024-01-19T14:33:00.143000 -CVE-2024-2263,0,0,99c9bacabc6e08e73f0d8c338bf9824b2423a516921892dd6360ed31ad0e3588,2024-04-01T12:49:00.877000 +CVE-2024-2263,0,1,a810f756266a9365977cacb5d5b4fe3eb18e8365977682a26dd2cd3ec55153fc,2024-08-27T16:35:11.257000 CVE-2024-22632,0,0,a97332f0b173cc610cbf62f4df4cd14dbcbefc795dfe6e338a0059d8c9ab3926,2024-04-26T12:58:17.720000 CVE-2024-22633,0,0,62bbea01bbc9e791cb93aa09eb03c6d5e054ab6b131ba05c74d3ac37dac5c57e,2024-08-08T16:35:05.543000 CVE-2024-22635,0,0,b93c7bc1d12536d652dcc85ddd79edfb5c7213a29d94f8bd78c761d3d7145598,2024-01-29T15:57:23.770000 @@ -244905,7 +244905,7 @@ CVE-2024-23077,0,0,8f63dd6db7b5e7fcb60e699216bda5b62808ca284359f0bf54d6092ff16b4 CVE-2024-23078,0,0,ee4cbf2c8fa0612860e33eb58b6ee83f820a866a5cff0b624d94739f87f4098c,2024-08-01T23:15:40.070000 CVE-2024-23079,0,0,0ebc4dd979380ec9ace5c9105776106a2e5250b5f5ea58853bd0c8da0ac1d128,2024-08-05T14:15:34.510000 CVE-2024-2308,0,0,5bb2112645629721229497ec215ea65583df40f8b60e0deeb65bb784d4510e83,2024-03-17T22:38:29.433000 -CVE-2024-23080,0,1,f45adee4e0e22336e2755adc7f0e4c8ad553b3c9ddbfd250b5b847f6bae20f98,2024-08-27T15:35:06.003000 +CVE-2024-23080,0,0,f45adee4e0e22336e2755adc7f0e4c8ad553b3c9ddbfd250b5b847f6bae20f98,2024-08-27T15:35:06.003000 CVE-2024-23081,0,0,870c1c4df2360c6a0bcdcbbc7e7323672b70deea175c507823f8849ab5657624,2024-08-01T23:15:40.290000 CVE-2024-23082,0,0,7f8e37bde125a04a1eaaf3decfef35e1714f1ae930ca7f44a95252121f38b18b,2024-08-01T23:15:40.357000 CVE-2024-23083,0,0,713a3a31bf1b16621652d130f79628db8361d2685688b49ccf5933491f8dd58c,2024-08-01T23:15:40.430000 @@ -244952,7 +244952,7 @@ CVE-2024-23135,0,0,b8428fdcbb56cfb80a17bdda771db486dbb0b07c4c46cbd323874ccb2ec10 CVE-2024-23136,0,0,5c7e73e066092a83b6d3237fb70742d894c0f8bdae097daf58d5eb3d71664289,2024-08-01T13:47:08.767000 CVE-2024-23137,0,0,e38360629fd5316dc25f01b3adbeeaeb2a102d1cf7fe7360395ce3bdac530db2,2024-08-01T13:47:08.943000 CVE-2024-23138,0,0,e0f4f2e5ef17e299025d281e58309c014f216157aaa52c6bd6804d42fcd2c87e,2024-08-05T14:35:03.603000 -CVE-2024-23139,0,1,c6ab92f0bc6413ab402aabfb5f0b8d2a7cc203cc3ea13e79ae5fdc5c95249dd7,2024-08-27T14:35:02.770000 +CVE-2024-23139,0,0,c6ab92f0bc6413ab402aabfb5f0b8d2a7cc203cc3ea13e79ae5fdc5c95249dd7,2024-08-27T14:35:02.770000 CVE-2024-2314,0,0,3b71d263c7a4c3dcca8be42f39bd5f8b12c090fb88deb907348937dd04f5eb6e,2024-03-11T01:32:29.610000 CVE-2024-23140,0,0,5880ade88028c79d39a927f070e37e0f639c65305e423ff522539ca095faa88c,2024-07-03T01:47:32.750000 CVE-2024-23141,0,0,4fb29a5afa16fb29b24bc9f0691e8fab3bca8453a3f652aef89ff8f784397309,2024-07-03T01:47:33.010000 @@ -245033,7 +245033,7 @@ CVE-2024-23230,0,0,ddbb7859b4c1b994076995e0f94a6c532d5346bdce5f3bbe28c8464827620 CVE-2024-23231,0,0,0c006833f1467b383e93b7d07c3cef0ebd7c088db978ea80541620978106cd1d,2024-03-13T22:15:09.780000 CVE-2024-23232,0,0,9e7b49448cac16c45fbeaf042c9f71b2d8db550fb449e33aa9abdc891de85b63,2024-03-13T21:15:56.087000 CVE-2024-23233,0,0,313670ac068b12d9fa516d4a3c082e80e45b5e5dbe4efd3c4e89ac3ce5144465,2024-03-13T21:15:56.140000 -CVE-2024-23234,0,0,c787fd9b9dd5b8b66257c96b28ad978afb2adc11e7d4d94f50f7a42ebc673053,2024-03-13T23:15:46.387000 +CVE-2024-23234,0,1,cf9cee47c5ddf4443c90581bef409e0907a72ec2106ee4166332684023ebc090,2024-08-27T16:35:08.620000 CVE-2024-23235,0,0,8475456fe966a8434d45c9ecd97011b49e7b6d9a91cff5dc02bc68aaf295e889,2024-08-01T13:47:09.287000 CVE-2024-23236,0,0,35e1e8394e7b9f6ad4331abd77ccd4bc245703e2c3f094e21b2b9f6f0cc432ae,2024-07-03T01:47:39.753000 CVE-2024-23238,0,0,fd48b8741b126bfeb7cfbf18403f943f7768e37b33d158371b746f6d71b99a91,2024-08-05T20:35:04.390000 @@ -246848,7 +246848,7 @@ CVE-2024-25984,0,0,64e548d2e443901531a9ec1085e1856812a9a54d9d7ebdd08a9f652f3a062 CVE-2024-25985,0,0,08229a37145318c68750c211332095ba60f9ade88045aa0b42eccab31abdb3df,2024-08-26T16:35:04.610000 CVE-2024-25986,0,0,c0fd87c623add3d58f4f281ccbdef7a052606faa35f4b725e1a1b168564f1b9e,2024-03-12T12:40:13.500000 CVE-2024-25987,0,0,7a68506c14769106fda0cbfc1db625699c9547a7f9a994c056fa1a40c1bf6a05,2024-08-05T18:35:08.657000 -CVE-2024-25988,0,1,4d3755e0cb58d1efcbf1b6d7ecbada9d6035144f60554212c375d75d29d795a6,2024-08-27T15:35:07.483000 +CVE-2024-25988,0,0,4d3755e0cb58d1efcbf1b6d7ecbada9d6035144f60554212c375d75d29d795a6,2024-08-27T15:35:07.483000 CVE-2024-25989,0,0,14738c46f94e94e6b7897446658f285f8e9a188c6fec45e970fce017c50eb02e,2024-03-12T12:40:13.500000 CVE-2024-2599,0,0,448bf984845294b825ad64c45fc7ff6a1a97b88712ab8f0c7b9899ecc5e48ad8,2024-03-18T19:40:00.173000 CVE-2024-25990,0,0,05042610d9d9eeed77c351ef8461507e7363f5a24856c830f88125ac3a7bb105,2024-08-01T13:47:57.997000 @@ -247263,18 +247263,18 @@ CVE-2024-26584,0,0,b597b599653418f7682e05a48ac87f8ec9a159060eca2ba491d02ef72cab8 CVE-2024-26585,0,0,eaba527a2ddad5815bcc8432c559919a1a7d810191d06db0533030acbf4f06f3,2024-08-19T05:15:06.110000 CVE-2024-26586,0,0,826e0ed74f810a049018aa7ac4a8695339d74226076dfe9c62b30b7fc11ca243,2024-06-25T21:15:57.593000 CVE-2024-26587,0,0,9dca22a8a37d1668929240c0c9db89fcaae919cf408e5cec954b7d1091ca09a2,2024-03-18T18:09:54.027000 -CVE-2024-26588,0,1,9ed620fb621ad611f91c56e077ca31ef5f1fa80cc80c5c36aa3fca4bedb492e8,2024-08-27T14:36:28.117000 +CVE-2024-26588,0,0,9ed620fb621ad611f91c56e077ca31ef5f1fa80cc80c5c36aa3fca4bedb492e8,2024-08-27T14:36:28.117000 CVE-2024-26589,0,0,64031e6d525fa239ef3f3e1b31f353809196642c7d38c16c61929d0a520618c3,2024-03-18T17:56:56.953000 CVE-2024-2659,0,0,b83fd8ab8e061134bb60113327231a109e3796c337cb9867ba6104dc42d78ef5,2024-07-11T15:05:36.393000 CVE-2024-26590,0,0,5300f92a19438a9feba95e1aa849020c59bd00e172dd6d94ca25e0ceea0cb4ea,2024-03-18T17:54:20.197000 CVE-2024-26591,0,0,eb0a3c66f6a49ae190790e205fa0e2119dd24168357815f2640981150dad6a41,2024-03-18T17:54:44.267000 -CVE-2024-26592,0,1,918f5c467e1a2d783dfdce08bbf11395643ada4c163274488d6a9fdec073f659,2024-08-27T15:35:08.400000 +CVE-2024-26592,0,0,918f5c467e1a2d783dfdce08bbf11395643ada4c163274488d6a9fdec073f659,2024-08-27T15:35:08.400000 CVE-2024-26593,0,0,54b53ee93c92dedcf04b4ae324bf5b755d7c944df0f43f1bec441c0daed5c72f,2024-06-25T23:15:24.260000 CVE-2024-26594,0,0,dad03aada11e4c84f5ce999bb3d6fbaa8ac08117884246f49c61d689ab3164c3,2024-05-29T06:16:36.423000 CVE-2024-26595,0,0,b42513cc313bb8606b1586c4189fc0db79930dd6ddb603f1fb221f36ccadccd0,2024-04-17T19:55:31.323000 CVE-2024-26596,0,0,a95c365bb8aa86f65ccf48ab078f1b584d1d4007c2aa74b6e9891b14dbdc0efe,2024-04-17T19:54:59.240000 CVE-2024-26597,0,0,ab528d9508a4a43c1bd633754ae26c95fecf70fa3f069dcff05111c73d87ff04,2024-06-27T12:15:18.200000 -CVE-2024-26598,0,1,1e518e82505097e7b8cfcdf7448800a539eb76e006eac697ca8f89d65bc9d900,2024-08-27T14:34:41.740000 +CVE-2024-26598,0,0,1e518e82505097e7b8cfcdf7448800a539eb76e006eac697ca8f89d65bc9d900,2024-08-27T14:34:41.740000 CVE-2024-26599,0,0,6aea73e570b1bfdda9488cab227d897f6bf1c7ed921862f42cf866fbae061ada,2024-04-17T19:34:01.837000 CVE-2024-2660,0,0,30de4ced2d970123d5a152ef3fee196b1e08912beaeb91db0d268dde56b9d881,2024-06-10T17:16:25.443000 CVE-2024-26600,0,0,15667b54419b74d13bfaebbe5a6d6002dfe7c4fdc4d02b07defbd604b0f0ec30,2024-06-27T12:15:18.347000 @@ -247924,7 +247924,7 @@ CVE-2024-27204,0,0,21c5c3d644ab35ec9e83742f3138cff8265e6d21b8f7f41fe9d62eba43137 CVE-2024-27205,0,0,ecf8d36db8174c05cf70fb705e25fbf6dd7547ea04c1bccb1a45d9ac9fe3d652,2024-08-26T16:35:05.400000 CVE-2024-27206,0,0,3dbcbfbe90f7ccf1cbfa262db765dc01c5f5c5d064d48875899ccc34bacdeafb,2024-03-15T20:15:08.743000 CVE-2024-27207,0,0,9c2ba1f8859e635c52bb4f64d4b0a04f4cc6d5d084308215e2bb1b9341c49fd3,2024-08-05T18:35:09.463000 -CVE-2024-27208,0,1,b9c303c340845424369628aa61a96b5551f82ce7ac653714cab34929026920e5,2024-08-27T15:35:09.323000 +CVE-2024-27208,0,0,b9c303c340845424369628aa61a96b5551f82ce7ac653714cab34929026920e5,2024-08-27T15:35:09.323000 CVE-2024-27209,0,0,88724fb64803101f437886fbfbe86fa525a1caaa815e888f256e5571c93f24a3,2024-08-22T20:35:06.747000 CVE-2024-2721,0,0,c7dffe084f91bae26b936c1afd1da9c04f9b37aef98b6753f280b03d8572eb4e,2024-03-20T13:00:16.367000 CVE-2024-27210,0,0,745478bdb4403a82fac13021bc89339c878beb6d9492b165b8482fafb3cfd461,2024-08-01T13:48:18.507000 @@ -247942,7 +247942,7 @@ CVE-2024-27222,0,0,628d34a7a6bc07d71cb2e1c85581ef034de82cd46a15b7c424080a08ed0a0 CVE-2024-27223,0,0,cf3a2ced12b4a3bf155534028aaccdd6d95cd0b4d2f10d3ca759d3a4dee62fdb,2024-03-12T12:40:13.500000 CVE-2024-27224,0,0,a3ab635f09865455059477937ba40dabd5c75c049ca5d090f69e7a764213aabe,2024-08-01T13:48:20.053000 CVE-2024-27225,0,0,aa18bff66f03b0f275eac87bd5ea1a86e059d41f5a0861894165d74704434328,2024-03-12T12:40:13.500000 -CVE-2024-27226,0,1,09f15816885dbcfaf6362ca8e72640a49144f9653a0b3d4a746337108ce37a78,2024-08-27T15:35:10.130000 +CVE-2024-27226,0,0,09f15816885dbcfaf6362ca8e72640a49144f9653a0b3d4a746337108ce37a78,2024-08-27T15:35:10.130000 CVE-2024-27227,0,0,07bb188ed9b66fc7fd965d8a240bed8b19d74680ddaf7fc1bf461b043fbb3889,2024-03-15T20:15:09.153000 CVE-2024-27228,0,0,085b2888b9a3ea0ac5416508debf1f7f29728086a3efd3846db9b0b4ae138fe6,2024-03-15T20:15:09.193000 CVE-2024-27229,0,0,b8b459ee0fc242831e7e68eb1fe9ed70ba0320038a180145828d0bdce79101e7,2024-03-12T12:40:13.500000 @@ -247953,7 +247953,7 @@ CVE-2024-27232,0,0,64ecd9a830c9b30b766707b244dd77aa970adc2152fb16fddd12d23820ace CVE-2024-27233,0,0,4f805b66de1371a2d4417bd116c04ac1324a59b0f4fedad25c9d0195537442f4,2024-08-05T18:35:11.120000 CVE-2024-27234,0,0,7f9c430bb757ad526adb7918516acd55f167ec46b27604bd9833832e0b615b90,2024-03-12T12:40:13.500000 CVE-2024-27235,0,0,ca7df1b3186edf63083ffa451556ee8cef5481ef83fd54ad47ed09114ed183d0,2024-03-15T20:15:09.253000 -CVE-2024-27236,0,1,42db3b0d6114a0f284786f77acfa731b447b1bbb3d017aeb40a796e6668e1514,2024-08-27T15:35:10.943000 +CVE-2024-27236,0,0,42db3b0d6114a0f284786f77acfa731b447b1bbb3d017aeb40a796e6668e1514,2024-08-27T15:35:10.943000 CVE-2024-27237,0,0,229917a4428117370a5145466e677b0c72a40fdcb37122ac8c08e36ef5d19033,2024-03-12T12:40:13.500000 CVE-2024-27238,0,0,d9ed436433ab3962c23812e126d692cedc24517358f04b11084f029c27336d14,2024-07-16T13:43:58.773000 CVE-2024-2724,0,0,660610afdb28f5976ed634f2a472d2022e02ebb5bc503c73eac1e0b96d741829,2024-03-22T15:34:43.663000 @@ -248158,7 +248158,7 @@ CVE-2024-27455,0,0,c38321d72349de04fccc31003825775edb49050b2ce63013697a3990ecbe9 CVE-2024-27456,0,0,f0d8fb5a803e9956fe6ec256a4dcc4781b2e19a5009cb66a9854d4478f56dbb5,2024-08-02T19:35:26.123000 CVE-2024-27459,0,0,bce97f3eb834dcc00c74dfb6abf98ffc5071ac70577037f22e6e9d74d3163f62,2024-08-23T15:35:05.310000 CVE-2024-2746,0,0,35843c152725b889a25545af99dfcef9305aac3bf18b4d5c5f191a6ec8073990,2024-07-12T19:15:10.640000 -CVE-2024-27460,0,1,f0b57ff5055bb6030ef4648bdd57a51aa01e0828deb080ab3b3797ea42309cf7,2024-08-27T15:35:11.743000 +CVE-2024-27460,0,0,f0b57ff5055bb6030ef4648bdd57a51aa01e0828deb080ab3b3797ea42309cf7,2024-08-27T15:35:11.743000 CVE-2024-27461,0,0,83200339849c667dd1cd4bd0556f4efc2604389396d332cacf0f552a26b6351f,2024-08-14T17:49:14.177000 CVE-2024-27462,0,0,2177b080bf16597b1d3af90d404590cae7bb441b9367c276a25f840d3e6c7f9f,2024-04-14T23:15:45.830000 CVE-2024-2747,0,0,baae2e4ad262224b7bd783539f8781ff29c46a1f8cdc1bd24812f0d29f991485,2024-08-23T16:30:43.417000 @@ -248242,7 +248242,7 @@ CVE-2024-27665,0,0,3c0376bef74ec104ae9e576bf0056bbfe44e5fa1dfca5250d88c2d80053ed CVE-2024-27668,0,0,83812e5b7351af56910d0d9500cb35178dc5f04a739d638612a766a6dad32723,2024-03-04T15:35:25.673000 CVE-2024-2767,0,0,0bf7785127743211b004b316b19cc2da72c8338b0475b0f75d892aa6611c2d01,2024-05-17T02:38:29.110000 CVE-2024-27673,0,0,b827936180312254f56c8c18e1a9e00f4dbc9d441e499ec6aaa928d4b3451535,2024-04-03T16:15:07.173000 -CVE-2024-27674,0,1,c096f75bf95fad99894d969d63b9c2eda9be2f68970ce18cd2cbad99257a0b7d,2024-08-27T14:35:03.233000 +CVE-2024-27674,0,0,c096f75bf95fad99894d969d63b9c2eda9be2f68970ce18cd2cbad99257a0b7d,2024-08-27T14:35:03.233000 CVE-2024-2768,0,0,0b84ff7a8fc27bec621c4b70ea2ffe24b05256a8731b19de5edef9f22c9c6afb,2024-05-17T02:38:29.203000 CVE-2024-27680,0,0,04311f4d03420b2c1425da98e63f040cd24e3866a5e41c11e24fd3b4f68152b8,2024-08-15T21:35:11.063000 