Auto-Update: 2024-09-06T16:00:17.996592+00:00

This commit is contained in:
cad-safe-bot 2024-09-06 16:03:17 +00:00
parent d4e3c88e4d
commit 0c430b4aaf
52 changed files with 3432 additions and 313 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2020-24198",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-09-09T15:15:10.660",
"lastModified": "2024-09-05T19:15:12.033",
"lastModified": "2024-09-06T15:15:12.180",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A persistent cross-site scripting vulnerability in Sourcecodester Stock Management System v1.0 allows remote attackers to inject arbitrary web script or HTML via the 'Brand Name.' NOTE: The vendor states that the RTSP library is used for DEMO only, using it in product is a customer's behavior. Ambarella has emphasized that RTSP is DEMO only library, should NOT be used in product in our document. Because Ambarella's SDK is proprietary, we didn't publish our SDK source code in public network."
"value": "A persistent cross-site scripting vulnerability in Sourcecodester Stock Management System v1.0 allows remote attackers to inject arbitrary web script or HTML via the 'Brand Name.'"
},
{
"lang": "es",
@ -102,10 +102,6 @@
"Third Party Advisory"
]
},
{
"url": "https://github.com/Ambarella-Inc/amba-cve-info/tree/main/cve-2020-24918",
"source": "cve@mitre.org"
},
{
"url": "https://www.sourcecodester.com/php/14366/stock-management-system-php.html",
"source": "cve@mitre.org",

View File

@ -2,13 +2,13 @@
"id": "CVE-2020-24918",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-04-30T12:15:07.460",
"lastModified": "2021-05-07T14:15:10.947",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-06T15:15:12.280",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow in the RTSP service of the Ambarella Oryx RTSP Server 2020-01-07 allows an unauthenticated attacker to send a crafted RTSP request, with a long digest authentication header, to execute arbitrary code in parse_authentication_header() in libamprotocol-rtsp.so.1 in rtsp_svc (or cause a crash). This allows remote takeover of a Furbo Dog Camera, for example."
"value": "A buffer overflow in the RTSP service of the Ambarella Oryx RTSP Server 2020-01-07 allows an unauthenticated attacker to send a crafted RTSP request, with a long digest authentication header, to execute arbitrary code in parse_authentication_header() in libamprotocol-rtsp.so.1 in rtsp_svc (or cause a crash). This allows remote takeover of a Furbo Dog Camera, for example. NOTE: The vendor states that the RTSP library is used for DEMO only, using it in product is a customer's behavior. Ambarella has emphasized that RTSP is DEMO only library, should NOT be used in product in our document. Because Ambarella's SDK is proprietary, we didn't publish our SDK source code in public network."
},
{
"lang": "es",
@ -94,6 +94,10 @@
}
],
"references": [
{
"url": "https://github.com/Ambarella-Inc/amba-cve-info/tree/main/cve-2020-24918",
"source": "cve@mitre.org"
},
{
"url": "https://somersetrecon.squarespace.com/blog/2021/hacking-the-furbo-part-1",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48867",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T07:15:03.860",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-06T14:15:33.733",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,75 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: dmaengine: idxd: evita el use after free la memoria al finalizar. Al descargar el controlador, los descriptores pendientes se eliminan en el momento en que se libera la interrupci\u00f3n: idxd_dmaengine_drv_remove() -> drv_disable_wq() -> idxd_wq_free_irq () -> idxd_flush_pending_descs(). Si hay alg\u00fan descriptor presente que deba eliminarse, este flujo desencadena un error de p\u00e1gina \"no presente\" como se muestra a continuaci\u00f3n: ERROR: no se puede manejar el error de p\u00e1gina para la direcci\u00f3n: ff391c97c70c9040 #PF: acceso de lectura del supervisor en modo kernel #PF: error_code(0x0000 ) - p\u00e1gina no presente La direcci\u00f3n que desencadena la falla es la direcci\u00f3n del descriptor que se liber\u00f3 momentos antes a trav\u00e9s de: drv_disable_wq()->idxd_wq_free_resources() Corrige el use-after-free liberando los descriptores despu\u00e9s de cualquier posible uso. Esto se hace despu\u00e9s de idxd_wq_reset() para garantizar que la memoria permanezca accesible durante posibles escrituras completas por parte del dispositivo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.19",
"versionEndExcluding": "6.1.8",
"matchCriteriaId": "14893A53-0846-4D56-BC73-9FC4261FDAB2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1beeec45f9ac31eba52478379f70a5fa9c2ad005",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b9e8e3fcfec625fc1c2f68f684448aeeb882625b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48869",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T07:15:04.080",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-06T14:19:58.030",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,117 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: USB: gadgetfs: corrige la ejecuci\u00f3n entre montar y desmontar Syzbot fuzzer y Gerald Lee han identificado un error de use-after-free en el controlador gadgetfs, que involucra procesos que montan y desmontan simult\u00e1neamente los gadgetfs. sistema de archivos. En particular, gadgetfs_fill_super() puede competir con gadgetfs_kill_sb(), provocando que este \u00faltimo desasigne the_device mientras el primero lo est\u00e1 usando. El resultado de KASAN dice, en parte: ERROR: KASAN: use-after-free en instrument_atomic_read_write include/linux/instrumented.h:102 [en l\u00ednea] ERROR: KASAN: use-after-free en atomic_fetch_sub_release include/linux/atomic/atomic -instrumented.h:176 [en l\u00ednea] ERROR: KASAN: uso despu\u00e9s de liberaci\u00f3n en __refcount_sub_and_test include/linux/refcount.h:272 [en l\u00ednea] ERROR: KASAN: uso despu\u00e9s de liberaci\u00f3n en __refcount_dec_and_test include/linux/refcount.h :315 [en l\u00ednea] ERROR: KASAN: uso despu\u00e9s de liberaci\u00f3n en refcount_dec_and_test include/linux/refcount.h:333 [en l\u00ednea] ERROR: KASAN: uso despu\u00e9s de liberaci\u00f3n en put_dev drivers/usb/gadget/legacy/inode.c :159 [en l\u00ednea] ERROR: KASAN: use-after-free en gadgetfs_kill_sb+0x33/0x100 drivers/usb/gadget/legacy/inode.c:2086 Escritura de tama\u00f1o 4 en la direcci\u00f3n ffff8880276d7840 mediante la tarea syz-executor126/18689 CPU: 0 PID: 18689 Comunicaci\u00f3n: syz-executor126 No contaminado 6.1.0-syzkaller #0 Nombre del hardware: Google Google Compute Engine/Google Compute Engine, BIOS Google 26/10/2022 Seguimiento de llamadas: ... atomic_fetch_sub_release include/linux/ atomic/atomic-instrumented.h:176 [en l\u00ednea] __refcount_sub_and_test include/linux/refcount.h:272 [en l\u00ednea] __refcount_dec_and_test include/linux/refcount.h:315 [en l\u00ednea] refcount_dec_and_test include/linux/refcount.h:333 [en l\u00ednea ] put_dev drivers/usb/gadget/legacy/inode.c:159 [en l\u00ednea] gadgetfs_kill_sb+0x33/0x100 drivers/usb/gadget/legacy/inode.c:2086 deactivate_locked_super+0xa7/0xf0 fs/super.c:332 vfs_get_super fs /super.c:1190 [en l\u00ednea] get_tree_single+0xd0/0x160 fs/super.c:1207 vfs_get_tree+0x88/0x270 fs/super.c:1531 vfs_fsconfig_locked fs/fsopen.c:232 [en l\u00ednea] La soluci\u00f3n m\u00e1s sencilla es garantizar que gadgetfs_fill_super() y gadgetfs_kill_sb() se serializan haciendo que ambos adquieran un nuevo mutex."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.3",
"versionEndExcluding": "5.4.230",
"matchCriteriaId": "D96CFFAF-9D69-4742-997E-484E7278F62E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.165",
"matchCriteriaId": "C6002D5B-9B6A-4788-B943-E3EE01E01303"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.90",
"matchCriteriaId": "E995CDA5-7223-4FDB-BAD3-81B22C763A43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.8",
"matchCriteriaId": "A6AFE6C9-3F59-4711-B2CF-7D6682FF6BD0"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/616fd34d017000ecf9097368b13d8a266f4920b3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/856e4b5e53f21edbd15d275dde62228dd94fb2b4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9a39f4626b361ee7aa10fd990401c37ec3b466ae",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a2e075f40122d8daf587db126c562a67abd69cf9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d18dcfe9860e842f394e37ba01ca9440ab2178f4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48870",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T07:15:04.143",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-06T14:20:52.290",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,89 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tty: corrige posible null-ptr-defer en spk_ttyio_release Ejecute las siguientes pruebas en la plataforma qemu: syzkaller:~# modprobe Speakup_audptr input: Speakup as /devices/virtual/input/input4 dispositivo inicializado: /dev/synth, nodo (MAJOR 10, MINOR 125) Speakup 3.1.6: el nombre del sintetizador inicializado en la entrada es: (nulo) la sonda de sintetizador spk_ttyio_initialise_ldisc fall\u00f3 porque tty_kopen_exclusive devolvi\u00f3 un error (errno -16), luego elimine el m\u00f3dulo, obtendremos un problema de aplazamiento de ptr nulo, como sigue: syzkaller:~# modprobe -r Speakup_audptr liberando sintetizador audptr ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 00000000000000080 #PF: acceso de escritura del supervisor en modo kernel #PF: c\u00f3digo_error(0x0002 ) - p\u00e1gina no presente PGD 0 P4D 0 Ups: 0002 [#1] PREEMPT SMP PTI CPU: 2 PID: 204 Comm: modprobe No contaminado 6.1.0-rc6-dirty #1 RIP: 0010:mutex_lock+0x14/0x30 Llamada Seguimiento: spk_ttyio_release+0x19/0x70 [speakup] synth_release.part.6+0xac/0xc0 [speakup] synth_remove+0x56/0x60 [speakup] __x64_sys_delete_module+0x156/0x250? fpregs_assert_state_consistent+0x1d/0x50 do_syscall_64+0x37/0x90 entry_syscall_64_after_hwframe+0x63/0xcd m\u00f3dulos vinculados en: sheakup_audptr (-) volcando ftrace b\u00fafer: in_synth->> nth-> dev para corregir este error."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.15.90",
"matchCriteriaId": "82544A71-562D-4C2F-B75E-7193C3B97CD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.8",
"matchCriteriaId": "A6AFE6C9-3F59-4711-B2CF-7D6682FF6BD0"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2da67bff29ab49caafb0766e8b8383b735ff796f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5abbeebd8296c2301023b8dc4b5a6c0d5229b4f5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/64152e05a4de3ebf59f1740a0985a6d5fba0c77b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48871",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T07:15:04.207",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T14:23:03.010",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,103 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: tty: serial: qcom-geni-serial: corrige los l\u00edmites fuera de los l\u00edmites en el b\u00fafer RX FIFO La sonda del controlador asigna memoria para RX FIFO (puerto->rx_fifo) seg\u00fan el valor predeterminado Profundidad FIFO de RX, por ejemplo, 16. M\u00e1s adelante, durante el inicio en serie, qcom_geni_serial_port_setup() actualiza la profundidad FIFO de RX (puerto->rx_fifo_profundidad) para que coincida con las capacidades reales del dispositivo, por ejemplo, a 32. El c\u00f3digo de identificador de RX UART leer\u00e1 el n\u00famero \"puerto->rx_fifo_profundidad\" de palabras en el b\u00fafer \"port->rx_fifo\", excediendo as\u00ed los l\u00edmites. Esto se puede observar en ciertas configuraciones con el dispositivo Qualcomm Bluetooth HCI UART y KASAN: Bluetooth: hci0: QCA ID de producto: 0x00000010 Bluetooth: hci0: QCA SOC Version: 0x400a0200 Bluetooth: hci0: QCA ROM Version: 0x00000200 Bluetooth: hci0: QCA Patch Version :0x00000d2b Bluetooth: hci0: versi\u00f3n del controlador QCA 0x02000200 Bluetooth: hci0: QCA Descargando qca/htbtfw20.tlv bluetooth hci0: La carga directa del firmware para qca/htbtfw20.tlv fall\u00f3 con el error -2 Bluetooth: hci0: QCA No se pudo solicitar el archivo: qca/ htbtfw20.tlv (-2) Bluetooth: hci0: QCA Error al descargar el parche (-2) =============================== ==================================== ERROR: KASAN: losa fuera de los l\u00edmites en handle_rx_uart+ 0xa8/0x18c Escritura de tama\u00f1o 4 en la direcci\u00f3n ffff279347d578c0 mediante task swapper/0/0 CPU: 0 PID: 0 Comm: swapper/0 Not tainted 6.1.0-rt5-00350-gb2450b7e00be-dirty #26 Nombre de hardware: Qualcomm Technologies, Inc Rob\u00f3tica RB5 (DT) Seguimiento de llamadas: dump_backtrace.part.0+0xe0/0xf0 show_stack+0x18/0x40 dump_stack_lvl+0x8c/0xb8 print_report+0x188/0x488 kasan_report+0xb4/0x100 __asan_store4+0x80/0xa4 handle_rx_uart+0xa. 8/0x18c qcom_geni_serial_handle_rx+ 0x84/0x9c qcom_geni_serial_isr+0x24c/0x760 __handle_irq_event_percpu+0x108/0x500 handle_irq_event+0x6c/0x110 handle_fasteoi_irq+0x138/0x2cc generic_handle_domain_irq+0x48/0x64 Si la profundidad FIFO de RX cambia despu\u00e9s sonda, aseg\u00farese de cambiar el tama\u00f1o del b\u00fafer."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.7",
"versionEndExcluding": "5.10.165",
"matchCriteriaId": "5D1B38E6-531E-4689-A204-9E0178E886F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.90",
"matchCriteriaId": "E995CDA5-7223-4FDB-BAD3-81B22C763A43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.8",
"matchCriteriaId": "A6AFE6C9-3F59-4711-B2CF-7D6682FF6BD0"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/894681682dbefdad917b88f86cde1069140a047a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b8caf69a6946e18ffebad49847e258f5b6d52ac2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cb53a3366eb28fed67850c80afa52075bb71a38a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fd524ca7fe45b8a06dca2dd546d62684a9768f95",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48872",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T07:15:04.267",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T14:30:06.730",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,137 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: misc: fastrpc: corrige la condici\u00f3n de ejecuci\u00f3n de use-after-free para mapas. Es posible que entre llamadas a fastrpc_map_get() hasta que se tome map->fl->lock en fastrpc_free_map() , otro hilo puede llamar a fastrpc_map_lookup() y obtener una referencia a un mapa que est\u00e1 a punto de ser eliminado. Vuelva a escribir fastrpc_map_get() para aumentar solo el recuento de referencias de un mapa si no es cero. Propague esto a las personas que llaman para que puedan saber si un mapa est\u00e1 a punto de ser eliminado. Corrige esta advertencia: refcount_t: adici\u00f3n en 0; use-after-free. ADVERTENCIA: CPU: 5 PID: 10100 en lib/refcount.c:25 refcount_warn_saturate... Rastreo de llamadas: refcount_warn_saturate [fastrpc_map_get inlined] [fastrpc_map_lookup inlined] fastrpc_map_create fastrpc_internal_invoke fastrpc_device_ioctl __arm64_sys_ioctl invoke_sy llamar"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.1",
"versionEndExcluding": "5.4.230",
"matchCriteriaId": "D5DAF18C-BC5F-4D9D-A710-21074AD7750B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.165",
"matchCriteriaId": "C6002D5B-9B6A-4788-B943-E3EE01E01303"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.90",
"matchCriteriaId": "E995CDA5-7223-4FDB-BAD3-81B22C763A43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.2",