CVE-2024-27683,0,0,907eeb18dbdd6bbefaa7b9be484cc98a16f164c9a600e2bae77550cea0d2db2c,2024-08-14T19:35:21.653000 @@ -248283,7 +248283,7 @@ CVE-2024-27746,0,0,25c5d1637666144aa24b9e78e08712d087d46315d29be0eb97ff37efb1a89 CVE-2024-27747,0,0,43ca1ef187762467880e06e47b6be069096be41453e51c48b4193416f6039e25,2024-03-13T07:15:36.523000 CVE-2024-2775,0,0,46caf5afd9e0a541c7aee346d23d915891b1af22a996efec3edfa49253e458bb,2024-05-17T02:38:29.683000 CVE-2024-27752,0,0,b5e0902297e1d9d8f0b79a5fa02c330bc4447f06ee56b81e4776b650e157a62a,2024-07-03T01:50:45.653000 -CVE-2024-27756,0,1,b54fd87749d37213a5160438750b0b47b1fd109b2bd115842befad1cac3815d4,2024-08-27T14:35:04.107000 +CVE-2024-27756,0,0,b54fd87749d37213a5160438750b0b47b1fd109b2bd115842befad1cac3815d4,2024-08-27T14:35:04.107000 CVE-2024-27757,0,0,cd3b5b6b7fe57179d531119e33f0f74486d4fc8f97f5ac96ca27aa14ec09cd7e,2024-03-18T12:38:25.490000 CVE-2024-27758,0,0,ba2c7d76bfd93e40eb7f7d926c194a5a790033558362c55118c9cf0ef65f7b50,2024-08-01T13:48:45.070000 CVE-2024-2776,0,0,62c920cc6123160df22ca75c69a8df7e03cd4eccbdac81567ba3cd3f226ecbcc,2024-05-17T02:38:29.783000 @@ -249406,7 +249406,7 @@ CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f3 CVE-2024-2942,0,0,df11b58be940727b4679e167fb2c13b9eb7e603ddfc660919e5e8d815e396a72,2024-05-17T02:38:38.500000 CVE-2024-29421,0,0,c6dafd45a8c53dbcd9097903b14403adcbaf4c0772c34ab01e88eb134a14b126,2024-08-19T18:35:07.660000 CVE-2024-2943,0,0,f4b6ad287b4a622c4b41944858fa2f89e0fbf42a503dbbb6e34a72b168b98f48,2024-05-17T02:38:38.790000 -CVE-2024-29432,0,0,f1924d827bda5c2f21240d1e0d34760e21d63eb9bed07776f47d0288afb9aa18,2024-04-03T12:38:04.840000 +CVE-2024-29432,0,1,1f40369b53faae4e5d7b1d21dfb652ce13f2ec8046b060be84a2ef35a51b0061,2024-08-27T16:35:10.203000 CVE-2024-29433,0,0,1d2b8851aa0f5fe2986e1714c213ddc2e530a38e6018ee3fbc359ceb0627168a,2024-04-02T12:50:42.233000 CVE-2024-29434,0,0,2d35bfe8233ada26f52a8aa24ec4bb94ada1e07f5e74fe641dc47a96ca48d619,2024-04-03T12:38:04.840000 CVE-2024-29435,0,0,875cbdaf24fc385b5e7a9e6b4648f22f1ae4b6f76f07a45f82a4354af5229b55,2024-04-02T12:50:42.233000 @@ -249504,7 +249504,7 @@ CVE-2024-29742,0,0,296dfcc3feebba56361030121323e265cdbf5893e710d89e0c2dbff0b28f5 CVE-2024-29743,0,0,84c45acac68285953d0f847d89629f6df4afe2ae0557e844a739860834244671,2024-04-08T18:49:25.863000 CVE-2024-29744,0,0,261c7417210a4d10590c39459d063b6a3382c5fabd76d0ef2ba580fc9b59de43,2024-04-08T18:49:25.863000 CVE-2024-29745,0,0,40250cabd067f394dda6fb03fe08d83fd93611782b23244c4a5077110391f2e7,2024-08-14T16:59:22.427000 -CVE-2024-29746,0,1,e8b3ba99fcdc8897610d1b7db4ca55c1c26a70bf988c543b9680a50462c3b0e9,2024-08-27T15:35:12.773000 +CVE-2024-29746,0,0,e8b3ba99fcdc8897610d1b7db4ca55c1c26a70bf988c543b9680a50462c3b0e9,2024-08-27T15:35:12.773000 CVE-2024-29747,0,0,a9bb38ddde46ade8292f525e19d236b5bd174a30f99b61fb435143ca6b2dcbce,2024-04-08T18:49:25.863000 CVE-2024-29748,0,0,96767832c3cd8bcc7713d77da33946498c08ad89c922c3cb2ab003c983f6b2f2,2024-08-14T16:58:53.233000 CVE-2024-29749,0,0,8a7e6237bf5dc8c5dbffc0cf5683dd39781e31dc868515daebcad93f5f9b5cad,2024-08-20T16:35:07.913000 @@ -249701,7 +249701,7 @@ CVE-2024-29933,0,0,a2e3d1cf5c50df2ac8175fafc642d7883c46bae57acc8a66654cddda0ffe6 CVE-2024-29934,0,0,603ea29f7cb90bc84b60c254e2a54847f63d77d764b8ecb0fc2099441a608e41,2024-03-27T12:29:30.307000 CVE-2024-29935,0,0,2df58335532d2e0910d7fe960733b7807b7534e2adf23696be83fbb2aa39d74d,2024-03-27T12:29:30.307000 CVE-2024-29936,0,0,92849cd372884d285333ed69741c55a39f25096328d4160949a4c94f43a34be2,2024-03-27T12:29:30.307000 -CVE-2024-29937,0,0,c7f79bb66b1b76e31100663df029b47115e7175f6bf73f0994a3658464c2f875,2024-04-11T12:47:44.137000 +CVE-2024-29937,0,1,cb939420c8aa9def2c7d8c3ddc741ff1105375d352c7fe1c0b407f39d0286abc,2024-08-27T16:35:11.020000 CVE-2024-2994,0,0,aaaf2c75d5a02f7deaf00b12c93e19a053ed46c0dbf5e453ed92362aa436eaf9,2024-05-17T02:38:41.503000 CVE-2024-29941,0,0,5268fd2170dfcdffdb652336d23b2a74b8e628a596ea4475ef9d929015e3feda,2024-08-01T13:49:37.723000 CVE-2024-29943,0,0,77fce75b3b79190c7987459c64d58a0451f9c8cb7178727b76412299d4b63e02,2024-08-12T17:35:03.860000 @@ -249710,7 +249710,7 @@ CVE-2024-29945,0,0,545d8d8a5d454680f75ae96bc2bf76a65720f53d27f04c08caf122c1f6350 CVE-2024-29946,0,0,140bcfc073bda94d7ef4639048c1485e5634c470063153e21df7be99b584ee7c,2024-08-12T20:35:03.383000 CVE-2024-29947,0,0,5ce72939d2768b5ffd8ef75fa59eeac4277e1fd0f98f69cde2fd39c4873b7e51,2024-04-02T12:50:42.233000 CVE-2024-29948,0,0,7ed27d99c23307d6fd7f79bc81ee07d6524ce20c9d05b450c959d1b570daca5b,2024-04-02T12:50:42.233000 -CVE-2024-29949,0,1,8f69a1b2712eb97f7e6695f2c2705447de624d6bcea7462b789eaee89a32183e,2024-08-27T15:35:13.560000 +CVE-2024-29949,0,0,8f69a1b2712eb97f7e6695f2c2705447de624d6bcea7462b789eaee89a32183e,2024-08-27T15:35:13.560000 CVE-2024-2995,0,0,5c930568d7253585b775f810f84df45baf66709200c70b2d2468f14a6758b594,2024-05-17T02:38:41.600000 CVE-2024-29950,0,0,9160d1bdf3252c379c3a5b7b30fcb4dec34616c1033f3f635941b6a0b940cac7,2024-04-17T20:08:21.887000 CVE-2024-29951,0,0,bacd2051eba9cb1cc9c1188b592f1312a74729a3132d53c6e0e332937214c662,2024-04-18T13:04:28.900000 @@ -250300,7 +250300,7 @@ CVE-2024-30564,0,0,5b72a00e1c04b6fa93ffaa761b95fbd264190bcd29898850fc62b4910b45e CVE-2024-30565,0,0,3bd2e856e06d3e3fe9f747497d3ea242e07c951fa4c500c8b76a56b8bcb712e0,2024-04-04T12:48:41.700000 CVE-2024-30567,0,0,f2a4d1211b738fa363bb6c48ea72578b3372d81c87f66a2aa1c7f2df3ee8bec0,2024-08-01T13:50:09.870000 CVE-2024-30568,0,0,44c25f2577fa5438de7f51a90d4ade231e906e1e0fac9c82f2eeb8db8041cb68,2024-08-21T15:35:06.717000 -CVE-2024-30569,0,1,d1232d2fff132152976a2834ea98d5f033f65e7554f5a22412d98913c4904d30,2024-08-27T15:35:14.373000 +CVE-2024-30569,0,0,d1232d2fff132152976a2834ea98d5f033f65e7554f5a22412d98913c4904d30,2024-08-27T15:35:14.373000 CVE-2024-30570,0,0,caed104332716a7853dfa2ec0af0a5363e33ead1c7830017a6995784a2222c35,2024-08-19T20:35:12.990000 CVE-2024-30571,0,0,d0b0ce739c22bcaf56190db28e9a8c1e2be7759ce3e5fac8f0fae70b3abe2c6e,2024-04-03T17:24:18.150000 CVE-2024-30572,0,0,04b75791693e289b4034f3fd29a8b35bcf61baa8fe2d36e853f3fe35bb0c8981,2024-04-03T17:24:18.150000 @@ -250460,9 +250460,9 @@ CVE-2024-30861,0,0,6311d30f796f82bf3d64d6fdf692631cac6a43d1f01e8d19227025fedae3a CVE-2024-30862,0,0,2f8ee6d6575c950abdb75d61397650796104ac283158fac245a38cdac1f61216,2024-07-03T01:54:14.183000 CVE-2024-30863,0,0,752ea16078bb63c47f206209c0fa643692a30c4ca55b96c3971f17949cd6ccfc,2024-04-02T12:50:42.233000 CVE-2024-30864,0,0,e04c733145e51290e0b4b760b29d1c4c2f4d6a6d5789b7b3dce3f78c10b78a59,2024-04-01T15:53:18.060000 -CVE-2024-30865,0,0,254c862cd6b795574f44fcd6ed5d7af8cb41f2d7e569e6e109eacda39d99bdce,2024-04-01T15:53:18.060000 +CVE-2024-30865,0,1,086ddea3051d95c24fd9bb62d2d2002b68b5fa407fb1d02593ab6a50d2ae94d8,2024-08-27T17:35:06.970000 CVE-2024-30866,0,0,fbc7fee320d7c2e8e3f30de496723c97a0df95b09f2b3b6897107e3f849d418a,2024-08-01T14:35:08.350000 -CVE-2024-30867,0,0,fbf3f5ca73df140136450e529bc316e8848d5d3ecfcec233c1b829a9bf6a2c80,2024-04-02T12:50:42.233000 +CVE-2024-30867,0,1,10db6a2918480cae65cfe287f5279b549ccab3273d6372c5f100fc7f7de51fc9,2024-08-27T16:35:11.577000 CVE-2024-30868,0,0,40572fc00d47dcab0a02e3b982268eb31daa0424a9f9ba994981729836c30bef,2024-08-01T13:50:30.630000 CVE-2024-3087,0,0,69d2e87c7c87bdc5c6a0aa1788aa50fe5b44316fc88ba1cd34f51a4a48534d4f,2024-05-17T02:39:42.787000 CVE-2024-30870,0,0,30e1e140bee6b30095d3a05cd84fe8f82c3aa6e140f2eb4d0b7d811e3ca16636,2024-08-16T19:35:10.750000 @@ -250528,7 +250528,7 @@ CVE-2024-30989,0,0,e9ad3f0fd7b020db169e00582a63ad0d4a4ddd2830c93dde81a132eb7fa93 CVE-2024-3099,0,0,df7fc1fafeab5e6abe2dc41108eea9b5e0baaaf382657013f126d487be466964,2024-06-07T14:56:05.647000 CVE-2024-30990,0,0,75078c15117c3d94d275d45a8f694936bc8470fa4ed9b39cfc5d97a4cf718730,2024-07-03T01:54:32.807000 CVE-2024-30998,0,0,57a3e20b2db27a64aaab3601a5ceeb1ef9f704ed4059172be2576aa4d50b912e,2024-08-01T14:35:09.133000 -CVE-2024-31002,0,0,7f5ec80366933d2a8d8374c6c5487fd6c9116c6b3582b5408d061002d49ccb1d,2024-04-02T12:50:42.233000 +CVE-2024-31002,0,1,91060d363efbbd57c96984ebcb08d042f61fbe28b157d9f0ed5ab606981c65f7,2024-08-27T16:35:12.380000 CVE-2024-31003,0,0,4468ff6139dffd902d54dba282442b03643ad92e636b3ecc84e56f5157573f49,2024-08-01T13:50:37.813000 CVE-2024-31004,0,0,4704ee13f9f534d8c7bace10a79d7d4280ca43ae0178f7a716eda9d0db56ea6c,2024-04-02T12:50:42.233000 CVE-2024-31005,0,0,045b5d5570cfb671aba58425d476f29fa3e750f6d99363d9b536e986ebd3831d,2024-07-03T01:54:33.603000 @@ -251509,7 +251509,7 @@ CVE-2024-32492,0,0,b8f37fd95afd9f3c0db9b82f19324f4f73a560600fb9ed3392952c1c91bb3 CVE-2024-32493,0,0,ffb6c116d41e9a5c89f19db9ee55928315a8849f99630d88960b7d23ca7c5aa5,2024-07-03T01:56:39.257000 CVE-2024-32498,0,0,906a6af4f331d76dafce3172b342bad5a72acec04065280273f5a351dbe47aff,2024-07-08T16:43:34.677000 CVE-2024-3250,0,0,c5f4cddd48066fbb0c4e0be3eeb988cdfc41e3f2cb53a12d5a0c784e567df5aa,2024-04-04T22:15:09.350000 -CVE-2024-32501,0,1,d42ed0435c08425f1f3c26cf3652d7447e84f5c1d3745ddf8954f1f688bd1c7e,2024-08-27T15:35:15.213000 +CVE-2024-32501,0,0,d42ed0435c08425f1f3c26cf3652d7447e84f5c1d3745ddf8954f1f688bd1c7e,2024-08-27T15:35:15.213000 CVE-2024-32502,0,0,6c01a3b4b5868656f3d57f70bafd56da976a1e8c28c0eec374ff444b607fb7d0,2024-08-08T15:35:08.940000 CVE-2024-32503,0,0,c69792145ae689a248325da35f7a774598c93088c517597b4569240a45140901,2024-08-19T15:35:05.037000 CVE-2024-32504,0,0,3994b5718a6a88903126308cc0ea3df60ba5aeb7ee0f236d9b16b618e0fabb55,2024-07-16T14:59:17.967000 @@ -252354,7 +252354,7 @@ CVE-2024-33668,0,0,1057e9899f3d071fbe9469ff4d64f06b263f71484eb3414fb82aad54f0a34 CVE-2024-33669,0,0,9f9e4923b29b77e4df7ed4bfab7ff189f9617396636ad12f3335720e7b3f148c,2024-07-03T01:58:35.420000 CVE-2024-3367,0,0,3b87f70833bb8ccf4c6d89027b50770ba7c3694c19e37821dd6ef423c5078200,2024-08-26T10:15:05.743000 CVE-2024-33670,0,0,3abc3d385958341e24c9eda52dec235106719c4d891dda10a7a17ff0ec58be16,2024-07-03T01:58:36.127000 -CVE-2024-33671,0,0,5feca8f352d561cdd0e0c6bac5759d95e299a4747d95bc22a8db29940e7c5bd1,2024-04-26T12:58:17.720000 +CVE-2024-33671,0,1,da512eb4b4b39df9e16d537dd03b866e635e50cab6e0152298a79bb951dc071e,2024-08-27T16:35:13.193000 CVE-2024-33672,0,0,4f42606374298c39a17dbd38700642945b2e9bef08fd2b3fd4fad590404e973d,2024-07-03T01:58:36.807000 CVE-2024-33673,0,0,2e121fa93cd95e243645b6330a6810a785d78928d9f086479dd41d632f236bd8,2024-08-21T21:35:07.123000 CVE-2024-33677,0,0,c3a699c048bec4cee3b4b765cde86a17d71ee190ed8c41ad782a7d14e4a12a52,2024-04-26T12:58:17.720000 @@ -252611,7 +252611,7 @@ CVE-2024-34044,0,0,3bf550daebff9661b99c320a41c6714394baf6dc397c76dfc83e0b8999ac3 CVE-2024-34045,0,0,79bd65de67c0efbec24a2f08a1536c9cc87b90b692934d062800de780d7b669e,2024-07-03T01:59:18.230000 CVE-2024-34046,0,0,f73242f7ce8897c5bbd98d195e89132a4762c31a89e2f72113a0de4a94d57e81,2024-04-30T13:11:16.690000 CVE-2024-34047,0,0,d278045b22ae0bde5d9e46eaff17ca66b76275ec6418fad33318eafc0f70a003,2024-04-30T13:11:16.690000 -CVE-2024-34048,0,1,6bcfd91d2ac0aad4340ee02989fa8d65e252733c090996087cd8967c875f55f4,2024-08-27T15:35:16.013000 +CVE-2024-34048,0,0,6bcfd91d2ac0aad4340ee02989fa8d65e252733c090996087cd8967c875f55f4,2024-08-27T15:35:16.013000 CVE-2024-34049,0,0,3df614830d71e8ac5fba93ebf68fe707e589f258fbe295336d0f23b1e1107caa,2024-08-20T18:35:06.130000 CVE-2024-3405,0,0,1a36e7936640d8ee3b950dcf5e1524049898a441fb6f4e16f7e747a8431e73fe,2024-05-15T16:40:19.330000 CVE-2024-34050,0,0,44c48f4071fada74be495a02e6832030ef2b56f478d8d3c41b6b32ec804128b6,2024-08-01T13:52:14.410000 @@ -253257,7 +253257,7 @@ CVE-2024-34992,0,0,9a2f44bcac614c82fb508eea2c914f5d30212ef74c3e81eaf50515aa083ed CVE-2024-34993,0,0,81b5a85cd601330e9d221818372d97d425a5f614838f1e2bea50164df4a9376a,2024-08-01T13:52:30.833000 CVE-2024-34994,0,0,2a57fa5a48b91cfc9175994b09415b4e2c46f84fdbe6aceded93bada909a8bfe,2024-07-03T02:01:10.570000 CVE-2024-34995,0,0,c5ae887edb3d68f5b17625c821aa1f4eef9c82bfd086996cef9a6f896adaeedd,2024-07-03T02:01:11.353000 -CVE-2024-34997,0,1,5fbdf010972a8268fd5a9463e95189eba51629c3cae1b641fade25965bb6360c,2024-08-27T15:35:16.800000 +CVE-2024-34997,0,0,5fbdf010972a8268fd5a9463e95189eba51629c3cae1b641fade25965bb6360c,2024-08-27T15:35:16.800000 CVE-2024-3500,0,0,65f7cd29cdae6ff6308db5dac7c1e408d4ae13919a645c3f45d14d5a6eb829b1,2024-05-02T18:00:37.360000 CVE-2024-35009,0,0,3fe7a6685d547c8f13c78e6aa6b52334336d0dbec9afe2301a9c305ba9814939,2024-08-08T15:35:12.080000 CVE-2024-35010,0,0,6e4b79d2c02224bc0070ffd30b8ebbf9821b5f9a967abd7e45b682dfed020dc3,2024-08-20T14:35:18.007000 @@ -254193,7 +254193,7 @@ CVE-2024-36264,0,0,14c280aba5df11c6b2ff8e262101089437d0333d307f52ff751b574a69563 CVE-2024-36265,0,0,3c8ae8461757f224b0e43678d6a3475afd39b129c52679abb832e768cb65918d,2024-08-02T04:16:59.920000 CVE-2024-36266,0,0,9d2961d489b0fce568e04e4c1c269f16c8c57dd6d267e14663bd78f27bc7e154,2024-06-11T13:54:12.057000 CVE-2024-36267,0,0,66b127f77fa5a54e7fcd6fbeddc446c0aeca670a52e22fd99c771e136e0935f8,2024-07-03T02:03:00.383000 -CVE-2024-36268,0,0,043d5e00f7bba001fc819462941e5679cccbff624823c585768e8f325f4d2d8e,2024-08-22T20:35:12.037000 +CVE-2024-36268,0,1,506bdd503241b054b98e469c8190767746cc55f82420c89947b6255b68cd420b,2024-08-27T17:19:43.653000 CVE-2024-3627,0,0,b89e9f2ca530f3e52199f8e236751735781433429621317f8b9fc4faa8df3d5f,2024-07-15T17:12:17.763000 CVE-2024-36270,0,0,d3b5ce010e9d2d0e421a800ff03990b2f8e8f91530ab5a32d5bddc378cffae67,2024-06-21T11:22:01.687000 CVE-2024-36277,0,0,94264d57b475e2e31a7e48502c2a39dffb9729ea0c8a56f3b75bb7d3d5d2006b,2024-08-02T04:35:38.880000 @@ -254708,7 +254708,7 @@ CVE-2024-37121,0,0,f38dd3795bb34ab592f0837185cc69e5390fe6be6ea0a7f8fed8aebfe54c3 CVE-2024-37122,0,0,b311939d15bf048863cce658485cfe0a8e332201062bbe989c7fc9c6113ec98e,2024-07-25T19:28:05.110000 CVE-2024-37124,0,0,36b2aea5b40210d79bc623ba24647826a1125982402ceccf247fbf8a08ffdaed,2024-07-03T02:04:07.457000 CVE-2024-37126,0,0,1f6046db51cdcb2727f4678a45f9e51ce9aa79ec8b1a1ad373e1661d9aaf1cda,2024-07-03T18:00:57.573000 -CVE-2024-37127,0,1,d9e870bed45357108f05b43be573ea51c7d15f5150f07ef26a707da9d896bb8b,2024-08-27T15:23:21.370000 +CVE-2024-37127,0,0,d9e870bed45357108f05b43be573ea51c7d15f5150f07ef26a707da9d896bb8b,2024-08-27T15:23:21.370000 CVE-2024-37129,0,0,1bda6b021f1f7698674c595a8a84e9d380a54f5551f6ad0383f5d9c8c50d327f,2024-08-13T15:26:46.890000 CVE-2024-37130,0,0,cbd9dfc340def95265d907da6835c0ba032c0f95252bb398ce7a3b8c9a6f4189,2024-06-11T13:54:12.057000 CVE-2024-37131,0,0,1b53fe6698cfc8662ae4f6c0ed3f87f760fe2128440fb0619b7f2633753262fb,2024-06-13T18:35:19.777000 @@ -254899,8 +254899,8 @@ CVE-2024-37367,0,0,fc795c705b992ce820b48f0d2d268ffab4e95ab1a4d3d8de7fa966ee5dbe9 CVE-2024-37368,0,0,40e16212115ad0befe218b2b8486634b2a8dd47d668209808f605a27a2118d54,2024-06-17T12:42:04.623000 CVE-2024-37369,0,0,4a0e873966c59da3f94ba1e845b6380e279da692e22304116efbf6efc4fb0a5d,2024-06-17T12:42:04.623000 CVE-2024-3737,0,0,26f370727648bebdbdb4484feb8794c0f4f6f501db44738bd488af3fc5030bc5,2024-05-17T02:40:05.887000 -CVE-2024-37370,0,0,8a7076b3e8e134b661d21db6f90c7a50b93b1e481cf692861b0a2c3450767bad,2024-07-01T12:37:24.220000 -CVE-2024-37371,0,0,70d55bf05c2eee0a9f3b94ddc604e302a9c39f7d842ab9266b20a4c2d600c9ba,2024-07-01T12:37:24.220000 +CVE-2024-37370,0,1,5ef18b52731aa6f5eafd2b79804cbfc14d163aeb3b01f2fe5bcb0ee8a51881e9,2024-08-27T17:48:12.297000 +CVE-2024-37371,0,1,b4b24cabd070837a2dc75393291a5b36ca156817518c9185f5f4f50978f9fb40,2024-08-27T17:47:30.890000 CVE-2024-37373,0,0,26dc5e4538b7cd09464c61fb65e8031c578a3247488f84f82c407880c1c7486b,2024-08-15T17:31:32.407000 CVE-2024-3738,0,0,cebdf6c67207ccd8240919e9596b8485c51e6607a12a8dcdfff13f6ddbdbfe32,2024-05-17T02:40:05.977000 CVE-2024-37380,0,0,4ce1330fb679655262ab3b818cd133f9eef1b7c4341268f445fa1434d34f9951,2024-07-24T12:55:13.223000 @@ -255434,7 +255434,7 @@ CVE-2024-38200,0,0,d566a27ccd0b19f8229e9b6ce0a19c6b80662cfcd111693b799cdefa30455 CVE-2024-38201,0,0,53005100dd7a84f045f26370f955e41247a7f9394ca3dbb51556ee597d1af3a2,2024-08-15T20:30:00.737000 CVE-2024-38202,0,0,a5a58b9c1bd065b331e78383a23d6dbade69efe203405d06eac742a5e769b0bf,2024-08-16T19:15:09.843000 CVE-2024-38206,0,0,159422281702f43b217eea303b5c7354ebb2179d51ac658c6c0c018b5ec16a40,2024-08-14T00:15:08.213000 -CVE-2024-38207,0,1,a33038bbdf8e1de24b0ec1ff70f0030afb50f5d8993af830215c5c1e88e41f0d,2024-08-27T14:50:40.303000 +CVE-2024-38207,0,0,a33038bbdf8e1de24b0ec1ff70f0030afb50f5d8993af830215c5c1e88e41f0d,2024-08-27T14:50:40.303000 CVE-2024-38208,0,0,7fc92509a570a1e5d45c63995a5f8b681725c52a83de8f2197ad3ca622a53f89,2024-08-23T16:18:28.547000 CVE-2024-38209,0,0,df69d29eb26c6340927dbe029fafbfb5551308b10f0c4f3ef2c1acecd61a84ee,2024-08-23T16:18:28.547000 CVE-2024-3821,0,0,3ffbadbdaf34f564e9c498f1baa8fe758531e73989a1bbb861692bcbfdfc262c,2024-06-03T14:46:24.250000 @@ -255701,15 +255701,15 @@ CVE-2024-38597,0,0,e5aa1ce317cbbf49c9d893d70736d99f030619900b3af8d94d9a10ad20536 CVE-2024-38598,0,0,e18659bfe78473299157432842add9936fe82488b790d2081574f8dd460193ba,2024-07-15T07:15:11.720000 CVE-2024-38599,0,0,30a1fe4d2933b9305ccf42078c4cfea08aec9e247b6d735fe9b948c6c8a96f53,2024-07-15T07:15:11.810000 CVE-2024-3860,0,0,560f4bd3a6276dda10e535bade050cb4c38cd8e659ec70a4b99295b2c4085430,2024-04-17T12:48:31.863000 -CVE-2024-38600,0,0,94aab7af336c231bf74213f486547971c12f9eb3cf98449fd9408569fd7b149d,2024-06-20T12:43:25.663000 +CVE-2024-38600,0,1,6f01059b0d86b91709f99375fdc625d4b6e89a50ed018f8c1ceded934a4f84b9,2024-08-27T16:02:47.373000 CVE-2024-38601,0,0,81635fbf930c5251f288be0221fe26c6b2030142ec4fb7ff358af458d07cd268,2024-07-15T07:15:11.943000 -CVE-2024-38602,0,0,c93da63685cd68c9f243f8826204527623a7af4dc4fa702e20b60151780e944c,2024-06-20T12:43:25.663000 +CVE-2024-38602,0,1,02eba94a3d2f10d77d81011dc273bd57fbcb7f7a35d7b986e5851a9bec40a4ca,2024-08-27T16:01:39.983000 CVE-2024-38603,0,0,91e33ddcab32077ed7972b4ebaca436b45f3b2f56e92ba706348fc1e19f3c112,2024-08-01T19:58:13.143000 CVE-2024-38604,0,0,cac5cb47bab6a48f98903175dadd0b2cf9bfd6e5f8beb83a026ee24b6fe68ec0,2024-06-20T12:43:25.663000 CVE-2024-38605,0,0,f602dbd8b228460d18451b3d21699759c6e44ec89ce2e41ec5c3edf366b5b986,2024-07-03T02:05:15.990000 CVE-2024-38606,0,0,f121f7e3315639a15dd7e17915506e8080a97a6a3bc10f174ffe53d4ec2d5d1b,2024-06-20T12:43:25.663000 CVE-2024-38607,0,0,dcf4fd2ef878f3a985406da6ed9463d7e354bba926c064c7273740a389f9b266,2024-06-20T12:43:25.663000 -CVE-2024-38608,0,1,19e7438ccaa54de5697896e9b97d477a737a89b8eb8e7d7f39927c505d6f1c38,2024-08-27T15:58:56.900000 +CVE-2024-38608,0,0,19e7438ccaa54de5697896e9b97d477a737a89b8eb8e7d7f39927c505d6f1c38,2024-08-27T15:58:56.900000 CVE-2024-38609,0,0,5a886c851b936e9272c55f54cbd20715fdacaf344d1b12a80040aefcbcbd14ba,2024-06-20T12:43:25.663000 CVE-2024-3861,0,0,ee20d345f39d75706a5854d9d379d2ccdb2c90fb91332b3e9bdada75b698c9b2,2024-07-03T02:06:48.590000 CVE-2024-38610,0,0,c515fffc64de0c4c409007359650df64e3556e645f6b8742f266c729f09d0d05,2024-06-20T12:43:25.663000 @@ -255827,7 +255827,7 @@ CVE-2024-38755,0,0,8afc63573049fc0b2852d705234f6b37e1d018797b0b88c65491f0bce352f CVE-2024-38756,0,0,7031d94aab094d0cd6a78b3a51f6d24ff83e94ddbb1d12f04b158a0f85fbba69,2024-08-13T12:58:25.437000 CVE-2024-38757,0,0,421e25aafaa8f24ca203f7704697e053a3b4c9c58e7bb7a0a06fc6226027ccb1,2024-07-22T13:00:31.330000 CVE-2024-38758,0,0,01ca07e85b1f1438d40acc21dae8bc4e8a4e622d1f60d60a02b659505eb185f9,2024-07-22T13:00:31.330000 -CVE-2024-38759,0,1,962d92ec65a317183a2215f97f95a8c7e43b9c60ccaf50161826ea16b7ba5288,2024-08-27T14:15:19.643000 +CVE-2024-38759,0,0,962d92ec65a317183a2215f97f95a8c7e43b9c60ccaf50161826ea16b7ba5288,2024-08-27T14:15:19.643000 CVE-2024-3876,0,0,fa4ed7cd6030846f7b483928213b8739ce66b301252f810372f8be541fb30194,2024-06-17T19:15:58.763000 CVE-2024-38760,0,0,9f3088d6f98471745807377f5377a76fd5b9da26d9f3232072524fbe01c9b2b6,2024-08-13T12:58:25.437000 CVE-2024-38761,0,0,163d643979adbf8920122e6726130a646970ec33787f98daf4f56c619ee9308f,2024-08-02T12:59:43.990000 @@ -255863,7 +255863,7 @@ CVE-2024-38856,0,0,5bdac33e3c1769f797760792fc523b4e832fcce7196ab622177b90376f5d9 CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000 CVE-2024-38859,0,0,593edb58800c759df69d81e4c4902db80ed6954e27fabcb131a77e637ddeaf57,2024-08-26T15:15:23.727000 CVE-2024-38867,0,0,0587553b0e73bb3d7fb83caa644dbd7ff748ca26af84fce237e8ae38fe20168b,2024-08-13T08:15:10.817000 -CVE-2024-38869,0,1,1bbfe8ba5ee6530e938680d2bdff6e195b2ae2a3024f333b116d61f0d44241da,2024-08-27T14:35:30.290000 +CVE-2024-38869,0,0,1bbfe8ba5ee6530e938680d2bdff6e195b2ae2a3024f333b116d61f0d44241da,2024-08-27T14:35:30.290000 CVE-2024-3887,0,0,7992ee60f5f26d3f15d818db21e67277dbf02ae9d208c24a54e5c01935424c21,2024-05-16T13:03:05.353000 CVE-2024-38870,0,0,4167db09a3d5f0d1fb37f47670f8f4f5bc2492675561171c559ebd86c6b84b27,2024-07-18T12:28:43.707000 CVE-2024-38871,0,0,7b8770d00947c719a3dd8fe17f4a1ff79757e750998a4996ef9fa64a87345086,2024-07-29T14:12:08.783000 @@ -255967,7 +255967,7 @@ CVE-2024-3909,0,0,ea272c17ff869087d9799ba3efa606456d1ea78a711f72e5984479fd9f006e CVE-2024-39090,0,0,4ea45c01dc94b6a5905ea4f25d30b677051f8a6abd6f770805bb3d0f6dca7071,2024-08-01T13:55:23.317000 CVE-2024-39091,0,0,f4a8f0933c6d25f598eacdb963a85c2dcd7a3357118123548313549391b5d7d0,2024-08-13T21:35:02.617000 CVE-2024-39094,0,0,750555c9edd0083bf4bab9a297015b076d9622d923fd25a5d13752489b5b9d1a,2024-08-21T13:31:04.087000 -CVE-2024-39097,0,0,9587c0a6378c92d1212fea19544228f15fef0b29eedc48c98b09a3081b39f8d3,2024-08-26T15:15:23.727000 +CVE-2024-39097,0,1,53091e824fb09ac566cf112a63931dfe02ab3df4ed18ffc60b19152585f1c5bd,2024-08-27T16:35:13.930000 CVE-2024-3910,0,0,5517b92ffa84ce0352fdc1fcc785da8fc488f0a213ee6670945494d32f02de6a,2024-06-04T19:20:26.870000 CVE-2024-3911,0,0,554ab1929819d1eb25e95db5b6b72b7d88b66260392eaf976b13306fbbfd7fd3,2024-07-03T02:06:52.050000 CVE-2024-39118,0,0,c73221ddf1d7aabf1cde04e3cc8495d2b93ac9b8498b2f760ce56c4f1b9d2289,2024-07-11T18:30:13.010000 @@ -256149,11 +256149,11 @@ CVE-2024-39423,0,0,8c72be80e3c85b684216aef96277fce75a9c2e2c566be73887f1212d11fae CVE-2024-39424,0,0,243efb9cc10bea0f29adc08971658a5e72c18bfec9a9b14b5a01df0b19c33e3f,2024-08-15T17:25:25.787000 CVE-2024-39425,0,0,28e230ffc44c74bd5fea86e570ad4260fab01f825edd986d1d5f1805b2b51466,2024-08-15T17:17:59.783000 CVE-2024-39426,0,0,89e7428ead4414b9bdd760e275ee0d1f9df6042684f24e93cedce5e08d48724b,2024-08-15T17:17:38.680000 -CVE-2024-39427,0,0,78160e98483fcc3aec226f5c047b3b1c0e863dcf72104b16f54bef5ce01d8702,2024-07-01T12:37:24.220000 -CVE-2024-39428,0,0,c278d22063c70f7bf9c06407a2b45919d470d1d910aa9da6476a8683a3973a23,2024-07-01T12:37:24.220000 -CVE-2024-39429,0,0,c0f0ea0961d667a14523724c8241b9d1f206aa304e922487a3184313c2bdef41,2024-07-01T12:37:24.220000 +CVE-2024-39427,0,1,b2934e8dae41c0c55c24f63c8682b3f35bb21b7895e9eac118f885e314738e27,2024-08-27T17:33:15.990000 +CVE-2024-39428,0,1,5d03789c96f23918b1ab1ea6fa6e056174329d182d27e72cc9dae9827964f2fe,2024-08-27T17:39:29.090000 +CVE-2024-39429,0,1,e5307c82d36950beba8c9942e931fdf6e3ccb2f9d59fae72d11a48dd470f78ba,2024-08-27T17:44:02.903000 CVE-2024-3943,0,0,fecb7894fc8f71bb1eb318ec20be6409020b761b3221fbb9ca597f81fb48f5da,2024-05-30T13:15:41.297000 -CVE-2024-39430,0,0,64e823bdb7084987f6e4f2dcc4ad0f20791cdd196a0003b3469db98557837678,2024-07-01T12:37:24.220000 +CVE-2024-39430,0,1,1e2b9ea56442b26f7737a9950103fafe605e5c7a90c854837eacf7ef42d0ec7f,2024-08-27T17:44:25.593000 CVE-2024-3945,0,0,f529a76504b589632a786b994a7e59172142cd26cd001d628e7f3ff9658da8b1,2024-05-30T13:15:41.297000 CVE-2024-39457,0,0,71348762cda2a65a9fb6ee86fb97ddb6684e341009bf79ffb50846af36c0e45a,2024-08-22T17:33:32.373000 CVE-2024-39458,0,0,057d26d6064abe38c6844996c076741573b3fb5797f6e26a9cfc5dd443dbc18e,2024-06-27T12:47:19.847000 @@ -256369,7 +256369,7 @@ CVE-2024-39705,0,0,e4b6d32dbf56290b80b8c0b89889459c855e182d434956c162d34a43f4f67 CVE-2024-39708,0,0,2eafb164d29e8efc470b1c615a7a961efa5060a31edd6795a1174fbb57cde7b9,2024-08-15T16:15:20.100000 CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000 CVE-2024-39713,0,0,99e8a316dad486c18bb302062018548767182c9767b7c9ef5e1c3b6a3cdb13f2,2024-08-05T12:41:45.957000 -CVE-2024-39717,0,0,90073edfffaca290f4e7fb7a809915058e3eb62d10edb58ab3e40a6c6325bee1,2024-08-26T17:21:38.443000 +CVE-2024-39717,0,1,5bff20e776d919aa9302ca536a347b754ee87a4d4da8c8233bd51a9093bc293e,2024-08-27T16:15:07.400000 CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000 CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000 CVE-2024-39728,0,0,fba26233ce0c4692619efffa132c45bfb836485ad2132e6f2e6d7ce0ec6f97d0,2024-07-16T13:57:37.203000 @@ -256401,7 +256401,7 @@ CVE-2024-3978,0,0,264c95fabf2474878692eedd3d0ccd0dbcfac72fb894e9f86052802e2ea097 CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000 CVE-2024-39791,0,0,67ad59fd29829ae2f24abc2182dde7428e4f74acb93e703ae70c08f625fe2293,2024-08-20T17:15:56.067000 CVE-2024-39792,0,0,89dfb5d6e1471517d66a74daaa8f0b2947fd2994f2ce01af52b42a5dfe4eec05,2024-08-19T16:20:28.967000 -CVE-2024-3980,0,1,49f4e2a123078274984196ef63d2506b6e8e655b0a6bda271789de0fb7938b36,2024-08-27T15:52:01.317000 +CVE-2024-3980,0,0,49f4e2a123078274984196ef63d2506b6e8e655b0a6bda271789de0fb7938b36,2024-08-27T15:52:01.317000 CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000 CVE-2024-39809,0,0,c569a9d6ae86025131a09eaedcfa15c9c40ca354c9f22b3a0f796bbc84856d4d,2024-08-19T16:19:52.530000 CVE-2024-39810,0,0,32d906c66fda3178aaaf67b328715612b9d762f16a6ecd0f62d6e5eaf48f095a,2024-08-23T16:16:36.907000 @@ -256409,7 +256409,7 @@ CVE-2024-39815,0,0,2d23504d87a7185e1f6c185524d0f78ab739cf6cb169d8e09b6dc1e083fb2 CVE-2024-39817,0,0,1d1cd6a9e8c22fcd8349304542868600b6e99673901b52763ffb290c1ead2e5c,2024-08-06T16:30:24.547000 CVE-2024-39818,0,0,23a1489eb93e492f2f531059c176556ef0ad56414a5154c8c0ebf1d474d9bd4f,2024-08-14T17:49:14.177000 CVE-2024-39819,0,0,c8db5421a3ae027faff5d4d06e3d8592e32e290e4092ae4f0fac52eb30d3f58b,2024-07-16T13:43:58.773000 -CVE-2024-3982,0,1,a0de489e3433ce3a86a9c4e65d10b7ac468577660531b6c8501a0094ff1cccce,2024-08-27T15:52:01.317000 +CVE-2024-3982,0,0,a0de489e3433ce3a86a9c4e65d10b7ac468577660531b6c8501a0094ff1cccce,2024-08-27T15:52:01.317000 CVE-2024-39820,0,0,e80ca54bf5fea4b83e9254c90576692ea592c71bc167353b8799d70169ce0139,2024-07-16T13:43:58.773000 CVE-2024-39821,0,0,3d8221c440f8b1dbd5c98d43cf97f16f597a43c5d93725a475fc98495ffe9f3b,2024-07-16T13:43:58.773000 CVE-2024-39822,0,0,cb2d1986932d128ad1eb7e7cc883dcc2562e93b2f186e64c96f02bfcb19b2244,2024-08-14T17:49:14.177000 @@ -256583,6 +256583,7 @@ CVE-2024-4039,0,0,b18b8aac4336f296c5655f645710463e48a4544089b8c4c20638e847b5c746 CVE-2024-40392,0,0,4fca88dff401a8138459da84bc3f01447997dddad0d6609e6db41057956be98a,2024-08-01T13:57:14.083000 CVE-2024-40393,0,0,9b92da21177fe8aa44a5e39548076593e5725a02c42ea3793eafd13d4eb2e51a,2024-08-21T18:13:42.670000 CVE-2024-40394,0,0,6a6373d6840a53222337e137dc03e4cb2a60579893b62069f0f6025fffca56b3,2024-08-01T13:57:15.033000 +CVE-2024-40395,1,1,624587188d5a0564c9287158c13d627e976a01f0beb15504a9506d1fb729ccdb,2024-08-27T16:15:07.583000 CVE-2024-4040,0,0,4c2ad1f11d479d0071ddbaeb3523edde6a0cd9c4e74c065c69d4bb5c9b1ac029,2024-04-26T15:25:47.270000 CVE-2024-40400,0,0,aec60b9f9f600363c457f651ff723a62cac6ef548b5399a3264322f4567e7220,2024-08-01T13:57:15.850000 CVE-2024-40402,0,0,8f3b56ab0ece8779de55d2a1e01ca402786b5a92667e8e6ee5b5e922914d1480,2024-08-01T13:57:16.643000 @@ -257075,7 +257076,7 @@ CVE-2024-41141,0,0,66e666e17c3fd137fec7c9da37ae1ceec042d1fec499bcfa85959d0b04733 CVE-2024-41143,0,0,86895945f47e1361478000a71a2798af8709b921e75a70b1e72755ffb197a147,2024-07-29T14:12:08.783000 CVE-2024-41144,0,0,beef6d47444f75a70cc53f4dcdee75e777176599a5e18a0e5bf9ea36f35cb6ca,2024-08-01T16:45:25.400000 CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994ac,2024-06-04T19:20:29.937000 -CVE-2024-41150,0,1,f29e18c57230cbc3b76f00f0b7fe1001f55bb08bda82442884bf5072f9726b00,2024-08-27T14:35:09.013000 +CVE-2024-41150,0,0,f29e18c57230cbc3b76f00f0b7fe1001f55bb08bda82442884bf5072f9726b00,2024-08-27T14:35:09.013000 CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000 CVE-2024-41161,0,0,9b33361091df6923832caa53c78a9e46bbbedfd096d5512869c0f1eed0413824,2024-08-20T17:09:50.647000 CVE-2024-41162,0,0,53987655880d54b7aaaa5f090e7e843742788b903e9c4098307440abc2292d17,2024-08-01T16:45:25.400000 @@ -257129,7 +257130,7 @@ CVE-2024-4127,0,0,13aabefe1ea17c857d1bb509e28f374ee8245c3658c3b51912d597c1f898ec CVE-2024-41270,0,0,af12a3d2be324bb3d9e2b16ff7d039367afc9e03066837308e275993680c0e05,2024-08-12T18:25:28.583000 CVE-2024-4128,0,0,68bc0506eec8fccf6c4228f6f90915fa5b089633c8bc20338b2c6bd4b4236a0b,2024-05-02T18:00:37.360000 CVE-2024-41281,0,0,acd5274a5314a460f4482234d2c8af8da53f6324e375946a6feb8a82983d1186,2024-08-01T13:58:25.943000 -CVE-2024-41285,0,0,bf450e1708961eaf258a5fbd3bfdded3b20fa343d419da92a8571bdc46f157ca,2024-08-26T19:10:18.890000 +CVE-2024-41285,0,1,f9d8e2fe08b82d3f5c7f4ac42e37bd0268ac10deb583909c52659b72a2361eca,2024-08-27T16:03:16.043000 CVE-2024-4129,0,0,f2fba94e29dd925b8a56a23f2711717731ea628ca4457222b442fc21c3f8c80a,2024-05-14T16:11:39.510000 CVE-2024-41304,0,0,97c8e67643f8470191a2e05ce641725b816a8cc5ff59a9e38a00154810fc7f9e,2024-08-23T16:35:06.883000 CVE-2024-41305,0,0,44375e3d9aedae768570d453a5746b314221c07760efe679991b65a52a72cbb1,2024-08-08T14:36:06.423000 @@ -257223,6 +257224,7 @@ CVE-2024-41613,0,0,775a6c9724ba70bc56dce8939e74722c2b403153bd1f36f976e189d003a6a CVE-2024-41614,0,0,97dd4cb6722c16dd67b90bd84237880c8504a680bb995ffa9e8927a86d821a05,2024-08-14T18:14:16.073000 CVE-2024-41616,0,0,a87f80cfe19fdc1adad71691ba6015b314ae0892eefb4d086c289749db2f63df,2024-08-07T20:54:20.793000 CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc57,2024-05-08T13:15:00.690000 +CVE-2024-41622,1,1,1e01fe20e0afeac7f8a3ed9d3610b5673cfc0264551b26e6a4cc2fa5e7982e34,2024-08-27T16:15:07.673000 CVE-2024-41623,0,0,c5ad0592f1bc8234d1c1b4349fa5edc0884d162d738c86d78b923fc809fc8e63,2024-08-23T15:35:07.653000 CVE-2024-41624,0,0,300a907d59c60bf938fbbe11abf1d1dd305a7cd2619bf29e5e11f38514dc3443,2024-07-29T16:21:52.517000 CVE-2024-41628,0,0,3f95419a732116ba5016aeec3d83a528b6096a3cc023e4d133c06f26311a9cae,2024-08-06T21:16:03.323000 @@ -257378,10 +257380,10 @@ CVE-2024-41864,0,0,59e830b96a597bc93dcda9cbef385e1fdf95773045c5f29bc0bb9381e7cb3 CVE-2024-41865,0,0,f8ad10055028d3dfea657c3bbd8eb5b04fbd0fb8a1dcfeb71cfad07c3751149a,2024-08-19T18:44:04.163000 CVE-2024-41866,0,0,b06a8427315afa6008377ed5627aeeeb7bf41e3428063742d7f1fa0c27e9a784,2024-08-19T18:44:22.577000 CVE-2024-4187,0,0,59e73639acf686e0c0fe315911f8a7728baeee66452eb3299dce70437688c22e,2024-08-15T14:45:27.797000 -CVE-2024-41875,0,1,57025102705afb3f64ed9ca037e457d95a3751eb418da98d63205817feaa131c,2024-08-27T14:45:28.927000 -CVE-2024-41876,0,1,2e90360efc316da37d37f6761f555864c070f8e4b10b19f1a9af1a905273c5a3,2024-08-27T14:45:40.377000 -CVE-2024-41877,0,1,6103adaf29f838766c82e017d2b75c7c95c893efc9460aaf0a14a2c0a2483c27,2024-08-27T14:46:02.147000 -CVE-2024-41878,0,1,9300134362b823bfd7137dfe44145c2c81ccf4703cce3a1d8aabe5d5b2714035,2024-08-27T14:46:24.667000 +CVE-2024-41875,0,0,57025102705afb3f64ed9ca037e457d95a3751eb418da98d63205817feaa131c,2024-08-27T14:45:28.927000 +CVE-2024-41876,0,0,2e90360efc316da37d37f6761f555864c070f8e4b10b19f1a9af1a905273c5a3,2024-08-27T14:45:40.377000 +CVE-2024-41877,0,0,6103adaf29f838766c82e017d2b75c7c95c893efc9460aaf0a14a2c0a2483c27,2024-08-27T14:46:02.147000 +CVE-2024-41878,0,0,9300134362b823bfd7137dfe44145c2c81ccf4703cce3a1d8aabe5d5b2714035,2024-08-27T14:46:24.667000 CVE-2024-41879,0,0,776d1d630925a5effc005e3c54df4f1e81379153a0d899b1b1392cbd63b7b386,2024-08-26T12:47:20.187000 CVE-2024-4188,0,0,5459733739e7d5773814c2ce2922cf5b8b26c5398a641d72cfafdd22a4667489,2024-07-31T12:57:02.300000 CVE-2024-41880,0,0,fb22214cf23b63ecac791ad54f65d75460df9fd80fc112c0736bcd80f342f363,2024-08-01T13:59:12.507000 @@ -257518,7 +257520,7 @@ CVE-2024-42090,0,0,5ca2ababf7ceb937b48ee4d2a8a5110beb3c9dc2f2552428d40dbc7914694 CVE-2024-42091,0,0,c5cfa53d97d9d0736b9e30395049f601b009fa41beae5ac9555769040bc1437f,2024-07-30T13:33:30.653000 CVE-2024-42092,0,0,af77d06692ad2b25f7f3319049541cbcf4e0e2868f19fd7517261509d7ac64c5,2024-07-30T13:33:30.653000 CVE-2024-42093,0,0,73042302320c8afcaec5fe49d8aedd2b3a4856c1951fd42f00a2cfc27761f538,2024-08-26T15:03:42.380000 -CVE-2024-42094,0,1,e885a913ab3e00ce42be5435270a94c94e02b5100a403aca9f1c57a39650bd51,2024-08-27T14:07:03.923000 +CVE-2024-42094,0,0,e885a913ab3e00ce42be5435270a94c94e02b5100a403aca9f1c57a39650bd51,2024-08-27T14:07:03.923000 CVE-2024-42095,0,0,999e6eafb406bfc96c58f156f045aff140b9cce1579ec717fb2bcd3d4250773b,2024-07-30T13:33:30.653000 CVE-2024-42096,0,0,a51020378e9a53609e2b9850304f0387470e69965face3c10e6612960442f815,2024-07-30T13:33:30.653000 CVE-2024-42097,0,0,daadf967612be031bceee3a5cf360a6b7c8656301780004df63ba219cd6f1380,2024-07-30T13:33:30.653000 @@ -257529,7 +257531,7 @@ CVE-2024-42100,0,0,9f2359920901de15a72f82c74dd31f7cfd476c8a0553c2aa7b3605f8c3eb5 CVE-2024-42101,0,0,ee2417d1fe5ad184a427f58671dedfca7c7497bddaa125be1e3080536f8c3d24,2024-08-22T12:58:21.527000 CVE-2024-42102,0,0,6316e9599f21ebdb21ae9fa78c744fcee5e0d5e7ec56a75728d7b5f4ac6d9f1a,2024-08-21T20:48:01.940000 CVE-2024-42103,0,0,571d1f20007ce6492a18993a5251eb19a6d81ac85736922f03454b3e3d7e7288,2024-07-30T13:32:45.943000 -CVE-2024-42104,0,1,def9c837115c029fcf5d81c61cabe7e6ca6fd4848fe11d6f1a09290cf875300d,2024-08-27T14:28:28.023000 +CVE-2024-42104,0,0,def9c837115c029fcf5d81c61cabe7e6ca6fd4848fe11d6f1a09290cf875300d,2024-08-27T14:28:28.023000 CVE-2024-42105,0,0,602b7eceacc9e23748db5c2c201abe70f13508a1dc06a4238bfa6a02e44d1d34,2024-07-30T13:32:45.943000 CVE-2024-42106,0,0,d1be86d3a499fcbbd48fa48666a765f712be1dd5a6b971ade33744c711a65cf7,2024-07-30T13:32:45.943000 CVE-2024-42107,0,0,6491957e69d9efbbc6993b086ea49c99500b6fccef3248643b058f90720776c1,2024-07-30T13:32:45.943000 @@ -257539,7 +257541,7 @@ CVE-2024-42110,0,0,d32e698de0e7b17bea1969eb2144abdc6b889fd7317c6b8113fda73d07665 CVE-2024-42111,0,0,54db76ff7e8130362d41c492aa2e759d1e30f80ea24bf90a20c876a40458428a,2024-07-30T13:32:45.943000 CVE-2024-42112,0,0,053ed3da7b6fa8b9c64b9dd46522be8c0a3889161664650c546eddc66722489c,2024-07-30T13:32:45.943000 CVE-2024-42113,0,0,055bfc7352f8708916cb02878daf8b9abd49f09673041c2a3f1555d3e0438485,2024-07-30T13:32:45.943000 -CVE-2024-42114,0,1,52fc6452df42e510345a38f3a6af930f895f826164e821b340b17896b69f27ad,2024-08-27T15:00:23.807000 +CVE-2024-42114,0,0,52fc6452df42e510345a38f3a6af930f895f826164e821b340b17896b69f27ad,2024-08-27T15:00:23.807000 CVE-2024-42115,0,0,c1bf508190d9d011d99e9e0c6936167394e909cd6a7f0f4a4e381df1abddbea8,2024-07-30T13:32:45.943000 CVE-2024-42116,0,0,30a90b9468660b29848bbd64238d702f03ad6275f3a02231616e417bdbda5513,2024-07-30T13:32:45.943000 CVE-2024-42117,0,0,e86f5875f9840b49edb38024936f207409c0f434c81331cd923e6aaf28928c94,2024-07-30T13:32:45.943000 @@ -257716,7 +257718,7 @@ CVE-2024-42322,0,0,2accb2a45b605eba549de2a0c83236102f9dab689f1b61dc800f0c45a0f92 CVE-2024-4233,0,0,e3336c43dd885f8db6271cd8e49f7796169d1b724e733d53d39e8dcd56cab238,2024-05-08T17:05:24.083000 CVE-2024-42334,0,0,63554eb6ad9440efa3ee44750a635a89b93444804b44759a759c86799c0d08da,2024-08-21T15:59:56.493000 CVE-2024-42335,0,0,2b9b97973dd654c6eb68cc221bad7788b92938b457385b73625ca969f07db996,2024-08-21T13:49:19.863000 -CVE-2024-42336,0,1,74e57bfa6ceb0764665eac825d78f0a67cb52357a0fbd794d7fcb504d5103724,2024-08-27T14:59:38.100000 +CVE-2024-42336,0,0,74e57bfa6ceb0764665eac825d78f0a67cb52357a0fbd794d7fcb504d5103724,2024-08-27T14:59:38.100000 CVE-2024-42337,0,0,9f09d47739813eb7311792ec3f487782b32d4b6bc8e823315cb562aa9501db27,2024-08-26T12:47:20.187000 CVE-2024-42338,0,0,5927feeea5656a034bd16472e370a7104ca141160b03ab5bfbfcc3879795c2cf,2024-08-26T12:47:20.187000 CVE-2024-42339,0,0,845f40a4d90573e9b4c3edda708939ae3128ba93487c99118a6fd2732a1a3f07,2024-08-26T12:47:20.187000 @@ -257941,7 +257943,7 @@ CVE-2024-42745,0,0,d2f467113cda4cc30e7255dcf19a80218eafc314dce633f11469c2e4a02ca CVE-2024-42747,0,0,4d1c99e860bf6905b5d644799ef0c78895a722730457e9c7bd1d214b39f83bc6,2024-08-13T17:35:04.540000 CVE-2024-42748,0,0,52e6e14746af30f6f3124891b89bbdbe775ebb6c4232d3347332f267006d05fd,2024-08-13T17:08:53.510000 CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e27,2024-05-14T16:11:39.510000 -CVE-2024-42756,0,1,ce5af71546f0263f395c227c3cfac6fe59ce60f8865d3d0ed46c37703f4af301,2024-08-27T15:35:17.887000 +CVE-2024-42756,0,0,ce5af71546f0263f395c227c3cfac6fe59ce60f8865d3d0ed46c37703f4af301,2024-08-27T15:35:17.887000 CVE-2024-42757,0,0,7f6ba25a82908bfc7acb20e761fdbba6f23f597232f39843fc1cc43949e3074d,2024-08-20T15:35:25.190000 CVE-2024-42758,0,0,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000 CVE-2024-42761,0,0,33c8e57e29c80d5ab961692c95c32ec38cca8789d3650f2c188fd350c643ff13,2024-08-23T16:18:28.547000 @@ -257975,7 +257977,7 @@ CVE-2024-42787,0,0,88d5b9fb8d148270d8805b4da2d63d994d92e9c93bf6bfa364fcfc0bc1637 CVE-2024-42788,0,0,a944343d984183d9671961186501cfd758ccb98c0318801f8b80c875f7b8eb97,2024-08-26T19:35:29.970000 CVE-2024-42789,0,0,3342a623d33bfec42f1caba176ebbc78dcfc478b384f925ba9cf2d9c4e593bd5,2024-08-26T15:15:23.727000 CVE-2024-4279,0,0,dfbad3c4052d0097199e5a57f42abb52975c0de3af4475a04c90870b0d97f015,2024-05-16T13:03:05.353000 -CVE-2024-42790,0,1,7510b4b53ddc671a204c6c9918e039c11322e8be8788350ff1b1615bcf8a1bd2,2024-08-27T14:35:06.047000 +CVE-2024-42790,0,0,7510b4b53ddc671a204c6c9918e039c11322e8be8788350ff1b1615bcf8a1bd2,2024-08-27T14:35:06.047000 CVE-2024-42791,0,0,229b4927d8c73b78aebdb2269dabb59bb0e6061ec8574ac1a3619991917c1649,2024-08-26T19:35:30.910000 CVE-2024-42792,0,0,4eaaa19a355275b40166aa1a2acd468fef8bb5420612bb7385f6e2e1abaacd08,2024-08-26T19:10:09.607000 CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b62772,2024-05-14T16:11:39.510000 @@ -257983,7 +257985,7 @@ CVE-2024-4281,0,0,cb48c26c252b1c83fb4810210335ce05e1fcbd94e5804419418b4f73b9d5c0 CVE-2024-42812,0,0,d754a1b3fa22845b1ec28a5e3b423343f3a09420e9ed62b3cb19e2fa117c33b2,2024-08-20T15:44:20.567000 CVE-2024-42813,0,0,ac2ce0206860ac49c7a00dc981456912113a83f39c5bd8ad9fc9aeb5495f6bf9,2024-08-20T15:44:20.567000 CVE-2024-42815,0,0,61ecad930f8952f88e6624df649da2e776a6738d656b0dbfd5ed90ab12701c47,2024-08-21T14:35:13.727000 -CVE-2024-42816,0,1,8dd1ae8820cfa39b8949229a5b0a0fd0a511af977924a1929a9dcb8553f95dec,2024-08-27T14:35:07.077000 +CVE-2024-42816,0,0,8dd1ae8820cfa39b8949229a5b0a0fd0a511af977924a1929a9dcb8553f95dec,2024-08-27T14:35:07.077000 CVE-2024-42818,0,0,95f0b34855c9e871f13f61a27d7d6c078da48a4416445325f9775ca851de2f13,2024-08-26T19:10:18.890000 CVE-2024-4284,0,0,4fbe27a80563712e41b6422ac48754a31c657da862cab89b959335ecaf13d90e,2024-05-20T13:00:04.957000 CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9ec86,2024-08-19T19:35:09.180000 @@ -258001,7 +258003,7 @@ CVE-2024-4291,0,0,3555454673f17bb302e51e81ea2fe7cd049aabde203c094d5792666ddbcea9 CVE-2024-42913,0,0,796fb1ba4b67987b44a9370ce058c2b037b19ffa316e1a186c445f2c01301c3c,2024-08-26T19:10:09.607000 CVE-2024-42914,0,0,3f5ac8ab7960d4d4afba31e3c38cdf6845691feab9592a20b6c730d697770531,2024-08-26T17:35:10.510000 CVE-2024-42915,0,0,f864c31afbca80b902e69688b4024ae2389f775878951406a546e92d288d6fa4,2024-08-23T18:35:05.490000 -CVE-2024-42918,0,1,657578840f633e762a27e4a0853fb47eccdc1027e81e0975d029fe8916be4e17,2024-08-27T14:47:12.097000 +CVE-2024-42918,0,0,657578840f633e762a27e4a0853fb47eccdc1027e81e0975d029fe8916be4e17,2024-08-27T14:47:12.097000 CVE-2024-42919,0,0,7884ca2db3b42df8cea014fe9c7f92e13b5906264980e99d7b276d089e845d16,2024-08-21T12:30:33.697000 CVE-2024-4292,0,0,3da8afef6eac3f0e74c17cae2760dab77b8f6d77627214b0783fc9bf5f2f59b0,2024-06-04T19:20:35.097000 CVE-2024-4293,0,0,32ea35cbc5ba91cf83ff71be9c2b19347dd1b3b0949ec88573415a66fabe3aec,2024-06-04T19:20:35.203000 @@ -258229,11 +258231,11 @@ CVE-2024-4333,0,0,640575820e0b30891814a5a9385bc808a4cb1fa6f8846116192c877d2f9953 CVE-2024-43330,0,0,18c9cc1b418e02c0186c70603a33b75d4945832a6fdc2ddcfc149e88ac786f4b,2024-08-19T12:59:59.177000 CVE-2024-43331,0,0,6d28b8bc0904e0c3dd60c41d48cef3313c73e3f7ea773d2fece6fad186c8439a,2024-08-22T12:48:02.790000 CVE-2024-43335,0,0,dde6dc17375e74f502f7f2bfa9005d811d4652c2ebc27ff9b5ef0997127127d2,2024-08-19T12:59:59.177000 -CVE-2024-43336,0,0,2c33ad8576aebcb43e1f29049186e4cea17f9cf5c7bd78856aeebc2fb1faeeb8,2024-08-27T13:01:52.723000 -CVE-2024-43337,0,1,40b1547653629694d1f87683cec28c4d4ed17401d650c003966fbaf0b12fa6fa,2024-08-27T15:59:57.127000 -CVE-2024-43339,0,1,66db28fe32caa7fdc3de193b1cfb8a374b117ab7f2a1a8dfd67efebf0a0a78c8,2024-08-27T15:58:31.840000 +CVE-2024-43336,0,1,01d8580ca263b1fc31791415195a5d129d6d58e08f3205c4e1eb6ed293dbb6d7,2024-08-27T16:00:25.177000 +CVE-2024-43337,0,0,40b1547653629694d1f87683cec28c4d4ed17401d650c003966fbaf0b12fa6fa,2024-08-27T15:59:57.127000 +CVE-2024-43339,0,0,66db28fe32caa7fdc3de193b1cfb8a374b117ab7f2a1a8dfd67efebf0a0a78c8,2024-08-27T15:58:31.840000 CVE-2024-4334,0,0,0bbc9e9de57a0c229384d6d19ec0f1942ba088838a67e65a09daa4455a2054dd,2024-05-02T18:00:37.360000 -CVE-2024-43340,0,1,3a709bf24dd21009275a410f31b11d212b86c9058772b39f8b8f29b2ecf58b5c,2024-08-27T15:56:00.043000 +CVE-2024-43340,0,0,3a709bf24dd21009275a410f31b11d212b86c9058772b39f8b8f29b2ecf58b5c,2024-08-27T15:56:00.043000 CVE-2024-43342,0,0,ee642e0e72d4e0e4ec6b9a91be938e0b4b5b569cf7ce0c2f528a0acbf756353e,2024-08-19T12:59:59.177000 CVE-2024-43344,0,0,379496d95a40a85d8ca980cbd671a249672d41d04bb66c9b9dcaac6246ede174,2024-08-19T12:59:59.177000 CVE-2024-43345,0,0,556fa7350890a25a21bcc01fdb9aa5e355db1c5d283d4a3a13c75236275d6c79,2024-08-20T15:44:20.567000 @@ -258247,7 +258249,7 @@ CVE-2024-43351,0,0,4f1a44dd0b092b1cbc40294ea3c1e20ba66e414acc7c7ec139aec5d1c68e6 CVE-2024-43352,0,0,07311db07e42253e292f873208eb8f7da45aad78c36050ff71f1c14b42155a03,2024-08-19T12:59:59.177000 CVE-2024-43353,0,0,63ba11fd8c07de3459ae027affa4265b156cbb90703f59d7d8cf9f7e3e549de4,2024-08-19T12:59:59.177000 CVE-2024-43354,0,0,7fe0d70c3381bc58752b4a1e37f29b9d4db102b7222c66e8c7dfaaf7ee6ee2c9,2024-08-20T15:44:20.567000 -CVE-2024-43356,0,1,002a4b5d4af1e8f0e94c64130aea08271a5645ee7876954a410a13e10d80fd71,2024-08-27T15:54:45.650000 +CVE-2024-43356,0,0,002a4b5d4af1e8f0e94c64130aea08271a5645ee7876954a410a13e10d80fd71,2024-08-27T15:54:45.650000 CVE-2024-43357,0,0,843c188c76220c12bbff3ab3d1983437698ada4d60a6933ff05615bf550f6a01,2024-08-19T13:00:23.117000 CVE-2024-43358,0,0,4130068c2d82f5dfd475ac6e2637c3ec3d06882d6bdfaae3d287710d9f146b7e,2024-08-13T12:58:25.437000 CVE-2024-43359,0,0,1b0772291a26ef1090dcff0c9c928348b801ed77506dc70a06e460fcc324a837,2024-08-13T12:58:25.437000 @@ -258333,6 +258335,7 @@ CVE-2024-43780,0,0,5217ce0351fcb75bd7982f01c3d436316e02e5a2bb3d0e7b3ad2fd10f4519 CVE-2024-43782,0,0,640aa820b0ca467d38719c873a53febd1944feccce46dcf0202ccc162637d808,2024-08-23T16:18:28.547000 CVE-2024-43785,0,0,865f9ddb4537abd892462a2be2c5b215baf0c6c5f01c60dc5f4805d59a23b528,2024-08-23T16:18:28.547000 CVE-2024-43787,0,0,2409e45336c28eaec7950310efc31a1dfcd5144f7967b659eb1779c444e8beaf,2024-08-23T16:18:28.547000 +CVE-2024-43788,1,1,9499c4f05c4c09cadbb08a0deba9bf68c4aba5e542cb70aac4c35fcc36db21d5,2024-08-27T17:15:07.967000 CVE-2024-4379,0,0,21c1593ccdc9c542b9ca9b0ba403ad32afbc0c98a6b0c8f514039e188e2373a7,2024-05-31T13:01:46.727000 CVE-2024-43790,0,0,c3cb5748c434505823d489a50a95032a1f25244b73b9e74701de9974c3846229,2024-08-23T16:18:28.547000 CVE-2024-43791,0,0,343f2e18bef5efeacf2cd8005024025a5d76578a60f2c9c2f207bc81f2ca8e37,2024-08-23T16:18:28.547000 @@ -258422,12 +258425,12 @@ CVE-2024-43880,0,0,620881f474d97ec9d89405e6ef8dfb0deeccc719de94ff3b069983055d50d CVE-2024-43881,0,0,a40946e430007d3d83ea6de83f76454a9e9d71f940866bbda51302ab2716b573,2024-08-21T12:30:33.697000 CVE-2024-43882,0,0,d55668215cd6d665e2480e5f531dc425652dbf9b52271fdc563c400a262ed289,2024-08-21T12:30:33.697000 CVE-2024-43883,0,0,91d9dc24243e1eb7439b854fe03a12be52a8a2651dc7ad627233ff467dccabae,2024-08-23T16:18:28.547000 -CVE-2024-43884,0,1,1be55cc2577ddf4ea3eaad20febdb123bf6382b6da5a314c3a4af81052b5a493,2024-08-27T14:37:20.410000 -CVE-2024-43885,0,1,11114407819a3f9e00d8d9cb1392c069e87eaa286d3f0b384cc6ce2d553b62cd,2024-08-27T14:37:37.887000 -CVE-2024-43886,0,1,e1250be1137132d32f51f141081958e76d96de370d77286a8411bf00a519b833,2024-08-27T14:37:45.377000 +CVE-2024-43884,0,0,1be55cc2577ddf4ea3eaad20febdb123bf6382b6da5a314c3a4af81052b5a493,2024-08-27T14:37:20.410000 +CVE-2024-43885,0,0,11114407819a3f9e00d8d9cb1392c069e87eaa286d3f0b384cc6ce2d553b62cd,2024-08-27T14:37:37.887000 +CVE-2024-43886,0,0,e1250be1137132d32f51f141081958e76d96de370d77286a8411bf00a519b833,2024-08-27T14:37:45.377000 CVE-2024-43887,0,0,376d550e40434349f0ec085b772876fe107bf2fe9c2438232db402487dd1f398,2024-08-26T12:47:20.187000 -CVE-2024-43888,0,1,e54f63212ceaa42960fe94aef21d508a624b7b901f30a84146e78625f3a09e87,2024-08-27T14:37:52.610000 -CVE-2024-43889,0,1,5465d7ffa5fc173afac72302c5033ac280f7187ac42839effc5a469d05fb8493,2024-08-27T14:38:09.340000 +CVE-2024-43888,0,0,e54f63212ceaa42960fe94aef21d508a624b7b901f30a84146e78625f3a09e87,2024-08-27T14:37:52.610000 +CVE-2024-43889,0,0,5465d7ffa5fc173afac72302c5033ac280f7187ac42839effc5a469d05fb8493,2024-08-27T14:38:09.340000 CVE-2024-4389,0,0,ea54671e2f1f297a2bfa11e14d812b86fa7a7f36f3487a0625bc52be81ee66b3,2024-08-14T13:00:37.107000 CVE-2024-43890,0,0,4f712d05ce91a4751f64280bf4157d384fca158e731343a0c38233f08c451c0c,2024-08-26T12:47:20.187000 CVE-2024-43891,0,0,7d2fb372b15a5686e6b8fa8bf01deb6e5ea4187271aab5efe1892bb77c3adb6e,2024-08-26T12:47:20.187000 @@ -258438,11 +258441,11 @@ CVE-2024-43895,0,0,f4f0faf6f450c11bcd9bbffc3bfe9363bfd6c37323777a86f991b1d25c456 CVE-2024-43896,0,0,02f54c59717b3feef195015864900404f36f00fe9986d4059d517c9dd0f9a5bb,2024-08-26T12:47:20.187000 CVE-2024-43897,0,0,272a5e6ed23f226be655c71945633c1818e2d186619a4f55ac8593cb15d32ae8,2024-08-26T12:47:20.187000 CVE-2024-43898,0,0,b20ddc83f3dcf4bc1ad714089af29bfc939502c108354aa514b44633c401dbf4,2024-08-26T12:47:20.187000 -CVE-2024-43899,0,1,1953a8ac8e9197ec884f1f7ed08130ca2ce11e7bc600d6d066b299186890c781,2024-08-27T14:38:19.740000 +CVE-2024-43899,0,0,1953a8ac8e9197ec884f1f7ed08130ca2ce11e7bc600d6d066b299186890c781,2024-08-27T14:38:19.740000 CVE-2024-4390,0,0,e7e7976abdd60c38776b1ca6e6489a541123a6d22aaefce9d02ee1d97e2bf9c9,2024-07-17T14:10:55.550000 -CVE-2024-43900,0,1,4d8a1c377893c2bcc68b32981f4665a8b2876e47e79e3a70bf603165a8c8d4be,2024-08-27T14:38:32.967000 -CVE-2024-43901,0,1,7be8f7dc4bf09de426f00d5d02023b84d29a03cabc8ff89591749666578d8894,2024-08-27T14:38:44.187000 -CVE-2024-43902,0,1,c37472b064b345fa8fe25985d1bf76a11413a9f498d9f5b152ce2e7578168faa,2024-08-27T14:38:51.730000 +CVE-2024-43900,0,0,4d8a1c377893c2bcc68b32981f4665a8b2876e47e79e3a70bf603165a8c8d4be,2024-08-27T14:38:32.967000 +CVE-2024-43901,0,0,7be8f7dc4bf09de426f00d5d02023b84d29a03cabc8ff89591749666578d8894,2024-08-27T14:38:44.187000 +CVE-2024-43902,0,0,c37472b064b345fa8fe25985d1bf76a11413a9f498d9f5b152ce2e7578168faa,2024-08-27T14:38:51.730000 CVE-2024-43903,0,0,c889729c6b4c992efb6382be5e0515b66e86fe6570936e30b472ad7500810adb,2024-08-27T13:39:48.683000 CVE-2024-43904,0,0,b989d9f9c68082637dc63029425b18b22bdee2eb24851a91094888ca00d2fb77,2024-08-27T13:40:50.577000 CVE-2024-43905,0,0,1039cf98bca6901940f88fd388d94fc219523a686f334453246ad30627bed7dd,2024-08-27T13:41:03.730000 @@ -258452,7 +258455,7 @@ CVE-2024-43908,0,0,37f71e1240c38f7f5d5430994391502a308fcc5874d7b6b8d1d03bb0a35a0 CVE-2024-43909,0,0,cf942173e7a980038b2545ed960379cf4d09253a719e1fb264ba55492ee93b8f,2024-08-27T13:41:48.467000 CVE-2024-4391,0,0,3c50ad807a6efe83c676c20cbd033bdfc9a5c436710b6a08536dff480db62e6d,2024-05-16T13:03:05.353000 CVE-2024-43910,0,0,c87011ab8f713b3ebb471fd888664070478553118f1bf02ef6c18fc5aecc94c9,2024-08-26T12:47:20.187000 -CVE-2024-43911,0,0,87e4de5003f7990e16f9d5ed57e6f3e6518d372859b517f600a377c628945530,2024-08-26T12:47:20.187000 +CVE-2024-43911,0,1,12aeb44bc585c03b21c76c85e16ebe86660a58d7a2313ab40f0b85cb472c71fe,2024-08-27T16:08:52.493000 CVE-2024-43912,0,0,9224434204b7590693cac3418bf42ebf514074b8e8db707b0e4b732c2fd9e6a1,2024-08-26T12:47:20.187000 CVE-2024-43913,0,0,5c9c2c963f30f56673884f817fecf35fdb8c9c609214d88499e445eaad74d316,2024-08-26T12:47:20.187000 