"matchCriteriaId": "CDB2EE10-7AC0-4F90-BC35-A5139EEE551B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A127C155-689C-4F67-B146-44A57F4BFD85"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/079c78c68714f7d8d58e66c477b0243b31806907",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/556dfdb226ce1e5231d8836159b23f8bb0395bf4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/61a0890cb95afec5c8a2f4a879de2b6220984ef1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/96b328d119eca7563c1edcc4e1039a62e6370ecb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b171d0d2cf1b8387c72c8d325c5d5746fa271e39",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48873",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T07:15:04.323",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T14:44:16.677",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,27 +15,137 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: misc: fastrpc: no elimine el mapa en creater_process y device_release. No elimine el mapa de la lista en la ruta de error en fastrpc_init_create_process; en su lugar, llame a fastrpc_map_put para evitar el use-after-free. Tampoco lo elimine en fastrpc_device_release; en su lugar, llame a fastrpc_map_put. fastrpc_free_map es el \u00fanico lugar adecuado para eliminar el mapa. Esto se llama solo despu\u00e9s de que el recuento de referencias sea 0."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.2",
"versionEndExcluding": "5.4.230",
"matchCriteriaId": "992F0F86-442F-4A88-A85E-FDAD945116C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.165",
"matchCriteriaId": "C6002D5B-9B6A-4788-B943-E3EE01E01303"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.90",
"matchCriteriaId": "E995CDA5-7223-4FDB-BAD3-81B22C763A43"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.8",
"matchCriteriaId": "A6AFE6C9-3F59-4711-B2CF-7D6682FF6BD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A127C155-689C-4F67-B146-44A57F4BFD85"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/193cd853145b63e670bd73740250983af1475330",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1b7b7bb400dd13dcb03fc6e591bb7ca4664bbec8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/35ddd482345c43d9eec1f3406c0f20a95ed4054b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4b5c44e924a571d0ad07054de549624fbc04e4d7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5bb96c8f9268e2fdb0e5321cbc358ee5941efc15",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48885",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T07:15:05.037",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-06T14:46:30.067",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,90 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ice: soluciona una posible p\u00e9rdida de memoria en ice_gnss_tty_write(). El ice_gnss_tty_write() regresa directamente si falla la asignaci\u00f3n write_buf, filtrando el cmd_buf. Corrija mediante cmd_buf gratuito si falla la asignaci\u00f3n de write_buf."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0",
"versionEndExcluding": "6.1.7",
"matchCriteriaId": "9A23C236-3F02-4454-B9C9-0A91464BDE09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/500ca1da9d0876244eb4d1b0ece6fa0e9968d45d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f58985620f55580a07d40062c4115d8c9cf6ae27",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48886",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T07:15:05.090",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-06T14:48:20.907",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,90 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ice: Agregar verificaci\u00f3n para kzalloc Agregue la verificaci\u00f3n para el valor de retorno de kzalloc para evitar la desreferencia al puntero NULL. Adem\u00e1s, utilice la etiqueta goto para compartir el c\u00f3digo limpio."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0",
"versionEndExcluding": "6.1.7",
"matchCriteriaId": "9A23C236-3F02-4454-B9C9-0A91464BDE09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/40543b3d9d2c13227ecd3aa90a713c201d1d7f09",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/96a9873188552ebb2afe76033d7329a5ecabef6e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48887",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T07:15:05.143",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-06T14:55:46.460",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,90 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/vmwgfx: elimina los bloqueos de rcu de los recursos del usuario. Las b\u00fasquedas de recursos del usuario utilizaron rcu para evitar dos \u00e1tomos adicionales. Desafortunadamente, las rutas de rcu ten\u00edan errores y era f\u00e1cil hacer que el controlador fallara al enviar b\u00faferes de comando desde dos subprocesos diferentes. Debido a que las b\u00fasquedas nunca aparecen en los perfiles de rendimiento, reempl\u00e1celas con un bloqueo de giro normal que corrige las ejecuciones en los accesos a esos recursos compartidos. Corrige los fallos del kernel en la prueba de esfuerzo vmwgfxexecution_b\u00fafer de IGT y los fallos observados en las aplicaciones que utilizan recursos compartidos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "6.1.7",
"matchCriteriaId": "2D63FB2D-B092-4364-B732-F4FD54A43619"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/7ac9578e45b20e3f3c0c8eb71f5417a499a7226a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a309c7194e8a2f8bd4539b9449917913f6c2cd50",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48889",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T07:15:05.243",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-06T15:08:10.060",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,90 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ASoC: Intel: sof-nau8825: corrige el desbordamiento del alias del m\u00f3dulo La longitud m\u00e1xima del nombre para una entrada platform_device_id es de 20 caracteres, incluido el byte NUL final. El archivo sof_nau8825.c excede eso, lo que provoca un oscuro mensaje de error: sound/soc/intel/boards/snd-soc-sof_nau8825.mod.c:35:45: error: codificaci\u00f3n de caracteres ilegal en cadena literal [-Werror,- Codificaci\u00f3n de fuente v\u00e1lida de Win] MODULE_ALIAS(\"plataforma:adl_max98373_nau8825\"); ^~~~ include/linux/module.h:168:49: nota: ampliado desde la macro 'MODULE_ALIAS' ^~~~~~ include/linux/module.h:165:56: nota: ampliado desde la macro 'MODULE_INFO' ^~~~ include/linux/moduleparam.h:26:47: nota: ampliado desde la macro '__MODULE_INFO' = __MODULE_INFO_PREFIX __stringify(tag) \"=\" info No pude entender c\u00f3mo hacer que el m\u00f3dulo sea lo suficientemente robusto para manejar esto mejor, pero como soluci\u00f3n r\u00e1pida, usar nombres ligeramente m\u00e1s cortos que sigan siendo \u00fanicos evita el problema de compilaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-131"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.17",
"versionEndExcluding": "6.1.7",
"matchCriteriaId": "96403C94-C711-476F-BE5F-C7510379207B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/3e78986a840d59dd27e636eae3f52dc11125c835",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/fba1b23befd88366fe646787b3797e64d7338fd2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48890",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T07:15:05.303",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-06T15:11:16.120",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,90 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: scsi: storvsc: corrige la fuga del b\u00fafer de rebote swiotlb en una VM confidencial storvsc_queuecommand() asigna la lista de dispersi\u00f3n/recopilaci\u00f3n usando scsi_dma_map(), que en una VM confidencial asigna buffers de rebote swiotlb. Si el env\u00edo de E/S falla en storvsc_do_io(), la E/S normalmente se reintenta mediante c\u00f3digo de nivel superior, pero la memoria del b\u00fafer de rebote nunca se libera. La causa m\u00e1s com\u00fan de falla en el env\u00edo de E/S es un b\u00fafer de anillo de canal VMBus lleno, lo cual no es infrecuente bajo cargas de E/S elevadas. Con el tiempo, se pierden suficientes memorias del b\u00fafer de rebote como para que la m\u00e1quina virtual confidencial no pueda realizar ninguna E/S. El mismo problema puede surgir en una m\u00e1quina virtual no confidencial con el par\u00e1metro de arranque del kernel swiotlb=force. Solucione este problema haciendo scsi_dma_unmap() en el caso de un error de env\u00edo de E/S, lo que libera la memoria del b\u00fafer de rebote."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.17",
"versionEndExcluding": "6.1.7",
"matchCriteriaId": "96403C94-C711-476F-BE5F-C7510379207B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/67ff3d0a49f3d445c3922e30a54e03c161da561e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/87c71e88f6a6619ffb1ff88f84dff48ef6d57adb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48891",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-21T07:15:05.360",
"lastModified": "2024-08-21T12:30:33.697",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-06T15:39:03.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,35 +15,159 @@
"value": "En el kernel de Linux se ha solucionado la siguiente vulnerabilidad: regulator: da9211: Usar irq handler cuando est\u00e9 listo Si el sistema no viene del reset (como cuando es kexec()), es posible que el regulador tenga una IRQ esper\u00e1ndonos. Si habilitamos el controlador IRQ antes de que sus estructuras est\u00e9n listas, fallamos. Este parche corrige: [1.141839] No se puede manejar la lectura del kernel desde una memoria ilegible en la direcci\u00f3n virtual 0000000000000078 [1.316096] Rastreo de llamadas: [1.316101] blocking_notifier_call_chain+0x20/0xa8 [ 1.322757] cpu cpu0: suministros ficticios no permitidos para solicitudes exclusivas [ 1.327 823] regulador_notificador_call_chain +0x1c/0x2c [ 1.327825] da9211_irq_handler+0x68/0xf8 [ 1.327829] irq_thread+0x11c/0x234 [ 1.327833] kthread+0x13c/0x154"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.14.303",
"matchCriteriaId": "201B76DB-8AF9-4EC9-BE08-907DEFA3435E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.15",
"versionEndExcluding": "4.19.270",
"matchCriteriaId": "AE8904A3-99BE-4E49-9682-1F90A6373F4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.229",
"matchCriteriaId": "A0C0D95E-414A-445E-941B-3EF6A4D3A093"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.164",
"matchCriteriaId": "CA742E66-32D2-459E-AB19-171C4DB3B1F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.89",
"matchCriteriaId": "E706841F-E788-4316-9B05-DA8EB60CE6B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.7",
"matchCriteriaId": "9275C81F-AE96-4CDB-AD20-7DBD36E5D909"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/02228f6aa6a64d588bc31e3267d05ff184d772eb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1c1afcb8839b91c09d211ea304faa269763b1f91",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/470f6a9175f13a53810734658c35cc5bba33be01",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ad1336274f733a7cb1f87b5c5908165a2c14df53",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d443308edbfb6e9e757b478af908515110d1efd5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d4aa749e046435f054e94ebf50cad143d6229fae",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f75cde714e0a67f73ef169aa50d4ed77d04f7236",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-31102",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T04:15:20.793",
"lastModified": "2023-11-20T00:15:06.277",
"lastModified": "2024-09-06T14:35:01.717",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-191"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-191"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34259",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T04:15:20.853",
"lastModified": "2023-11-13T17:49:14.460",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-06T14:35:03.133",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45024",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T05:15:30.687",
"lastModified": "2023-11-13T19:29:46.800",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-06T14:35:03.993",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46352",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-02T22:15:09.203",
"lastModified": "2023-11-10T04:13:07.300",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-06T14:35:04.850",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46404",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T16:15:31.050",
"lastModified": "2023-11-13T17:52:03.397",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-06T14:35:05.673",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46817",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T05:15:30.867",
"lastModified": "2023-11-13T19:30:38.760",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-06T14:35:06.507",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-502"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46958",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-02T22:15:09.250",
"lastModified": "2023-11-09T20:10:12.967",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-06T14:35:08.110",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46980",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T16:15:31.103",
"lastModified": "2023-11-14T13:37:31.637",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-06T14:35:08.953",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47204",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-02T06:15:08.517",
"lastModified": "2023-11-09T17:48:32.863",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-06T14:35:09.823",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-502"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51785",
"sourceIdentifier": "security@apache.org",
"published": "2024-01-03T10:15:09.130",
"lastModified": "2024-01-09T20:18:47.197",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-06T15:35:02.360",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5528",
"sourceIdentifier": "jordan@liggitt.net",
"published": "2023-11-14T21:15:14.123",
"lastModified": "2024-01-19T16:15:10.280",
"lastModified": "2024-09-06T15:15:12.640",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -161,31 +161,6 @@
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3JH444PWZBINXLLFV7XLIJIZJHSK6UEZ/",
"source": "jordan@liggitt.net",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4XZIX727JIKF5RQW7RVVBLWXBCDIBJA7/",
"source": "jordan@liggitt.net",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7MPGMITSZXUCAVO7Q75675SOLXC2XXU4/",
"source": "jordan@liggitt.net",
"tags": [
"Mailing List"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240119-0009/",
"source": "jordan@liggitt.net"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-25584",
"sourceIdentifier": "security@open-xchange.com",
"published": "2024-09-06T15:15:12.950",
"lastModified": "2024-09-06T15:15:12.950",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dovecot accepts dot LF DOT LF symbol as end of DATA command. RFC requires that it should always be CR LF DOT CR LF. This causes Dovecot to convert single mail with LF DOT LF in middle, into two emails when relaying to SMTP. Dovecot will split mail with LF DOT LF into two mails. Upgrade to latest released version. No publicly available exploits are known."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@open-xchange.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@open-xchange.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-345"
}
]
}
],
"references": [
{
"url": "https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2024/oxdc-adv-2024-0001.json",
"source": "security@open-xchange.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27394",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-14T15:12:27.363",
"lastModified": "2024-07-03T01:50:36.103",
"lastModified": "2024-09-06T14:35:11.027",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -22,8 +22,8 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
@ -31,10 +31,10 @@
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"exploitabilityScore": 1.4,
"impactScore": 5.9
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34641",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:12.460",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T15:27:40.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
},
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
@ -39,10 +59,377 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
"matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
"matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*",
"matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*",
"matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*",
"matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*",
"matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*",
"matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF"
}
]
}
]
}
],
"references": [
{
"url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=09",
"source": "mobile.security@samsung.com"
"source": "mobile.security@samsung.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34656",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2024-09-04T06:15:15.950",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T15:57:25.657",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "mobile.security@samsung.com",
"type": "Secondary",
@ -39,10 +59,43 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:samsung:notes:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.21.62",
"matchCriteriaId": "1E2501DD-98AF-407C-AC64-2C26EA3248F3"
}
]
}
]
}
],
"references": [
{
"url": "https://security.samsungmobile.com/serviceWeb.smsb?year=2024&month=09",
"source": "mobile.security@samsung.com"
"source": "mobile.security@samsung.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38321",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-08-03T14:15:48.013",
"lastModified": "2024-08-05T12:41:45.957",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-06T14:50:53.583",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
@ -51,14 +71,244 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:20.0.0.1:*:*:*:containers:*:*:*",
"matchCriteriaId": "AEB1C9C9-69C0-41CA-8FE8-9E2C142DC112"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:20.0.0.2:*:*:*:containers:*:*:*",
"matchCriteriaId": "B9C41C12-BD6B-4E49-9BA4-288524FF55C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.2:*:*:*:containers:*:*:*",
"matchCriteriaId": "9FDDD905-95EA-4DCC-B359-7E6DAEFC537D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:-:*:*:containers:*:*:*",
"matchCriteriaId": "12725407-1B9F-43B7-8D66-F0E3B0181830"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if002:*:*:containers:*:*:*",
"matchCriteriaId": "00F5E82D-712A-4AB2-B0B2-BF03507D17D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if005:*:*:containers:*:*:*",
"matchCriteriaId": "0063E78F-2978-43F6-884D-B375E1111E87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if006:*:*:containers:*:*:*",
"matchCriteriaId": "CF6317BE-98DF-4A46-9F5B-326177D6AD68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if007:*:*:containers:*:*:*",
"matchCriteriaId": "72A22C4B-AAF2-4A84-AF39-C1C396031D98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if008:*:*:containers:*:*:*",
"matchCriteriaId": "39015A02-D36E-4CC9-A5E3-877DFD923ACD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if009:*:*:containers:*:*:*",
"matchCriteriaId": "19586E74-8802-4C09-A240-D698EE30C570"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if010:*:*:containers:*:*:*",
"matchCriteriaId": "4B06D109-E327-4A2A-9FC9-A5F454022C0D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if011:*:*:containers:*:*:*",
"matchCriteriaId": "E67BEF93-133E-4507-B938-79D943AB82CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if012:*:*:containers:*:*:*",
"matchCriteriaId": "84689E35-3C11-44D2-B719-0F47CC7DE6B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if013:*:*:containers:*:*:*",
"matchCriteriaId": "05248E0A-BE7C-4AA1-80B8-5397382D742E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if014:*:*:containers:*:*:*",
"matchCriteriaId": "0852419C-62F1-49BA-BD99-96700D33ED64"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if015:*:*:containers:*:*:*",
"matchCriteriaId": "628B7F15-103F-4B84-90ED-EBFAD633BCE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if016:*:*:containers:*:*:*",
"matchCriteriaId": "91E22A7B-18F4-461C-9986-0CECBAB879F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if017:*:*:containers:*:*:*",
"matchCriteriaId": "4FE832E4-BE4B-4923-A98D-3B127758C103"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if028:*:*:containers:*:*:*",
"matchCriteriaId": "EE7E0724-C7FB-4436-A702-EC2102205175"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if029:*:*:containers:*:*:*",
"matchCriteriaId": "40505E62-F229-45B5-8D22-30487471477C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if030:*:*:containers:*:*:*",
"matchCriteriaId": "D8E150F5-F27C-471C-A911-C2CC07E31EBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if031:*:*:containers:*:*:*",
"matchCriteriaId": "3F8FA6E0-01CF-458A-8AD3-3388BBA4FE5B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if032:*:*:containers:*:*:*",
"matchCriteriaId": "2CAF9596-964B-4E58-BB9D-07138F4566F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if033:*:*:containers:*:*:*",
"matchCriteriaId": "08853431-59B4-4730-88E3-812DF7B6691B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:21.0.3:if034:*:*:containers:*:*:*",
"matchCriteriaId": "1BDB3D3C-1964-42F1-8035-2B4F2752E535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:22.0.1:*:*:*:containers:*:*:*",
"matchCriteriaId": "A157A0AD-B1AB-4FBB-AD00-348ADAE52173"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:22.0.2:*:*:*:containers:*:*:*",
"matchCriteriaId": "F2F5CF83-2F00-476D-BA79-5BD0AF71D929"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:23.0.1:*:*:*:containers:*:*:*",
"matchCriteriaId": "AC67163F-742E-46BC-BF63-75F15F8D2DCF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:23.0.2:*:*:*:containers:*:*:*",
"matchCriteriaId": "A99644F1-3E98-4156-B155-7FA642EA7BBC"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*",
"versionStartIncluding": "19.0.0.1",
"versionEndIncluding": "19.0.0.3",
"matchCriteriaId": "DB90C98C-7A38-4B9B-878C-028DD872D19C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*",
"versionStartIncluding": "20.0.0.1",
"versionEndIncluding": "20.0.0.2",
"matchCriteriaId": "1FD8E8F7-6B5F-4A21-90AF-483A8DFE4CFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*",
"versionStartIncluding": "21.0.1",
"versionEndIncluding": "21.0.3.0",
"matchCriteriaId": "07308147-9441-4231-9BC0-231C3181F255"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*",
"versionStartIncluding": "22.0.1",
"versionEndIncluding": "22.0.2",
"matchCriteriaId": "5CA224F7-AF29-4F8C-BD70-E9C0A7A2B366"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:traditional:*:*:*",
"versionStartIncluding": "23.0.1",
"versionEndIncluding": "23.0.2",
"matchCriteriaId": "A510FD89-9F92-4514-A706-52719EDC59E0"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:*:*:*:*:enterprise_service_bus:*:*:*",
"versionStartIncluding": "23.0.1",
"versionEndIncluding": "23.0.2",
"matchCriteriaId": "981B50AE-8B79-4E39-87AA-34DFA93B607A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:business_automation_workflow:22.0.2:*:*:*:enterprise_service_bus:*:*:*",
"matchCriteriaId": "3E9B8E36-CA86-459C-A0CF-F00F179119FD"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/294868",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7162334",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41912",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2024-08-07T20:15:50.877",
"lastModified": "2024-08-08T13:04:18.753",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-06T15:13:26.177",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,79 @@
"value": "Se descubri\u00f3 una vulnerabilidad en las versiones de firmware hasta 10.10.2.2 en dispositivos Poly Clariti Manager. La falla del firmware no implementa adecuadamente los controles de acceso."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:poly_clariti_manager_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.10.2.2_100",
"matchCriteriaId": "BDAFC172-AA9F-4B89-932D-3F13D10F99C9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hp:poly_clariti_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B85257C9-48C2-4B7F-8B0D-D2BF6C49C618"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_11006235-11006266-16/hpsbpy03958",
"source": "hp-security-alert@hp.com"
"source": "hp-security-alert@hp.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42257",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-08-08T09:15:08.623",
"lastModified": "2024-08-08T13:04:18.753",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-06T14:12:22.577",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,75 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: ext4: use memtostr_pad() para s_volume_name Al igual que con las otras cadenas en la estructura ext4_super_block, s_volume_name no tiene terminaci\u00f3n NUL. Las otras cadenas se marcaron en el commit 072ebb3bffe6 (\"ext4: agregue anotaciones que no sean cadenas a ext4.h\"). Usar strscpy() no es el reemplazo adecuado para strncpy(); deber\u00eda usar memtostr_pad() en su lugar."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.10",
"versionEndExcluding": "6.10.1",
"matchCriteriaId": "CC5B6890-A2E7-41F8-AA56-E3202E9FB075"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/4378be89ddb7de88d984b67ecfd6191686c42817",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/be27cd64461c45a6088a91a04eba5cd44e1767ef",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43918",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-29T15:15:29.010",
"lastModified": "2024-08-30T13:00:05.390",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T15:51:25.957",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:woobewoo:product_table:*:*:pro:*:*:wordpress:*:*",
"versionEndExcluding": "1.9.5",
"matchCriteriaId": "1492771E-D665-4404-B3CA-50720F09EE17"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woo-producttables-pro/wordpress-wbw-product-table-pro-plugin-1-9-4-unauthenticated-arbitrary-sql-query-execution-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-44082",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-06T01:15:11.150",
"lastModified": "2024-09-06T12:08:04.550",
"lastModified": "2024-09-06T15:15:13.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -21,6 +21,10 @@
"url": "https://bugs.launchpad.net/ironic/+bug/2071740",
"source": "cve@mitre.org"
},
{
"url": "https://security.openstack.org/ossa/OSSA-2024-003.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/09/04/4",
"source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-44739",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-06T13:15:04.323",
"lastModified": "2024-09-06T13:15:04.323",
"lastModified": "2024-09-06T15:35:02.807",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Sourcecodester Simple Forum Website v1.0 has a SQL injection vulnerability in /php-sqlite-forum/?page=manage_user&id=."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/zach341/Cve_report/blob/main/simple-forum-website/SQLi-1.md",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-44837",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-06T14:15:12.517",
"lastModified": "2024-09-06T14:35:11.887",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the component \\bean\\Manager.java of Drug v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the user parameter."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://kaput-raptorex-7c1.notion.site/drug-1-0-DOM-based-cross-site-scripting-fae620f769304f67a7488a961d048672",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45195",
"sourceIdentifier": "security@apache.org",
"published": "2024-09-04T09:15:04.397",
"lastModified": "2024-09-05T17:44:25.040",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-06T15:35:05.483",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45321",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-27T04:15:09.010",
"lastModified": "2024-08-27T14:35:13.357",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T14:35:13.113",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-94"
"value": "CWE-494"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45446",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-04T03:15:04.010",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T14:01:37.120",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -51,10 +81,70 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/9/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45447",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-04T03:15:04.210",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T14:17:55.720",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -51,10 +81,70 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/9/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45448",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-04T03:15:04.413",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T14:24:21.837",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -51,10 +81,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/9/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45449",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-04T03:15:04.610",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T14:38:08.067",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -51,10 +81,65 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/9/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-6445",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-09-06T14:15:12.683",
"lastModified": "2024-09-06T14:15:12.683",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in DataFlowX Technology DataDiodeX allows Path Traversal.This issue affects DataDiodeX: before v3.5.0."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "iletisim@usom.gov.tr",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
}
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-1409",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-7493",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-06T14:15:12.860",
"lastModified": "2024-09-06T14:15:12.860",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WPCOM Member plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.5.2.1. This is due to the plugin allowing arbitrary data to be passed to wp_insert_user() during registration. This makes it possible for unauthenticated attackers to update their role to that of an administrator during registration."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wpcom-member/tags/1.5.2/includes/form-validation.php#L267",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ec7f3e0c-a07c-4082-9b6b-12d0fbe0fdc8?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-7599",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-06T14:15:13.107",
"lastModified": "2024-09-06T14:15:13.107",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Advanced Sermons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018sermon_video_embed\u2019 parameter in all versions up to, and including, 3.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/advanced-sermons/trunk/admin/meta/sermon-details.php#L396",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/advanced-sermons/trunk/include/templates/sections/video-template.php#L124",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/advanced-sermons/trunk/include/templates/sections/video-template.php#L18",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3147283/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/41859e1c-1ae0-49f1-82d3-5af3c15994ef?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-7611",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-06T14:15:13.330",