CVE-2024-43914,0,0,6abd174237c3162d43a4c80a18de042ce09386ce614128479039a4b09b208b5e,2024-08-26T12:47:20.187000 @@ -258497,6 +258500,9 @@ CVE-2024-4431,0,0,8d95de6ec075320f55907047db89835dd68db45859f7bae49d6625b2a3240b CVE-2024-4432,0,0,492ff6791a7b1a2e081b9c5249b748792a54b9554ba3a2422039c4bfa6a7bf50,2024-05-20T13:00:34.807000 CVE-2024-4433,0,0,29650c676957862ed8f96380f29298acd09e1ae0c4c0eae7a19f73eb896474af,2024-05-02T18:00:37.360000 CVE-2024-4434,0,0,20236f1809b1e5babc738bee4dccd8edc7c4530b36b3cb8640798a5fece3dc01,2024-05-14T16:11:39.510000 +CVE-2024-44340,1,1,694de177e0282d8353ff0ae968cf12f7e178780845540c54c0dd37ec854eaa8a,2024-08-27T16:15:07.760000 +CVE-2024-44341,1,1,d4e424ad86e25e88da43df54cedd229292707add11e0aaa0f996b896fbe96d3f,2024-08-27T16:15:07.860000 +CVE-2024-44342,1,1,6ffa7c5363a8bda159df95d627455b995e6a0adacdf268e01b0efb171f713310,2024-08-27T16:15:07.993000 CVE-2024-4435,0,0,de8e3bf570f6ad4a46d29ba9fea181676ce0f6a2152ced144579ea87a60a7929,2024-05-21T12:37:59.687000 CVE-2024-4436,0,0,17e0d77b7422c134d8a6b2f19c763597337490777ba51623e74515d13a757b13,2024-05-30T02:15:47.300000 CVE-2024-4437,0,0,8daf6b009e7d35d5422b21cbeb277c609e9541d61900da1da050701f495da62e,2024-05-30T02:15:47.433000 @@ -258504,9 +258510,9 @@ CVE-2024-4438,0,0,c9e78eceead232fab4ea3d7a8e75969ea230a5ce0230a2d24b6f718c51f9cf CVE-2024-44381,0,0,5438484fcd25b70dee09679309f07d28dc505312c58efc8ab06b735004b552d3,2024-08-26T13:55:17.583000 CVE-2024-44382,0,0,45b577083d43c0421b1d54dae9544e627a5b225f87472e2d79037d6a727e8546,2024-08-26T13:58:17.047000 CVE-2024-44386,0,0,22e44353838544d5af3c6c1b599355e6c28d0abe3355a29bf08b92b0bac131e5,2024-08-23T19:35:18.987000 -CVE-2024-44387,0,1,f40bbfc4dd5c4303dcc7ceb337218443a73c6de292a9dc96408915cc8c9cbcd7,2024-08-27T14:48:04.820000 +CVE-2024-44387,0,0,f40bbfc4dd5c4303dcc7ceb337218443a73c6de292a9dc96408915cc8c9cbcd7,2024-08-27T14:48:04.820000 CVE-2024-4439,0,0,18d544a04352d4558f54a1793cd800ab605d9132c8464460d2f7ebbde183ef12,2024-07-03T02:07:34.593000 -CVE-2024-44390,0,1,6367b383b322d2f53bd8e6d4e8d76904ca1c75a20fddee8fd1295aedac6b8243,2024-08-27T14:48:18.393000 +CVE-2024-44390,0,0,6367b383b322d2f53bd8e6d4e8d76904ca1c75a20fddee8fd1295aedac6b8243,2024-08-27T14:48:18.393000 CVE-2024-4440,0,0,32e49728cdc055a1dbfbd90b8e03664859c56d56e36afdc46644ff6b145c71da,2024-05-14T19:17:55.627000 CVE-2024-4441,0,0,ac0779300bad801b6c25a6a11418596c16f707acafd8505b85edf037d6de9dc4,2024-05-14T16:11:39.510000 CVE-2024-4442,0,0,9c1eda6fa3435f8c4d08218c5481ff931fe1467531bf106c3f2c1021638ef5a8,2024-05-21T12:37:59.687000 @@ -258522,16 +258528,16 @@ CVE-2024-4451,0,0,7d9df0a3b011ad00943a7e8af468a8b44c5ed08f6530b7317d9be30e3e418e CVE-2024-4452,0,0,8393f4e948f53b2fbde25aaf7f55c55c1f0989c48fbd4a40cb4c1f768b7a8d7d,2024-05-21T16:54:26.047000 CVE-2024-4453,0,0,bc1bfc8908fbb505485206b11e5cc2278d2416192493c6c78b1ac2e39a46d4c3,2024-06-10T17:16:33.460000 CVE-2024-4454,0,0,ef12942a51bdcd592bf2170096c1c09a451df07ea3cdb4fb15fcced864f88fa2,2024-05-24T01:15:30.977000 -CVE-2024-44549,0,1,95d002d4c0f2cba16cd184ab62e810c42d47abc2b51570dfaaedb60ad257bca3,2024-08-27T14:28:55.157000 +CVE-2024-44549,0,0,95d002d4c0f2cba16cd184ab62e810c42d47abc2b51570dfaaedb60ad257bca3,2024-08-27T14:28:55.157000 CVE-2024-4455,0,0,266cd4e6dd8917294ad9c9f8fba8b2f0acb52688c86d3ca408cceaa482353b44,2024-05-24T13:03:05.093000 -CVE-2024-44550,0,1,9f267ccbfa739b7dd965bc2964320acade2cb81782d1bf956b8f3a920e81fa22,2024-08-27T14:29:02.370000 -CVE-2024-44551,0,1,7cfee04dc07527f174553b866558e87b82a0d98be49e7df7868871c3ca77001e,2024-08-27T14:29:25.187000 -CVE-2024-44552,0,1,f01e50b83898cd096a0acc72142a08070af86d69cad25ffb5ff4a79e12438bcc,2024-08-27T14:29:35.297000 -CVE-2024-44553,0,1,eeef0e0fdbe831e765813f6d93a19cbbf0a7416445f20450dcd9a95f4681a26d,2024-08-27T14:29:45.970000 -CVE-2024-44555,0,1,79d5d49bf1bc4597ba26a6e2f4eac2577a558d608cab5b3b630e57ceed479a7e,2024-08-27T14:29:56.177000 -CVE-2024-44556,0,1,21b8f75a124871754bd554a0be835972bd8bdd87368ef911fa1d52b55f7f8dc7,2024-08-27T14:28:03.540000 -CVE-2024-44557,0,1,86b422667de9a5a113f22597ca61434642bafb87eec96c0dd71c14a0dd05cdc3,2024-08-27T14:30:17.523000 -CVE-2024-44558,0,1,6d87f392eda09922944831aa9fc2790f469b514dece92bfccefe48ebd558f473,2024-08-27T14:28:17.290000 +CVE-2024-44550,0,0,9f267ccbfa739b7dd965bc2964320acade2cb81782d1bf956b8f3a920e81fa22,2024-08-27T14:29:02.370000 +CVE-2024-44551,0,0,7cfee04dc07527f174553b866558e87b82a0d98be49e7df7868871c3ca77001e,2024-08-27T14:29:25.187000 +CVE-2024-44552,0,0,f01e50b83898cd096a0acc72142a08070af86d69cad25ffb5ff4a79e12438bcc,2024-08-27T14:29:35.297000 +CVE-2024-44553,0,0,eeef0e0fdbe831e765813f6d93a19cbbf0a7416445f20450dcd9a95f4681a26d,2024-08-27T14:29:45.970000 +CVE-2024-44555,0,0,79d5d49bf1bc4597ba26a6e2f4eac2577a558d608cab5b3b630e57ceed479a7e,2024-08-27T14:29:56.177000 +CVE-2024-44556,0,0,21b8f75a124871754bd554a0be835972bd8bdd87368ef911fa1d52b55f7f8dc7,2024-08-27T14:28:03.540000 +CVE-2024-44557,0,0,86b422667de9a5a113f22597ca61434642bafb87eec96c0dd71c14a0dd05cdc3,2024-08-27T14:30:17.523000 +CVE-2024-44558,0,0,6d87f392eda09922944831aa9fc2790f469b514dece92bfccefe48ebd558f473,2024-08-27T14:28:17.290000 CVE-2024-4456,0,0,4944908816b0dabd168db28a33c87155bafc589f1ccdd7f87c25aad569cea442,2024-05-08T13:15:00.690000 CVE-2024-44563,0,0,6dbd76e0f089d60e056938eea08be0958b9b4b0e2739be9b2567dba585143e70,2024-08-27T13:43:26.300000 CVE-2024-44565,0,0,e25f465e010d5d48f951ee0faaea27800251f5ba71d3aee72b61ca7f81604b74,2024-08-27T13:43:46.897000 @@ -258554,10 +258560,10 @@ CVE-2024-4477,0,0,b275cf91a81ef0e33ced77c1c5ba5e17245e6b33fc991fd87901e463b723d8 CVE-2024-4478,0,0,df092e6d564da1ba274f237ab38d20f4d3626835a8920b1b768f819806d6fce1,2024-05-16T13:03:05.353000 CVE-2024-4479,0,0,19a5d52fe32f562c79c648f88a021706b773334e3193aa8af739d9d0094fe357,2024-07-26T13:35:32.397000 CVE-2024-44793,0,0,2168e0c02c7a858cbaff9cee44bb5e6a195abfb08b3b31876bea7f6d43977fff,2024-08-27T13:02:05.683000 -CVE-2024-44794,0,1,11eeb67a7b853f1bc22c93c4e0ddf7e4d6c299bfd8e0ef5c1bd1a86a955e3ef9,2024-08-27T14:35:08.947000 +CVE-2024-44794,0,0,11eeb67a7b853f1bc22c93c4e0ddf7e4d6c299bfd8e0ef5c1bd1a86a955e3ef9,2024-08-27T14:35:08.947000 CVE-2024-44795,0,0,f9348c862b893d90addc6562eec87c7c0ce5090e93e9e7ffbd3fc77a1c96e860,2024-08-27T13:02:05.683000 CVE-2024-44796,0,0,ea2f83fd317230dba37a019c6df79333d03496931fcac69fc846f82ae10f3010,2024-08-27T13:02:05.683000 -CVE-2024-44797,0,1,7bc801096aef27df0c5244f5a3c761f34dc19dd9fff98d1b382da189467f2dbf,2024-08-27T15:35:18.880000 +CVE-2024-44797,0,0,7bc801096aef27df0c5244f5a3c761f34dc19dd9fff98d1b382da189467f2dbf,2024-08-27T15:35:18.880000 CVE-2024-4480,0,0,046ee1f51773a8c0ac4a6c81ddd78c147b0ada165d730df7b9b8d85146172347,2024-06-17T12:42:04.623000 CVE-2024-4481,0,0,c2852db732c7c65c13524ea22e5406663429c55dff3bfe0d5bbffa299f48bbd3,2024-05-14T16:11:39.510000 CVE-2024-4482,0,0,30c719bdf44110f5d77595f668147507c21a010645f412257434e159bd101a38,2024-07-03T18:24:41.627000 @@ -258573,18 +258579,18 @@ CVE-2024-4491,0,0,fec0fa99feb905362d1059ae18d849f25d02b15efc10c179ce136112d1e088 CVE-2024-4492,0,0,0237cea7742a82f916a95c7121fd101b19e30a52d4f326fc68f5db785a621a29,2024-06-04T19:20:39.047000 CVE-2024-4493,0,0,890374eb1d5a1051bad1d8c630ec03ea130ffcf654be5d03c4d1c85a0ebc3c87,2024-06-04T19:20:39.143000 CVE-2024-44931,0,0,a811432be893129eec1153f2a1f5cf79e00f6cda4409f2898f7f29e87e49d41f,2024-08-26T12:47:20.187000 -CVE-2024-44932,0,0,b9b428ac714479248a38f6aa5328f9659cf3f6bb05bd0a8b081d0a9fcb965d1b,2024-08-26T12:47:20.187000 -CVE-2024-44933,0,0,d9c934c6970fffc1955cc97b4ef87a94f168e7ebc726e7117b8befe7dec65632,2024-08-26T12:47:20.187000 -CVE-2024-44934,0,0,bc3fd915f4e894e5df7769c7b5789c56c846b7d8c86a93c71addbe99b5dccd88,2024-08-26T12:47:20.187000 -CVE-2024-44935,0,0,28d34c2d455a99f4a041c9f369313d10fab0764077059237ae0da04f50c526b2,2024-08-26T12:47:20.187000 +CVE-2024-44932,0,1,34330dfb165e1fba6e46b58c01253474b02f0143013b4d7b232046de617ca50b,2024-08-27T16:08:45.020000 +CVE-2024-44933,0,1,4b8d6d8796496a10942df74ea36b0343a95a4c8e561f02a6a6cf79113627fbd2,2024-08-27T16:08:38.973000 +CVE-2024-44934,0,1,c02ef0b8f3f4254298df3ea9cd3b57ad77027d83bf4e5f989954ab58227e0bc4,2024-08-27T16:07:58.727000 +CVE-2024-44935,0,1,d95aec9e91962acc52eb3e384a6783d63909024bc92ab328e0dd424f360e30ba,2024-08-27T16:09:01.633000 CVE-2024-44936,0,0,b9963badb762ccd078f0ff0276e3a054720ee02adaf519a8ed2637b289dbf485,2024-08-26T12:47:20.187000 -CVE-2024-44937,0,0,f986df9f3a81c357c46e4c560b7aa106ca36f97bb2b3bffee36325baa7a711dd,2024-08-26T12:47:20.187000 +CVE-2024-44937,0,1,d456b794ce05568f4cfe23042c645d8e132bd17f43b2774d90973742618e150d,2024-08-27T16:10:11.423000 CVE-2024-44938,0,0,81d8c4fa2822291c31e2752229de00d1bfc6803d6c6c74b987910dc96d3f451e,2024-08-26T12:47:20.187000 CVE-2024-44939,0,0,df2a3231cc28f02dcccf984f7f5e5e4e9d5e3f87d2741a1f7e67c845a96a8582,2024-08-26T12:47:20.187000 CVE-2024-4494,0,0,48359226f338c9b2ea2806c2c68d5e2ef65a24ac708162309f084eae0ceb81a4,2024-06-04T19:20:39.240000 CVE-2024-44940,0,0,f3c78670c961ed218069273846baa8ab159598a99ca4d39386baf88d3ac01c7d,2024-08-26T12:47:20.187000 CVE-2024-44941,0,0,15a1c7001949731e4df03f4a864ae7a9e64adc22c4c644da2de0836d77651385,2024-08-26T12:47:20.187000 -CVE-2024-44942,0,0,5f6194bb3c8da3035afff5c005b2a8e16fb399857ef810b893e138ee0d5a384a,2024-08-26T12:47:20.187000 +CVE-2024-44942,0,1,17b37362bd3ba24b1a5ce481b72105519e3d684fbcb26bdd0327529225c432f3,2024-08-27T16:09:10.010000 CVE-2024-4495,0,0,cb1d8bc801c43f7ab8180176a646c9e39a56603c1305eac804522af3adac0fa8,2024-05-17T02:40:25.167000 CVE-2024-4496,0,0,6e858d3d5b48b877aff577f900a80fd10c799bd74cdf4188d346fa0d13641a80,2024-06-04T19:20:39.340000 CVE-2024-4497,0,0,6a1d6365c146727895628930cc6e441179a183396cbc0224f0d3e640240772d3,2024-06-04T19:20:39.437000 @@ -258629,12 +258635,12 @@ CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000 CVE-2024-4522,0,0,acd0b6b231758473c48ed22daa75c2f0d87280406667aa3ced0f39aaa73cb777,2024-06-04T19:20:41.320000 CVE-2024-4523,0,0,e149ff229bd41b5a453469b36d558b5c1f467161b85c2884a74fe2177217c73a,2024-06-04T19:20:41.420000 -CVE-2024-45234,0,1,4b3eecbe75c64cf8d46066aeb4347cf8775538d743d35431815d363ef479920c,2024-08-27T15:45:44.560000 +CVE-2024-45234,0,0,4b3eecbe75c64cf8d46066aeb4347cf8775538d743d35431815d363ef479920c,2024-08-27T15:45:44.560000 CVE-2024-45235,0,0,12ffac5ccf9101959e31fcf0cfbde69d544eaa4a6e68395ec661cd3f82a2da19,2024-08-26T17:35:17.953000 -CVE-2024-45236,0,1,9f46d1e309d244d60318b2e583a075d74d8dfa3f46db84beb50215ce95ea0169,2024-08-27T15:48:05.687000 -CVE-2024-45237,0,1,85efd776ebcd0ac34d6f27b186bcb3f452cb394086ae2af06eaedbc3b8fc7cf6,2024-08-27T15:48:34.030000 +CVE-2024-45236,0,0,9f46d1e309d244d60318b2e583a075d74d8dfa3f46db84beb50215ce95ea0169,2024-08-27T15:48:05.687000 +CVE-2024-45237,0,0,85efd776ebcd0ac34d6f27b186bcb3f452cb394086ae2af06eaedbc3b8fc7cf6,2024-08-27T15:48:34.030000 CVE-2024-45238,0,0,f8334e18bc936cc0abcb6099adc676b6ed3220bd80de47b1a24322fe3be6ec3d,2024-08-26T16:35:13.637000 -CVE-2024-45239,0,1,c3ffeaf25be7007252e004249861dec4385985427eba5bc5855dd2ae53128f58,2024-08-27T15:49:31.417000 +CVE-2024-45239,0,0,c3ffeaf25be7007252e004249861dec4385985427eba5bc5855dd2ae53128f58,2024-08-27T15:49:31.417000 CVE-2024-4524,0,0,8e732eea1a281702bf1b965cf73e8243f70f2376e5e0521757bce6618382002a,2024-06-04T19:20:41.520000 CVE-2024-45240,0,0,71d060de9ce29049494d6966979673903641ebddefc965fc9df5c7a08f6ba1cb,2024-08-26T12:47:20.187000 CVE-2024-45241,0,0,b079c0a31c29eecc74f920b95f37f9f5c6fbeb946d62d260e7199938688e7861,2024-08-26T16:35:14.650000 @@ -258643,14 +258649,15 @@ CVE-2024-4525,0,0,dfe2a87106534aea559d2a64c000518f6d0b8952ad5d7b752f8fc10ec2414d CVE-2024-45256,0,0,4a4b83adefef92d16e6e4183f85729c0b386c1024d8d0fd2baaf64a1cf5545c2,2024-08-26T13:35:02.937000 CVE-2024-45258,0,0,20ee97d2eb3a83f8d2a7be46b53936d32dfd424c455ff5dc5358a331a56dedc1,2024-08-26T14:35:08.627000 CVE-2024-4526,0,0,87a45e4eb41404ceb4b9ba3ca9513f18cac2687a381a0d6211a80485bbac625a,2024-06-04T19:20:41.720000 -CVE-2024-45265,0,1,32b1057978cea9d5f5845b9f4e3926bb7432d8755213d6bbe9f6e3c948032919,2024-08-27T14:35:12.220000 +CVE-2024-45264,1,1,2ad7fa5d245a9e53c333a3b14a15ed25ba75de4e2036f4415ee1805913d12be2,2024-08-27T17:35:08.307000 +CVE-2024-45265,0,0,32b1057978cea9d5f5845b9f4e3926bb7432d8755213d6bbe9f6e3c948032919,2024-08-27T14:35:12.220000 CVE-2024-4527,0,0,c7ad79186f39af6c4287cf90f197f2ec298291b738fc5af7e4ddede8b4e9adfb,2024-06-04T19:20:41.810000 CVE-2024-4528,0,0,7b720d00d965c73e07e6aefd4c36ac932b079840a05c5efc530ca8c4800fb595,2024-06-04T19:20:41.917000 CVE-2024-4529,0,0,5fbb4c14219ef7d51954458b7780a68dbee769876e9489db6e9ba34bd68834fa,2024-07-03T02:07:42.220000 CVE-2024-4530,0,0,6b78f15ba2a60e96a20ff176cd49d228ee37f0e30a4b3e696092a717f8a23e27,2024-05-28T12:39:28.377000 CVE-2024-4531,0,0,5dc1dd0922f3418ce95c33a9fc334c76453bfc98ac8636a0eebb27c9c952bb3f,2024-07-03T02:07:42.610000 CVE-2024-4532,0,0,4fd2f02f0358f1c611846b77f1b0e80bcb1985e07f23fa6a21a71cc25593500a,2024-05-28T12:39:28.377000 -CVE-2024-45321,0,1,37b6c3801843cd19376dfc008024087eb46b0d9a726e5ad21af320498cf91f40,2024-08-27T14:35:13.357000 +CVE-2024-45321,0,0,37b6c3801843cd19376dfc008024087eb46b0d9a726e5ad21af320498cf91f40,2024-08-27T14:35:13.357000 CVE-2024-4533,0,0,aca3a412ead1ce1343d6f498450801be5e059db6302d74881039b5fe75fb6c09,2024-05-28T12:39:28.377000 CVE-2024-4534,0,0,527a3127a7586bdf18d80cd2b5b17fe74ac5ed6a2aa4ee562148173cc1d9d3e9,2024-08-09T19:35:09.923000 CVE-2024-4535,0,0,87b4b5e0787ea182ddd9c6fa8e26c59b6c616e4e57e592ee0d6f169678ff9b64,2024-05-28T12:39:28.377000 @@ -258952,7 +258959,7 @@ CVE-2024-4868,0,0,115d92ddb75cc1364cb7dc1ed780a32e113f5bc6f17706ce21f4cd60cd219a CVE-2024-4869,0,0,c966893d60f3d2b834063ff6490a8006deca39b71769e89345f5be1133a2f10c,2024-06-26T12:44:29.693000 CVE-2024-4870,0,0,34dc62fe0d9ee09fd087b0b9ccdcdae4c15125668207018dedb4b3cfd451baf0,2024-06-04T16:57:41.053000 CVE-2024-4871,0,0,27d58887099f376e93909bb4c2214524b0789bbba79f05cabea36e120d5295ee,2024-08-12T16:15:17.313000 -CVE-2024-4872,0,1,eb6d7f4214203eee8a6cb72e8d792186755c20a5d101f33f66ef4b3cea8dad55,2024-08-27T15:52:01.317000 +CVE-2024-4872,0,0,eb6d7f4214203eee8a6cb72e8d792186755c20a5d101f33f66ef4b3cea8dad55,2024-08-27T15:52:01.317000 CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000 CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000 CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000 @@ -259214,7 +259221,7 @@ CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e4674 CVE-2024-5178,0,0,bd0c2f144426314e1167d96790d03a45b87cc8b4eeec82d66437d8c03cef924c,2024-07-11T22:15:02.467000 CVE-2024-5179,0,0,6961559157b2692b340c3a167eca15cc044aebdebaf78fc359c62b997a6f0a1a,2024-08-06T12:10:17.047000 CVE-2024-5181,0,0,bbf6825e1d5f360a1a58b67dff2bf4d85afbf0a93fef4d4bb8dfd7975bcf0e60,2024-06-26T12:44:29.693000 -CVE-2024-5182,0,0,202900a25610cb43bbfa5c0ebd643532aef52b4f6388e9574c325e6b5ccc3845,2024-06-20T12:43:25.663000 +CVE-2024-5182,0,1,58b8232fd0b5e70f15eeeb5297ff44723ef92c555fd120d8b123a01ca786d63b,2024-08-27T17:30:21.127000 CVE-2024-5184,0,0,913e376e9213bf80a4ef6a0008bd230beba5d0e3fbd42416956e3dc16ba16e7b,2024-06-18T17:06:20.257000 CVE-2024-5185,0,0,3d9097e9edd68b1a61ddf8b22d544b13320bd5fe9c392649fb66d80c69a658af,2024-05-29T15:18:26.427000 CVE-2024-5186,0,0,69118220a4589595e04a16dac1408d0d7061fc9b2dd45293e94f807b7f32a65c,2024-06-07T14:56:05.647000 @@ -259474,7 +259481,7 @@ CVE-2024-5463,0,0,4d43b352cf9202f80c2f04ee56f4d6c5363c98e3eebea680338a85f124fca3 CVE-2024-5464,0,0,87d260a13f52f3a01db81247aa60ad8629b4b67f72e7ca5812703b2de9e3fb0a,2024-07-16T15:19:27.493000 CVE-2024-5465,0,0,c54306dfcc71e50bcd77c603fadee0b02af76d4cc30340f017524a72c7deac1a,2024-07-16T15:19:04.987000 CVE-2024-5466,0,0,7210eb30821301ab6ac0b6aaa79a17e39c84346dbb1ec0b37d3f9aca66c7a349,2024-08-27T13:32:50.803000 -CVE-2024-5467,0,1,d5f2177f9d3ea444dfbcd8018e7c02f38607b067be38c512aaf8da3b2751677c,2024-08-27T14:35:48.977000 +CVE-2024-5467,0,0,d5f2177f9d3ea444dfbcd8018e7c02f38607b067be38c512aaf8da3b2751677c,2024-08-27T14:35:48.977000 CVE-2024-5468,0,0,a9b6881473aab66cd93b6151044b19528c011d8001f0e2556b425e826958e7fb,2024-06-13T18:36:09.010000 CVE-2024-5469,0,0,379bb9230b13b3cc6c5badc54ed7dbfea438613371475736e27add03b9354c6d,2024-08-16T19:59:15.573000 CVE-2024-5470,0,0,6ad8fffdbc9fc3c2ca94bc381d3be223e310676e26148212c497e243b6c17473,2024-07-12T16:52:52.883000 @@ -259494,7 +259501,7 @@ CVE-2024-5486,0,0,f91d9d4f8dd33400d578f70c776b5213e5c4514fd91351556f80643703e916 CVE-2024-5487,0,0,603a9f7b9f0723e5fc42b5dbe6b305c40aa06a72aafc0fdd27e92237c27fc66f,2024-08-16T20:22:51.930000 CVE-2024-5488,0,0,1ba8afad84fb064b3094b3beeaef45abdf0d0012417462bce1916c1780ec0647,2024-07-11T15:06:31.120000 CVE-2024-5489,0,0,855f98d82c4255d7a1decf5a548f61d8944b9bffb6e3f6a5299c190e758f26a4,2024-06-11T18:15:01.617000 -CVE-2024-5490,0,1,550ca49b1a9638870eaa3dc47bb23b91b37d9322ef002becfd183f7f72dde643,2024-08-27T14:36:10.033000 +CVE-2024-5490,0,0,550ca49b1a9638870eaa3dc47bb23b91b37d9322ef002becfd183f7f72dde643,2024-08-27T14:36:10.033000 CVE-2024-5491,0,0,c9a62638dd7b2098d22ccc85d55914e20b3d8c19adc41e6518825648965a51ba,2024-07-11T13:05:54.930000 CVE-2024-5492,0,0,c1b752674fdbd97871ded2471e93cce68a0c42e212cdcca0b70fc8b5a2b6c4b2,2024-08-01T13:59:48.837000 CVE-2024-5493,0,0,6197d264f9043f6827bed7540062d250b0374cc18469d389f548454d0f106bc1,2024-07-03T02:08:58.650000 @@ -259550,7 +259557,7 @@ CVE-2024-5552,0,0,7f73b574dd8e83d52dd7f28ecc579b960fbf7de562da98c7e63b5b8e0fd54b CVE-2024-5553,0,0,c4739ca4bfc71591786473d36aff26ccf561ba778e4c902dca863cedff7bba13,2024-06-13T18:36:09.013000 CVE-2024-5554,0,0,0f1d3226bb0a486c4b917c91c2f0f711d8f9d9fbb5ad6f69f3a6a7fdce6ab9ad,2024-08-22T16:43:52.650000 CVE-2024-5555,0,0,ea0332df14a2e6edd0aa953ada9ade3a1da4ea6fb56dda0883a54ace27f96d97,2024-08-22T16:46:14.177000 -CVE-2024-5556,0,1,d62821f79c014d8bd3b8ebad4ab01472998b76ab3b1f4af6f7172759a04478d3,2024-08-27T14:36:53.273000 +CVE-2024-5556,0,0,d62821f79c014d8bd3b8ebad4ab01472998b76ab3b1f4af6f7172759a04478d3,2024-08-27T14:36:53.273000 CVE-2024-5557,0,0,71e19027344115370537e5e9f2ac729a9013865b6ffe7632f9b652113dae4753,2024-07-25T20:00:46.653000 CVE-2024-5558,0,0,d7061155c6f430b38a1e769635e4eca1c24478e5beedfff7ff120ab1f85e7481,2024-07-25T20:00:25.773000 CVE-2024-5559,0,0,ff51559fb7e7362b104a8f1f28895eef2d8f7eb659f926ae6c1cbfda694d488d,2024-08-23T16:35:30.827000 @@ -259570,7 +259577,7 @@ CVE-2024-5582,0,0,3868d6c914880d2428453bd960a7aeb89cb5bb99f0fc09b9de444e14a34c60 CVE-2024-5583,0,0,a52c5f9a8d9ac0fe663104ce6a0dba81953ccf58fcb95200cb4b374852c72783,2024-08-22T12:48:02.790000 CVE-2024-5584,0,0,7705ff7ae1b4fd1342d12756cedf379ac85bb5a3b8398b6b986f5e220e43afde,2024-06-11T13:54:12.057000 CVE-2024-5585,0,0,b8a6130124c428c97635ba022f402f27dfa4e9cda99398d4024d0e451e3796fc,2024-07-28T14:15:11.033000 -CVE-2024-5586,0,1,0ee3a32a0a5dc88926ac745a2d0659b1dc6bdda8e4833fd7b551018aeccce302,2024-08-27T14:37:06.513000 +CVE-2024-5586,0,0,0ee3a32a0a5dc88926ac745a2d0659b1dc6bdda8e4833fd7b551018aeccce302,2024-08-27T14:37:06.513000 CVE-2024-5587,0,0,6b9958828217f46ad00f93a8982028b537e303232ee58bb83f00389806575abd,2024-06-03T14:46:24.250000 CVE-2024-5588,0,0,acef4f2a5b13b06d4d5ee520a9930094f7a31b3a0afbb85d203e32266b0c3daf,2024-06-04T19:21:10.267000 CVE-2024-5589,0,0,b953e771129cea5914eaea0b8a60776be2e7649c39db097d6b9bdb3cfd517741,2024-06-03T14:46:24.250000 @@ -259931,7 +259938,7 @@ CVE-2024-6046,0,0,7dad2a883b5a6da9c2e106a85fbceea037db3e317153d640ef723443f1cc06 CVE-2024-6047,0,0,85682382a3873811b400f354140b032b3237064163e98177d5be59d88a26c9c1,2024-08-01T22:15:39.020000 CVE-2024-6048,0,0,c67416098261daba4fbb7cd933140c3939f890be764cfd8ea2022f29e8208654,2024-06-17T12:42:04.623000 CVE-2024-6050,0,0,977e3c1d954bb2d407afb4f807be75a02157bd9cd72111a32e132ff13e7f9262,2024-08-15T17:21:21.920000 -CVE-2024-6052,0,0,311d1a195ec7068c80087a7c35c949994e366451638024dca55c15679d5114b2,2024-07-12T13:15:21.680000 +CVE-2024-6052,0,1,38b34f27bf68c4c46450287788affa9aba60ae6b039318e5898c7b1f92d4d920,2024-08-27T17:56:02.507000 CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000 CVE-2024-6055,0,0,69ea90ebaa7aa8fe33baa786beceb3ec128eecc80f960a60b64b4cba1327c031,2024-06-20T12:44:22.977000 CVE-2024-6056,0,0,7f74134484f6fd18fa58f8938789bdbc0044ca3e8ab999314ec931796600d896,2024-06-20T12:44:22.977000 @@ -260377,8 +260384,8 @@ CVE-2024-6627,0,0,c1ab91b855386d03fb23ec47d7ea95469618609ded94a66bedffee95371608 CVE-2024-6629,0,0,e7fb6a99ed3ad0ead40ca75ee8e19034c6248a18a082e5cb8e8eaa0368a38b0a,2024-08-14T19:26:41.113000 CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000 CVE-2024-6631,0,0,1e6b5531619b1da5a2d5ea58f6eb35ebd283fdf27dc23509e38939480091d853,2024-08-26T12:47:20.187000 -CVE-2024-6632,1,1,c8d6583fed11502272ee79a18d8cb2823c399fbf47ffdb9c5058b746056174d8,2024-08-27T15:52:01.317000 -CVE-2024-6633,1,1,232bda3653ec683349c8973239586e5047851cf81752c2edf78d3e9f92fdc078,2024-08-27T15:52:01.317000 +CVE-2024-6632,0,0,c8d6583fed11502272ee79a18d8cb2823c399fbf47ffdb9c5058b746056174d8,2024-08-27T15:52:01.317000 +CVE-2024-6633,0,0,232bda3653ec683349c8973239586e5047851cf81752c2edf78d3e9f92fdc078,2024-08-27T15:52:01.317000 CVE-2024-6634,0,0,20e842ed204ff1f080594226c009c0585274acd37661b69fb1d6603728f53ffe,2024-07-29T14:12:08.783000 CVE-2024-6635,0,0,97d6e55960f6f2e5010584395fc193a0feb186e4d795b57d89159c3132b84fff,2024-07-22T13:00:31.330000 CVE-2024-6636,0,0,b927f4aba2100824a9064e3c9444e3f54a47671d743161ced3b5a100a38b49ab,2024-07-22T13:00:31.330000 @@ -260502,8 +260509,8 @@ CVE-2024-6807,0,0,07688665534f45cd2e7da0c34e23ec72f349fed7ba2bc33cacddabe8a931b9 CVE-2024-6808,0,0,2df5a702fa4af6687f0c8dc8e100812ff9b6b346801edb239f41e0ca638c0076,2024-07-19T15:04:43.837000 CVE-2024-6811,0,0,3783c4b19c44b2b3a4352141b8d7f3cd7a14a6c6285a64de15dc2bfb019618a1,2024-08-23T16:27:10.317000 CVE-2024-6812,0,0,8e1121952c5aeb16bf1d39eda593e33b37b43c381863d39f50a5660da76ba8d3,2024-08-23T16:29:39.737000 -CVE-2024-6813,0,1,288fb5f3b41e930aaeda182bc54b653e53d0161372a0e3799ecbdc40b9084de5,2024-08-27T15:01:38.630000 -CVE-2024-6814,0,1,de17dadc03a3a7b793b54f2a6cb99adf9aac2d3ddb1fae1587e0c4f510c1fc2e,2024-08-27T15:03:09.817000 +CVE-2024-6813,0,0,288fb5f3b41e930aaeda182bc54b653e53d0161372a0e3799ecbdc40b9084de5,2024-08-27T15:01:38.630000 +CVE-2024-6814,0,0,de17dadc03a3a7b793b54f2a6cb99adf9aac2d3ddb1fae1587e0c4f510c1fc2e,2024-08-27T15:03:09.817000 CVE-2024-6823,0,0,1e2d1c8757819689d6550f5aeeb754dc03b20b4dd91487b47d8b2bbdb01a8e63,2024-08-13T12:58:25.437000 CVE-2024-6824,0,0,2b5b10cc415939a34f32e5b37be54f877a179f9144de8a5e8476b884ab80faa8,2024-08-08T13:04:18.753000 CVE-2024-6828,0,0,5e3bce0050be5ef41f841daf735b80af46e729368278d26d6a7ddc5bbbdee66f,2024-07-24T12:55:13.223000 @@ -260594,11 +260601,11 @@ CVE-2024-6968,0,0,dcf4fdd98b06a8e0045757b1e3508bd497797b584b272df840a344f24010b3 CVE-2024-6969,0,0,a98e2b6f93f948b11fce949d5d2bf2ae38a52860637730f6865f49bf11e07542,2024-08-19T17:50:03.167000 CVE-2024-6970,0,0,4194a84f3c5724b9bace97395e0f8e6456cd70a8d0cf3d46afccc165b27983cb,2024-07-25T15:36:44.567000 CVE-2024-6972,0,0,136930c91bb85ebbdb27bc99dae627302f90363fa18ab987405ebabe27d12e99,2024-07-25T12:36:39.947000 -CVE-2024-6973,0,1,9bcac54b07f64371109cf6c17f16f57c8cc24336c737269dc5d4e2a7b649dbb8,2024-08-27T15:34:18.620000 -CVE-2024-6974,0,1,87e35dfa7758fb3e456f51ae7c2c1005342757b141d54c95c0eb015bf95a4e2c,2024-08-27T15:36:40.667000 -CVE-2024-6975,0,1,d63385a625ec15f0611b849f606ef80820f5aa79d2e921c6e99e1d59f30cf02e,2024-08-27T15:40:05.223000 -CVE-2024-6977,0,1,dced37193034395cbd70a15c25ae6f2fd108fd86d3d88b19be8a8af0292bdfe7,2024-08-27T15:41:15.443000 -CVE-2024-6978,0,0,64a88bc34d513859dd2dd041cf1a8a5612d656d4dc0f406f1231eec35017bb61,2024-08-01T12:42:36.933000 +CVE-2024-6973,0,0,9bcac54b07f64371109cf6c17f16f57c8cc24336c737269dc5d4e2a7b649dbb8,2024-08-27T15:34:18.620000 +CVE-2024-6974,0,0,87e35dfa7758fb3e456f51ae7c2c1005342757b141d54c95c0eb015bf95a4e2c,2024-08-27T15:36:40.667000 +CVE-2024-6975,0,0,d63385a625ec15f0611b849f606ef80820f5aa79d2e921c6e99e1d59f30cf02e,2024-08-27T15:40:05.223000 +CVE-2024-6977,0,0,dced37193034395cbd70a15c25ae6f2fd108fd86d3d88b19be8a8af0292bdfe7,2024-08-27T15:41:15.443000 +CVE-2024-6978,0,1,37cb13cf871d0be71d7cccfe060430953b559d3b1fa288f5a4e9f8855fa3ca36,2024-08-27T16:17:54.077000 CVE-2024-6980,0,0,f6625eb84b24e1b38c56cc3bb53a8be195d62bb4e9db2a7b8e6feb6123dc7610,2024-07-31T12:57:02.300000 CVE-2024-6984,0,0,70dfda1fc41774868bc9c54996b49ac58100ddec2443c12ad657af853bca03be,2024-07-29T16:21:52.517000 CVE-2024-6987,0,0,330d8660e6c8d71a307c7f147e933f5e3b64b2ed81a202f0c00b33c60663824c,2024-08-08T13:04:18.753000 @@ -260635,7 +260642,7 @@ CVE-2024-7055,0,0,b0e8b0793ccc61abbc70699af6d91421241877ab1f640f57d490cff121ecbc CVE-2024-7057,0,0,e86292da776d8c2eee12db885a241ac453174252cdfea8e6058f6d373bd4dc19,2024-07-25T12:36:39.947000 CVE-2024-7060,0,0,2e0c92013c1ddde1bca0ad9e62aa50d23e69e1a598796a2170f54fccf61e7f4b,2024-07-25T12:36:39.947000 CVE-2024-7061,0,0,686447eb073761a4f06d26ef5139931ec89b27cf41fe306832f1b298f86de885,2024-08-07T19:09:46.290000 -CVE-2024-7062,0,1,95520405d89c9e85e2e20b19a5c4882dbc79fcc2537e689d2c94915f74a470cf,2024-08-27T14:00:21.543000 +CVE-2024-7062,0,0,95520405d89c9e85e2e20b19a5c4882dbc79fcc2537e689d2c94915f74a470cf,2024-08-27T14:00:21.543000 CVE-2024-7063,0,0,0d05b5614f7552a1191547d1c63e6af55c9bef6fb9e919ea51ef069e5df2841d,2024-08-15T13:01:10.150000 CVE-2024-7064,0,0,5f6dedf11b173ba1a8a6a366c520a45122cad062892b1564ebd329daa4d14d92,2024-08-15T13:01:10.150000 CVE-2024-7065,0,0,b60da7247be245fb0b45418a0a10e8a3d1472f03a8c405e7e3143c239b51192a,2024-08-16T18:03:05.830000 @@ -260643,7 +260650,7 @@ CVE-2024-7066,0,0,8c5c53ac4131ac7de0832bfc6be834864b18719d408b4b18b0bbc9b024e03f CVE-2024-7067,0,0,edbddb223a917ac8e1a9e4a55d4a5029d93724357fc61dc50ee8384e13f8f4e7,2024-07-26T13:14:31.417000 CVE-2024-7068,0,0,d3dd5dc06b13cea6ca5e0ca06538fc2c3e10b3dda31b16ef6e21ea77c7fa728b,2024-07-25T17:47:18.717000 CVE-2024-7069,0,0,739e886131312a7d1c8ccd6a4f98d25c3687954f1471fb4fef37a66c2cb88966,2024-07-25T17:33:53.777000 -CVE-2024-7071,1,1,088429ff2bf7d81c254d71af6a93fdf4d2dfe96fab20ca145399e86eb89ba4d2,2024-08-27T15:52:01.317000 +CVE-2024-7071,0,0,088429ff2bf7d81c254d71af6a93fdf4d2dfe96fab20ca145399e86eb89ba4d2,2024-08-27T15:52:01.317000 CVE-2024-7079,0,0,432b6c38d04c17da8e2aeea6e5677915e33a84f70f04ebe0988a953bc8892b6d,2024-07-26T10:15:02.840000 CVE-2024-7080,0,0,e8f51ead66f7469f7e63dc63102236554262bdfa2e68b9dc33e11c14a1ca04d2,2024-07-26T13:22:43.387000 CVE-2024-7081,0,0,6a139e489a9ff084a663269dd9c842c08d77e29c45f0c2d71d596839a517bb01,2024-07-26T13:18:21.957000 @@ -261182,8 +261189,8 @@ CVE-2024-7934,0,0,378bcc55a3df62e429d1f101d54479de592e8336c09692e7e3a6942b8872bb CVE-2024-7935,0,0,de5faf49db18a7840e6f8ddda5ba5a34ca6452592345acf93a6a1be43f2a05c7,2024-08-23T19:52:06.570000 CVE-2024-7936,0,0,cf4365fe1d0752346fd362041feab4848729c5ce67cb542c05b95010d5242c1e,2024-08-20T15:44:20.567000 CVE-2024-7937,0,0,bfd626110b4738097d3eecc17d410635b5492a7f6c8b4af76523530d264a7d87,2024-08-20T15:44:20.567000 -CVE-2024-7940,0,1,c6f423f2b42a2fa2f207dbe4fa5849cf630d4d81436ada726895ff9b4151e77e,2024-08-27T15:52:01.317000 -CVE-2024-7941,0,1,77b44bc4d6878b7df0eb95e35f81ca8d59535ebb8b2e02ca2418a09213f68a6b,2024-08-27T15:52:01.317000 +CVE-2024-7940,0,0,c6f423f2b42a2fa2f207dbe4fa5849cf630d4d81436ada726895ff9b4151e77e,2024-08-27T15:52:01.317000 +CVE-2024-7941,0,0,77b44bc4d6878b7df0eb95e35f81ca8d59535ebb8b2e02ca2418a09213f68a6b,2024-08-27T15:52:01.317000 CVE-2024-7942,0,0,5b31cb5e8458774e5fec47eb01ab09f3b7e76a9f352de27f599173dde8e64b06,2024-08-20T15:44:20.567000 CVE-2024-7943,0,0,84fd281936993964831a8456f79f6df290184647869e7054aff52b4493acaea1,2024-08-20T15:44:20.567000 CVE-2024-7944,0,0,746f5ab96ce75fa2f3ceb934a195b4543f73936672a5c19d615f70b88c853fd7,2024-08-21T15:24:44.280000 @@ -261236,9 +261243,9 @@ CVE-2024-8077,0,0,dfaba62e1a5ac86b8269d34e4d8f061b3115ba664d3b281f9df2a189f22367 CVE-2024-8078,0,0,56fa022d353460bea9cc13531e8ff39ff18a56376aa15fa3c7ad1544c4d78eb9,2024-08-23T16:18:28.547000 CVE-2024-8079,0,0,45e2451b8ff502b01a62e2eb189952370de6cb2828a8e3600f61fbc081041d88,2024-08-23T16:18:28.547000 CVE-2024-8080,0,0,c8da83ed651e2e78327dca04cb45f8efec07e44d550ef7a9ff0faf681234c986,2024-08-23T16:18:28.547000 -CVE-2024-8081,0,0,228978e462b6f531f1f028628affa80e6a3b9dae3f5e4460d54f618867e8c24f,2024-08-23T16:18:28.547000 -CVE-2024-8083,0,0,d9a82ea9f31532bfda37fecac751c04bbca7fe5c3cf11f74c5dbd79505058775,2024-08-23T16:18:28.547000 -CVE-2024-8084,0,0,e168cbe5513918328c29c72c3002ff2a8e46fd9d48bec9183a6df1817fe95bb9,2024-08-23T16:18:28.547000 +CVE-2024-8081,0,1,a5310bc7e9b22185784b602e8eec862129b29e3e8dd39db46315df64d68f05ff,2024-08-27T16:12:33.580000 +CVE-2024-8083,0,1,132ff33ed62a0570cfdbcc24775ef89bd874f9ae2d6b782cd1fd9309d1bcaa15,2024-08-27T16:11:35.730000 +CVE-2024-8084,0,1,800f6f0fe2093be3327a671bc62389e5ecd680550a19025f92dbb7c739b52793,2024-08-27T16:11:11.460000 CVE-2024-8086,0,0,1db8fbbbc3b8bbc355402aca80f0447c54000b25360ca3b1fa582aada4800dfb,2024-08-27T13:17:34.187000 CVE-2024-8087,0,0,9e47ad2dfed1c8a4045274b6d757cb5a75d1e05917b45ee6f1489b72f67b871b,2024-08-27T13:19:35.530000 CVE-2024-8088,0,0,59d209ebea916c4dc2d86b3c8215979f6261e01bc484ccba8dba82dfa07cf28c,2024-08-26T19:15:08.433000 @@ -261247,18 +261254,18 @@ CVE-2024-8105,0,0,752bedc9f1c31babb6206d0feb37f4463554ca0baee90f1af7f94ac05e5257 CVE-2024-8112,0,0,53bc9e4fb84bb028363b46c3cb18428063770b5e5c085f93ec85e24d18222c0b,2024-08-23T16:18:28.547000 CVE-2024-8113,0,0,663828d204cb9ecb17f530ae295b4541dee23e7a4b7b9d658530d5cb44ff87e3,2024-08-23T16:18:28.547000 CVE-2024-8120,0,0,01c88c2799a0f705aef2a62e6160ed1b8715b8884806e83ea99e7deea744cebf,2024-08-26T12:47:20.187000 -CVE-2024-8127,0,1,5102baf959cfebdfcce1f9ebf5537e39c68d598c19a75f9e8284fbe283c6efe3,2024-08-27T14:53:45.257000 -CVE-2024-8128,0,1,d07e75d47fb86cf66a48a7ed0955a75ebdca9af77e0b6c43500f577ad4f51a7f,2024-08-27T15:32:47.997000 -CVE-2024-8129,0,1,39dbf19e98dba6341432a7bc1b8c1b6b77a667d2938ed3ce971d1f146a38e875,2024-08-27T15:33:23.187000 -CVE-2024-8130,0,1,c2976b205dbcfe2c32d2a14fa2bb0ef89d08a03f5f0a99670402c74e291c23e9,2024-08-27T15:34:08.287000 -CVE-2024-8131,0,1,8d2cc392098aa1acfcba3335f4e832cb4a14c0d367c20146c4277346d77cd35b,2024-08-27T15:34:36.710000 -CVE-2024-8132,0,1,86dba81143059f24966469b7747ff7b68cc3e5a5884ab1c52b0a9330eef648e1,2024-08-27T15:35:01.557000 -CVE-2024-8133,0,1,746ff58bb6a8d9228c3f6388f7428701b89fe4844dc79ed3cd0928b34faf7749,2024-08-27T15:35:20.063000 -CVE-2024-8134,0,1,5c482cb8572f20fed4ddeac588a7ad772c66ba2bb6cca4d764bb7e91bbc283a7,2024-08-27T15:39:53.537000 -CVE-2024-8135,0,1,4960ca3057b6ddbb9cef334653cc148a193c99079b3436d3ad6a4cd51ade8f2a,2024-08-27T15:41:47.080000 -CVE-2024-8136,0,1,4ea8d5d63a50e17f27fbaa1610041a0bd0f08ae3b124f32344e1613c14407e31,2024-08-27T15:43:27.937000 -CVE-2024-8137,0,1,c8dea2219f89417e98eb334c6ea5546931c71a764b1da5e712746e26e00f3101,2024-08-27T15:50:24.853000 -CVE-2024-8138,0,1,d4f3410822aa8428f24e5fbb3998e9658a09d63e3b56be3a698dc8e61d0c16c5,2024-08-27T15:51:40.590000 +CVE-2024-8127,0,0,5102baf959cfebdfcce1f9ebf5537e39c68d598c19a75f9e8284fbe283c6efe3,2024-08-27T14:53:45.257000 +CVE-2024-8128,0,0,d07e75d47fb86cf66a48a7ed0955a75ebdca9af77e0b6c43500f577ad4f51a7f,2024-08-27T15:32:47.997000 +CVE-2024-8129,0,0,39dbf19e98dba6341432a7bc1b8c1b6b77a667d2938ed3ce971d1f146a38e875,2024-08-27T15:33:23.187000 +CVE-2024-8130,0,0,c2976b205dbcfe2c32d2a14fa2bb0ef89d08a03f5f0a99670402c74e291c23e9,2024-08-27T15:34:08.287000 +CVE-2024-8131,0,0,8d2cc392098aa1acfcba3335f4e832cb4a14c0d367c20146c4277346d77cd35b,2024-08-27T15:34:36.710000 +CVE-2024-8132,0,0,86dba81143059f24966469b7747ff7b68cc3e5a5884ab1c52b0a9330eef648e1,2024-08-27T15:35:01.557000 +CVE-2024-8133,0,0,746ff58bb6a8d9228c3f6388f7428701b89fe4844dc79ed3cd0928b34faf7749,2024-08-27T15:35:20.063000 +CVE-2024-8134,0,0,5c482cb8572f20fed4ddeac588a7ad772c66ba2bb6cca4d764bb7e91bbc283a7,2024-08-27T15:39:53.537000 +CVE-2024-8135,0,0,4960ca3057b6ddbb9cef334653cc148a193c99079b3436d3ad6a4cd51ade8f2a,2024-08-27T15:41:47.080000 +CVE-2024-8136,0,0,4ea8d5d63a50e17f27fbaa1610041a0bd0f08ae3b124f32344e1613c14407e31,2024-08-27T15:43:27.937000 +CVE-2024-8137,0,0,c8dea2219f89417e98eb334c6ea5546931c71a764b1da5e712746e26e00f3101,2024-08-27T15:50:24.853000 +CVE-2024-8138,0,0,d4f3410822aa8428f24e5fbb3998e9658a09d63e3b56be3a698dc8e61d0c16c5,2024-08-27T15:51:40.590000 CVE-2024-8139,0,0,23ee4ccf2d9c5e05df9f6ad55b8abac4d2939314664f52958867b7c48ae5cfae,2024-08-26T12:47:20.187000 CVE-2024-8140,0,0,5905102d90fa9e01c1c294a1e12efca1eb0a1890a608c263dfef788228e71855,2024-08-26T19:09:52.653000 CVE-2024-8141,0,0,d494eb4aa5e779d518a311786c18c827e0ced59860399587e09c025afdbaf176,2024-08-26T19:09:16.763000 @@ -261275,7 +261282,7 @@ CVE-2024-8154,0,0,fbb17f9dd590ac994870ad751b395ff693888a574100db6420d6e8a3b3d34a CVE-2024-8155,0,0,fe38ccfd4767b6e01bc47bbf13a366f64470ea038445dcb6f48d6c1a6380c458,2024-08-26T12:47:20.187000 CVE-2024-8158,0,0,8ac397614ea8bcd3bd2bf49698f88ba96c85aeae3c3edb7c31f4b63e73c01d66,2024-08-26T12:47:20.187000 CVE-2024-8161,0,0,cd13a3f8a1d31274c9ab84b7ce8fd24ad13e50be7d970e595f1245741eba1677,2024-08-26T12:47:20.187000 -CVE-2024-8162,0,1,2f15be70d7b9e402b643053e8cc2849077cf4472f134c84060c0898ffb295f28,2024-08-27T14:28:46.927000 +CVE-2024-8162,0,0,2f15be70d7b9e402b643053e8cc2849077cf4472f134c84060c0898ffb295f28,2024-08-27T14:28:46.927000 CVE-2024-8163,0,0,2b33aa12e9b5396511ceeb0ddb5c09644e462e2419cefa1d9405e7869864efad,2024-08-26T15:15:23.727000 CVE-2024-8164,0,0,b4e3e587ad2686dce20b95e66c72594ce4762348dc65ff48827050c2ee56b3f9,2024-08-26T15:15:23.727000 CVE-2024-8165,0,0,f43afc9fcf1c1e78bc7ea9af37222216d3925e3673d7d3cab857085af5387f07,2024-08-26T15:15:23.727000 @@ -261283,13 +261290,15 @@ CVE-2024-8166,0,0,f12f4299a569f15901062ca88855adc385daab485a9c5a1ac8234fa6d74f6e CVE-2024-8167,0,0,e1d76d41e7f83c83df1202942336f7e4e5679c0385cffbe5279207329dff3a19,2024-08-26T18:45:44.287000 CVE-2024-8168,0,0,9955e844b80349a9eb3954506e8959a22faf2c7afd6ad4972803d0a2ade5036e,2024-08-26T18:45:02.637000 CVE-2024-8169,0,0,2fe56196262642c44aec8bafd52bbf787b8c04f89d2046b461b5203375e75588,2024-08-26T18:42:36.070000 -CVE-2024-8170,0,0,2546ec7489cdd8d2806bc9c3233ff705b1ba3c9779bbb7d0af932e65e9214804,2024-08-26T19:10:09.607000 -CVE-2024-8171,0,0,8313cebefcdd643a2b8f51ef85233dd2b9d482def10c232c6f5f563f3c07dd45,2024-08-26T19:10:09.607000 -CVE-2024-8172,0,0,e46bdd8e0bb0e3525332f99d2ba999dd880b47fd7157f3fb119a4107a1df0cce,2024-08-26T19:10:09.607000 +CVE-2024-8170,0,1,e7028e0b405dbb20fdca4f12f7f80cdc8739f22dd67ad43d2100093929ab7ccd,2024-08-27T16:02:50.577000 +CVE-2024-8171,0,1,799233d1b504a7fe9d2115d4edb9b50fc766ecc29c803bfb00827a455960ada6,2024-08-27T16:02:19.150000 +CVE-2024-8172,0,1,0f560f815e4f982c5fa8dce4e33b1159bf9bccf943a059983fd049dd30da680a,2024-08-27T16:01:35.047000 CVE-2024-8173,0,0,df3f4daf54afccb31b2d0dbd1ade86a4fd2b61ea5ed1b3d3f6de3c93aae29da5,2024-08-26T19:10:09.607000 -CVE-2024-8174,0,1,8543f0d8f92ea7727c4605df4b165224a3b6d137f11ee710b81d48c311ac7b21,2024-08-27T14:32:08.607000 -CVE-2024-8181,0,1,30918501aab4364009bd3804956f0f10b449aad4949fccf3aacccef25d5db4b2,2024-08-27T15:52:01.317000 -CVE-2024-8182,0,1,d21b4ee027b5d7ffbba2e6af93024450552ec0bbbe1dfa5ea2b2ec2db0e50d89,2024-08-27T15:52:01.317000 +CVE-2024-8174,0,0,8543f0d8f92ea7727c4605df4b165224a3b6d137f11ee710b81d48c311ac7b21,2024-08-27T14:32:08.607000 +CVE-2024-8181,0,0,30918501aab4364009bd3804956f0f10b449aad4949fccf3aacccef25d5db4b2,2024-08-27T15:52:01.317000 +CVE-2024-8182,0,0,d21b4ee027b5d7ffbba2e6af93024450552ec0bbbe1dfa5ea2b2ec2db0e50d89,2024-08-27T15:52:01.317000 CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000 CVE-2024-8197,0,0,60c1dd5a1a3c5aad3ac938fab8c46d1fa7e711c4df3249376b3e24407eb9fe54,2024-08-27T13:01:37.913000 +CVE-2024-8199,1,1,88a2f93ef77df30eb07146b30b8614ae342c96eb66f77009b3946574d520bf06,2024-08-27T16:15:08.173000 +CVE-2024-8200,1,1,cbca5414004709de4917047b9bbb6b671cc8c12242707037aa87aa934dfcfb5d,2024-08-27T16:15:08.383000 CVE-2024-8207,0,0,498323e8227fa40c3fd29b85835950264192b60730f689cfc748d515dfd6f7ad,2024-08-27T13:01:37.913000