"lastModified": "2024-09-06T14:15:13.330",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Enter Addons \u2013 Ultimate Template Builder for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'tag' attribute of the Events Card widget in all versions up to, and including, 2.1.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/enteraddons/trunk/widgets/events_card/traits/Templates_Components.php#L25",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f7580145-03da-4aff-b804-39125e7daad1?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-7622",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-06T14:15:13.553",
"lastModified": "2024-09-06T14:15:13.553",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Revision Manager TMC plugin for WordPress is vulnerable to unauthorized arbitrary email sending due to a missing capability check on the _a_ajaxQuickEmailTestCallback() function in all versions up to, and including, 2.8.19. This makes it possible for authenticated attackers, with subscriber-level access and above, to send emails with arbitrary content to any individual through the vulnerable web server."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/revision-manager-tmc/trunk/src/Components/Notifications.php#L357",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3147298/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2c8a6ff9-6aa8-4e0f-b058-759561a55508?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-8181",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2024-08-27T13:15:06.820",
"lastModified": "2024-09-04T12:15:05.833",
"lastModified": "2024-09-06T15:35:07.267",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-287"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8298",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-09-04T03:15:05.047",
"lastModified": "2024-09-04T13:05:36.067",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-06T14:53:06.890",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@huawei.com",
"type": "Secondary",
@ -51,10 +81,47 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/9/",
"source": "nvd@nist.gov",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://https://consumer.huawei.com/en/support/bulletin/2024/9/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-8428",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-06T14:15:13.823",
"lastModified": "2024-09-06T14:15:13.823",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ForumWP \u2013 Forum & Discussion Board Plugin plugin for WordPress is vulnerable to Privilege Escalation via Insecure Direct Object Reference in all versions up to, and including, 2.0.2 via the submit_form_handler due to missing validation on the 'user_id' user controlled key. This makes it possible for authenticated attackers, with subscriber-level access and above, to change the email address of administrative user accounts which can then be leveraged to reset the administrative users password and gain access to their account."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/forumwp/trunk/includes/frontend/class-actions-listener.php#L179",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b5818587-0a52-4734-8f75-263b4ab5020e?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-06T14:00:18.143882+00:00
2024-09-06T16:00:17.996592+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-06T13:56:00.207000+00:00
2024-09-06T15:57:25.657000+00:00
```
### Last Data Feed Release
@ -33,51 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
262059
262067
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `8`
- [CVE-2024-1744](CVE-2024/CVE-2024-17xx/CVE-2024-1744.json) (`2024-09-06T13:15:03.467`)
- [CVE-2024-44739](CVE-2024/CVE-2024-447xx/CVE-2024-44739.json) (`2024-09-06T13:15:04.323`)
- [CVE-2024-45039](CVE-2024/CVE-2024-450xx/CVE-2024-45039.json) (`2024-09-06T13:15:04.400`)
- [CVE-2024-45040](CVE-2024/CVE-2024-450xx/CVE-2024-45040.json) (`2024-09-06T13:15:04.893`)
- [CVE-2024-45299](CVE-2024/CVE-2024-452xx/CVE-2024-45299.json) (`2024-09-06T13:15:05.253`)
- [CVE-2024-45300](CVE-2024/CVE-2024-453xx/CVE-2024-45300.json) (`2024-09-06T13:15:05.537`)
- [CVE-2024-45405](CVE-2024/CVE-2024-454xx/CVE-2024-45405.json) (`2024-09-06T13:15:05.830`)
- [CVE-2024-25584](CVE-2024/CVE-2024-255xx/CVE-2024-25584.json) (`2024-09-06T15:15:12.950`)
- [CVE-2024-44837](CVE-2024/CVE-2024-448xx/CVE-2024-44837.json) (`2024-09-06T14:15:12.517`)
- [CVE-2024-6445](CVE-2024/CVE-2024-64xx/CVE-2024-6445.json) (`2024-09-06T14:15:12.683`)
- [CVE-2024-7493](CVE-2024/CVE-2024-74xx/CVE-2024-7493.json) (`2024-09-06T14:15:12.860`)
- [CVE-2024-7599](CVE-2024/CVE-2024-75xx/CVE-2024-7599.json) (`2024-09-06T14:15:13.107`)
- [CVE-2024-7611](CVE-2024/CVE-2024-76xx/CVE-2024-7611.json) (`2024-09-06T14:15:13.330`)
- [CVE-2024-7622](CVE-2024/CVE-2024-76xx/CVE-2024-7622.json) (`2024-09-06T14:15:13.553`)
- [CVE-2024-8428](CVE-2024/CVE-2024-84xx/CVE-2024-8428.json) (`2024-09-06T14:15:13.823`)
### CVEs modified in the last Commit
Recently modified CVEs: `47`
Recently modified CVEs: `42`
- [CVE-2024-45097](CVE-2024/CVE-2024-450xx/CVE-2024-45097.json) (`2024-09-06T12:51:59.750`)
- [CVE-2024-45098](CVE-2024/CVE-2024-450xx/CVE-2024-45098.json) (`2024-09-06T13:01:44.023`)
- [CVE-2024-45157](CVE-2024/CVE-2024-451xx/CVE-2024-45157.json) (`2024-09-06T12:08:21.290`)
- [CVE-2024-45158](CVE-2024/CVE-2024-451xx/CVE-2024-45158.json) (`2024-09-06T12:08:21.290`)
- [CVE-2024-45159](CVE-2024/CVE-2024-451xx/CVE-2024-45159.json) (`2024-09-06T12:08:04.550`)
- [CVE-2024-45392](CVE-2024/CVE-2024-453xx/CVE-2024-45392.json) (`2024-09-06T13:24:34.353`)
- [CVE-2024-45400](CVE-2024/CVE-2024-454xx/CVE-2024-45400.json) (`2024-09-06T12:08:04.550`)
- [CVE-2024-45401](CVE-2024/CVE-2024-454xx/CVE-2024-45401.json) (`2024-09-06T12:08:21.290`)
- [CVE-2024-45443](CVE-2024/CVE-2024-454xx/CVE-2024-45443.json) (`2024-09-06T13:33:10.347`)
- [CVE-2024-45444](CVE-2024/CVE-2024-454xx/CVE-2024-45444.json) (`2024-09-06T13:48:17.260`)
- [CVE-2024-45445](CVE-2024/CVE-2024-454xx/CVE-2024-45445.json) (`2024-09-06T13:54:42.663`)
- [CVE-2024-45751](CVE-2024/CVE-2024-457xx/CVE-2024-45751.json) (`2024-09-06T12:08:04.550`)
- [CVE-2024-6449](CVE-2024/CVE-2024-64xx/CVE-2024-6449.json) (`2024-09-06T13:15:06.110`)
- [CVE-2024-6450](CVE-2024/CVE-2024-64xx/CVE-2024-6450.json) (`2024-09-06T13:15:06.343`)
- [CVE-2024-6792](CVE-2024/CVE-2024-67xx/CVE-2024-6792.json) (`2024-09-06T13:35:02.020`)
- [CVE-2024-7211](CVE-2024/CVE-2024-72xx/CVE-2024-7211.json) (`2024-09-06T13:23:07.237`)
- [CVE-2024-7349](CVE-2024/CVE-2024-73xx/CVE-2024-7349.json) (`2024-09-06T12:08:04.550`)
- [CVE-2024-7415](CVE-2024/CVE-2024-74xx/CVE-2024-7415.json) (`2024-09-06T12:08:04.550`)
- [CVE-2024-7591](CVE-2024/CVE-2024-75xx/CVE-2024-7591.json) (`2024-09-06T12:08:21.290`)
- [CVE-2024-8247](CVE-2024/CVE-2024-82xx/CVE-2024-8247.json) (`2024-09-06T12:08:04.550`)
- [CVE-2024-8292](CVE-2024/CVE-2024-82xx/CVE-2024-8292.json) (`2024-09-06T12:08:04.550`)
- [CVE-2024-8317](CVE-2024/CVE-2024-83xx/CVE-2024-8317.json) (`2024-09-06T12:08:04.550`)
- [CVE-2024-8395](CVE-2024/CVE-2024-83xx/CVE-2024-8395.json) (`2024-09-06T12:08:04.550`)
- [CVE-2024-8427](CVE-2024/CVE-2024-84xx/CVE-2024-8427.json) (`2024-09-06T12:08:04.550`)
- [CVE-2024-8480](CVE-2024/CVE-2024-84xx/CVE-2024-8480.json) (`2024-09-06T12:08:04.550`)
- [CVE-2023-46352](CVE-2023/CVE-2023-463xx/CVE-2023-46352.json) (`2024-09-06T14:35:04.850`)
- [CVE-2023-46404](CVE-2023/CVE-2023-464xx/CVE-2023-46404.json) (`2024-09-06T14:35:05.673`)
- [CVE-2023-46817](CVE-2023/CVE-2023-468xx/CVE-2023-46817.json) (`2024-09-06T14:35:06.507`)
- [CVE-2023-46958](CVE-2023/CVE-2023-469xx/CVE-2023-46958.json) (`2024-09-06T14:35:08.110`)
- [CVE-2023-46980](CVE-2023/CVE-2023-469xx/CVE-2023-46980.json) (`2024-09-06T14:35:08.953`)
- [CVE-2023-47204](CVE-2023/CVE-2023-472xx/CVE-2023-47204.json) (`2024-09-06T14:35:09.823`)
- [CVE-2023-51785](CVE-2023/CVE-2023-517xx/CVE-2023-51785.json) (`2024-09-06T15:35:02.360`)
- [CVE-2023-5528](CVE-2023/CVE-2023-55xx/CVE-2023-5528.json) (`2024-09-06T15:15:12.640`)
- [CVE-2024-27394](CVE-2024/CVE-2024-273xx/CVE-2024-27394.json) (`2024-09-06T14:35:11.027`)
- [CVE-2024-34641](CVE-2024/CVE-2024-346xx/CVE-2024-34641.json) (`2024-09-06T15:27:40.647`)
- [CVE-2024-34656](CVE-2024/CVE-2024-346xx/CVE-2024-34656.json) (`2024-09-06T15:57:25.657`)
- [CVE-2024-38321](CVE-2024/CVE-2024-383xx/CVE-2024-38321.json) (`2024-09-06T14:50:53.583`)
- [CVE-2024-41912](CVE-2024/CVE-2024-419xx/CVE-2024-41912.json) (`2024-09-06T15:13:26.177`)
- [CVE-2024-42257](CVE-2024/CVE-2024-422xx/CVE-2024-42257.json) (`2024-09-06T14:12:22.577`)
- [CVE-2024-43918](CVE-2024/CVE-2024-439xx/CVE-2024-43918.json) (`2024-09-06T15:51:25.957`)
- [CVE-2024-44082](CVE-2024/CVE-2024-440xx/CVE-2024-44082.json) (`2024-09-06T15:15:13.180`)
- [CVE-2024-44739](CVE-2024/CVE-2024-447xx/CVE-2024-44739.json) (`2024-09-06T15:35:02.807`)
- [CVE-2024-45195](CVE-2024/CVE-2024-451xx/CVE-2024-45195.json) (`2024-09-06T15:35:05.483`)
- [CVE-2024-45321](CVE-2024/CVE-2024-453xx/CVE-2024-45321.json) (`2024-09-06T14:35:13.113`)
- [CVE-2024-45446](CVE-2024/CVE-2024-454xx/CVE-2024-45446.json) (`2024-09-06T14:01:37.120`)
- [CVE-2024-45447](CVE-2024/CVE-2024-454xx/CVE-2024-45447.json) (`2024-09-06T14:17:55.720`)
- [CVE-2024-45448](CVE-2024/CVE-2024-454xx/CVE-2024-45448.json) (`2024-09-06T14:24:21.837`)
- [CVE-2024-45449](CVE-2024/CVE-2024-454xx/CVE-2024-45449.json) (`2024-09-06T14:38:08.067`)
- [CVE-2024-8181](CVE-2024/CVE-2024-81xx/CVE-2024-8181.json) (`2024-09-06T15:35:07.267`)
- [CVE-2024-8298](CVE-2024/CVE-2024-82xx/CVE-2024-8298.json) (`2024-09-06T14:53:06.890`)
## Download and Usage

View File

@ -153867,7 +153867,7 @@ CVE-2020-24194,0,0,5b90090107d29f2f11ff3959af64bb5060c6e7bed49ac494e26c0b24ecefb
CVE-2020-24195,0,0,befd0c430e4d1ef7b8a1be08af12bb8b3d414beb9eb254d56854047c04294665,2020-09-15T16:59:25.990000
CVE-2020-24196,0,0,86645ebba61d71fb4d54ae9f027af99a5843de1e042289ac6312e8444a51d9b6,2020-09-02T16:49:40.777000
CVE-2020-24197,0,0,723e3ae6da543830e22e28fe2841d413930a5160a1f609bc252a3f53abb68f35,2020-09-15T15:50:04.857000
CVE-2020-24198,0,0,fd8a1be30f42699047d45910f4c2657d99b491b075ee8fed0d45a49aadac9b8e,2024-09-05T19:15:12.033000
CVE-2020-24198,0,1,15ddfff1da837863ab2bdf8815d9035fea495d2b5bb6f9cf42ee157b0201e21b,2024-09-06T15:15:12.180000
CVE-2020-24199,0,0,f39282985de3f1cad9fa2006126026f95615216b580c10b1cf47f7ef1f2b756d,2020-09-10T01:58:07.613000
CVE-2020-24200,0,0,48903473c4f64a50e47cde0aab311c57314f4bff29894dee5f9fcbc3511b6517,2023-11-07T03:19:51.410000
CVE-2020-24202,0,0,aca9347d15938f12c32a4656c36fccdbf170812ee017f7739b90841c9cc9796a,2020-08-31T16:06:50.940000
@ -154337,7 +154337,7 @@ CVE-2020-24913,0,0,e7cc4322e4e552018a9027030e57e1e0c5e1d0e78c1263e54eddd7993641b
CVE-2020-24914,0,0,03b58b08021d6e1b841516f2339a6e8f01016f0a889416f9cf7ca471d80b5df2,2021-07-21T11:39:23.747000
CVE-2020-24916,0,0,def4fdcfe97ccf043aa11b2e8023b978c448dd6bbab71e5ac737219593b61974,2022-12-06T21:08:01.340000
CVE-2020-24917,0,0,ec0ce60520eb05835c6b098cd8f2093d6c866d0c6bad9500b001d4a88bc8919c,2020-09-03T18:19:41.233000
CVE-2020-24918,0,0,0b4316278a1c5f998b05459c3a1dcb13d459a335fceedb55ebdb6250234f59d6,2021-05-07T14:15:10.947000
CVE-2020-24918,0,1,1e0bb67e08fa945b90fe2eb589d12262d9187a77aab2d1dff68a8c1c6d54689d,2024-09-06T15:15:12.280000
CVE-2020-2492,0,0,4d71359ecf0867fee72611f87f7b96254f2f4c1403d0a5fcb64ef508981e2b31,2020-11-30T17:24:19.097000
CVE-2020-24922,0,0,6b22fbc97fcd8c2e9a4e6abbf3224edf5c6ea30e7ce8a56830914bb3619687a2,2023-08-17T02:04:52.340000
CVE-2020-24924,0,0,c8aafbd48cc46995bc350dddb141565fd756c4e1f1fb69e1490ed1b6dae8cfdb,2020-09-18T20:13:24.157000
@ -212396,13 +212396,13 @@ CVE-2022-48863,0,0,0b99b60ca586a6da4e957e9e6764f579d04f3de517666b5d23308eb74a032
CVE-2022-48864,0,0,20a93d8c717514ed3619da6525932e50b688bd0d476c290094d596cb506d7b10,2024-07-23T14:44:00.093000
CVE-2022-48865,0,0,131f2466a64b0e56f3543f09aa08c5ba9a2688ed851b0bd16452f38d0b32c199,2024-07-23T14:42:20.300000
CVE-2022-48866,0,0,dd9632abea944a27af10a71970d4f3466ac4d00c77d7597d39b4974e89d54588,2024-07-23T14:36:54.493000
CVE-2022-48867,0,0,5e92639844a09f49c2e2880d2798301ed6ee53d5c7e39f5782a94358dc2e50e0,2024-08-21T12:30:33.697000
CVE-2022-48867,0,1,89034f4334adb42c738a2be5473270c0911dc0d920f1ac0b4d28776cb614bd16,2024-09-06T14:15:33.733000
CVE-2022-48868,0,0,71930151dd2da4effce87b0c58f00690726edc337608125881b75d568929e549,2024-09-04T18:38:59.113000
CVE-2022-48869,0,0,173192c29b79b7256dc08619df2dc37adbf52bdcfa3083471b4fd39780223b58,2024-08-21T12:30:33.697000
CVE-2022-48870,0,0,ff2e02721578bc37fe89d4bf345a3f9ac419b3ec104e6d113601d8d741041376,2024-08-21T12:30:33.697000
CVE-2022-48871,0,0,a7ab0efb32cb12de0391c14350b9234df7cac9b75c62f09ce0060789923d9ab9,2024-08-21T12:30:33.697000
CVE-2022-48872,0,0,ee4d8f8a3991e2bec8ac24188bd97f88a4a2a81debc8e8a87273c1aa8e4f4952,2024-08-21T12:30:33.697000
CVE-2022-48873,0,0,126f5bc7205e96dcf9533a79fc89b99529bbfd5ccd8d6cb5c8905ec1069b380b,2024-08-21T12:30:33.697000
CVE-2022-48869,0,1,81cd4ff86b96462ecc32eabab5dc68a611a20d50189b0c7defb877a6ec4a6bc6,2024-09-06T14:19:58.030000
CVE-2022-48870,0,1,052813c05f68cd1137ebb2d6c98a2533be475a75001381ffb2e8d1dcdfd83aa8,2024-09-06T14:20:52.290000
CVE-2022-48871,0,1,54c92c84f06585b0cd1c34723550764f6703255705ce6e16624f4ee65b310912,2024-09-06T14:23:03.010000
CVE-2022-48872,0,1,a3443f4aed44991e8ffdbfd238d0e943d43a4860a6c9c651e9a7e87452acbecd,2024-09-06T14:30:06.730000
CVE-2022-48873,0,1,393b434d14e5250aa2645834684365ee6b2c73719b32b9c93d10b0bc701cbbc4,2024-09-06T14:44:16.677000
CVE-2022-48874,0,0,b7c8e23068e04a991fde0d03cbdf1c4f3ccb10a413c897663da1c235e44314de,2024-08-29T02:42:02.070000
CVE-2022-48875,0,0,e2caa42e0dd6ec750fd9e46e92848849f463307e55477fd45d25751b4883f44b,2024-09-04T18:33:03.537000
CVE-2022-48876,0,0,dd7145c2e72a17454bb985d184ad79104309aabd2355fce75e49acbb3b771a5f,2024-08-29T02:41:34.627000
@ -212415,14 +212415,14 @@ CVE-2022-48881,0,0,b70be3d1ee4e769ba4344a8e2f0e797098bfa307c63cbc3c862df6517648d
CVE-2022-48882,0,0,a4cc9ef14b31d7f9d8718b6e7650e6d5e257977ea609b6e0ca6de853f5e46dfd,2024-08-29T02:36:29.837000
CVE-2022-48883,0,0,393ba512ffb574163a9f61b49138c9f5fd99ee611a3c62b415a0eaf8e576afe0,2024-08-21T12:30:33.697000
CVE-2022-48884,0,0,442f30c7bc460d0b750d0d62192aad9e98cf9980141831c7f81e4f22265a3feb,2024-08-21T12:30:33.697000
CVE-2022-48885,0,0,4eaaf96e489fd3f5fdbe027aacf73aa33e96341274abed26c4fa1795e0f9090d,2024-08-21T12:30:33.697000
CVE-2022-48886,0,0,e3f8a632d16b887efd73f9de9b8718b94deb11a996364b3168b83b0f0443678f,2024-08-21T12:30:33.697000
CVE-2022-48887,0,0,e77f585c3d791c318523b7218645ec0f9895bc8755d7239633b08f6e25494dc5,2024-08-21T12:30:33.697000
CVE-2022-48885,0,1,96a2bdaa99e975d1de06bd449b235bf2aad940ee327e3c25406244d9ddb292ad,2024-09-06T14:46:30.067000
CVE-2022-48886,0,1,32b6f7b27749a93c357033c3466e2b43f740116b44efe497d8cefb500ee1a0bd,2024-09-06T14:48:20.907000
CVE-2022-48887,0,1,03b8fd7e085deadf361cc8da2df815cc48acdfd7e0c823a279cecbdf2eb6da9c,2024-09-06T14:55:46.460000
CVE-2022-48888,0,0,42d6982698129b610dfcc8d0e9291c31502606f4c6a721867d9f51b6d6879cfd,2024-08-29T02:36:17.273000
CVE-2022-48889,0,0,29463f28e482fdefb7d8002387d5e32ed2c38bd0b6ab34a0f42f487921647b9a,2024-08-21T12:30:33.697000
CVE-2022-48889,0,1,26fe6c772af27a72a4dbc4a4042cab4c16d41f4bffb83c7a9c5c75fe7d3e69ec,2024-09-06T15:08:10.060000
CVE-2022-4889,0,0,e28145e6bac3566714c615b828c485e97008b42961c16fdc8c566e13678a4601,2024-05-17T02:17:01.537000
CVE-2022-48890,0,0,645168073778a3a097b7418c6b0d9bdc7fe490075cef45390788017857faa2de,2024-08-21T12:30:33.697000
CVE-2022-48891,0,0,6785941c50af1e5ec9463a15423dd25eac720b3f8d6610cec85f9ad9de30dc78,2024-08-21T12:30:33.697000
CVE-2022-48890,0,1,86d632bf5df80684b404ab7b8921bbf892e25d0ec1b61ff33de7d34236ea41bb,2024-09-06T15:11:16.120000
CVE-2022-48891,0,1,e53cdfff9c40301449889e2be599113f4029581bf8c097ee401be6555cedf27f,2024-09-06T15:39:03.433000
CVE-2022-48892,0,0,e5d1d64acbb59160918aa70cc9f19716880e808c7570261094b023c94b7fa4ef,2024-08-29T02:35:56.343000
CVE-2022-48893,0,0,63e898874aefd1107ff228212c8a194675f7243efe81828dac0b0a89625bb2d3,2024-08-21T12:30:33.697000
CVE-2022-48894,0,0,f64cef72f9d2bc85e042e4ad9d8fef3cc48a4f3edb26d765133492c365bf2387,2024-08-21T12:30:33.697000
@ -223443,7 +223443,7 @@ CVE-2023-31099,0,0,316dca47a441bcbff49b7c01682f0edc834d3579c34610a0d65d4f7cacad7
CVE-2023-3110,0,0,cb45d3e424e5f4d9ba44917b64a5258a7d77c882331cea6e65d589e098116cad,2023-06-28T15:59:59.863000
CVE-2023-31100,0,0,52728b9e8ab26aa70b0ab55039f170907999be466f5e8b560dabc4fb805a29bd,2024-02-01T02:30:22.687000
CVE-2023-31101,0,0,77f4e544f11b5e739b1479f6e19b6ccd2456975f67b8561aaa2c58229b75968c,2023-05-27T02:26:38.467000
CVE-2023-31102,0,0,427462b7abc20e907a8ae1aa683e6574df323303024a67c4e41dab819876dcea,2023-11-20T00:15:06.277000
CVE-2023-31102,0,1,5080e71e8f917eeae0dd70983299a81d3f1547c01aad2307d315c1afe001c7a1,2024-09-06T14:35:01.717000
CVE-2023-31103,0,0,6ebfd0cb1ac0bdf08f28442094dae38ea2ac9a0d7b487e908849ac1cf56c0fa7,2023-05-27T02:19:27.643000
CVE-2023-3111,0,0,88f6d634aaf66868e24baf1dc9c03254a9f0153d8412ca9a1ccbb2e70bf88d7f,2023-11-07T04:17:55.503000
CVE-2023-31114,0,0,a2299262529dc59f23001a6935a0db69324f1ad31cfb90d0de3beb6d9fb6507e,2023-06-14T13:43:45.193000
@ -225928,7 +225928,7 @@ CVE-2023-34255,0,0,80be5f9e6f93d1dff56157d1720c5c0d5b302e9fcf81ddd8a1748a4ec5b2a
CVE-2023-34256,0,0,06e655546c54f56248a7bbbb0bd9dfe93b8c16a4183434e9ab515b7b0eb05a57,2024-08-02T16:16:11.203000
CVE-2023-34257,0,0,0320d12b069a7394c51c703bc5f9098562946b70a12bfe53ad75f5a07d652796,2024-08-02T16:16:11.363000
CVE-2023-34258,0,0,2e656b6b465dd8addf89d28d27a2f63785e04de044f2ca4973a2e285fba2546b,2023-06-08T17:26:19.893000
CVE-2023-34259,0,0,77865eb37ec9e879b884ab83d521cd0d5d91beca2dafdb28593025e053d2e1f8,2023-11-13T17:49:14.460000
CVE-2023-34259,0,1,710e591d41187a09c0c879c2b28e77b17f59e8df4a70e82104fd10051415f806,2024-09-06T14:35:03.133000
CVE-2023-3426,0,0,935e9c3168851c6b164d09f4971cdc352a7eb4e1fb48d323d9ca5e3f69c4f253,2023-08-05T03:45:57.627000
CVE-2023-34260,0,0,c253d0086191543f48833b7cd2c6b64feac20efd450b29e43c25d5bd3f3dfe93,2023-11-13T17:38:02.170000
CVE-2023-34261,0,0,1729daad30a7372c87b9ad3bf7407e2b7cbc075d6b545c22578d51675898073f,2024-09-05T15:35:08.697000
@ -233648,7 +233648,7 @@ CVE-2023-45017,0,0,65e43eb5c20215dbd8113ce9610636bdf9d663f68632a4e6e9ea172ebce7e
CVE-2023-45018,0,0,4b3aa2e7aa53bf1137cdeaf696b6e89c047ec9b2d6e185fc8ed7340212f35ae1,2023-11-08T23:12:44.263000
CVE-2023-45019,0,0,6756673a243c148f6687da7c598825f2cacee4f4acf7e92cd0d342c7394f6dcb,2023-11-08T23:12:33.400000
CVE-2023-4502,0,0,795bfd0690e1416eff545f176193f92114ef18497bc171c578f98c2d3fa302e9,2023-11-07T04:22:40.457000
CVE-2023-45024,0,0,c7b3d879c1933a90f3af2c2eae73d53e6b29a79b21133e214d669c02c1d995a0,2023-11-13T19:29:46.800000
CVE-2023-45024,0,1,f2d68990083eaed6e2e393d4f47a7412a386d70e98010fcd59f705eae07e764a,2024-09-06T14:35:03.993000
CVE-2023-45025,0,0,22225a208e6e749be5e365a5cd6088b337e24ebc60fa184bb20debdf2e56d502,2024-02-08T03:50:56.280000
CVE-2023-45026,0,0,ace3e9e7504a230bf0f52db55a017c6a164facec9477c23b480dab35f3cfa63c,2024-02-06T20:04:57.903000
CVE-2023-45027,0,0,dec72d4ea7216f1091be3baa008ddf528eb2aa0aa6fe7400dfe1915525e3c842,2024-02-06T20:19:44.367000
@ -234633,7 +234633,7 @@ CVE-2023-46349,0,0,fa8706ca991001eb68023bbbd50f48c04c1e6773c2aa28b396804205566f7
CVE-2023-4635,0,0,2a1da06dc8a738bf0c0dd49928ef7b27b3967b3b9559f3ca5bbf110ed4883c15,2023-11-07T04:22:48.320000
CVE-2023-46350,0,0,ebcd02500bbe1a318214c2b2ba01ffcc512b6c2abbc3ace41f39f107e3e685ac,2024-02-15T19:28:38.503000
CVE-2023-46351,0,0,0734126f837adf1ad2f4c776d84e59edd8ea1ef20a4f3dcd58b32efefc748414,2024-01-25T20:14:36.637000
CVE-2023-46352,0,0,901c910a2ccb32c64f4e6990d702ca14937151870a3d2988152ba06cfd6e34ed,2023-11-10T04:13:07.300000
CVE-2023-46352,0,1,c36e4aaa6be42e94fbe892ec2efa133418c229b57ab90e554fa69bb1b0cad042,2024-09-06T14:35:04.850000
CVE-2023-46353,0,0,fd411c6eaa4e91c547796857513980a4c12bd13c784beb220df409a1749f9a21,2023-12-09T04:52:16.587000
CVE-2023-46354,0,0,646d4c6f527aa08230069854fd8f4ca59ccefe3c7118324409117f6f903ba93e,2023-12-09T04:52:09.277000
CVE-2023-46355,0,0,4ee96b2791ee4c5e055da2defa499604a3040d03bdefc4968b32dec7604cd73f,2023-12-01T21:17:19.887000
@ -234671,7 +234671,7 @@ CVE-2023-46394,0,0,a4de4800ba9072f54d1bc0271928ac028c9cbec6c3baa0f74abcd72cfb575
CVE-2023-46396,0,0,74f481bd37b42e6c5810d0851c91d8d9d55975de01fc2eeba4f5140ada061430,2023-11-02T15:03:59.683000
CVE-2023-4640,0,0,ef517ea28d5508716f101ef0a0cba846372ee2fe78cf6a3f47954c41f51018f6,2023-09-05T15:22:15.190000
CVE-2023-46402,0,0,b1fd8b46799103c9e0b2fb413484e3dcb6319b937b704740b5bc888e6a7e65f7,2023-11-28T18:15:08.910000
CVE-2023-46404,0,0,2f261cdb2b07e55263e4fa97c6283a376a5eaa0ed39a9244e56121b72767329e,2023-11-13T17:52:03.397000
CVE-2023-46404,0,1,1e6a766bbfb5b2e5616335c5b7c891f0a8dbf45897aa6b28c2cd67072296b8e5,2024-09-06T14:35:05.673000
CVE-2023-46407,0,0,8a56926a3b97b20a2e3d962774aa035f3b6a36c5705fa9e9f85d167876e00393,2024-01-30T20:17:05.310000
CVE-2023-46408,0,0,969e60cfa27859d12bc5027e1c21c739d529469acc8a1688fabf2be4ac44b061,2023-11-01T16:34:49.837000
CVE-2023-46409,0,0,9c51efb60b1edd50700983003f7e7d932e6c553a120828d87024c27ce7705834,2023-11-01T16:34:59.410000
@ -235002,7 +235002,7 @@ CVE-2023-46813,0,0,54a5b81ea9d5fb0a268b9293a603071610c41491ab8bbea7095535d094697
CVE-2023-46814,0,0,3cecb5f50c237020a17039ffce04adce16d590a4b77f65a0bce23076a5def1ab,2023-11-29T18:54:35.827000
CVE-2023-46815,0,0,73a8d2839a8f681dd5b4deacb0da64bfc7a2eb89a272b7c57e16fb00a27289cd,2023-11-07T20:46:40.287000
CVE-2023-46816,0,0,457f8b7969b679493dd123ee82eb2b848a16353b6b57ef98524a216099740713,2023-11-07T20:47:44.823000
CVE-2023-46817,0,0,169f8cbd9052d358564e0a00ac3e45f8df8d45fc8d06a14066888adca73dcf8d,2023-11-13T19:30:38.760000
CVE-2023-46817,0,1,c622a0bab2dc85efdb3e6cac535b776216f5068d508925e89ceecc35669aaa4c,2024-09-06T14:35:06.507000
CVE-2023-46818,0,0,f234f9e3a48282f81299c3ff6ed7b1a1d071eb6e821f675508ca8b30a7e7e109,2023-12-13T00:15:07.247000
CVE-2023-46819,0,0,b9144c8b43b7e50be02f0a7adb87559b3a81cc8b960f11a9c9b61dc6bebac590,2024-09-04T19:35:08.043000
CVE-2023-4682,0,0,c1c0d3bcf2f406c6bcb06b0a440260f9dabf84e5ad23fa025bbfa655e8c647fb,2023-09-05T16:24:54.687000
@ -235080,7 +235080,7 @@ CVE-2023-46952,0,0,4bcf3948e8ecb1744ce911545c8fe6c861e6c40af1d5cc477719602d32e4f
CVE-2023-46953,0,0,a872c64c0c4c630030a60d7892d6bcb58eb0d3a3b33b50c7787cc33ab267e7ac,2024-01-11T17:06:37.437000
CVE-2023-46954,0,0,4555002c4c62abc01ac36bee743cac877d3c7eea57b71b3900e5569dd91ed77c,2023-11-09T21:38:55.393000
CVE-2023-46956,0,0,31cbd0a04e29ac22bd9f823d3179040618ffc4e9e1a4e90764004517af632bb2,2023-12-06T18:39:39.687000
CVE-2023-46958,0,0,31f8b75382fc3c74f5a3e2ab21d8f78785fc9b74284c4de658492d100aed0607,2023-11-09T20:10:12.967000
CVE-2023-46958,0,1,598349dfda94719665577de5fe0aa92d56da1b66528cb3b507f9540b0549c2e6,2024-09-06T14:35:08.110000
CVE-2023-4696,0,0,c17d353a65b5fe55231e71fd5dd8d9e90c20a1609f561de61d8d7b05e4fee642,2023-09-01T13:06:59.890000
CVE-2023-46960,0,0,60db2322c4a9b765f494d0ebafcd8efdc2e2d2d8adcbfbca9f64c33ec63e600d,2024-08-01T13:45:04.950000
CVE-2023-46963,0,0,35077921eccf07ef2dd7ed76ca66b1edda65dcfed35fff2218ba7101c90c7075,2023-11-14T17:37:06.293000
@ -235093,7 +235093,7 @@ CVE-2023-46977,0,0,718dedcf7e8d60c50f7c513c762fe46ed89e1b2889465f858307796b59884
CVE-2023-46978,0,0,5f5770b9875ebf3fd6d8857acc9e9b125d758788e26c96e3b1b178fd0c24a635,2023-11-08T02:58:11.953000
CVE-2023-46979,0,0,eae1994492758c7970bddfa5af4bb3178bdebcc096f9f0f555ab9653a8becdcc,2023-11-08T02:56:22.127000
CVE-2023-4698,0,0,f67219d933e95e412da2b616588dd9f7b8818435fbd1498ccb40e5f4049ed99a,2023-09-01T13:07:30.360000
CVE-2023-46980,0,0,e1ab81e03e19ee74cc737d01e47d0240b189c5f552d3b88398ffc12dd2440c5d,2023-11-14T13:37:31.637000
CVE-2023-46980,0,1,cc67874b097e0fe762ff091e7672831ece4fc0faa50aca2caad3a6a3a1cb63e5,2024-09-06T14:35:08.953000
CVE-2023-46981,0,0,865ec0b7ef3df7198714d9479b263e54d44d5181af5d1cf0172c63bfd8768173,2023-11-13T19:37:07.107000
CVE-2023-46987,0,0,374b064ecd125c9b3c77e3133bffffe989aa2b01517a094fbc764346da32f40e,2024-01-05T17:03:26.977000
CVE-2023-46989,0,0,fd52fc2c8815b71d6a3aa76a5b70a3b0954c93b4887d037a1f94f52ffb7b26c9,2024-01-04T17:14:27.397000
@ -235269,7 +235269,7 @@ CVE-2023-4720,0,0,46591defb0eac08427334746c7818447cf582c5424371a76c1075c34de9c7b
CVE-2023-47200,0,0,025c71894267700a5e7056344c512f44bc82a3ded295dbf8eeddf8b55a5f0af2,2024-01-30T17:24:40.857000
CVE-2023-47201,0,0,010269aeda58fc1e6a818783c5fc20cf915d7f9eb250e73afd49bb3845663cd5,2024-08-29T20:35:26.107000
CVE-2023-47202,0,0,cd0a9ef7969c2c659da6bda7e00d321e0d90cfae7491531717def749ce6d1fb2,2024-01-29T19:57:32.707000
CVE-2023-47204,0,0,b3cc2fc7ab40a44855805f963a967c4090f45bc4da4f19700ff7cca6f2f5801b,2023-11-09T17:48:32.863000
CVE-2023-47204,0,1,5056a1187ced6a17077a06f6a567308da8d7f19e695c5a1ded59952e9bfba957,2024-09-06T14:35:09.823000
CVE-2023-47207,0,0,0cbc0cd1878f3c8c27d3c0cfe52bfac26630ea0fde092dbaaacacf727f3ed4e9,2023-12-06T18:48:48.427000
CVE-2023-47209,0,0,8c71bbf11f39ea38c0f1ca1872233ee269a7df5592660f74d12bf31cfdf93912,2024-02-09T02:10:45.003000
CVE-2023-4721,0,0,5bed59ffe75b8be3189e2ebb35f3a3a5791725bfc9ef99b944f3d40b2e758745,2023-09-06T00:15:28.960000
@ -238404,7 +238404,7 @@ CVE-2023-51780,0,0,7d213db1d3b1f7169b1ee960fe76bc900ec825971d3159c6587e7ccc180c3
CVE-2023-51781,0,0,be5054a4d6b1496efeb300d0972eaa9aed760c8f3595ab6d8f076735cf23d2df,2024-01-18T19:58:50.630000
CVE-2023-51782,0,0,226d3cdca2a1281d03aacf683fa229f2432a76022577875d6f89499a1a72964d,2024-01-18T19:31:37.630000
CVE-2023-51784,0,0,7d601840dd52665386e56042b61153e0dd9d156e79737ee0b7e9f683c831f447,2024-01-09T19:19:59.413000
CVE-2023-51785,0,0,af6e089d4b220f7ed1c33a8e658fcc887cbb36e7a814321622f657ea15e4ed43,2024-01-09T20:18:47.197000
CVE-2023-51785,0,1,a5a445bd201beb0ef44e66fc50da12391cbc8ef78a9e16c735ecec117160c9c5,2024-09-06T15:35:02.360000
CVE-2023-51786,0,0,ff2ae0afd5896bfcccd08328ace3cce896bcb8fbd8728c747c3e38d3deae4327,2024-08-27T21:35:04.790000
CVE-2023-51787,0,0,32045d14c29a8e094b6fc542eae69fe0fa1d19c1ca4a4442151912591cfe915f,2024-08-01T13:45:32.003000
CVE-2023-5179,0,0,ad8ed58fdb4084553e041d0d1d973d60d06712443de8134346a8a8ead34c4da1,2023-11-14T21:29:41.243000
@ -239350,8 +239350,8 @@ CVE-2023-52911,0,0,d583bf0c3994a5cde3f25badb72d8404d832e6fe0d8e110e053203df0effa
CVE-2023-52912,0,0,76d151333b77b2bd9a44e2c7429e02509b46f2a3384c99f9d0812059fa9223aa,2024-08-21T12:30:33.697000
CVE-2023-52913,0,0,e1054c26f9dea56ffd68b68caf0b3e79a17694aea6f3abb40c24e04a641898c2,2024-08-21T12:30:33.697000
CVE-2023-52914,0,0,ea9dbf463cbd5598879fed8b6374213941d18b44baa0478af4d6ebdab43bbea1,2024-08-21T12:30:33.697000
CVE-2023-52915,0,1,bdbca90dfa4b589cc2bab16f5f9ec310914d13bc7088a137789758c7368c9dcd,2024-09-06T12:08:04.550000
CVE-2023-52916,0,1,5bbab86a5a2f596b1e1ed53b9221822f4b413f719a69472a8344983675045bd3,2024-09-06T12:08:04.550000
CVE-2023-52915,0,0,bdbca90dfa4b589cc2bab16f5f9ec310914d13bc7088a137789758c7368c9dcd,2024-09-06T12:08:04.550000
CVE-2023-52916,0,0,5bbab86a5a2f596b1e1ed53b9221822f4b413f719a69472a8344983675045bd3,2024-09-06T12:08:04.550000
CVE-2023-5292,0,0,214d7ae5654e29ed0e372211abf39e379cdbd830eab553609e162ffb791fd787,2023-11-07T04:23:48.910000
CVE-2023-5293,0,0,37b5570c94c226fac17bbeba13451e285dd87937cebf55577645a70e3fbcf851,2024-05-17T02:32:58.843000
CVE-2023-5294,0,0,91871d88408d7e2bcaad4b05fb484ac2315248d3665cd88ba6ae47f2da8d5f16,2024-05-17T02:32:58.950000
@ -239571,7 +239571,7 @@ CVE-2023-5523,0,0,bdd48092e4d5ab76434220a199e56d98fa47c395fbcc23ebc7c69d7e127f5d
CVE-2023-5524,0,0,5169d7d8052a7012dbff7cd323a414cd5852b5c7221b30db93dc2bf8e43af6f6,2024-08-28T09:15:09.707000
CVE-2023-5525,0,0,543ec82aa94363be260145436c9c180cacc4af427707ae230febd3148ae15c39,2023-11-30T20:15:18.223000
CVE-2023-5527,0,0,1e958c164e488718f37dd43daa67a175a10841217dba121ce89025ac9ba89004,2024-07-05T14:11:01.873000
CVE-2023-5528,0,0,7bdfbebcf9e7ec10c748abe0927b7e446f525fa7172280dd961465780d041565,2024-01-19T16:15:10.280000
CVE-2023-5528,0,1,d1db7bd851cb1f2811816c0e6d89bc69ee1d3bf5f3cb446769f932c51fef40f9,2024-09-06T15:15:12.640000
CVE-2023-5530,0,0,c3e6a7cea79bf4cfc7586400dcaf9455390e41ce881f41dcf28765de1970c973,2023-11-14T15:31:50.170000
CVE-2023-5531,0,0,9076d00a4817e2fe00125f34f0d658f0ea9c411a20b192f3479cd194c21f8dc0,2023-11-07T04:24:07.297000
CVE-2023-5532,0,0,f74dbaab5b090b0e034d237c85162d6bdfa882ba3950ea1c5ed23a1cc57994d9,2023-11-14T18:17:45.437000
@ -242693,7 +242693,7 @@ CVE-2024-1740,0,0,974b4647e97273950b6a297affa420d08f59acef309aa37814c6598a456898
CVE-2024-1741,0,0,9b90ffeb3b03d37716707b75f2cc4dbd5a37dfb34e59e240c9be2fa85842dcc2,2024-04-15T18:15:09.937000
CVE-2024-1742,0,0,ef8e2131c95185fddee2b27fa43b85956207ef471d56b7605b9d2e6a1c53a4d4,2024-03-22T12:45:36.130000
CVE-2024-1743,0,0,483e7e67b70ea440915c26337d00527748cea35503b453ed4beec805a523f208,2024-07-03T01:45:31.390000
CVE-2024-1744,1,1,46a92b6e23a003fa03614f282fe8f61945617d9a5cfebce37256108fa317faa9,2024-09-06T13:15:03.467000
CVE-2024-1744,0,0,46a92b6e23a003fa03614f282fe8f61945617d9a5cfebce37256108fa317faa9,2024-09-06T13:15:03.467000
CVE-2024-1745,0,0,1e43ec903cdd08626f0d20b4612f3ce6507e55e2bd5bb05034398a450502f6f7,2024-08-05T19:35:01.720000
CVE-2024-1746,0,0,8022383f443dbbb627f1c414153375fa50b320afeba598d9c8de3dc5c8a81f57,2024-04-15T13:15:31.997000
CVE-2024-1747,0,0,62057f23570bb0721b1db5127075f49bb03ce7c371cab177ae217aa948df9df2,2024-08-01T15:35:05.150000
@ -246065,7 +246065,7 @@ CVE-2024-24755,0,0,e4708ab22e90c108e98e9aa20d9e6f52aac9c365db4852f4f377c09577dad
CVE-2024-24756,0,0,a8c8a136cbb94318b9ac39b1cf6ca26aedd9fd478d8deeb2b541a1b5348e8aea,2024-02-09T19:47:10.213000
CVE-2024-24757,0,0,cf8db7e707a60167d50958ed833b092b480adb19351f319a3150e724530329a6,2024-02-10T04:10:36.420000
CVE-2024-24758,0,0,4afdd9a8b1527f6df073ab9304d324073fd35a999bf5b108c831c515c647ab95,2024-05-01T18:15:14.833000
CVE-2024-24759,0,1,196dd3d6a390d0f8adf696e748e9652eea5e67c303d007f2b608d7022ae5651d,2024-09-06T13:06:18.623000
CVE-2024-24759,0,0,196dd3d6a390d0f8adf696e748e9652eea5e67c303d007f2b608d7022ae5651d,2024-09-06T13:06:18.623000
CVE-2024-2476,0,0,80675065379b57841f9cc91f89004ea3a59650c216e07d02b5d96eca99c32b3c,2024-03-29T12:45:02.937000
CVE-2024-24760,0,0,712e50ebe0dfd036080457db09cbfac631236bade7f3aab0fefe0bd1d6c7650e,2024-02-10T04:04:55.743000
CVE-2024-24761,0,0,b1f2bf902e5fec122e2292b6e3e60586d417fb53e3af18ffd9589198f195ec1f,2024-03-06T21:42:48.053000
@ -246635,6 +246635,7 @@ CVE-2024-25580,0,0,d25d9f73e9fc463223909f23338d50734f85395c9d208e28fc6abf197ca8c
CVE-2024-25581,0,0,7b661193358cc282ffdeeb44cff665ab8564f25632f9671f041e9f50015c108f,2024-06-10T18:15:27.650000
CVE-2024-25582,0,0,62d9159e0b1a2860275799366d4e29ceadc17aa10726dd8de14b9c6e306d70ce,2024-08-19T12:59:59.177000
CVE-2024-25583,0,0,6e3f5afaa55d00544b0a17a1114934680c9d4fc2071988d62cf80e5688bf7955,2024-05-01T17:15:29.917000
CVE-2024-25584,1,1,89b20e5dcd3d8c4c3ce9109e9e1254d69764a5640f158a1eab12a09150002c22,2024-09-06T15:15:12.950000
CVE-2024-2559,0,0,642c1f03947aacfb3c18bcf4d539f5f80f1fa8009f630aa1b6518220561e974a,2024-05-17T02:38:19.053000
CVE-2024-25591,0,0,e315c0ed01e598ec7e003ff81cc81e0d8a90e92647ce95f4238660e2e3cb63e0,2024-03-17T22:38:29.433000
CVE-2024-25592,0,0,13e401ed83dddc5e0ca4a766450281e95f13649cc9bdbd70b9d6ebf050e92c48,2024-03-15T16:26:49.320000
@ -246757,10 +246758,10 @@ CVE-2024-25738,0,0,708ab77db4798450f178306dfdce8e54e50af183337435b77974d77b7119e
CVE-2024-25739,0,0,976dd73cb281097b08298328a4164e038521b14231c5653569f9d2458078f4f3,2024-06-27T13:15:55.520000
CVE-2024-2574,0,0,0663b3bf620e7eaea35e1b3237dc263b6d897527ed31c7e8166e509390c6cb16,2024-05-17T02:38:20.537000
CVE-2024-25740,0,0,6ba085d5463d39f02fcd8a1bcb6b0d08f943a0acf58c18d3b1c39a6a03f005b3,2024-02-26T21:11:27.837000
CVE-2024-25741,0,1,96d212b2133c541e969943e90a0b05654d2d127733a0b62e987df5513a4bce9f,2024-09-06T13:00:04.567000
CVE-2024-25741,0,0,96d212b2133c541e969943e90a0b05654d2d127733a0b62e987df5513a4bce9f,2024-09-06T13:00:04.567000
CVE-2024-25742,0,0,64a7e49ba77fe66b1f40220a562db53fca6672cb5535d529c8b5770ce2d5e19b,2024-05-20T13:00:34.807000
CVE-2024-25743,0,0,1c0eddf9ff39c172b1917b2af6c386627e5412677b9092ed1b4c80ec112bb6af,2024-08-15T16:35:04.743000
CVE-2024-25744,0,1,9215f14f6525e55efbddb4ffcee42204248a5f87f3501314f6b7ff3022ecec1d,2024-09-06T13:11:05.520000
CVE-2024-25744,0,0,9215f14f6525e55efbddb4ffcee42204248a5f87f3501314f6b7ff3022ecec1d,2024-09-06T13:11:05.520000
CVE-2024-25746,0,0,8855a194466e5deeab9baa1ad399e9a9947473b628737c1175263f75df97cfa1,2024-08-28T18:35:09.110000
CVE-2024-25748,0,0,5bb6acf358e655979178d585c8c32b626bf8ea83fccfe3ee7cdea479e1332b26,2024-08-28T18:35:10.337000
CVE-2024-2575,0,0,a80d23ced381ef92b364937b2fb4dfbb5da5d71a7483fe8d8649f5052e293551,2024-06-07T20:15:11.520000
@ -248172,7 +248173,7 @@ CVE-2024-27390,0,0,fd939b5a46e3db47e38737677dc08895d4507457dc8c59f804a220890fafa
CVE-2024-27391,0,0,c609df1ae4a0d8b672f84b73ef5e4ba82e2a581d1583d7f5330bf8875e22776f,2024-05-01T19:50:25.633000
CVE-2024-27392,0,0,d71bd39d141dc4709bff7fbbc837ba796224bb31c86e71592537c5234c653cf4,2024-05-01T19:50:25.633000
CVE-2024-27393,0,0,0d122d1a50515c52a623d15f9a0d95a22f7e02938fb8b22e82a5712750ad9006,2024-06-10T17:16:23.223000
CVE-2024-27394,0,0,67112e71836ab43c8ed49fc976b35d6b12c82b3bc282714292ffbd79ee2fef5b,2024-07-03T01:50:36.103000
CVE-2024-27394,0,1,08a27f4278e90895db869570c2ad1394d2b1b7ce2eebd13c81985e703b3d5763,2024-09-06T14:35:11.027000
CVE-2024-27395,0,0,f509312d757b52ad19fbd73ceeb6a726f1f69fc5206c32a2cd50e6d3c74db34b,2024-06-27T12:15:24.577000
CVE-2024-27396,0,0,e14a9534df6188e2d3948f71aa579b6ff342c8dd8805de92331af3aa294e2094,2024-06-27T12:15:24.647000
CVE-2024-27397,0,0,a0f40ad4c2f891849c489ae4b9841685ad4e227c084159373a42e20fef210207,2024-08-19T05:15:06.293000
@ -253171,7 +253172,7 @@ CVE-2024-34638,0,0,91fe3b834e3462c15fbf154ef3d7ab38d545a9a64e15797ac8088d6d5c627
CVE-2024-34639,0,0,5126f9cb6c976682c17d65ace1405f88764b328ae3db088d28e0b57940c92216,2024-09-05T18:04:37.677000
CVE-2024-3464,0,0,9e608448fda895152ed315d883c9d4488539c5d01a2437614b47cfb67b0a4466,2024-05-17T02:39:57.540000
CVE-2024-34640,0,0,4c7fde7ff03197842352a86e70dbc537d9f440fdf4872caf494fd8acfe50d0ca,2024-09-05T18:04:28.607000
CVE-2024-34641,0,0,2b30fd1a9f5ae753629925215ca156579576fd060a975f5387ccb7d58dd694d8,2024-09-04T13:05:36.067000
CVE-2024-34641,0,1,c77ca2edd0db150eb0811c6441d08a57704276bdc068d117b8e1f90660357ea8,2024-09-06T15:27:40.647000
CVE-2024-34642,0,0,54c219cd85c017e71c929c36652a56a6824f245d2f9be41abdf874c9b8dc39de,2024-09-05T18:03:57.407000
CVE-2024-34643,0,0,fbb923e6665e4b9fcb93b30b65b07d4c83673c639c27d25afd12c5e752b948df,2024-09-05T18:03:12.323000
CVE-2024-34644,0,0,3e53979f9850d51f064780cf789bbea28badd5caf32db28756d92b8a7c8bcf96,2024-09-05T18:03:00.687000
@ -253187,7 +253188,7 @@ CVE-2024-34652,0,0,5fcd4fa460cbaeec0f8df845e452b826bda7eb569c47b7926c3e1d9633ab5
CVE-2024-34653,0,0,677330c93a4b4f53244647b85632be75f577b8d63e27df66036ceaf9279b43ee,2024-09-05T18:04:40.810000
CVE-2024-34654,0,0,6f465f944e3d70bce6526d6d1148c1e634bb7c08992888ceb1abb536af6c667d,2024-09-05T18:00:07.057000
CVE-2024-34655,0,0,dfac8eb7e02ea4fde394dff14f36d75c33b2306795d4e4e527cae6398c8df500,2024-09-05T18:00:39.270000
CVE-2024-34656,0,0,4b5097936519572ad489ac32cb14e42c878e2a5293e1ee1278fd186194deceef,2024-09-04T13:05:36.067000
CVE-2024-34656,0,1,9b7706f2da7b41644d68334787754fd19696d282433ff97b1c940cde45b0d353,2024-09-06T15:57:25.657000
CVE-2024-34657,0,0,e76dd3b191c96b6eebc5e6b8603c75eeff96d8eae90f914ab3a15f3eb419d2ec,2024-09-05T13:48:54.077000
CVE-2024-34658,0,0,0bdbae0b2b42061a8353c4769a7cf5c4aeee0cbc7bbbfd2a997adcca4577f91e,2024-09-05T13:48:52.273000
CVE-2024-34659,0,0,dd3f9420e24bf859148c793c2123fe1fcf6f82da97ec67367518f44415c24946,2024-09-05T13:48:55.767000
@ -255630,7 +255631,7 @@ CVE-2024-38312,0,0,1eb38797c2d82d591d8abe57f1d4573a3412cb86f39c7ea700474f2d0b5ea
CVE-2024-38313,0,0,99d0ffe48700cf0aafe0ab7664577089c510c6757d7ad1e1517ef516a283543d,2024-06-17T12:43:31.090000
CVE-2024-38319,0,0,baca4c6dd463198ff6e83e4d1d026e029418f6c2a504c13c76e1be823b804509,2024-06-24T12:57:36.513000
CVE-2024-3832,0,0,9a695728462575e75497ca13bb41d4307d467f786773e32ceb92b024954b50b9,2024-08-14T20:35:21.240000
CVE-2024-38321,0,0,2cb9045d51fd54daeac3702ceaa87df8b4f19bbab20424161fab4c08e362da38,2024-08-05T12:41:45.957000
CVE-2024-38321,0,1,2710f443b4070c40eb4ddb90b32a5c6553d12d8c8899edd19abf3192e0c71b2d,2024-09-06T14:50:53.583000
CVE-2024-38322,0,0,74b9e97c7c82afcc24ac902608f17e4ba9d4e2fd0a18a6e0da522de36e8692a9,2024-08-20T17:27:59.567000
CVE-2024-38329,0,0,515bd4f8a6975d0242eb5160bb598bf35297ce9bdbe7a3832edd58be7833ade0,2024-08-03T12:15:16.803000
CVE-2024-3833,0,0,d8bd7ba32ab0c5df93ed1bc71c84eca78bd804cb628236293c000739d365ad50,2024-08-01T13:56:42.740000
@ -255734,7 +255735,7 @@ CVE-2024-38480,0,0,04c4f9e75ecb94da8a57533882d0899c4c9616c45f6d4f0fa40fb0af2c036
CVE-2024-38481,0,0,a84ef873be05988cbfb5d94abd02b4ab54b65ea0e48ede31f1ebc6095538ede7,2024-08-02T13:54:44.360000
CVE-2024-38482,0,0,9abc0a21b4d338765e493606e519fec01088c089d21089e2acce085b7e1d0261,2024-09-05T16:04:53.577000
CVE-2024-38483,0,0,d89f0c1af2745eaf3307200f5493e8a825a53b577d01487f0db0b0e51a7359ef,2024-08-14T13:00:37.107000
CVE-2024-38486,0,1,87c5a44f92182ecc40db642dc01535c94130abe40a32815737960b8bbbb09711,2024-09-06T12:08:04.550000
CVE-2024-38486,0,0,87c5a44f92182ecc40db642dc01535c94130abe40a32815737960b8bbbb09711,2024-09-06T12:08:04.550000
CVE-2024-38489,0,0,93d5075288eb71dc5e05de45f3028a8abf40e549af9e7f74c8d90c91ab2994de,2024-08-02T13:54:55.697000
CVE-2024-3849,0,0,5306fee696144db88733a07d80a07ecf85ac2a8ec15f60e756615ae8c2f2566c,2024-05-02T18:00:37.360000
CVE-2024-38490,0,0,6064da0857e13bb34f5161ce76072357349aff2d15fba2fd034148c6aa00cdc4,2024-08-02T13:54:51.277000
@ -256198,7 +256199,7 @@ CVE-2024-3927,0,0,c053c5f2098184ebda7812ad9ad17f8e9bcb0fa48f3cf62ccbd3c0beff2bc9
CVE-2024-39274,0,0,6d4b03e5d97ff9e2231b9be6769126c78b619f16e46745a1adeaad7d24bf4316,2024-08-23T14:39:29.247000
CVE-2024-39276,0,0,6f0f039dcabac20e005cba2452b1ca645538948e13817be1991e8b89038bb468,2024-06-25T18:50:42.040000
CVE-2024-39277,0,0,19274852af9a44581ed7b5da931e969f3e8eeda9b8a06df6105e4982b2efa2f4,2024-08-20T14:35:25.887000
CVE-2024-39278,0,1,0601498c3389c5dd00f8ed9530dea3d77d09d81c315f48a8850ef30911e72e8d,2024-09-06T12:08:04.550000
CVE-2024-39278,0,0,0601498c3389c5dd00f8ed9530dea3d77d09d81c315f48a8850ef30911e72e8d,2024-09-06T12:08:04.550000
CVE-2024-3928,0,0,3771bfd5d61bb660489266159da597b0f2838c8fcc0fdb41f660ee68264744db,2024-06-06T20:15:13.813000
CVE-2024-39283,0,0,b7e0387ba5dd8a48e1248bb2bf0b89b8e5d589734af2917b519d63ca9a728676,2024-08-14T17:49:14.177000
CVE-2024-39287,0,0,95145d1fbc5d3c99088ebf6343df14053c1bba8568afd021848bf0425c858769,2024-08-29T14:23:31.807000
@ -256436,7 +256437,7 @@ CVE-2024-39578,0,0,c57c67d60ebbfbb439cb464fedeceb835967a7da09b4f182842457f086204
CVE-2024-39579,0,0,3b10efac241247907da1969516918327fdf07736fefefce9e8f33c60526e18a1,2024-09-03T20:57:32.607000
CVE-2024-3958,0,0,d5a5e3b155f3063c251dfec6027d4759e62e1ec9e2382396e782467b23eef014,2024-08-29T15:50:33.257000
CVE-2024-39584,0,0,1d0a6aff0073f4836d9654764326ceeb368acd09f92344e463ab3214871c70e5,2024-08-28T12:57:27.610000
CVE-2024-39585,0,1,bf0d12ad0e5692587be63c1809ed232ada783d92c2da2c6ee712874c5362a09b,2024-09-06T12:08:04.550000
CVE-2024-39585,0,0,bf0d12ad0e5692587be63c1809ed232ada783d92c2da2c6ee712874c5362a09b,2024-09-06T12:08:04.550000
CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000
CVE-2024-39591,0,0,6df5bfa73938e4812212735bad6342100faddf79ce461f960eaa31dba3eab077,2024-08-13T12:58:25.437000
CVE-2024-39592,0,0,541b14c1914f7693bac69344218050bd21bf7511f9226d6471041f73dd5bbff5,2024-08-29T19:25:41.740000
@ -256991,7 +256992,7 @@ CVE-2024-40836,0,0,3f8d294ac16d143cb335a801addaeae273151ae88e0d093a406c7dfedffe6
CVE-2024-4084,0,0,aed2355093521159d48a9084a5a18f34499717e2daefb72a4c03148c5f7b9d24,2024-06-11T16:44:49.090000
CVE-2024-4085,0,0,7aad6a4056b6c332cceb43166a488ef1c1b3002f44d4bee7dddba365a66e15ea,2024-05-02T18:00:37.360000
CVE-2024-4086,0,0,4591112164bebe25a6e3755e5f7d7b3acd1442e1405281bbc9f49b1286c02b38,2024-05-02T18:00:37.360000
CVE-2024-40865,0,1,b915f771e330e9eacff27353ae6f81425515122bd098dc3b5152c9be16cadf86,2024-09-06T12:08:04.550000
CVE-2024-40865,0,0,b915f771e330e9eacff27353ae6f81425515122bd098dc3b5152c9be16cadf86,2024-09-06T12:08:04.550000
CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f774,2024-06-03T14:46:24.250000
CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8f9d,2024-07-26T12:38:41.683000
CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000
@ -257125,7 +257126,7 @@ CVE-2024-41007,0,0,557d3d79f36960ef2852244da6d9d8db811ba2a987274c1ebfaa71dd3034b
CVE-2024-41008,0,0,86de6e2be092cac70f5596fb96d0253f26291855f34ae4ddc015775261181c4a,2024-07-16T13:43:58.773000
CVE-2024-41009,0,0,c4729b5cb64b59a8130835040cce4fcac734ad6152593d4547aa0a45482d47fd,2024-07-29T07:15:04.560000
CVE-2024-41010,0,0,ae8d1d1b3ebaab40dc6ac6afde49ce66895bb7f4e7ee92f295ff5ca1fa79b217,2024-07-19T15:24:59.137000
CVE-2024-41011,0,1,0ea0f8cc21c6447d8c7d604f8cb128d5314c6d4d9477517c491af1541a3fc28d,2024-09-06T13:19:10.197000
CVE-2024-41011,0,0,0ea0f8cc21c6447d8c7d604f8cb128d5314c6d4d9477517c491af1541a3fc28d,2024-09-06T13:19:10.197000
CVE-2024-41012,0,0,100aa94909001769d833a9407cf1a1d29626a5b74fec5cc1935ff6c4fd015723,2024-07-29T07:15:05.083000
CVE-2024-41013,0,0,e60bba3e408ef7ae0e4e783aa0f35051774aa2a8d236b750438ef4fbd7846f74,2024-07-29T14:12:08.783000
CVE-2024-41014,0,0,705963fa55cb8c9deb35bac026b5f0f3c8c6d9abda445da5a02c7d95e767c33f,2024-07-29T14:12:08.783000
@ -257608,7 +257609,7 @@ CVE-2024-41908,0,0,4395c5591073b43f4724f4131ff7c57ca0e5c0cbe6832eb0944957596ef1d
CVE-2024-41909,0,0,ae6686d5ad4d2ebfd635dbae6d1f881b365882bc35a01efb94a8b8f78e60a1e9,2024-08-30T18:32:14.467000
CVE-2024-41910,0,0,06fef1a1746e307a7b6963424f9e76401a3fb6190b3818fc37dc793d73a60b2e,2024-08-13T13:06:13.467000
CVE-2024-41911,0,0,b542ab6549d1a6ba75d487319609cd34daa1d1d30a8cdf77ef05c27a0b475654,2024-08-13T13:06:50.707000
CVE-2024-41912,0,0,1adae7c062cc193d9cda59c9b448e43f505db490975548e118eb851dae368d94,2024-08-08T13:04:18.753000
CVE-2024-41912,0,1,87ea3b9bad9f8b63d89c4540ebebc21c4d13ff1285933095e3aece696e2e2968,2024-09-06T15:13:26.177000
CVE-2024-41913,0,0,c6ad0a1fb279b7b6cd3ae0202ead0c310e4163291803f6da39ff84b133ebe42f,2024-08-13T13:06:48.547000
CVE-2024-41914,0,0,cbc550b915270d7e2f2879c2f4d0216e7f6bd6d1cd3a3c180c2f13327702487c,2024-08-01T13:59:14.250000
CVE-2024-41915,0,0,79e27d81a466e27de33128fccf775ada519c090b73b4d198c18c4a0be866e968,2024-08-01T13:59:14.947000
@ -257856,13 +257857,13 @@ CVE-2024-42248,0,0,a4c871a843ec4ebaf7266331bbf45bb853808d9d58017b146752d4bde19f2
CVE-2024-42249,0,0,273d2e61a1b49951ffbd8c20389c9c76559ac159ab90b5fda4da3c7651f4a6a8,2024-08-08T20:55:25.943000
CVE-2024-4225,0,0,91f68c0336340065fb4af26f099ffa4f82ba2dd159bb3bc13f7cb1abcd1de276,2024-04-30T13:11:16.690000
CVE-2024-42250,0,0,7d78385b950f6f638c0eea124fbfec17d170acdf08ae1ee68e3b5c1e1327945f,2024-08-08T20:55:19.780000
CVE-2024-42251,0,1,73aa915a400823306ef1cb983389facfb9add41605622ba6741c8575de328546,2024-09-06T13:21:23.203000
CVE-2024-42252,0,1,c3750782261f7fe98514cd211a68de1e9ce09485c24e3a6229648794f161cc8d,2024-09-06T13:37:31.460000
CVE-2024-42253,0,1,6e0fa931ea229e2f23314c5453d8b7e015461615e534d12df0d8c2957c5e1eab,2024-09-06T13:38:36.103000
CVE-2024-42254,0,1,e0173cdd4809cbf30e0c1ff24a3b56e94fae700787305a6587ee3f29a79ddd0f,2024-09-06T13:40:04.737000
CVE-2024-42255,0,1,34fe6ca394a4d37dfeae64c43b4e81284ae1fd88f707998530c97485d050831b,2024-09-06T13:41:30.843000
CVE-2024-42256,0,1,f03d3d34e99a43b4ab4d3700a1810230a20f71fae4e12698f26d3c94c2fbe1db,2024-09-06T13:56:00.207000
CVE-2024-42257,0,0,069b5a4e96675c66db46a639aa141686ff5530ef6ed9e06efaaa21582e67ad7d,2024-08-08T13:04:18.753000
CVE-2024-42251,0,0,73aa915a400823306ef1cb983389facfb9add41605622ba6741c8575de328546,2024-09-06T13:21:23.203000
CVE-2024-42252,0,0,c3750782261f7fe98514cd211a68de1e9ce09485c24e3a6229648794f161cc8d,2024-09-06T13:37:31.460000
CVE-2024-42253,0,0,6e0fa931ea229e2f23314c5453d8b7e015461615e534d12df0d8c2957c5e1eab,2024-09-06T13:38:36.103000
CVE-2024-42254,0,0,e0173cdd4809cbf30e0c1ff24a3b56e94fae700787305a6587ee3f29a79ddd0f,2024-09-06T13:40:04.737000
CVE-2024-42255,0,0,34fe6ca394a4d37dfeae64c43b4e81284ae1fd88f707998530c97485d050831b,2024-09-06T13:41:30.843000
CVE-2024-42256,0,0,f03d3d34e99a43b4ab4d3700a1810230a20f71fae4e12698f26d3c94c2fbe1db,2024-09-06T13:56:00.207000
CVE-2024-42257,0,1,dd66a8bc9ea528d2f2ed1dbef8528f021678b42931c435b735ebdb99ef0374d3,2024-09-06T14:12:22.577000
CVE-2024-42258,0,0,6b21eaebf58128d72e1ceab7d48900d2d3972b04dba8579ddc705c6be6f5d3cd,2024-08-14T14:15:27.727000
CVE-2024-42259,0,0,29b4a2e7ef9e0c3eb8144aa95f30b45d14ba1954b7d6ca5651fd3521fa620dbb,2024-08-19T05:15:07.053000
CVE-2024-4226,0,0,5a1ca6b12b6f72b0f4206f29fce66dc2868959ed888bfbcbc74131b5725a94eb,2024-04-30T13:11:16.690000
@ -258038,9 +258039,9 @@ CVE-2024-42488,0,0,d4b28d6f7587a9892f3e1f2f60f322ad605b2174a3099ed0ae0224cdeca76
CVE-2024-42489,0,0,cdd86cc62ae99e91c414cd210e2840035f1a515c38caae18a4e22c79cdb0af72,2024-08-12T18:57:17.383000
CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000
CVE-2024-42490,0,0,c74b5a356197cfdd591b442b14ff2431ae7b9dd31d3d19cabc69311edc084829,2024-08-23T16:18:28.547000
CVE-2024-42491,0,1,f29a442764e941cf16c1143e20ac825cd384b5c08683995678d650efdc59327b,2024-09-06T12:08:21.290000
CVE-2024-42491,0,0,f29a442764e941cf16c1143e20ac825cd384b5c08683995678d650efdc59327b,2024-09-06T12:08:21.290000
CVE-2024-42493,0,0,62acde285327354a8bf885be4a4449e2ac155d363ca62a755a0d6560a4377c67,2024-08-29T14:24:14.373000
CVE-2024-42495,0,1,1180a26d6b9f5e5788a1528660b9981f2c7723878d1236cb29689626dd32a15c,2024-09-06T12:08:04.550000
CVE-2024-42495,0,0,1180a26d6b9f5e5788a1528660b9981f2c7723878d1236cb29689626dd32a15c,2024-09-06T12:08:04.550000
CVE-2024-42497,0,0,262b8d15cef13f44f6c11c9732e86216b599547f262ceb2ec772c87233738fc0,2024-08-23T16:18:28.547000
CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000
CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000
@ -258720,7 +258721,7 @@ CVE-2024-43914,0,0,cecc040296533d16ec68f112b8d7429d7c31abfac86050a6f05da890be7d2
CVE-2024-43915,0,0,d179827f4a2239697e62ac501a97b8b3109220e3bde2278c20f3a196442ad24d,2024-08-28T17:44:45.193000
CVE-2024-43916,0,0,f029d23d9b2bb2878425bf53ff3e166ae08ff9834b0ced7b956909e8c596933c,2024-08-27T13:01:37.913000
CVE-2024-43917,0,0,763320422d1f5f6b627e67997133b73d2d81c353f19b439bce5f72673e32a57d,2024-08-30T13:00:05.390000
CVE-2024-43918,0,0,6f6745b88f3678813198257c945602dc7ab029c467f62ff1519da2102b72bdb4,2024-08-30T13:00:05.390000
CVE-2024-43918,0,1,ddd56bcf8df0ced2fd43f465099ef1734f47f7e198c9ebd8d1474897ffb0a07e,2024-09-06T15:51:25.957000
CVE-2024-4392,0,0,5c82c123a66d3444e81adbb958bd6b8cf11e432e36668571a78dbfc8c82c1c37,2024-05-14T19:17:55.627000
CVE-2024-43920,0,0,4fe0b9b4bdc3c773cef62ba0a55678a848520d2f26b7c394fdfed7064f320ada,2024-09-04T14:06:43.780000
CVE-2024-43921,0,0,8cb3a8317d91fe8c86f2a088d9aae7d066ad8cdfd297a2cc1e6c90830f46e738,2024-09-04T14:12:12.957000
@ -258772,7 +258773,7 @@ CVE-2024-44069,0,0,2eb956dd06d71bb925b0fe816cbe078cd7c5c9a8647e07e8d081256cc543f
CVE-2024-44070,0,0,897c04ba9a67e5ea511bddee651919522720d2ac02cb9c6411d8cfecd25984e1,2024-08-30T16:19:49.587000
CVE-2024-44073,0,0,ad93c7cd67f110b3f3dbf8094f03e2f128eb131898a84b811a05132b4dd487f2,2024-08-21T12:32:44.470000
CVE-2024-44076,0,0,d8ab474e3e0cd492e411ba495a07543359555360960989541af9d6ad1fd6855e,2024-08-21T12:33:42.487000
CVE-2024-44082,0,1,70a8331cd768c2e9835adf6e103b27ce2f8e12a3bda067b4ac62b7cc192aa0c1,2024-09-06T12:08:04.550000
CVE-2024-44082,0,1,eca3489830dade6ed42141e32f34d30f3f0c158d92e0366e9686c819b89d9a20,2024-09-06T15:15:13.180000
CVE-2024-44083,0,0,0fbb97686726ee4d6be299ae185c5a7e6d7807c436d290993d1b41ed0119344c,2024-08-28T15:15:17.050000
CVE-2024-4409,0,0,ef601ae22761768812ec6eb133885b7a6b08c5417903a944100f49b603e1172f,2024-05-24T13:03:11.993000
CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000
@ -258856,10 +258857,10 @@ CVE-2024-4470,0,0,3c0fcce343f2a1d09f74dfb9be1570b18bd3555368134445c358e736dab037
CVE-2024-4471,0,0,44899070168831f8c9dbf9959b26f4abead5dc804569bf5f22dbe3807408cb0d,2024-05-24T01:15:30.977000
CVE-2024-44716,0,0,063e41b42ec84a26fe3901d267f8097e94d2443a9dc25f00cc37c917e4db50e7,2024-09-03T18:32:45.427000
CVE-2024-44717,0,0,4633d8ec58d1349f11ca257535d78e1a19dae6e8b84c1661ccc3922a9791eefb,2024-09-03T18:32:54.357000
CVE-2024-44727,0,1,519c6edd63986291fddd28777499b5bf49fa3688edaaf8c8b5736fac2c095d2c,2024-09-06T13:15:09.567000
CVE-2024-44728,0,1,cb7a7604dfcd48f9cda73a0c69d9a24576616f565cbb7b44a1dd956c1a2540eb,2024-09-06T13:23:23.743000
CVE-2024-44727,0,0,519c6edd63986291fddd28777499b5bf49fa3688edaaf8c8b5736fac2c095d2c,2024-09-06T13:15:09.567000
CVE-2024-44728,0,0,cb7a7604dfcd48f9cda73a0c69d9a24576616f565cbb7b44a1dd956c1a2540eb,2024-09-06T13:23:23.743000
CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000
CVE-2024-44739,1,1,becaa1e1fb57b43902ec5f1b659b9594db9683938046ea549f808aec70003811,2024-09-06T13:15:04.323000
CVE-2024-44739,0,1,508250faa2e35fa83b62df00c700ebac0a014366777587ff05f9ffe009e520f2,2024-09-06T15:35:02.807000
CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000
CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000
CVE-2024-44760,0,0,0d252ff08482783aaee88c027910c09101e7f32f15f52b69e5e2b4482012606e,2024-08-30T15:55:41.137000
@ -258887,6 +258888,7 @@ CVE-2024-4482,0,0,30c719bdf44110f5d77595f668147507c21a010645f412257434e159bd101a
CVE-2024-44820,0,0,f15637d2ac032c543e5fcbbe9f5d1cb1b7c83c8e990be9337cf6d7655fcc3e7a,2024-09-04T19:35:13.010000
CVE-2024-44821,0,0,ff3428c7064f35632ec8516d4f1ffbf8326fb53cbc8ff73f0451f03ff4bad1c7,2024-09-05T12:53:21.110000
CVE-2024-4483,0,0,d9fadea227cf106e149715592d31bb2d237147d959617b97c9049a0f6f95d28f,2024-08-01T13:59:31.397000
CVE-2024-44837,1,1,aa232528d672ffea9aad1130f1b32dbe0d70ea6a605d547dc9751c510d261d22,2024-09-06T14:35:11.887000
CVE-2024-4484,0,0,f8c7c7a90ad9fb2504d28a2d6c05b973f8e6ce86f54104c89b314d37b71fcc46,2024-05-24T13:03:05.093000
CVE-2024-4485,0,0,a27e77eb6786137f1ff33a4e5e44b17657a4b120ca60b51b6c6a25a52d6e7411,2024-05-24T13:03:05.093000
CVE-2024-44859,0,0,361e21bdfe4afccedd32d666cb901903834fe5ed28d7a4a2b19923a7bb2e90ef,2024-09-05T12:53:21.110000
@ -258998,9 +259000,9 @@ CVE-2024-4503,0,0,580a13ae85da881d7284f0e9b163135d237ab58a854d76134955e6cc28d662
CVE-2024-45036,0,0,b93ba1b942c2a90c7150ffd72c683d09bcb868f6dc285088962d5acc53d2e2e4,2024-08-27T13:01:37.913000
CVE-2024-45037,0,0,0a75dee24a9a0746d4b594073f73eebe38a0d6b0ee92331f507c53bf54c314fe,2024-08-28T12:57:39.090000
CVE-2024-45038,0,0,9bc86932f350806c3a4bfe09c65e8bf9ee10a426832d16050cb88cd3f58d1bd8,2024-08-28T12:57:39.090000
CVE-2024-45039,1,1,8dff50a2b407ef59c03c573a53a6c1d07ac352c0d299898c5535283308bfc0d4,2024-09-06T13:15:04.400000
CVE-2024-45039,0,0,8dff50a2b407ef59c03c573a53a6c1d07ac352c0d299898c5535283308bfc0d4,2024-09-06T13:15:04.400000
CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f345b,2024-06-04T19:20:39.947000
CVE-2024-45040,1,1,f0d49bbb1adcbd0063af224744665e5c90152971b42a20e3b85899112dcb5dce,2024-09-06T13:15:04.893000
CVE-2024-45040,0,0,f0d49bbb1adcbd0063af224744665e5c90152971b42a20e3b85899112dcb5dce,2024-09-06T13:15:04.893000
CVE-2024-45043,0,0,813b7117a1d59d56cbce89ce53b65dfc1ca707523a63233a1be8257ae8cc6c73,2024-08-29T13:25:27.537000
CVE-2024-45045,0,0,c746f1c0e6db0596dc093f08d310bbebe72a6c977f5bda8337efa37c3e8dcc04,2024-09-03T15:13:16.580000
CVE-2024-45046,0,0,de3e74d0bfabac0255c06ca581d92948e03ddaa7217a0f0cf71d9507430ac3e4,2024-09-04T17:32:51.960000
@ -259024,9 +259026,9 @@ CVE-2024-45075,0,0,970063a21cc69312ed5905047a4f8f95237496df40f08985a6b50e18ab5ad
CVE-2024-45076,0,0,0d010c89a424f0e84ebaa9873d815dffe8bb1375c669731f5cae4948fe4c87e7,2024-09-05T12:53:21.110000
CVE-2024-4508,0,0,26388c420646a8ddc4ee2de628a691e0fa51808e2f848ae0f9b7aad58ccb1298,2024-05-17T02:40:26.220000
CVE-2024-4509,0,0,996942a0a2c59f4d53067a2868fbad35944719504585e3998bbd4d788c545588,2024-06-04T19:20:40.347000
CVE-2024-45096,0,1,d4f642a1e6bb8f30a3a63abc6de33d2a734d4a63841c63adbbf0861fc10b1ff8,2024-09-06T12:34:17.957000
CVE-2024-45097,0,1,66f33176e0c07f5466116654bcd7c2847267016c1af22914a830c235e4290102,2024-09-06T12:51:59.750000
CVE-2024-45098,0,1,d99373b3861e761d69e1423a19b397cd3881f87fabdf54ab0162bbecfa72f038,2024-09-06T13:01:44.023000
CVE-2024-45096,0,0,d4f642a1e6bb8f30a3a63abc6de33d2a734d4a63841c63adbbf0861fc10b1ff8,2024-09-06T12:34:17.957000
CVE-2024-45097,0,0,66f33176e0c07f5466116654bcd7c2847267016c1af22914a830c235e4290102,2024-09-06T12:51:59.750000
CVE-2024-45098,0,0,d99373b3861e761d69e1423a19b397cd3881f87fabdf54ab0162bbecfa72f038,2024-09-06T13:01:44.023000
CVE-2024-4510,0,0,e609022dce213b03ba687f592023f15f3e261f085d88e9ff14f3b7ffe9969d1b,2024-05-17T02:40:26.417000
CVE-2024-45107,0,0,5e2ac9906d55f0e5240ab60036468d760c6dd02ed6b1d647a490b90389e8644b,2024-09-05T12:53:21.110000
CVE-2024-4511,0,0,4d9dcedc762dab13753e2b0a6fba06d0880c8f0afe543668ff587ed1c4cea3d1,2024-06-04T19:20:40.443000
@ -259034,9 +259036,9 @@ CVE-2024-4512,0,0,26a6b6bccaf4c25a8f55831184ccf900ec4db9044766abdc62f8dfefbc7cb5
CVE-2024-4513,0,0,6c3f318b0d8a8c538c1f3920692d132bd9a92a5cfece17f174b91ed826f80818,2024-06-04T19:20:40.633000
CVE-2024-4514,0,0,385303b4c456222ef36bff0fbd012efb4cf0e7eb509cfab25e182e333e168c36,2024-06-04T19:20:40.733000
CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000
CVE-2024-45157,0,1,d58bd885a4fcef10cfad0a9d93a615cd495a5bbfc21d5630267708b64bb78509,2024-09-06T12:08:21.290000
CVE-2024-45158,0,1,e8dad9aa7119acceed96ded66f8c813d55b79ddf2fce9fd5c4249e0498a3d4b5,2024-09-06T12:08:21.290000
CVE-2024-45159,0,1,2284ec9dffd6d9b5beb59a13f4fb4f54c368aa4f9f2ebc89a8730d5a788e014a,2024-09-06T12:08:04.550000
CVE-2024-45157,0,0,d58bd885a4fcef10cfad0a9d93a615cd495a5bbfc21d5630267708b64bb78509,2024-09-06T12:08:21.290000
CVE-2024-45158,0,0,e8dad9aa7119acceed96ded66f8c813d55b79ddf2fce9fd5c4249e0498a3d4b5,2024-09-06T12:08:21.290000
CVE-2024-45159,0,0,2284ec9dffd6d9b5beb59a13f4fb4f54c368aa4f9f2ebc89a8730d5a788e014a,2024-09-06T12:08:04.550000
CVE-2024-4516,0,0,7413b58d03a0a8938a8f9c3b85a26b19cfb41e2c50a00216b0df80496b4b87e3,2024-06-04T19:20:40.930000
CVE-2024-45163,0,0,d1b8d71b55c9c05a6535a6d473b973daf564bdfb091297232be0a5c5759d6390,2024-08-22T15:35:12.750000
CVE-2024-45165,0,0,b001eacfea75d370a82a50b82205930e70aa975a85c81e49480bf2cbd2fdd05a,2024-08-22T12:48:02.790000
@ -259064,7 +259066,7 @@ CVE-2024-45190,0,0,d66cd4c54a74e68d49ead3a1a738b5a5af6006ce6c10ee38db19e97b19943
CVE-2024-45191,0,0,8410bc983e36e5828d4c81d5e10811b72eb1342d768b1b1249b7ba20875ec3a3,2024-09-01T22:15:13.697000
CVE-2024-45192,0,0,5da4aeb150ce1f250e3c04f3741f974ba0c69f3ea24005aed7598a0020d8fabe,2024-09-01T22:15:13.880000
CVE-2024-45193,0,0,1554745324792bf9e818f523be327d3eb138b0a7e9f93b1f1c9abf081b45aade,2024-09-01T22:15:13.943000
CVE-2024-45195,0,0,34c5e59a697b1b18d598c708f966cb61644746f7a7560c269f56903739b49916,2024-09-05T17:44:25.040000
CVE-2024-45195,0,1,6ffd475ceaf8128f565ed8b5cb0ab8e8ef23a6c0d5b146527899f5211dfb9259,2024-09-06T15:35:05.483000
CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000
CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b04a,2024-08-23T16:18:28.547000
CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000
@ -259095,9 +259097,9 @@ CVE-2024-4528,0,0,7b720d00d965c73e07e6aefd4c36ac932b079840a05c5efc530ca8c4800fb5
CVE-2024-45287,0,0,b8f5d1a4e2e5997ea2c47b168fd9a9add6545241bf0ce8d4616381f847e8f565,2024-09-05T13:35:02.927000
CVE-2024-45288,0,0,955296d26f6688a711bb67949962e8bc8a5c80938f39e5cdb2e043fe3c66ded8,2024-09-05T14:35:25.337000
CVE-2024-4529,0,0,5fbb4c14219ef7d51954458b7780a68dbee769876e9489db6e9ba34bd68834fa,2024-07-03T02:07:42.220000
CVE-2024-45299,1,1,6949881772edebd6b9c3e13d4dce18df4b3e6bef001cad1a646e9b1ac6fc6d97,2024-09-06T13:15:05.253000
CVE-2024-45299,0,0,6949881772edebd6b9c3e13d4dce18df4b3e6bef001cad1a646e9b1ac6fc6d97,2024-09-06T13:15:05.253000
CVE-2024-4530,0,0,6b78f15ba2a60e96a20ff176cd49d228ee37f0e30a4b3e696092a717f8a23e27,2024-05-28T12:39:28.377000
CVE-2024-45300,1,1,0da933355136fae05e1ca75338f285bff861224029440e3ffe2a75dabc63f08d,2024-09-06T13:15:05.537000
CVE-2024-45300,0,0,0da933355136fae05e1ca75338f285bff861224029440e3ffe2a75dabc63f08d,2024-09-06T13:15:05.537000
CVE-2024-45302,0,0,81d543b8058ec9a64648a785b7fa014c697fce5846d6cc78b75fe051c3ed2104,2024-08-30T13:00:05.390000
CVE-2024-45304,0,0,1414ce8fe9746c46bc2063f6428cc45402e10f1afbb5a5e378e238c2ed3a1fbe,2024-09-03T12:59:02.453000
CVE-2024-45305,0,0,d8e5983b9530b80332e508eeeefa8750e30400000717cc407d2937a9af13a873,2024-09-03T12:59:02.453000
@ -259111,7 +259113,7 @@ CVE-2024-45312,0,0,3ab127ae457c159e255763a9cac499b257dedfb3025d06ab78788175895c2
CVE-2024-45313,0,0,7f2c32db2a1d116c11ba8b1d5ff95be26c7a6f4c5dba7ff892eb13c5baf4c8a1,2024-09-03T12:59:02.453000
CVE-2024-45314,0,0,b63eb7e37a749fb3c308d5e710eb140bbcfefc4e3df4519b3385c13ecabef564,2024-09-05T12:53:21.110000
CVE-2024-4532,0,0,4fd2f02f0358f1c611846b77f1b0e80bcb1985e07f23fa6a21a71cc25593500a,2024-05-28T12:39:28.377000
CVE-2024-45321,0,0,37b6c3801843cd19376dfc008024087eb46b0d9a726e5ad21af320498cf91f40,2024-08-27T14:35:13.357000
CVE-2024-45321,0,1,fb18f1dc20e468dc3e9b1a9f0b38a9a704b0b668d302eb3f364e6f7d26aab3c7,2024-09-06T14:35:13.113000
CVE-2024-4533,0,0,aca3a412ead1ce1343d6f498450801be5e059db6302d74881039b5fe75fb6c09,2024-05-28T12:39:28.377000
CVE-2024-4534,0,0,527a3127a7586bdf18d80cd2b5b17fe74ac5ed6a2aa4ee562148173cc1d9d3e9,2024-08-09T19:35:09.923000
CVE-2024-45346,0,0,2f7f906fa8e830e09f5dc1994b30102df77aeab36a86b7c31755a212ce377dbe,2024-08-29T03:15:05.247000
@ -259124,14 +259126,14 @@ CVE-2024-45389,0,0,9f0fa9283a2a5f874fd0dba70c8232c3ec84e221a6ccb67b23537b0164ce9
CVE-2024-4539,0,0,55abcbe26e411ca656e6a32a2a4f1ff2caad1b7d092df554c28514564a925650,2024-05-14T16:11:39.510000
CVE-2024-45390,0,0,332342778ea7f712e3a75a5f422837c59f0b8fc1cd3d7840f34f23531141c0dc,2024-09-04T13:05:36.067000
CVE-2024-45391,0,0,9c5789b02ec0149b6dd4c299f7c2076a4f5ab5f425e6ba50511de158538b434d,2024-09-04T13:05:36.067000
CVE-2024-45392,0,1,9fbc5e30fa3bc562debe7349b4449c2781517f74b4c1565d7b7acedf814cb2c0,2024-09-06T13:24:34.353000
CVE-2024-45392,0,0,9fbc5e30fa3bc562debe7349b4449c2781517f74b4c1565d7b7acedf814cb2c0,2024-09-06T13:24:34.353000
CVE-2024-45394,0,0,2ba0026e07469dbf430ebd158b45587c8559adbe0d6d259ad77063b3124f324c,2024-09-04T13:05:36.067000
CVE-2024-45395,0,0,e86751a06dbfe92039318153ae3e40334cccb8072cf74037173dfdb8955c4b2b,2024-09-05T12:53:21.110000
CVE-2024-45399,0,0,a1cf7f5ebf189fb42f167aadd6e82f696503abfd38953cb1d8591d5d8cf1b025,2024-09-05T12:53:21.110000
CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b9124,2024-06-03T23:15:08.930000
CVE-2024-45400,0,1,e1cbf68a489f22b5a95eced8c7088417f4e5cd32b236fc73a99dbc623ef016c3,2024-09-06T12:08:04.550000
CVE-2024-45401,0,1,6fc32f001fc61968bb9f618abcd6061edaccad267666bcf7a6b24833d7a60445,2024-09-06T12:08:21.290000
CVE-2024-45405,1,1,586bc54971d05dcddee15980f3c82c87d64b20f9ffd26dfb8d5cb4920d02acf0,2024-09-06T13:15:05.830000
CVE-2024-45400,0,0,e1cbf68a489f22b5a95eced8c7088417f4e5cd32b236fc73a99dbc623ef016c3,2024-09-06T12:08:04.550000
CVE-2024-45401,0,0,6fc32f001fc61968bb9f618abcd6061edaccad267666bcf7a6b24833d7a60445,2024-09-06T12:08:21.290000
CVE-2024-45405,0,0,586bc54971d05dcddee15980f3c82c87d64b20f9ffd26dfb8d5cb4920d02acf0,2024-09-06T13:15:05.830000
CVE-2024-4541,0,0,3195b1a81526d9da93cf28b1e1f763238ece2897561011f493b9a3c77f12398c,2024-06-20T12:44:01.637000
CVE-2024-4542,0,0,188546ca483f93e7131261a5bd57b93b03491de5e62247759ac8c05b93c8f51b,2024-05-16T14:15:08.980000
CVE-2024-45429,0,0,b6682f6c5fc95a0ea1e918cc9175ec1c4ba8aa26e7eab550751e1679316bee68,2024-09-05T12:53:21.110000
@ -259142,13 +259144,13 @@ CVE-2024-4544,0,0,15f8e020f3ae5b19c85909c1ae8a806386c0b6da2837ebed60d92355c70c15
CVE-2024-45440,0,0,9239656ddb6aeda0c2c6efeace5c8dd620d5a27bf71f1e1bdb521249d601edd3,2024-09-03T18:15:08.967000
CVE-2024-45441,0,0,cc95800eacd4a409644c50c2e99659b2320195778e3ff42b199a8b4fa829f44f,2024-09-04T13:05:36.067000
CVE-2024-45442,0,0,2c6961d1d58c78433d275cad97385307540e57f4ac06bb8459d4fa71156da060,2024-09-04T13:05:36.067000
CVE-2024-45443,0,1,162552df88a79f08b277538012a14f30ef91af105cdfa5945ebbfc7ec02b8e03,2024-09-06T13:33:10.347000
CVE-2024-45444,0,1,321f9f6e4d1f412085fa1b37c689a5a7d228fe4c829fe455b2d62bd64bdb658e,2024-09-06T13:48:17.260000
CVE-2024-45445,0,1,45a1c87a577b88492ff7122c62a15d952a88af2f589f552d69e64885c645bd1f,2024-09-06T13:54:42.663000
CVE-2024-45446,0,0,8eeeac4c0f558dd1ae996c12e7f896e6c8c39087a3aee9dc30eaec10b0f5f7e5,2024-09-04T13:05:36.067000
CVE-2024-45447,0,0,e42099412998fdb6eb1847c3692348897eb18af9a010eac106f09831cb60c645,2024-09-04T13:05:36.067000
CVE-2024-45448,0,0,a03bcda0dbaa0fba892faf51db889c52eae6fa5919c1e27c6680cadfc8e8fd81,2024-09-04T13:05:36.067000
CVE-2024-45449,0,0,ca75a5fec52aea90cbaac2cb16d5730874e6238683b38adee96cd2d054441131,2024-09-04T13:05:36.067000
CVE-2024-45443,0,0,162552df88a79f08b277538012a14f30ef91af105cdfa5945ebbfc7ec02b8e03,2024-09-06T13:33:10.347000
CVE-2024-45444,0,0,321f9f6e4d1f412085fa1b37c689a5a7d228fe4c829fe455b2d62bd64bdb658e,2024-09-06T13:48:17.260000
CVE-2024-45445,0,0,45a1c87a577b88492ff7122c62a15d952a88af2f589f552d69e64885c645bd1f,2024-09-06T13:54:42.663000
CVE-2024-45446,0,1,af4d9be5af37ce7556a9f76528c376e7df21ae3230b2a446b998a2c4c80f381b,2024-09-06T14:01:37.120000
CVE-2024-45447,0,1,b1ca5bf01175d943b0546e709af95ed880695cf0a55c8b64522f7e1c895fa3c7,2024-09-06T14:17:55.720000
CVE-2024-45448,0,1,baaac6177753b9ef1526bea7e39de3dc043a4ca1913a07543e6e5e11685c2217,2024-09-06T14:24:21.837000
CVE-2024-45449,0,1,16fcc8f3add1fcba18b36fc04f0c4a19c97d176cb514abd9722e7bafd45dc227,2024-09-06T14:38:08.067000
CVE-2024-4545,0,0,864a22773c6eaa7a20fdb4cf4c4b7a2709a2c8e64cfe98132d05364d67e97af4,2024-05-14T16:11:39.510000
CVE-2024-45450,0,0,c06e5e6343abf6ab1ba08a36cd39179f5f795e20e409c99cf975d7573fa7a254,2024-09-04T13:05:36.067000
CVE-2024-4546,0,0,da973c82a9042d639d29e7a0c2ffb48d440dea200e6df21027887041c43a68db,2024-05-16T13:03:05.353000
@ -259205,7 +259207,7 @@ CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250
CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000
CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000
CVE-2024-4575,0,0,9d22d248e877183fb374174504fab6bfc500414f16c234b88b687abe10cd48be,2024-05-24T01:15:30.977000
CVE-2024-45751,0,1,9d644b0c14d0d0ef7e1334ce6c40fff034d24fd661ea8076c5e0aad911a46551,2024-09-06T12:08:04.550000
CVE-2024-45751,0,0,9d644b0c14d0d0ef7e1334ce6c40fff034d24fd661ea8076c5e0aad911a46551,2024-09-06T12:08:04.550000
CVE-2024-4576,0,0,bef0c1eb81bb0f4c3eef72c993d9a673f04f17bc2d954741979507814d4ccd99,2024-07-02T14:41:30.777000
CVE-2024-4577,0,0,b55cac970df35b2daf21f1bc20cfa9dd0965f08c49eae1007fc9a139f9980913,2024-08-14T19:23:47.253000
CVE-2024-4578,0,0,de2bf1ab8b65cf8119579f63d8e64a9383c9519828d1fae8ddac21d6dcb5605a,2024-06-27T19:25:12.067000
@ -260796,10 +260798,11 @@ CVE-2024-6438,0,0,dda5c3ef0b29175f6296e0b89d7c12c3e07fe51c2f0cc30ea59ffede8f2663
CVE-2024-6439,0,0,17c8c0dedf84f798cc0f5ae1eb12bcfee8d03a9530b75eee07a6ecb983f8a09a,2024-07-02T17:58:39.773000
CVE-2024-6440,0,0,2c5be04f311531a7679fd469afc24458b735968d4c5b698cdcf03804f39d3eef,2024-07-02T17:58:15.410000
CVE-2024-6441,0,0,15383e1684ea64dc1d374e71fe60467b8bfc18bde94b0e73415ebe68688c2118,2024-07-02T17:44:45.700000
CVE-2024-6445,1,1,16567ab0b3fb9a93fe14c1d341ae72ba8fd54bee773d71d9baca06ce19334323,2024-09-06T14:15:12.683000
CVE-2024-6447,0,0,45fe1e3b45bb9052a54143ac6931092e1b37ff897cd56aa11e3df59780bc06cb,2024-07-11T13:05:54.930000
CVE-2024-6448,0,0,29c9fba3b86c8e9eb615a2e1f73377ed9eea71e4eb21902a2662b1cd45074970,2024-08-28T12:57:27.610000
CVE-2024-6449,0,1,21995eacdcc0c8443a9e9f3d4edb41f9e9ea5b155f883c2dcc53c4e74b6c4d69,2024-09-06T13:15:06.110000
CVE-2024-6450,0,1,df77a962eb8911939efd97340d1702803ad1baf719c452d1d7fa8308fe5c3838,2024-09-06T13:15:06.343000
CVE-2024-6449,0,0,21995eacdcc0c8443a9e9f3d4edb41f9e9ea5b155f883c2dcc53c4e74b6c4d69,2024-09-06T13:15:06.110000
CVE-2024-6450,0,0,df77a962eb8911939efd97340d1702803ad1baf719c452d1d7fa8308fe5c3838,2024-09-06T13:15:06.343000
CVE-2024-6451,0,0,6a9c0fb65fad3a5f99e557f5250ddd026fdc81cb51b281650e16075ca1a8cd9e,2024-08-19T17:35:23.417000
CVE-2024-6452,0,0,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000
CVE-2024-6453,0,0,997e33861988fe67139dbc94cb45099acca0539b377b12d39324c5c718a66e9d,2024-08-21T14:37:10.103000
@ -261048,7 +261051,7 @@ CVE-2024-6783,0,0,6f1f4a0fa578d50da4a4853fdfd24c63ba19a8604300ab142edf0f6cb8d9a8
CVE-2024-6788,0,0,55fb0d510962e755b83a0ccc2efad4312001b246df777a622c08f48560e29a88,2024-08-13T17:11:53.553000
CVE-2024-6789,0,0,231bd77c8db40b763ff18cdedd6d2a472872c681c24ea5a4e63b0563b010d2cc,2024-08-27T13:01:37.913000
CVE-2024-6791,0,0,530a9e011d938f884a817484b487117900f43c2f83e7c51084019bfb404fc80f,2024-07-24T12:55:13.223000
CVE-2024-6792,0,1,e783451886045e1eac6661fbc4d3996b753ddb1f8514839a73a972f104f2ef73,2024-09-06T13:35:02.020000
CVE-2024-6792,0,0,e783451886045e1eac6661fbc4d3996b753ddb1f8514839a73a972f104f2ef73,2024-09-06T13:35:02.020000
CVE-2024-6793,0,0,d3b7076c1491770aa57006b0fda0ca29233a316fd768110e179dab36334b145c,2024-07-24T12:55:13.223000
CVE-2024-6794,0,0,deb0448edb68525192d212a4a5bb7cd3beda8036c6e71adf051ab04617417890,2024-07-24T12:55:13.223000
CVE-2024-6799,0,0,4139a727efc5bbba878823dd77da7ecbccc0d31113ed4001d69cc00c0e6e86e7,2024-07-19T13:01:44.567000
@ -261317,7 +261320,7 @@ CVE-2024-7204,0,0,1772f71824e8e67d08dd960b8980267be3eb60b7db474bb1b3294ba0efdcc4
CVE-2024-7205,0,0,f8b1cbec46ea51b223aac866d1ac39ee6fa7b6e832e6e62020df5a45e4b00643,2024-07-31T15:15:10.993000
CVE-2024-7208,0,0,23976b9c97cfc390397ceda1fa9cd6b5d178a3b311c11fb9c9f129febf7d4e73,2024-08-02T15:16:37.420000
CVE-2024-7209,0,0,70d88ede2ff174d67b44db29b9d64c217e00f13cf62689936f75e53f7397ee7a,2024-07-31T12:57:02.300000
CVE-2024-7211,0,1,92a84d32183c8fcd0c3fcd4c786a37ad4d038da054671ef7ebf12a51168571d0,2024-09-06T13:23:07.237000
CVE-2024-7211,0,0,92a84d32183c8fcd0c3fcd4c786a37ad4d038da054671ef7ebf12a51168571d0,2024-09-06T13:23:07.237000
CVE-2024-7212,0,0,d8e81c1df21541a2a61b1ee61c0b13c7c5575d5a7c0cad80faa94c0502ea9af9,2024-08-06T14:06:56.937000
CVE-2024-7213,0,0,91cf0399575fcf8bfe7dc21faeb9bce09b9c6ac55860924943cc84f28093279f,2024-08-06T14:07:30.757000
CVE-2024-7214,0,0,3a78281a383bf44c352cba681f12759123f996c9d59985652a6e46e161f7ed5e,2024-08-06T14:08:05.393000
@ -261416,7 +261419,7 @@ CVE-2024-7345,0,0,c89352b78a1b7efddda76024ace56eb1677600f94378ef8d33d34c3c91ac18
CVE-2024-7346,0,0,cef11b112b151333dc0322cebc750df5acd76278a7b270f016213e5f5d953fa0,2024-09-05T14:03:24.040000
CVE-2024-7347,0,0,bf8562cb670939d7931c5691727a53bfc7fe78942e30ee3ed14dd0e17a8cc5f7,2024-08-20T19:25:17.513000
CVE-2024-7348,0,0,3d1228f3ad08ea7cfe68d4df8a31a5ae3b9df9b86e858b3756b13b4b2c220a8e,2024-08-12T15:54:52.320000
CVE-2024-7349,0,1,c0f6b57771ba8916c1a972b9722d966521ad6be44f6b402b994c07bc1fc94248,2024-09-06T12:08:04.550000
CVE-2024-7349,0,0,c0f6b57771ba8916c1a972b9722d966521ad6be44f6b402b994c07bc1fc94248,2024-09-06T12:08:04.550000
CVE-2024-7350,0,0,d4174556ac92d5e9a2a8dc8d5eec461477866543996df72c5d41b5df846ab0dc,2024-08-08T13:04:18.753000
CVE-2024-7351,0,0,46112fbe28a33af24a9aafee0e565b5b19cc9895d9dd5029b9f8903f830d37b0,2024-08-26T12:47:20.187000
CVE-2024-7353,0,0,41679b571aeb0f65d12733ad6909f06c490b83d168f3a79e42cd0098d7b4bdde,2024-08-07T15:17:46.717000
@ -261466,7 +261469,7 @@ CVE-2024-7411,0,0,233fe970a370850f5b652951fe7b5f603c4b4a66cd3c44f0b67dc9d466e327
CVE-2024-7412,0,0,b7efc7f691385d07c16b9c98953749b4113f5c7d6e2cc5e240ac710642b7a973,2024-08-12T13:41:36.517000
CVE-2024-7413,0,0,cc9a3132dbf30c713a640687e195177085da2f3a67f589d16f765a82cdaabb61,2024-08-12T13:41:36.517000
CVE-2024-7414,0,0,ec5a655568a866725caccc407e481351f1a5df496455996ee3102ef3dac59f70,2024-08-12T13:41:36.517000
CVE-2024-7415,0,1,635de2a957d86d33c8ae8c57c08ec9a59fa790990e371bc472902145ad47b98e,2024-09-06T12:08:04.550000
CVE-2024-7415,0,0,635de2a957d86d33c8ae8c57c08ec9a59fa790990e371bc472902145ad47b98e,2024-09-06T12:08:04.550000
CVE-2024-7416,0,0,67a9ab6c88d18462429964f1183d705aa9fe2b8f49f4e7e013c20651e7dbf059,2024-08-12T13:41:36.517000
CVE-2024-7418,0,0,5654c2ea5f680ee7442f7881c310f72c8023f64985fe11e829ea249b0084006d,2024-08-29T13:25:27.537000
CVE-2024-7420,0,0,212201dc70782f8f787a94c9803febdbce3768abc9739a3b9300a43932a4c1b3,2024-08-15T13:01:10.150000
@ -261514,6 +261517,7 @@ CVE-2024-7485,0,0,0b34fc91c3d825ea4087a792a0e5c6d839cf66a581a05d0c60df64b0af48f9
CVE-2024-7486,0,0,e2579b82a31704160b51da6f8b3285ef5bff1d765f5e0369c7378c4f856658fb,2024-08-08T13:04:18.753000
CVE-2024-7490,0,0,2dbd6717a12bca522d1065ac017f63874351831b0b05b9f6e750116d667cf962,2024-08-12T15:22:20.267000
CVE-2024-7492,0,0,6476a74ce2975ad097c7a45c1f2f905cc77480bec2260de48447ae3a8b41df62,2024-08-08T13:04:18.753000
CVE-2024-7493,1,1,3983f8f12bcdac52d18ee94fdbe74777367d291efcf4374db0d074a462506bb4,2024-09-06T14:15:12.860000
CVE-2024-7494,0,0,3a598ade67522bffd51a3365723ddb5bff4182d602034c8ec8df719958075683,2024-08-19T17:34:50.933000
CVE-2024-7495,0,0,c193334e09e583bf41cda7d073dca2acbe46aabc3be2513a6c4a0be4587cb1db,2024-08-19T17:10:27.693000
CVE-2024-7496,0,0,427bcb1106924d8f1bd58fd00923557097983d876631b3e46ebbaafc9076bb1e,2024-08-19T16:48:09.717000
@ -261588,9 +261592,10 @@ CVE-2024-7585,0,0,5e2ff565ca20d01ef68f8422fbeb35a8929478e27cc3f0f142481fee7317e6
CVE-2024-7588,0,0,5a601951792deb0c1a10bd51703f1f9beff37d3a9397ce091c3662d925878616,2024-08-14T13:00:37.107000
CVE-2024-7589,0,0,aa1647eb6c306ec7b876b5795f9775a883f5cc7b06ae7ba418ac0c8e49665270,2024-08-13T16:58:08.793000
CVE-2024-7590,0,0,7c97d5aae327ca695e1cd419af58bc8aaacb7517411055405e5e64d98b0261a2,2024-08-13T12:58:25.437000
CVE-2024-7591,0,1,93e76a9c527669096be2abfdb6462a0311db24e202fd8d23d80d88ff40dd1ed7,2024-09-06T12:08:21.290000
CVE-2024-7591,0,0,93e76a9c527669096be2abfdb6462a0311db24e202fd8d23d80d88ff40dd1ed7,2024-09-06T12:08:21.290000
CVE-2024-7592,0,0,af44aafcb14e521ee1ae85082a6a487c5d017e994f40b59b2c958cad447a75f0,2024-09-04T21:15:14.643000
CVE-2024-7593,0,0,2efb8857fe8e314338e0788060f0e22f0d56642d5618c3e3d62e70b5e7e24bac,2024-08-14T02:07:05.410000
CVE-2024-7599,1,1,d2cfbe8b9504a24c243969ff7e7c7980806c2c4d9052825181e0fce0f65f025c,2024-09-06T14:15:13.107000
CVE-2024-7600,0,0,456ca552c9a809b72d1cc9f2b35e12282778424a2ecdfd82d7e98a6e39cd97fa,2024-08-23T16:35:31.137000
CVE-2024-7601,0,0,db9958425836572eda0b52c7e651aff0e41e4dc47ec55ea348bc5752e1b198d2,2024-08-23T16:35:52.383000
CVE-2024-7602,0,0,1295ede0549ca488da522cbefe2db5abad88498e69c53af1f38f0ee81eb69b62,2024-08-23T16:36:11.690000
@ -261601,12 +261606,14 @@ CVE-2024-7606,0,0,d1994339c445d05a7d0516150729b84de3d1d7c8a4d08e8012b40ecbd6deed
CVE-2024-7607,0,0,1fc6dc2de47de502ba4dba054f1982731028b52bc9234ef0062aa94d686e06ad,2024-08-30T15:41:02.407000
CVE-2024-7608,0,0,b8872988f702757177432eab77e95a14e7cc629ce3c064dd49371a09c8fc5a16,2024-08-28T12:15:06.900000
CVE-2024-7610,0,0,b0ce86cdbef2b0081b727d87f884505d4aea23572226b0988a51de68f40b68a6,2024-08-29T15:45:27.523000
CVE-2024-7611,1,1,bf291dbcbb039addec6a2c6c79a7915577b4807ea6d2d84fb3da08156a618706,2024-09-06T14:15:13.330000
CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f263,2024-08-21T18:47:11.523000
CVE-2024-7614,0,0,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000
CVE-2024-7615,0,0,bdb4e2a47bb0b635ad5424e7dee382fdbc667ab1983b9e7b4b79b80817773efa,2024-08-21T18:48:19.590000
CVE-2024-7616,0,0,240142a7cf93711d379b14c2a6284d004fd0a2d1c674fc02d32efdd57aa3e2bd,2024-08-13T16:59:39.517000
CVE-2024-7619,0,0,52e157835f9b49014d03653876a6177ba54feacc6eb580f7a52506ce1aa54bb3,2024-09-03T18:15:09.223000
CVE-2024-7621,0,0,07161284faa2eb0637370b6ff462e631787a37850cefb6ac5fa6750545dd7050,2024-08-12T13:41:36.517000
CVE-2024-7622,1,1,cad29f0e85c68145b0137f39a5c768eea33e114cdeca8620411f143343f84ae8,2024-09-06T14:15:13.553000
CVE-2024-7624,0,0,c87cdcd90fb34d1c79e4bedcfe521cd45a7c97d88fc176665ac59544b2fffb63,2024-08-15T13:01:10.150000
CVE-2024-7625,0,0,cf7951ec684c41cac7f2f6e12b1507a1eac20d5a4914135abea68670c2031228,2024-08-15T13:01:10.150000
CVE-2024-7627,0,0,af96392fc36e867c15605b6e1dc599aeac0b5c5d59eb872427406ab6bc591879,2024-09-05T12:53:21.110000
@ -261926,7 +261933,7 @@ CVE-2024-8172,0,0,0f560f815e4f982c5fa8dce4e33b1159bf9bccf943a059983fd049dd30da68
CVE-2024-8173,0,0,50ae04f881a2d18920200f91fab2c91cb50ce1f1b838a9340ca053dbaf5dd83c,2024-09-05T18:39:00.950000
CVE-2024-8174,0,0,8543f0d8f92ea7727c4605df4b165224a3b6d137f11ee710b81d48c311ac7b21,2024-08-27T14:32:08.607000
CVE-2024-8178,0,0,2a2797f6457c9a816d7cd4650d8d0f80ee22a85af7d3d544cabca5e14371a945,2024-09-05T21:21:06.637000
CVE-2024-8181,0,0,3c630c74e0a5e892a66667409ec22f499f363f5b25e34ef38a41031abbd935c0,2024-09-04T12:15:05.833000
CVE-2024-8181,0,1,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000
CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000
CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000
CVE-2024-8193,0,0,2f2a75e240e354e8f0e14f5f9d5e6a02eb535e669399224b9d10e7e4f72f0d51,2024-08-30T15:52:33.747000
@ -261962,7 +261969,7 @@ CVE-2024-8230,0,0,51972d3a01eef60d4ec2fcebcc43d9f517d40a0a396b61ca7c24bdef0d5fcb
CVE-2024-8231,0,0,19b769716e3fff898a72bf0ee7d68779b61ab99af63bed31a0498759613ebd4e,2024-08-28T12:57:27.610000
CVE-2024-8234,0,0,870a131a53db84d6497bde7de38de6b7411ad7686be0738cd78fff93fab14909,2024-08-30T13:00:05.390000
CVE-2024-8235,0,0,d5aa509f85958c98e1ad9dcfec5d574bff6f5e3781d6d0bbdba4997de15951d1,2024-09-03T12:59:02.453000
CVE-2024-8247,0,1,5202f9f70242e6e766f5bf4ee04774da230414090293c913b32ce2eadeefe661,2024-09-06T12:08:04.550000
CVE-2024-8247,0,0,5202f9f70242e6e766f5bf4ee04774da230414090293c913b32ce2eadeefe661,2024-09-06T12:08:04.550000
CVE-2024-8250,0,0,9b93a65d8c7dcee06e07a2e2b390d716b51503d05b493ec48aa5a8756ae94b8c,2024-08-30T16:32:16.917000
CVE-2024-8252,0,0,36e1aa114a02ff2bf925a636a4ed4135ae0e6011078bf9fd8b3aff586823c205,2024-09-03T14:31:27.243000
CVE-2024-8255,0,0,6c498c108684434305256b803e17a8c75dfbb80191f87c9993edaaba373ae570,2024-08-30T13:00:05.390000
@ -261971,17 +261978,17 @@ CVE-2024-8274,0,0,81f15088246893eaf3249a3304ee5d5199071263c8883a7f9f22c293a16a37
CVE-2024-8276,0,0,6d091b531458424cc4635f6e051f410dabbe91d1101fd761130b66815a93f34d,2024-09-03T12:59:02.453000
CVE-2024-8285,0,0,3b0be068594bf7034dac9ef4fa68f5d83c55fdc692ee8082bd0a6e0eca73c78a,2024-09-03T12:59:02.453000
CVE-2024-8289,0,0,900bfbd861154484ed59254bdbec992d28a9742381ab830cf631e50b7fa985ab,2024-09-05T17:41:58.350000
CVE-2024-8292,0,1,27ea852dc3661b1a76e4e5c3ea5100bde241ea5a5c464db16708c938d4cf0c30,2024-09-06T12:08:04.550000
CVE-2024-8292,0,0,27ea852dc3661b1a76e4e5c3ea5100bde241ea5a5c464db16708c938d4cf0c30,2024-09-06T12:08:04.550000
CVE-2024-8294,0,0,76cafe7a1838d9cd0244706a299f12cd4ba69ef653952654db2fa070ca07bd0d,2024-08-30T15:38:13.437000
CVE-2024-8295,0,0,907331a3a97a6618443e3aff92f4e758c3135b25ca0d9fb01d74d067e9cd6716,2024-08-30T15:37:41.510000
CVE-2024-8296,0,0,e31c225486c181d770097ee2f86386b9a5d776a033c8c4a5860d3ba550c9de51,2024-08-30T15:36:36.383000
CVE-2024-8297,0,0,cc2df51be4ac5261775d9a448c17018496059825966f6585d5dfd052f6e898fe,2024-08-30T15:28:50.863000
CVE-2024-8298,0,0,908da60f30ca3c3afa19b305cc0058d178aa922b6d0d48bb7b9dd9364a746926,2024-09-04T13:05:36.067000
CVE-2024-8298,0,1,b6e0265f7e06064f96a4b1454f4843c935b76c78438dc3aea3b160aebd5f455b,2024-09-06T14:53:06.890000
CVE-2024-8301,0,0,517ca402c22af2219c7d5e72c26f25471bc06be609f1fc004544a29726452fb8,2024-08-30T15:24:09.830000
CVE-2024-8302,0,0,bda50b555854cd31882c0ef2167f779bd3ff1746a67f4e225a03fe8a32f42f3f,2024-08-30T13:00:05.390000
CVE-2024-8303,0,0,7d291660edacb98ef58ef33c4f7785c68c1ad74e546b2f9d99bc765dad9ef6ed,2024-08-30T13:00:05.390000
CVE-2024-8304,0,0,02fe3479f6e17fb07e472eabe123127bcfa4991aa0aa38b065a739eef0a9393c,2024-08-30T13:00:05.390000
CVE-2024-8317,0,1,14f0c71616d0bf53804a454dd89ddfdc27bbf8ffffc05a1e254c94e626690c0a,2024-09-06T12:08:04.550000
CVE-2024-8317,0,0,14f0c71616d0bf53804a454dd89ddfdc27bbf8ffffc05a1e254c94e626690c0a,2024-09-06T12:08:04.550000
CVE-2024-8318,0,0,5a1c058346165498258e6a0dbcca1e25ab26db572376e8715726de97a7feed6e,2024-09-04T13:05:36.067000
CVE-2024-8319,0,0,19bee7e43deb1719502aef7eb4c05b0fb28cffea0ae04999821f01ddbcc0e265,2024-09-03T14:43:13.787000
CVE-2024-8325,0,0,6acbe28b7e23bada826026212a2fb1b0115adaa2c5e690e584f377990b0f6742,2024-09-04T13:05:36.067000
@ -262027,7 +262034,7 @@ CVE-2024-8387,0,0,cccfa2a9463c00af390408978c7133aa456cc8cd4e2c49e9e0114842d3fd1c
CVE-2024-8388,0,0,c9864eb6d3c315590c52d0b0a1a482222ad75576dc8d176a33dcc59976d2f97c,2024-09-04T15:49:19.170000
CVE-2024-8389,0,0,b86f9dffcb24008ea2fc4581b98019930f23a761524133d12e1b7b2aa1f8008a,2024-09-04T15:50:02.933000
CVE-2024-8391,0,0,6ffd51df6432b1e5cadf1919587edc296707fce8f9413505ec3bec8317c9d0a8,2024-09-05T12:53:21.110000
CVE-2024-8395,0,1,10c6e3be3a1861aa869e0c4efda44dd094344a7e5d86fc81c1f9f94b8a222ae9,2024-09-06T12:08:04.550000
CVE-2024-8395,0,0,10c6e3be3a1861aa869e0c4efda44dd094344a7e5d86fc81c1f9f94b8a222ae9,2024-09-06T12:08:04.550000
CVE-2024-8399,0,0,3faa142573b2658da1828ae3d2ac176955aecf342f632daae5bde690c496cf4c,2024-09-04T13:05:36.067000
CVE-2024-8407,0,0,190893f5b3da05c3b04f6347e8d36e88eb22b5329ec3a82949674ad3abb1a15d,2024-09-05T14:48:28.513000
CVE-2024-8408,0,0,9f87fcd812f2a0614c81edf26c59a3fd5158e6ac48b1ed6a5cdb904e931cd196,2024-09-05T14:41:14.603000
@ -262041,7 +262048,8 @@ CVE-2024-8415,0,0,d8c5585e64bc4323fcda510a16df97bcb1ec11253c5d38c080bb7195e38687
CVE-2024-8416,0,0,c7d13bc001a0210b2e719e08e8651ac5ae2e4ed0ee9e6e0088ac4a7e467de1ca,2024-09-05T12:53:21.110000
CVE-2024-8417,0,0,a9619e26c595954087d9c9b458e78703071fbd5bf87ff4a22ec6d8ecc7076fcb,2024-09-05T12:53:21.110000
CVE-2024-8418,0,0,f7342b1aaf36f471815aa50c659bed6ce97deba1a8dc8297ac025dec31c9e421,2024-09-05T14:18:49.537000
CVE-2024-8427,0,1,1d0d7daf1e8474e50325418d52e79c4545246c244dd6a29747e6934be9944c58,2024-09-06T12:08:04.550000
CVE-2024-8427,0,0,1d0d7daf1e8474e50325418d52e79c4545246c244dd6a29747e6934be9944c58,2024-09-06T12:08:04.550000
CVE-2024-8428,1,1,48e8956360ad489ac607d313b2c10fa73efbec1a6a07f94a1767a2771b07c260,2024-09-06T14:15:13.823000
CVE-2024-8445,0,0,11be885f11a2f2b8a202932b0e16edeb442a7212afe3a0c8e195900656f3fddf,2024-09-05T17:44:56.007000
CVE-2024-8460,0,0,9f3f8eceb3112773f2710cd04ce3ea02c4b8eea37add051a54caa5d3f11f68a4,2024-09-05T12:53:21.110000
CVE-2024-8461,0,0,e49804a708251a77ac276dc2c87288b6f990bf8f9a9704c388f55d96a1de96d3,2024-09-05T17:45:07.877000
@ -262057,4 +262065,4 @@ CVE-2024-8470,0,0,bea6b0b968688b42b5644ab4cec20c893536d252388507a633ee5ebbe07507
CVE-2024-8471,0,0,d4cac4daadf018326a13905f788e8fc27e503497a3cff6ab0ea980773a6f76cb,2024-09-06T11:44:22.510000
CVE-2024-8472,0,0,a896e0fd54ff62d16feed47be0f08dd27e23a8a4def269ca8073766b75918cef,2024-09-06T11:44:34.543000
CVE-2024-8473,0,0,0d318dfea88475fed5cabdbe761e188358c3ae35cd6d226ef3fe46f2f9041c00,2024-09-06T11:44:45.017000
CVE-2024-8480,0,1,6f63c0c2b913be669f1e72f74bb0555ea9046fdf00f5eabae51a6bc6bb95358b,2024-09-06T12:08:04.550000
CVE-2024-8480,0,0,6f63c0c2b913be669f1e72f74bb0555ea9046fdf00f5eabae51a6bc6bb95358b,2024-09-06T12:08:04.550000

Can't render this file because it is too large.